•Development of a centralized occupancy-based Buildings-to-grid Model Predictive Control (MPC) framework.•Simulation on building clusters and standard IEEE grid systems.•Findings show 50–61% cost ...reduction for BtG integration.
Buildings-to-grid (BtG) integration simulations are becoming prevalent due to the development of smart buildings and smart grid. Buildings are the major energy consumers of the total electricity production worldwide. There is an urgent need to integrate buildings with smart grid operation to accommodate the needs of flexible load controls due to the increasing of renewable energy resources. In the imminent future, smart buildings can contribute to grid stability by changing their overall demand patterns in response to grid operations. Meanwhile, building thermal energy consumption is also maintained by building operators to satisfy occupants’ thermal comforts. However, explicit large-scale demonstrations based on a simulation platform that integrates building occupancy, building physics, and grid physics at community level have not been explored. This study develops an occupancy behavior driven BtG optimization platform that can simulate, predict and optimize indoor temperature and energy consumption of buildings, generator setpoint and deviation while maintaining acceptable grid frequency. Authors have tested the framework on two standard power networks. The results show that the integrated framework can provide potential cost savings up to 60% comparing with the decoupled operation.
This paper introduces novel schemes for indoor localization, outlier detection, and radio map interpolation using wireless local area networks. The localization method consists of a novel ...multicomponent optimization technique that minimizes the squared ℓ 2 -norm of the residuals between the radio map and the online received signal strength (RSS) measurements, the ℓ 1 -norm of the user's location vector, and weighted ℓ 2 -norms of layered groups of reference points (RPs). RPs are grouped using a new criterion based on the similarity between the so-called access point (AP) coverage vectors. In addition, since AP readings are prone to containing inordinate readings, called outliers, an augmented optimization problem is proposed to detect the outliers and localize the user with cleaned online measurements. Moreover, a novel scheme to record fingerprints from a smaller number of RPs and estimate the radio map at RPs without recorded fingerprints is developed using sparse recovery techniques. All localization schemes are tested on RSS fingerprints collected from a real environment. The overall scheme has comparable complexity with competing approaches, while it performs with high accuracy under a small number of APs and finer granularity of RPs.
Utilization of digital connectivity tools is the driving force behind the transformation of the power distribution system into a smart grid. This paper places itself in the smart grid domain where ...consumers exploit digital connectivity to form partitions within the grid. Every partition, which is independent but connected to the grid, has a set of goals associated with the consumption of electric energy. In this work, we consider that each partition aims at morphing the initial anticipated partition consumption in order to concurrently minimize the cost of consumption and ensure the privacy of its consumers. These goals are formulated as two objectives functions, i.e., a single objective for each goal, and subsequently determining a multi-objective problem. The solution to the problem is sought via an evolutionary algorithm, and more specifically, the non-dominated sorting genetic algorithm-II (NSGA-II). NSGA-II is able to locate an optimal solution by utilizing the Pareto optimality theory. The proposed load morphing methodology is tested on a set of real-world smart meter data put together to comprise partitions of various numbers of consumers. Results demonstrate the efficiency of the proposed morphing methodology as a mechanism to attain low cost and privacy for the overall grid partition.
The theme of this paper is three-phase distribution system modeling suitable for the Z-Bus load-flow. Detailed models of wye and delta constant-power, constant-current, and constant-impedance loads ...are presented. Models of transmission lines, step-voltage regulators, and transformers that build the bus admittance matrix (Y-Bus) are laid out. The Z-Bus load-flow is then reviewed and the singularity of the Y-Bus in case of certain transformer connections is rigorously discussed. Based on realistic assumptions and conventional modifications, the invertibility of the Y-Bus is proved. Last but not least, MATLAB scripts that model the components of the IEEE 37-bus, the IEEE 123-bus, the 8500-node feeders, and the European 906-bus low-voltage feeder are provided.
This paper introduces a dynamic network model together with a phasor measurement unit (PMU) measurement model suitable for power system state estimation under spoofing attacks on the global ...positioning system (GPS) receivers of PMUs. The spoofing attacks may introduce time-varying phase offsets in the affected PMU measurements. An algorithm is developed to jointly estimate the state of the network, which amounts to the nodal voltages in rectangular coordinates, as well as the time-varying attacks. The algorithm features closed-form updates. The effectiveness of the algorithm is verified on the standard IEEE transmission networks. It is numerically shown that the estimation performance is improved when the dynamic network model is accounted for compared with a previously reported static approach.
Global Navigation Satellite System (GNSS) receivers are vulnerable to intentional spoofing attacks which can manipulate position, velocity, and time (PVT) measurements. Previous work has demonstrated ...that Time Synchronization Attacks (TSAs) can be detected and mitigated using sparse optimization techniques which reveal spoofers' presence in inflicted signals' derivative domains. Aiming to provide an efficient protection algorithm against spoofing, this paper expands the scope of the sparse signal processing framework to address more complicated attacks for stationary and low-dynamic receivers. In particular, TSAs against stationary receivers should be addressed differently if the position and velocity are manipulated by the spoofer at the same time. A new sparse processing method is presented employing a novel linearization of the measurement equation that includes attacks against time, position, and velocity. The method is assessed against both authentically and synthetically spoofed signals to verify its robustness in two test beds: 1) a lab-based software defined GPS receiver; and 2) a commercial hand-held device.
A cross-layer design along with an optimal resource allocation framework is formulated for wireless fading networks, where the nodes are allowed to perform network coding. The aim is to jointly ...optimize end-to-end transport-layer rates, network code design variables, broadcast link flows, link capacities, average power consumption, and short-term power allocation policies. As in the routing paradigm where nodes simply forward packets, the cross-layer optimization problem with network coding is nonconvex in general. It is proved, however, that with network coding, dual decomposition for multicast is optimal so long as the fading at each wireless link is a continuous random variable. This lends itself to provably convergent subgradient algorithms, which not only admit a layered-architecture interpretation, but also optimally integrate network coding in the protocol stack. The dual algorithm is also paired with a scheme that yields near-optimal network design variables, namely multicast end-to-end rates, network code design quantities, flows over the broadcast links, link capacities, and average power consumption. Finally, an asynchronous subgradient method is developed, whereby the dual updates at the physical layer can be affordably performed with a certain delay with respect to the resource allocation tasks in upper layers. This attractive feature is motivated by the complexity of the physical-layer subproblem and is an adaptation of the subgradient method suitable for network control.
Recent studies by electric utility companies indicate that maximum benefits of distributed solar photovoltaic (PV) units can be reaped when siting and sizing of PV systems is optimized. This paper ...develops a two-stage stochastic program that serves as a tool for optimally determining the placing and sizing of PV units in distribution systems. The PV model incorporates the mapping from solar irradiance to AC power injection. By modeling the uncertainty of solar irradiance and loads by a finite set of scenarios, the goal is to achieve minimum installation and network operation costs while satisfying necessary operational constraints. First-stage decisions are scenario-independent and include binary variables that represent the existence of PV units, the area of the PV panel, and the apparent power capability of the inverter. Second-stage decisions are scenario-dependent and entail reactive power support from PV inverters, real and reactive power flows, and nodal voltages. Optimization constraints account for inverter’s capacity, PV module area limits, the power flow equations, as well as voltage regulation. A comparison between two designs, one where the DC:AC ratio is pre-specified, and the other where the maximum DC:AC ratio is specified based on historical data, is carried out. It turns out that the latter design reduces costs and allows further reduction of the panel area. The applicability and efficiency of the proposed formulation are numerically demonstrated on the IEEE 34-node feeder, while the output power of PV systems is modeled using the publicly available PVWatts software developed by the National Renewable Energy Laboratory. The overall framework developed in this paper can guide electric utility companies in identifying optimal locations for PV placement and sizing, assist with targeting customers with appropriate incentives, and encourage solar adoption.
This paper develops a power management scheme that jointly optimizes the real power consumption of programmable loads and reactive power outputs of photovoltaic (PV) inverters in distribution ...networks. The premise is to determine the optimal demand response schedule that accounts for the stochastic availability of solar power, as well as to control the reactive power generation or consumption of PV inverters adaptively to the real power injections of all PV units. These uncertain real power injections by PV units are modeled as random variables taking values from a finite number of possible scenarios. Through the use of second order cone relaxation of the power flow equations, a convex stochastic program is formulated. The objectives are to minimize the negative user utility, cost of power provision, and thermal losses, while constraining voltages to remain within specified levels. To find the global optimum point, a decentralized algorithm is developed via the alternating direction method of multipliers that results in closed-form updates per node and per scenario, rendering it suitable to implement in distribution networks with a large number of scenarios. Numerical tests and comparisons with an alternative deterministic approach are provided for typical residential distribution networks that confirm the efficiency of the algorithm.
Wireless local area networks (WLANs) have become a promising choice for indoor positioning as the only existing and established infrastructure, to localize the mobile and stationary users indoors. ...However, since WLANs have been initially designed for wireless networking and not positioning, the localization task based on WLAN signals has several challenges. Amongst the WLAN positioning methods, WLAN fingerprinting localization has recently garnered great attention due to its promising performance. Notwithstanding, WLAN fingerprinting faces several challenges and hence, in this paper, our goal is to overview these challenges and corresponding state-of-the-art solutions. This paper consists of three main parts: 1) conventional localization schemes; 2) state-of-the-art approaches; and 3) practical deployment challenges. Since all proposed methods in the WLAN literature have been conducted and tested in different settings, the reported results are not readily comparable. So, we compare some of the representative localization schemes in a single real environment and assess their localization accuracy, positioning error statistics, and complexity. Our results depict illustrative evaluation of the approaches in the literature and guide to future improvement opportunities.