ArticlePDF Available

Anomaly Detection Using Power Signature of Consumer Electrical Devices

Authors:

Abstract

The use of the smart grid for developing intelligent applications is a current trend of great importance. One advantage lies in the possibility of direct monitoring of all devices connected to the electrical network in order to prevent possible malfunctions. Therefore, this paper proposes a method for an automatic detection of the malfunctioning of low-intelligence consumer electrical devices. Malfunctioning means any deviation of a household device from its normal operating schedule. The method is based on a comparison technique, consisting in the correlation between the current power signature of a device and an ideal signature (the standard signature provided by the manufacturer). The first step of this method is to achieve a simplified form of power signature which keeps all the original features. Further, the signal is segmented based on the data provided by an event detection algorithm (values of the first derivatives) and each resulting component is approximated using a regression function. The final step consists of an analysis based on the correlation between the computed regression coefficients and the coefficients of the standard signal. Following this analysis all the differences are classified as a malfunctioning of the analyzed device.
Advances in Electrical and Computer Engineering Volume 15, Number 1, 2015
Anomaly Detection Using Power Signature of
Consumer Electrical Devices
Cosmin CERNAZANU-GLAVAN, Marius MARCU
Politehnica University of Timisoara, Timisoara, 300006, Romania
cosmin.cernazanu@cs.upt.ro, marius.marcu@cs.upt.ro
1Abstract—The use of the smart grid for developing
intelligent applications is a current trend of great importance.
One advantage lies in the possibility of direct monitoring of all
devices connected to the electrical network in order to prevent
possible malfunctions. Therefore, this paper proposes a method
for an automatic detection of the malfunctioning of low-
intelligence consumer electrical devices. Malfunctioning means
any deviation of a household device from its normal operating
schedule. The method is based on a comparison technique,
consisting in the correlation between the current power
signature of a device and an ideal signature (the standard
signature provided by the manufacturer). The first step of this
method is to achieve a simplified form of power signature
which keeps all the original features. Further, the signal is
segmented based on the data provided by an event detection
algorithm (values of the first derivatives) and each resulting
component is approximated using a regression function. The
final step consists of an analysis based on the correlation
between the computed regression coefficients and the
coefficients of the standard signal. Following this analysis all
the differences are classified as a malfunctioning of the
analyzed device.
Index Terms—Feature extraction, Pattern matching, Signal
analysis, Signal processing.
I. INTRODUCTION
The increasing of the electrical network over time and the
fact that it is broadly interconnected were the main reasons
for the occurrence of what it is called now a smart grid. The
difference between a power network and a smart grid is that
the latter uses digital technology to gather information used
to improve the services. [1] For this reason, we can say that
one of the priorities of the new type of network is to create a
link between the users and the providers of electric power.
This new infrastructure allows both utility providers and
third party companies to develop various applications which
provide specific services to their customers [2].
These applications offer numerous possibilities of
analysis of the operating mode of the power network and
permit better control of energy consumption costs. Future
consumer devices may be smart enough to communicate
with the grid infrastructure and metering devices, describe
their energy needs and select the optimum usage pattern
based on the best available tariff and technical assistance
and diagnosis (for this article).
The goal of our work is to enable customers to receive
information on the operation mode of personal electrical
devices [3]. We want to extend the smart grid to the
customer location and build a network of smart meters that
monitor all appliances.
This work has been supported by the project CHISTERA/1/01.10.2012 –
”GEMSCLAIM: GreenEr Mobile Systems by Cross LAyer Integrated
energy Management”.
Today, smart meters can analyze power consumption
variations of consumer devices and may send this
information to the utility company. The companies use data
received from their customers to generate their energy bill
and predict and optimize the energy distribution load
patterns. Instead, we propose collecting, storing and
processing data from smart meters locally and use their
power signatures for intelligent application development.
The variation in time of the power consumed by an
electrical device when executing a task is defined as the
power signature of that device. It can be seen that, in this
way, a power signature is specific to a certain device when
executing a particular task.
The method proposed in this paper is the automatic
detection of malfunctioning for low-intelligence consumer
electrical devices. Anomaly detection is made by comparing
the current power signature with an ideal signature (standard
signature) supplied by the manufacturer. Sections of the
signal that are not identical are considered malfunctioning
for the device.
Given the oscillatory nature of the signal (Fig. 2) it is
difficult to implement an automated method of comparison
based on the original signal. For this reason it is necessary to
achieve a simplified form of signal, which should retain all
the essential characteristics of the original signature (values
of the amplitude, variations of the frequency, changes of the
first derivative, etc.). For each component, the coefficient of
correlation between it and the standard components is
calculated. The automated analysis is based on these values
which form a correlation matrix.
In the next chapter we present the main achievements in
this domain, highlighting the advantages and disadvantages
for each achievement. In Chapter 3, we will make a brief
summary of the process for obtaining a simplified shape for
the power signature. This process has been already validated
and published in [4]. Chapter 4 presents the anomaly
detection algorithm using the shape signal from section 3,
together with the results of the experiments. The last section
presents the conclusions obtained in this study.
II. RELATED WORK
One of the first uses of the power signature occurred in
the PCB (printed circuits boards) industry. In order to
differentiate whether a PCB operates normally or exhibits
abnormalities, the voltage and current values were recorded
during a continuous operating mode. [5] After that, these
values (power signatures) were compared with a standard
shape, representing the normal operating mode for the
89
Digital Object Identifier 10.4316/AECE.2015.01013
1582-7445 © 2015 AECE
[Downloaded from www.aece.ro on Saturday, September 12, 2015 at 06:54:12 (UTC) by 195.49.254.25. Redistribution subject to AECE license or copyright.]
Advances in Electrical and Computer Engineering Volume 15, Number 1, 2015
boards. The resulted differences constituted a starting point
in the decision process that specifies whether there can be
operated problems with the board.
The monitoring process of the running mode can be done
with many devices on the market [6]. Of these, the most
common are Kill a Watt or Watts Up Pro (used by us to
collect the data needed).
Current researches are performed with the aid of complex
devices. Most of them are focused on the need of low
consumption of domestic users. A recent study [7] provides
an interesting solution for disaggregated consumption of
each electrical device used. The authors manage to extract
information that ultimately leads to a solution to calculate
the power consumption for each device. It should be noted
that much of the research is focused on how to obtain the
power signature, because the authors do not aim to make an
analysis process.
Starting from this, we must mention that there are
numerous solutions to obtain the power signature. One of
them is even suggested by the authors [8] and consists in an
intelligent framework based on wireless technology for a
continuous monitoring. Thus, by using a network of sensors,
it is provided a remote monitoring for any type of building:
from buildings to offices and private homes (Fig.1)
A new solution is proposed in [9] and uses the new
concept of Internet of Things (IoT) in order to speed up the
process of data acquisition. In this way, the authors ensure
us that it can prevent certain natural disasters and also, the
transmission of information is done with a low cost.
Subsequent to the monitoring and acquisition of the
power signature processes there is another process which
tries to analyze it. Thus, it ensures the extraction and
processing of important information available in the power
signature.
Figure 1. Overall smart monitoring infrastructure
This process takes place in two parts. In the first part it is
obtained a simplified form of signal that contains all the
parameters of the original one. In the second part, the
obtained signature form is analyzed and processed, and the
results are provided.
The method of obtaining the simplified form of the power
signature is well presented in [4] and it will be summarized
in the next chapter.
There are many methods for analyzing the power
signature and extracting the important information from it.
We start by presenting a method for classifying domestic
devices using two features: the power signature and the
harmonic features. [10] This study attempts to solve the
problem of how to predict the power consumption especially
for residential housing. For this purpose, it determines
several categories of consumer and tries to classify every
device in a certain category. A positive outcome of this
approach lies in a better understanding of the power
co
tained by the
m
no automatic power signature
an
mprove the results and
to extend the existing methodology.
lished and validated by
the authors and can be found in [4].
nsumption by the residents.
This article seeks to determine how a power signature is
changed when there appears some malfunctioning of the
electrical device. This is done by comparing the current
power signature with an ideal signature (ob
anufacturer in the normal operation mode).
Similar goals had as well the projects described in [11]
and [12]. The research in [11] focused on two main
directions: (1) the identification of a method capable to
determine the load characteristics of a device and (2) several
ways of signal processing needed to determine various types
of workload for the analyzed device. The authors of [11]
used the AC voltage and current signals and their detailed
variations. In our work we used the high level digitized
measured values of active power, voltage and current
consumption. The authors of [12] explain the method by
which there was implemented a solution used for monitoring
the AC (air conditioning) devices. Using a sensor network, it
is controlling several AC devices in different types of
buildings. The paper is focused on the monitoring solution
presentation that is mainly used for energy usage reporting
and analysis. However, some power signatures of daily
usage patterns for several office and consumer devices are
presented and discussed. But
alysis is presented in [12].
An interesting analysis [13], based on power signature is
made in order to detect the type of fault which can appear
into an induction motor drive. The analysis attempts to
separate the electrical faults cases from mechanical faults.
Detecting faults in an electrical device, using different
signatures (e.g. load signatures or frequency response
analysis signatures) was also the goal for the authors from
[14] and [15]. A practical approach of using power signature
and power factor was already done by the authors in [16].
However, in this paper we want to i
III. SIMPLIFIED FORM OF SIGNAL
In this chapter we will briefly present how to obtain a
clear form of a power signature. A more detailed description
of the process has already been pub
Figure 2. The power signature of a washing machine running a normal
rogram
p
90
[Downloaded from www.aece.ro on Saturday, September 12, 2015 at 06:54:12 (UTC) by 195.49.254.25. Redistribution subject to AECE license or copyright.]
Advances in Electrical and Computer Engineering Volume 15, Number 1, 2015
A. Filtering the signal with a low-pass filter
Original signal (Fig. 2) has many oscillations due to how
the power device turns on / off various electrical modules. In
our case, for a washing machine, the electric motor is turned
on / off every few seconds.
To eliminate these oscillations, the first method of signal
processing is to filter it by using a low-pass filter. The signal
obtained after filtering has a clearer shape and can be more
easily used, for further processing, than the original one. His
form remained the same and the amplitude of oscillations
was much reduced. For further reduction of oscillations in
the next step we will apply the Fast Fourier Transform
(FFT) to this signal.
B. Applying a Fast Fourier Transform
The FFT method transforms the signal from the time
domain into the frequency domain. This method aims at
selecting a fixed number of frequencies that are part of the
signal and tries rebuilding it using only these frequencies.
To reconstruct the signal, the most important frequencies
must be selected together with their amplitude. The manual
selection of these has led to poor results and that is why we
created an automatic method to select N number of these
frequencies (in descending order of their amplitude values).
After this transformation, the disappearance of some
oscillations that do not contain relevant information for the
signal can be observed. The FFT method simplifies the
signal shape but keeps constant all the values for the main
components of the signal.
C. Smoothing functions
Into a last attempt, the following processing method tries
to reduce more some of the remaining oscillations. This was
achieved by using a smoothing function for the oscillations
which presented large amplitudes. In our case, there are
several smoothing functions that can be applied. The best
results were obtained by applying a Gaussian smoothing
function and these can be seen in Fig. 3
After applying this method the signal has the best shape
obtained so far. This shape will be used extensively in the
next chapter to make a comparison between signals.
D. Extraction of other parameters
From the current signal shape there must be extracted
more parameters that will help later in the analysis stage.
These parameters will be extracted using two methods:
power spectral density (PSD) and event detection algorithm.
Figure 3. Event detection algorithm applied to our signal
An event detection algorithm is necessary when we
search certain pieces of a signal or when we try to segment
the signal in multiple parts (our case). Detection algorithm
was built by calculating the first derivative for our signal.
This algorithm finds all the behavioural changes that occur
in signal evolution. Thus, in our case, we can see that the
algorithm clearly showed the beginning / end of each event
(Fig. 3).
In the next chapter we will analyze the signal shape
together with the rest of the parameters and we determine
the signal dynamics and detect its anomalies.
IV. DYNAMIC ANALYSIS OF THE SIGNAL
An analysis of the entire shape of signal obtained in the
previous chapter is difficult for an anomaly detection
algorithm using correlation. Because of that, we decided to
split the obtained shape into pieces (components) that can be
analyzed more easily. Furthermore, such segmentation
provides us a better localization of anomalies.
A. Signal segmentation
Signal segmentation is done based on the signal obtained
from the event detection algorithm. A simplistic approach in
this case could be: any non-zero value of the signal could be
seen as a change in the behaviour of the device. The higher
the value, the greater change has occurred in signal
evolution in that moment.
This approach cannot be done in our case because the
signal shows continuous oscillations and that is why most of
the values are non-zero. Analyzing the values obtained from
event detection algorithm, we chose a cutting threshold that
separates a neutral area (values between [-2, 2]) for an area
of interest for us. Using this threshold, the important
components of the signal can be seen in Fig. 4.
Figure 4. Detection of signal components using an algorithm based on
values from event detection method after applying a threshold cut
Figure 5. Detection of short time intervals where signal has a transient
behaviour (anomalies)
These components succeed segmentation for a power
signature signal into constituent parts. Also, the algorithm
91
[Downloaded from www.aece.ro on Saturday, September 12, 2015 at 06:54:12 (UTC) by 195.49.254.25. Redistribution subject to AECE license or copyright.]
Advances in Electrical and Computer Engineering Volume 15, Number 1, 2015
manages to detect other short time intervals too, in which
signal has a transient behaviour (Fig. 5). It can be observed
the presence of these intervals in the beginning/end of the
whole program and when rinsing cycle starts. Because these
intervals have a short period of time, an automated analysis
of them could not be done, so they were analyzed in a
separate mode.
The other proposed segmentation method is based on
normalization of a signal according to another signal. For
this method we need a previous processed signal (standard
signal - considered to be a normal behaviour of the device).
This signal must have segmentation intervals defined in
advance by the user. Further, the normalization operation is
performed in the time domain for our signal and after that,
the segmentation operation is applied to time intervals
obtained from the standard signal.
Figure 6. Segmentation using a standard signal for other two different
signals
Figure 7. Signal component reconstruction using polynomial regression
In Fig. 6 we can see the segmentation result for two
signals using a standard signal. Some components have
failed to be detected and for others the beginning / end are
totally wrong.
The results vary from signal to signal and that is why we
propose this method to be used only as a secondary one.
B. Regression function for signal components
Defining a regression function for each signal component
is an important part of our approach because an analysis of
the signal is much easier to be done in this case. Thus, a
function is characterized by a reduced set of values
(parameters) than a relatively large number of sample
signals. For our signal, we try finding regression functions
from three classes: polynomial, exponential and a
combination of sinuses.
Figure 8. Signal component reconstruction using exponential regression
Figure 9. Signal component reconstruction using combination of sinuses
For a polynomial regression variant we chose a
92
[Downloaded from www.aece.ro on Saturday, September 12, 2015 at 06:54:12 (UTC) by 195.49.254.25. Redistribution subject to AECE license or copyright.]
Advances in Electrical and Computer Engineering Volume 15, Number 1, 2015
polynomial of nine degree. Using a polynomial of degree
greater than nine is difficult and leads to obtaining
coefficients with values less than 10-5. Fig. 7 presents the
reconstruction of some of the signal components where
polynomial regression functions are used. It can be seen that
some signal components cannot be exactly reconstructed
using polynomial functions.
For the second method we used multiple regression
exponential functions. The obtained results for the same
components of the signal are shown in Fig. 8. In this case,
the components of the signal were reconstructed even worse
(component 3 could not be reconstructed).
The last regression method uses a combination of sinuses
(Figure 9). It can be seen from Table I that using the
combination of sinuses we obtain the best results (e.g. the
smallest error). Further we used this method to find the
regression coefficients for each component of the signal.
TABLE I. SUM OF SQUARES DUE TO ERROR FOR EACH REGRESSION METHOD
Regression
method C1 C
2 C
3
Polynomial 0.1726 564.01 4.6*106
Exponential 358.61 776.72 1.5*105
Combination of
sinuses 268.33 3.63*105 6.7*107
C. Calculation of correlation indices between two
components
Correlation is a statistical measure that determines the
dependencies between two data sets and from our point of
view; it has an important role as it highlights the relations of
two signals. The correlation method is based on Pearson
product-moment correlation coefficient and it is named
"Pearson's Correlation". If we define two sets X and Y, the
correlation coefficient ρX,Y is given by (1).

,
cov( , ) XY
XY XY XY
EX Y
XY

 



 (1)
To calculate the correlation coefficients we need two data
sets of equal length. In order to do that we should determine
the signal component that has the largest length (the total
number of contained points). For all the remaining
components will be added(at the end) multiple zero values
until we get a vector of length equal to the determined
maximum length. Thus, each component will be composed
of a number of samples equal to the maximum length.
Further, we present a correlation analysis based on three
signals (see Signal 1, Signal 2 and Signal 3 from Fig. 10)
Each of these three signals will be compared with the signal
presented throughout this paper named the standard signal.
Each component of a signal will be compared with each
of the components of the standard signal. A correlation
index between the two components will be calculated for
each comparison.
For example when we compared the Signal 1 with the
Standard signal, actually we compared the 7 components
found in Signal 1 with the 6 existing components in
Standard signal (Figure 11). The correlation matrix resulted
after comparison operation can be seen in Table II. We
noted by SCi , the i component of standard signal and Cj the
j component of the Signal 1.
Figure 10. Signals used in correlation analysis. From top to bottom: Signal
1, Signal 2 and Signal 3
Figure 11. Top: Standard signal contains SC1 - SC 6 components. Bottom:
Signal 1 and C1 - C 7 components
TABLE II CORRELATION MATRIX
SC1 SC 2 SC 3 SC 4 SC5 SC6
C1 0.983 0.315 0.685 0.330 0.030 -0.235
C2 0.324 1.000 0.159 0.468 0.169 -0.088
C3 0.925 0.315 0.811 0.349 0.064 -0.259
C4 0.479 0.600 0.469 0.548 0.697 -0.490
C5 0.489 0.611 0.483 0.741 0.526 -0.528
C6 0.441 0.592 0.397 0.871 0.279 -0.410
C7 0.829 0.487 0.881 0.412 0.117 -0.269
The last part of this chapter deals with the analysis of the
values from correlation matrix and explains how an anomaly
or a malfunctioning is detected.
D. Correlation analysis. Determining similarity and
anomaly detection
It can be seen from Fig. 11 that Signal 1 is very similar to
the Standard signal. This is also revealed by the matrix of
correlation coefficients. Thus:
93
[Downloaded from www.aece.ro on Saturday, September 12, 2015 at 06:54:12 (UTC) by 195.49.254.25. Redistribution subject to AECE license or copyright.]
Advances in Electrical and Computer Engineering Volume 15, Number 1, 2015
94
SC6.
Component C1 and C2 from Signal 1 are very
similar with the SC1 and SC2 components from Standard
signal (0.983 respectively 1.000). That means that the
washing machine works fine in the first part of the program
and does not show any anomalies.
Component C3 from Signal 1 is very similar to the
component SC1 from Standard signal (0.952 similarity) but
also with component SC3 from Standard signal (0.811
similarity). This is due to the fact that the C3 from Signal 1
has a double length (in time) than the similar component
from the Standard signal. Again, we can conclude that there
are no anomalies present.
Component C4 from Signal 1 has similarity with
the component SC5 from Standard signal (0.697 similarity).
This means that a slightly wear of the machine is present in
this part of the program.
Component C5 from Signal 1 has much similarity
with the component SC5 from Standard signal (0.741
similarity). Again, we can mention a slightly wear of the
machine for this part of the program.
Component C6 from Signal 1 is very similar to the
component SC4 from Standard signal (0.871 similarity).
Because all the SC4, SC5 and SC6 are part of the rinse
cycles, there is not a big issue, that this component is most
similar to a component other than
Component C7 from Signal 1 is very similar to the
component SC3 from Standard signal (0.881 similarity).
This is an anomaly because the two components are part of
different washing cycles. The first is from the rinse cycle
and the last is from the wash cycles.
Without C7 we have a similarity value of 0.85 between
Signal 1 and the Standard signal. That means a strong
correlation between the two signals.
An analysis for the Signal 2 showed a correlation of 0.823
between the two signals. It also revealed the existence of
another component (similar with C3) in this signal. This is
also an anomaly and can be observed in Figure 10.
The correlation for Signal 3 is only 0.793, so there are
many similarities between the two signals (there is a good
correlation). Also the analysis detected that the C3 for the
Standard signal does not have a counterpart component in
Signal 3. The absence of a standard component represents
also an anomaly.
V. CONCLUSIONS
The paper presents a method for an automatic detection of
malfunctioning for low-intelligence consumer electrical
devices. The method is fully automated and it is based on
the analysis of the correlation matrix between the
components of the signal. It managed to analyze and to
determine the degree of similarity and, to find differences
between two signals.
The method was tested on different power signatures
obtained from 10 washing machines. During testing phase,
the washing machines executed both a normal program and
fractions of program. The method captured the similar
phases with a normal program and prompted when abnormal
behaviour was present: a phase from program was skipped
or presented malfunctioning.
Also, based on similarity coefficients it is possible to
compute the degree of wear.
During the correlation analysis we showed how an
anomaly can be captured and analyzed based on the two
existing signals.
We want to further improve this method by refining the
analysis part of the correlation matrix and by taking other
parameters into consideration.
REFERENCES
[1] R. Kazman, L. Bass, J. Ivers, and G. A. Moreno, “Architecture
Evaluation without an Architecture: Experience with the Smart Grid”,
33rd International Conference of Software Engineering, May 2011.
[2] C. Laughman, K. Lee, R. Cox, S. Shaw, S. Leeb, L. Norford and P.
Armstrong, “Power Signature Analysis”, Power and Energy
Magazine, IEEE, Vol. 1, pp.56-63, 2003.
[3] I. Cepa, Z. Kocur, Z. Muller, “Migration of the IT Technologies to the
Smart Grids”, ELEKTRONIKA IR ELEKTROTECHNIKA, pp.123-
128, Issue 7, 2012
[4] M. Marcu and C. Cernazanu, “Dynamic Analysis of Electronic
Devices' Power Signatures”, International Instrumentation and
Measurement Technology Conference, I2MTC 2012, Graz, Austria,
May 2012.
[5] I. C. Miller, “IDDQ testing in deep submicron integrated circuits”,
Proceedings of International Test Conference, ITC 1999, Atlantic
City, USA, Sep. 1999.
[6] K. Fehrenbacher, “10 Monitoring Tools Bringing Smart Energy
Home”, Business Week, Apr. 2009,
http://www.businessweek.com/technology/
content/apr2009/tc20090414446611.htm.
[7] J. Froehlich, E. Larson, S. Gupta, G. Cohn, M. S. Reynolds, and S. N.
Patel, “Disaggregated End-Use Energy Sensing for the Smart Grid”,
IEEE Pervasive Computing, Special Issue on Smart Energy Systems,
Jan–Mar 2011.
[8] M. Marcu, C. Stangaciu, A. Topirceanu, D. Volcinschi, and V.
Stangaciu, “Wireless Sensors Solution for Energy Monitoring,
Analyzing, Controlling and Predicting”, Lecture Notes of the Institute
for Computer Sciences, Social Informatics and Telecommunications
Engineering, Volume 57, 2011.
[9] Q. Ou, Y. Zhen, X. Li, Y. Zhang, L. Zeng; , “Application of Internet
of Things in Smart Grid Power Transmission”, Mobile, Ubiquitous,
and Intelligent Computing (MUSIC), 2012 Third FTRA International
Conference on , pp.96-100, 26-28 June 2012
[10] S. J. Huang, C. T. Hsieh, L. K. Kuo, C. W. Lin, C. W. Chang, S. A.
Fang, “Classification of home appliance electricity consumption using
power signature and harmonic features”, Power Electronics and Drive
Systems (PEDS), 2011 IEEE Ninth International Conference on ,
pp.596-599, 5-8 Dec. 2011
[11] W. K. Lee, G. S. K. Fung, H. Y. Lam, F. H. Y. Chan, and M. Lucente,
“Exploration on Load Signatures”, International Conference on
Electrical Engineering, ICEE 2004, Sapporo, Japan, Jul. 2012.
[12] X. Jiang, S. Dawson-Haggerty, P. Dutta, and D. Culler, “Design and
Implementation of a High-Fidelity AC Metering Network”, The 8th
ACM/IEEE International Conference on Information Processing in
Sensor Networks, IPSN’09, 2009, San Francisco, California, USA.
[13] M. Drif, A. J. M. Cardoso, “Stator Fault Diagnostics in Squirrel Cage
Three-Phase Induction Motor Drives Using the Instantaneous Active
and Reactive Power Signature Analyses”, Industrial Informatics,
IEEE Transactions on , vol.10, no.2, pp.1348-1360, May 2014
[14] T. Hassan, F. Javed, N. Arshad, “An Empirical Investigation of V-I
Trajectory Based Load Signatures for Non-Intrusive Load
Monitoring”, Smart Grid, IEEE Transactions on, vol.5, no.2, pp. 870-
878, March 2014
[15] A. Abu-Siada, N. Hashemnia, S. Islam, M. Masoum, “Understanding
power transformer frequency response analysis signatures”, Electrical
Insulation Magazine, IEEE , vol.29, no.3, pp. 48-56, May 2013
[16] M. Marcu, C. Cernazanu, “Applications of Smart Metering and Home
Appliances' Power Signatures”, Instrumentation and Measurement
Technology Conference (I2MTC) Proceedings, 2014 IEEE
International , vol., no., pp. 331-335, 12-15 May 2014
[Downloaded from www.aece.ro on Saturday, September 12, 2015 at 06:54:12 (UTC) by 195.49.254.25. Redistribution subject to AECE license or copyright.]
... Identifying workloads based on non-intrusive side-channel information-like power signatures in particular-is of ongoing interest, ranging from mobile consumer devices [9] to HPC systems [10], [11]. ...
... mobile) such as the ones developed by Jacoby et al. [13] and Kim et al. [12] don't yield data for the entire runtime of a workload, but only for periods of elevated power consumption that are considered of particular interest. In a less constrained environment, it is entirely possible to record and store complete power traces [11], [6], [9], [10]. ...
... This infrastructure allows us to detect various anomalies by just using the power signature of consumer electrical devices. Thus, we showed in our previous work that power signature is a very good monitoring approach for home appliances [2]. Comparing the actual power signature of a device with a standard signature of the same device (provided by the manufacturer) is a reliable test for detecting anomalies. ...
... The first step in our analysis has been to propose and identify a normalized or ideal power signature of one specific washing program. This was achieved by using a smoothing filters and edge detection algorithms [2]. The best results were obtained by applying a Gaussian smoothing function and first derivative edge detection. ...
... In Reference [49], a technique based on splitting frequency harmonics of power consumption signals and transforming them via a canonical correlation procedure is proposed to collect discriminative characteristics, which help in identifying normal and anomalous behaviors. In Reference [50], a method to extract frequency harmonics and appliance operation events from both actual consumption fingerprints and ideal consumption signatures (provided by the manufacturer) is deployed. Following, a comparison between both pieces of information helps in capturing deviations of appliances their normal operating cycle. ...
Article
Full-text available
Anomaly detection in energy consumption is a crucial step towards developing efficient energy saving systems, diminishing overall energy expenditure and reducing carbon emissions. Therefore, implementing powerful techniques to identify anomalous consumption in buildings and providing this information to end‐users and managers is of significant importance. Accordingly, two novel schemes are proposed in this paper; the first one is an unsupervised abnormality detection based on one‐class support vector machine, namely UAD‐OCSVM, in which abnormalities are extracted without the need of annotated data; the second is a supervised abnormality detection based on micromoments (SAD‐M2), which is implemented in the following steps: (i) normal and abnormal power consumptions are defined and assigned; (ii) a rule‐based algorithm is introduced to extract the micromoments representing the intent‐rich moments, in which the end‐users make decisions to consume energy; and (iii) an improved K‐nearest neighbors model is introduced to automatically classify consumption footprints as normal or abnormal. Empirical evaluation conducted in this framework under three different data sets demonstrates that SAD‐M2 achieves both a highest abnormality detection performance and real‐time processing capability with considerably lower computational cost in comparison with other machine learning methods. For instance, up to 99.71% accuracy and 99.77% F1 score have been achieved using a real‐world data set collected at the Qatar University energy lab.
... The approach adopts long short term memory network to profile and forecast consumer behavior. In [10], Cosmin described a comparison method consisting of the relationship between current and ideal power signature to detect anomaly devices. Kedi [11] introduced a data mining technique to detect abnormal data and energy theft. ...
Article
Full-text available
Smart meter is a typical edge device that measures and records the energy data. The usage of smart meter data can improve the cyber physical relationship between the smart grid and cyber physical system. Millions of smart meters have been installed all around the world and the malfunction detection of large volume meter is a big issue. On site checking is a costing work and cannot meet the requirement for large scale meters. Online malfunctional meter detection and verification based on meter data analytics is a solution to the meter detection problem. For the purpose of detecting malfunctional smart meter, the low-voltage energy system model is studied and a meter error estimation method is proposed in this paper. This method adopts a decision tree to filter the abnormal data and classify data with different energy loss levels. Then clustering the data to obtain the data set with different energy usage behavior. A meter data matrix is constructed and meter error can be calculated from the solution of the matrix equation. A Recursive algorithm is adopted to solve the equation and estimate the meter error. The meter error above the regulation threshold will be classified as a malfunctional meter. The proposed approach has achieved higher accuracy in the experiment.
Article
The energy crisis is a problem that countries all over the world pay more and more attention to, and a series of ecological problems caused by it have become increasingly prominent. It is difficult for traditional fossil fuels to maintain a healthy and coordinated sustainable development of society and economy. The establishment of a sustainable energy system has become the development trend of various countries to solve energy problems. Electric energy is a secondary energy that all primary energy can be converted into, and an irreplaceable consumable for all industrial technologies and people’s lives. Electric power data has the characteristics of large rate span, numerous data sources, complicated interaction methods, and various types of data. The existence of abnormal data in the power system will greatly reduce the accuracy of the system state estimation and the state estimation convergence rate. This paper introduces the power grid industrial control system, combines the data flow of power big data, and analyzes the abnormal information detection process in detail. It takes the data stream acquired by the acquisition unit PMU of the wide area measurement system as the research object. The rapid development of the Hadoop big data platform provides important technical support for the research of power grid big data. Based on the Hadoop platform, the clustering algorithm is used to complete the anomaly detection of real-time data. The LOF algorithm has poor performance when dealing with a large amount of high-dimensional data, and has high time and space complexity. In order to make up for the shortcomings of the LOF algorithm, this paper uses the K-means clustering algorithm to propose an improved algorithm K-LOF of the density-based local abnormal factor detection algorithm LOF, and optimizes the neighborhood query process. It is verified by experiments that the K-LOF algorithm can effectively reduce the time complexity of the anomaly detection algorithm and improve the detection accuracy by 2–4.2%.
Article
Real-time monitoring and control of smart grids is critical to the enhancement of reliability and operational efficiency of power utilities. We develop a real-time anomaly detection framework, which can be built based upon smart meter data collected at the consumers’ premises. The model is designed to detect the occurrence of anomalous events and abnormal conditions at both lateral and customer levels. We propose a generative model for anomaly detection that takes into account the hierarchical structure of the network and the data collected from smart meters. We also address three challenges existing in smart grid analytics: (i) large-scale multivariate count measurements, (ii) missing points, and (iii) variable selection. We present the effectiveness of our approach with numerical experiments.
Conference Paper
Full-text available
Over the last decade, significant changes have occurred in area of both power systems and computing systems. Furthermore, we are witnessing the fast spreading of smart grid technology deployments, which combines applications and solutions from both these domains. Therefore with our work we aim to propose and develop applications on top of smart grid power infrastructures that monitor, analyze, classify and characterize various electronic equipment connected to this infrastructure. The present paper aims at discussing the future applications of Advanced Metering Infrastructure (AMI) and how they can make use of consumer electronic equipment power signatures. Power signature of an electronic device is defined as the power consumption response to a specific workload or program executed by the device.
Article
Full-text available
L. Cepa, Z. Kocur, Z. Muller. Migration of the IT Technologies to the Smart Grids // Electronics and Electrical Engineering. - Kaunas: Technologija, 2012. - No. 7(123). - P. 123-128. This paper describes the migration of the traditional IT technologies to the Industrial Control Networks for Power Grids (ICNPG), characteristics of the typical ICNPG network and the differences between them and ICT network. We define the availability and reliability of the ICT networks and describe the current trends of the IT technologies in the ICNPG network with regarding its use in the Smart Grids. Finally, we describe the Smart Grid technology and summarize the availability and reliability of the ICNPG networks from technical studies. The comparison of ICNPG and ICT networks show that utilization rate of ICT technologies must be determined in the Smart Grids with regard to the required availability and reliability. III. 1, bibl. 7, tabl. 2 (in English; abstracts in English and Lithuanian).
Article
Full-text available
Nowadays we are witnessing the fast spreading of smart grid technology deployments. An increase of smart grid services and applications is also expected. Therefore in our work we aim to propose and develop user applications on top of smart grid power infrastructures that monitor, analyze, classify and characterize different electronic devices connected to this infrastructure. The present paper aims to propose a solution for ideal power signature extraction for consumer devices. Power signature may deeply characterize the electronic devices functioning. This signature can be used to identify energy efficiency usage patterns and provide feedback to users in order to reduce energy consumption and increase the lifetime of the products. Power signature of an electronic device is defined as the power consumption response to certain workload or program executed by the device.
Article
Full-text available
Choice of load signature or feature space is one of the most fundamental design choices for non-intrusive load monitoring or energy disaggregation problem. Electrical power quantities, harmonic load characteristics, canonical transient and steady-state waveforms are some of the typical choices of load signature or load signature basis for current research addressing appliance classification and prediction. This paper expands and evaluates appliance load signatures based on V-I trajectory - the mutual locus of instantaneous voltage and current waveforms - for precision and robustness of prediction in classification algorithms used to disaggregate residential overall energy use and predict constituent appliance profiles. We also demonstrate the use of variants of differential evolution as a novel strategy for selection of optimal load models in context of energy disaggregation. A publicly available benchmark dataset REDD is employed for evaluation purposes. Our experimental evaluations indicate that these load signatures, in conjunction with a number of popular classification algorithms, offer better or generally comparable overall precision of prediction, robustness and reliability against dynamic, noisy and highly similar load signatures with reference to electrical power quantities and harmonic content. Herein, wave-shape features are found to be an effective new basis of classification and prediction for semi-automated energy disaggregation and monitoring.
Article
In this paper, the instantaneous active and reactive power signature analyses are presented for stator fault diagnosis in operating squirrel cage three-phase induction motors either directly connected to the mains or fed from inverters. Both simulation and experimental results are presented to show the effectiveness and the merits of the proposed approach that offers the possibility to detect this type of fault and to discriminate it from other abnormality conditions responsible for the same motor behavior by comparing the signature analyses of the two considered quantities.
Conference Paper
Utilizing Internet of Things (IoT) technology in smart grid is an important approach to speed up the informatization of power grid system, and it is beneficial for effective management of the power grid infrastructure. Disaster prevention and reduction of power transmission line is one of the most important application fields of IoT. Advanced sensing and communication technologies of IoT can effectively avoid or reduce the damage of natural disasters to the transmission lines, improve the reliability of power transmission and reduce economic loss. Focused on the characteristic of the construction and development of smart grid, this paper introduced the application of IoT in online monitoring system of power transmission line.
Article
This paper presents a comprehensive analysis of the effects of various faults on the FRA signatures of a transformer simulated by a high-frequency model. The faults were simulated through changes in the values of some of the electrical components in the model. It was found that radial displacement of a winding alters the FRA signature over the entire frequency range (10 Hz-1 MHz), whereas changes due to axial displacement occur only at frequencies above 200 kHz. A Table listing various transformer faults and the associated changes in the FRA signature was compiled and could be used in the formulation of standard codes for power transformer FRA signature interpretation.
Article
Knowledge of electric load signatures is the foundation of practical technologies for load monitoring, which involves the identification of an electric appliance and the determination of its operating state. Such knowledge can provide benefits to utilities, customers, appliance manufacturers and other stakeholders. Many approaches can help to understand the load characteristics of electrical appliances and equipment. This research focuses on the two core components of these approaches: (1) methods to measure and represent load characteristics, and (2) the development of signal processing techniques and estimation algorithms for signal filtering, signal disaggregation and load recognition. This paper presents the methodology and observations of the load signatures in their operation modes. The current and voltage of typical appliances are measured, and characteristics of the waveform signatures so obtained are analyzed. By studying the collected data, it is planned to develop an algorithm that can provide a basis of a taxonomy of electrical loads and an archive for stakeholders' reference.
Article
A method of classifying home appliance electricity consumption is proposed in this paper. With the information retrieved from power signatures and harmonic features, the method excels at its systematic grouping capability of home appliances. It is also beneficial for residents to comprehend their home electricity variations. This proposed approach has been prototyped with hardware realization. Experimental results based on the tested appliance shows its potential of development for the application considered.
Article
Most energy meters installed by utilities are intended primarily to support billing functions. Meters report only the aggregate energy consumption of a home or business over intervals as long as a month. In contrast, disaggregated energy usage data identified by individual devices or appliances offers a much more descriptive dataset that has the potential to inform and empower a wide variety of energy stakeholders, from homeowners and building operators to utilities and policy makers. In this article, the authors survey existing and emerging disaggregation techniques and highlight signal features that might be used to sense disaggregated data in a viable and cost-effective manner. They provide a summary of a new approach to electrical load disaggregation that uses voltage noise, including a brief overview of their sensing hardware, classification algorithms, and evaluation in 14 homes. The article concludes with a discussion of current open research problems that must be addressed before disaggregated energy sensing can be widely deployed.