Sign in
Author

Conference

Journal

Organization

Year

DOI
Look for results that meet for the following criteria:
since
equal to
before
between
and
Search in all fields of study
Limit my searches in the following fields of study
Agriculture Science
Arts & Humanities
Biology
Chemistry
Computer Science
Economics & Business
Engineering
Environmental Sciences
Geosciences
Material Science
Mathematics
Medicine
Physics
Social Science
Multidisciplinary
Keywords
(7)
Bilevel Programming
Continuous Variable
Grid Security
Mixed Integer Linear Program
Network Security
Linear Program
Reliability Test System
Related Publications
(2)
Analysis of electric grid security under terrorist threat
On the solution of the bilevel programming formulation of the terrorist threat problem
Subscribe
Academic
Publications
A MixedInteger LP Procedure for the Analysis of Electric Grid Security Under Disruptive Threat
A MixedInteger LP Procedure for the Analysis of Electric Grid Security Under Disruptive Threat,10.1109/TPWRS.2005.851942,IEEE Transactions on Power S
Edit
A MixedInteger LP Procedure for the Analysis of Electric Grid Security Under Disruptive Threat
(
Citations: 25
)
BibTex

RIS

RefWorks
Download
Alexis L. Motto
,
José M. Arroyo
,
Francisco D. Galiana
This paper presents a solution procedure for the mixedinteger
bilevel programming
model of the electric
grid security
under disruptive threat problem, here concisely denoted by (STMIBLP), that was recently reported. Using results from linear programming theory and some basic linearization of products of binary–binary or binary–continuous variables, we recast (STMIBLP) into a standard (onelevel) mixedinteger
linear program
(STMILP) with no more binary variables than in the original (STMIBLP). This transformation provides a framework for globally solving (STMIBLP) using available mixedinteger linear programming solvers. Some numerical results obtained by the new method are compared with those recently published, based on IEEE Reliability Test Systems.
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 20, no. 3, pp. 13571365, 2005
DOI:
10.1109/TPWRS.2005.851942
Cumulative
Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
(
ieeexplore.ieee.org
)
(
ieeexplore.ieee.org
)
(
ieeexplore.ieee.org
)
Citation Context
(14)
...Moreover, Motto et al. [
10
] transformed the problems [8], [9] into a mixed integer bilevel programming model and presented a solution procedure...
...From [8]–[
10
], it can be observed that in the new context where terrorists come into play, traditionally robust power systems may be vulnerable...
Guo Chen
,
et al.
Exploring Reliable Strategies for Defending Power Systems Against Targ...
...Additionally, the vulnerability assessment of power systems due to intentional outages has received significant attention by some researchers [
20
]...
Ansi Wang
,
et al.
Vulnerability Assessment Scheme for Power System Transmission Networks...
...Some examples of this research effort are [3] and [
4
] which address the problem of identifying critical network components that are potential targets for terrorist agents...
...Static models of vulnerability analysis [
4
], [5] are used to generate scenarios...
...The level of damage associated with attack plans drives the scenario generation procedure, which is based on the solution of the socalled terrorist threat problem [
4
]...
...Using the vulnerability analysis proposed in [
4
], the maximum system load shed in the original network is obtained after destroying at least 28 lines and is equal to 3214 MW, representing 56% of the total demand (5700 MW)...
José Manuel Arroyo
,
et al.
A RiskBased Approach for Transmission Network Expansion Planning Unde...
...Motto et al. [
13
] presented an alternative solution procedure for the mixedinteger bilevel programming model of the terrorist threat problem...
...As an example, the worstcase interdiction method of [
13
] was used for this purpose in the vulnerabilityconstrained transmission expansion planning approach presented in [17] and [18]...
...In our model, line switching decisions are characterized through lowerlevel binary variables; therefore, the resulting bilevel program cannot be addressed by means of previously reported techniques relying on the equivalent transformation to a onelevel optimization problem [12], [
13
]...
...The system operator is represented by the optimal power flow in the lowerlevel problem (4)–(11), which is parameterized in terms of the upperlevel decision variables . As is commonly assumed in the technical literature [9]–[
13
], [15], [16], a dc model of the transmission system is used...
...Constraints (5) constitute the main difference with respect to the bilevel models presented in [9]–[
13
], [15], and [16]...
...These constraints make the lowerlevel problem nonconvex due to the presence of lowerlevel binary variables , and nonlinear due to the products of lowerlevel decision variables and . Therefore, it is not possible to transform the bilevel problem (1)–(11) into an equivalent onelevel optimization problem, as done in [12] and [
13
], and new tools are thus needed...
...This step involves solving the same problem addressed in [
13
]...
...Table I presents the maximum system load shed obtained for a number of destroyed lines up to 12. The quality of the solutions found by BDLS is assessed through the comparison with the optimal solutions achieved by the approach of Motto et al. [
13
], denoted by MO. The methodology MO does not consider line switching and thus provides an upper bound on the optimal system load shed...
Andrés Delgadillo
,
et al.
Analysis of Electric Grid Interdiction With Line Switching
...Since each of these lowerlevel problems is continuous and convex, it can be represented by its constraints, the constraints of its dual problem and the strong duality condition [
24
]...
Lina P. Garces
,
et al.
A Bilevel Approach to Transmission Expansion Planning Within a Market ...
References
(14)
MIP: Theory and Practice  Closing the Gap
(
Citations: 108
)
Robert E. Bixby
,
Mary Fenelon
,
Zonghao Gu
,
Edward Rothberg
,
Roland Wunderling
Conference:
IFIP TC 7
, pp. 1950, 1999
Linear programming and the theory of games
(
Citations: 47
)
D. Gale
,
H Kuhn
,
A Tucker
The IEEE Reliability Test System1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee
(
Citations: 117
)
C. Grigg
,
P. Wong
,
P. Albrecht
,
R. Allan
,
M. Bhavaraju
,
R. Billinton
,
Q. Chen
,
C. Fong
,
S. Haddad
,
S. Kuruganty
,
W. Li
,
R. Mukerji
http://academic.research.microsoft.com/io.ashx?type=5&id=1648370&selfId1=0&selfId2=0&maxNumber=12&query=
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 14, no. 3, pp. 10101020, 1999
Optimization of a 532city symmetric traveling salesman problem by branch and cut
(
Citations: 123
)
M. Padberg
,
G. Rinaldi
Journal:
Operations Research Letters  ORL
, vol. 6, no. 1, pp. 17, 1987
Analysis of electric grid security under terrorist threat
(
Citations: 76
)
Javier Salmeron
,
K. Wood
,
R. Baldick
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 19, no. 2, pp. 905912, 2004
Sort by:
Citations
(25)
Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks
Guo Chen
,
Zhao Yang Dong
,
David J. Hill
,
Yu Sheng Xue
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 26, no. 3, pp. 10001009, 2011
Vulnerability Assessment Scheme for Power System Transmission Networks Based on the Fault Chain Theory
Ansi Wang
,
Yi Luo
,
Guangyu Tu
,
Pei Liu
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 26, no. 1, pp. 442450, 2011
Security management under uncertainty: From dayahead planning to intraday operation
(
Citations: 2
)
P. Panciatici
,
Y. Hassaine
,
S. Fliscounakis
,
L. Platbrood
,
M. OrtegaVazquez
,
J. L. MartinezRamos
,
L. Wehenkel
Conference:
Bulk Power System Dynamics and Control, iREP Symposium  iREP
, 2010
Bilevel programming applied to power system vulnerability analysis under multiple contingencies
(
Citations: 2
)
J. M. Arroyo
Journal:
Iet Generation Transmission & Distribution  IET GENER TRANSM DISTRIB
, vol. 4, no. 2, 2010
A RiskBased Approach for Transmission Network Expansion Planning Under Deliberate Outages
(
Citations: 1
)
José Manuel Arroyo
,
Natalia Alguacil
,
Miguel Carrion
Journal:
IEEE Transactions on Power Systems  IEEE TRANS POWER SYST
, vol. 25, no. 3, pp. 17591766, 2010