Assessment of power system vulnerability using metaheuristic techniques

ABSTRACT: This paper presents a comparison of different metaheuristic techniques applied to the assessment of power systems vulnerability to intentional attacks, also kwon as the electric grid interdiction problem. This problem is described through a bilevel formulation and comprises the interaction...

Full description

Autores:
López Lezama, Jesús M.
Cortina, Juan J.
Muñoz Galeano, Nicolás
Tipo de recurso:
Article of investigation
Fecha de publicación:
2018
Institución:
Universidad de Antioquia
Repositorio:
Repositorio UdeA
Idioma:
eng
OAI Identifier:
oai:bibliotecadigital.udea.edu.co:10495/35676
Acceso en línea:
https://hdl.handle.net/10495/35676
http://www.m-hikari.com/ces/ces2018/ces21-24-2018/p/lopezCES21-24-2018.pdf
Palabra clave:
Genetic algorithms
GRASP System
GRASP
Iterated Local Search and Tabu Search
http://id.loc.gov/authorities/subjects/sh92002377
http://id.loc.gov/authorities/subjects/sh85056504
Rights
openAccess
License
https://creativecommons.org/licenses/by/4.0/
id UDEA2_15bf93a16d56c7c81f5d27876dd79ff8
oai_identifier_str oai:bibliotecadigital.udea.edu.co:10495/35676
network_acronym_str UDEA2
network_name_str Repositorio UdeA
repository_id_str
dc.title.spa.fl_str_mv Assessment of power system vulnerability using metaheuristic techniques
title Assessment of power system vulnerability using metaheuristic techniques
spellingShingle Assessment of power system vulnerability using metaheuristic techniques
Genetic algorithms
GRASP System
GRASP
Iterated Local Search and Tabu Search
http://id.loc.gov/authorities/subjects/sh92002377
http://id.loc.gov/authorities/subjects/sh85056504
title_short Assessment of power system vulnerability using metaheuristic techniques
title_full Assessment of power system vulnerability using metaheuristic techniques
title_fullStr Assessment of power system vulnerability using metaheuristic techniques
title_full_unstemmed Assessment of power system vulnerability using metaheuristic techniques
title_sort Assessment of power system vulnerability using metaheuristic techniques
dc.creator.fl_str_mv López Lezama, Jesús M.
Cortina, Juan J.
Muñoz Galeano, Nicolás
dc.contributor.author.none.fl_str_mv López Lezama, Jesús M.
Cortina, Juan J.
Muñoz Galeano, Nicolás
dc.contributor.researchgroup.spa.fl_str_mv Grupo de Manejo Eficiente de la Energía (GIMEL)
dc.subject.lcsh.none.fl_str_mv Genetic algorithms
GRASP System
topic Genetic algorithms
GRASP System
GRASP
Iterated Local Search and Tabu Search
http://id.loc.gov/authorities/subjects/sh92002377
http://id.loc.gov/authorities/subjects/sh85056504
dc.subject.proposal.spa.fl_str_mv GRASP
Iterated Local Search and Tabu Search
dc.subject.lcshuri.none.fl_str_mv http://id.loc.gov/authorities/subjects/sh92002377
http://id.loc.gov/authorities/subjects/sh85056504
description ABSTRACT: This paper presents a comparison of different metaheuristic techniques applied to the assessment of power systems vulnerability to intentional attacks, also kwon as the electric grid interdiction problem. This problem is described through a bilevel formulation and comprises the interaction between a disruptive agent (attacker) and the power system operator (defender). The attacker is positioned in the upper level optimization problem and aims at finding the set of devices (lines, transformers and generators) that, once simultaneously attacked, would maximize the system load shedding. This problem is constrained by a limit on destructive resources and the response of the power system operator, located in the lower level optimization problem that reacts to the attack by modifying the generation dispatch aiming at minimizing the load shedding. The interdiction problem described in this paper is nonlinear and nonconvex; therefore, four different metaheuristic techniques are implemented and compared for its solution: Genetic Algorithm, GRASP, Iterated Local Search and Tabu Search. Results show that the Iterated Local Search adapts better to this problem obtaining the best rate between quality of solutions and computation time.
publishDate 2018
dc.date.issued.none.fl_str_mv 2018
dc.date.accessioned.none.fl_str_mv 2023-06-28T14:28:47Z
dc.date.available.none.fl_str_mv 2023-06-28T14:28:47Z
dc.type.spa.fl_str_mv Artículo de investigación
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.redcol.spa.fl_str_mv https://purl.org/redcol/resource_type/ART
dc.type.coarversion.spa.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
format http://purl.org/coar/resource_type/c_2df8fbb1
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv 1313-6569
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/10495/35676
dc.identifier.doi.none.fl_str_mv 10.12988/ces.2018.8399
dc.identifier.eissn.none.fl_str_mv 1314-7641
dc.identifier.url.spa.fl_str_mv http://www.m-hikari.com/ces/ces2018/ces21-24-2018/p/lopezCES21-24-2018.pdf
identifier_str_mv 1313-6569
10.12988/ces.2018.8399
1314-7641
url https://hdl.handle.net/10495/35676
http://www.m-hikari.com/ces/ces2018/ces21-24-2018/p/lopezCES21-24-2018.pdf
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.ispartofjournalabbrev.spa.fl_str_mv Contemp. Eng. Sci.
dc.relation.citationendpage.spa.fl_str_mv 1184
dc.relation.citationissue.spa.fl_str_mv 24
dc.relation.citationstartpage.spa.fl_str_mv 1165
dc.relation.citationvolume.spa.fl_str_mv 11
dc.relation.ispartofjournal.spa.fl_str_mv Contemporary Engineering Sciences
dc.rights.uri.spa.fl_str_mv https://creativecommons.org/licenses/by/4.0/
dc.rights.uri.*.fl_str_mv http://creativecommons.org/licenses/by/2.5/co/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv https://creativecommons.org/licenses/by/4.0/
http://creativecommons.org/licenses/by/2.5/co/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.extent.spa.fl_str_mv 20
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Hikari
dc.publisher.place.spa.fl_str_mv Ruse, Bulgaria
institution Universidad de Antioquia
bitstream.url.fl_str_mv https://bibliotecadigital.udea.edu.co/bitstreams/506aadce-ad8c-40f5-8383-c1c414b4118e/download
https://bibliotecadigital.udea.edu.co/bitstreams/b975ac86-e0e7-47da-9a42-46b93d3fcf2c/download
https://bibliotecadigital.udea.edu.co/bitstreams/39cacf65-39bb-4b8e-aa19-840fbbf0a895/download
https://bibliotecadigital.udea.edu.co/bitstreams/1135371f-a8dc-420b-a2ff-b400426ddec7/download
https://bibliotecadigital.udea.edu.co/bitstreams/4381e269-4964-4226-9a7e-b2e85edc48ae/download
bitstream.checksum.fl_str_mv 36f0f00c3b94bd86642bba0ac9f2fd86
1646d1f6b96dbbbc38035efc9239ac9c
8a4605be74aa9ea9d79846c1fba20a33
1bda311ef111cbdb7ad85117b7f9acd7
a92b086e9f954fb32a762fddbc9564ad
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional de la Universidad de Antioquia
repository.mail.fl_str_mv aplicacionbibliotecadigitalbiblioteca@udea.edu.co
_version_ 1851052155478212608
spelling López Lezama, Jesús M.Cortina, Juan J.Muñoz Galeano, NicolásGrupo de Manejo Eficiente de la Energía (GIMEL)2023-06-28T14:28:47Z2023-06-28T14:28:47Z20181313-6569https://hdl.handle.net/10495/3567610.12988/ces.2018.83991314-7641http://www.m-hikari.com/ces/ces2018/ces21-24-2018/p/lopezCES21-24-2018.pdfABSTRACT: This paper presents a comparison of different metaheuristic techniques applied to the assessment of power systems vulnerability to intentional attacks, also kwon as the electric grid interdiction problem. This problem is described through a bilevel formulation and comprises the interaction between a disruptive agent (attacker) and the power system operator (defender). The attacker is positioned in the upper level optimization problem and aims at finding the set of devices (lines, transformers and generators) that, once simultaneously attacked, would maximize the system load shedding. This problem is constrained by a limit on destructive resources and the response of the power system operator, located in the lower level optimization problem that reacts to the attack by modifying the generation dispatch aiming at minimizing the load shedding. The interdiction problem described in this paper is nonlinear and nonconvex; therefore, four different metaheuristic techniques are implemented and compared for its solution: Genetic Algorithm, GRASP, Iterated Local Search and Tabu Search. Results show that the Iterated Local Search adapts better to this problem obtaining the best rate between quality of solutions and computation time.COL001047720application/pdfengHikariRuse, Bulgariahttps://creativecommons.org/licenses/by/4.0/http://creativecommons.org/licenses/by/2.5/co/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Genetic algorithmsGRASP SystemGRASPIterated Local Search and Tabu Searchhttp://id.loc.gov/authorities/subjects/sh92002377http://id.loc.gov/authorities/subjects/sh85056504Assessment of power system vulnerability using metaheuristic techniquesArtículo de investigaciónhttp://purl.org/coar/resource_type/c_2df8fbb1https://purl.org/redcol/resource_type/ARThttp://purl.org/coar/version/c_970fb48d4fbd8a85info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionContemp. Eng. Sci.118424116511Contemporary Engineering SciencesPublicationORIGINALLopezJesus_2018_AssessmentPowerSystem.pdfLopezJesus_2018_AssessmentPowerSystem.pdfArtículo de investigaciónapplication/pdf923571https://bibliotecadigital.udea.edu.co/bitstreams/506aadce-ad8c-40f5-8383-c1c414b4118e/download36f0f00c3b94bd86642bba0ac9f2fd86MD51trueAnonymousREADCC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8927https://bibliotecadigital.udea.edu.co/bitstreams/b975ac86-e0e7-47da-9a42-46b93d3fcf2c/download1646d1f6b96dbbbc38035efc9239ac9cMD52falseAnonymousREADLICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://bibliotecadigital.udea.edu.co/bitstreams/39cacf65-39bb-4b8e-aa19-840fbbf0a895/download8a4605be74aa9ea9d79846c1fba20a33MD53falseAnonymousREADTEXTLopezJesus_2018_AssessmentPowerSystem.pdf.txtLopezJesus_2018_AssessmentPowerSystem.pdf.txtExtracted texttext/plain45261https://bibliotecadigital.udea.edu.co/bitstreams/1135371f-a8dc-420b-a2ff-b400426ddec7/download1bda311ef111cbdb7ad85117b7f9acd7MD56falseAnonymousREADTHUMBNAILLopezJesus_2018_AssessmentPowerSystem.pdf.jpgLopezJesus_2018_AssessmentPowerSystem.pdf.jpgGenerated Thumbnailimage/jpeg12447https://bibliotecadigital.udea.edu.co/bitstreams/4381e269-4964-4226-9a7e-b2e85edc48ae/downloada92b086e9f954fb32a762fddbc9564adMD57falseAnonymousREAD10495/35676oai:bibliotecadigital.udea.edu.co:10495/356762025-03-26 17:48:17.162https://creativecommons.org/licenses/by/4.0/open.accesshttps://bibliotecadigital.udea.edu.coRepositorio Institucional de la Universidad de Antioquiaaplicacionbibliotecadigitalbiblioteca@udea.edu.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