Do you want to publish a course? Click here

Preliminary Exploration on Digital Twin for Power Systems: Challenges, Framework, and Applications

97   0   0.0 ( 0 )
 Added by Xing He
 Publication date 2019
and research's language is English




Ask ChatGPT about the research

Digital twin (DT) is one of the most promising enabling technologies for realizing smart grids. Characterized by seamless and active---data-driven, real-time, and closed-loop---integration between digital and physical spaces, a DT is much more than a blueprint, simulation tool, or cyber-physical system (CPS). Numerous state-of-the-art technologies such as internet of things (IoT), 5G, big data, and artificial intelligence (AI) serve as a basis for DT. DT for power systems aims at situation awareness and virtual test to assist the decision-making on power grid operation and management under normal or urgent conditions. This paper, from both science paradigms and engineering practice, outlines the backgrounds, challenges, framework, tools, and possible directions of DT as a preliminary exploration. To our best knowledge, it is also the first exploration on DT in the context of power systems. Starting from the fundamental and most frequently used power flow (PF) analysis, some typical application scenarios are presented. Our work is expected to contribute some novel discoveries, as well as some high-dimensional analytics, to the engineering community. Besides, the connection of DT with big data analytics and AI may has deep impact on data science.



rate research

Read More

Digital Twin is a breaking technology that allows creating virtual representations of complex physical systems based on updated information of the system and its physical laws. However, making the Digital Twin behavior matching with the real system can be challenging due to the number of unknown parameters in each twin. Its search can be done using optimization-based techniques, producing a family of models based on different system datasets, so, a discrimination criterion is required to determine the best Digital Twin model. This paper presents an information theory-based discrimination criterion to determine the best Digital Twin model resulting from a behavioral matching process. The information gain of a model is employed as a discrimination criterion. Box-Jenkins models are used to define the family of models for each behavioral matching result. The proposed method is compared with other information-based metrics as well as the $ u$gap metric. As a study case, the discrimination method is applied to the Digital Twin for a real-time vision feedback infrared temperature uniformity control system. Obtained results show that information-based methodologies are useful for selecting an accurate Digital Twin model representing the system among a family of plants
242 - Jairo Viola , YangQuan Chen 2020
In the way towards Industry 4.0, the complexity of the industrial systems increases due to the presence of multiple agents, Cyber-Physical Systems, distributed sensing, and big data introducing unknown dynamics that affect the production goals of the manufacturing processes. Thus, Digital Twin is a breaking technology corresponding to the capacity of developing a virtual representation of any complex system in order to perform design, analysis, and behavior prediction tasks that enhance the understanding of these systems through new enabling capabilities like real-time analytics, parallel sensing, or Smart Control Engineering. In this paper, a novel framework is proposed for the design and implementation of Digital Twin applications to the development of Smart Control Engineering. The steps of this framework involve system documentation, multidomain simulation, behavioral matching, and real-time monitoring. This framework is applied to develop the Digital Twin for a real-time vision feedback infrared temperature uniformity control. The obtained results show that Digital Twin is a fundamental part of the transformation into Industry 4.0.
Recent advances in wireless communication and solid-state circuits together with the enormous demands of sensing ability have given rise to a new enabling technology, integrated sensing and communications (ISAC). The ISAC captures two main advantages over dedicated sensing and communication functionalities: 1) Integration gain to efficiently utilize congested resources, and even, 2) Coordination gain to balance dual-functional performance or/and perform mutual assistance. Meanwhile, triggered by ISAC, we are also witnessing a paradigm shift in the ubiquitous IoT architecture, in which the sensing and communication layers are tending to converge into a new layer, namely, the signaling layer. In this paper, we first attempt to introduce a definition of ISAC, analyze the various influencing forces, and present several novel use cases. Then, we complement the understanding of the signaling layer by presenting several key benefits in the IoT era. We classify existing dominant ISAC solutions based on the layers in which integration is applied. Finally, several challenges and opportunities are discussed. We hope that this overview article will serve as a primary starting point for new researchers and offer a birds-eye view of the existing ISAC-related advances from academia and industry, ranging from solid-state circuitry, signal processing, and wireless communication to mobile computing.
Multi-armed bandit algorithms have been argued for decades as useful for adaptively randomized experiments. In such experiments, an algorithm varies which arms (e.g. alternative interventions to help students learn) are assigned to participants, with the goal of assigning higher-reward arms to as many participants as possible. We applied the bandit algorithm Thompson Sampling (TS) to run adaptive experiments in three university classes. Instructors saw great value in trying to rapidly use data to give their students in the experiments better arms (e.g. better explanations of a concept). Our deployment, however, illustrated a major barrier for scientists and practitioners to use such adaptive experiments: a lack of quantifiable insight into how much statistical analysis of specific real-world experiments is impacted (Pallmann et al, 2018; FDA, 2019), compared to traditional uniform random assignment. We therefore use our case study of the ubiquitous two-arm binary reward setting to empirically investigate the impact of using Thompson Sampling instead of uniform random assignment. In this setting, using common statistical hypothesis tests, we show that collecting data with TS can as much as double the False Positive Rate (FPR; incorrectly reporting differences when none exist) and the False Negative Rate (FNR; failing to report differences when they exist)...
The operation of power grids is becoming increasingly data-centric. While the abundance of data could improve the efficiency of the system, it poses major reliability challenges. In particular, state estimation aims to learn the behavior of the network from data but an undetected attack on this problem could lead to a large-scale blackout. Nevertheless, understanding vulnerability of state estimation against cyber attacks has been hindered by the lack of tools studying the topological and data-analytic aspects of the network. Algorithmic robustness is of critical need to extract reliable information from abundant but untrusted grid data. We propose a robust state estimation framework that leverages network sparsity and data abundance. For a large-scale power grid, we quantify, analyze, and visualize the regions of the network prone to cyber attacks. We also propose an optimization-based graphical boundary defense mechanism to identify the border of the geographical area whose data has been manipulated. The proposed method does not allow a local attack to have a global effect on the data analysis of the entire network, which enhances the situational awareness of the grid especially in the face of adversity. The developed mathematical framework reveals key geometric and algebraic factors that can affect algorithmic robustness and is used to study the vulnerability of the U.S. power grid in this paper.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا