Application of Slantlet Transform Based Support Vector Machine for Power Quality Detection and Classification
نویسندگان
چکیده
Concern towards power quality (PQ) has increased immensely due to the growing usage of high technology devices which are very sensitive towards voltage and current variations and the de-regulation of the electricity market. The impact of these voltage and current variations can lead to devices malfunction and production stoppages which lead to huge financial loss for the production company. The deregulation of electricity markets has made the industry become more competitive and distributed. Thus, a higher demand on reliability and quality of services will be required by the end customers. To ensure the power supply is at the highest quality, an automatic system for detection and localization of PQ activities in power system network is required. This paper proposed to use Slantlet Transform (SLT) with Support Vector Machine (SVM) to detect and localize several PQ disturbance, i.e. voltage sag, voltage swell, oscillatory-transient, odd-harmonics, interruption, voltage sag plus odd-harmonics, voltage swell plus odd-harmonics, voltage sag plus transient and pure sinewave signal were studied. The analysis on PQ disturbances signals was performed in two steps, which are extraction of feature disturbance and classification of the disturbance based on its type. To take on the characteristics of PQ signals, feature vector was constructed from the statistical value of the SLT signal coefficient and wavelets entropy at different nodes. The feature vectors of the PQ disturbances are then applied to SVM for the classification process. The result shows that the proposed method can detect and localize different type of single and multiple power quality signals. Finally, sensitivity of the proposed algorithm under noisy condition is investigated in this paper.
منابع مشابه
Common Spatial Patterns Feature Extraction and Support Vector Machine Classification for Motor Imagery with the SecondBrain
Recently, a large set of electroencephalography (EEG) data is being generated by several high-quality labs worldwide and is free to be used by all researchers in the world. On the other hand, many neuroscience researchers need these data to study different neural disorders for better diagnosis and evaluating the treatment. However, some format adaptation and pre-processing are necessary before ...
متن کاملAcoustic detection of apple mealiness based on support vector machine
Mealiness degrades the quality of apples and plays an important role in fruit market. Therefore, the use of reliable and rapid sensing techniques for nondestructive measurement and sorting of fruits is necessary. In this study, the potential of acoustic signals of rolling apples on an inclined plate as a new technique for nondestructive detection of Red Delicious apple mealiness was investigate...
متن کاملComparison of Parametric and Non-parametric EEG Feature Extraction Methods in Detection of Pediatric Migraine without Aura
Background: Migraine headache without aura is the most common type of migraine especially among pediatric patients. It has always been a great challenge of migraine diagnosis using quantitative electroencephalography measurements through feature classification. It has been proven that different feature extraction and classification methods vary in terms of performance regarding detection and di...
متن کاملA Hybrid Method for Mammography Mass Detection Based on Wavelet Transform
Introduction: Breast cancer is a leading cause of death among females throughout the world. Currently, radiologists are able to detect only 75% of breast cancer cases. Making use of computer-aided design (CAD) can play an important role in helping radiologists perform more accurate diagnoses. Material and Methods: Using our hybrid method, the background and the pectoral muscle...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کامل