ترغب بنشر مسار تعليمي؟ اضغط هنا

Detection of Faults in Power System Using Wavelet Transform and Independent Component Analysis

150   0   0.0 ( 0 )
 نشر من قبل Harishchandra Dubey
 تاريخ النشر 2016
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

Uninterruptible power supply is the main motive of power utility companies that motivate them for identifying and locating the different types of faults as quickly as possible to protect the power system prevent complete power black outs using intelligent techniques. Thus, the present research work presents a novel method for detection of fault disturbances based on Wavelet Transform (WT) and Independent Component Analysis (ICA). The voltage signal is taken offline under fault conditions and is being processed through wavelet and ICA for detection. The time-frequency resolution from WT transform detects the fault initiation instant in the signal. Again, a performance index is calculated from independent component analysis under fault condition which is used to detect the fault disturbance in the voltage signal. The proposed approach is tested to be robust enough under various operating scenarios like without noise, with 20-dB noise and variation in frequency. Further, the detection study is carried out using a performance index, energy content, by applying the existing Fourier transform (FT), short time Fourier transform (STFT) and the proposed wavelet transform. Fault disturbances are detected if the energy calculated in each scenario is greater than the corresponding threshold value. The fault detection study is simulated in MATLAB/Simulink for a typical power system.



قيم البحث

اقرأ أيضاً

Wavelet transform is proposed in this paper for detection of islanding and fault disturbances distributed generation (DG) based power system. An IEEE 14-bus system with DG penetration is considered for the detection of disturbances under different op erating conditions. The power system is a hybrid combination of photovoltaic, and wind energy system connected to different buses with different level of penetration. The voltage signal is retrieved at the point of common coupling (PCC) and processed through wavelet transform to detect the disturbances. Further, energy and standard deviation (STD) as performance indices are evaluated and compared with a suitable threshold in order to analyze a disturbance condition. Again, a comparative analysis between the existing and proposed detection is studied to prove the better performance of wavelet transform.
In this work, we performed a thorough comparative analysis on a radio frequency (RF) based drone detection and identification system (DDI) under wireless interference, such as WiFi and Bluetooth, by using machine learning algorithms, and a pre-traine d convolutional neural network-based algorithm called SqueezeNet, as classifiers. In RF signal fingerprinting research, the transient and steady state of the signals can be used to extract a unique signature from an RF signal. By exploiting the RF control signals from unmanned aerial vehicles (UAVs) for DDI, we considered each state of the signals separately for feature extraction and compared the pros and cons for drone detection and identification. Using various categories of wavelet transforms (discrete wavelet transform, continuous wavelet transform, and wavelet scattering transform) for extracting features from the signals, we built different models using these features. We studied the performance of these models under different signal to noise ratio (SNR) levels. By using the wavelet scattering transform to extract signatures (scattergrams) from the steady state of the RF signals at 30 dB SNR, and using these scattergrams to train SqueezeNet, we achieved an accuracy of 98.9% at 10 dB SNR.
Non-stationary forced oscillations (FOs) have been observed in power system operations. However, most detection methods assume that the frequency of FOs is stationary. In this paper, we present a methodology for the analysis of non-stationary FOs. Fi rstly, Fourier synchrosqueezing transform (FSST) is used to provide a concentrated time-frequency representation of the signals that allows identification and retrieval of non-stationary signal components. To continue, the Dissipating Energy Flow (DEF) method is applied to the extracted components to locate the source of forced oscillations. The methodology is tested using simulated as well as real PMU data. The results show that the proposed FSST-based signal decomposition provides a systematic framework for the application of DEF Method to non-stationary FOs.
We propose a 2D generalization to the $M$-band case of the dual-tree decomposition structure (initially proposed by N. Kingsbury and further investigated by I. Selesnick) based on a Hilbert pair of wavelets. We particularly address (textit{i}) the co nstruction of the dual basis and (textit{ii}) the resulting directional analysis. We also revisit the necessary pre-processing stage in the $M$-band case. While several reconstructions are possible because of the redundancy of the representation, we propose a new optimal signal reconstruction technique, which minimizes potential estimation errors. The effectiveness of the proposed $M$-band decomposition is demonstrated via denoising comparisons on several image types (natural, texture, seismics), with various $M$-band wavelets and thresholding strategies. Significant improvements in terms of both overall noise reduction and direction preservation are observed.
An unobservable false data injection (FDI) attack on AC state estimation (SE) is introduced and its consequences on the physical system are studied. With a focus on understanding the physical consequences of FDI attacks, a bi-level optimization probl em is introduced whose objective is to maximize the physical line flows subsequent to an FDI attack on DC SE. The maximization is subject to constraints on both attacker resources (size of attack) and attack detection (limiting load shifts) as well as those required by DC optimal power flow (OPF) following SE. The resulting attacks are tested on a more realistic non-linear system model using AC state estimation and ACOPF, and it is shown that, with an appropriately chosen sub-network, the attacker can overload transmission lines with moderate shifts of load.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا