2021
DOI: 10.48550/arxiv.2106.02254
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

State Estimation in Unobservable Power Systems via Graph Signal Processing Tools

Abstract: We consider the problem of estimating the states and detecting bad data in an unobservable power system. To this end, we propose novel graph signal processing (GSP) methods. The main assumption behind the proposed GSP approach is that the grid state vector, which includes the phases of the voltages in the system, is a smooth graph signal with respect to the system admittance matrix that represents the underlying graph. Thus, the first step in this paper is to validate the graph-smoothness assumption of the sta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(8 citation statements)
references
References 41 publications
(112 reference statements)
0
8
0
Order By: Relevance
“…In this subsection, we apply the OMP algorithm for the sparse recovery of the state attack vector, c, which is a sparse signal as described in Assumption A.3, from the measurements in (17). It should be noted that the measurement model in (17) contains a nuisance parameter vector, H L,V ∆θ θ θ , which is not a part of the conventional sparse recovery model.…”
Section: A Omp Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this subsection, we apply the OMP algorithm for the sparse recovery of the state attack vector, c, which is a sparse signal as described in Assumption A.3, from the measurements in (17). It should be noted that the measurement model in (17) contains a nuisance parameter vector, H L,V ∆θ θ θ , which is not a part of the conventional sparse recovery model.…”
Section: A Omp Methodsmentioning
confidence: 99%
“…Hence, as shown in (12), there exists a subset of nodes, Λ i ∈ G K c , that fully contains the attack. By substituting (12) in (17) we obtain…”
Section: B Structural-constrained Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The identifiability conditions of the tensor completion using the centralized CPD model were studied by [24] and [27]; however, the identifiability conditions in these two references require all the measurements to be synchronized across the entire system, and the conditions apply only to specific uniform sampling schemes. In this section, we provide more general identifiability conditions of the tensor completion using the multi-area CPD model (4), which also covers the case of the centralized CPD model. Our identifiability conditions allow for asynchronous samplings among different areas, and they apply to any sampling scheme.…”
Section: Identifiability Conditionsmentioning
confidence: 99%
“…Unlike redundant measurements in transmission systems, the measured information in secondary substations of distribution systems is scarce, which poses a formidable challenge to DSSE [3]. To address the challenge, [4] developed a graph signal processing based weighted least squares method and…”
Section: Introductionmentioning
confidence: 99%