Repository logo
Institutional Repository
Communities & Collections
Browse
Quick Links
  • Central Library
  • Digital Library
  • BHU Website
  • BHU Theses @ Shodhganga
  • BHU IRINS
  • Login
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Debottam Mukherjee"

Filter results by typing the first few letters
Now showing 1 - 3 of 3
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    PublicationArticle
    A Novel False Data Injection Attack Formulation Based on CUR Low-Rank Decomposition Method
    (Institute of Electrical and Electronics Engineers Inc., 2022) Debottam Mukherjee; Sandip Ghosh; Rakesh Kumar Misra
    State estimation algorithms deployed in modern grids are vulnerable towards false data injection attacks. This work demonstrates a novel attack vector (AV) formulation scheme by exploiting the low-rank subspace of the topology matrix. With constraints over the state deviation vector, this work showcases that the developed AV can effectively bypass the residue test for a demonstrated test bench. © 2010-2012 IEEE.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Optimum Design of a Renewable-Based Integrated Energy System in Autonomous Mode for a Remote Hilly Location in Northeastern India
    (MDPI, 2023) Samrat Chakraborty; Debottam Mukherjee; Pabitra Kumar Guchhait; Somudeep Bhattacharjee; Almoataz Youssef Abdelaziz; Adel El-Shahat
    Integration of a grid with an under-developed remote hilly area faces various technical and geographical challenges. Thus, generation of power from renewable resources in off-grid conditions has become one of the most cost-effective and reliable solutions for such areas. The present research deals with the possible application of an integrated solar/hydro/biomass/battery-based system to generate power in autonomous mode for a remote hilly town of a northeastern Indian state. Four different cases of the integrated energy system (IES) were designed using the hybrid optimization model for electric renewable (HOMER Pro), examining the performance of each case. The best combination of the integrated system was chosen out of several cases depending upon the optimized solution that can meet the load demand of the proposed hilly town sustainably, reliably and continuously. The simulation results show that the integrated battery/biomass/hydro/solar-based system is the best optimized, cheapest and most suitable solution to generate renewable-based power for the specified location, having the lowest net present cost (NPC) of USD 644,183.70 with a levelized cost of energy (COE) of 0.1282 USD/kWh. Further, the result also indicates that the optimized configuration reduces the emission of CO2 gas in the environment compared to the battery/biomass/hydro system having the worst emission rate. A sensitivity study was also carried out with variation in load, hydro stream flow and solar irradiation, respectively that may largely affect the technical as well as economical aspect of an integrated energy system. © 2023 by the authors.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Smart home energy management system under false data injection attack
    (John Wiley and Sons Ltd, 2020) Basant K. Sethi; Debottam Mukherjee; Devender Singh; Rakesh Kumar Misra; S.R. Mohanty
    Modern smart home energy management system (SHEMS) is naturally prone to cyber attack, hence it demands cyber attack resilient scheduling schemes. Current scenario of SHEMS may result in increased charging and discharging cycles deteriorating the battery life. Therefore, demand scheduling formulations also need to cater the effect of battery degradation cost along with user comfort. The present work attempts to formulate a comprehensive scheduling problem in terms of energy cost minimization considering the battery degradation cost. Further, a cyber attack resilient scheduling model is proposed in this study. This article investigates the effect of demand scheduling on the life span of battery as well as the energy cost. Further, false data injection attack (FDIA) has been modeled using machine learning techniques, and its effects on the scheduling has also been incorporated in the objective function. Scenario tree based stochastic bill generation has been also formulated to develop an FDIA resilient scheduling. Optimisation results of the study have established that the resulting formulation is robust against FDI attacks. © 2020 John Wiley & Sons Ltd
An Initiative by BHU – Central Library
Powered by Dspace