anisii razvan eng.pdf

Upload: bogdan-neagu

Post on 03-Apr-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 Anisii Razvan eng.pdf

    1/9

    Electric Power Systems Research 80 (2010) 287295

    Contents lists available at ScienceDirect

    Electric Power Systems Research

    j o u r n a l h o m e p a g e : w w w . e l s e v i e r . c o m / l o c a t e / e p s r

    Generic reconfiguration for restoration

    David Kleppinger a,, Robert Broadwater a, Charlie Scirbona b

    a Department of Electrical and Computer Engineering, Virginia Tech, 1214 Univ. City Blvd, H-95 Blacksburg, VA 24060, USAb Distribution Engineering, Orange and Rockland Utilities, One Blue Hill Plaza, Pearl River, NY 10965, USA

    a r t i c l e i n f o

    Article history:

    Received 1 July 2009

    Received in revised form

    10 September 2009Accepted 14 September 2009

    Available online 27 October 2009

    Keywords:

    Reconfiguration

    Dependencies

    Graph Trace Analysis

    Priority

    a b s t r a c t

    This paper introduces and compares four algorithms by which reconfiguration for restoration of an arbi-

    trary number of interdependent critical infrastructure systems can be achieved. A method of modeling

    systems called Graph Trace Analysis is used to enable generic operation on various system types. The

    algorithms described are compared with each other and with prior work when run on a model of an

    actual electrical distribution system. The described algorithms are also run on an example model to

    demonstrate the ability to reconfigure interdependent infrastructure systems.

    2009 Elsevier B.V. All rights reserved.

    1. Introduction

    Modern society depends on a set of critical infrastructure sys-

    tems. These systems include electrical distribution, potable water,

    sewage, gas, and others. When a problem occurs in one of these

    systems, it can cause disruption of services not only in its system

    but also in other systems.

    In this paper loads are considered to be any device which

    requires service from a system. Based upon the mission of the sys-

    tem, some loads aremoreimportant than others, andthe mission of

    thesystem may change. Thus, theimportanceof a load maychange.

    Reconfiguration for restoration is the process whereby disruption

    in services to loads is responded to and the system or systems in

    question are altered to restore service to the loads.

    In all of these systems there are devices which can be operated

    to alter the system topology or even cut off entire sections of the

    system in order to isolate faults. These sectionalizing devices are

    the core of reconfiguration. In this paper all sectionalizing devicesthat are available for use, whether they be valves in fluid systems

    or breakers in electrical systems, will be referred to as switches.

    The goal of reconfiguration is to operate switches in order to

    arrive at a system state where service disruptions are minimized

    while adhering tosystem constraints.Also, basedupon thedesire to

    keep service flowing to certain loads, system operating constraints

    may change.

    Corresponding author.

    E-mail address: [email protected] (D. Kleppinger).

    Loads on a system are not of equal importance. Often there is a

    hierarchy of importance among system loads, and thus reconfigu-

    ration must take this prioritization into account when determining

    where to restore service. Priorities cancome from multiple sources.

    Utilities frequently maintain lists of critical customers which can

    be used to derive discrete priority assignments forindividual loads.

    In addition, some loads may have their priorities implied by the

    goals of the system, or its mission. For example, a warship not

    engaged in battle would consider its propulsion systems more

    important than its weapons systems, and load priorities would

    flow from that [1]. Furthermore the importance of a load may

    change based upon what the system is being asked to do, or its

    mission.

    Critical infrastructure systems are not independent of each

    other. Each has elements which depend on elements in another

    system. For example, water systems employ pumps. These pumps

    are often driven by electrical motors, which are loads on the elec-

    trical system. These intersystem dependencies must be consideredby reconfiguration.

    The work here considers a system of systems model. A disrup-

    tion in one system often results in a disruption in another system.

    For valid solutions these interdependencies must be considered.

    An electrical outage can result in an outage in the potable water

    system, and depending upon the length of the outage, the potable

    water system may need to be flushed for some period of time prior

    to using the water. In some systems electrical power equipment

    depends upon cooling water. If the cooling water suffers a disrup-

    tion, after some period of time the electrical equipment needs to

    be turned off or suffer failure due to overheating.

    0378-7796/$ see front matter 2009 Elsevier B.V. All rights reserved.

    doi:10.1016/j.epsr.2009.09.011

    http://www.sciencedirect.com/science/journal/03787796http://www.elsevier.com/locate/epsrmailto:[email protected]://localhost/var/www/apps/conversion/tmp/scratch_3/dx.doi.org/10.1016/j.epsr.2009.09.011http://localhost/var/www/apps/conversion/tmp/scratch_3/dx.doi.org/10.1016/j.epsr.2009.09.011mailto:[email protected]://www.elsevier.com/locate/epsrhttp://www.sciencedirect.com/science/journal/03787796
  • 7/28/2019 Anisii Razvan eng.pdf

    2/9

    288 D. Kleppinger et al. / Electric Power Systems Research 80 (2010) 287295

    1.1. Past work

    Previous reconfiguration solutions that address priority gener-

    ally restrict loads to vital and non-vital classes, with perhaps a

    third semi-vital class [24]. Such priority modeling, particularly

    in more complex systems, may not provide enough granular-

    ity in priority levels. For such systems a method that allows

    for an arbitrary number of priority levels is desirable. Further-

    more, the load priorities should be a function of the system

    mission(s). If the mission is to fight fire, one set of loads is

    needed, whereas if the mission is to fight flooding another set of

    loads is needed. The work here considers an arbitrary number of

    priority levels, where a loads priority level is a function of mis-

    sion.

    Previous reconfiguration solutions frequently rely on matrix-

    basedtechniquesfor modeling systems and checking for constraint

    violations [2,4,5]. This results in topology management with sparse

    matrices. Such solutions are difficult to distribute over multiple

    processors. Making changes to the model also proves problem-

    atic for such methods, as adding or deleting a component can

    force a substantial reformulation of the problem. The Cotree

    Switch method, one of four methods presented here is similar to

    the method described by Shirmohammadi and Hong, except the

    method consideredhere is notrestricted to weakly meshed systems[2,3,5,6].

    Other solutions attempt to solve the reconfiguration prob-

    lem with agent-based methods or evolutionary algorithms [811],

    which face significant problems of their own. Evolutionary algo-

    rithms sufferfrom longer solution times thanmore straightforward

    heuristic methods, and agent-based methods require the instal-

    lation of agents with equipment in the monitored systems,

    creating another infrastructure system on top of what already

    exists.

    Previous solutionsalso rely on simplifying thesystem, using lin-

    earized, aggregate models to estimate flows rather thanperforming

    full, non-linear flowcalculations on thesystem model or restricting

    themselves to radial systems [5,7,8]. Such simplifications limit the

    ability of the solution to accurately determine the state of a sys-tem following a disruption. The fact that infrastructure systems do

    not operate in a vacuum is also rarely taken into consideration, and

    very few solutions recognize or attempt to address the problem of

    system interdependencies.

    1.2. New algorithms

    This paper proposes and compares several reconfiguration

    algorithms. Thealgorithms proposed arebasedon a methodof ana-

    lyzing systems referred to as Graph Trace Analysis. Each algorithm

    allows for full load prioritization and handles system interdepen-

    dencies. Furthermore, the proposed algorithms are independent

    of the system type(s) such as electrical, gas, or fluid being ana-

    lyzed.

    2. Graph Trace Analysis

    Graph Trace Analysis (GTA) is a method of analyzing systems

    predicated on graphs [12]. GTA uses the concepts of graphs, sets

    generated by tracing through the graph, where traces are imple-

    mented with iterators, and set operators. The set operators used in

    GTA are for the most part the same as those used in the Object Con-

    straint Language (OCL) [12,13]. In a GTA model, each component

    in the system corresponds to an edge of a graph. Furthermore, the

    graph is thought of just in terms of edges. That is, it is an edge-edge

    graph, and nodes are not treated as separate entities, but become

    part of the edge itself.

    2.1. GTA notation

    The primary focus of GTA is on sets and sequences, which are

    collections of objects which are either unordered (sets) or ordered

    (sequences). For this reason, GTA notation is based on the Object

    Constraint Language; a language devised for the purpose of work-

    ing with sets and sequences [13]. Since OCL is non-destructive and

    not designed for writing algorithms, modifications were required

    in order to allow such actions as looping and assignment. While

    algorithms written with GTA notation do feature single-item vari-

    ables, the operators provided by GTA are primarily intended to

    make working with collections of items easy. Operators specific

    to sets and sequences and members of GTA sets, sequences, and

    complex data structures are accessed using the symbol. Sets are

    denoted by{ }andsequences by[ ].Partsof anexpression contained

    within parenthesis are executed before the rest of the expression.

    The most important operator in GTA is the collect() operator.

    collect() operates on a set or a sequence, and takes as an argument

    an expression that evaluates to true or false for each element of

    the set or sequence in question. collect( ) then returns a collection

    consisting of all elements of the collection on which collect( ) was

    called for which the given expression is true. If the collection on

    which collect( ) is called is a set, so is the output collection. If the

    collection on which collect( ) is calledis a sequence,then theoutputcollection is a sequence where each element is in the same order

    as in the input collection. For example, if sequence A = [1,2,3,4,5],

    then A collect(p|p% 2 == 1) would return [1,3,5], where % is the

    modulus operator. The collect( ) operator is a powerful tool in GTA

    for creating new sets and subsets of related objects, and is used

    extensively in the reconfiguration algorithms described in this dis-

    sertation.

    The subset of GTA operators used in this paper is described in

    Table 1. Columns a and b are the arguments used in the operation,

    the Operation column shows the name and syntax of the operation,

    the Resultcolumnshowsthe data type of theresult of theoperation,

    and the Effectcolumn describes what the operation does.

    2.2. GTA models and traces

    In a GTAmodel, each componenthas oneand only onereference

    source, which is the source in the system which defines the com-

    ponents trace relationships. A source is a component which can

    provide service (electricity, water, gas, etc.) to a system. Though

    multiple sources can feed any given component, only one of those

    sources can be its reference source. The combination of the refer-

    ence sourceandthe graphtopologydefines a setof iteratorsforeach

    component:forward, backward, feeder path,brother, and adjacent.

    The forward and backward traces are used to trace through

    every component with the same reference source once and only

    once. The component in the forward trace from the current com-

    ponent will receive flow from the current component, originating

    with its reference source, if that component is not the brother ofthe current component. The brother represents the first compo-

    nent in the forward trace of the current component not fed by the

    current component. Thus, once all components fed by the current

    component are included in the forward trace, the next component

    in theforward trace is thecurrent components brother. In this way,

    all components fed by the current component will be found in the

    forward trace before any components not fed by it. The backward

    trace is simply the reverse of the forward trace.

    The feeder path trace for a given component gives the compo-

    nent which immediately feeds the given component. The feeder

    path trace is functionally complete, in that all other traces can be

    derived from it [12].

    The adjacent trace gives a component physically connected to

    the current component but which may not have the same refer-

  • 7/28/2019 Anisii Razvan eng.pdf

    3/9

    D. Kleppinger et al. / Electric Power Systems Research 80 (2010) 287295 289

    Table 1

    GTA operators.

    a b Operation Result Effect

    set or seq a size int The number of elements in a

    set or seq expr a collect(p|b) set or seq Returns all elements p in a for which b is true

    set or seq expr a order(b) seq Orders a such that its elements are in increasing order

    according to b. If a is a set, order makes it a seq

    set or seq any a includes(b) bool Returns whether b is an element of a

    set or seq expr a exists(b) bool Returns whether there is an element of a for which b is true

    set or seq expr a forall(b) bool Returns whether b is true for all elements of aset or seq expr a sum(b) any Returns the sum of the expression b as applied to each

    element of a. Requires that + be defined for the elements of

    a.

    any any a b set Returns a set that is the union of a and b

    any any a = b Assigns b to a

    any any a == b bool Returns whether a and b are equivalent

    any any a < b bool Returns whether a is less than b. Works for any pair of data

    types for which < is defined

    any any a > b bool Returns whether a is greater than b. Works for any pair of

    data types for which > is defined

    any any a b, a b bool As > and

  • 7/28/2019 Anisii Razvan eng.pdf

    4/9

    290 D. Kleppinger et al. / Electric Power Systems Research 80 (2010) 287295

    Fig. 3. AND and OR dependencies.

    Fig. 4. Component status definitions.

    c = capacity, or rating of a component,

    f = flow, where f c,

    freq = required flow if type == LOAD,

    ft, fpt, bt, brt, adjt = components related to C via forward, feeder

    path, backward, brother, and adjacent trace, respectively, where a

    value of 0 implies the component does not exist,

    AD = set of AND dependency components,

    OD = set of OR dependency components,

    pri = component priority,

    status = status of component-ON, OFF, FAILED,

    statusdep = status of components dependencies,

    operable = whether the component can be turned on or off YES,

    NO.

    Fig. 3 shows two situations with AND and OR dependencies.

    In Fig. 3.1, component a has AND dependencies on components b

    and c. If either component b or component c is unrestored, then

    component asdependencies are unsatisfied. By contrast, in Fig. 3.2

    component d has OR dependencies on components e and f. In Fig.

    3.2, component ds dependencies are satisfied as long as either or

    both of components e and f are restored.

    A component is considered restored (status is ON) if its depen-dencies are satisfied and all components in its feeder path are

    restored. A components dependencies are satisfied if all AND

    dependencies are restored and at least one OR dependency is

    restored. Fig. 4 illustrates GTA notation for a component with a

    status of ON where dependencies are satisfied.

    Finally, a switch component can be marked as operable or non-

    operable. For non-switch components, C operable is set to NO.

    Using this component structure in conjunction with GTA traces

    and GTA notation, it becomes easy to work with the system model.

    For example, if one wanted to find the set of operable switches in a

    component ps feeder path, that could be done using the statement

    FPTp collect(c|c type ==SWITCH AND c operable == YES).A

    system S is a collection of components such that for each compo-

    nent C S, Cs forward, backward,feeder path, brother, and adjacent

    trace are also contained in S.

    CjSj,Sj includes(Cj

    ft,Cj bt,Cj fpt,

    Cj brt,Cj adjt) (1)

    Two more subsets of components, the sources R and loads L are

    defined.

    R= UjSj collect(p|p type == SOURCE) (2)

    L= UjSj collect(p|p type == LOAD) (3)

    Reconfiguration is then performed on a set of systems W. The

    objective of reconfiguration is to maximize the amount of load

    restored, weighted by the priority of the loads as follows:

    g = max{L sum((p pri) (1/(1 + |p freq p f|)

    (p statusdep) (p status))} (4)

    In (4), a higherpriorityresults in a higher value fora loadsterm.

    The flow on the load being closer to its required flow also results

    in a higher value for that term. Finally, if the loads dependencies

    are not satisfied or if it is not restored, the term drops out of the

    function completely.

    The reconfiguration solution is subject to the constraint that nocomponent in any system has a flow greater than its capacity:

    SW,S collect(p|p f p c) size == 0 (5)

    3. GTA-based reconfiguration algorithms

    In this section, four algorithms to reconfigure a set of priori-

    tized interdependent systems are presented. The first three start

    with a model of the system(s) that has no switches turned on,

    while the latter starts with a model of the system(s) that has all

    switches turned on. Each algorithm is capable of responding dif-

    ferently to a system than the others. The From Load and Hybrid

    algorithms are well-suited for highly prioritized systems due to

    the way they apply greater importance to load priorities when

    determining which switches to operate. From Sources and Hybrid

    balance load among the system sources better than the other

    algorithms because of the incremental way in which they restore

    service tothe system. TheCotree Switchalgorithmtendsto befaster

    on larger systems where most switches are normally on, due to

    the fact that it starts by turning on all switches rather than turn-

    ing them off. Note that in an electrical system a switch is on

    when it is closed and in a fluid system a switch is on when it

    is open.

    3.1. From Loads algorithm

    The From Loads Algorithm seeks to restore service by starting

    at the loads and closing switches back towards the sources in an

    attempt to find a valid restoration path for each load.From Loads initiallyturns offall switches,the loadsare sortedby

    priority and such that all loads not in another components depen-

    dency list occur before any loads that are in another components

    dependency list. This prevents the algorithm from restoring a sup-

    porting load which received a high priority from a critical load

    before a lower priority critical load if that high priority critical load

    is unrestorable. A components dependency list is the list of com-

    ponents in C AD and C OD. Restoration of each load is then

    attempted in this order.

  • 7/28/2019 Anisii Razvan eng.pdf

    5/9

    D. Kleppinger et al. / Electric Power Systems Research 80 (2010) 287295 291

    For each load, the algorithm collects a set of components via

    which the load could be connected to a source. That is, the feeder

    path traces from these components will lead to sources that could

    potentially supply service to the load. These components include

    the feeder path trace of the load, as well as any components with

    the same reference source as the load that have an adjacent trace.

    Let these components be placed in the set RestorePathsl, where l is

    the load of interest.

    For each component in RestorePathsl, starting with the loads

    feeder path trace, the algorithm creates a set Path l. If the compo-

    nent c of RestorePathsl being examined is the loads feeder path

    trace, then Pathl consists of the load l followed by ls feeder path.

    Otherwise, Pathl consists of the load l, followed by the components

    connecting l and c, then c adjt, and finally c adjts feeder path.

    Once Pathl is created, the algorithmchecksif there areany com-

    ponents with status== FAILED on that path. If so, the path is not

    valid. Otherwise, the algorithm collects a set of decision points

    along the path. Decision points are components which must have

    some processing performed on them during restoration. They are

    switches and components which have dependencies (AD or OD is

    not empty).

    (7)

    The decision points are ordered by increasing distance from the

    load being restored, and the algorithm addresses each one in turn,

    by operating switches or by recursively restoring components to

    satisfy dependencies.

    If a load is restored, system constraints are checked for the

    components that have been affected by the restoration. If any con-

    straints are violated, the algorithm backs up the decision points list

    and selects the next p from Pathl to try. If all paths are exhausted,

    the load is deemed unrestorable and the algorithm moves on to

    the next load until all loads have either been restored or deemed

    unrestorable.

    3.2. From Sources algorithm

    The From Sources algorithm approaches restoration from the

    opposite end of the system than the From Loads method. Rather

    thanoperatingswitchesand satisfyingdependencies whiletravers-

    ing from the load towards a source, this algorithm starts at the

    sources andworkstowards theloads. This algorithmhas thepoten-

    tial for resulting in a more even distribution of loading among the

    sources.

    From Sources utilizes a working priority. The working priority

    is initially set to the highest priority present in the model, and the

    algorithm focuses on restoring Loads with a priority at least equal

    to the working priority. As Loads are restored, the working priorityis gradually reduced.

    The first step of From Sources is to turn off all switches. Next

    priorities are propagated from the loads back to the sources. For

    each component in a loads feeder path, that components prior-

    ity is set to the maximum of its own priority and that of the load.

    In addition, if that component has any dependencies, the compo-

    nents priority is recursively propagated down that dependencys

    feeder path. The algorithm then iteratively turns on switches for

    each source to expand the system area receiving service from that

    source. To decide which device to turn on, the algorithm first col-

    lects allof each sources bounding switches.The bounding switches

    of a source are those switches that have a status of OFF such that

    if they were turned ON, service would be provided to a segment of

    the system which is currently unserviced. The bounding switch set

    for a source is given by

    (8)

    The algorithm then turns on one of these bounding switches

    with the highest priority. A number of checks are then performed

    on thesystem segment with restored service. These checks prevent

    the algorithm from violating system constraints and also help to

    minimize the number of low-priority loadsrestored. Violations that

    could occur include:

    Flow constraint violations. New segment contains a failed component.

    If anycheck fails,the switchis turnedback offand thealgorithm

    continues through the bounding switch list until it is exhausted or

    a valid switch is found.A load is considered resolved once the algorithm has attempted

    to restore service to its segment by turning on a switch, whether

    or not it was successfully restored. Later operations may restore a

    load that is initially not restorable.

    Once a switch has been turned on or the algorithm determines

    there areno possible onswitchoperations, anaccounting is made of

    the resolved loads. If all loads with priority greater than or equal to

    the working priority have been resolved, the working priority is set

    to the next lowest priority and the algorithm repeats the described

    steps (exceptfor theprioritypropagation step) until either allloads

    are restored or no switches can be successfully turned on.

    3.3. Hybrid algorithm

    The Hybrid algorithm combines aspects of the From Sources

    and From Loads algorithms. Like the From Sources algorithm, it

    approaches the problem from the sources, turning on switches as

    it spreads towards the loads. Unlike the From Sources method, the

    operable devices are limited accordingto thosewhich couldbe used

    to restore the unresolved loads of the current highest priority.

    After all switches are turned off and priorities have been propa-

    gated(as in From Sources),the algorithmcreatesthe setof potential

    feeder paths for each load of the current highest priority as in the

    From Loads method. Each switch along those paths is marked as

    operable. The algorithm then proceeds as it does in From Sources,

    exceptthatit does notattemptto turn on anydevices notmarked as

    operable. When all of the loads have been evaluated for the current

    priority level, the algorithm marks the devices on potential feederpaths to loads of the next highest priority as operable.

    In this way, by restoring service to the system starting from the

    sources butonlyallowingoperation of devices that could feed loads

    of highest priority at a given time, the Hybrid method keeps the

    forced balance of the From Sources method while further minimiz-

    ingthe numberof low-priorityloads restoredat theexpense of high

    priority loads.

    3.4. Cotree Switch algorithm

    The Cotree Switch method attempts to minimize the number

    of operations which must be performed in order to successfully

    reconfigure the system(s). Unlike the other algorithms, it starts by

    turning on all switches. Priorities are propagated from the loads as

  • 7/28/2019 Anisii Razvan eng.pdf

    6/9

    292 D. Kleppinger et al. / Electric Power Systems Research 80 (2010) 287295

    Fig. 5. First test system electrical only.

    Table 2

    Algorithm performance comparison in time.

    Time Fro m Lo ads Fr om So urces Hybr id Co tr ee S witch DAOP

    1 Stage 7.3s 12.7s 20.4s 8.4s 335s

    2 Stages 14.2s 14.4s 44.2s 16.6s

    Table 3

    Algorithm performance comparison in loads serviced.

    Amount serviced FromLoads

    FromSources

    Hybrid CotreeSwitch

    DAOP

    1 Stage 98.7% 98.5% 98.7% 98.7% 86.1%

    2 Stages 98.7% 98.7% 98.7% 98.6%

    in From Sources, and then any failed components in the system are

    isolated by turning off switches.

    A flow constraint check is then performed. If there are flow con-

    straint violations, they are sorted by increasing priority. For each

    violation, the algorithm collects all components feeding and fed by

    the violation into a set FullPathviol. FullPathviol is then searched for

    theturned-on switchwith thelowest priority.Thatswitch is turned

    off, priorities are repropagated, and the flow constraint check is

    performed again. Because turning switches off drops loads, this

    graduallyreduces theflow on thesystem andthus eliminates viola-

    tions. This is repeated until there are no flow constraint violations.

    (9)

    Table 4

    Algorithm performance comparison in mean phase imbalance across sources.

    Mean phase imbalance From Loads From Sources Hybrid Cotree Switch DAOP

    1 Stage 21.57% 18.29% 16.57% 13.86% 17.29%

    2 Stages 19% 18.86% 16.86% 11.42%

    Fig. 6. Second test system electrical and fluid, with dependencies and missions.

  • 7/28/2019 Anisii Razvan eng.pdf

    7/9

    D. Kleppinger et al. / Electric Power Systems Research 80 (2010) 287295 293

    Once all violations have been eliminated, the algorithm collects

    all of the Cotrees in the system(s). Cotrees are switches which are

    turned on and create independent loops in the system.

    CotreesS = S collect(p type == SWITCH AND p

    status == ON AND p adjt status == ON) (10)

    Foreach Cotree, thealgorithm creates a setof theswitchesalongthe feeder path of the Cotree device and its adjacent trace. These

    devices are then sorted by flow, and the one with the least flow is

    turned off. A flow constraint check is performed, and if there is a

    violation, the switch is turned back on. The algorithm terminates

    once each Cotree has been addressed in this manner.

    4. Performance examples

    4.1. Example 1: Real-world electrical model

    To examine the performance of these algorithms, an implemen-

    tation of each was run on a model of a real distribution system and

    compared to an implementation of the Discrete Ascent Optimal

    Programming (DAOP) algorithm described by McDermott et al. [6].

    Tests were performed using a 2.00GHz Intel Pentium M processor.

    The model used in testing is shown in Fig. 5. It contained 1835

    load points and seven sources. Parameters such as equipment

    impedances,admittances, seasonal ratings, and customer priorities

    were provided by the utility in a relational database. Constraints

    considered by reconfiguration were seasonal overload ratings and

    Fig. 7. (a) From Loads result, (b) From Sources and Hybrid result, and (c) Cotree Switch result.

  • 7/28/2019 Anisii Razvan eng.pdf

    8/9

    294 D. Kleppinger et al. / Electric Power Systems Research 80 (2010) 287295

    Fig. 7. (Continued)

    customer voltage levels. Constraint checks were performed using a

    full non-linear power flow algorithm. The radial power flow algo-

    rithm used relies on forward and backward sweeps (the forward

    andbackwardtraces describedin this paper)thatare repeated until

    a convergence criterion is met [14,15].

    The yellow components in Fig. 5 indicate components which

    have failed, dropping 234 loads. Switching operations were

    restricted to three-phase devices, of which there were 171. Each

    algorithm (except for DAOP, which did not provide this capability)

    was run in both one and two stages. In the two-stage runs, the first

    stage only allowed operation of major, automatic 3-phase devices,while the second stage allowed operation of all 3-phase devices.

    In the runs with the DAOP algorithm all 3-phase switches were

    operable.

    Tables 24 show the results of the runs. All of the algorithms

    proposed in this paper were able to run in under 21s in the single-

    stage runs and under 45 s in the two-stage runs, configuring the

    systemto provide service to no less than 98.5%of the load points. In

    comparison, the DAOP algorithm took over five and a half minutes

    to run, and was only able to provide service to 86.1% of load points.

    Finally, Table 4 shows mean phase imbalance across the loads

    in the system. By this measurement, DAOP falls in the middle of

    the field, with the Hybrid and Cotree Switch algorithms producing

    smaller phase imbalances and the From Loads and From Sources

    methods providing larger ones.

    4.2. Example 2: Sample integrated model

    The proposed methods were also run in one stage on the system

    shown in Fig. 6. This system contains both electrical and fluid cir-

    cuits,as well as a number of logical loads defining systemmissions.

    Missions are represented by the red squares and are dependent on

    loads in the electrical and fluid systems. The fluid system is repre-

    sented bythe green lines and the electrical system bythe black and

    brown ones. The yellow line represents a component which has

    failed. The missions AAW (Anti-Air Weapon, priority 5) and ASW

    (Anti-Surface Weapon, priority 3) have OR dependencies on Radar

    2, Gun, and Radar 1, each of which have at least one AND depen-

    dency on one or more of the physical circuits. The three propulsion

    missions (from left to right, priorities 9, 2, and 6) have AND depen-

    dencies on electrical loads, and the two pumps in the fluid circuits

    each have an AND dependency on an electrical load. There are five

    independent electrical loads (those on which no mission is depen-

    dent) with priorities of 9, 0, 0, 0, and 0. A number of the loads are

    grouped into 2 panels fed by automatic transfer switches.

    Fig. 7ad shows the results of running the proposed methods

    on the system in Fig. 6 if the line feeding the right panel is failed.

    Components which have become pink have lost service. Notable

    differences between the solutions are circled in bright green. The

    From Sources and Hybrid methods yielded the same result. Bothof them restore all loads except for the large priority 0 load on the

    lower right of the left panel. The From Loads algorithm does not

    restore Radar 2, because doing so was unnecessary to restore AAW.

    The result of ignoring the loads supporting Radar 2 is that the large

    load on the left panel was restorable. Finally, the Cotree Switch

    method manages to restore all loads, but only does so by creating a

    loop in the electrical system. The Cotree Switch method is the only

    method which can create loops in this way.

    5. Conclusions

    This paper has proposed four algorithms for the reconfiguration

    of interdependent critical infrastructure systems based on Graph

    Trace Analysis. Allowances are made for arbitrary levels of priorityon system loads. The generic nature of Graph Trace Analysis allows

    for the simultaneous analysis of multiple system types and their

    interdependencies.

    Testing shows that these algorithms are capable of reconfig-

    uring systems with multiple interdependent infrastructure types.

    Also demonstrated is that the proposed algorithms can find solu-

    tions with balanced loading in short periods of time on real-world

    systems.

    Acknowledgements

    The authors gratefully acknowledge support provided by the

    US Army, the Office of Naval Research, and Orange and Rockland

    electric utility.

  • 7/28/2019 Anisii Razvan eng.pdf

    9/9

    D. Kleppinger et al. / Electric Power Systems Research 80 (2010) 287295 295

    References

    [1] D.L. Kleppinger, K.J. Russell, R.P. Broadwater, Graph Trace Analysis based ship-board HM&E system priority management and recovery analysis, in: IEEEElectric Ship Technologies Symposium, May, 2007, pp. 109114.

    [2] K.L. Butler-Purry, N.D.R. Sarma, I.V. Hicks, Service restoration in naval ship-board power systems, IEEE Transactions on Power Systems 16 (November (4))(2001).

    [3] Z. Ding, S.K. Srivastava, D.A. Cartes, S. Suryanarayanan, Dynamic simulationbased analysis of a new load shedding scheme for a notional destroyer classshipboard power system, in: IEEEElectricShip TechnologiesSymposium 2007,

    Arlington, Virginia, May 2123, 2007.[4] S. Khushalani, J. Solanki, N. Shulz, Optimized restoration of combined AC/DC

    shipboard power systems includingdistributed generation and islandingtech-niques, Electric Power Systems Research 78 (2008) 15281536.

    [5] E.E.Lee II, J.E.Mitchell, W.A.Wallace,Restorationof servicesin interdependentinfrastructure systems: a network flows approach systems, IEEE Transactionson Man, and Cybernetics, Part C: Applications and Reviews 37 (November (6))(2007).

    [6] T.E. McDermott, I. Drezga, R.P. Broadwater, A heuristic nonlinear constructivemethod for distribution system reconfiguration, IEEE Transactions on PowerSystems 14 (May (2)) (1999).

    [7] D. Shirmohammadi, H.W. Hong, Reconfiguration of electric distribution forresistive line loss reduction, IEEE Transactions on Power Delivery 4 (April (2))(1989).

    [8] W.M.Lin, H.C.Chin, A new approach for distribution feeder reconfigurationforloss reductionand service restoration, IEEETransactions on Power Delivery 13(July (3)) (1998) 870875;A.Augugliaro,L. Dusonchet, E.Riva Sanseverino, Servicerestorationin compen-sated distribution networks using a hybrid genetic algorithm, Electric PowerSystems Research 46 (1998) 5966.

    [9] D. Zhang, Z. Fu, L. Zhang, An improved TS algorithm for loss-minimizationreconfiguration in large-scale distribution systems, Electric Power SystemsResearch 77 (2007) 685694.

    [10] C.T. Su, C.F. Chang, J.P. Chiou, Distribution network reconfiguration for lossreduction by ant colony search algorithm, Electric Power Systems Research

    75 (2005) 190199.[11] K. Huang, S.K. Srivastava, D.A. Cartes, L.H. Sun, Market-based multiagent sys-

    tem for reconfiguration of shipboard power systems, Electric Power SystemsResearch 79 (2009) 550556.

    [12] L.R. Feinauer, K.J. Russell, R. Broadwater, Graph Trace Analysis and GenericAlgorithmsfor interdependent reconfigurable systemdesign and control,NavalEngineers Journal 120 (March (1)) (2008).

    [13] J.B. Warmer, A.G. Kleppe, The Object Constraint Language: Precise ModelingWith UML, Addison-Wesley, Reading, MA, 1999.

    [14] W.H. Kersting, D.L. Mendive, An application of ladder network theory to thesolution of three-phaseradial load-flowproblems, in: Proc. IEEEWinter PowerMeeting, New York, NY, January, 1976.

    [15] F. Li, R. Broadwater, Software framework concepts for power distribution sys-tem analysis, IEEE Transactions on Power System 19 (May) (2004) 948956.