Por favor, use este identificador para citar o enlazar este ítem:
https://hdl.handle.net/10495/35676
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | López Lezama, Jesús M. | - |
dc.contributor.author | Cortina, Juan J. | - |
dc.contributor.author | Muñoz Galeano, Nicolás | - |
dc.date.accessioned | 2023-06-28T14:28:47Z | - |
dc.date.available | 2023-06-28T14:28:47Z | - |
dc.date.issued | 2018 | - |
dc.identifier.issn | 1313-6569 | - |
dc.identifier.uri | https://hdl.handle.net/10495/35676 | - |
dc.description.abstract | ABSTRACT: This paper presents a comparison of different metaheuristic techniques applied to the assessment of power systems vulnerability to intentional attacks, also kwon as the electric grid interdiction problem. This problem is described through a bilevel formulation and comprises the interaction between a disruptive agent (attacker) and the power system operator (defender). The attacker is positioned in the upper level optimization problem and aims at finding the set of devices (lines, transformers and generators) that, once simultaneously attacked, would maximize the system load shedding. This problem is constrained by a limit on destructive resources and the response of the power system operator, located in the lower level optimization problem that reacts to the attack by modifying the generation dispatch aiming at minimizing the load shedding. The interdiction problem described in this paper is nonlinear and nonconvex; therefore, four different metaheuristic techniques are implemented and compared for its solution: Genetic Algorithm, GRASP, Iterated Local Search and Tabu Search. Results show that the Iterated Local Search adapts better to this problem obtaining the best rate between quality of solutions and computation time. | spa |
dc.format.extent | 20 | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | eng | spa |
dc.publisher | Hikari | spa |
dc.type.hasversion | info:eu-repo/semantics/publishedVersion | spa |
dc.rights | info:eu-repo/semantics/openAccess | spa |
dc.rights.uri | http://creativecommons.org/licenses/by/2.5/co/ | * |
dc.subject.lcsh | Genetic algorithms | - |
dc.subject.lcsh | GRASP System | - |
dc.title | Assessment of power system vulnerability using metaheuristic techniques | spa |
dc.type | info:eu-repo/semantics/article | spa |
dc.publisher.group | Grupo de Manejo Eficiente de la Energía (GIMEL) | spa |
dc.identifier.doi | 10.12988/ces.2018.8399 | - |
oaire.version | http://purl.org/coar/version/c_970fb48d4fbd8a85 | spa |
dc.rights.accessrights | http://purl.org/coar/access_right/c_abf2 | spa |
dc.identifier.eissn | 1314-7641 | - |
oaire.citationtitle | Contemporary Engineering Sciences | spa |
oaire.citationstartpage | 1165 | spa |
oaire.citationendpage | 1184 | spa |
oaire.citationvolume | 11 | spa |
oaire.citationissue | 24 | spa |
dc.rights.creativecommons | https://creativecommons.org/licenses/by/4.0/ | spa |
dc.publisher.place | Ruse, Bulgaria | spa |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | spa |
dc.type.redcol | https://purl.org/redcol/resource_type/ART | spa |
dc.type.local | Artículo de investigación | spa |
dc.subject.proposal | GRASP | spa |
dc.subject.proposal | Iterated Local Search and Tabu Search | spa |
dc.subject.lcshuri | http://id.loc.gov/authorities/subjects/sh92002377 | - |
dc.subject.lcshuri | http://id.loc.gov/authorities/subjects/sh85056504 | - |
dc.identifier.url | http://www.m-hikari.com/ces/ces2018/ces21-24-2018/p/lopezCES21-24-2018.pdf | spa |
dc.description.researchgroupid | COL0010477 | spa |
dc.relation.ispartofjournalabbrev | Contemp. Eng. Sci. | spa |
Aparece en las colecciones: | Artículos de Revista en Ingeniería |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
LopezJesus_2018_AssessmentPowerSystem.pdf | Artículo de investigación | 901.92 kB | Adobe PDF | Visualizar/Abrir |
Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons