Application of cluster analysis for enhancing power consumption awareness in smart grids

Author(s):  
Guido Coletta ◽  
Alfredo Vaccaro ◽  
Domenico Villacci ◽  
Ahmed F. Zobaa
2012 ◽  
Vol 2012 ◽  
pp. 1-12 ◽  
Author(s):  
Aravind Kailas ◽  
Valentina Cecchi ◽  
Arindam Mukherjee

With the exploding power consumption in private households and increasing environmental and regulatory restraints, the need to improve the overall efficiency of electrical networks has never been greater. That being said, the most efficient way to minimize the power consumption is by voluntary mitigation of home electric energy consumption, based on energy-awareness and automatic or manual reduction of standby power of idling home appliances. Deploying bi-directional smart meters and home energy management (HEM) agents that provision real-time usage monitoring and remote control, will enable HEM in “smart households.” Furthermore, the traditionally inelastic demand curve has began to change, and these emerging HEM technologies enable consumers (industrial to residential) to respond to the energy market behavior to reduce their consumption at peak prices, to supply reserves on a as-needed basis, and to reduce demand on the electric grid. Because the development of smart grid-related activities has resulted in an increased interest in demand response (DR) and demand side management (DSM) programs, this paper presents some popular DR and DSM initiatives that include planning, implementation and evaluation techniques for reducing energy consumption and peak electricity demand. The paper then focuses on reviewing and distinguishing the various state-of-the-art HEM control and networking technologies, and outlines directions for promoting the shift towards a society with low energy demand and low greenhouse gas emissions. The paper also surveys the existing software and hardware tools, platforms, and test beds for evaluating the performance of the information and communications technologies that are at the core of future smart grids. It is envisioned that this paper will inspire future research and design efforts in developing standardized and user-friendly smart energy monitoring systems that are suitable for wide scale deployment in homes.


The advent of the Internet of Things (IoT) augurs new cutting-edge applications in modern life such as smart cities and smart grids. These applications require protocols more efficient for ensuring the reliability of data communications in the IoT networks. Many works state that IoT cannot meet their demands without application protocols improvement with Artificial Intelligence (AI) as IoT are expected to generate unprecedented traffic giving IoT researchers access to data that can help in studying and analyzing the demands and develop application protocols conceptions to meet the requirement of IoT applications. In literature, several works introduced AI in some layers of the TCP/IP model including wireless communication and routing. In this article, an evaluation of application protocols HTTP, MQTT, DDS, XMPP, AMQP, and CoAP has been presented; and subsequently, the power consumption prediction of MQTT and COAP based on the linear regression model is analyzed, in order to enhance data communications in IoT applications.


Energies ◽  
2019 ◽  
Vol 12 (17) ◽  
pp. 3310 ◽  
Author(s):  
Md. Nazmul Hasan ◽  
Rafia Nishat Toma ◽  
Abdullah-Al Nahid ◽  
M M Manjurul Islam ◽  
Jong-Myon Kim

Among an electricity provider’s non-technical losses, electricity theft has the most severe and dangerous effects. Fraudulent electricity consumption decreases the supply quality, increases generation load, causes legitimate consumers to pay excessive electricity bills, and affects the overall economy. The adaptation of smart grids can significantly reduce this loss through data analysis techniques. The smart grid infrastructure generates a massive amount of data, including the power consumption of individual users. Utilizing this data, machine learning and deep learning techniques can accurately identify electricity theft users. In this paper, an electricity theft detection system is proposed based on a combination of a convolutional neural network (CNN) and a long short-term memory (LSTM) architecture. CNN is a widely used technique that automates feature extraction and the classification process. Since the power consumption signature is time-series data, we were led to build a CNN-based LSTM (CNN-LSTM) model for smart grid data classification. In this work, a novel data pre-processing algorithm was also implemented to compute the missing instances in the dataset, based on the local values relative to the missing data point. Furthermore, in this dataset, the count of electricity theft users was relatively low, which could have made the model inefficient at identifying theft users. This class imbalance scenario was addressed through synthetic data generation. Finally, the results obtained indicate the proposed scheme can classify both the majority class (normal users) and the minority class (electricity theft users) with good accuracy.


2019 ◽  
Vol 11 (1) ◽  
pp. 251 ◽  
Author(s):  
Huijuan Wang ◽  
Wenrong Yang ◽  
Tingyu Chen ◽  
Qingxin Yang

In recent years, Smart Grids have been developing globally. Since smart meters only acquire low-frequency data, non-intrusive load monitoring technology using the signature extracted from high-frequency data needs an additional measurement device to be installed, so it is not suitable for promotion to the smart grid environment. However, methods using low-frequency features are poorly-suited when several appliances are switched on at the same time, or devices with similar power values are used. In response to these problems, this paper proposes a load disaggregation method based on the power consumption patterns of appliances, combining an improved mathematical optimization model and optimized bird swarm algorithm (OBSA) for load disaggregation. Experiments show that the method can effectively identify the operating states of appliances, and deal with situations in which multiple instruments have similar power characteristics or are simultaneously switching. The performance comparison proves that the improved model is more efficient than the traditional active and reactive power (PQ) optimization model in load disaggregation performance and computation time, and also verifies the robustness of the proposed method and the convergence of OBSA. As an inexpensive method without extra measurement hardware installed, the process is suitable for large-scale applications in smart grids.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5075
Author(s):  
Mohammed Almshari ◽  
Georgios Tsaramirsis ◽  
Adil Omar Khadidos ◽  
Seyed Mohammed Buhari ◽  
Fazal Qudus Khan ◽  
...  

Monitoring what application or type of applications running on a computer or a cluster without violating the privacy of the users can be challenging, especially when we may not have operator access to these devices, or specialized software. Smart grids and Internet of things (IoT) devices can provide power consumption data of connected individual devices or groups. This research will attempt to provide insides on what applications are running based on the power consumption of the machines and clusters. It is therefore assumed that there is a correlation between electric power and what software application is running. Additionally, it is believed that it is possible to create power consumption profiles for various software applications and even normal and abnormal behavior (e.g., a virus). In order to achieve this, an experiment was organized for the purpose of collecting 48 h of continuous real power consumption data from two PCs that were part of a university computer lab. That included collecting data with a one-second sample period, during class as well as idle time from each machine and their cluster. During the second half of the recording period, one of the machines was infected with a custom-made virus, allowing comparison between power consumption data before and after infection. The data were analyzed using different approaches: descriptive analysis, F-Test of two samples of variance, two-way analysis of variance (ANOVA) and autoregressive integrated moving average (ARIMA). The results show that it is possible to detect what type of application is running and if an individual machine or its cluster are infected. Additionally, we can conclude if the lab is used or not, making this research an ideal management tool for administrators.


Sign in / Sign up

Export Citation Format

Share Document