1,733 research outputs found

    A Review on Application of Artificial Intelligence Techniques in Microgrids

    Get PDF
    A microgrid can be formed by the integration of different components such as loads, renewable/conventional units, and energy storage systems in a local area. Microgrids with the advantages of being flexible, environmentally friendly, and self-sufficient can improve the power system performance metrics such as resiliency and reliability. However, design and implementation of microgrids are always faced with different challenges considering the uncertainties associated with loads and renewable energy resources (RERs), sudden load variations, energy management of several energy resources, etc. Therefore, it is required to employ such rapid and accurate methods, as artificial intelligence (AI) techniques, to address these challenges and improve the MG's efficiency, stability, security, and reliability. Utilization of AI helps to develop systems as intelligent as humans to learn, decide, and solve problems. This paper presents a review on different applications of AI-based techniques in microgrids such as energy management, load and generation forecasting, protection, power electronics control, and cyber security. Different AI tasks such as regression and classification in microgrids are discussed using methods including machine learning, artificial neural networks, fuzzy logic, support vector machines, etc. The advantages, limitation, and future trends of AI applications in microgrids are discussed.©2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.fi=vertaisarvioitu|en=peerReviewed

    Métodos difusos y factores para la identificación del nivel de riesgos de TI en entidades gubernamentales: Una revisión sistemática de la literatura

    Get PDF
    En la actualidad la tecnología está tomando un rol muy importante en la automatización de procesos en las organizaciones, éstos son abastecidos por activos como: servidores y aplicaciones, donde se involucra todo tipo de información que pueda ser manejada y manipulada. Todo ello trae consigo riesgos de TI a los que se encuentran expuestos por falta de una gestión y análisis organizacional adecuado; los ciberataques cada día evolucionan conjuntamente con los avances tecnológicos, según reportes de dos grandes compañías de seguridad informática como ESET y Kaspersky muestra que la preocupación de las empresas en general se centra en el robo de la información y la infección con códigos maliciosos. Para poder realizar un análisis de riesgos es necesario clasificarlos por niveles a través de factores evaluados de manera cualitativa, así como también hacer uso de una metodología que permita obtener resultados en cuanto a las variables establecidas, para ello es necesario el uso de un modelo difuso adecuado que permita la graduación de los valores introducidos para el análisis. En este estudio se busca identificar métodos de lógica difusa, como también el reconocimiento de factores para la identificación de riesgos de las tecnologías de la información, para su determinación se realizó una revisión sistemática de la literatura utilizando bases de datos reconocidas, de un total de 352 artículos identificados se revisaron 31 artículos donde se puede concluir que existen distintos métodos difusos para la evaluación de riesgos de TI en base a factores como: probabilidad e impacto.LIMAEscuela Profesional de Ingeniería de SistemasIngeniería de Sistemas y Comunicacione

    Particle swarm optimization and spiral dynamic algorithm-based interval type-2 fuzzy logic control of triple-link inverted pendulum system: A comparative assessment

    Get PDF
    This paper presents investigations into the development of an interval type-2 fuzzy logic control (IT2FLC) mechanism integrated with particle swarm optimization and spiral dynamic algorithm. The particle swarm optimization and spiral dynamic algorithm are used for enhanced performance of the IT2FLC by finding optimised values for input and output controller gains and parameter values of IT2FLC membership function as comparison purpose in order to identify better solution for the system. A new model of triple-link inverted pendulum on two-wheels system, developed within SimWise 4D software environment and integrated with Matlab/Simulink for control purpose. Several tests comprising system stabilization, disturbance rejection and convergence accuracy of the algorithms are carried out to demonstrate the robustness of the control approach. It is shown that the particle swarm optimization-based control mechanism performs better than the spiral dynamic algorithm-based control in terms of system stability, disturbance rejection and reduce noise. Moreover, the particle swarm optimization-based IT2FLC shows better performance in comparison to previous research. It is envisaged that this system and control algorithm can be very useful for the development of a mobile robot with extended functionality

    Deep Learning-Based, Passive Fault Tolerant Control Facilitated by a Taxonomy of Cyber-Attack Effects

    Get PDF
    In the interest of improving the resilience of cyber-physical control systems to better operate in the presence of various cyber-attacks and/or faults, this dissertation presents a novel controller design based on deep-learning networks. This research lays out a controller design that does not rely on fault or cyber-attack detection. Being passive, the controller’s routine operating process is to take in data from the various components of the physical system, holistically assess the state of the physical system using deep-learning networks and decide the subsequent round of commands from the controller. This use of deep-learning methods in passive fault tolerant control (FTC) is unique in the research literature. The proposed controller is applied to both linear and nonlinear systems. Additionally, the application and testing are accomplished with both actuators and sensors being affected by attacks and /or faults

    Evaluating strategies for implementing industry 4.0: a hybrid expert oriented approach of B.W.M. and interval valued intuitionistic fuzzy T.O.D.I.M.

    Get PDF
    open access articleDeveloping and accepting industry 4.0 influences the industry structure and customer willingness. To a successful transition to industry 4.0, implementation strategies should be selected with a systematic and comprehensive view to responding to the changes flexibly. This research aims to identify and prioritise the strategies for implementing industry 4.0. For this purpose, at first, evaluation attributes of strategies and also strategies to put industry 4.0 in practice are recognised. Then, the attributes are weighted to the experts’ opinion by using the Best Worst Method (BWM). Subsequently, the strategies for implementing industry 4.0 in Fara-Sanat Company, as a case study, have been ranked based on the Interval Valued Intuitionistic Fuzzy (IVIF) of the TODIM method. The results indicated that the attributes of ‘Technology’, ‘Quality’, and ‘Operation’ have respectively the highest importance. Furthermore, the strategies for “new business models development’, ‘Improving information systems’ and ‘Human resource management’ received a higher rank. Eventually, some research and executive recommendations are provided. Having strategies for implementing industry 4.0 is a very important solution. Accordingly, multi-criteria decision-making (MCDM) methods are a useful tool for adopting and selecting appropriate strategies. In this research, a novel and hybrid combination of BWM-TODIM is presented under IVIF information

    IMPROVEMENT OF POWER QUALITY OF HYBRID GRID BY NON-LINEAR CONTROLLED DEVICE CONSIDERING TIME DELAYS AND CYBER-ATTACKS

    Get PDF
    Power Quality is defined as the ability of electrical grid to supply a clean and stable power supply. Steady-state disturbances such as harmonics, faults, voltage sags and swells, etc., deteriorate the power quality of the grid. To ensure constant voltage and frequency to consumers, power quality should be improved and maintained at a desired level. Although several methods are available to improve the power quality in traditional power grids, significant challenges exist in modern power grids, such as non-linearity, time delay and cyber-attacks issues, which need to be considered and solved. This dissertation proposes novel control methods to address the mentioned challenges and thus to improve the power quality of modern hybrid grids.In hybrid grids, the first issue is faults occurring at different points in the system. To overcome this issue, this dissertation proposes non-linear controlled methods like the Fuzzy Logic controlled Thyristor Switched Capacitor (TSC), Adaptive Neuro Fuzzy Inference System (ANFIS) controlled TSC, and Static Non-Linear controlled TSC. The next issue is the time delay introduced in the network due to its complexities and various computations required. This dissertation proposes two new methods such as the Fuzzy Logic Controller and Modified Predictor to minimize adverse effects of time delays on the power quality enhancement. The last and major issue is the cyber-security aspect of the hybrid grid. This research analyzes the effects of cyber-attacks on various components such as the Energy Storage System (ESS), the automatic voltage regulator (AVR) of the synchronous generator, the grid side converter (GSC) of the wind generator, and the voltage source converter (VSC) of Photovoltaic (PV) system, located in a hybrid power grid. Also, this dissertation proposes two new techniques such as a Non-Linear (NL) controller and a Proportional-Integral (PI) controller for mitigating the adverse effects of cyber-attacks on the mentioned devices, and a new detection and mitigation technique based on the voltage threshold for the Supercapacitor Energy System (SES). Simulation results obtained through the MATLAB/Simulink software show the effectiveness of the proposed new control methods for power quality improvement. Also, the proposed methods perform better than conventional methods

    Advanced detection Denial of Service attack in the Internet of Things network based on MQTT protocol using fuzzy logic

    Get PDF
    Message Queuing Telemetry Transport (MQTT) is one of the popular protocols used on the Internet of Things (IoT) networks because of its lightweight nature. With the increasing number of devices connected to the internet, the number of cybercrimes on IoT networks will increase. One of the most popular attacks is the Denial of Service (DoS) attack. Standard security on MQTT uses SSL/TLS, but SSL/TLS is computationally wasteful for low-powered devices. The use of fuzzy logic algorithms with the Intrusion Detection System (IDS) scheme is suitable for detecting DoS because of its simple nature. This paper uses a fuzzy logic algorithm embedded in a node to detect DoS in the MQTT protocol with feature selection nodes. This paper's contribution is that the nodes feature selection used will monitor SUBSCRIBE and SUBACK traffic and provide this information to fuzzy input nodes to detect DoS attacks. Fuzzy performance evaluation is measured against changes in the number of nodes and attack intervals. The results obtained are that the more the number of nodes and the higher the traffic intensity, the fuzzy performance will decrease, and vice versa. However, the number of nodes and traffic intensity will affect fuzzy performance
    corecore