ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2022
DOI: 10.1109/icassp43922.2022.9747489
|View full text |Cite
|
Sign up to set email alerts
|

Estimation of the Admittance Matrix in Power Systems Under Laplacian and Physical Constraints

Abstract: In this paper, we investigate the problem of estimating a complex-valued Laplacian matrix from a linear Gaussian model, with a focus on its application in the estimation of admittance matrices in power systems. The proposed approach is based on a constrained maximum likelihood estimator (CMLE) of the complex-valued Laplacian, which is formulated as an optimization problem with Laplacian and sparsity constraints. The complex-valued Laplacian is a symmetric, non-Hermitian matrix that exhibits a joint sparsity pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 58 publications
(102 reference statements)
0
6
0
Order By: Relevance
“…Second, the topology of the network is assumed to be known, which may not always be the case, particularly for distribution systems. In such cases, methods for estimating the topology [ 29 , 70 ] could be used. Third, the Gauss–Newton algorithm used in this study may be computationally expensive for large networks.…”
Section: Discussionmentioning
confidence: 99%
“…Second, the topology of the network is assumed to be known, which may not always be the case, particularly for distribution systems. In such cases, methods for estimating the topology [ 29 , 70 ] could be used. Third, the Gauss–Newton algorithm used in this study may be computationally expensive for large networks.…”
Section: Discussionmentioning
confidence: 99%
“…the graph. The GSP-based detector in ( 16) was implemented in [39] with the ideal GHPF defined in (11), and in [50] with the graph TV filter from (10), both with L = B.…”
Section: Gsp-based Fdi Attack Detectionmentioning
confidence: 99%
“…The same assumption is required for generating the unobservable FDI attack in (13) [2], [63]. The assumption that H (and consequently its submatrix B) is known or can be estimated from historical data [7]- [10] gives the adversary more power than usually is possible in reality; We note that this is a well-adopted practice in the cybersecurity community, which increases the system's resilience.…”
Section: Remarks 1) Known Topologymentioning
confidence: 99%
See 2 more Smart Citations