scispace - formally typeset
Search or ask a question
Author

Chen-Ching Liu

Bio: Chen-Ching Liu is an academic researcher from Virginia Tech. The author has contributed to research in topics: Electric power system & Electricity market. The author has an hindex of 57, co-authored 269 publications receiving 12126 citations. Previous affiliations of Chen-Ching Liu include Washington State University & Purdue University.


Papers
More filters
Proceedings ArticleDOI
15 Jul 2001
TL;DR: In this paper, the authors proposed new coherency identification techniques using the K-means algorithm for construction of dynamic equivalent models and numerical simulation results based on a NPCC 48-machine test system are presented to demonstrate the performance of the proposed method.
Abstract: In dynamic studies of large electric power systems, it is often necessary to reduce a large power network to a smaller equivalent system while keeping the dynamic characteristics of the full system model within the desired accuracy. This paper proposes new coherency identification techniques using the K-means algorithm for construction of dynamic equivalent models. Numerical simulation results based on a NPCC 48-machine test system are presented to demonstrate the performance of the proposed method.

16 citations

Journal ArticleDOI
TL;DR: In this paper, a negotiation methodology is developed to guide transmission investment for renewable energy (RE) integration, based on Nash bargaining theory, for the cost sharing and recovery of a new transmission line permitting delivery of RE to the grid.
Abstract: Major transmission projects are needed to integrate and to deliver renewable energy (RE) resources. Cost recovery is a serious impediment to transmission investment. A negotiation methodology is developed in this study to guide transmission investment for RE integration. Built on Nash bargaining theory, the methodology models a negotiation between an RE generation company and a transmission company for the cost sharing and recovery of a new transmission line permitting delivery of RE to the grid. Findings from a six-bus test case demonstrate the Pareto efficiency of the approach as well as its fairness, in that it is consistent with one commonly used definition of fairness in cooperative games, the Nash cooperative solution. Hence, the approach could potentially be used as a guideline for RE investors. The study also discusses the possibility of using RE subsidies to steer the negotiated solution towards a system-optimal transmission plan that maximizes total net benefits for all market participants. The findings suggest that RE subsidies can be effectively used to achieve system optimality when RE prices are fixed through bilateral contracts but have limited ability to achieve system optimality when RE prices are determined through locational marginal pricing. This limitation needs to be recognized in the design of RE subsidies.

16 citations

Journal ArticleDOI
09 Oct 2020
TL;DR: This paper presents a novel approach toward intrusion prevention, using a multi-agent system, at the distribution system level, and the results have validated the performance of the proposed method for protection against cyber intrusions at the Distribution system level.
Abstract: Integration of Information and Communications Technology (ICT) into the distribution system makes today’s power grid more remotely monitored and controlled than it has been. The fast increasing connectivity, however, also implies that the distribution grid today, or smart grid, is more vulnerable. Thus, research into intrusion/anomaly detection systems at the distribution level is in critical need. Current research on Intrusion Detection Systems for the power grid has been focused primarily on cyber security at the Supervisory Control And Data Acquisition, and single node levels with little attention on coordinated cyberattacks at multiple nodes. A holistic approach toward system-wide cyber security for distribution systems is yet to be developed. This paper presents a novel approach toward intrusion prevention, using a multi-agent system, at the distribution system level. Simulations of the method have been performed on the IEEE 13-Node Test Feeder, and the results compared to those obtained from existing methods. The results have validated the performance of the proposed method for protection against cyber intrusions at the distribution system level.

16 citations

Proceedings ArticleDOI
20 Jun 2016
TL;DR: A computational methodology for the evaluation of the IEEE reliability indices for distribution systems considering distribution system restoration is proposed and the goal is to determine the optimal switching sequences for the restoration process.
Abstract: This paper proposes a computational methodology for the evaluation of the IEEE reliability indices for distribution systems considering distribution system restoration. The goal of the proposed methodology is to move from a reliability assessment based on historical data to a computational approach. The developed tool allows the evaluation of the Service Restoration benefits, in terms of customers interruption duration in case of fault occurrences. Distribution System Restoration (DSR) is aimed at restoring loads after a fault by altering the topological structure of the distribution network while meeting electrical and operational constraints. The Spanning Tree Search algorithm is used to identify a post-outage topology that will restore the maximal amount of load with a minimal number of switching operations. The goal of the proposed tool is to determine the optimal switching sequences for the restoration process. The reliability indices incorporates contributions of all possible faults effects.

15 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Journal ArticleDOI
TL;DR: The Compact Muon Solenoid (CMS) detector at the Large Hadron Collider (LHC) at CERN as mentioned in this paper was designed to study proton-proton (and lead-lead) collisions at a centre-of-mass energy of 14 TeV (5.5 TeV nucleon-nucleon) and at luminosities up to 10(34)cm(-2)s(-1)
Abstract: The Compact Muon Solenoid (CMS) detector is described. The detector operates at the Large Hadron Collider (LHC) at CERN. It was conceived to study proton-proton (and lead-lead) collisions at a centre-of-mass energy of 14 TeV (5.5 TeV nucleon-nucleon) and at luminosities up to 10(34)cm(-2)s(-1) (10(27)cm(-2)s(-1)). At the core of the CMS detector sits a high-magnetic-field and large-bore superconducting solenoid surrounding an all-silicon pixel and strip tracker, a lead-tungstate scintillating-crystals electromagnetic calorimeter, and a brass-scintillator sampling hadron calorimeter. The iron yoke of the flux-return is instrumented with four stations of muon detectors covering most of the 4 pi solid angle. Forward sampling calorimeters extend the pseudo-rapidity coverage to high values (vertical bar eta vertical bar <= 5) assuring very good hermeticity. The overall dimensions of the CMS detector are a length of 21.6 m, a diameter of 14.6 m and a total weight of 12500 t.

5,193 citations

01 Jan 2003

3,093 citations

Journal ArticleDOI
TL;DR: In this paper, the authors survey the literature till 2011 on the enabling technologies for the Smart Grid and explore three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.
Abstract: The Smart Grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. In this article, we survey the literature till 2011 on the enabling technologies for the Smart Grid. We explore three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system. We also propose possible future directions in each system. colorred{Specifically, for the smart infrastructure system, we explore the smart energy subsystem, the smart information subsystem, and the smart communication subsystem.} For the smart management system, we explore various management objectives, such as improving energy efficiency, profiling demand, maximizing utility, reducing cost, and controlling emission. We also explore various management methods to achieve these objectives. For the smart protection system, we explore various failure protection mechanisms which improve the reliability of the Smart Grid, and explore the security and privacy issues in the Smart Grid.

2,433 citations

01 Jan 2012
TL;DR: This article surveys the literature till 2011 on the enabling technologies for the Smart Grid, and explores three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.

2,337 citations