Kory W. Hedman
YOU?
Author Swipe
View article: ARPA-E Grid Optimization (GO) Competition Challenge 1
ARPA-E Grid Optimization (GO) Competition Challenge 1 Open
The ARPA-E Grid Optimization (GO) Competition Challenge 1, from 2018 to 2019, focused on the basic Security Constrained AC Optimal Power Flow problem (SCOPF) for a single time period. The Challenge utilized sets of unique datasets generate…
View article: An Accelerated-Decomposition Approach for Security-Constrained Unit Commitment With Corrective Network Reconfiguration
An Accelerated-Decomposition Approach for Security-Constrained Unit Commitment With Corrective Network Reconfiguration Open
Security-constrained unit commitment (SCUC) model is used for power system\nday-ahead scheduling. However, current SCUC model uses a static network to\ndeliver power and meet demand optimally. A dynamic network can provide a lower\noptimal…
View article: A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid
A Verifiable Framework for Cyber-Physical Attacks and Countermeasures in a Resilient Electric Power Grid Open
In this paper, we investigate the feasibility and physical consequences of cyber attacks against energy management systems (EMS). Within this framework, we have designed a complete simulation platform to emulate realistic EMS operations: i…
View article: An Enhanced Energy Management System Including a Real-Time Load-Redistribution Threat Analysis Tool and Cyber-Physical SCED
An Enhanced Energy Management System Including a Real-Time Load-Redistribution Threat Analysis Tool and Cyber-Physical SCED Open
It is possible to launch undetectable load-redistribution (LR) attacks against power systems, even in systems with protection schemes. Therefore, detecting LR attacks in power systems and establishing a corrective action to provide secured…
View article: A Detection Mechanism Against Load-Redistribution Attacks in Smart Grids
A Detection Mechanism Against Load-Redistribution Attacks in Smart Grids Open
This paper presents a real-time non-probabilistic detection mechanism to detect load-redistribution (LR) attacks against energy management systems (EMSs). Prior studies have shown that certain LR attacks can bypass conventional bad data de…
View article: An Accelerated-Decomposition Approach for Security-Constrained Unit Commitment with Corrective Network Reconfiguration- Part II: Results and Discussion
An Accelerated-Decomposition Approach for Security-Constrained Unit Commitment with Corrective Network Reconfiguration- Part II: Results and Discussion Open
This paper presents a novel approach to handle the computational complexity in security-constrained unit commitment (SCUC) with corrective network reconfiguration (CNR) to harness the flexibility in transmission networks. This is achieved …
View article: An Accelerated-Decomposition Approach for Security-Constrained Unit\n Commitment with Corrective Network Reconfiguration- Part II: Results and\n Discussion
An Accelerated-Decomposition Approach for Security-Constrained Unit\n Commitment with Corrective Network Reconfiguration- Part II: Results and\n Discussion Open
This paper presents a novel approach to handle the computational complexity\nin security-constrained unit commitment (SCUC) with corrective network\nreconfiguration (CNR) to harness the flexibility in transmission networks. This\nis achiev…
View article: An Accelerated-Decomposition Approach for Security-Constrained Unit Commitment with Corrective Network Reconfiguration- Part I: Methodology
An Accelerated-Decomposition Approach for Security-Constrained Unit Commitment with Corrective Network Reconfiguration- Part I: Methodology Open
Security-constrained unit commitment (SCUC) model is used for power system day-ahead scheduling. However, current SCUC model uses a static network to deliver power and meet demand optimally. This does not fully utilize the transmission fle…
View article: Security-Constrained Unit Commitment with Corrective Network Reconfiguration: Enhanced Benders Decomposition Approach
Security-Constrained Unit Commitment with Corrective Network Reconfiguration: Enhanced Benders Decomposition Approach Open
Security-constrained unit commitment (SCUC) model is used for day-ahead scheduling. However, current SCUC model uses a static network to deliver power and meet demand optimally. This does not fully utilize the transmission flexibility and …
View article: Generator Contingency Modeling in Electric Energy Markets: Derivation of Prices via Duality Theory
Generator Contingency Modeling in Electric Energy Markets: Derivation of Prices via Duality Theory Open
Traditional electric energy markets do not explicitly model generator contingencies. To improve the representation of resources and to enhance the modeling of uncertainty, existing markets are moving in the direction of including generator…
View article: Data Driven Linearized AC Power Flow Model with Regression Analysis
Data Driven Linearized AC Power Flow Model with Regression Analysis Open
Full AC power flow model is an accurate mathematical model for representing the physical power systems. In practice, however, the utilization of this model is limited due to the computational complexity associated with its nonlinear and no…
View article: Enhanced Energy Management System with Corrective Transmission Switching Strategy. Part II: Results and Discussion
Enhanced Energy Management System with Corrective Transmission Switching Strategy. Part II: Results and Discussion Open
This paper presents a novel procedure for energy management system (EMS) that can utilize the flexibility in transmission network in a practical way. With the proposed enhanced EMS procedure, the reliability benefits that are provided by c…
View article: Enhancing Power System Cyber-Security with Systematic Two-Stage Detection Strategy
Enhancing Power System Cyber-Security with Systematic Two-Stage Detection Strategy Open
State estimation estimates the system condition in real-time and provides a base case for other energy management system (EMS) applications including real-time contingency analysis and security-constrained economic dispatch. Recent work in…
View article: False Data Injection Cyber-Attack Detection.
False Data Injection Cyber-Attack Detection. Open
State estimation estimates the system condition in real-time and provides a base case for other energy management system (EMS) applications including real-time contingency analysis and security-constrained economic dispatch. Recent work in…
View article: Enhanced Energy Management System with Corrective Transmission Switching Strategy. Part I: Methodology
Enhanced Energy Management System with Corrective Transmission Switching Strategy. Part I: Methodology Open
The flexibility in transmission networks is not fully utilized and reflected in existing energy management systems (EMSs). Corrective transmission switching (CTS) is proposed in this two-part paper to enable EMS to take advantage of the fl…
View article: Assignment of Electrical Properties to Power Grid Topologies
Assignment of Electrical Properties to Power Grid Topologies Open
Power systems are often described in terms of graphs, with various properties like load and impedance associated with the nodes and edges. These properties are coupled to the graph's topology, reflecting the great deal of engineering desig…
View article: Market pricing with single‐generator‐failure security constraints
Market pricing with single‐generator‐failure security constraints Open
Regional transmission organisations and independent system operators include different types of security requirements to approximate system security issues. Transmission line contingencies are well handled in state‐of‐art market models wit…
View article: An Enhanced Security-Constrained Unit Commitment Model with Reserve Response Set Policies
An Enhanced Security-Constrained Unit Commitment Model with Reserve Response Set Policies Open
Security-constrained unit commitment (SCUC) is a classical problem used for day-ahead commitment, dispatch, and reserve scheduling. Even though SCUC models acquire reserves, N-1 reliability is not guaranteed. This paper presents an enhance…
View article: Harnessing Flexible Transmission: Corrective Transmission Switching for ISO-NE
Harnessing Flexible Transmission: Corrective Transmission Switching for ISO-NE Open
Despite the significant attention transmission switching (TS) has gained over the last decade, important challenges remain. This paper addresses the state-of-the-art challenges of TS by studying the benefits of corrective switching using a…
View article: Real-Time Contingency Analysis with Corrective Transmission Switching - Part I: Methodology
Real-Time Contingency Analysis with Corrective Transmission Switching - Part I: Methodology Open
Transmission switching (TS) has gained significant attention recently. However, barriers still remain and must be overcome before the technology can be adopted by the industry. The state of the art challenges include AC feasibility and per…
View article: Real-Time Contingency Analysis with Corrective Transmission Switching - Part II: Results and Discussion
Real-Time Contingency Analysis with Corrective Transmission Switching - Part II: Results and Discussion Open
This paper presents the performance of an AC transmission switching (TS) based real-time contingency analysis (RTCA) tool that is introduced in Part I of this paper. The approach quickly proposes high quality corrective switching actions f…
View article: Towards smart corrective switching: analysis and advancement of PJM's switching solutions
Towards smart corrective switching: analysis and advancement of PJM's switching solutions Open
Transmission switching, as a power flow control mechanism that can reduce costs and improve reliability, has gained a lot of attention during the last decade. Despite its benefits, industry adoption has been very limited due to its computa…