The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Electricity theft is a major contributor of nontechnical losses in the distribution systems of the smart grid. However, owing to the resource-limitations of smart meters and the privacy requirement of electricity usage data, theft detection has become a challenging task for electric utilities. To address this problem, a Distributed Intelligent Framework for Electricity Theft Detection (DIFETD) is...
The smart grid is characterized by the proliferation of advanced digital controllers at all levels of its operational hierarchy from generation to end consumption. Such controllers within modern residential and commercial buildings enable grid operators to exercise fine-grained control over energy consumption through several emerging buildings-to-grid (B2G) applications. Though this capability promises...
Blockchain may help solve several complex problems related to securing the integrity and trustworthiness of rapid, distributed, complex energy transactions and data exchanges. In a move towards grid resilience, blockchain commoditizes trust and enables automated smart contracts to support auditable multiparty transactions based on predefined rules between distributed energy providers and customers...
In this paper, we present our Energy Management Systems (EMS) with intelligent anomaly detection techniques that achieve real-time detection of outlier(s), prediction of future fault(s), and extraction and amendment of historical data anomalies. The EMS has adopted advanced outlier detection theories and frameworks to optimize the use of key energy devices such as distributed energy storages with...
As the malware threat landscape is constantly evolving and over one million new malware strains are being generated every day [1], early automatic detection of threats constitutes a top priority of cybersecurity research, and amplifies the need for more advanced detection and classification methods that are effective and efficient. In this paper, we present the application of machine learning algorithms...
In recent years, researchers have shown that deep learning (DL) can be used to construct highly accurate models to solve many problems. However, training DL models requires large datasets and vast amounts of computation. With millions of malware variants being created every day, we contend that there is plenty of data to build deep learning models to classify malicious applications. However, finding...
Cross-pollination has been used by biologists and the horticultural community to increase resilience to disease, insects, and other undesirable conditions in plants for centuries. This paper applies the concept of cross-pollination to educating the workforce at the graduate level. Crosspollination in the context of education implies the free-flow of ideas across disciplines by co-locating learners...
The transition from the traditional power grid to the smart grid improves reliability, performance, and management, while simultaneously increasing its susceptibility to cyberattacks. One of the biggest weaknesses in grid security is the human agent responsible for its maintenance and operations. As such, it is crucial to embed hands-on understanding of grid operations and security, especially for...
Vehicular Ad Hoc Networks (VANET) are the fastchanging networks for connected vehicles, in which Vehicle- to-Vehicle and Vehicle-to-Infrastructure communication are the basis for technologies aiming at reducing accidents and improving operation. DSRC Safety Applications, designed to assist drivers in order to avoid accidents, might be subjected to malicious attacks, such as GPS time spoofing attacks,...
Verifying attacks against cyber physical systems can be a costly and time-consuming process. By using a simulated environment, attacks can be verified quickly and accurately. By combining the simulation of a cyber physical system with a hybrid attack graph, the effects of a series of exploits can be accurately analysed. Furthermore, the use of a simulated environment to verify attacks may uncover...
In this paper, the problem of flocking of MultiAgent Systems (MAS) in presence of system uncertainties and unknown disturbances is investigated. A biologically-inspired novel distributed resilient controller based on a computational model of emotional learning in mammalian brain is proposed. The methodology, known as Brain Emotional Learning Based Intelligent Controller (BELBIC), embeds a resilience...
This paper reports a new development in relation to a recently published algorithm by the authors [1]. The algorithm iteratively searches for a minimum number of phasor measurement units to be added into a power system to meet a prescribed synchrophasor availability (SA). SA constraints impose a resilience requirement in the face of random interruptions in both power and data transmissions. Our earlier...
This paper proposes an algorithm for efficient offline computation and representation of regions of attraction (RoA) to speed up assessing transient stability on-line of large lossy power systems. The RoAs are obtained for prescribed normal and post-fault circuit topologies in the form of unions of ellipsoids. The RoAs provide the basis of the decision support for a Secondary Protection (SP) scheme...
This paper details the design of an autonomous vehicle CAD toolchain, which captures formal descriptions of driving scenarios in order to develop a safety case for an autonomous vehicle (AV). Rather than focus on a particular component of the AV, like adaptive cruise control, the toolchain models the end-to-end dynamics of the AV in a formal way suitable for testing and verification. First, a domain-specific...
Biomass feedstock preprocessing through comminution is an essential first step in biofuel production. Chemical, physical and mechanical variability in feedstock prevents the preprocessing plants from assuming constant control parameters. Constant control parameters can lead to suboptimal capability and reliability. However, adapting the control parameters to account for the variabilities is not a...
In order to assess the resilience of a system, a set of measures must be defined. Varying control architecture while considering such a system of metrics targeted at resilience can determine the relative merit of the architectures with respect to the resilience of the system. Traditionally, electricity distribution is concerned with delivery of power from transmission or sub transmission to consumer...
Identification of temporal and topology related challenges to the operation of modern distribution systems (MDS) with high penetration of distributed energy resources is critical to developing and assessing control strategies. This paper proposes analysis of typical and historical load and generation patterns to identify and anticipate critical intersections in generation and load that stress distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.