Next Article in Journal
Features of the Stress–Strain State of 3D Metal Objects Produced by Additive Microplasma Deposition of the Powder of a Fe–Cr–Ni–B–Si System
Previous Article in Journal
Disentangled Self-Attention with Auto-Regressive Contrastive Learning for Neural Group Recommendation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Anomaly Detection Ensemble for Protection Systems in Distribution Networks

1
International Institute of Engineering, Changsha University of Science & Technology, Changsha 410114, China
2
School of Electrical & Information Engineering, Changsha University of Science & Technology, Changsha 410114, China
3
School of Electrical & Automation Engineering, Nanjing Normal University, Nanjing 210023, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(10), 4158; https://doi.org/10.3390/app14104158
Submission received: 6 April 2024 / Revised: 10 May 2024 / Accepted: 11 May 2024 / Published: 14 May 2024
(This article belongs to the Section Electrical, Electronics and Communications Engineering)

Abstract

:
Due to the complex topology, multi-line branches, and dense spatial distribution characteristics of a distribution network, potential disturbances and failures cannot be eliminated in real scenes, which means that higher levels of both reliability and stability are required in its corresponding protection system. For this reason, the timely monitoring and pinpoint identification of an underlying abnormal operation status in those protection systems must be ensured. To this end, a data-driven-based real-time anomaly detection ensemble is proposed in this paper. First, the kernel principal components investigation (KPCI) process is deployed to compress the dimensionality of input data, which can reduce the computational complexity within such high-dimensional data environments. Next, the isolated forest (IF) model is applied to excavate potential outliers according to the numeric range of the normal operating states of different features. Thus, a better detection performance in biased or sparse distributions can be achieved by reacting swiftly to those outliers. Finally, the operation data of the power distribution network protection system in a certain area is used as a simulation case. It is evident that compared with the single model IF detection method, combining the IF with the data dimension reduction model can effectively reduce data complexity. Due to the addition of kernel functions, KPCI can adapt to high-dimensional data environments better than standard PCI, and it also has certain advantages in calculation efficiency. This validates the theory that the proposed model has a high level of anomaly detection in practical applications, can assist in the automatic identification of and response to power distribution network security risks, effectively dig out potential system operational disturbances and state abnormalities, and achieve real-time anomaly monitoring and early warning.

1. Introduction

In operating scenarios with a complex architecture, comprehensive load, and diverse equipment, the current distribution network used in response to the construction needs of the new power system has higher requirements for its own safety and stability levels. In a protection system, which is one of the main lines of defense for network security, the importance of ensuring its normal and reliable operating condition is increasingly rising [1]. However, with the increasing complexity of both power demand and grid structure, abnormal operating conditions in the protection system are inevitable. If abnormalities cannot be detected in time, they not only seriously affect the quality of power supply but could even provoke a chaotic power consumption order [2,3,4,5]. Therefore, it is urgent to study effective and feasible means of detecting abnormal states in the protection system.
Currently, researchers have provided various methods for data monitoring of the power grid protection system. The first one is based on the detection methods of peripheral devices. For example, references [6,7,8,9,10,11] use infrared temperature measurement technology during the operation and maintenance of transmission line equipment for the abnormal monitoring of protective equipment. The authors of [12] detected SF6 protective equipment faults through a gas monitor, and those of [13,14,15,16,17,18] conducted abnormal monitoring of the relay protection system through inspection robots. The authors of [19,20,21,22,23] used artificial intelligence for the data detection of protective equipment. These methods can achieve timely detection and rapid processing, but they usually require additional specific facilities to implement monitoring, increasing the cost and making it difficult to realize comprehensive coverage of the distribution network under the prerequisite conditions.
Generally, anomalies in the operation of the relay protection system often originate from changes in state parameters. Therefore, accurate identification of abnormal operating state quantities can effectively identify existing or potential deterioration phenomena in the protection system. Hence, data-driven operation anomaly detection has become another feasible direction of research. For example, reference [24] introduces the affinity propagation (AP) clustering method and combines the local outlier factor (LOF) algorithm to detect outliers in the cluster center, thereby accurately identifying abnormalities. The authors of [25] fitted the failure rate model of the protection system based on historical data and corrected the actual failure rate model, based on medium, long-term, and short-term factors, to set a cumulative failure rate threshold. Reference [26] relies on the random truncation characteristics of defect data, adopts the maximum likelihood estimation method, and implements parameter estimation based on the Weibull distribution model. A joint distribution model of the overall defect distribution of the device is then established to achieve parameter estimation for a probability distribution model of the defects of each module and the whole system. The authors of [27] applied a wide-area information method and conducted a global real-time state assessment of a single relay protection action behavior through information sources such as the power grid scheduling system. References [28,29,30,31,32] also introduce various new methods to participate in the operation of relay protection equipment. Those methods have achieved good anomaly detection results, but there is still the potential for further improvement in method performance in a multi-type, high-dimensional data environment.
With these motivations, this paper develops a unique combination of two advanced machine learning models—kernel principal components investigation (KPCI) and the isolation forest (IF) anomaly detection model. The objective is to construct a data-driven ensemble model that can effectively detect abnormal operation states for power distribution network protection. KPCI comes into play during the pre-processing stage. This model is essentially a non-linear extension of traditional principal component analysis (PCA), rendering it capable of efficiently managing non-linear and non-Gaussian distributed data. Harnessing the Sigmoid kernel function, KPCI maps the original input data into a high-dimensional space. The superior linear separability of the data points in this transformed space allows for effective dimensional reduction through projection, thereby enhancing the ensemble model’s capability when processing high-dimensional data environments. The subsequent stage in our detection strategy involves the deployment of the isolation forest model. IF is especially adept at distinguishing outlier sample points that are grounded on the values associated with diverse features under typical operating conditions. The process entails the construction of multiple binary decision trees, each of which is randomly divided. The depth of leaf nodes within each tree is established through iterative training, and the average path length of each data point is computed to pinpoint outliers. The tree-structured architecture of IF grants the model a remarkable level of robustness when coping with high-dimensional or biased data environments, which results in maintained high detection performance and computational advantage. Validation of the ensemble’s effectiveness is attained through a case study that is grounded on actual operation data from a specific region’s distribution network protection system. The results demonstrate that this innovative ensemble model exhibits excellent anomaly detection performance. Unlike other existing models, this novel approach can perform parallel anomaly identification across diverse parameters within the protection systems. This capability significantly enhances the ensemble’s comprehensiveness and applicability in practical scenarios, further cementing its superior feasibility in terms of actual implementation.
This article proposes a data-driven real-time model for detecting potential abnormal operating conditions in the distribution network protection system. The overall flow chart is shown in Figure 1 below.

2. Data Dimension Reduction Model Based on KPCI

To facilitate subsequent analysis and application, the original input data must go through the corresponding preprocessing to provide effective, smaller-scale, and relatively pure training and testing data. The core idea is this: to map the original data into a higher-dimensional space for linear operation, so as to reduce the computational load and improve the operational efficiency [33]. Among them, data dimension reduction is a key step in data preprocessing. Considering the nonlinear characteristics of data, we adopt a method based on KPCI to seek the optimal projection of data and to solve relatively important features, aiming to reduce the computational burden, speed up response time, and achieve visualization of the results [34]. Principal components investigation (PCI) is one of the most fundamental and important methods for data dimension reduction. PCI can examine the correlation among multiple original variables and then use a few principal components to further reflect the internal structure relationship of all the original variables [35].
PCI mainly achieves a data dimension reduction through orthogonal basis transformation. We assume that the input data set is:
a n R K n = 1 , , m
and diagonalize the covariance matrix after the evaluation:
C = ( a j a n ) , ( a j a n ) T = 1 M m = 1 M a m a m T
This calculates the covariance of the centered data   ( a j a n ) .
From Equation (2), it can be concluded that the corresponding parameters in the eigenvector basis are the principal components of this data set.
To reduce the number of principal components under consideration and decrease calculation complexity, PCI can be used to solve linear data dimension reduction problems:
A u = λ u       | | u | | 2 = 1
In the equation,   u represents the unit vector, and A = 1 k 1 a j a ̄ b j b ̄ represents the sample data matrix. b is a different input data set with the same definition as a . PCI mainly finds a solution for the eigenvalues λ and eigenvectors u of the corresponding sample data matrix A . The direction of the eigenvectors from the solved matrix A is the direction of data point projection during the PCI solving process.
However, when faced with some datasets that cannot be linearly separated, it is necessary to implement a non-linear data dimensionality reduction. KPCI mainly uses a mapping function to map data from the input space to a feature space [36]. This mapping ensures that the data become easier to separate, thereby enhancing the dimensionality reduction effect of PCI. The top k eigenvectors (with the largest eigenvalues) corresponding to the k largest variances are retained to reconstruct an approximation of the data in the lower dimension space. An operational example is shown in the following Figure 2.
For this purpose, nonlinear mapping is first used to map all samples in the input space to a high-dimensional or even infinite-dimensional feature space (FS) S , making them linearly separable. Then, PCI dimensionality reduction is performed in this high-dimensional space. The basic idea of the kernel technique is to map data that are inseparable in a low-dimensional space to a high-dimensional space. Data that are linearly inseparable in a low-dimensional space will have a higher probability of being linearly separable after being mapped to a high-dimensional space. For example, the difficulty of separating data linearly in a one-dimensional space is greater than in a two-dimensional space, and it is harder to separate data linearly in a two-dimensional space than in a three-dimensional space. The mapping function is shown as follows:
Ψ S
In the formula, Ψ is a nonlinear function. The only constraint on the feature space S is that it must have the structure of a reproducing kernel Hilbert space.
KPCI can be used to solve the following eigenvalue problem. The goal is to find the eigenvector α that maximizes the ratio of the variability in that direction to the total variability:
X α = λ α , α 2 = 1 λ
In the formula, λ is the eigenvalue of the matrix X. α is a column vector with a dimension of k , and X is the kernel matrix, constructed as follows:
X = x a 1 , a 1 x a 1 , a k x a 2 , a 1 x a 2 , a k x a k , a 1 x a k , a k
In the formula, x a j , a i denotes the kernel evaluating the similarity between samples a j and a i .
The function x is the core of KPCI, which is a positive semi-definite function in the input space used to deal with nonlinear problems. This function is often referred to as a kernel. The most commonly used kernel functions include polynomial, Gaussian, etc., and are expressed as follows:
x a j , a i = a j T a i + c d
x a j , a i = e x p a j a i 2 2 γ 2
In Equation (7), c R + and d K + ; in Equation (8), γ R + .
Kernel principal component investigation (KPCI) performs a linear principal component investigation (PCI) in the implicit feature space that is induced by the kernel, which can help tie all the data together. In this context, the “kernel” refers to the kernel function, a mathematical technique used to transform input data into a higher-dimensional space. The advantage of KPCI is that it can capture nonlinear relationships in the data, making it more powerful than standard PCI for certain types of data.
Based on the characteristic that the data do not easily diverge during transmission, this paper selects Sigmoid, and its mathematical expression is as follows:
x a j , a i = a r c t a n m a j T a i + c
In the formula, c is a constant that can control the length of the lower order term, and in this paper, it is set to 1. a j and a i are sample vectors.
Based on the principle of PCI, the eigenvector corresponding to the maximum eigenvalue is the direction in which KPCI needs to be projected, and the calculation method is as follows:
Ψ l = j = 1 k u j l a a j , a i
In the formula, Ψ l is the first principal component and u j are the eigenvectors. If X has not been centered yet, the following formula is used to implement centering. Centralization refers to the process of subtracting the mean from each variable so that the mean value of each feature becomes zero. Standardization is the process of dividing each feature value by its standard deviation. This process ensures that all features have the same importance in the analysis, and avoids the biases caused by different units of measurement:
X c = X X 1 K 1 K X + 1 K X 1 K
In the formula, X c is the matrix after data X centering, and 1 K is the K × K matrix.

3. Data Anomaly Detection Model Based on IF

Isolation forest is a forest path technique used for detecting outlier data [37]. Its main method of anomaly detection is through the path distance between the root node and the leaf nodes in the forest architecture, meaning that it can assign a more significant root-node to leaf-node distance to outlier collection data that is farther away from the range of normal data and separate it (isolate) by a sparse data-split range [38]. By eventually calculating the average length of the root-leaf node set path for each group of data, the model can detect more conspicuous collection data in the dataset, i.e., outlier data. The overall construction approach of the isolation forest model can be displayed in Figure 3 below.
We assume that S j = { z 1 , z j } is a training dataset containing j independent variables, and Z = { Z ( 1 ) , , Z ( c ) } represents the corresponding variable values α in finite-dimensional Euclidean space. We suppose that an isolation tree (IT) ε in an IF can be viewed as a binary tree that characterizes a nested sequence of data point split sets in feature space by a data depth of M 1 . Its root node corresponds to the entire detection space C 0,0 α . We assume that other IT nodes are identified in pairs m , n of sets, where m ( ( 0 m < M ) ) denotes the data depth of that node, and n ( 0 m 2 m 1 ) denotes the corresponding detection space subset C m , n α for the respective node. A node m , n that is not a terminal has two child nodes, corresponding to two detection space subsets C m , n = C m + 1,2 n C m + 1,2 n + 1 that do not intersect. If a node does not have any child nodes, it is referred to as a terminal node.
IF can be constructed by iteratively filtering subsets of the training data set [39]. First, we set the initial node m , n , then the corresponding data subset can be written as S m , n .
During the growth stage of the IT in the m + 2 n iteration process, an arbitrary growth direction v is chosen, corresponding to a separation variable Z v ; at the same time, a separation parameter u is set to correspond to the projection range of the data point in S m , n on the coordinate axis in the v direction, which can be written as:
u M i n z S m , n z v , M a x z S m , n z v
The generated subset can be written as:
C m + 1,2 n = C m , n z α : z v u
C m + 1,2 n + 1 = C m , n z α : z v > u
Then, the corresponding training data subset can be written as:
S m + 1,2 n = C m + 1,2 n S m , n
S m + 1,2 n + 1 = C m + 1,2 n + 1 S m , n
In the above formula, S is the training dataset, and C is the subset generated by the separation parameter u , which corresponds to the projection range of the data points in S on the coordinate axis in the v direction.
We repeat the above iteration until all training data set points are separated, or the data depth M is reached. When the observed score is close to M , the path length is very short, so the data point can easily be isolated, that is, in an abnormal state, and the growth of the IF node stops.
Since the end nodes on the completed IT can correspond to a subset of the feature space, a piecewise constant function f ε : α N can be defined, based on the detection space.
f ε z = m
In the above equation, z C m , n and m , n are end nodes.
The random path length shown in Equation (17) represents the degree of anomaly for the corresponding variable; that is, the higher the degree of z anomaly, the greater the probability that the data f ε z value is smaller.
Therefore, by repeating the aforementioned steps, a series of ITs can be generated to form a complete IF model. The anomaly score function for the variable z is defined as shown in the following equation:
S j z = 2 1 J a δ k = 1 J f ε z
In the equation, a δ represents the average length of a bifurcated road IT path constructed by δ variable points, which is expressed as follows:
a δ = 0 , δ < 2 1 , δ = 2 2 F δ 1 2 δ 1 j , δ > 2
F n = l n n + ξ
In the formula, ξ represents Euler’s constant.
According to Equation (18), S j z can be concluded to show that the score range is [0,1], indicating that the possibility of the data variable being an outlier increases from small to large. Values closer to 1 indicate a higher likelihood of these being outliers, while values closer to 0 indicate a higher likelihood of these being normal.

4. Case Study

This paper conducts a simulation example based on the relay protection system of a 10 kV distribution network located in a certain province in the central part of the country, aiming at the detection of operational disturbances and abnormal conditions. The 10 kV distribution network is shown in Figure 4 below.
The following are the relevant parameters of this relay protection device.
(1)
Electrical parameters
The alternating current parameters is shown in Table 1 below.
The alternating voltage parameters is shown in Table 2 below.
The direct current main parameters is shown in Table 3 below.
The alternating current power supply parameters is shown in Table 4 below.
The on-off input parameters is shown in Table 5 below.
The switch output parameters is shown in Table 6 below.
The parameters of the environmental conditions is shown in Table 7 below.
The environmental test parameters is shown in Table 8 below.
(2)
The SV and the GOOSE functions
The B02 plug-in of the device can receive current and voltage SV point-to-point or through a network. The B02 plug-in has GOOSE functions: it supports the GOOSE input of two feeder lines and the position of the sectional switch, as well as the GOOSE input of lockout backup self-casting; it supports the input of receiving GOOSE jump sectional commands; it also supports the GOOSE output of jump trip orders and others. The MMS-GOOSE of the device supports sending coordinated-trip and overload-shedding commands.
The feature information of the relay protection equipment status can be divided into two categories: historical operation data and real-time operation data, as detailed below. The data of the case study is shown in Table 9 below.
Because the numerical ranges and units of each data indicator are different, to implement anomaly detection for different types of data, it is necessary to carry out a standardized data preprocessing step. For this reason, this paper normalizes different types of data state values and maps them to a numerical range between 0 and 1.
To verify the performance of the proposed reliability anomaly detection model, the anomaly detection results deviating from the normal range will be compared with the actual operation anomaly records. The confusion matrix (CM) [46] can distinguish whether the judgment results of the model are correct, and it is shown in the following Table 10.
Based on the results of Table 2, two commonly used evaluation variables can be derived: the true positive rate (TPR) and the positive predictive value (PPV). Their mathematical expressions can be represented as:
T P R = T P T P + F N
P P V = T P T P + F P
The precision-recall (PR) curve can depict the changing trend between PPV (also known as Precision) and TPR (also known as Recall). This curve is better suited to assess prediction results when the data in the input database have a stronger bias [47]. Since the PR curve primarily compares true positive data rather than true negative data with false positive data, it can better judge the performance of different prediction models when negative data samples predominate in the input database. Generally, the proportion of outliers in the example data indicators is small, i.e., most of the samples in the dataset are negative data samples. Therefore, using the PR curve has a better analytical effect.
This article uses the area under the PR (AUPR) curve and the ROC (AUC) curve as an evaluation indicator, with a specific diagram shown in Figure 5 below.
As can be seen from the above figure, the area under the PR curve is the geometric area between the PR and the coordinate axis. Moreover, for a perfect prediction, both the PPV and TPR values will be 1; hence, a perfect PR curve must pass through the coordinate point (1,1). Therefore, the closer the PR curve generated by the prediction model is to the top right corner, i.e., the larger the AUPR, the better the performance of the prediction model.
This case study conducts a simulation verification on two types of data. Among them, the fact of whether an anomaly occurs at the time of each group of data is used as a verification indicator and is respectively defined as “1” and “0”. To test the anomaly detection performance of the proposed KPCI-IF method, the simulation results are compared with the IF model, the density-based LOF model, and the distance-based K-means algorithm. Among them, the fitting results for internal temperature anomaly detection are shown in Figure 6 and Figure 7 below.
The comparison summary of the detection performance of the four anomaly detection models is shown in Figure 8 and Figure 9, where the y-axis represents the corresponding AUPR and AUC score values.
As can be seen from Figure 8 and Figure 9, the proposed KPCI-IF method has the highest detection performance for different scenarios, devices, and parameters in the protection system. Among all the characteristic data of the examples, the detection accuracy of the maintenance status, transformer connection status, etc., is relatively high due to the overall high safety and the presence of relatively fewer samples deviating from the normal value range. However, real-time operation data such as operating frequency and CPU utilization rate have a relatively lower detection accuracy, due to the large number of data samples and the dense time series. However, most of them cannot cause substantial faults, so for this type of data feature, a relatively higher detection threshold can be independently set later. In addition, among the three comparative anomaly detection models, the detection accuracy of the IF, LOF, and K-means methods decreases successively, proving that tree structures have corresponding advantages in terms of model construction perfection compared to density and distance structures. Finally, by comparing the detection results of KPCI-IF and ordinary IF, it can be seen that the added dimension reduction step is very significant when facing potentially high-dimensional large-capacity data.
The timeliness of the proposed method is then validated and the calculation time of the proposed KPCI-IF method is compared with that of PCI-IF and IF methods. The comparison results are shown in the following Table 11.
From the above table, it can be concluded that the proposed KPCI-IF method still has a certain advantage in terms of timeliness. Compared to the single-model IF detection method, IF combined with the data dimension reduction model can effectively reduce the complexity of data, thereby improving the response speed of anomaly detection. In addition, by incorporating kernel functions, KPCI is better adapted to high-dimensional data environments than the standard PCI and has certain advantages in terms of computational efficiency.
In addition, we further strengthen our arguments and findings via comparative analysis. In this study, we referred to the PCA anomaly detection model used in references [48,49], reviewed the LOF anomaly detection model used in references [50,51], and employed the IF anomaly detection model used in references [52,53] as a reference for comparison. After a detailed comparison, it can be concluded that the KPCI-IF method still has a significant advantage in terms of timeliness. This advantage is reflected in several aspects. First, compared with the PCA model, the KPCI-IF method has a higher computational efficiency that reduces the running time of the program, enabling users to obtain results within a short period. Secondly, compared to the LOF model, the KPCI-IF method can avoid issues caused by the presence of duplicate points where the average reachable distance is zero and the local reachable density becomes infinite, causing computational difficulties, and it even has a lower computational cost, making it more suitable for high-dimensional and large-scale data. Finally, compared to the IF model, the KPCI-IF method has a faster processing speed and can more effectively process and identify anomalies in the data due to its excellent timeliness. When dealing with large amounts of real-time data input, the KPCI-IF method can quickly find and identify anomalies in these data. Therefore, our research results show that compared to other anomaly detection models, the KPCI-IF method has a certain advantage in terms of its timeliness performance and can better meet users’ requirements for the rapid identification and processing of data anomalies.

5. Conclusions

To address the high-dimensional heterogeneous characteristics of the operational status input data of distribution network protection systems, this paper presents a data-driven multi-model anomaly detection ensemble to effectively excavate their potential operational disturbances and abnormal statuses, thereby achieving real-time abnormal monitoring and early warnings. The main works of this paper are summarized as follows:
  • A KPCI dimension reduction model is constructed to map and dissect the original data and compress its dimension. This can effectively deal with high-dimensional heterogeneous input data environments and diminish the computational burden to decrease the response time.
  • The IF tree-structure anomaly detection method is established, which directly identifies abnormal samples according to the corresponding normal range of operational status in each feature. It can cope with different scenarios, devices, and parameter types through an almost identical process, and, thus, can realize comprehensive and effective responses to underlying diverse anomalies.
In general, the innovation of this algorithm is that it fully utilizes the concept of being data-driven, and, through the KPCI dimension reduction model and the IF anomaly detection model, it effectively processes large-scale high-dimensional heterogeneous operational status data. In this process, the algorithm successfully excavates potential operation disturbances and state anomalies in the relay protection system of the distribution network. Due to this multi-model design, the algorithm runs rapidly and has strong capabilities to deal with large-scale data. This not only effectively meets the needs of real-time monitoring and early warnings but also provides a new solution to deal with the complex relay protection system of the distribution network. Through a large amount of empirical analysis, we found that this algorithm can effectively deal with practical problems in the operation of the power system. The experimental results also verify that this algorithm can not only effectively detect anomalies but also has a fairly high strike accuracy. Therefore, we have reason to believe that this method will play a bigger role in the future regarding power system operational safety and in the maintenance of future smart grids. However, although this algorithm has solved the high-dimensional heterogeneous data processing problem of data-driven models to some extent, there are still some deficiencies. For instance, there may be room for optimization in the pre-processing part of data preparation, and the data expression after dimension reduction may lose some information. Therefore, our future work also includes further enhancing the stability of the algorithm and its accuracy, to dig deeper into potential rules in order to make a bigger contribution to the health, safety, and stability of power system operation.

Author Contributions

Conceptualization, C.Y. and C.S.; methodology, C.Y. and B.Y.; software, C.Y.; validation, C.Y., B.Y. and J.S.; resources, C.S.; writing—original draft preparation, C.Y.; writing—review and editing, C.S.; visualization, R.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Natural Science Foundation of China (52207074), the Natural Science Foundation of Hunan (2024JJ9175), the Natural Science Foundation of Changsha (kq2208231), and the Innovation and Entrepreneurship Training Program of Changsha University of Science and Technology College Students (202310536058).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Anagnostou, G.; Boem, F.; Kuenzel, S.; Pal, B.C.; Parisini, T. Observer-Based Anomaly Detection of Synchronous Generators for Power Systems Monitoring. IEEE Trans. Power Syst. 2018, 33, 4228–4237. [Google Scholar] [CrossRef]
  2. Liu, D. Research on Service Tactics of Relocy Protection State for Transformer Substations. Electr. Switchg. 2020, 58, 94–95+99. [Google Scholar]
  3. Chen, J.; Liu, W.; Gu, L.; Huang, H.; Jiang, H. Comprehensive On-line Detection of Partial Discharge in Capacitive Power Equipment by Integration of HF and UHF. High Volt. Appar. 2018, 54, 195–199. [Google Scholar]
  4. Wang, Y.; Wu, J.; Xu, H. A New Microstrip Antenna Used for Detecting the Ultra-High Frequency Signal Caused by the Partial Discharge in Power Equipments. Trans. China Electrotech. Soc. 2016, 31, 136–144. [Google Scholar]
  5. Chen, H.; Li, H.; Yang, Y.; Feng, T.; Ying, D. Research on classification of partial discharge acoustic detection in power equipment. Electrotech. Appl. 2022, 41, 38–43. [Google Scholar]
  6. Lin, L.; Wu, Y. Infrared overheating defect detection method for power equipment based on improved YOLOv7. Electr. Eng. 2024, 25, 42–47. [Google Scholar]
  7. Wang, M.; Du, W.; Sun, H.; Zhang, J. Transmission Line Fault Diagnosis Method Based on Infrared Image Recognition. Infrared Technol. 2017, 39, 383–386. [Google Scholar]
  8. Chen, J.; Xiao, L.; Wan, X.; Mai, R.; Qin, H.; Li, L. Research on Enhancement and Segmentation of Power Equipment Infrared Heat Map in Complex Environment. Infrared Technol. 2018, 40, 1112–1118. [Google Scholar]
  9. Pei, L.; Du, H.; Huang, Z.; Huang, H.; Wu, Z. Intelligent diagnosis of power equipment operation risk based on infrared detection. Electr. Power Equip. Manag. 2020, 5, 121–122+132. [Google Scholar]
  10. Huang, R.; Dai, M.; Zheng, Y.; Huang, Q.Q.; Kang, L.Y.; Gou, X.T.; Zhou, W.C. Defect Detection of Power Equipment by Infrared Image. Electr. Power 2021, 54, 147–155. [Google Scholar]
  11. Wang, X.; Li, H.; Fan, S.; Jiang, Z. Infrared Image Anomaly Automatic Detection Method for Power Equipment Based on Improved Single Shot Multi Box Detection. Trans. China Electrotech. Soc. 2020, 35, 302–310. [Google Scholar]
  12. Li, J.; Wu, K.; Zhang, B. Research on Anomaly Detection of Power Industrial Control System Based on Gaussian Mixture Clustering. Netinfo Secur. 2021, 21, 53–63. [Google Scholar]
  13. Peng, X.; Jin, L.; Wang, R.; Yi, L.; Chen, G. Substation Robot Intelligent Inspection Technology and Its Application. High Volt. Appar. 2019, 55, 223–232. [Google Scholar]
  14. Xiao, X.; Li, X.; Luo, H.; Zhou, H.; Liang, J.; Xia, M. An Identification Method of the Plate in the Blind Zone of Substation Inspection Robots and Its Application. Guangxi Electr. Power 2022, 45, 36–41+48. [Google Scholar]
  15. Zhou, L.; Zhang, Y.; Sun, Y.; Liang, T.; Lu, S. Development and Application of Equipment Inspection Robot for Smart Substations. Autom. Electr. Power Syst. 2011, 35, 85–88+96. [Google Scholar]
  16. Lu, S.; Zhang, Y.; Li, J.; Mu, S. Application of Mobile Robot in High Voltage Substatio. High Volt. Eng. 2017, 43, 276–284. [Google Scholar]
  17. Xiong, Y. Implementation of a Power Patrolling Robot System in a Substation. Master’s Thesis, Huazhong University of Science and Technology, Wuhan, China, 2019. [Google Scholar]
  18. Yang, X.; Li, S.; Li, J. Research on Algorithm for Equipment Condition Monitoring Based on Inspection Robot. Comput. Technol. Dev. 2021, 31, 201–205,210. [Google Scholar]
  19. Zou, W.; Wang, Y.; Liao, S.; Lian, Y.; Lai, Z. Research status and development trend of power system security application based on artificial intelligence technology. Chang. Inf. Commun. 2023, 36, 149–154. [Google Scholar]
  20. Li, Y.; Dong, Y.; Lin, M.; Gao, M.; Yue, H.; Ding, J. Power Equipment Detection Method Based on AI Vision Technology. Microcomput. Appl. 2023, 39, 90–93. [Google Scholar]
  21. Lu, B.; Zhang, J.; Wang, S.; Fang, B.; Feng, K.; Zheng, L. Application of Artificial Intelligence Technology in Power System Relay Protection. Software 2021, 42, 153–155. [Google Scholar]
  22. Zheng, X.; Jia, R.; Gong, L.; Aisikaer; Ma, X.; Dang, J. Relay protection system of transmission line based on AI. PLoS ONE 2021, 16, e0246403. [Google Scholar] [CrossRef] [PubMed]
  23. Zhou, Y.; Chen, J.; Zhang, L.; Zhang, Y.; Teng, C.; Huang, X. Opportunity for Developing Ultra High Voltage Transmission Technology Under the Emission Peak, Carbon Neutrality and New Infrastructure. High Volt. Eng. 2021, 47, 2396–2408. [Google Scholar]
  24. Si, F.; Han, Y.; Zhao, Q.; Wang, J. Verification of Distribution Network Connectivity Based on AP-LOF Outlier Group Detection. J. Northeast. Univ. (Nat. Sci.) 2020, 41, 1070–1074. [Google Scholar]
  25. Ye, Y.; Xie, M.; Chen, X. A condition-based maintenance strategy for a relay protection system based on failure probability analysis. Power Syst. Prot. Control 2021, 49, 167–173. [Google Scholar]
  26. Wang, W.; Yang, G.; Zhou, Z. Reliability distribution of relay protection based on random truncation data and maximum likelihood estimation. Power Syst. Prot. Control 2019, 47, 125–131. [Google Scholar]
  27. Ye, Y.; Liu, H.; Zhang, Z. Research on real-time evaluation of relay protection based on wide area information. Power Syst. Prot. Control 2021, 49, 150–157. [Google Scholar]
  28. Wang, Z.; Chen, P.; Kong, F.; Chen, Q.; Chen, B. MMS Model-based Automatic Testing Technology for Relay Protection Devices. Electr. Eng. 2023, 44, 107–110+208. [Google Scholar]
  29. Sun, M.; Cong, W.; Yu, J.; Zheng, M.; Gao, Z. Fault locating method based on big data of power grid operation and maintenance for relay protection communication system. Electr. Power Autom. Equip. 2019, 39, 141–147. [Google Scholar]
  30. Chakit, P.; Korawitch, K.; Keerati, C. Adaptive Directional Overcurrent Relay Coordination in Microgrid Considering Optimal Full Setting Parameters. Electr. Power Compon. Syst. 2024, 52, 985–1000. [Google Scholar]
  31. Qi, Z. Operation Control Method of Relay Protection in Flexible DC Distribution Network Compatible with Distributed Power Supply; School of Electric Power Engineering, South China University of Technology: Guangzhou, China, 2023; Volume 120, pp. 2547–2563. [Google Scholar]
  32. Piesciorovsky, E.C.; Borges Hink, R.; Werth, A.; Hahn, G.; Lee, A.; Polsky, Y. Assessment and Commissioning of Electrical Substation Grid Testbed with a Real-Time Simulator and Protective Relays/Power Meters in the Loop. Energies 2023, 16, 4407. [Google Scholar] [CrossRef]
  33. Wang, T.; Wang, C.; Li, Y.; Xu, J.; Wang, Q. Slope stability prediction based on KPCA-KNN algorithm. Ind. Miner. Process. 2023, 52, 52–58. [Google Scholar]
  34. Zhang, T.; Li, J. Research on fault diagnosis of rolling bearings based on adaptive VMD-KPCA feature extraction and SSA-SVM method. J. Mach. Des. 2022, 39, 63–73. [Google Scholar]
  35. Hariri, S.; Kind, M.; Brunner, R. Extended Isolation Forest. IEEE Trans. Knowl. Data Eng. 2021, 33, 1479–1489. [Google Scholar] [CrossRef]
  36. Li, X.; Zuo, X.; Gao, X.; Yue, Y. Intelligent diagnosis method for kick based on KPCA-SSELM. Pet. Geol. Recovery Effic. 2022, 29, 190–196. [Google Scholar]
  37. Li, J. Design of multi-outlier data detection algorithm based on isolation forest. Mod. Electron. Tech. 2024, 47, 139–142. [Google Scholar]
  38. Liu, C.; Liu, D. Survey of Proximity Methods for Outlier Detection. Comput. Eng. Appl. 2022, 58, 1–12. [Google Scholar]
  39. Qian, X.; Zhu, M.; Zhai, Q.; Zhang, X.; Chen, K. Abnormal electrical behavior recognition method based on improved isolated forest algorithm. J. Shenyang Univ. Technol. 2023, 45, 601–606. [Google Scholar]
  40. GB/T 8367-1987; Interruptions to and Alternating Component (Ripple) in d.c Auxiliary Energizing Quantity of Measuring Relays. Standardization Administration of China: Beijing, China, 2013.
  41. GB/T 14598.2-2011; Measuring Relays and Protection Equipment. Part 1: Common Requirements. Standardization Administration of China: Beijing, China, 2011.
  42. GB/T 14047-1993; Measuring Relays and Protection Equipment. Standardization Administration of China: Beijing, China, 1993.
  43. GB/T 2423.1-2008; Environmental Testing for Electric and Electronic Products. Part 2: Test Methods. Tests A: Cold. Standardization Administration of China: Beijing, China, 2008.
  44. GB/T 2423.2-2008; Environmental Testing for Electric and Electronic Products. Part 2: Test Methods. Tests B: Dry Heat. Standardization Administration of China: Beijing, China, 2008.
  45. GB/T 2423.4-2008; Environmental Testing for Electric and Electronic Products—Part 2: Test Method—Test Db: Damp Heat, Cyclic (12 h + 12 h Cycle). Standardization Administration of China: Beijing, China, 2008.
  46. Fawcett, T. An Introduction to ROC Analysis. Pattern Recognit. Lett. 2006, 27, 861–874. [Google Scholar] [CrossRef]
  47. Davis, J.; Goadrich, M. The Relationship between Precision-Recall and ROC Curves. In Proceedings of the 23rd International Conference on Machine Learning, Pittsburgh, PA, USA, 25–29 June 2006; pp. 233–240. [Google Scholar]
  48. Gao, G. Topology Identification Method of Low-Voltage Distribution Network Based on Smart Meter Data. Fluid Meas. Control 2023, 4, 64–69. [Google Scholar]
  49. Guo, Y. Research on Abnormal Diagnosis of Line Loss Operation in Distribution Network Based on Big Data. Mod. Ind. Econ. Informationization 2023, 13, 297–299. [Google Scholar]
  50. Zhang, X.; He, G.; Liang, C.; Ma, X.; He, Z.; Jiang, F. Identification and correction of abnormal line loss data in distribution networks based on segmented regions. Zhejiang Electr. Power 2023, 42, 90–100. [Google Scholar]
  51. Geng, J.; Guo, Z.; Li, X.; Su, J.; Yuan, S.; Niu, S. Connectivity data verification method of feeder-transformers based on LOF and SVM. China Meas. Test 2021, 47, 49–54. [Google Scholar]
  52. Jia, S. Research on Abnormal Diagnosis Method of Medium Voltage Distribution Network Line Loss Based on Isolation Forest Algorithm. Prodvct Tech. 2023, 28–30+35. [Google Scholar]
  53. Chen, T. Fault Automatic Llocation Method for 10 kV Distribution Network Based on Isolated Forest Algorithm. Autom. Appl. 2023, 64, 196–198. [Google Scholar] [CrossRef]
Figure 1. Illustration of the KPCI-IF ensemble.
Figure 1. Illustration of the KPCI-IF ensemble.
Applsci 14 04158 g001
Figure 2. Illustration of a kernel function.
Figure 2. Illustration of a kernel function.
Applsci 14 04158 g002
Figure 3. Illustration of outlier detection by the IF model.
Figure 3. Illustration of outlier detection by the IF model.
Applsci 14 04158 g003
Figure 4. The 10 kV distribution network schematic diagram.
Figure 4. The 10 kV distribution network schematic diagram.
Applsci 14 04158 g004
Figure 5. The PR (AUPR) curve and the ROC (AUC) curve.
Figure 5. The PR (AUPR) curve and the ROC (AUC) curve.
Applsci 14 04158 g005
Figure 6. Comparison of outlier detection by the PR curve.
Figure 6. Comparison of outlier detection by the PR curve.
Applsci 14 04158 g006
Figure 7. Comparison of outlier detection by the ROC curve.
Figure 7. Comparison of outlier detection by the ROC curve.
Applsci 14 04158 g007
Figure 8. Performance comparison between the outlier detection models via AUPR.
Figure 8. Performance comparison between the outlier detection models via AUPR.
Applsci 14 04158 g008
Figure 9. Performance comparison between the outlier detection models via AUC.
Figure 9. Performance comparison between the outlier detection models via AUC.
Applsci 14 04158 g009
Table 1. Electrical parameters: alternating current.
Table 1. Electrical parameters: alternating current.
Phase SequenceABC
Rated frequency50 Hz
applicationprotectmeasure
Rated current (In)1 A5 A1 A5 A
linearity range0.05 In~30 In0.05 In~30 In0.05 In~2 In0.05 In~2 In
Continuous overload capacity3 In3 In2 In2 In
10 s overload capacity30 In30 In10 In10 In
1 s overload capacity100 In 100 In30 In30 In
Dynamic-stable current (half-wave value)250 In250 In75 In75 In
Power consumption at rated current (@In)<0.15 VA/phase<0.25 VA/phase<0.2 VA/phase<0.4 VA/phase
Table 2. Electrical parameters: alternating voltage.
Table 2. Electrical parameters: alternating voltage.
Phase SequenceABC
Rated frequency50 Hz
Rated voltage (phase, Un)100~130 V
linearity range1~130 V
Continuous overload capacity 130 V
10 s overload capacity 200 V
1 s overload capacity250 V
Power consumption at the rated voltage<0.1 VA/phase
Table 3. Electrical parameters: direct current main.
Table 3. Electrical parameters: direct current main.
Adopt the StandardGB/T 8367-1987 (idt IEC 60255-11:2008) [40]
rated voltage110 Vdc, 220 Vdc
input range80%~120% of the rated voltage
ripple waveand 15% of the rated voltage
quiescent dissipation<15 W (conventional station), <20 W (digital station)
power consumption during action<20 W (conventional station), <25 W (digital station)
DC power supply polarity back-connectionThe device works normally
Table 4. Electrical parameters: alternating current power supply.
Table 4. Electrical parameters: alternating current power supply.
rated voltage110/220 Vac
input range80%~120% of the rated voltage
quiescent dissipation<15 W (conventional station), <20 W (digital station)
power consumption during action<20 W (conventional station), <25 W (digital station)
Table 5. Electrical parameters: on-off input.
Table 5. Electrical parameters: on-off input.
Adopt the StandardIEC 60255-1:2009 [41]
Rated voltage110 Vdc220 Vdc
Starting voltage60.5 V~77 V121 V~154 V
Rated current1.1 mA2.2 mA
Return voltage50% rated voltage
Maximum allowable voltage300 Vdc
Pressure resistance level2000 Vac, 2800 Vdc
Table 6. Electrical parameters: switch output.
Table 6. Electrical parameters: switch output.
Output Junction ClassificationTrip, Signal
Output formPassive contact point
Maximum operating voltage380 Vac 250 Vdc
Open contact pressure resistance1000 V RMS, 1 Minutes
Continuous flow carrying capacity5 A@380 Vac 5 A@250 Vdc
Impact over current ability6 A@3 s
15 [email protected] s 30 [email protected] s
Actuation time<8 ms
Return time<5 ms
Arc-breaking capability (L/R = 40 ms)0.65 A@48 Vdc 0.30 A@110 Vdc 0.15 A@220 Vdc
Electrical life10,000 times
Table 7. Parameters of the environmental conditions.
Table 7. Parameters of the environmental conditions.
Adopt the StandardGB/T 14047-1993, idt IEC 60225-1:2009) [41,42]
operating temperature range−20~+55 °C
Storage and transportation temperature range−40~+70 °C
Relative humidityAt 5~95%, the equipment is not condensation, not ice
Table 8. The environmental test.
Table 8. The environmental test.
cold test16 h at low temperature −25 °C (GB/T 2423.1-2008 [43])
hot test16 h at high temperature +55 °C (GB/T 2423.2-2008 [44])
cyclic damp heat testhigh temperature 55 °C, low temperature 25 °C, relative humidity 95%, two cycles of test time (12 h + 12 h) (GB/T 2423.4-2008 [45])
Table 9. Data of the case study.
Table 9. Data of the case study.
Feature TypeData Features
Historical operational datapre-operational status, common defects, maintenance status, and correctness rate of actions
Real-time operational dataoperational voltage, frequency, internal temperature, input/output status, connection status of voltage and current transformers, communication status of SV and GOOSE messages, soft pressure plate status, and CPU utilization rate
Table 10. The 2 × 2 confusion matrix.
Table 10. The 2 × 2 confusion matrix.
Confusion Matrix (CM)Record Results
TrueFalse
Judgment resultsPositiveTrue Positive(TP)False Positive(FP)
NegativeTrue Negative(TN)False Negative(FN)
Table 11. Comparison of efficiency between methods.
Table 11. Comparison of efficiency between methods.
Anomaly Detection MethodCalculation Time (s)Degree of Improvement (%)
KPCI-IF0.7728
PCI-IF1.023224.5
IF1.872458.7
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yuan, C.; Sun, C.; Yu, B.; Su, J.; Li, R. An Anomaly Detection Ensemble for Protection Systems in Distribution Networks. Appl. Sci. 2024, 14, 4158. https://doi.org/10.3390/app14104158

AMA Style

Yuan C, Sun C, Yu B, Su J, Li R. An Anomaly Detection Ensemble for Protection Systems in Distribution Networks. Applied Sciences. 2024; 14(10):4158. https://doi.org/10.3390/app14104158

Chicago/Turabian Style

Yuan, Chenyin, Chenhao Sun, Boxuan Yu, Jianhong Su, and Runze Li. 2024. "An Anomaly Detection Ensemble for Protection Systems in Distribution Networks" Applied Sciences 14, no. 10: 4158. https://doi.org/10.3390/app14104158

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop