This document describes a machine learning toolkit called UMLPSE that has been developed to facilitate power systems security analysis and contingency analysis. UMLPSE has a modular structure combining independent power flow and machine learning tool packages. It incorporates a data warehouse to store operating point data and contingency analysis results. The toolkit is applied to assess contingencies on the power grid of Crete, Greece involving 61 buses and 78 lines. It uses various operating points simulated through different connectivity, load, and generation scenarios to train machine learning models to automatically rank contingencies by risk for new operating points.
Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...IDES Editor
Cloud computing is an emerging computing
paradigm. It aims to share data, resources and services
transparently among users of a massive grid. Although the
industry has started selling cloud-computing products,
research challenges in various areas, such as architectural
design, task decomposition, task distribution, load
distribution, load scheduling, task coordination, etc. are still
unclear. Therefore, we study the methods to reason and model
cloud computing as a step towards identifying fundamental
research questions in this paradigm. In this paper, we propose
a model for load distribution on cloud computing by modeling
them as cognitive systems and using aspects which not only
depend on the present state of the system, but also, on a set of
predefined transitions and conditions. The entirety of this
model is then bundled to cater the task of job distribution
using the concept of application metadata. Later, we draw a
qualitative and simulation based summarization for the
proposed model. We finally evaluate the results and draw up
a series of key conclusions in cloud computing for future
exploration.
Survey on deep learning applied to predictive maintenance IJECEIAES
Prognosis health monitoring (PHM) plays an increasingly important role in the management of machines and manufactured products in today’s industry, and deep learning plays an important part by establishing the optimal predictive maintenance policy. However, traditional learning methods such as unsupervised and supervised learning with standard architectures face numerous problems when exploiting existing data. Therefore, in this essay, we review the significant improvements in deep learning made by researchers over the last 3 years in solving these difficulties. We note that researchers are striving to achieve optimal performance in estimating the remaining useful life (RUL) of machine health by optimizing each step from data to predictive diagnostics. Specifically, we outline the challenges at each level with the type of improvement that has been made, and we feel that this is an opportunity to try to select a state-of-the-art architecture that incorporates these changes so each researcher can compare with his or her model. In addition, post-RUL reasoning and the use of distributed computing with cloud technology is presented, which will potentially improve the classification accuracy in maintenance activities. Deep learning will undoubtedly prove to have a major impact in upgrading companies at the lowest cost in the new industrial revolution, Industry 4.0.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document discusses modeling DC servo motors using artificial neural networks (ANNs). It contains the following key points:
1. ANNs are a computational intelligence technique that can be used to model nonlinear systems like DC servo motors by learning from input-output data. ANNs have an interconnected structure that allows them to learn complex relationships.
2. A DC servo motor has electrical and mechanical components that can be modeled, including resistance, inductance, inertia, damping, input voltage, back EMF, and angular position/speed. Nonlinear effects like saturation and dead zones also need to be accounted for in the model.
3. The paper presents a motor model developed using ANN techniques to mimic the behavior of
The document describes IntelliSuite's integrated MEMS design flow, which allows users to model devices from the schematic level through physical layout and verification, as well as simulate multi-physics processes. IntelliSuite combines top-down and bottom-up design approaches for efficient and accurate modeling. Key capabilities include schematic capture, physical layout, process simulation, and system-level modeling extraction for fast behavioral simulation.
IRJET- Vibration Analysis and Optimization of Housing for ECU in Automobile u...IRJET Journal
The document discusses the vibration analysis and optimization of an electronic control unit (ECU) housing for an automobile. The objectives are to design and optimize the ECU housing using CATIA and finite element analysis (FEA) in ANSYS to minimize vibration. Modal and harmonic analyses are conducted on the original housing and an optimized design with added cross ribs. The natural frequencies increase and acceleration amplitude decreases in the optimized design, improving stiffness and reducing vibration compared to the original housing.
The document discusses different types of electrical meters used in data centers. It describes four levels of metering from the whole building level down to specific equipment. Meters can be either temporary or permanent depending on how long data needs to be collected. Common types of permanent meters use current transformers and potential transformers to measure attributes like power, energy, voltage, harmonics and power quality to provide insights into infrastructure operations and energy use.
Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...IDES Editor
Cloud computing is an emerging computing
paradigm. It aims to share data, resources and services
transparently among users of a massive grid. Although the
industry has started selling cloud-computing products,
research challenges in various areas, such as architectural
design, task decomposition, task distribution, load
distribution, load scheduling, task coordination, etc. are still
unclear. Therefore, we study the methods to reason and model
cloud computing as a step towards identifying fundamental
research questions in this paradigm. In this paper, we propose
a model for load distribution on cloud computing by modeling
them as cognitive systems and using aspects which not only
depend on the present state of the system, but also, on a set of
predefined transitions and conditions. The entirety of this
model is then bundled to cater the task of job distribution
using the concept of application metadata. Later, we draw a
qualitative and simulation based summarization for the
proposed model. We finally evaluate the results and draw up
a series of key conclusions in cloud computing for future
exploration.
Survey on deep learning applied to predictive maintenance IJECEIAES
Prognosis health monitoring (PHM) plays an increasingly important role in the management of machines and manufactured products in today’s industry, and deep learning plays an important part by establishing the optimal predictive maintenance policy. However, traditional learning methods such as unsupervised and supervised learning with standard architectures face numerous problems when exploiting existing data. Therefore, in this essay, we review the significant improvements in deep learning made by researchers over the last 3 years in solving these difficulties. We note that researchers are striving to achieve optimal performance in estimating the remaining useful life (RUL) of machine health by optimizing each step from data to predictive diagnostics. Specifically, we outline the challenges at each level with the type of improvement that has been made, and we feel that this is an opportunity to try to select a state-of-the-art architecture that incorporates these changes so each researcher can compare with his or her model. In addition, post-RUL reasoning and the use of distributed computing with cloud technology is presented, which will potentially improve the classification accuracy in maintenance activities. Deep learning will undoubtedly prove to have a major impact in upgrading companies at the lowest cost in the new industrial revolution, Industry 4.0.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document discusses modeling DC servo motors using artificial neural networks (ANNs). It contains the following key points:
1. ANNs are a computational intelligence technique that can be used to model nonlinear systems like DC servo motors by learning from input-output data. ANNs have an interconnected structure that allows them to learn complex relationships.
2. A DC servo motor has electrical and mechanical components that can be modeled, including resistance, inductance, inertia, damping, input voltage, back EMF, and angular position/speed. Nonlinear effects like saturation and dead zones also need to be accounted for in the model.
3. The paper presents a motor model developed using ANN techniques to mimic the behavior of
The document describes IntelliSuite's integrated MEMS design flow, which allows users to model devices from the schematic level through physical layout and verification, as well as simulate multi-physics processes. IntelliSuite combines top-down and bottom-up design approaches for efficient and accurate modeling. Key capabilities include schematic capture, physical layout, process simulation, and system-level modeling extraction for fast behavioral simulation.
IRJET- Vibration Analysis and Optimization of Housing for ECU in Automobile u...IRJET Journal
The document discusses the vibration analysis and optimization of an electronic control unit (ECU) housing for an automobile. The objectives are to design and optimize the ECU housing using CATIA and finite element analysis (FEA) in ANSYS to minimize vibration. Modal and harmonic analyses are conducted on the original housing and an optimized design with added cross ribs. The natural frequencies increase and acceleration amplitude decreases in the optimized design, improving stiffness and reducing vibration compared to the original housing.
The document discusses different types of electrical meters used in data centers. It describes four levels of metering from the whole building level down to specific equipment. Meters can be either temporary or permanent depending on how long data needs to be collected. Common types of permanent meters use current transformers and potential transformers to measure attributes like power, energy, voltage, harmonics and power quality to provide insights into infrastructure operations and energy use.
A resonable approach for manufacturing system based on supervisory control 2IAEME Publication
This document summarizes a research paper that proposes a novel approach for manufacturing system control using supervisory control and discrete event systems. It describes a testbed that was developed using this approach with three main hardware components: a personal computer, interface, and programmable logic controller. The paper discusses developing a model for the large, complex testbed manufacturing system by breaking it down into smaller, fundamental and interaction sub-models. It explains how the testbed model was implemented using clocked Moore synchronous state machines in programmable logic controller ladder logic programs.
Elliptic Curve Cryptography (ECC) is capable of constructing public-key cryptosystems. Specifically, the security of the ECC minimizes to testing the ability to handle and solve the DLP (Discrete Logarithmic Problem) in the group of points of an elliptic curve (ECDLP). ECC based on ECDLP is in the list of recommended algorithms for use by NIST (National Institute of Standards and Technology) and NSA (National Security Agency). Given that ECDLP based cryptosystems are in wide-spread utilization, continuous efforts on monitoring the effectiveness of new attacks or improvements to pre-existing attacks on ECDLP over large prime factor is a significant part in that. This paper aims to provide a secure, effective, and flexible method to improve data security in cloud computing. In this chapter, a novel algorithm using MapReduce and Pollard-Rho’s approach to solve the ECDLP problems and to enhance the security level.
Machine Learning (ML) in Wireless Sensor Networks (WSNs)mabualsh
Wireless sensor networks (WSNs) and the Internet of Things (IoT) monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. WSNs and IoT often adopt machine learning to eliminate the need for unnecessary redesign. Machine learning inspires many practical solutions that maximize resource utilization and prolong the network's lifespan. These slides present an extensive literature review of machine learning methods to address common issues in WSNs and IoT.
This document summarizes an experimental investigation on circular hollow steel columns infilled with lightweight concrete, with and without glass fiber reinforced polymer (GFRP), under cyclic loading. Specimens of different steel tube lengths, cross-sections, thicknesses, and lightweight concrete grades were tested. An artificial neural network was used to predict the ultimate load capacity and axial shortening based on the experimental results. The neural network predictions were found to be in acceptable agreement with the experimental results based on linear regression analysis.
This chapter discusses modeling and simulating multiphase electrical machines in Matlab/Simulink. It begins with an overview of different multiphase winding configurations. It then introduces the vector space decomposition (VSD) method for unified modeling of various multiphase schemes. The VSD approach involves a geometric transformation to map actual windings to a conventional model, followed by a decoupling transformation. This allows developing the VSD theory for the conventional model independently of actual machine topology. Examples are provided of mapping different multiphase arrangements to the conventional model to enable unified simulation in Matlab/Simulink.
The document discusses flexible multibody dynamics and simulation. It covers topics like kinematic and dynamic analysis of multi-body systems, types of multibody dynamic analyses including forward and inverse dynamics, using simulation tools to model flexible bodies and their interactions, incorporating constraints and contacts between bodies, and using simulations to analyze complex mechanical systems with multiple degrees of freedom like vehicles and machinery.
This document provides an overview of using neural network techniques in power systems. It discusses how neural networks have been applied to areas like fault diagnosis, security assessment, load forecasting, economic dispatch, and harmonic analysis. The number of published papers in these areas has grown significantly from 1990-1996 to 2000-2005, particularly in load forecasting, fault diagnosis/location, economic dispatch, security assessment, and transient stability. The document then reviews in more detail how neural networks have been applied to load forecasting, fault diagnosis/location, and economic dispatch problems in the power industry.
IRJET- Study of Various Network SimulatorsIRJET Journal
This document provides an overview of various network simulators. It discusses the concepts and uses of network simulation. Several popular network simulators are described, including NS2, NS3, OPNET, OMNeT++, NETSIM and QualNet. For each simulator, the key features, programming languages, advantages and limitations are summarized. The document concludes that network simulators allow testing of networks and protocols in a cost-effective manner compared to physical test beds.
Techniques to Apply Artificial Intelligence in Power Plantsijtsrd
In todays world, we are experiencing tremendous growth in the research and application of Artificial intelligence. Power plants are a vast sector where there is a scope of using AI to rectify the faults and optimize the overall running of the plants. The use of AI will help in reducing human dependence, and during a breakdown, will assist in rectifying the problem by determining the cause quickly. This paper focusses on proposing numerous methods to implement AI in various power plants and how it will help in the same. Anshika Gupta "Techniques to Apply Artificial Intelligence in Power Plants" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33050.pdf Paper Url :https://www.ijtsrd.com/engineering/information-technology/33050/techniques-to-apply-artificial-intelligence-in-power-plants/anshika-gupta
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...IJECEIAES
The paper proposes a design strategy to retain the true nature of the output in the event of occurrence of stuck at faults at the interconnect levels of digital circuits. The procedure endeavours to design a combinational architecture which includes attributes to identify stuck at faults present in the intermediate lines and involves a healing mechanism to redress the same. The simulated fault injection procedure introduces both single as well as multiple stuck-at faults at the interconnect levels of a two level combinational circuit in accordance with the directives of a control signal. The inherent heal facility attached to the formulation enables to reach out the fault free output even in the presence of faults. The Modelsim based simulation results obtained for the Circuit Under Test [CUT] implemented using a Read Only Memory [ROM], proclaim the ability of the system to survive itself from the influence of faults. The comparison made with the traditional Triple Modular Redundancy [TMR] exhibits the superiority of the scheme in terms of fault coverage and area overhead.
IRJET- Autonomous Quadrotor Control using Convolutional Neural NetworksIRJET Journal
This document describes research on using convolutional neural networks (CNNs) to control a quadcopter for two tasks: obstacle avoidance and command by hand gesture. For obstacle avoidance, a CNN with 15 layers was trained on images of obstacles in different positions, achieving a mean accuracy of 75%. For command by gesture, transfer learning was used from the pre-trained AlexNet model. The last two layers were replaced and fine-tuned on images of hand gestures, achieving 98% accuracy. The research demonstrates the potential of CNNs for real-time visual processing and autonomous control of quadcopters.
Real-time traffic sign detection and recognition using Raspberry Pi IJECEIAES
This document presents a real-time traffic sign detection and recognition system developed using a Raspberry Pi 3 processor. The system uses a Raspberry Pi camera to record real-time video and the TensorFlow machine learning algorithm to detect and identify traffic signs based on a dataset of 500 labeled images across 5 sign classes. The system's accuracy, delay, and reliability were evaluated during testbed implementation considering different environmental and sign conditions. Results showed the system achieved over 90% accuracy on average with a maximum detection delay of 3.44 seconds, demonstrating reliable performance even for broken, faded, or low-light signs. This real-time traffic sign recognition system developed with affordable hardware has potential to increase road safety.
Cluster Computing Environment for On - line Static Security Assessment of lar...IDES Editor
The increased size of modern power systems
demand faster and accurate means for the security assessment,
so that the decisions for reliable and secure operation planning
could be drawn in a systematic manner. Large computational
overhead is the major impediment in preventing the power
system security assessment (PSSA) from on-line use. To
mitigate this problem, this paper proposes, a cluster computing
based architecture for power system static security assessment,
utilizing the tools in the open source domain. A variant of the
master/slave pattern is used for deploying the cluster of
workstations (COW), which act as the computational engine
for the on-line PSSA. The security assessment is performed
utilizing the developed composite security index that can
accurately differentiate the secure and non-secure cases and
has been defined as a function of bus voltage and line flow
limit violations. Due to the inherent parallel structure of
security assessment algorithm and to exploit the potential of
distributed computing, domain decomposition is employed for
parallelizing the sequential algorithm. Extensive
experimentations were carried out on IEEE 57 bus and IEEE
145-bus 50 machine standard test systems for demonstrating
the validity of the proposed architecture.
On-line Power System Static Security Assessment in a Distributed Computing Fr...idescitation
The computation overhead is of major concern when
going for increased accuracy in online power system security
assessment (OPSSA). This paper proposes a scalable solution
technique based on distributed computing architecture to
mitigate the problem. A variant of the master/slave pattern is
used for deploying the cluster of workstations (COW), which
act as the computational engine for the OPSSA. Owing to the
inherent parallel structure in security analysis algorithm, to
exploit the potential of distributed computing, domain
decomposition is adopted instead of functional decomposition.
The security assessment is performed utilizing the developed
composite security index that can accurately differentiate the
secure and non-secure cases and has been defined as a function
of bus voltage and line flow limit violations. Validity of
proposed architecture is demonstrated by the results obtained
from an intensive experimentation using the benchmark IEEE
57 bus test system. The proposed framework, which is scalable,
can be further extended to intelligent monitoring and control
of power system
International Journal of Engineering (IJE) Volume (3) Issue (1)CSCJournals
This document discusses the implementation of artificial intelligence techniques for steady state security assessment in deregulated power system markets. It proposes using neural networks, decision trees, and adaptive neuro-fuzzy inference systems to analyze power transactions between generators and customers in deregulated systems. Data from load flow analysis is used to train and test the AI models. The techniques are tested on various standard power system test cases. The results show that neural networks provide more accurate and faster assessments compared to decision trees and neuro-fuzzy systems, but the latter two may be easier to implement for practical applications. The new methods could help improve security in planning and operating deregulated power system markets.
This document provides a summary of an undergraduate study report on adaptive relaying using artificial intelligence techniques. It discusses artificial intelligence methods like expert systems, artificial neural networks, and fuzzy logic that have been applied in power system protection. It also analyzes some key aspects of using these techniques, including the design of neural networks and the challenges of generating comprehensive training sets from large power system data. The document serves as the abstract and introduction to the full study report.
This document discusses electrical energy management and load forecasting in smart grids using artificial neural networks. It presents a study applying backpropagation neural networks to short-term load forecasting for Sudan's National Electric Company. The neural network model was used to forecast load, with error calculated by comparing forecasted and actual load data. The document also discusses generation dispatch, demand forecasting techniques, and designing a neural network for one-day load forecasting. It evaluates network performance and error for different training data sizes, finding that a ten-day training dataset produced the best results with minimum error. The neural network approach was able to reliably predict the nonlinear relationship between historical data and load.
A resonable approach for manufacturing system based on supervisory control 2IAEME Publication
This document summarizes a research paper that proposes a novel approach for manufacturing system control using supervisory control and discrete event systems. It describes a testbed that was developed using this approach with three main hardware components: a personal computer, interface, and programmable logic controller. The paper discusses developing a model for the large, complex testbed manufacturing system by breaking it down into smaller, fundamental and interaction sub-models. It explains how the testbed model was implemented using clocked Moore synchronous state machines in programmable logic controller ladder logic programs.
Elliptic Curve Cryptography (ECC) is capable of constructing public-key cryptosystems. Specifically, the security of the ECC minimizes to testing the ability to handle and solve the DLP (Discrete Logarithmic Problem) in the group of points of an elliptic curve (ECDLP). ECC based on ECDLP is in the list of recommended algorithms for use by NIST (National Institute of Standards and Technology) and NSA (National Security Agency). Given that ECDLP based cryptosystems are in wide-spread utilization, continuous efforts on monitoring the effectiveness of new attacks or improvements to pre-existing attacks on ECDLP over large prime factor is a significant part in that. This paper aims to provide a secure, effective, and flexible method to improve data security in cloud computing. In this chapter, a novel algorithm using MapReduce and Pollard-Rho’s approach to solve the ECDLP problems and to enhance the security level.
Machine Learning (ML) in Wireless Sensor Networks (WSNs)mabualsh
Wireless sensor networks (WSNs) and the Internet of Things (IoT) monitor dynamic environments that change rapidly over time. This dynamic behavior is either caused by external factors or initiated by the system designers themselves. WSNs and IoT often adopt machine learning to eliminate the need for unnecessary redesign. Machine learning inspires many practical solutions that maximize resource utilization and prolong the network's lifespan. These slides present an extensive literature review of machine learning methods to address common issues in WSNs and IoT.
This document summarizes an experimental investigation on circular hollow steel columns infilled with lightweight concrete, with and without glass fiber reinforced polymer (GFRP), under cyclic loading. Specimens of different steel tube lengths, cross-sections, thicknesses, and lightweight concrete grades were tested. An artificial neural network was used to predict the ultimate load capacity and axial shortening based on the experimental results. The neural network predictions were found to be in acceptable agreement with the experimental results based on linear regression analysis.
This chapter discusses modeling and simulating multiphase electrical machines in Matlab/Simulink. It begins with an overview of different multiphase winding configurations. It then introduces the vector space decomposition (VSD) method for unified modeling of various multiphase schemes. The VSD approach involves a geometric transformation to map actual windings to a conventional model, followed by a decoupling transformation. This allows developing the VSD theory for the conventional model independently of actual machine topology. Examples are provided of mapping different multiphase arrangements to the conventional model to enable unified simulation in Matlab/Simulink.
The document discusses flexible multibody dynamics and simulation. It covers topics like kinematic and dynamic analysis of multi-body systems, types of multibody dynamic analyses including forward and inverse dynamics, using simulation tools to model flexible bodies and their interactions, incorporating constraints and contacts between bodies, and using simulations to analyze complex mechanical systems with multiple degrees of freedom like vehicles and machinery.
This document provides an overview of using neural network techniques in power systems. It discusses how neural networks have been applied to areas like fault diagnosis, security assessment, load forecasting, economic dispatch, and harmonic analysis. The number of published papers in these areas has grown significantly from 1990-1996 to 2000-2005, particularly in load forecasting, fault diagnosis/location, economic dispatch, security assessment, and transient stability. The document then reviews in more detail how neural networks have been applied to load forecasting, fault diagnosis/location, and economic dispatch problems in the power industry.
IRJET- Study of Various Network SimulatorsIRJET Journal
This document provides an overview of various network simulators. It discusses the concepts and uses of network simulation. Several popular network simulators are described, including NS2, NS3, OPNET, OMNeT++, NETSIM and QualNet. For each simulator, the key features, programming languages, advantages and limitations are summarized. The document concludes that network simulators allow testing of networks and protocols in a cost-effective manner compared to physical test beds.
Techniques to Apply Artificial Intelligence in Power Plantsijtsrd
In todays world, we are experiencing tremendous growth in the research and application of Artificial intelligence. Power plants are a vast sector where there is a scope of using AI to rectify the faults and optimize the overall running of the plants. The use of AI will help in reducing human dependence, and during a breakdown, will assist in rectifying the problem by determining the cause quickly. This paper focusses on proposing numerous methods to implement AI in various power plants and how it will help in the same. Anshika Gupta "Techniques to Apply Artificial Intelligence in Power Plants" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33050.pdf Paper Url :https://www.ijtsrd.com/engineering/information-technology/33050/techniques-to-apply-artificial-intelligence-in-power-plants/anshika-gupta
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...IJECEIAES
The paper proposes a design strategy to retain the true nature of the output in the event of occurrence of stuck at faults at the interconnect levels of digital circuits. The procedure endeavours to design a combinational architecture which includes attributes to identify stuck at faults present in the intermediate lines and involves a healing mechanism to redress the same. The simulated fault injection procedure introduces both single as well as multiple stuck-at faults at the interconnect levels of a two level combinational circuit in accordance with the directives of a control signal. The inherent heal facility attached to the formulation enables to reach out the fault free output even in the presence of faults. The Modelsim based simulation results obtained for the Circuit Under Test [CUT] implemented using a Read Only Memory [ROM], proclaim the ability of the system to survive itself from the influence of faults. The comparison made with the traditional Triple Modular Redundancy [TMR] exhibits the superiority of the scheme in terms of fault coverage and area overhead.
IRJET- Autonomous Quadrotor Control using Convolutional Neural NetworksIRJET Journal
This document describes research on using convolutional neural networks (CNNs) to control a quadcopter for two tasks: obstacle avoidance and command by hand gesture. For obstacle avoidance, a CNN with 15 layers was trained on images of obstacles in different positions, achieving a mean accuracy of 75%. For command by gesture, transfer learning was used from the pre-trained AlexNet model. The last two layers were replaced and fine-tuned on images of hand gestures, achieving 98% accuracy. The research demonstrates the potential of CNNs for real-time visual processing and autonomous control of quadcopters.
Real-time traffic sign detection and recognition using Raspberry Pi IJECEIAES
This document presents a real-time traffic sign detection and recognition system developed using a Raspberry Pi 3 processor. The system uses a Raspberry Pi camera to record real-time video and the TensorFlow machine learning algorithm to detect and identify traffic signs based on a dataset of 500 labeled images across 5 sign classes. The system's accuracy, delay, and reliability were evaluated during testbed implementation considering different environmental and sign conditions. Results showed the system achieved over 90% accuracy on average with a maximum detection delay of 3.44 seconds, demonstrating reliable performance even for broken, faded, or low-light signs. This real-time traffic sign recognition system developed with affordable hardware has potential to increase road safety.
Cluster Computing Environment for On - line Static Security Assessment of lar...IDES Editor
The increased size of modern power systems
demand faster and accurate means for the security assessment,
so that the decisions for reliable and secure operation planning
could be drawn in a systematic manner. Large computational
overhead is the major impediment in preventing the power
system security assessment (PSSA) from on-line use. To
mitigate this problem, this paper proposes, a cluster computing
based architecture for power system static security assessment,
utilizing the tools in the open source domain. A variant of the
master/slave pattern is used for deploying the cluster of
workstations (COW), which act as the computational engine
for the on-line PSSA. The security assessment is performed
utilizing the developed composite security index that can
accurately differentiate the secure and non-secure cases and
has been defined as a function of bus voltage and line flow
limit violations. Due to the inherent parallel structure of
security assessment algorithm and to exploit the potential of
distributed computing, domain decomposition is employed for
parallelizing the sequential algorithm. Extensive
experimentations were carried out on IEEE 57 bus and IEEE
145-bus 50 machine standard test systems for demonstrating
the validity of the proposed architecture.
On-line Power System Static Security Assessment in a Distributed Computing Fr...idescitation
The computation overhead is of major concern when
going for increased accuracy in online power system security
assessment (OPSSA). This paper proposes a scalable solution
technique based on distributed computing architecture to
mitigate the problem. A variant of the master/slave pattern is
used for deploying the cluster of workstations (COW), which
act as the computational engine for the OPSSA. Owing to the
inherent parallel structure in security analysis algorithm, to
exploit the potential of distributed computing, domain
decomposition is adopted instead of functional decomposition.
The security assessment is performed utilizing the developed
composite security index that can accurately differentiate the
secure and non-secure cases and has been defined as a function
of bus voltage and line flow limit violations. Validity of
proposed architecture is demonstrated by the results obtained
from an intensive experimentation using the benchmark IEEE
57 bus test system. The proposed framework, which is scalable,
can be further extended to intelligent monitoring and control
of power system
International Journal of Engineering (IJE) Volume (3) Issue (1)CSCJournals
This document discusses the implementation of artificial intelligence techniques for steady state security assessment in deregulated power system markets. It proposes using neural networks, decision trees, and adaptive neuro-fuzzy inference systems to analyze power transactions between generators and customers in deregulated systems. Data from load flow analysis is used to train and test the AI models. The techniques are tested on various standard power system test cases. The results show that neural networks provide more accurate and faster assessments compared to decision trees and neuro-fuzzy systems, but the latter two may be easier to implement for practical applications. The new methods could help improve security in planning and operating deregulated power system markets.
This document provides a summary of an undergraduate study report on adaptive relaying using artificial intelligence techniques. It discusses artificial intelligence methods like expert systems, artificial neural networks, and fuzzy logic that have been applied in power system protection. It also analyzes some key aspects of using these techniques, including the design of neural networks and the challenges of generating comprehensive training sets from large power system data. The document serves as the abstract and introduction to the full study report.
This document discusses electrical energy management and load forecasting in smart grids using artificial neural networks. It presents a study applying backpropagation neural networks to short-term load forecasting for Sudan's National Electric Company. The neural network model was used to forecast load, with error calculated by comparing forecasted and actual load data. The document also discusses generation dispatch, demand forecasting techniques, and designing a neural network for one-day load forecasting. It evaluates network performance and error for different training data sizes, finding that a ten-day training dataset produced the best results with minimum error. The neural network approach was able to reliably predict the nonlinear relationship between historical data and load.
This document describes enhancements made to the energy modeling framework in the OMNET++ wireless sensor network simulator. OMNET++ is a modular discrete event simulator written in C++ that allows models to be built from reusable components. The document discusses several frameworks within OMNET++ for modeling energy consumption, including MIXIM, INET, INETMANET, PAWIS, and CASTALIA. It provides details on how energy parameters can be configured in simulation profiles, how energy levels are updated during transmissions and other events, and how output is recorded to analyze energy performance.
This document discusses energy modeling enhancements in the OMNET++ wireless sensor network simulator. It describes how OMNET++'s modular architecture allows frameworks like MIXIM, INET, and CASTALIA to be used for energy modeling. It explains how to configure simulations in OMNET++ to set initial energy levels, track energy usage during transmissions and other events, and analyze output traces to compare energy levels over time. The document aims to guide researchers on utilizing OMNET++'s features for energy modeling studies in wireless sensor networks.
Energy model study in the Wireless Sensor Network (WSN) simulations is the recent paradigm for the researchers. This Paper describes in details how the energy model study has been enhanced by the different frameworks and features of the simulator OMNETPP, a C++ based discrete event simulator. OMNETPP is chosen as the simulation platform because of its modular architecture and portable module libraries, Graphical IDE, Result analysis file generation capability and open source nature. The simulator's internal working model is described in detail to understand and plan for the energy model study at different levels. The frameworks MIXIM, INET, INETMANET, PAWIS, and CASTALIA of OMNETPP are explored for the study and the findings are recorded here. This Paper aims at guiding the researchers through step by step explanation of how to utilize the features of OMNETPP for the energy model study, generate outputs, create the analysis file and present them in a graphical format..
This document discusses a tool for dynamic security assessment (DSA) of power systems that was developed through collaboration between researchers. The tool uses performance indices to evaluate system security following disturbances by monitoring parameters like voltage, frequency, and rotor angle. Eighteen complementary indices capture different security aspects, with values between 0-1 indicating the margin to limits. The tool aims to help operators identify insecure conditions and make decisions to maintain security.
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...IJECEIAES
The tiny machine learning (TinyML) has been considered to apply on the edge devices where the resource-constrained micro-controller units (MCUs) were used. Finding a good platform to deploy the TinyML effectively is very crucial. The paper aims to propose a multiple micro-controller hardware platform for productively running the TinyML model. The proposed hardware consists of two dual-core MCUs. The first MCU is utilized for acquiring and processing input data, while the second one is responsible for executing the trained TinyML network. Two MCUs communicate with each other using the universal asynchronous receiver-transmitter (UART) protocol. The multitasking programming technique is mainly applied on the first MCU to optimize the pre-processing new data. A three-phase motors faults classification TinyML model was deployed on the proposed system to evaluate the effectiveness. The experimental results prove that our proposed hardware platform was improved 34.8% of the total inference time including pre-processing data of the proposed TinyML model in comparing with single micro-controller hardware platform.
Short Term Electrical Load Forecasting by Artificial Neural NetworkIJERA Editor
This paper presents an application of artificial neural networks for short-term times series electrical load
forecasting. An adaptive learning algorithm is derived from system stability to ensure the convergence of
training process. Historical data of hourly power load as well as hourly wind power generation are sourced from
European Open Power System Platform. The simulation demonstrates that errors steadily decrease in training
with the adaptive learning factor starting at different initial value and errors behave volatile with constant
learning factors with different values
This document discusses the use of artificial intelligence techniques in electrical engineering, specifically in power systems. It introduces artificial intelligence and describes power systems. It explains the need for AI in electrical engineering due to complex systems and large amounts of data. The main AI techniques discussed are artificial neural networks, fuzzy logic systems, and expert systems. It provides details on each technique including advantages and disadvantages. It then discusses practical applications of these AI techniques in transmission lines and power system protection.
This document discusses the use of artificial intelligence techniques in power systems. It first provides background on power systems and defines artificial intelligence. It then discusses the need for AI in power systems due to complex data and computations. The main AI techniques discussed are expert systems, artificial neural networks, and fuzzy logic. Expert systems encode human expertise to solve problems while artificial neural networks and fuzzy logic can handle uncertain or incomplete data. The document outlines various applications of AI in power system operations, planning, control, automation, and forecasting and concludes that AI can increase power system efficiency and reliability.
Performance analysis of binary and multiclass models using azure machine lear...IJECEIAES
Network data is expanding and that too at an alarming rate. Besides, the sophisticated attack tools used by hackers lead to capricious cyber threat landscape. Traditional models proposed in the field of network intrusion detection using machine learning algorithms emphasize more on improving attack detection rate and reducing false alarms but time efficiency is often overlooked. Therefore, in order to address this limitation, a modern solution has been presented using Machine Learning-as-a-Service platform. The proposed work analyses the performance of eight two-class and three multiclass algorithms using UNSW NB-15, a modern intrusion detection dataset. 82,332 testing samples were considered to evaluate the performance of algorithms. The proposed two class decision forest model exhibited 99.2% accuracy and took 6 seconds to learn 1,75,341 network instances. Multiclass classification task was also undertaken wherein attack types like generic, exploits, shellcode and worms were classified with a recall percentage of 99%, 94.49%, 91.79% and 90.9% respectively by the multiclass decision forest model that also leapfrogged others in terms of training and execution time.
RELIABILITY OF MECHANICAL SYSTEM OF SYSTEMScscpconf
In this paper, we present a new methodology about reliability of systems of systems. We present
also an example which combines the information transformation in complex systems and virtual
design of this system based on finite element analysis. This example is help to balance the
performances and the costs in complex system, or provide the optimal solution in manufacturing
design. It can also update the existing design of component by changing the new design of this
component.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Sumit Ravi Naidu is seeking an entry-level position in electrical and electronic engineering. He has a Master's degree in electrical engineering from Texas A&M University and a Bachelor's from Bhilai Institute of Technology in India. His experience includes teaching assistant roles at Texas A&M and internships at power plants in India where he worked on PLCs, DCS, and developed control programs. His projects involve power system analysis, renewable energy control systems, and modeling a thermal power plant. He is proficient in programming languages, power and control systems tools, and office software.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes research on integrating safety critical systems in information technology. It discusses how modern information systems are increasingly safety critical as their failure can result in financial loss or loss of life. The document reviews literature on safety critical systems, including analyzing reliability and safety of parallel-series models. It also discusses modeling approaches for designing safety critical systems before hardware or software implementation. The goal is to reduce costs from design errors found later. Overall, the document examines how information technology is used in safety critical systems and approaches for analyzing and designing such systems.
Similar to A Machine Learning Toolkit for Power Systems Security Analysis (20)
Este documento analiza el modelo de negocio de YouTube. Explica que YouTube y otros sitios de video online representan un nuevo modelo de negocio para contenidos audiovisuales debido al cambio en los hábitos de consumo causado por las nuevas tecnologías. Describe cómo YouTube aprovecha la participación de los usuarios para mejorar continuamente y atraer una audiencia diferente a la de los medios tradicionales.
The defense was successful in portraying Michael Jackson favorably to the jury in several ways:
1) They dressed Jackson in ornate costumes that conveyed images of purity, innocence, and humility.
2) Jackson was shown entering the courtroom as if on a red carpet, emphasizing his celebrity status.
3) Jackson appeared vulnerable, childlike, and in declining health during the trial, eliciting sympathy from jurors.
4) Defense attorney Tom Mesereau effectively presented a coherent narrative of Jackson as a victim and portrayed Neverland as a place of refuge, undermining the prosecution's arguments.
Michael Jackson was born in 1958 in Gary, Indiana and rose to fame in the 1960s as the lead singer of The Jackson 5, topping music charts in the 1970s. As a solo artist in the 1980s, his album Thriller broke music records. In the 1990s and 2000s, Jackson faced several legal issues related to child abuse allegations while continuing to release music. He married Lisa Marie Presley and Debbie Rowe and had two children before his death in 2009.
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...butest
This document appears to be a list of popular books from various authors. It includes over 150 book titles across many genres such as fiction, non-fiction, memoirs, and novels. The books cover a wide range of topics from politics to cooking to autobiographies.
The prosecution lost the Michael Jackson trial due to several key mistakes and weaknesses in their case:
1) The lead prosecutor, Thomas Sneddon, was too personally invested in the case against Jackson, having pursued him for over a decade without success.
2) Sneddon's opening statement was disorganized and weak, failing to effectively outline the prosecution's case.
3) The accuser's mother was not credible and damaged the prosecution's case through her erratic testimony, history of lies and con artist behavior.
4) Many prosecution witnesses were not credible due to prior lawsuits against Jackson, debts owed to him, or having been fired by him. Several witnesses even took the Fifth Amendment.
Here are three examples of public relations from around the world:
1. The UK government's "Be Clear on Cancer" campaign which aims to raise awareness of cancer symptoms and encourage early diagnosis.
2. Samsung's global brand marketing and sponsorship activities which aim to increase brand awareness and favorability of Samsung products worldwide.
3. The Brazilian government's efforts to improve its international image and relations with other countries through strategic communication and diplomacy.
The three most important functions of public relations are:
1. Media relations because the media is how most organizations reach their key audiences. Strong media relationships are crucial.
2. Writing, because written communication is at the core of public relations and how most information is
Michael Jackson Please Wait... provides biographical information about Michael Jackson including his birthdate, birthplace, parents, height, interests, idols, favorite foods, films, and more. It discusses his background, career highlights including influential albums like Thriller, and films he appeared in such as The Wiz and Moonwalker. The document contains photos and details about Jackson's life and illustrious music career.
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazzbutest
The document discusses the process of manufacturing celebrity and its negative byproducts. It argues that celebrities are rarely the best in their individual pursuits like singing, dancing, etc. but become famous due to being products of a system controlled by wealthy elites. This system stifles opportunities for worthy artists and creates feudalism. The document also asserts that manufactured celebrities should not be viewed as role models due to behaviors like drug abuse and narcissism that result from the celebrity-making process.
Michael Jackson was a child star who rose to fame with the Jackson 5 in the late 1960s and early 1970s. As a solo artist in the 1970s and 1980s, he had immense commercial success with albums like Off the Wall, Thriller, and Bad, which featured hit singles and groundbreaking music videos. However, his career and public image were plagued by controversies related to allegations of child sexual abuse in the 1990s and 2000s. He continued recording and performing but faced ongoing media scrutiny into his private life until his death in 2009.
Social Networks: Twitter Facebook SL - Slide 1butest
The document discusses using social networking tools like Twitter and Facebook in K-12 education. Twitter allows students and teachers to share short updates and can be used to give parents a window into classroom activities. Facebook allows targeted advertising that could be used to promote educational activities. Both tools could help facilitate communication between schools and communities if used properly while managing privacy and security concerns.
Facebook has over 300 million active users who log on daily, and allows brands to create public profile pages to interact with users. Pages are for brands and organizations only, while groups can be made by any user about any topic. Pages do not show admin names and have no limits on fans, while groups display admin names and are limited to 5,000 members. Content on pages should aim to provoke action from subscribers and establish a regular posting schedule using a conversational tone.
Executive Summary Hare Chevrolet is a General Motors dealership ...butest
Hare Chevrolet is a car dealership located in Noblesville, Indiana that has successfully used social media platforms like Twitter, Facebook, and YouTube to create a positive brand image. They invest significant time interacting directly with customers online to foster a sense of community rather than overtly advertising. As a result, Hare Chevrolet has built a large, engaged audience on social media and serves as a model for how brands can use online presences strategically.
Welcome to the Dougherty County Public Library's Facebook and ...butest
This document provides instructions for signing up for Facebook and Twitter accounts. It outlines the sign up process for both platforms, including filling out forms with name, email, password and other details. It describes how the platforms will then search for friends and suggest people to connect with. It also explains how to search for and follow the Dougherty County Public Library page on both Facebook and Twitter once signed up. The document concludes by thanking participants and providing a contact for any additional questions.
Paragon Software announces the release of Paragon NTFS for Mac OS X 8.0, which provides full read and write access to NTFS partitions on Macs. It is the fastest NTFS driver on the market, achieving speeds comparable to native Mac file systems. Paragon NTFS for Mac 8.0 fully supports the latest Mac OS X Snow Leopard operating system in 64-bit mode and allows easy transfer of files between Windows and Mac partitions without additional hardware or software.
This document provides compatibility information for Olympus digital products used with Macintosh OS X. It lists various digital cameras, photo printers, voice recorders, and accessories along with their connection type and any notes on compatibility. Some products require booting into OS 9.1 for software compatibility or do not support devices that need a serial port. Drivers and software are available for download from Olympus and other websites for many products to enable use with OS X.
To use printers managed by the university's Information Technology Services (ITS), students and faculty must install the ITS Remote Printing software on their Mac OS X computer. This allows them to add network printers, log in with their ITS account credentials, and print documents while being charged per page to funds in their pre-paid ITS account. The document provides step-by-step instructions for installing the software, adding a network printer, and printing to that printer from any internet connection on or off campus. It also explains the pay-in-advance printing payment system and how to check printing charges.
The document provides an overview of the Mac OS X user interface for beginners, including descriptions of the desktop, login screen, desktop elements like the dock and hard disk, and how to perform common tasks like opening files and folders. It also addresses frequently asked questions for Windows users switching to Mac OS X, such as where documents are stored, how to save or find documents, and what the equivalent of the C: drive is in Mac OS X. The document concludes with sections on file management tasks like creating and deleting folders, organizing files within applications, using Spotlight search, and an overview of the Dashboard feature.
This document provides a checklist for securing Mac OS X version 10.5, focusing on hardening the operating system, securing user accounts and administrator accounts, enabling file encryption and permissions, implementing intrusion detection, and maintaining password security. It describes the Unix infrastructure and security framework that Mac OS X is built on, leveraging open source software and following the Common Data Security Architecture model. The checklist can be used to audit a system or harden it against security threats.
This document summarizes a course on web design that was piloted in the summer of 2003. The course was a 3 credit course that met 4 times a week for lectures and labs. It covered topics such as XHTML, CSS, JavaScript, Photoshop, and building a basic website. 18 students from various majors enrolled. Student and instructor evaluations found the course to be very successful overall, though some improvements were suggested like ensuring proper software and pairing programming/non-programming students. The document also discusses implications of incorporating web design material into existing computer science curriculums.
A Machine Learning Toolkit for Power Systems Security Analysis
1. A Machine Learning Toolkit for Power Systems Security Analysis
Dimitrios Semitekos, Nikolaos Avouris
Electrical and Computer Enginnering Dep., HCI Group
University of Patras,
26 500 Rio Patras, Greece.
[ dsem, N.Avouris ] @ee.upatras.gr
ABSTRACT For instance, an outage of a branch of a two-circuit line of a
high connectivity network, operating at low load levels, might
Machine Learning techniques have been extensively used in Power not be a threat for the network. To the contrary, an outage of a
Systems Analysis during the last years. A Machine Learning Toolkit,
single-circuit, high voltage, main grid line of a heavily loaded
i.e. a versatile software environment incorporating multiple inter-
operable tools facilitating experimentation, can be a valuable asset
network could be fatal.
during power systems analysis studies. In this paper our experience From this point of view, there are varying consequences
with building such a Toolkit, incorporating a repository of data associated to possible contingencies, depending on the
(Data Warehouse), is described. A number of machine learning and electrical network operating state.
analysis tools have been built and applied on collected structured Contingencies of an electrical network may involve outages
data in order to perform steady state security assessment of a power of various network elements, including unscheduled line and
system. The Toolkit (UMLPSE), the data collection process, the bus, generator or transformer outages.
analysis performed and the tools used are the subject of this paper. An innovative machine learning toolkit, called UMLPSE
In particular application of the developed toolkit in contingency
(Unified Machine Learning Power Systems Environment),
analysis is demonstrated. A series of system indices and metrics are
stored in the data warehouse describing the effects each contingency
has been build to facilitate power systems security analysis
is expected to have on each operating point. The system indices and and in particular contingencies estimation. UMLPSE has a
metrics are subsequently filtered through statistical procedures with modular structure, combining independent power flow and
qualitative measures and criteria to be used as training data for machine learning tool packages. It can be applied for the
machine learning tools (neural networks and decision trees). The automatic contingency risk assessment. It can also be used as
performance indices and the fine tuning of the parameters of these a benchmarking tool for selection of contingency analysis
machine learning tools are then considered for the screening and indices and metrics and experimentation with building
ranking of the contingencies for any given electrical network automatic learning tools. This machine learning toolkit,
operating point. It is argued that the proposed approach and tools
described in this paper, may be of interest to EMS operators,
can be applied to many similar power systems analysis studies.
to be used as a contingency analyser, as well as to power
Keywords: Power Systems, Contingency Analysis, Machine systems–steady state contingency analysis researchers, to be
Learning, Steady State Security Analysis, used as a modular user-friendly experimentation environment,
as it enables the user to further proceed and experiment with
the fine-tuning of various power and machine learning
parameters.
I. INTRODUCTION
The presentation of the toolkit is done through a contingency
Steady state security analysis aims at assessing the risk a analysis case study. The power system involved in this study
contingency would entail for an electrical network operating is the network of the Greek island of Crete, made of 61 buses
at a certain point. and 78 lines.
System operators’ expertise and even human intuition in many In the following sections, a detailed description of the
ways are successful at assessing the risk a contingency would UMLPSE features and an illustrative presentation of its use is
pose to a network. made, followed by a discussion on the analysis findings of the
discussed case study.
II. THE UMLPSE
Paper accepted for presentation at the 3rd Mediterranean
Conference and Exhibition on Power Generation, A. The operating points creation module
Transmission, Distribution and Energy Conversion
ThisMED POWERcm (2jointly organizedlower
space of 5 2002, inch) in the by
left National Technical University of Athens, intentionally
hand corner of the first page, is According to Mitchel [1], a computer program is said to learn
IEE Hellas, Israel and Cyprus,
left blank for use by the MED POWER from experience E with respect to some class of tasks T and
Athens, Greece, November 4-6, 2002
2002 secretariat performance measure P, if its performance at tasks in T, as
measured by P, improves with experience E. In our case,
which concerns building a machine learning toolkit for power
systems analysis, the task T is that of the contingency risk
assessment. The performance measure P is the percent of the
correct contingency classifications, while the training
experience T refers to the knowledge the machine learning
2. tool can acquire applying the set of contingencies under study The UMLPSE operating points creation module can be
to a diversified large set of operating points. schematically described in a UML (Uniform Modelling
An important issue in any machine learning problem is that of Language) sequence diagram [5] as illustrated in figure1 and
data collection. The acquisition of a set of operating points figure2.
can be directly done from the network through the SCADA
subsystem. If so, however, the operating points risk to be
rather uniform and not diversified, with certain operating
points over-represented and some other under-represented, or
even missing.
So a more effective technique for studying contingencies over
a more extensive operating points data set is to define
operating points through a simulation (load flow studies). The
simulation of the operating points set itself, is an attractive
idea as the operating points acquisition seems to have been a
tedious task in many cases, as also discussed in [2].
Further more, a machine learning toolkit for power system Figure 2. UMLPSE OP Violations Screening Collaboration Diagram
security analysis is more functional when it can produce itself
the required operating points. An Operating point can be
defined by the load level, the unit commitment and the B. The contingencies definition and processing module
network topology [3].
In UMLPSE a similar strategy is adopted. The operating The contingencies examined in MLPSE cover branch and bus
points are simulated from a single maximum load - full outages only. They are stored in relevant contigency files, one
network connectivity base case operating point, on which for the bus and one for the line outages respectively, in a
connectivity Ci, load Lj and generation sequence - level Gk contingency per line format.
scenarios are applied. For reasons of simplicity, connectivity The contingencies processing module applies all studied
scenarios include the removal of a set of buses and lines at a contingencies to all valid operating points stored in the
time, load scenarios cover the uniform power load reduction, operating points data warehouse.
while the generation sequence scenarios aim at a simulated The contingencies, once applied to the operating points data
sequential commitment of generators. Generators are warehouse, are screened for violations as in the operating
committed and operated according to economic dispatch points creation module through load flow studies. The
criteria, powered close to their operational optimal limits. For outcome of each contingency is classified in three discreet
this reason load flows are executed also defining the reactive states: “1 0 0” denoting contingencies causing serious
power production1. The number of the operating points so violations, forming either islands or leading to non
produced is less or equal to the Cartesian product of Ci x Lj x converging power flow study, “0 1 0” denoting contingencies
Gk. This is because the operating points simulated are with limited violations and “0 0 1” denoting innocent -
subsequently screened for overload and voltage violations. violations free contingencies.
Island producing operating points, as well as operating points The contingencies definition and processing module in UML
for which the power flow algorithm exhibits poor converging terms is depicted schematically in the sequence diagram of
behaviour are also discarded. fig. 3
Figure 3. UMLPSE Contingency Processing Sequence Diagram
Figure1. UMLPSE OP creation module UML sequence diagram
C. The data warehouse module
1
For all load flows calculations in UMLPSE the PCFLO
The Data warehouse module is accessed by to the Operating
package[4] is used.
points creation module, the Contingencies definition and
3. processing module and the Features selection module to be E. The features randomisation - splitting module
described in the following subsection.
The Data warehouse module consists of the operating points In this module the previously selected features are split at any
detailed data as computed in the Operating point creation ratio selected by the user to the training data set and the
module and the Operating point abstraction sub-module testing data set, being stored to respective data files. The data
containing macroscopic information about every simulated are also further processed being normalised. Normalisation of
operating point. The abstraction sub-module contains data data is necessary when neural networks are to be trained.
related to the simulated OP connectivity Ci, Lj, Gk, the overall Features are split at random. Once this is done, the user can
load level, the number of lines of the network, the total rating proceed to the following UMLPSE modules. This module is
of the lines, the active and reactive generation and load and very important as it enables the user to plan multiple cross
other indices, metrics of qualitative measures, that are later validations, by splitting the same data to training and testing
described. sets repetitively.
The abstraction sub-module is the actual data warehouse of
the various attributes used for the subsequent training of the
machine learning tools. Though contingency-related F. The machine learning tool training module
information and power-flow results are also hosted in the
abstraction sub-module, all attributes stored refer to pre- The Machine Learning Tool training module is split in two
contingency operating point data. discreet modules: the decision tree and the fully connected
All data of the abstraction sub-module refer to pre- feed-forward neural network training modules. If the neural
contingency measurements; this does not constitute a problem network module is selected, the user has first to select the
as the UMLPSE machine learning tools are trained on a per- number of the hidden layer neurons. Within this module all
contingency basis. necessary parameterisation and initialisation of the machine
Other researchers have also used pre-contingency figures in learning tools is executed automatically according to the
machine learning applications: selected features, as well as the training of the tools
The total real and reactive demand, pre-contingency real and themselves.
reactive line flows, and pre-contingency terminal voltage of The machine learning toolkit used in UMLPSE is the DMSK
the contingent element are selected as input features for (Data Miner Software Kit) toolkit.[7] Its high modularity
training of the neural network in [6], while in the problem enables the addition of more automatic learning tools with
examined by [2] the objects are pre-fault operating states and practically no programming cost. In figure 4 the functions of
points. the last three modules described are depicted in UML terms.
The interface of the user or other modules to the data
warehouse module is through SQL statements, a reliable and
time optimized approach.
D. The features selection module
The features selection module aims at the selection of a
number of features stored in the data warehouse module for
the subsequent training of the machine learning tools.
Features determination is not of premium importance for
machine learning tools like decision trees, as the selection of Figure 4. UMLPSE Automatic Tools Training Sequence Diagram
the most important features can be part of the Decision tree
training process. However this is not the case for other
machine learning approaches, like neural networks. So while G. The machine learning tools testing module
decision trees, using information entropy can discover the
most salient features, neural networks will demonstrate a The UMLPSE testing module mimics a run-time predictor
degrading performance for every redundant feature selected, that could operate on real data as received on line in a power
while training times increase exponentially. It is essential to station control room, once the selected features are computed.
reduce the number of inputs to a neural network and to select In UMLPSE, the test features data (produced in the UMLPSE
the optimum number of inputs which are able to clearly features randomisation – splitting module) play the role of the
define the input-output mapping[7]. One of the features that is control room.
always forcibly selected is the result of the contingency Despite the time required for the training of machine learning
applied on every valid operating point in the data warehouse. tools (and especially neural networks) even with a rather
This is because this feature is necessary for training and constraint number of features, the contingency analysis
testing purposes of the UMLPSE machine learning tools. classifications computed in the UMLPSE module are
performed in no-noticeable for the user time even using a low
performance personal computer for our test case.
4. Once the predictions of contingency effects are computed for where: MVALine is the apparent power, MVALineLimit the
every selected feature row of the testing data set, which power Limit and NL the number of lines.
represents a power system operating point and for all
contingencies, they are compared with the actual power flow
simulated results and a performance confusion matrix is B. Machine learning training feature indices and metrics
tabulated.
For a certain testing set of features both decision tree and There is a very rich literature concerning global network
neural network confusion matrices can be computed and machine indices. In [6] the following Voltage Performance
saved / appended to files, including a “simple” and a Index is suggested:
“quality” performance index computed for every confusion
Equation 3. The voltage performance index
matrix.
The confusion matrices have three rows and three columns. A
CMij confusion matrix element represents the number of test PI = ∑ (w / M )( f )
i i
M
cases for which the prediction has been i, while the power i∈LV
flow - actual result has been j. (i and j may take the values of
“1 0 0”, “0 1 0” and “0 0 1”, classifying a contingency as where fi is a function of limit violated buses equal to over-
explained in the previous section). The prediction success limit violations, wi weights and M an exponent against the
rate (the simple index), of the confusion matrix, is the masking effect.
percentage of the sum of the diagonal elements of the Similar performance indices are also found measuring the real
confusion matrix over its total population. The “quality” power flow:
index is an improved index that distinguishes between severe
and non-severe misclassifications. It is computed as follows: Equation 4. The power margin index
2n
L P
Equation 1. The “quality” index PI p (k ) = ∑Wi i
P
ˆ
3
i =1 i
∑ CM i ,i + 0.5 * (CM 1, 2 + CM 2,1 + CM 2,3 + CM 3, 2 ) where Pi is the real power of the branch i, k is the outage
QA = i =1
ˆ
3 3
branch, Pi is the branch real power flow limit, Wi are
∑∑ CM i, j
i =1 j =1 weighting coefficients and L is the number of lines.[8]
Similar indices are also suggested in [2], [9], [10], [11], [12].
III. INDICES, METRICS, QUALITATIVE MEASURES In UMLPSE a variety of qualitative measures used provided
encouraging results, (including low exponent variations of the
In UMLPSE a variety of indices, metrics and qualitative above mentioned indices). Here are the most important:
measures is computed. Some of them are used to identify the
violations occurring during the operating point simulation, 1. The relative dispatch coefficient index. This index,
while others are computed and used as machine learning proposed by L. Wehenkel, as a voltage stability index
training features. measuring the sensitivities of the total reactive power
generation to a reactive power consumption, known as
‘reactive power dispatch coefficients [13] .
A. Violation Indices
Equation 5. Relative dispatch coefficient (mentioned in UMLPSE as
Voltage Stability Index).
During operating point simulation as well as contingency
evaluation, real power generation within permitted limits for ∑Q GENERATED
the slack bus and other system generation buses is monitored. VStabIndex = Generators
Measures are also taken for MVA line and Voltage bus
violations. Voltage violations over 0.1 p.u. (in absolute
∑Q
Loads
LOAD
values) in any bus are considered major violations, while
voltage violations over 0.05 p.u. are summed and divided by 2. PV curves relate the voltage at a load bus to the active
the number of violating buses. When the calculated index load delivered. PV curves are used as a method of
exceeds 1.5, voltage violations are considered. MVA voltage stability evaluation for contingencies[14]. An
violations are monitored for any line close to the MVA rating empirical index applied in UMLPSE, described in
limit. In UMLPSE the following MVA line overload index is equation 6, gave encouraging results.
proposed
Equation 6. PVIndex [13]
Equation 2. The line overload index
PVIndex = ∑ (VM − 1) * P
LoadBuses
LOAD
NL
LOI = ∑ (MVALine− MVALineLim )⋅ MVALineLim
it it
i =1
5. where, VM is a load bus voltage in per unit terms and PLOAD For the total of four selected training features, it is interesting
the active load of each load bus. to point out the average per contingency training times, as in
table 2. The neural network training time increases
exponentially with number of hidden layer nodes used.
IV CROSS VALIDATIONS AND RESULTS
Table 2. Four features average per contingency training times
UMLPSE can serve as a testing toolkit for contingencies as
well as for testing alternative network indices and automatic Decision Neural Networks (One Hidden Layer Fully Connected
Trees Feed-Forward NN)
learning tools. In what follows an illustrative example is
3 Nodes 8 nodes 30 Nodes
given describing experiment results of a typical UMLPSE use
< 1second 9.29 seconds 58.57 seconds 6 min. and 45 sec.
case.
In this case 5-fold cross validations have been applied. By the
term N-fold cross validations, we denote N - different
repetitions of the randomisation - test / training data split, B. The results
automatic tool training and testing UMLPSE operations,
based on the same data set of features. N-fold cross There is variety of factors that influence the quality of
validations aim at eliminating bias in data selection. predictions in a machine learning environment used for
contingency analysis. The ability of the selected features to
well describe an operating point of the network is one factor.
A. The experiment The qualities of the machine learning tools used is another. A
third, even more important factor is the character of the
The experiment refers to the Greek island of Crete network contingency itself. There are “most of the times” innocent and
and as “base case” is taken the peak load of year 1996 - 1997 “most of the times” fatal contingencies in reference to the
operating point. Operating point simulation includes 20 operating points they are applied on. For any such category of
connectivity Ci scenarios removing one to three lines and zero contingencies, predictions tend to reach a high score.
to one buses, four Lj load scenarios, uniformly decreasing Contingencies lying in between these two extremities tend to
load from 100% (base case is a maximum load base case exhibit a behaviour that is more difficult to predict correctly.
scenario) to 70% base case load and six generation Gk We believe that through N-fold cross validations the
scenarios. The number of the simulated operating points UMLPSE researcher has the ability to automatically identify,
equals to Ci x Lj x Gk = 480. Once screened for violations, 287 the most “predictable” and the most “unpredictable” sets of
operating points (out of 480) suitable for the contingency contingencies. So a contingency may be “predictable and
study are stored in the operating point data warehouse. A total innocent”, while another one maybe “unpredictable and
of seven line contingencies are defined as in table 1. fatal”. The second type of contingencies is of more interest to
the researcher. The “predictability” of a contingency can be
Table 1. The contingencies of the experiment measured through high score N-fold cross validations. How
“innocent” a contingency is, can be measured as the
Contg# Buses Lines From line# To line# From line# To line# percentage of the data warehouse operating points that prove
1 0 1 2 4 to be “innocent” (when a certain contingency is applied on
2 0 1 6 11 them), over the whole population of data warehouse operating
3 0 1 6 8 points.
4 0 1 10 16
In what follows, the results of the experiment are presented
on an overall averaged per automatic learning tool basis and
5 0 2 2 4 10 16
on a per contingency basis for all averaged 5-fold cross
6 0 2 2 4 6 8
validations. Simple index and quality index (as described in
7 0 2 6 8 6 11 equation 1) results are mentioned.
In the UMLPSE data warehouse a variety of indices and 1) Overall averaged results per automatic learning tool.
simpler network metrics are stored such as the network wide
active or reactive power generation. The user may select any Graph 1. Simple and Quality index results per automatic learning tool
number of indices and metrics.
Percentage of Successful predictions
100
90
For the experiment, the following features are selected for 80
70
every pre-contingency operating point: 60
50 SIMPLE INDEX
1. The total reactive power generation 40
30
QUALITY INDEX
2. The voltage stability index (as described in equation 5) 20
10
3. The total power flowing in all lines divided by the total 0
power rating limit (in MVA) DTREE 3HN NN 8HN NN 30HN
NN
4. The PI index (as described in equation 6)
6. Table 3. Per automatic learning tool Simple and Quality index results
REFERENCES
Decision One Hidden Layer Fully Connected
Trees Feed-Forward Neural Networks [1] Mitchell T.M., Machine Learning, McGraw-Hill Series in
3 Hidden 8 Hidden 30 Hidden Computer Science, 1997, §1.1
Nodes nodes Nodes [2] Hatziargyriou N.D., Contaxis G.C., Sideris N.C., A decision tree
Simple Index 85.18 63.02 70.13 75.85 method for on-line steady state security assessment, IEEE Trans. on
Quality Index Power Systems, Vol. 9, Nr. 2, May 1994, p. 1053, 1056.
90.10 74.24 79.87 83.89
[3] Cholley P., Lebrevelec C., Vitet S., de Pasquale M., A Statistical
Approach to Assess Voltage Stability Limits, Bulk Power System
2) Averaged results per contingency. Dynamics, and Control IV – Restructuring, August 24-28,
Santorini, Greece.
Graph 2. Simple Index (SI) and Quality index (QI) results per automatic [4] Grady M., PCFLO Version 2.4 User Manual, ECE Dept, The
learning tool (DTREE = Decision Tree, HN = Hidden Node, NN = Neural University of Texas at Austin, January 15, 1995.
Network). http://www.ece.utexas.edu/~grady/ (PCFLO Software also
downloadable from the site).
[5] Fowler M., Scott K., UML Distilled: A Brief Guide to the Standard
Percentage of successful predictions
100
90 C o n t. 1
Object Modeling Language (2nd Edition)
80
C o n t. 2
[6] Srivastava L., Singh S.N., Sharma J., Knowledge-based neural
70
60 C o n t. 3
network for voltage contingency selection and ranking, IEE Proc. –
50 C o n t. 4 Gener. Trasm. Distrib., Vol. 146, Nr. 6, Nov. 1999, p.650, 651
40
C o n t. 5 [7] Weiss, S., Indurkhya N., Predictive data mining, Morgan
Kaufmann, 1998.
30
20 C o n t. 6
10 C o n t. 7 [8] S. Jadid, M.R. Rokni, “An expert system to improve power system
0
contingency analysis”, Electric Power Systems Research 40 (1997),
p.p. 37-43.
N
N
N
N
N
EE
N
EE
N
N
N
N
N
N
TR
TR
N
N
N
N
N
N
[9] G.C. Ejebe, B.F. Wollenberg, “Automatic contingency
H
H
0H
3H
8H
H
ID
D
I3
I8
30
I3
SI
Q
SI
SI
Q
Q
SI
Q
selection”, IEEE Transactions on Power Apparatus and Systems,
Vol.PAS-98, No.1. Jan/Feb 1979, p.p. 97-109.
[10] M.G. Lauby, T.A. Mikolinnas, N.D. Reppen, “Contingency
selection of branch outages causing voltage problems”, IEEE
Figure 5. UMLPSE toolkit snapshot Transactions on Power Apparatus and Systems, Vol.PAS-102,
No.12. December 1983, p.p. 3899-3904.
[11] F. Albuyeh, A.Bose, B.Heath, “Reactive power considerations in
automatic contingency selection”, IEEE Transactions on Power
Apparatus and Systems, Vol.PAS-101, No.1 January 1982, p.p.
107-112.
[12] T.A. Mikolinnas, B.F. Wollenberg, “An advanced contingency
selection algorithm”, IEEE Transactions on Power Apparatus and
Systems, Vol.PAS-100, No.2. February 1981, p.p. 608-611.
[13] Wehenkel L.A., Automatic Learning Techniques in Power Systems,
Kluwer Academic Publ., 1998, p.210
[14] N. Yorino, S. Harada, K. Hayashi, H. Sasaki, “A method of voltage
stability evaluation for contingencies”, Bulk Power System
Dynamics, and Control IV –August 24-28, Santorini, Greece.
V. CONCLUSIONS
[15] Semitekos D. D., Avouris N. M., Giannakopoulos G. B., A Flexible
Machine Learning Environment for Steady State Security
UMLPSE is the result of a long-standing effort to build an Assessment of Power Systems, IASTED International Conference
automatic, standalone network-independent toolkit for steady on Power and Energy Systems (Euro-PES 2001) July 2001
state contingency analysis. Additional information on this
research can be found in [15]. BIOGRAPHIES
Though the results achieved are encouraging, there are a
number of possible improvements that can still be made. For Dimitrios Semitekos Holds a Degree in Statistics and
Αctuarial science, University of Piraeus, Greece, 1994-
instance, UMLPSE capabilities can be extended for all 1995: MSc in Computing University of Wales, U.K.
network component outages. Also contingency analysis for researcher of the University of Neuchâtel-Switzerland.
any given operating point data set, not belonging in the 1996-, PhD candidate of the University of Patras,
testing data set can be integrated. Towards this direction, a Greece. His main research interests include data
mining, machine learning, and power systems
machine learning tool “run - time estimator” that has been applications.
implemented serving so far as a stand-alone module is
planned to be integrated in the toolkit. Nikolaos M. Avouris, Professor of Software
Operating point indices, metrics and quality measures can be Technology of the Electrical and Computer Engineering
Department of the University of Patras, Greece.
further enriched with more versatile, composite, or even user- Research Interests: Human-Computer Interaction,
defined ones. Interactive Systems Design, Distributed Intelligent
Systems, application of Knowledge -based techniques
ACKNOWLEDGEMENTS in industrial, environmental and educational fields.
The research reported here is partially funded by GSRT and
the Public Power Corporation of Greece under the YPER
project “Contingency Analysis of Large Electrical Networks”.