Skip to main content

Showing 1–11 of 11 results for author: Sou, K C

.
  1. arXiv:2406.11332  [pdf, other

    math.OC eess.SY

    Joint Distributed Generation Maximization and Radial Distribution Network Reconfiguration

    Authors: Kin Cheong Sou, Gabriel Malmer, Lovisa Thorin, Olof Samuelsson

    Abstract: This paper studies an optimization problem for joint radial distribution system network reconfiguration and power dispatch for distributed generation (DG) maximization. We provide counterexamples to show that for DG maximization, standard techniques such as interior point method (as in Matpower), linear approximation and second order cone relaxation (e.g., by Jabr et.~al.~and by Farivar and Low) d… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2309.01509  [pdf, other

    math.OC

    Distributed Online Optimization with Coupled Inequality Constraints over Unbalanced Directed Networks

    Authors: Dandan Wang, Daokuan Zhu, Kin Cheong Sou, Jie Lu

    Abstract: This paper studies a distributed online convex optimization problem, where agents in an unbalanced network cooperatively minimize the sum of their time-varying local cost functions subject to a coupled inequality constraint. To solve this problem, we propose a distributed dual subgradient tracking algorithm, called DUST, which attempts to optimize a dual objective by means of tracking the primal c… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  3. arXiv:2307.12277  [pdf, other

    eess.SY math.OC

    Resilient Scheduling of Control Software Updates in Radial Power Distribution Systems

    Authors: Kin Cheong Sou, Henrik Sandberg

    Abstract: In response to newly found security vulnerabilities, or as part of a moving target defense, a fast and safe control software update scheme for networked control systems is highly desirable. We here develop such a scheme for intelligent electronic devices (IEDs) in power distribution systems, which is a solution to the so-called software update rollout problem. This problem seeks to minimize the ma… ▽ More

    Submitted 23 July, 2023; originally announced July 2023.

  4. arXiv:1811.05156  [pdf, other

    math.OC

    Protection Placement for State Estimation Measurement Data Integrity

    Authors: Kin Cheong Sou

    Abstract: In this paper a protection placement problem for power network measurement system data integrity is considered. The placement problem is motivated from the data secure power network design applications in [Dan and Sandberg 2010]. The problem is shown to be NP-hard and an integer linear programming formulation is provided based on the topological observability condition by [Krumpholz, Clements and… ▽ More

    Submitted 13 November, 2018; originally announced November 2018.

  5. arXiv:1603.04996  [pdf, ps, other

    math.OC

    Relaxed Connected Dominating Set Problem with Application to Secure Power Network Design

    Authors: Kin Cheong Sou, Jie Lu

    Abstract: This paper investigates a combinatorial optimization problem motived from a secure power network design application in [Dán and Sandberg 2010]. Two equivalent graph optimization formulations are derived. One of the formulations is a relaxed version of the connected dominating set problem, and hence the considered problem is referred to as relaxed connected dominating set (RCDS) problem. The RCDS p… ▽ More

    Submitted 27 February, 2017; v1 submitted 16 March, 2016; originally announced March 2016.

  6. arXiv:1511.08927  [pdf, ps, other

    math.OC

    A Branch-Decomposition Approach to Power Network Design

    Authors: Kin Cheong Sou

    Abstract: This paper proposes a procedure to solve combinatorial power network design problems such as phasor measurement unit (PMU) placement and protection assignment against cyber-physical attacks. The proposed approach tackles the design problems through solving a dominating set problem on the power network graph. A combined branch-decomposition and dynamic programming procedure is applied to solve the… ▽ More

    Submitted 18 February, 2016; v1 submitted 28 November, 2015; originally announced November 2015.

  7. arXiv:1503.04753  [pdf, ps, other

    cs.DS

    Minimum Equivalent Precedence Relation Systems

    Authors: Kin Cheong Sou

    Abstract: In this paper two related simplification problems for systems of linear inequalities describing precedence relation systems are considered. Given a precedence relation system, the first problem seeks a minimum subset of the precedence relations (i.e., inequalities) which has the same solution set as that of the original system. The second problem is the same as the first one except that the ``subs… ▽ More

    Submitted 13 March, 2015; originally announced March 2015.

  8. arXiv:1501.02973  [pdf, ps, other

    cs.IT

    D2D-based V2V Communications with Latency and Reliability Constraints

    Authors: Wanlu Sun, Erik G. Ström, Fredrik Brännström, Yutao Sui, Kin Cheong Sou

    Abstract: Direct device-to-device (D2D) communication has been proposed as a possible enabler for vehicle-to-vehicle (V2V) applications, where the incurred intra-cell interference and the stringent latency and reliability requirements are challenging issues. In this paper, we investigate the radio resource management problem for D2D-based V2V communications. Firstly, we analyze and mathematically model the… ▽ More

    Submitted 13 January, 2015; originally announced January 2015.

  9. arXiv:1204.6174  [pdf, ps, other

    math.OC eess.SY

    Efficient Computations of a Security Index for False Data Attacks in Power Networks

    Authors: Julien M. Hendrickx, Karl Henrik Johansson, Raphael M. Jungers, Henrik Sandberg, Kin Cheong Sou

    Abstract: The resilience of Supervisory Control and Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks is considered. We analyze the vulnerability of the measurement system to false data attack on communicated measurements. The vulnerability analysis problem is shown to be NP-hard, meaning that unless $P = NP$ there is no polynomial time algorithm to analyze the vulnerabi… ▽ More

    Submitted 15 February, 2013; v1 submitted 27 April, 2012; originally announced April 2012.

  10. arXiv:1201.5019  [pdf, ps, other

    math.OC cs.CE eess.SY

    On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem

    Authors: Kin Cheong Sou, Henrik Sandberg, Karl Henrik Johansson

    Abstract: This paper considers a smart grid cyber-security problem analyzing the vulnerabilities of electric power networks to false data attacks. The analysis problem is related to a constrained cardinality minimization problem. The main result shows that an $l_1$ relaxation technique provides an exact optimal solution to this cardinality minimization problem. The proposed result is based on a polyhedral c… ▽ More

    Submitted 17 September, 2012; v1 submitted 22 December, 2011; originally announced January 2012.

  11. arXiv:1201.0469  [pdf, ps, other

    cs.CE

    Computing Critical $k$-tuples in Power Networks

    Authors: Kin Cheong Sou, Henrik Sandberg, Karl Henrik Johansson

    Abstract: In this paper the problem of finding the sparsest (i.e., minimum cardinality) critical $k$-tuple including one arbitrarily specified measurement is considered. The solution to this problem can be used to identify weak points in the measurement set, or aid the placement of new meters. The critical $k$-tuple problem is a combinatorial generalization of the critical measurement calculation problem. U… ▽ More

    Submitted 2 January, 2012; originally announced January 2012.