-
Optimal Ordering Policies for Multi-Echelon Supply Networks
Authors:
Jose I. Caiza,
Ian Walter,
Jitesh H. Panchal,
Junjie Qin,
Philip E. Pare
Abstract:
In this paper, we formulate an optimal ordering policy as a stochastic control problem where each firm decides the amount of input goods to order from their upstream suppliers based on the current inventory level of its output good. For this purpose, we provide a closed-form solution for the optimal request of the raw materials for given a fixed production policy. We implement the proposed policy…
▽ More
In this paper, we formulate an optimal ordering policy as a stochastic control problem where each firm decides the amount of input goods to order from their upstream suppliers based on the current inventory level of its output good. For this purpose, we provide a closed-form solution for the optimal request of the raw materials for given a fixed production policy. We implement the proposed policy on a 15-firm acyclic network based on a real product supply chain. We first simulate ideal demand situations, and then we implement demand-side shocks (i.e., demand levels outside of those considered in the policy formulation) and supply-side shocks (i.e., halts in production for some suppliers) to evaluate the robustness of the proposed policies.
△ Less
Submitted 11 September, 2022;
originally announced September 2022.
-
Test and Evaluation Framework for Multi-Agent Systems of Autonomous Intelligent Agents
Authors:
Erin Lanus,
Ivan Hernandez,
Adam Dachowicz,
Laura Freeman,
Melanie Grande,
Andrew Lang,
Jitesh H. Panchal,
Anthony Patrick,
Scott Welch
Abstract:
Test and evaluation is a necessary process for ensuring that engineered systems perform as intended under a variety of conditions, both expected and unexpected. In this work, we consider the unique challenges of develo** a unifying test and evaluation framework for complex ensembles of cyber-physical systems with embedded artificial intelligence. We propose a framework that incorporates test and…
▽ More
Test and evaluation is a necessary process for ensuring that engineered systems perform as intended under a variety of conditions, both expected and unexpected. In this work, we consider the unique challenges of develo** a unifying test and evaluation framework for complex ensembles of cyber-physical systems with embedded artificial intelligence. We propose a framework that incorporates test and evaluation throughout not only the development life cycle, but continues into operation as the system learns and adapts in a noisy, changing, and contended environment. The framework accounts for the challenges of testing the integration of diverse systems at various hierarchical scales of composition while respecting that testing time and resources are limited. A generic use case is provided for illustrative purposes and research directions emerging as a result of exploring the use case via the framework are suggested.
△ Less
Submitted 25 January, 2021;
originally announced January 2021.
-
Dynamic State Estimation under Cyber Attacks: A Comparative Study of Kalman Filters and Observers
Authors:
Ahmad F. Taha,
Junjian Qi,
Jianhui Wang,
Jitesh H. Panchal
Abstract:
Utilizing highly synchronized measurements from synchrophasors, dynamic state estimation (DSE) can be applied for real-time monitoring of smart grids. Concurrent DSE studies for power systems are intolerant to unknown inputs and potential attack vectors --- a research gap we will fill in this work. Particularly, we (a) present an overview of concurrent estimation techniques, highlighting key defic…
▽ More
Utilizing highly synchronized measurements from synchrophasors, dynamic state estimation (DSE) can be applied for real-time monitoring of smart grids. Concurrent DSE studies for power systems are intolerant to unknown inputs and potential attack vectors --- a research gap we will fill in this work. Particularly, we (a) present an overview of concurrent estimation techniques, highlighting key deficiencies, (b) develop DSE methods based on cubature Kalman filter and dynamic observers, (c) rigorously examine the strengths and weaknesses of the proposed methods under attack-vectors and unknown inputs, and (d) provide comprehensive recommendations for DSE. Numerical results and in-depth remarks are also presented.
△ Less
Submitted 28 August, 2015;
originally announced August 2015.
-
Risk Mitigation for Dynamic State Estimation Against Cyber Attacks and Unknown Inputs
Authors:
Ahmad F. Taha,
Junjian Qi,
Jianhui Wang,
Jitesh H. Panchal
Abstract:
Phasor measurement units (PMUs) can be effectively utilized for the monitoring and control of the power grid. As the cyber-world becomes increasingly embedded into power grids, the risks of this inevitable evolution become serious. In this paper, we present a risk mitigation strategy, based on dynamic state estimation, to eliminate threat levels from the grid's unknown inputs and potential cyber-a…
▽ More
Phasor measurement units (PMUs) can be effectively utilized for the monitoring and control of the power grid. As the cyber-world becomes increasingly embedded into power grids, the risks of this inevitable evolution become serious. In this paper, we present a risk mitigation strategy, based on dynamic state estimation, to eliminate threat levels from the grid's unknown inputs and potential cyber-attacks. The strategy requires (a) the potentially incomplete knowledge of power system models and parameters and (b) real-time PMU measurements.
First, we utilize a dynamic state estimator for higher order depictions of power system dynamics for simultaneous state and unknown inputs estimation. Second, estimates of cyber-attacks are obtained through an attack detection algorithm. Third, the estimation and detection components are seamlessly utilized in an optimization framework to determine the most impacted PMU measurements. Finally, a risk mitigation strategy is proposed to guarantee the elimination of threats from attacks, ensuring the observability of the power system through available, safe measurements. Case studies are included to validate the proposed approach. Insightful suggestions, extensions, and open problems are also posed.
△ Less
Submitted 19 May, 2016; v1 submitted 28 August, 2015;
originally announced August 2015.