scispace - formally typeset
BookDOI

Power System State Estimation : Theory and Implementation

Reads0
Chats0
TLDR
In this paper, Peters and Wilkinson this paper proposed a WLS state estimation algorithm based on the Nodal Variable Formulation (NVF) and the Branch Variable Factorization (BVF).
Abstract
Preface INTRODUCTION Operating States of a Power System Power System Security Analysis State Estimation Summary WEIGHTED LEAST SQUARES STATE ESTIMATION Introduction Component Modeling and Assumptions Building the Network Model Maximum Likelihood Estimation Measurement Model and Assumptions WLS State Estimation Algorithm Decoupled Formulation of the WLS State Estimation DC State Estimation Model Problems References ALTERNATIVE FORMULATIONS OF THE WLS STATE ESTIMATION Weaknesses of the Normal Equations Formulation Orthogonal Factorization Hybrid Method Method of Peters and Wilkinson Equality-Constrained WLS State Estimation Augmented Matrix Approach Blocked Formulation Comparison of Techniques Problems References NETWORK OBSERVABILITY ANALYSIS Networks and Graphs NetworkMatrices LoopEquations Methods of Observability Analysis Numerical Method Based on the Branch Variable Formulation Numerical Method Based on the Nodal Variable Formulation Topological Observability Analysis Method Determination of Critical Measurements Measurement Design Summary Problems References BAD DATA DETECTION AND IDENTIFICATION Properties of Measurement Residuals Classification of Measurements Bad Data Detection and IdentiRability Bad Data Detection Properties of Normalized Residuals Bad Data Identification Largest Normalized Residual Test Hypothesis Testing Identification (HTI) Summary Problems References ROBUST STATE ESTIMATION Introduction Robustness and Breakdown Points Outliers and Leverage Points M-Estimators Least Absolute Value (LAV) Estimation Discussion Problems References NETWORK PARAMETER ESTIMATION Introduction Influence of Parameter Errors on State Estimation Results Identification of Suspicious Parameters Classification of Parameter Estimation Methods Parameter Estimation Based on Residua! Sensitivity Analysis Parameter Estimation Based on State Vector Augmentation Parameter Estimation Based on Historical Series of Data Transformer Tap Estimation Observability of Network Parameters Discussion Problems References TOPOLOGY ERROR PROCESSING Introduction Types of Topology Errors Detection of Topology Errors Classification of Methods for Topology Error Analysis Preliminary Topology Validation Branch Status Errors Substation Configuration Errors Substation Graph and Reduced Model Implicit Substation Model: State and Status Estimation Observability Analysis Revisited Problems References STATE ESTIMATION USING AMPERE MEASUREMENTS Introduction Modeling of Ampere Measurements Difficulties in Using Ampere Measurements Inequality-Constrained State Estimation Heuristic Determination of F-# Solution Uniqueness Algorithmic Determination of Solution Uniqueness Identification of Nonuniquely Observable Branches Measurement Classification and Bad Data Identification Problems References Appendix A Review of Basic Statistics Appendix B Review of Sparse Linear Equation Solution References Index

read more

Citations
More filters
Proceedings ArticleDOI

Online least-squares one-class support vector machine for outlier detection in power grid data

TL;DR: A sparse online least squares one-class support vector machine classification algorithm is presented to detect outliers in a data stream using an approximate linear dependence criteria to obtain a sparse solution by sequentially processing each data point only once.
Journal ArticleDOI

Graph Computing-Based WLS Fast Decoupled State Estimation

TL;DR: A graph computing-based state estimation technique for power system state estimation, in which its nodes serve as both storage units and logic units, and its advantages for high-performance computation are illustrated.

Explicit Analysis on Effectiveness and Hiddenness of Moving Target Defense in AC Power Systems

TL;DR: In this article , an explicit residual-based moving target defense (EXR-MTD) is proposed to balance the trade-off between effectiveness and hiddenness by aggregating the two subproblems with an appropriate weight.
Proceedings ArticleDOI

Identifying vulnerabilities of state estimators against cyber-attacks

TL;DR: In this article, the authors investigated the cyber-attacks carried out by strategically manipulating critical measurements and proposed a method to identify the set of estimated flows that are vulnerable to those cyber attacks.
Journal ArticleDOI

EAPA: An efficient authentication protocol against pollution attack for smart grid

TL;DR: This paper designs an efficient authentication protocol, named EAPA, for the smart grid communication, that allows not only recipient nodes, but also intermediate nodes, to verify the integrity and origin of the packets received without having to decode, and thus detect and discard the malicious packets in transit that fail the verification.
Related Papers (5)