151 research outputs found

    Siamese recurrent neural networks for the robust classification of grid disturbances in transmission power systems considering unknown events

    Get PDF
    The automated identification and localisation of grid disturbances is a major research area and key technology for the monitoring and control of future power systems. Current recognition systems rely on sufficient training data and are very error-prone to disturbance events, which are unseen during training. This study introduces a robust Siamese recurrent neural network using attention-based embedding functions to simultaneously identify and locate disturbances from synchrophasor data. Additionally, a novel double-sigmoid classifier is introduced for reliable differentiation between known and unknown disturbance types and locations. Different models are evaluated within an open-set classification problem for a generic power transmission system considering different unknown disturbance events. A detailed analysis of the results is provided and classification results are compared with a state-of-the-art open-set classifier

    Combined network intrusion and phasor data anomaly detection for secure dynamic control centers

    Get PDF
    The dynamic operation of power transmission systems requires the acquisition of reliable and accurate measurement and state information. The use of TCP/IP-based communication protocols such as IEEE C37.118 or IEC 61850 introduces different gateways to launch cyber-attacks and to compromise major system operation functionalities. Within this study, a combined network intrusion and phasor data anomaly detection system is proposed to enable a secure system operation in the presence of cyber-attacks for dynamic control centers. This includes the utilization of expert-rules, one-class classifiers, as well as recurrent neural networks to monitor different network packet and measurement information. The effectiveness of the proposed network intrusion and phasor data anomaly detection system is shown within a real-time simulation testbed considering multiple operation and cyber-attack conditions
    • …
    corecore