Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3331453.3361641acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

A Power Anomaly Detection Architecture Based on DNN

Published: 22 October 2019 Publication History

Abstract

Different from the traditional power data mining, it is proposed to use DNN (Deep Neural Networks) to deeply process the data, so as to discover power faults and abnormal behaviours in time. The result obtained ensures the normal operation of the power system; according to the characteristics of the user's electricity consumption data provided by the power company, the optimization methods such as oversampling are used to extract the maximum retained data information. At the same time, the accuracy of training is improved and the training complexity is reduced. A deep learning model is used to classify single point anomalies based on time series data. Agile AI (Artificial Intelligence) engineering architecture, offline batch data training and online model real-time detection are combined. Agile AI engineering is constantly improving accuracy. More importantly, the adaptability has been improved to ensure accuracy and efficiency in different scenarios.

References

[1]
Kaune W T, Zaffanella L E (1994). Assessing historical exposures of children to power-frequency magnetic fields. Journal of exposure analysis and environmental epidemiology, 4(2), 149--170.
[2]
Jamasb T, Newbery D, Pollitt M (2006). Core indicators for determinants and performance of electricity sector reform in developing countries. International Journal of Regulation and Governance, 6(1), 43--78.
[3]
Fan W, Bifet A (2013). Mining big data: current status, and forecast to the future. ACM sIGKDD Explorations Newsletter, 14(2), 1--5.
[4]
Martin R C (2002). Agile software development: principles, patterns, and practices. Prentice Hall.
[5]
Hinton G, Deng L, Yu D, et al (2012). Deep neural networks for acoustic modeling in speech recognition. IEEE Signal processing magazine, 29.
[6]
Michrowska A, Bujok R, Harutyunyan S, et al (2004). Nitro-substituted Hoveyda- Grubbs ruthenium carbenes: enhancement of catalyst activity through electronic activation. Journal of the American Chemical Society, 126(30), 9318--9325.
[7]
Liu F T, Ting K M, Zhou Z H (2012). Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data (TKDD), 6(1), 3.
[8]
Goodfellow I, Pouget-Abadie J, Mirza M, et al (2012). Generative adversarial nets. Advances in neural information processing systems, 2672--2680.
[9]
Kang Y, Wang X, Cao X, et al (2018). Detecting Anomalous Users via Streaming Data Processing in Smart Grid. Proceedings of the 2018 International Conference on Mechatronic Systems and Robots. ACM, 14--20.
[10]
Szilágyi P, Nováczki S (2012). An automatic detection and diagnosis framework for mobile communication systems. IEEE transactions on Network and Service Management, 9(2), 184--197.
[11]
Zhang K, Shardt Y A W, Chen Z, et al (2017). A KPI-based process monitoring and fault detection framework for large-scale processes. ISA transactions, 68, 276--286.
[12]
Ciocarlie G F, Connolly C, Cheng C C, et al (2014). Anomaly detection and diagnosis for automatic radio network verification. International Conference on Mobile Networks and Management. Springer, Cham, 163--176.

Cited By

View all
  • (2020)KLS-A: A Full-Life-Time Anomaly Detection Method2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE)10.1109/ICAICE51518.2020.00101(489-493)Online publication date: Oct-2020

Index Terms

  1. A Power Anomaly Detection Architecture Based on DNN

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSAE '19: Proceedings of the 3rd International Conference on Computer Science and Application Engineering
      October 2019
      942 pages
      ISBN:9781450362948
      DOI:10.1145/3331453
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 October 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. AI engineering Architecture
      2. Adaptability
      3. Anomaly
      4. DNN
      5. Power data

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      CSAE 2019

      Acceptance Rates

      Overall Acceptance Rate 368 of 770 submissions, 48%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 20 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2020)KLS-A: A Full-Life-Time Anomaly Detection Method2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE)10.1109/ICAICE51518.2020.00101(489-493)Online publication date: Oct-2020

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media