-
A Review of Safe Reinforcement Learning Methods for Modern Power Systems
Authors:
Tong Su,
Tong Wu,
Junbo Zhao,
Anna Scaglione,
Le Xie
Abstract:
Due to the availability of more comprehensive measurement data in modern power systems, there has been significant interest in develo** and applying reinforcement learning (RL) methods for operation and control. Conventional RL training is based on trial-and-error and reward feedback interaction with either a model-based simulated environment or a data-driven and model-free simulation environmen…
▽ More
Due to the availability of more comprehensive measurement data in modern power systems, there has been significant interest in develo** and applying reinforcement learning (RL) methods for operation and control. Conventional RL training is based on trial-and-error and reward feedback interaction with either a model-based simulated environment or a data-driven and model-free simulation environment. These methods often lead to the exploration of actions in unsafe regions of operation and, after training, the execution of unsafe actions when the RL policies are deployed in real power systems. A large body of literature has proposed safe RL strategies to prevent unsafe training policies. In power systems, safe RL represents a class of RL algorithms that can ensure or promote the safety of power system operations by executing safe actions while optimizing the objective function. While different papers handle the safety constraints differently, the overarching goal of safe RL methods is to determine how to train policies to satisfy safety constraints while maximizing rewards. This paper provides a comprehensive review of safe RL techniques and their applications in different power system operations and control, including optimal power generation dispatch, voltage control, stability control, electric vehicle (EV) charging control, buildings' energy management, electricity market, system restoration, and unit commitment and reserve scheduling. Additionally, the paper discusses benchmarks, challenges, and future directions for safe RL research in power systems.
△ Less
Submitted 28 June, 2024;
originally announced July 2024.
-
Stochastic Dynamic Network Utility Maximization with Application to Disaster Response
Authors:
Anna Scaglione,
Nurullah Karakoc
Abstract:
In this paper, we are interested in solving Network Utility Maximization (NUM) problems whose underlying local utilities and constraints depend on a complex stochastic dynamic environment. While the general model applies broadly, this work is motivated by resource sharing during disasters concurrently occurring in multiple areas. In such situations, hierarchical layers of Incident Command Systems…
▽ More
In this paper, we are interested in solving Network Utility Maximization (NUM) problems whose underlying local utilities and constraints depend on a complex stochastic dynamic environment. While the general model applies broadly, this work is motivated by resource sharing during disasters concurrently occurring in multiple areas. In such situations, hierarchical layers of Incident Command Systems (ICS) are engaged; specifically, a central entity (e.g., the federal government) typically coordinates the incident response allocating resources to different sites, which then get distributed to the affected by local entities. The benefits of an allocation decision to the different sites are generally not expressed explicitly as a closed-form utility function because of the complexity of the response and the random nature of the underlying phenomenon we try to contain. We use the classic approach of decomposing the NUM formulation and applying a primal-dual algorithm to achieve optimal higher-level decisions under coupled constraints while modeling the optimized response to the local dynamics with deep reinforcement learning algorithms.
The decomposition we propose has several benefits: 1) the entities respond to their local utilities based on a congestion signal conveyed by the ICS upper layers; 2) the complexity of capturing the utility of local responses and their diversity is addressed effectively without sharing local parameters and priorities with the ICS layers above; 3) utilities, known as explicit functions, are approximated as convex functions of the resources allocated; 4) decisions rely on up-to-date data from the ground along with future forecasts.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Differentially Private Communication of Measurement Anomalies in the Smart Grid
Authors:
Nikhil Ravi,
Anna Scaglione,
Sean Peisert,
Parth Pradhan
Abstract:
In this paper, we present a framework based on differential privacy (DP) for querying electric power measurements to detect system anomalies or bad data. Our DP approach conceals consumption and system matrix data, while simultaneously enabling an untrusted third party to test hypotheses of anomalies, such as the presence of bad data, by releasing a randomized sufficient statistic for hypothesis-t…
▽ More
In this paper, we present a framework based on differential privacy (DP) for querying electric power measurements to detect system anomalies or bad data. Our DP approach conceals consumption and system matrix data, while simultaneously enabling an untrusted third party to test hypotheses of anomalies, such as the presence of bad data, by releasing a randomized sufficient statistic for hypothesis-testing. We consider a measurement model corrupted by Gaussian noise and a sparse noise vector representing the attack, and we observe that the optimal test statistic is a chi-square random variable. To detect possible attacks, we propose a novel DP chi-square noise mechanism that ensures the test does not reveal private information about power injections or the system matrix. The proposed framework provides a robust solution for detecting bad data while preserving the privacy of sensitive power system data.
△ Less
Submitted 22 March, 2024; v1 submitted 4 March, 2024;
originally announced March 2024.
-
Compressed and Sparse Models for Non-Convex Decentralized Learning
Authors:
Andrew Campbell,
Hang Liu,
Leah Woldemariam,
Anna Scaglione
Abstract:
Recent research highlights frequent model communication as a significant bottleneck to the efficiency of decentralized machine learning (ML), especially for large-scale and over-parameterized neural networks (NNs). To address this, we present Malcom-PSGD, a novel decentralized ML algorithm that combines gradient compression techniques with model sparsification. We promote model sparsity by adding…
▽ More
Recent research highlights frequent model communication as a significant bottleneck to the efficiency of decentralized machine learning (ML), especially for large-scale and over-parameterized neural networks (NNs). To address this, we present Malcom-PSGD, a novel decentralized ML algorithm that combines gradient compression techniques with model sparsification. We promote model sparsity by adding $\ell_1$ regularization to the objective and present a decentralized proximal SGD method for training. Our approach employs vector source coding and dithering-based quantization for the compressed gradient communication of sparsified models. Our analysis demonstrates that Malcom-PSGD achieves a convergence rate of $\mathcal{O}(1/\sqrt{t})$ with respect to the iterations $t$, assuming a constant consensus and learning rate. This result is supported by our proof for the convergence of non-convex compressed Proximal SGD methods. Additionally, we conduct a bit analysis, providing a closed-form expression for the communication costs associated with Malcom-PSGD. Numerical results verify our theoretical findings and demonstrate that our method reduces communication costs by approximately $75\%$ when compared to the state-of-the-art.
△ Less
Submitted 5 June, 2024; v1 submitted 9 November, 2023;
originally announced November 2023.
-
Low-Complexity Vector Source Coding for Discrete Long Sequences with Unknown Distributions
Authors:
Leah Woldemariam,
Hang Liu,
Anna Scaglione
Abstract:
In this paper, we propose a source coding scheme that represents data from unknown distributions through frequency and support information. Existing encoding schemes often compress data by sacrificing computational efficiency or by assuming the data follows a known distribution. We take advantage of the structure that arises within the spatial representation and utilize it to encode run-lengths wi…
▽ More
In this paper, we propose a source coding scheme that represents data from unknown distributions through frequency and support information. Existing encoding schemes often compress data by sacrificing computational efficiency or by assuming the data follows a known distribution. We take advantage of the structure that arises within the spatial representation and utilize it to encode run-lengths within this representation using Golomb coding. Through theoretical analysis, we show that our scheme yields an overall bit rate that nears entropy without a computationally complex encoding algorithm and verify these results through numerical experiments.
△ Less
Submitted 11 September, 2023;
originally announced September 2023.
-
Blind Graph Matching Using Graph Signals
Authors:
Hang Liu,
Anna Scaglione,
Hoi-To Wai
Abstract:
Classical graph matching aims to find a node correspondence between two unlabeled graphs of known topologies. This problem has a wide range of applications, from matching identities in social networks to identifying similar biological network functions across species. However, when the underlying graphs are unknown, the use of conventional graph matching methods requires inferring the graph topolo…
▽ More
Classical graph matching aims to find a node correspondence between two unlabeled graphs of known topologies. This problem has a wide range of applications, from matching identities in social networks to identifying similar biological network functions across species. However, when the underlying graphs are unknown, the use of conventional graph matching methods requires inferring the graph topologies first, a process that is highly sensitive to observation errors. In this paper, we tackle the blind graph matching problem with unknown underlying graphs directly using observations of graph signals, which are generated from graph filters applied to graph signal excitations. We propose to construct sample covariance matrices from the observed signals and match the nodes based on the selected sample eigenvectors. Our analysis shows that the blind matching outcome converges to the result obtained with known graph topologies when the signal sampling size is large and the signal noise is small. Numerical results showcase the performance improvement of the proposed algorithm compared to matching two estimated underlying graphs learned from the graph signals.
△ Less
Submitted 29 March, 2024; v1 submitted 27 June, 2023;
originally announced June 2023.
-
Differential Privacy for Class-based Data: A Practical Gaussian Mechanism
Authors:
Raksha Ramakrishna,
Anna Scaglione,
Tong Wu,
Nikhil Ravi,
Sean Peisert
Abstract:
In this paper, we present a notion of differential privacy (DP) for data that comes from different classes. Here, the class-membership is private information that needs to be protected. The proposed method is an output perturbation mechanism that adds noise to the release of query response such that the analyst is unable to infer the underlying class-label. The proposed DP method is capable of not…
▽ More
In this paper, we present a notion of differential privacy (DP) for data that comes from different classes. Here, the class-membership is private information that needs to be protected. The proposed method is an output perturbation mechanism that adds noise to the release of query response such that the analyst is unable to infer the underlying class-label. The proposed DP method is capable of not only protecting the privacy of class-based data but also meets quality metrics of accuracy and is computationally efficient and practical. We illustrate the efficacy of the proposed method empirically while outperforming the baseline additive Gaussian noise mechanism. We also examine a real-world application and apply the proposed DP method to the autoregression and moving average (ARMA) forecasting method, protecting the privacy of the underlying data source. Case studies on the real-world advanced metering infrastructure (AMI) measurements of household power consumption validate the excellent performance of the proposed DP method while also satisfying the accuracy of forecasted power consumption measurements.
△ Less
Submitted 8 June, 2023;
originally announced June 2023.
-
Solar Photovoltaic Systems Metadata Inference and Differentially Private Publication
Authors:
Nikhil Ravi,
Anna Scaglione,
Julieta Giraldez,
Parth Pradhan,
Chuck Moran,
Sean Peisert
Abstract:
Stakeholders in electricity delivery infrastructure are amassing data about their system demand, use, and operations. Still, they are reluctant to share them, as even sharing aggregated or anonymized electric grid data risks the disclosure of sensitive information. This paper highlights how applying differential privacy to distributed energy resource production data can preserve the usefulness of…
▽ More
Stakeholders in electricity delivery infrastructure are amassing data about their system demand, use, and operations. Still, they are reluctant to share them, as even sharing aggregated or anonymized electric grid data risks the disclosure of sensitive information. This paper highlights how applying differential privacy to distributed energy resource production data can preserve the usefulness of that data for operations, planning, and research purposes without violating privacy constraints. Differentially private mechanisms can be optimized for queries of interest in the energy sector, with provable privacy and accuracy trade-offs, and can help design differentially private databases for further analysis and research. In this paper, we consider the problem of inference and publication of solar photovoltaic systems' metadata. Metadata such as nameplate capacity, surface azimuth and surface tilt may reveal personally identifiable information regarding the installation behind-the-meter. We describe a methodology to infer the metadata and propose a mechanism based on Bayesian optimization to publish the inferred metadata in a differentially private manner. The proposed mechanism is numerically validated using real-world solar power generation data.
△ Less
Submitted 7 April, 2023;
originally announced April 2023.
-
Constrained Reinforcement Learning for Predictive Control in Real-Time Stochastic Dynamic Optimal Power Flow
Authors:
Tong Wu,
Anna Scaglione,
Daniel Arnold
Abstract:
Deep Reinforcement Learning (DRL) has become a popular method for solving control problems in power systems. Conventional DRL encourages the agent to explore various policies encoded in a neural network (NN) with the goal of maximizing the reward function. However, this approach can lead to infeasible solutions that violate physical constraints such as power flow equations, voltage limits, and dyn…
▽ More
Deep Reinforcement Learning (DRL) has become a popular method for solving control problems in power systems. Conventional DRL encourages the agent to explore various policies encoded in a neural network (NN) with the goal of maximizing the reward function. However, this approach can lead to infeasible solutions that violate physical constraints such as power flow equations, voltage limits, and dynamic constraints. Ensuring these constraints are met is crucial in power systems, as they are a safety critical infrastructure. To address this issue, existing DRL algorithms remedy the problem by projecting the actions onto the feasible set, which can result in sub-optimal solutions. This paper presents a novel primal-dual approach for learning optimal constrained DRL policies for dynamic optimal power flow problems, with the aim of controlling power generations and battery outputs. We also prove the convergence of the critic and actor networks. Our case studies on IEEE standard systems demonstrate the superiority of the proposed approach in dynamically adapting to the environment while maintaining safety constraints.
△ Less
Submitted 7 July, 2023; v1 submitted 20 February, 2023;
originally announced February 2023.
-
Complex-Value Spatio-temporal Graph Convolutional Neural Networks and its Applications to Electric Power Systems AI
Authors:
Tong Wu,
Anna Scaglione,
Daniel Arnold
Abstract:
The effective representation, precessing, analysis, and visualization of large-scale structured data over graphs are gaining a lot of attention. So far most of the literature has focused on real-valued signals. However, signals are often sparse in the Fourier domain, and more informative and compact representations for them can be obtained using the complex envelope of their spectral components, a…
▽ More
The effective representation, precessing, analysis, and visualization of large-scale structured data over graphs are gaining a lot of attention. So far most of the literature has focused on real-valued signals. However, signals are often sparse in the Fourier domain, and more informative and compact representations for them can be obtained using the complex envelope of their spectral components, as opposed to the original real-valued signals. Motivated by this fact, in this work we generalize graph convolutional neural networks (GCN) to the complex domain, deriving the theory that allows to incorporate a complex-valued graph shift operators (GSO) in the definition of graph filters (GF) and process complex-valued graph signals (GS). The theory developed can handle spatio-temporal complex network processes. We prove that complex-valued GCNs are stable with respect to perturbations of the underlying graph support, the bound of the transfer error and the bound of error propagation through multiply layers. Then we apply complex GCN to power grid state forecasting, power grid cyber-attack detection and localization.
△ Less
Submitted 22 September, 2022; v1 submitted 17 August, 2022;
originally announced August 2022.
-
Latency correction in sparse neuronal spike trains
Authors:
Thomas Kreuz,
Federico Senocrate,
Gloria Cecchini,
Curzio Checcucci,
Anna Letizia Allegra Mascaro,
Emilia Conti,
Alessandro Scaglione,
Francesco Saverio Pavone
Abstract:
Background: In neurophysiological data, latency refers to a global shift of spikes from one spike train to the next, either caused by response onset fluctuations or by finite propagation speed. Such systematic shifts in spike timing lead to a spurious decrease in synchrony which needs to be corrected. New Method: We propose a new algorithm of multivariate latency correction suitable for sparse dat…
▽ More
Background: In neurophysiological data, latency refers to a global shift of spikes from one spike train to the next, either caused by response onset fluctuations or by finite propagation speed. Such systematic shifts in spike timing lead to a spurious decrease in synchrony which needs to be corrected. New Method: We propose a new algorithm of multivariate latency correction suitable for sparse data for which the relevant information is not primarily in the rate but in the timing of each individual spike. The algorithm is designed to correct systematic delays while maintaining all other kinds of noisy disturbances. It consists of two steps, spike matching and distance minimization between the matched spikes using simulated annealing. Results: We show its effectiveness on simulated and real data: cortical propagation patterns recorded via calcium imaging from mice before and after stroke. Using simulations of these data we also establish criteria that can be evaluated beforehand in order to anticipate whether our algorithm is likely to yield a considerable improvement for a given dataset. Comparison with Existing Method(s): Existing methods of latency correction rely on adjusting peaks in rate profiles, an approach that is not feasible for spike trains with low firing in which the timing of individual spikes contains essential information. Conclusions: For any given dataset the criterion for applicability of the algorithm can be evaluated quickly and in case of a positive outcome the latency correction can be applied easily since the source codes of the algorithm are publicly available.
△ Less
Submitted 2 September, 2022; v1 submitted 19 May, 2022;
originally announced May 2022.
-
Spatio-Temporal Graph Convolutional Neural Networks for Physics-Aware Grid Learning Algorithms
Authors:
Tong Wu,
Ignacio Losada Carreno,
Anna Scaglione,
Daniel Arnold
Abstract:
This paper proposes a model-free Volt-VAR control (VVC) algorithm via the spatio-temporal graph ConvNet-based deep reinforcement learning (STGCN-DRL) framework, whose goal is to control smart inverters in an unbalanced distribution system. We first identify the graph shift operator (GSO) based on the power flow equations. Then, we develop a spatio-temporal graph ConvNet (STGCN), testing both recur…
▽ More
This paper proposes a model-free Volt-VAR control (VVC) algorithm via the spatio-temporal graph ConvNet-based deep reinforcement learning (STGCN-DRL) framework, whose goal is to control smart inverters in an unbalanced distribution system. We first identify the graph shift operator (GSO) based on the power flow equations. Then, we develop a spatio-temporal graph ConvNet (STGCN), testing both recurrent graph ConvNets (RGCN) and convolutional graph ConvNets (CGCN) architectures, aimed at capturing the spatiotemporal correlation of voltage phasors. The STGCN layer performs the feature extraction task for the policy function and the value function of the reinforcement learning architecture, and then we utilize the proximal policy optimization (PPO) to search the action spaces for an optimum policy function and to approximate an optimum value function. We further utilize the low-pass property of voltage graph signal to introduce an GCN architecture for the the policy whose input is a decimated state vector, i.e. a partial observation. Case studies on the unbalanced 123-bus systems validate the excellent performance of the proposed method in mitigating instabilities and maintaining nodal voltage profiles within a desirable range.
△ Less
Submitted 4 April, 2023; v1 submitted 30 March, 2022;
originally announced March 2022.
-
Adaptive Control of Distributed Energy Resources for Distribution Grid Voltage Stability
Authors:
Daniel Arnold,
Shammya Saha,
Sy-Toan Ngo,
Ciaran Roberts,
Anna Scaglione,
Nathan Johnson,
Sean Peisert,
David Pinney
Abstract:
Volt-VAR and Volt-Watt functionality in photovoltaic (PV) smart inverters provide mechanisms to ensure system voltage magnitudes and power factors remain within acceptable limits. However, these control functions can become unstable, introducing oscillations in system voltages when not appropriately configured or maliciously altered during a cyberattack. In the event that Volt-VAR and Volt-Watt co…
▽ More
Volt-VAR and Volt-Watt functionality in photovoltaic (PV) smart inverters provide mechanisms to ensure system voltage magnitudes and power factors remain within acceptable limits. However, these control functions can become unstable, introducing oscillations in system voltages when not appropriately configured or maliciously altered during a cyberattack. In the event that Volt-VAR and Volt-Watt control functions in a portion of PV smart inverters in a distribution grid are unstable, the proposed adaptation scheme utilizes the remaining and stably-behaving PV smart inverters and other Distributed Energy Resources to mitigate the effect of the instability. The adaptation mechanism is entirely decentralized, model-free, communication-free, and requires virtually no external configuration. We provide a derivation of the adaptive control approach and validate the algorithm in experiments on the IEEE 37 and 8500 node test feeders.
△ Less
Submitted 10 February, 2022;
originally announced February 2022.
-
Adam-based Augmented Random Search for Control Policies for Distributed Energy Resource Cyber Attack Mitigation
Authors:
Daniel Arnold,
Sy-Toan Ngo,
Ciaran Roberts,
Yize Chen,
Anna Scaglione,
Sean Peisert
Abstract:
Volt-VAR and Volt-Watt control functions are mechanisms that are included in distributed energy resource (DER) power electronic inverters to mitigate excessively high or low voltages in distribution systems. In the event that a subset of DER have had their Volt-VAR and Volt-Watt settings compromised as part of a cyber-attack, we propose a mechanism to control the remaining set of non-compromised D…
▽ More
Volt-VAR and Volt-Watt control functions are mechanisms that are included in distributed energy resource (DER) power electronic inverters to mitigate excessively high or low voltages in distribution systems. In the event that a subset of DER have had their Volt-VAR and Volt-Watt settings compromised as part of a cyber-attack, we propose a mechanism to control the remaining set of non-compromised DER to ameliorate large oscillations in system voltages and large voltage imbalances in real time. To do so, we construct control policies for individual non-compromised DER, directly searching the policy space using an Adam-based augmented random search (ARS). In this paper we show that, compared to previous efforts aimed at training policies for DER cybersecurity using deep reinforcement learning (DRL), the proposed approach is able to learn optimal (and sometimes linear) policies an order of magnitude faster than conventional DRL techniques (e.g., Proximal Policy Optimization).
△ Less
Submitted 27 January, 2022;
originally announced January 2022.
-
Differentially Private $K$-means Clustering Applied to Meter Data Analysis and Synthesis
Authors:
Nikhil Ravi,
Anna Scaglione,
Sachin Kadam,
Reinhard Gentz,
Sean Peisert,
Brent Lunghino,
Emmanuel Levijarvi,
Aram Shumavon
Abstract:
The proliferation of smart meters has resulted in a large amount of data being generated. It is increasingly apparent that methods are required for allowing a variety of stakeholders to leverage the data in a manner that preserves the privacy of the consumers. The sector is scrambling to define policies, such as the so called `15/15 rule', to respond to the need. However, the current policies fail…
▽ More
The proliferation of smart meters has resulted in a large amount of data being generated. It is increasingly apparent that methods are required for allowing a variety of stakeholders to leverage the data in a manner that preserves the privacy of the consumers. The sector is scrambling to define policies, such as the so called `15/15 rule', to respond to the need. However, the current policies fail to adequately guarantee privacy. In this paper, we address the problem of allowing third parties to apply $K$-means clustering, obtaining customer labels and centroids for a set of load time series by applying the framework of differential privacy. We leverage the method to design an algorithm that generates differentially private synthetic load data consistent with the labeled data. We test our algorithm's utility by answering summary statistics such as average daily load profiles for a 2-dimensional synthetic dataset and a real-world power load dataset.
△ Less
Submitted 22 April, 2022; v1 submitted 7 December, 2021;
originally announced December 2021.
-
Optimum Noise Mechanism for Differentially Private Queries in Discrete Finite Sets
Authors:
Sachin Kadam,
Anna Scaglione,
Nikhil Ravi,
Sean Peisert,
Brent Lunghino,
Aram Shumavon
Abstract:
The Differential Privacy (DP) literature often centers on meeting privacy constraints by introducing noise to the query, typically using a pre-specified parametric distribution model with one or two degrees of freedom. However, this emphasis tends to neglect the crucial considerations of response accuracy and utility, especially in the context of categorical or discrete numerical database queries,…
▽ More
The Differential Privacy (DP) literature often centers on meeting privacy constraints by introducing noise to the query, typically using a pre-specified parametric distribution model with one or two degrees of freedom. However, this emphasis tends to neglect the crucial considerations of response accuracy and utility, especially in the context of categorical or discrete numerical database queries, where the parameters defining the noise distribution are finite and could be chosen optimally. This paper addresses this gap by introducing a novel framework for designing an optimal noise Probability Mass Function (PMF) tailored to discrete and finite query sets. Our approach considers the modulo summation of random noise as the DP mechanism, aiming to present a tractable solution that not only satisfies privacy constraints but also minimizes query distortion. Unlike existing approaches focused solely on meeting privacy constraints, our framework seeks to optimize the noise distribution under an arbitrary $(ε, δ)$ constraint, thereby enhancing the accuracy and utility of the response. We demonstrate that the optimal PMF can be obtained through solving a Mixed-Integer Linear Program (MILP). Additionally, closed-form solutions for the optimal PMF are provided, minimizing the probability of error for two specific cases. Numerical experiments highlight the superior performance of our proposed optimal mechanisms compared to state-of-the-art methods. This paper contributes to the DP literature by presenting a clear and systematic approach to designing noise mechanisms that not only satisfy privacy requirements but also optimize query distortion. The framework introduced here opens avenues for improved privacy-preserving database queries, offering significant enhancements in response accuracy and utility.
△ Less
Submitted 8 April, 2024; v1 submitted 23 November, 2021;
originally announced November 2021.
-
Colored Noise Mechanism for Differentially Private Clustering
Authors:
Nikhil Ravi,
Anna Scaglione,
Sean Peisert
Abstract:
The goal of this paper is to propose and analyze a differentially private randomized mechanism for the $K$-means query. The goal is to ensure that the information received about the cluster-centroids is differentially private. The method consists in adding Gaussian noise with an optimum covariance. The main result of the paper is the analytical solution for the optimum covariance as a function of…
▽ More
The goal of this paper is to propose and analyze a differentially private randomized mechanism for the $K$-means query. The goal is to ensure that the information received about the cluster-centroids is differentially private. The method consists in adding Gaussian noise with an optimum covariance. The main result of the paper is the analytical solution for the optimum covariance as a function of the database. Comparisons with the state of the art prove the efficacy of our approach.
△ Less
Submitted 15 November, 2021;
originally announced November 2021.
-
A Parallel Distributed Algorithm for the Power SVD Method
Authors:
Jiaying Li,
Sissi Xiaoxiao Wu,
Qiang Li,
Anna Scaglione
Abstract:
In this work, we study how to implement a distributed algorithm for the power method in a parallel manner. As the existing distributed power method is usually sequentially updating the eigenvectors, it exhibits two obvious disadvantages: 1) when it calculates the $h$th eigenvector, it needs to wait for the results of previous $(h-1)$ eigenvectors, which causes a delay in acquiring all the eigenval…
▽ More
In this work, we study how to implement a distributed algorithm for the power method in a parallel manner. As the existing distributed power method is usually sequentially updating the eigenvectors, it exhibits two obvious disadvantages: 1) when it calculates the $h$th eigenvector, it needs to wait for the results of previous $(h-1)$ eigenvectors, which causes a delay in acquiring all the eigenvalues; 2) when calculating each eigenvector, it needs a certain cost of information exchange within the neighboring nodes for every power iteration, which could be unbearable when the number of eigenvectors or the number of nodes is large. This motivates us to propose a parallel distributed power method, which simultaneously calculates all the eigenvectors at each power iteration to ensure that more information could be exchanged in one shaking-hand of communication. We are particularly interested in the distributed power method for both an eigenvalue decomposition (EVD) and a singular value decomposition (SVD), wherein the distributed process is proceed based on a gossip algorithm. It can be shown that, under the same condition, the communication cost of the gossip-based parallel method is only $1/H$ times of that for the sequential counterpart, where $H$ is the number of eigenvectors we want to compute, while the convergence time and error performance of the proposed parallel method are both comparable to those of its sequential counterpart.
△ Less
Submitted 13 August, 2021;
originally announced August 2021.
-
Grid-Graph Signal Processing (Grid-GSP): A Graph Signal Processing Framework for the Power Grid
Authors:
Raksha Ramakrishna,
Anna Scaglione
Abstract:
The underlying theme of this paper is to explore the various facets of power systems data through the lens of graph signal processing (GSP), laying down the foundations of the Grid-GSP framework. Grid-GSP provides an interpretation for the spatio-temporal properties of voltage phasor measurements, by showing how the well-known power systems modeling supports a generative low-pass graph filter mode…
▽ More
The underlying theme of this paper is to explore the various facets of power systems data through the lens of graph signal processing (GSP), laying down the foundations of the Grid-GSP framework. Grid-GSP provides an interpretation for the spatio-temporal properties of voltage phasor measurements, by showing how the well-known power systems modeling supports a generative low-pass graph filter model for the state variables, namely the voltage phasors. Using the model we formalize the empirical observation that voltage phasor measurement data lie in a low-dimensional subspace and tie their spatio-temporal structure to generator voltage dynamics. The Grid-GSP generative model is then successfully employed to investigate the problems pertaining to the grid of data sampling and interpolation, network inference, detection of anomalies and data compression. Numerical results on a large synthetic grid that mimics the real-grid of the state of Texas, ACTIVSg2000, and on real-world measurements from ISO-New England verify the efficacy of applying Grid-GSP methods to electric grid data.
△ Less
Submitted 10 March, 2021;
originally announced March 2021.
-
Federated Block Coordinate Descent Scheme for Learning Global and Personalized Models
Authors:
Ruiyuan Wu,
Anna Scaglione,
Hoi-To Wai,
Nurullah Karakoc,
Kari Hreinsson,
Wing-Kin Ma
Abstract:
In federated learning, models are learned from users' data that are held private in their edge devices, by aggregating them in the service provider's "cloud" to obtain a global model. Such global model is of great commercial value in, e.g., improving the customers' experience. In this paper we focus on two possible areas of improvement of the state of the art. First, we take the difference between…
▽ More
In federated learning, models are learned from users' data that are held private in their edge devices, by aggregating them in the service provider's "cloud" to obtain a global model. Such global model is of great commercial value in, e.g., improving the customers' experience. In this paper we focus on two possible areas of improvement of the state of the art. First, we take the difference between user habits into account and propose a quadratic penalty-based formulation, for efficient learning of the global model that allows to personalize local models. Second, we address the latency issue associated with the heterogeneous training time on edge devices, by exploiting a hierarchical structure modeling communication not only between the cloud and edge devices, but also within the cloud. Specifically, we devise a tailored block coordinate descent-based computation scheme, accompanied with communication protocols for both the synchronous and asynchronous cloud settings. We characterize the theoretical convergence rate of the algorithm, and provide a variant that performs empirically better. We also prove that the asynchronous protocol, inspired by multi-agent consensus technique, has the potential for large gains in latency compared to a synchronous setting when the edge-device updates are intermittent. Finally, experimental results are provided that corroborate not only the theory, but also show that the system leads to faster convergence for personalized models on the edge devices, compared to the state of the art.
△ Less
Submitted 30 January, 2021; v1 submitted 27 December, 2020;
originally announced December 2020.
-
Lyapunov Stability of Smart Inverters Using Linearized DistFlow Approximation
Authors:
Shammya Shananda Saha,
Daniel Arnold,
Anna Scaglione,
Eran Schweitzer,
Ciaran Roberts,
Sean Peisert,
Nathan G. Johnson
Abstract:
Fast-acting smart inverters that utilize preset operating conditions to determine real and reactive power injection/consumption can create voltage instabilities (over-voltage, voltage oscillations and more) in an electrical distribution network if set-points are not properly configured. In this work, linear distribution power flow equations and droop-based Volt-Var and Volt-Watt control curves are…
▽ More
Fast-acting smart inverters that utilize preset operating conditions to determine real and reactive power injection/consumption can create voltage instabilities (over-voltage, voltage oscillations and more) in an electrical distribution network if set-points are not properly configured. In this work, linear distribution power flow equations and droop-based Volt-Var and Volt-Watt control curves are used to analytically derive a stability criterion using \lyapnouv analysis that includes the network operating condition. The methodology is generally applicable for control curves that can be represented as Lipschitz functions. The derived Lipschitz constants account for smart inverter hardware limitations for reactive power generation. A local policy is derived from the stability criterion that allows inverters to adapt their control curves by monitoring only local voltage, thus avoiding centralized control or information sharing with other inverters. The criterion is independent of the internal time-delays of smart inverters. Simulation results for inverters with and without the proposed stabilization technique demonstrate how smart inverters can mitigate voltage oscillations locally and mitigate real and reactive power flow disturbances at the substation under multiple scenarios. The study concludes with illustrations of how the control policy can dampen oscillations caused by solar intermittency and cyber-attacks.
△ Less
Submitted 18 November, 2020;
originally announced November 2020.
-
A Secure Distributed Ledger for Transactive Energy: The Electron Volt Exchange (EVE) Blockchain
Authors:
Shammya Saha,
Nikhil Ravi,
Kari Hreinsson,
Jaejong Baek,
Anna Scaglione,
Nathan G. Johnson
Abstract:
The adoption of blockchain for Transactive Energy has gained significant momentum as it allows mutually non-trusting agents to trade energy services in a trustless energy market. Research to date has assumed that the built-in Byzantine Fault Tolerance in recording transactions in a ledger is sufficient to ensure integrity. Such work must be extended to address security gaps including random bilate…
▽ More
The adoption of blockchain for Transactive Energy has gained significant momentum as it allows mutually non-trusting agents to trade energy services in a trustless energy market. Research to date has assumed that the built-in Byzantine Fault Tolerance in recording transactions in a ledger is sufficient to ensure integrity. Such work must be extended to address security gaps including random bilateral transactions that do not guarantee reliable and efficient market operation, and market participants having incentives to cheat when reporting actual production/consumption figures. Work herein introduces the Electron Volt Exchange framework with the following characteristics: 1) a distributed protocol for pricing and scheduling prosumers' production/consumption while kee** constraints and bids private, and 2) a distributed algorithm to prevent theft that verifies prosumers' compliance to scheduled transactions using information from grid sensors (such as smart meters) and mitigates the impact of false data injection attacks. Flexibility and robustness of the approach are demonstrated through simulation and implementation using Hyperledger Fabric.
△ Less
Submitted 13 November, 2020;
originally announced November 2020.
-
Deep Reinforcement Learning for DER Cyber-Attack Mitigation
Authors:
Ciaran Roberts,
Sy-Toan Ngo,
Alexandre Milesi,
Sean Peisert,
Daniel Arnold,
Shammya Saha,
Anna Scaglione,
Nathan Johnson,
Anton Kocheturov,
Dmitriy Fradkin
Abstract:
The increasing penetration of DER with smart-inverter functionality is set to transform the electrical distribution network from a passive system, with fixed injection/consumption, to an active network with hundreds of distributed controllers dynamically modulating their operating setpoints as a function of system conditions. This transition is being achieved through standardization of functionali…
▽ More
The increasing penetration of DER with smart-inverter functionality is set to transform the electrical distribution network from a passive system, with fixed injection/consumption, to an active network with hundreds of distributed controllers dynamically modulating their operating setpoints as a function of system conditions. This transition is being achieved through standardization of functionality through grid codes and/or international standards. DER, however, are unique in that they are typically neither owned nor operated by distribution utilities and, therefore, represent a new emerging attack vector for cyber-physical attacks. Within this work we consider deep reinforcement learning as a tool to learn the optimal parameters for the control logic of a set of uncompromised DER units to actively mitigate the effects of a cyber-attack on a subset of network DER.
△ Less
Submitted 28 September, 2020;
originally announced September 2020.
-
Integrating Hardware Security into a Blockchain-Based Transactive Energy Platform
Authors:
Shammya Shananda Saha,
Christopher Gorog,
Adam Moser,
Anna Scaglione,
Nathan G. Johnson
Abstract:
This applied research paper introduces a novel framework for integrating hardware security and blockchain functionality with grid-edge devices to establish a distributed cyber-security mechanism that verifies the provenance of messages to and from the devices. Expanding the idea of Two Factor Authentication and Hardware Root of Trust, this work describes the development of a Cryptographic Trust Ce…
▽ More
This applied research paper introduces a novel framework for integrating hardware security and blockchain functionality with grid-edge devices to establish a distributed cyber-security mechanism that verifies the provenance of messages to and from the devices. Expanding the idea of Two Factor Authentication and Hardware Root of Trust, this work describes the development of a Cryptographic Trust Center(TM) (CTC(TM)) chip integrated into grid-edge devices to create uniform cryptographic key management. Product managers, energy system designers, and security architects can utilize this modular framework as a unified approach to manage distributed devices of various vendors, vintages, and sizes. Results demonstrate the application of CTC(TM) to a blockchain-based Transactive Energy (TE) platform for provisioning of cryptographic keys and improved uniformity of the operational network and data management. This process of configuring, installing, and maintaining keys is described as Eco-Secure Provisioning(TM) (ESP(TM)). Laboratory test results show the approach can resolve several cyber-security gaps in common blockchain frameworks such as Hyperledger Fabric.
△ Less
Submitted 24 August, 2020;
originally announced August 2020.
-
A User Guide to Low-Pass Graph Signal Processing and its Applications
Authors:
Raksha Ramakrishna,
Hoi-To Wai,
Anna Scaglione
Abstract:
The notion of graph filters can be used to define generative models for graph data. In fact, the data obtained from many examples of network dynamics may be viewed as the output of a graph filter. With this interpretation, classical signal processing tools such as frequency analysis have been successfully applied with analogous interpretation to graph data, generating new insights for data science…
▽ More
The notion of graph filters can be used to define generative models for graph data. In fact, the data obtained from many examples of network dynamics may be viewed as the output of a graph filter. With this interpretation, classical signal processing tools such as frequency analysis have been successfully applied with analogous interpretation to graph data, generating new insights for data science. What follows is a user guide on a specific class of graph data, where the generating graph filters are low-pass, i.e., the filter attenuates contents in the higher graph frequencies while retaining contents in the lower frequencies. Our choice is motivated by the prevalence of low-pass models in application domains such as social networks, financial markets, and power systems. We illustrate how to leverage properties of low-pass graph filters to learn the graph topology or identify its community structure; efficiently represent graph data through sampling, recover missing measurements, and de-noise graph data; the low-pass property is also used as the baseline to detect anomalies.
△ Less
Submitted 3 August, 2020;
originally announced August 2020.
-
Physical Education and English Language Arts Based K-12 Engineering Outreach in Software Defined Networking (Extended Version)
Authors:
Gamze Ozogul,
Akhilesh S. Thyagaturu,
Martin Reisslein,
Anna Scaglione
Abstract:
K-12 engineering outreach has typically focused on elementary electrical and mechanical engineering or robot experiments integrated in science or math classes. In contrast, we propose a novel outreach program focusing on communication network principles that enable the ubiquitous web and smart-phone applications. We design outreach activities that illustrate the communication network principles th…
▽ More
K-12 engineering outreach has typically focused on elementary electrical and mechanical engineering or robot experiments integrated in science or math classes. In contrast, we propose a novel outreach program focusing on communication network principles that enable the ubiquitous web and smart-phone applications. We design outreach activities that illustrate the communication network principles through activities and team competitions in physical education (PE) as well as story writing and cartooning in English Language Arts (ELA) classes. The PE activities cover the principles of store-and-forward packet switching, Hypertext Transfer Protocol (HTTP) web page download, connection establishment in cellular wireless networks, as well as packet routing in Software-Defined Networking (SDN). The proposed outreach program has been formatively evaluated by K-12 teachers. A survey for the evaluation of the impact of the outreach program on the student perceptions, specifically, the students' interest, self-efficacy, utility, and negative stereotype perceptions towards communication network engineering, is also presented.
△ Less
Submitted 9 June, 2020;
originally announced June 2020.
-
Enhanced left/right asymmetry in reflection and transmission due to a periodic multilayer of a topological insulator and an anisotropic dielectric material
Authors:
Francesco Chiadini,
Vincenzo Fiumara,
Akhlesh Lakhtakia,
Antonio Scaglione
Abstract:
Very weak left/right asymmetry in reflection and transmission is offered by a layer of a topological insulator on top of a layer of an anisotropic dielectric material, but it can be enhanced very significantly by using a periodic multilayer of both types of materials. This is an attractive prospect for realizing one-way terahertz devices, because both types of materials can be grown using standard…
▽ More
Very weak left/right asymmetry in reflection and transmission is offered by a layer of a topological insulator on top of a layer of an anisotropic dielectric material, but it can be enhanced very significantly by using a periodic multilayer of both types of materials. This is an attractive prospect for realizing one-way terahertz devices, because both types of materials can be grown using standard physical-vapor-deposition techniques.
△ Less
Submitted 1 March, 2020;
originally announced March 2020.
-
Detection and Isolation of Adversaries in Decentralized Optimization for Non-Strongly Convex Objectives
Authors:
Nikhil Ravi,
Anna Scaglione
Abstract:
Decentralized optimization has found a significant utility in recent years, as a promising technique to overcome the curse of dimensionality when dealing with large-scale inference and decision problems in big data. While these algorithms are resilient to node and link failures, they however, are not inherently Byzantine fault-tolerant towards insider data injection attacks. This paper proposes a…
▽ More
Decentralized optimization has found a significant utility in recent years, as a promising technique to overcome the curse of dimensionality when dealing with large-scale inference and decision problems in big data. While these algorithms are resilient to node and link failures, they however, are not inherently Byzantine fault-tolerant towards insider data injection attacks. This paper proposes a decentralized robust subgradient push (RSGP) algorithm for detection and isolation of malicious nodes in the network for optimization non-strongly convex objectives. In the attack considered in this work, the malicious nodes follow the algorithmic protocols, but can alter their local functions arbitrarily. However, we show that in sufficiently structured problems, the method proposed is effective in revealing their presence. The algorithm isolates detected nodes from the regular nodes, thereby mitigating the ill-effects of malicious nodes. We also provide performance measures for the proposed method.
△ Less
Submitted 28 October, 2019;
originally announced October 2019.
-
Compound Guided Waves That Mix Characteristics of Surface-Plasmon-Polariton, Tamm, Dyakonov-Tamm, and Uller-Zenneck Waves
Authors:
Francisco Chiadini,
Vincenzo Fiumara,
Antonio Scaglione,
Akhlesh Lakhtakia
Abstract:
Solutions of the boundary-value problem for electromagnetic waves guided by a layer of a homogeneous and isotropic (metal or dielectric) material sandwiched between a structurally chiral material (SCM) and a periodically multi-layered isotropic dielectric (PMLID) material were numerically obtained and analyzed. If the sandwiched layer is sufficiently thick, the two bimaterial interfaces decouple f…
▽ More
Solutions of the boundary-value problem for electromagnetic waves guided by a layer of a homogeneous and isotropic (metal or dielectric) material sandwiched between a structurally chiral material (SCM) and a periodically multi-layered isotropic dielectric (PMLID) material were numerically obtained and analyzed. If the sandwiched layer is sufficiently thick, the two bimaterial interfaces decouple from each other, and each interface may guide one or more electromagnetic surface waves (ESWs) by itself. Depending on the constitution of the two materials that partner to form an interface, the ESWs can be classified as surface-plasmon-polarition (SPP) waves, Tamm waves, Dyakonov-Tamm waves, or Uller-Zenneck waves. When the sandwiched layer is sufficiently thin, the ESWs for single bimaterial interfaces coalesce to form compound guided waves (CGWs). The phase speeds, propagation distances, and spatial profiles of the electromagnetic fields of CGWs are different from those of the ESWs. The energy of a CGW is distributed in both the SCM and the PMLID material, if the sandwiched layer is sufficiently thin. Some CGWs require the sandwiched layer to have a minimum thickness. Indeed, the coupling between the two faces of the sandwiched layer is affected by the ratio of the thickness of the sandwiched layer to the skin depth in that material and the rates at which the fields of the ESWs guided individually by the two interfaces decay away from their respective guiding interfaces.
△ Less
Submitted 24 October, 2019;
originally announced October 2019.
-
Kee** Them Honest: a Trustless Multi-Agent Algorithm to Validate Transactions Cleared on Blockchain using Physical Sensors
Authors:
Nikhil Ravi,
Shammya Saha,
Anna Scaglione,
Nathan G. Johnson
Abstract:
In recent years, many Blockchain based frameworks for transacting commodities on a congestible network have been proposed. In particular, as the number of controllable grid connected assets increases, there is a need for a decentralized, coupled economic and control mechanism to dynamically balance the entire electric grid. Blockchain based Transactive Energy (TE) systems have gained significant m…
▽ More
In recent years, many Blockchain based frameworks for transacting commodities on a congestible network have been proposed. In particular, as the number of controllable grid connected assets increases, there is a need for a decentralized, coupled economic and control mechanism to dynamically balance the entire electric grid. Blockchain based Transactive Energy (TE) systems have gained significant momentum as an approach to sustain the reliability and security of the power grid in order to support the flexibility of electricity demand. What is lacking in these designs, however, is a mechanism that physically verifies all the energy transactions, to keep the various inherently selfish players honest. In this paper, we introduce a secure peer-to-peer network mechanism for the physical validation of economic transactions cleared over a distributed ledger. The framework is $\textit{secure}$ in the sense that selfish and malicious agents that are trying to inject false data into the network are prevented from adversely affecting the optimal functionality of the verification process by detecting and isolating them from the communication network. Preliminary simulations focusing on TE show the workings of this framework.
△ Less
Submitted 23 October, 2019;
originally announced October 2019.
-
A Framework for Generating Synthetic Distribution Feeders using OpenStreetMap
Authors:
Shammya Shananda Saha,
Eran Schweitzer,
Anna Scaglione,
Nathan G. Johnson
Abstract:
This work proposes a framework to generate synthetic distribution feeders mapped to real geo-spatial topologies using available OpenStreetMap data. The synthetic power networks can facilitate power systems research and development by providing thousands of realistic use cases. The location of substations is taken from recent efforts to develop synthetic transmission test cases, with underlying rea…
▽ More
This work proposes a framework to generate synthetic distribution feeders mapped to real geo-spatial topologies using available OpenStreetMap data. The synthetic power networks can facilitate power systems research and development by providing thousands of realistic use cases. The location of substations is taken from recent efforts to develop synthetic transmission test cases, with underlying real and reactive power in the distribution network assigned using population information gathered from United States 2010 Census block data. The methods illustrate how to create individual synthetic distribution feeders, and groups of feeders across entire ZIP Code, with minimal input data for any location in the United States. The framework also has the capability to output data in \OpenDSS format to allow further simulation and analysis.
△ Less
Submitted 16 October, 2019;
originally announced October 2019.
-
Inferring network structure and local dynamics from neuronal patterns with quenched disorder
Authors:
Ihusan Adam,
Gloria Cecchini,
Duccio Fanelli,
Thomas Kreuz,
Roberto Livi,
Matteo di Volo,
Anna Letizia Allegra Mascaro,
Emilia Conti,
Alessandro Scaglione,
Ludovico Silvestri,
Francesco Saverio Pavone
Abstract:
An inverse procedure is proposed and tested which aims at recovering the a priori unknown functional and structural information from global signals of living brains activity. To this end we consider a Leaky-Integrate and Fire (LIF) model with short term plasticity neurons, coupled via a directed network. Neurons are assigned a specific current value, which is heterogenous across the sample, and se…
▽ More
An inverse procedure is proposed and tested which aims at recovering the a priori unknown functional and structural information from global signals of living brains activity. To this end we consider a Leaky-Integrate and Fire (LIF) model with short term plasticity neurons, coupled via a directed network. Neurons are assigned a specific current value, which is heterogenous across the sample, and sets the firing regime in which the neuron is operating in. The aim of the method is to recover the distribution of incoming network degrees, as well as the distribution of the assigned currents, from global field measurements. The proposed approach to the inverse problem implements the reductionist Heterogenous Mean-Field approximation. This amounts in turn to organizing the neurons in different classes, depending on their associated degree and current. When tested again synthetic data, the method returns accurate estimates of the sought distributions, while managing to reproduce and interpolate almost exactly the time series of the supplied global field. Finally, we also applied the proposed technique to longitudinal wide-field fluorescence microscopy data of cortical functionality in groups of awake Thy1-GCaMP6f mice. Mice are induced a photothrombotic stroke in the primary motor cortex and their recovery monitored in time. An all-to-all LIF model which accommodates for currents heterogeneity allows to adequately explain the recorded patterns of activation. Altered distributions in neuron excitability are in particular detected, compatible with the phenomenon of hyperexcitability in the penumbra region after stroke.
△ Less
Submitted 13 October, 2019;
originally announced October 2019.
-
An Adversarial Model for Attack Vector Vulnerability Analysis on Power and Gas Delivery Operations
Authors:
Ignacio Losada Carreno,
Anna Scaglione,
Anatoly Zlotnik,
Deepjyoti Deka,
Kaarthik Sundar
Abstract:
Power systems often rely on natural gas pipeline networks to supply fuel for gas-fired generation. Market inefficiencies and a lack of formal coordination between the wholesale power and gas delivery infrastructures may magnify the broader impact of a cyber-attack on a natural gas pipeline. In this study we present a model that can be used to quantify the impact of cyber-attacks on electricity and…
▽ More
Power systems often rely on natural gas pipeline networks to supply fuel for gas-fired generation. Market inefficiencies and a lack of formal coordination between the wholesale power and gas delivery infrastructures may magnify the broader impact of a cyber-attack on a natural gas pipeline. In this study we present a model that can be used to quantify the impact of cyber-attacks on electricity and gas delivery operations. We model activation of cyber-attack vectors that attempt to gain access to pipeline gas compressor controls using a continuous-time Markov chain over a state space based on the gas operator Industrial Control System firewall zone partition. Our approach evaluates the operating states and decision-making in the networks using physically realistic and operationally representative models. We summarize these models, the sequence of analyses used to quantify the impacts of a cyber-incident, and propose a Monte Carlo simulation approach to quantify the resulting effect on the reliability of the bulk power system by the increase in operational cost. The methodology is applied to a case study of interacting power, gas, and cyber test networks.
△ Less
Submitted 8 October, 2019;
originally announced October 2019.
-
Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection
Authors:
Mahdi Jamei,
Anna Scaglione,
Sean Peisert
Abstract:
A significant portion of the literature on fault localization assumes (more or less explicitly) that there are sufficient reliable measurements to guarantee that the system is observable. While several heuristics exist to break the observability barrier, they mostly rely on recognizing spatio-temporal patterns, without giving insights on how the performance are tied with the system features and th…
▽ More
A significant portion of the literature on fault localization assumes (more or less explicitly) that there are sufficient reliable measurements to guarantee that the system is observable. While several heuristics exist to break the observability barrier, they mostly rely on recognizing spatio-temporal patterns, without giving insights on how the performance are tied with the system features and the sensor deployment. In this paper, we try to fill this gap and investigate the limitations and performance limits of fault localization using Phasor Measurement Units (PMUs), in the low measurements regime, i.e., when the system is unobservable with the measurements available. Our main contribution is to show how one can leverage the scarce measurements to localize different type of distribution line faults (three-phase, single-phase to ground, ...) at the level of sub-graph, rather than with the resolution of a line. We show that the resolution we obtain is strongly tied with the graph clustering notion in network science.
△ Less
Submitted 20 August, 2018;
originally announced September 2018.
-
Blind Community Detection from Low-rank Excitations of a Graph Filter
Authors:
Hoi-To Wai,
Santiago Segarra,
Asuman E. Ozdaglar,
Anna Scaglione,
Ali Jadbabaie
Abstract:
This paper considers a new framework to detect communities in a graph from the observation of signals at its nodes. We model the observed signals as noisy outputs of an unknown network process, represented as a graph filter that is excited by a set of unknown low-rank inputs/excitations. Application scenarios of this model include diffusion dynamics, pricing experiments, and opinion dynamics. Rath…
▽ More
This paper considers a new framework to detect communities in a graph from the observation of signals at its nodes. We model the observed signals as noisy outputs of an unknown network process, represented as a graph filter that is excited by a set of unknown low-rank inputs/excitations. Application scenarios of this model include diffusion dynamics, pricing experiments, and opinion dynamics. Rather than learning the precise parameters of the graph itself, we aim at retrieving the community structure directly. The paper shows that communities can be detected by applying a spectral method to the covariance matrix of graph signals. Our analysis indicates that the community detection performance depends on a `low-pass' property of the graph filter. We also show that the performance can be improved via a low-rank matrix plus sparse decomposition method when the latent parameter vectors are known. Numerical experiments demonstrate that our approach is effective.
△ Less
Submitted 12 April, 2019; v1 submitted 5 September, 2018;
originally announced September 2018.
-
Accelerating Incremental Gradient Optimization with Curvature Information
Authors:
Hoi-To Wai,
Wei Shi,
Cesar A. Uribe,
Angelia Nedich,
Anna Scaglione
Abstract:
This paper studies an acceleration technique for incremental aggregated gradient ({\sf IAG}) method through the use of \emph{curvature} information for solving strongly convex finite sum optimization problems. These optimization problems of interest arise in large-scale learning applications. Our technique utilizes a curvature-aided gradient tracking step to produce accurate gradient estimates inc…
▽ More
This paper studies an acceleration technique for incremental aggregated gradient ({\sf IAG}) method through the use of \emph{curvature} information for solving strongly convex finite sum optimization problems. These optimization problems of interest arise in large-scale learning applications. Our technique utilizes a curvature-aided gradient tracking step to produce accurate gradient estimates incrementally using Hessian information. We propose and analyze two methods utilizing the new technique, the curvature-aided IAG ({\sf CIAG}) method and the accelerated CIAG ({\sf A-CIAG}) method, which are analogous to gradient method and Nesterov's accelerated gradient method, respectively. Setting $κ$ to be the condition number of the objective function, we prove the $R$ linear convergence rates of $1 - \frac{4c_0 κ}{(κ+1)^2}$ for the {\sf CIAG} method, and $1 - \sqrt{\frac{c_1}{2κ}}$ for the {\sf A-CIAG} method, where $c_0,c_1 \leq 1$ are constants inversely proportional to the distance between the initial point and the optimal solution. When the initial iterate is close to the optimal solution, the $R$ linear convergence rates match with the gradient and accelerated gradient method, albeit {\sf CIAG} and {\sf A-CIAG} operate in an incremental setting with strictly lower computation complexity. Numerical experiments confirm our findings. The source codes used for this paper can be found on \url{http://github.com/hoitowai/ciag/}.
△ Less
Submitted 28 February, 2020; v1 submitted 31 May, 2018;
originally announced June 2018.
-
SUCAG: Stochastic Unbiased Curvature-aided Gradient Method for Distributed Optimization
Authors:
Hoi-To Wai,
Nikolaos M. Freris,
Angelia Nedic,
Anna Scaglione
Abstract:
We propose and analyze a new stochastic gradient method, which we call Stochastic Unbiased Curvature-aided Gradient (SUCAG), for finite sum optimization problems. SUCAG constitutes an unbiased total gradient tracking technique that uses Hessian information to accelerate con- vergence. We analyze our method under the general asynchronous model of computation, in which each function is selected infi…
▽ More
We propose and analyze a new stochastic gradient method, which we call Stochastic Unbiased Curvature-aided Gradient (SUCAG), for finite sum optimization problems. SUCAG constitutes an unbiased total gradient tracking technique that uses Hessian information to accelerate con- vergence. We analyze our method under the general asynchronous model of computation, in which each function is selected infinitely often with possibly unbounded (but sublinear) delay. For strongly convex problems, we establish linear convergence for the SUCAG method. When the initialization point is sufficiently close to the optimal solution, the established convergence rate is only dependent on the condition number of the problem, making it strictly faster than the known rate for the SAGA method. Furthermore, we describe a Markov-driven approach of implementing the SUCAG method in a distributed asynchronous multi-agent setting, via gossi** along a random walk on an undirected communication graph. We show that our analysis applies as long as the graph is connected and, notably, establishes an asymptotic linear convergence rate that is robust to the graph topology. Numerical results demonstrate the merits of our algorithm over existing methods.
△ Less
Submitted 26 October, 2018; v1 submitted 21 March, 2018;
originally announced March 2018.
-
Continuous Time Multi-stage Stochastic Reserve and Unit Commitment
Authors:
Kári Hreinsson,
Bita Analui,
Anna Scaglione
Abstract:
In this paper we introduce a continuous time multi stage stochastic optimization for scheduling generating units, their commitment, reserve capacities and their continuous time generation profiles in the day-ahead wholesale electricity market. Our formulation approximates the solution of a variational problem, in which the balance, generation capacity and ram** constraints are in continuous time…
▽ More
In this paper we introduce a continuous time multi stage stochastic optimization for scheduling generating units, their commitment, reserve capacities and their continuous time generation profiles in the day-ahead wholesale electricity market. Our formulation approximates the solution of a variational problem, in which the balance, generation capacity and ram** constraints are in continuous time. Due to the greater accuracy of our representation of ram** events this approach improves the system reliability and lowers the real-time cost.
△ Less
Submitted 19 March, 2018;
originally announced March 2018.
-
Curvature-aided Incremental Aggregated Gradient Method
Authors:
Hoi-To Wai,
Wei Shi,
Angelia Nedic,
Anna Scaglione
Abstract:
We propose a new algorithm for finite sum optimization which we call the curvature-aided incremental aggregated gradient (CIAG) method. Motivated by the problem of training a classifier for a d-dimensional problem, where the number of training data is $m$ and $m \gg d \gg 1$, the CIAG method seeks to accelerate incremental aggregated gradient (IAG) methods using aids from the curvature (or Hessian…
▽ More
We propose a new algorithm for finite sum optimization which we call the curvature-aided incremental aggregated gradient (CIAG) method. Motivated by the problem of training a classifier for a d-dimensional problem, where the number of training data is $m$ and $m \gg d \gg 1$, the CIAG method seeks to accelerate incremental aggregated gradient (IAG) methods using aids from the curvature (or Hessian) information, while avoiding the evaluation of matrix inverses required by the incremental Newton (IN) method. Specifically, our idea is to exploit the incrementally aggregated Hessian matrix to trace the full gradient vector at every incremental step, therefore achieving an improved linear convergence rate over the state-of-the-art IAG methods. For strongly convex problems, the fast linear convergence rate requires the objective function to be close to quadratic, or the initial point to be close to optimal solution. Importantly, we show that running one iteration of the CIAG method yields the same improvement to the optimality gap as running one iteration of the full gradient method, while the complexity is $O(d^2)$ for CIAG and $O(md)$ for the full gradient. Overall, the CIAG method strikes a balance between the high computation complexity incremental Newton-type methods and the slow IAG method. Our numerical results support the theoretical findings and show that the CIAG method often converges with much fewer iterations than IAG, and requires much shorter running time than IN when the problem dimension is high.
△ Less
Submitted 24 October, 2017;
originally announced October 2017.
-
Signatures of thermal hysteresis in Tamm-wave propagation
Authors:
Francesco Chiadini,
Vincenzo Fiumara,
Tom G. Mackay,
Antonio Scaglione,
Akhlesh Lakhtakia
Abstract:
We numerically solved the boundary-value problem for Tamm waves (which may also be classified as Uller-Zenneck waves here) guided by the planar interface of a homogeneous isotropic dissipative dielectric (HIDD) material and a periodically multilayered isotropic dielectric material. The HIDD material was chosen to be VO${}_2$ which, at optical wavelengths, has a temperature-dependent refractive ind…
▽ More
We numerically solved the boundary-value problem for Tamm waves (which may also be classified as Uller-Zenneck waves here) guided by the planar interface of a homogeneous isotropic dissipative dielectric (HIDD) material and a periodically multilayered isotropic dielectric material. The HIDD material was chosen to be VO${}_2$ which, at optical wavelengths, has a temperature-dependent refractive index with a hysteresis feature, i.e., the temperature-dependence of its refractive index varies depending upon whether the temperature is increasing or decreasing. A numerical code was implemented to extract solutions of the dispersion equation at a fixed wavelength for both $p$- and $s$-polarization states over the temperature range [50,80] degrees. A multitude of Tamm waves of both linear polarization states were found, demonstrating a clear demarcation of the heating and cooling phases in terms of wavenumbers and propagation distances. Thereby, the signatures of thermal hysteresis in Tamm-wave propagation were revealed.
△ Less
Submitted 25 September, 2017;
originally announced September 2017.
-
Anomaly Detection Using Optimally-Placed Micro-PMU Sensors in Distribution Grids
Authors:
Mahdi Jamei,
Anna Scaglione,
Ciaran Roberts,
Emma Stewart,
Sean Peisert,
Chuck McParland,
Alex McEachern
Abstract:
As the distribution grid moves toward a tightly-monitored network, it is important to automate the analysis of the enormous amount of data produced by the sensors to increase the operators situational awareness about the system. In this paper, focusing on Micro-Phasor Measurement Unit ($μ$PMU) data, we propose a hierarchical architecture for monitoring the grid and establish a set of analytics and…
▽ More
As the distribution grid moves toward a tightly-monitored network, it is important to automate the analysis of the enormous amount of data produced by the sensors to increase the operators situational awareness about the system. In this paper, focusing on Micro-Phasor Measurement Unit ($μ$PMU) data, we propose a hierarchical architecture for monitoring the grid and establish a set of analytics and sensor fusion primitives for the detection of abnormal behavior in the control perimeter. Due to the key role of the $μ$PMU devices in our architecture, a source-constrained optimal $μ$PMU placement is also described that finds the best location of the devices with respect to our rules. The effectiveness of the proposed methods are tested through the synthetic and real $μ$PMU data.
△ Less
Submitted 31 July, 2017;
originally announced August 2017.
-
Temperature-mediated transition from Dyakonov-Tamm surface waves to surface-plasmon-polariton waves
Authors:
Francesco Chiadini,
Vincenzo Fiumara,
Tom G. Mackay,
Antonio Scaglione,
Akhlesh Lakhtakia
Abstract:
The effect of changing the temperature on the propagation of electromagnetic surface waves (ESWs), guided by the planar interface of a homogeneous isotropic temperature-sensitive material (namely, InSb) and a temperature-insensitive structurally chiral material (SCM) was numerically investigated in the terahertz frequency regime. As the temperature rises, InSb transforms from a dissipative dielect…
▽ More
The effect of changing the temperature on the propagation of electromagnetic surface waves (ESWs), guided by the planar interface of a homogeneous isotropic temperature-sensitive material (namely, InSb) and a temperature-insensitive structurally chiral material (SCM) was numerically investigated in the terahertz frequency regime. As the temperature rises, InSb transforms from a dissipative dielectric material to a dissipative plasmonic material. Correspondingly, the ESWs transmute from Dyakonov-Tamm surface waves into surface-plasmon-polariton waves. The effects of the temperature change are clearly observed in the phase speeds, propagation distances, angular existence domains, multiplicity, and spatial profiles of energy flow of the ESWs. Remarkably large propagation distances can be achieved; in such instances the energy of an ESW is confined almost entirely within the SCM. For certain propagation directions, simultaneous excitation of two ESWs with (i) the same phase speeds but different propagation distances or (ii) the same propagation distances but different phase speeds are also indicated by our results.
△ Less
Submitted 19 July, 2017;
originally announced July 2017.
-
An Active Sequential Xampling Detector for Spectrum Sensing
Authors:
Lorenzo Ferrari,
Anna Scaglione
Abstract:
Enabling low power wireless devices to adopt Nyquist sampling at high carriers is prohibitive. In spectrum sensing, this limit calls for an analog front-end that can sweep different bands quickly, in order to use the available spectrum opportunistically. In this paper we propose a new framework that allows to optimize a sub-Nyquist sampling front-end to combine the benefits of optimum sequential s…
▽ More
Enabling low power wireless devices to adopt Nyquist sampling at high carriers is prohibitive. In spectrum sensing, this limit calls for an analog front-end that can sweep different bands quickly, in order to use the available spectrum opportunistically. In this paper we propose a new framework that allows to optimize a sub-Nyquist sampling front-end to combine the benefits of optimum sequential sensing with those of Compressive Spectrum Sensing (CSS). The sensing strategy we propose is formulated as a sequential utility optimization problem. The utility function decreases linearly with the number of measurements (accrued to make a decision) and increases as a function of the signal components binary states. The optimization selects the best linear combinations of sub-bands to mix, in order to accrue maximum utility. The structure of the utility represents the trade-off between exploration, exploitation and risk of making an error, that is characteristic of the spectrum sensing problem. We first present the analog front-end architecture, and then map the measurement model into the abstract optimization problem proposed, and analyzed, in the remainder of the paper. We characterize the optimal policy under constraints on the sensing matrix and derive the approximation factor of the greedy approach. Numerical simulations showcase the benefits of combining opportunistic spectrum sensing with sub-Nyquist sampling.
△ Less
Submitted 14 December, 2017; v1 submitted 16 May, 2017;
originally announced July 2017.
-
A Stochastic Model for Short-Term Probabilistic Forecast of Solar Photo-Voltaic Power
Authors:
Raksha Ramakrishna,
Anna Scaglione,
Vijay Vittal
Abstract:
In this paper, a stochastic model with regime switching is developed for solar photo-voltaic (PV) power in order to provide short-term probabilistic forecasts. The proposed model for solar PV power is physics inspired and explicitly incorporates the stochasticity due to clouds using different parameters addressing the attenuation in power.Based on the statistical behavior of parameters, a simple r…
▽ More
In this paper, a stochastic model with regime switching is developed for solar photo-voltaic (PV) power in order to provide short-term probabilistic forecasts. The proposed model for solar PV power is physics inspired and explicitly incorporates the stochasticity due to clouds using different parameters addressing the attenuation in power.Based on the statistical behavior of parameters, a simple regime-switching process between the three classes of sunny, overcast and partly cloudy is proposed. Then, probabilistic forecasts of solar PV power are obtained by identifying the present regime using PV power measurements and assuming persistence in this regime. To illustrate the technique developed, a set of solar PV power data from a single rooftop installation in California is analyzed and the effectiveness of the model in fitting the data and in providing short-term point and probabilistic forecasts is verified. The proposed forecast method outperforms a variety of reference models that produce point and probabilistic forecasts and therefore portrays the merits of employing the proposed approach.
△ Less
Submitted 16 September, 2017; v1 submitted 16 June, 2017;
originally announced June 2017.
-
Utility Maximizing Sequential Sensing Over a Finite Horizon
Authors:
Lorenzo Ferrari,
Qing Zhao,
Anna Scaglione
Abstract:
We consider the problem of optimally utilizing $N$ resources, each in an unknown binary state. The state of each resource can be inferred from state-dependent noisy measurements. Depending on its state, utilizing a resource results in either a reward or a penalty per unit time. The objective is a sequential strategy governing the decision of sensing and exploitation at each time to maximize the ex…
▽ More
We consider the problem of optimally utilizing $N$ resources, each in an unknown binary state. The state of each resource can be inferred from state-dependent noisy measurements. Depending on its state, utilizing a resource results in either a reward or a penalty per unit time. The objective is a sequential strategy governing the decision of sensing and exploitation at each time to maximize the expected utility (i.e., total reward minus total penalty and sensing cost) over a finite horizon $L$. We formulate the problem as a Partially Observable Markov Decision Process (POMDP) and show that the optimal strategy is based on two time-varying thresholds for each resource and an optimal selection rule for which resource to sense. Since a full characterization of the optimal strategy is generally intractable, we develop a low-complexity policy that is shown by simulations to offer near optimal performance. This problem finds applications in opportunistic spectrum access, marketing strategies and other sequential resource allocation problems.
△ Less
Submitted 16 May, 2017;
originally announced May 2017.
-
Convergence Results on Pulse Coupled Oscillator Protocols in Locally Connected Networks
Authors:
Lorenzo Ferrari,
Anna Scaglione,
Reinhard Gentz,
Yao-Win Peter Hong
Abstract:
This work provides new insights on the convergence of a locally connected network of pulse coupled oscillator (PCOs) (i.e., a bio-inspired model for communication networks) to synchronous and desynchronous states, and their implication in terms of the decentralized synchronization and scheduling in communication networks. Bio-inspired techniques have been advocated by many as fault-tolerant and sc…
▽ More
This work provides new insights on the convergence of a locally connected network of pulse coupled oscillator (PCOs) (i.e., a bio-inspired model for communication networks) to synchronous and desynchronous states, and their implication in terms of the decentralized synchronization and scheduling in communication networks. Bio-inspired techniques have been advocated by many as fault-tolerant and scalable alternatives to produce self-organization in communication networks. The PCO dynamics in particular have been the source of inspiration for many network synchronization and scheduling protocols. However, their convergence properties, especially in locally connected networks, have not been fully understood, prohibiting the migration into mainstream standards. This work provides further results on the convergence of PCOs in locally connected networks and the achievable convergence accuracy under propagation delays. For synchronization, almost sure convergence is proved for $3$ nodes and accuracy results are obtained for general locally connected networks whereas, for scheduling (or desynchronization), results are derived for locally connected networks with mild conditions on the overlap** set of maximal cliques. These issues have not been fully addressed before in the literature.
△ Less
Submitted 16 May, 2017;
originally announced May 2017.
-
The impact of random actions on opinion dynamics
Authors:
Amir Leshem,
Anna Scaglione
Abstract:
Opinion dynamics have fascinated researchers for centuries. The ability of societies to learn as well as the emergence of irrational {\it herding} are equally evident. The simplest example is that of agents that have to determine a binary action, under peer pressure coming from the decisions observed. By modifying several popular models for opinion dynamics so that agents internalize actions rathe…
▽ More
Opinion dynamics have fascinated researchers for centuries. The ability of societies to learn as well as the emergence of irrational {\it herding} are equally evident. The simplest example is that of agents that have to determine a binary action, under peer pressure coming from the decisions observed. By modifying several popular models for opinion dynamics so that agents internalize actions rather than smooth estimates of what other people think, we are able to prove that almost surely the actions final outcome remains random, even though actions can be consensual or polarized depending on the model. This is a theoretical confirmation that the mechanism that leads to the emergence of irrational herding behavior lies in the loss of nuanced information regarding the privately held beliefs behind the individuals decisions.
△ Less
Submitted 5 April, 2017;
originally announced April 2017.
-
Decentralized DC MicroGrid Monitoring and Optimization via Primary Control Perturbations
Authors:
Marko Angjelichinoski,
Anna Scaglione,
Petar Popovski,
Cedomir Stefanovic
Abstract:
We treat the emerging power systems with direct current (DC) MicroGrids, characterized with high penetration of power electronic converters. We rely on the power electronics to propose a decentralized solution for autonomous learning of and adaptation to the operating conditions of the DC Mirogrids; the goal is to eliminate the need to rely on an external communication system for such purpose. The…
▽ More
We treat the emerging power systems with direct current (DC) MicroGrids, characterized with high penetration of power electronic converters. We rely on the power electronics to propose a decentralized solution for autonomous learning of and adaptation to the operating conditions of the DC Mirogrids; the goal is to eliminate the need to rely on an external communication system for such purpose. The solution works within the primary droop control loops and uses only local bus voltage measurements. Each controller is able to estimate (i) the generation capacities of power sources, (ii) the load demands, and (iii) the conductances of the distribution lines. To define a well-conditioned estimation problem, we employ decentralized strategy where the primary droop controllers temporarily switch between operating points in a coordinated manner, following amplitude-modulated training sequences. We study the use of the estimator in a decentralized solution of the Optimal Economic Dispatch problem. The evaluations confirm the usefulness of the proposed solution for autonomous MicroGrid operation.
△ Less
Submitted 26 March, 2018; v1 submitted 30 March, 2017;
originally announced March 2017.
-
RIDS: Robust Identification of Sparse Gene Regulatory Networks from Perturbation Experiments
Authors:
Hoi-To Wai,
Anna Scaglione,
Uzi Harush,
Baruch Barzel,
Amir Leshem
Abstract:
Reconstructing the causal network in a complex dynamical system plays a crucial role in many applications, from sub-cellular biology to economic systems. Here we focus on inferring gene regulation networks (GRNs) from perturbation or gene deletion experiments. Despite their scientific merit, such perturbation experiments are not often used for such inference due to their costly experimental proced…
▽ More
Reconstructing the causal network in a complex dynamical system plays a crucial role in many applications, from sub-cellular biology to economic systems. Here we focus on inferring gene regulation networks (GRNs) from perturbation or gene deletion experiments. Despite their scientific merit, such perturbation experiments are not often used for such inference due to their costly experimental procedure, requiring significant resources to complete the measurement of every single experiment. To overcome this challenge, we develop the Robust IDentification of Sparse networks (RIDS) method that reconstructs the GRN from a small number of perturbation experiments. Our method uses the gene expression data observed in each experiment and translates that into a steady state condition of the system's nonlinear interaction dynamics. Applying a sparse optimization criterion, we are able to extract the parameters of the underlying weighted network, even from very few experiments. In fact, we demonstrate analytically that, under certain conditions, the GRN can be perfectly reconstructed using $K = Ω(d_{max})$ perturbation experiments, where $d_{max}$ is the maximum in-degree of the GRN, a small value for realistic sparse networks, indicating that RIDS can achieve high performance with a scalable number of experiments. We test our method on both synthetic and experimental data extracted from the DREAM5 network inference challenge. We show that the RIDS achieves superior performance compared to the state-of-the-art methods, while requiring as few as ~60% less experimental data. Moreover, as opposed to almost all competing methods, RIDS allows us to infer the directionality of the GRN links, allowing us to infer empirical GRNs, without relying on the commonly provided list of transcription factors.
△ Less
Submitted 20 December, 2016;
originally announced December 2016.
-
Dynamic Formulation for Multistage Stochastic Unit Commitment Problem
Authors:
Bita Analui,
Anna Scaglione
Abstract:
As net-load becomes less predictable there is a lot of pressure in changing decision models for power markets such that they account explicitly for future scenarios in making commitment decisions. This paper proposes to make commitment decisions using a dynamic multistage stochastic unit commitment formulation over a cohesive horizon that leverages a state-space model for the commitment variables.…
▽ More
As net-load becomes less predictable there is a lot of pressure in changing decision models for power markets such that they account explicitly for future scenarios in making commitment decisions. This paper proposes to make commitment decisions using a dynamic multistage stochastic unit commitment formulation over a cohesive horizon that leverages a state-space model for the commitment variables. We study the problem of constructing scenario tree approximations for both original and residual stochastic process and evaluate our algorithms on scenario tree libraries derived from real net-load data.
△ Less
Submitted 19 December, 2016;
originally announced December 2016.