Skip to main content

A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11633))

Included in the following conference series:

  • 1633 Accesses

Abstract

Identification of anomaly data is very important for power system state estimation. In this paper, a method of power system anomaly data identification based on neural network and affine propagation is proposed. In this first step, a 3-layer neural network is trained as a predictor using normal data. In the second step, data to be detected is preprocessed using the trained neural network, and predicted residuals are obtained. In the third step, these predicted residuals are clustered using the affine propagation clustering algorithm, and in the final step, anomaly data is identified based on the clustering results. As the neural network training process is easy to fall into local minimum, which reduces the prediction accuracy of the neural network, in this paper a novel chaotic particle swarm optimization algorithm is proposed to train the neural network. From the experimental results it can be seen that, compared with previous anomaly data identification method using the BP neural network and the gap statistic algorithm or the K-mean clustering algorithm, the proposed method can effectively improve the accuracy of anomaly data identification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alamin, A., Peng, J.C.: A detailed tuning evaluation of sensitivity threshold using LNRT for bad data detection in state estimation. In 2015 IEEE 8th GCC Conference Exhibition, pp. 1–4 (2015)

    Google Scholar 

  2. Wu, Y., Xiao, Y., Hohn, F., Nordström, L., Wang, J., Zhao, W.: Bad data detection using linear wls and sampled values in digital substations. IEEE Trans. Power Delivery 33(1), 150–157 (2018)

    Article  Google Scholar 

  3. Wang, J., Meng, R., Rice, S.G., Sun, X.: A fusion steganographic algorithm based on faster R-CNN. CMC: Comput. Mater. Contin. 55(1), 001–016 (2018)

    Google Scholar 

  4. Li, F., Sherratt, R.S., Zeng, D., Dai, Y., Wang, J.: Adversarial learning for distant supervised relation extraction. CMC: Comput. Mater. Contin. 55(1), 121–136 (2018)

    Google Scholar 

  5. Wang, S., Su, A., Ji, C., Ge, W., Xia, Y., Yan, C.: A fast method for identifying bad data of massive power network data. In: 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), pp. 1–5 (2017)

    Google Scholar 

  6. Wu, Z., et al.: Power system bad load data detection based on an improved fuzzy c-means clustering algorithm. In: 2017 IEEE Power Energy Society General Meeting, pp. 1–5 (2017)

    Google Scholar 

  7. Pau, M., Ponci, F., Monti, A.: Analysis of bad data detection capabilities through smart meter based state estimation. In: 2018 IEEE International Conference on Environment and Electrical Engineering and 2018 IEEE Industrial and Commercial Power Systems Europe (EEEIC/I CPS Europe), pp. 1–6 (2018)

    Google Scholar 

  8. Song, C., Jing, W., Zeng, P., Rosenberg, C.: An analysis on the energy consumption of circulating pumps of residential swimming pools for peak load management. Appl. Energy 195, 1–12 (2017)

    Article  Google Scholar 

  9. Song, C., Wei, J., Peng, Z., Haibin, Y., Rosenberg, C.: Energy consumption analysis of residential swimming pools for peak load shaving. Appl. Energy 220, 176–191 (2018)

    Article  Google Scholar 

  10. Xu, C., Song, C., Zeng, P., Yu, H.: Secure resource allocation for energy harvesting cognitive radio sensor networks without and with cooperative jamming. Comput. Netw. 141, 189–198 (2018)

    Article  Google Scholar 

  11. Wan, M., Zhao, J., Yuan, W., Zeng, P., Cui, J., Shang, W.: Intrusion detection of industrial control based on semi-supervised clustering strategy. Inform. Control 46(4), 462–468 (2017)

    Google Scholar 

  12. Shang, W., Cui, J., Song, C., Zhao, J., Zeng, P.: Research on industrial control anomaly detection based on FCM and SVM. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing And Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 218–222 (2018)

    Google Scholar 

  13. Chang, X., Wang, J., Wang, J., Lu, K., Yi, Z.: On the optimal design of secure network coding against wiretapping attack. Comput. Netw. 99(C), 82–98 (2016)

    Article  Google Scholar 

  14. Chang, X., et al.: Accuracy-aware interference modeling and measurement in wireless sensor networks. IEEE Trans. Mob. Comput. 15(2), 278–291 (2016)

    Article  Google Scholar 

  15. Zhu, H., et al.: A novel lung cancer detection algorithm for CADs based on SSP and level set. Technol. Health Care 25(S1), 1–11 (2017)

    Google Scholar 

  16. Song, C., Zeng, P., Wang, Z., Zhao, H., Yu, H.: Wearable continuous body temperature measurement using multiple artificial neural networks. IEEE Trans. Ind. Inform. 14(10), 4395–4406 (2018)

    Article  Google Scholar 

  17. Frey, B.J., Dueck, D.: Clustering by passing messages between data points. Science 315(5814), 972–976 (2007)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported by the State Grid Corporation Science and Technology Project (Contract No.: SGLNXT00YJJS1800110).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunhe Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shen, L., Shen, Y., Song, C., Li, Z., Ran, R., Zeng, P. (2019). A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11633. Springer, Cham. https://doi.org/10.1007/978-3-030-24265-7_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24265-7_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24264-0

  • Online ISBN: 978-3-030-24265-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics