Communication Systems for Load Management

1985 ◽  
Vol PAS-104 (12) ◽  
pp. 3329-3337 ◽  
Author(s):  
Yosef S. Sherif ◽  
Saif S. Zahir
Energies ◽  
2020 ◽  
Vol 13 (17) ◽  
pp. 4331
Author(s):  
Kostas Hatalis ◽  
Chengbo Zhao ◽  
Parv Venkitasubramaniam ◽  
Larry Snyder ◽  
Shalinee Kishore ◽  
...  

Demand-Side Management (DSM) is an essential tool to ensure power system reliability and stability. In future smart grids, certain portions of a customer’s load usage could be under the automatic control of a cyber-enabled DSM program, which selectively schedules loads as a function of electricity prices to improve power balance and grid stability. In this scenario, the security of DSM cyberinfrastructure will be critical as advanced metering infrastructure and communication systems are susceptible to cyber-attacks. Such attacks, in the form of false data injections, can manipulate customer load profiles and cause metering chaos and energy losses in the grid. The feedback mechanism between load management on the consumer side and dynamic price schemes employed by independent system operators can further exacerbate attacks. To study how this feedback mechanism may worsen attacks in future cyber-enabled DSM programs, we propose a novel mathematical framework for (i) modeling the nonlinear relationship between load management and real-time pricing, (ii) simulating residential load data and prices, (iii) creating cyber-attacks, and (iv) detecting said attacks. In this framework, we first develop time-series forecasts to model load demand and use them as inputs to an elasticity model for the price-demand relationship in the DSM loop. This work then investigates the behavior of such a feedback loop under intentional cyber-attacks. We simulate and examine load-price data under different DSM-participation levels with three types of random additive attacks: ramp, sudden, and point attacks. We conduct two investigations for the detection of DSM attacks. The first studies a supervised learning approach, with various classification models, and the second studies the performance of parametric and nonparametric change point detectors. Results conclude that higher amounts of DSM participation can exacerbate ramp and sudden attacks leading to better detection of such attacks, especially with supervised learning classifiers. We also find that nonparametric detection outperforms parametric for smaller user pools, and random point attacks are the hardest to detect with any method.


1985 ◽  
Vol PER-5 (12) ◽  
pp. 26-26
Author(s):  
Yosef S. Sherif ◽  
Saif S. Zahir

Author(s):  
Kostas Hatalis ◽  
Chengbo Zhao ◽  
Parv Venkitasubramaniam ◽  
Larry Snyder ◽  
Shalinee Kishore ◽  
...  

Demand-Side Management (DSM) is an essential tool to ensure power system reliability and stability. In future smart grids, certain portions of a customer’s load usage could be under the automatic control of a cyber-enabled DSM program, which selectively schedules loads as a function of electricity prices to improve power balance and grid stability. In this scenario, the security of DSM cyberinfrastructure will be critical as advanced metering infrastructure and communication systems are susceptible to cyber-attacks. Such attacks, in the form of false data injections, can manipulate customer load profiles and cause metering chaos and energy losses in the grid. The feedback mechanism between load management on the consumer side and dynamic price schemes employed by independent system operators can further exacerbate attacks. To study how this feedback mechanism may worsen attacks in future cyber-enabled DSM programs, we propose a novel mathematical framework for (i) modeling the nonlinear relationship between load management and real-time pricing, (ii) simulating residential load data and prices, (iii) creating cyber-attacks, and (iv) detecting said attacks. In this framework, we first develop time-series forecasts to model load demand and use them as inputs to an elasticity model for the price-demand relationship in the DSM loop. This work then investigates the behavior of such a feedback loop under intentional cyber-attacks. We simulate and examine load-price data under different DSM-participation levels with three types of random additive attacks: ramp, sudden, and point attacks. We conduct two investigations for the detection of DSM attacks. The first studies a supervised learning approach, with various classification models, and the second studies the performance of parametric and nonparametric change point detectors. Results conclude that higher amounts of DSM participation can exacerbate ramp and sudden attacks leading to better detection of such attacks, especially with supervised learning classifiers. We also find that nonparametric detection outperforms parametric for smaller user pools, and random point attacks are the hardest to detect with any method.


2015 ◽  
Vol 58 ◽  
pp. 115-131 ◽  
Author(s):  
Ayane Motomitsu ◽  
Shinichiro Sawa ◽  
Takashi Ishida

The ligand–receptor-based cell-to-cell communication system is one of the most important molecular bases for the establishment of complex multicellular organisms. Plants have evolved highly complex intercellular communication systems. Historical studies have identified several molecules, designated phytohormones, that function in these processes. Recent advances in molecular biological analyses have identified phytohormone receptors and signalling mediators, and have led to the discovery of numerous peptide-based signalling molecules. Subsequent analyses have revealed the involvement in and contribution of these peptides to multiple aspects of the plant life cycle, including development and environmental responses, similar to the functions of canonical phytohormones. On the basis of this knowledge, the view that these peptide hormones are pivotal regulators in plants is becoming increasingly accepted. Peptide hormones are transcribed from the genome and translated into peptides. However, these peptides generally undergo further post-translational modifications to enable them to exert their function. Peptide hormones are expressed in and secreted from specific cells or tissues. Apoplastic peptides are perceived by specialized receptors that are located at the surface of target cells. Peptide hormone–receptor complexes activate intracellular signalling through downstream molecules, including kinases and transcription factors, which then trigger cellular events. In this chapter we provide a comprehensive summary of the biological functions of peptide hormones, focusing on how they mature and the ways in which they modulate plant functions.


2020 ◽  
Vol 29 (2) ◽  
pp. 586-596 ◽  
Author(s):  
Kaitlyn A. Clarke ◽  
Diane L. Williams

Purpose The aim of this research study was to examine common practices of speech-language pathologists (SLPs) who work with children with autism spectrum disorder (ASD) with respect to whether or not SLPs consider processing differences in ASD or the effects of input during their instruction. Method Following a qualitative research method, how SLPs instruct and present augmentative and alternative communication systems to individuals with ASD, their rationale for method selection, and their perception of the efficacy of selected interventions were probed. Semistructured interviews were conducted as part of an in-depth case report with content analysis. Results Based on completed interviews, 4 primary themes were identified: (a) instructional method , (b) input provided , (c) decision-making process , and (d) perceived efficacy of treatment . Additionally, one secondary theme, training and education received , was identified . Conclusions Clinicians reported making decisions based on the needs of the child; however, they also reported making decisions based on the diagnostic category that characterized the child (i.e., ASD). The use of modeling when teaching augmentative and alternative communication to individuals with ASD emerged as a theme, but variations in the method of modeling were noted. SLPs did not report regularly considering processing differences in ASD, nor did they consider the effects of input during instruction.


Sign in / Sign up

Export Citation Format

Share Document