2019
DOI: 10.1109/tpwrs.2019.2916558
|View full text |Cite
|
Sign up to set email alerts
|

A Decentralized Functional Observer Based Optimal LFC Considering Unknown Inputs, Uncertainties, and Cyber-Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 94 publications
(30 citation statements)
references
References 35 publications
0
30
0
Order By: Relevance
“…The AGC models using a decentralized approach in continuous and discrete power system models are discussed in the literature. The authors in [43] presented a decentralized optimal AGC in a three-area power system with appropriate non-linearities, which has resulted in a reduced frequency oscillation to an appropriate degree and has maintained the interchange power at minimal values. Furthermore, observers are being developed in each area of the power system to approximate the signal applied to each power plant.…”
Section: Decentralized Controllersmentioning
confidence: 99%
“…The AGC models using a decentralized approach in continuous and discrete power system models are discussed in the literature. The authors in [43] presented a decentralized optimal AGC in a three-area power system with appropriate non-linearities, which has resulted in a reduced frequency oscillation to an appropriate degree and has maintained the interchange power at minimal values. Furthermore, observers are being developed in each area of the power system to approximate the signal applied to each power plant.…”
Section: Decentralized Controllersmentioning
confidence: 99%
“…Unknown input observer based schemes reported in [47] are used to determine and mitigate false data injection attack. Functional observer based methodologies for optimal LFC operation under cyber-attack are also introduced in [48,49]. False data injection detection can be analyzed under reachability framework where the attacker acquires access to the states of the power system [50].…”
Section: False Data Injection Preventionmentioning
confidence: 99%
“…Additionally, many robust, optimal and intelligent control techniques have been discussed as load frequency controllers [7]- [12]. Additionally, a novel, unknown input functional observer-based optimizer has been presented in [13].…”
Section: Introductionmentioning
confidence: 99%