Patents by Inventor Arun VEERAMANY
Arun VEERAMANY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11894680Abstract: Apparatus and methods are disclosed for solving Mixed Integer Programming (MIP) problems, such as Security Constrained Unit Commitment (SCUC) problems used by power grid authorities to perform day-ahead market clearing. In certain examples, a plurality of threads of a software tool implementing a concurrent optimizer can be executed concurrently and sequentially to generate new solutions to a SCUC problem for an upcoming planning horizon. Data can be shared among the concurrently executing threads, such as intermediate/incumbent solutions and hints regarding the fixing of variables and constraints to reduce the size of the SCUC problem. In some examples, the threads are seeded with historical solutions from prior planning horizons. The software tool can select a best solution from the solutions generated by the threads, and determine dispatch instructions for a device coupled to the power grid for the upcoming planning horizon based at least in part on the selected solution.Type: GrantFiled: March 15, 2019Date of Patent: February 6, 2024Assignees: Battelle Memorial Instutute, Midcontinent Independent System Operator, Inc.Inventors: Feng Pan, Jesse T. Holzer, Yonghong Chen, Arun Veeramany
-
Publication number: 20230410228Abstract: Fast simultaneous feasibility testing (SFT) for management of an electrical power grid is achieved through various innovations. The computation problem relates to evaluation of candidate solutions for external power flows into a power grid, with respect to predetermined constraints and contingencies. A perturbation approach with precomputation is extended to encompass grid states (e.g. time periods) in addition to contingencies. Advantages derive from: fewer factorizations or inversions of large matrices; decoupling of state-dependent and contingency-dependent perturbations, leaving relatively few perturbations jointly dependent on both state and contingency; or making approximations by discarding small jointly dependent terms. Significant computation reductions allow a single workstation to perform SFT for 36 hours of a day-ahead cycle.Type: ApplicationFiled: June 21, 2022Publication date: December 21, 2023Applicant: Battelle Memorial InstituteInventors: Jesse T. Holzer, Yonghong Chen, Zhongyu Wu, Feng Pan, Arun Veeramany
-
Patent number: 11206287Abstract: Technology related to evaluating cyber-risk for synchrophasor systems is disclosed. In one example of the disclosed technology, a method includes generating an event tree model of a timing-attack on a synchrophasor system architecture. The event tree model can be based on locations and types of timing-attacks, an attack likelihood, vulnerabilities and detectability along a scenario path, and consequences of the timing-attack. A cyber-risk score of the synchrophasor system architecture can be determined using the event tree model. The synchrophasor system architecture can be adapted in response to the cyber-risk score.Type: GrantFiled: January 29, 2019Date of Patent: December 21, 2021Assignee: Battelle Memorial InstituteInventors: Seemita Pal, Arun Veeramany, Christopher A. Bonebrake, Beverly E. Johnson, William James Hutton, III, Siddharth Sridhar, Sri Nikhil Gupta Gourisetti, Garill A. Coles
-
Patent number: 11206278Abstract: Technology related to risk-informed autonomous adaptive cyber controllers is disclosed. In one example of the disclosed technology, a method includes generating probabilities of a cyber-attack occurring along an attack surface of a network. The probabilities can be generated using sensor and operational data of a network as inputs to an attack graph. The risk scores can be determined using a plurality of fault trees and the generated probabilities from the attack graph. The respective risk scores can correspond to respective nodes of an event tree. The event tree and the determined risk scores can be used to determine risk estimates for a plurality of configurations of the network. The risk estimates for the plurality of configurations of the network can be used to reconfigure the network to reduce a risk from the cyber-attack.Type: GrantFiled: June 5, 2019Date of Patent: December 21, 2021Assignee: Battelle Memorial InstituteInventors: Arun Veeramany, William James Hutton, III, Siddharth Sridhar, Sri Nikhil Gupta Gourisetti, Garill A. Coles, Mark J. Rice, Paul M. Skare, David O. Manz, Jeffery E. Dagle, Stephen D. Unwin
-
Publication number: 20200244698Abstract: Technology related to evaluating cyber-risk for synchrophasor systems is disclosed. In one example of the disclosed technology, a method includes generating an event tree model of a timing-attack on a synchrophasor system architecture. The event tree model can be based on locations and types of timing-attacks, an attack likelihood, vulnerabilities and detectability along a scenario path, and consequences of the timing-attack. A cyber-risk score of the synchrophasor system architecture can be determined using the event tree model. The synchrophasor system architecture can be adapted in response to the cyber-risk score.Type: ApplicationFiled: January 29, 2019Publication date: July 30, 2020Applicant: Battelle Memorial InstituteInventors: Seemita Pal, Arun Veeramany, Christopher A. Bonebrake, Beverly E. Johnson, William James Hutton, III, Siddharth Sridhar, Sri Nikhil Gupta Gourisetti, Garill A. Coles
-
Publication number: 20200244691Abstract: Technology related to risk-informed autonomous adaptive cyber controllers is disclosed. In one example of the disclosed technology, a method includes generating probabilities of a cyber-attack occurring along an attack surface of a network. The probabilities can be generated using sensor and operational data of a network as inputs to an attack graph. The risk scores can be determined using a plurality of fault trees and the generated probabilities from the attack graph. The respective risk scores can correspond to respective nodes of an event tree. The event tree and the determined risk scores can be used to determine risk estimates for a plurality of configurations of the network. The risk estimates for the plurality of configurations of the network can be used to reconfigure the network to reduce a risk from the cyber-attack.Type: ApplicationFiled: June 5, 2019Publication date: July 30, 2020Applicant: Battelle Memorial InstituteInventors: Arun Veeramany, William James Hutton, III, Siddharth Sridhar, Sri Nikhil Gupta Gourisetti, Garill A. Coles, Mark J. Rice, Paul M. Skare, David O. Manz, Jeffery E. Dagle, Stephen D. Unwin
-
Publication number: 20190286993Abstract: Apparatus and methods are disclosed for solving Mixed Integer Programming (MIP) problems, such as Security Constrained Unit Commitment (SCUC) problems used by power grid authorities to perform day-ahead market clearing. In certain examples, a plurality of threads of a software tool implementing a concurrent optimizer can be executed concurrently and sequentially to generate new solutions to a SCUC problem for an upcoming planning horizon. Data can be shared among the concurrently executing threads, such as intermediate/incumbent solutions and hints regarding the fixing of variables and constraints to reduce the size of the SCUC problem. In some examples, the threads are seeded with historical solutions from prior planning horizons. The software tool can select a best solution from the solutions generated by the threads, and determine dispatch instructions for a device coupled to the power grid for the upcoming planning horizon based at least in part on the selected solution.Type: ApplicationFiled: March 15, 2019Publication date: September 19, 2019Inventors: Feng Pan, Jesse T. Holzer, Yonghong Chen, Edward Rothberg, Arun Veeramany
-
Publication number: 20130253975Abstract: A method for determining a risk of mechanical or electrical failure and for determining an inspection interval to mitigate said risk; the method including determining by a computer system an acceptable risk score based on computer readable instructions provided on a non-transitory computer readable medium, determining by said computer system an increase in risk score based on an elapsed time since a deficiency identified in a previous inspection has not yet been rectified, determining by said computer system an inspection interval based on said risk score, determining by said computer system a tolerance within said inspection interval based on said increased risk; and, specifying by said computer system an inspection interval and an inspection tolerance based on said determined schedule and said determined tolerance.Type: ApplicationFiled: May 15, 2013Publication date: September 26, 2013Applicant: Technical Standards And Safety AuthorityInventors: Srikanth MANGALAM, Lency Abraham MULAMOOTIL, Arun VEERAMANY, David WITT, Rene KARAVAS
-
Publication number: 20130253974Abstract: A method for determining a risk of mechanical or electrical failure and for determining an inspection interval to mitigate said risk; the method including determining by a computer system an acceptable risk score based on computer readable instructions provided on a non-transitory computer readable medium, determining by said computer system an inspection interval based on said risk score, determining by said computer system a tolerance within said inspection interval based on said increased risk; and, specifying by said computer system an inspection interval and an inspection tolerance based on said determined schedule and said determined tolerance.Type: ApplicationFiled: May 15, 2013Publication date: September 26, 2013Applicant: Technical Standards And Safety AuthorityInventors: Srikanth MANGALAM, Lency Abraham MULAMOOTIL, Arun VEERAMANY