- Advanced Computational Techniques and Applications
- Power Systems and Technologies
- Cloud Computing and Resource Management
- Smart Grid Security and Resilience
- Smart Grid and Power Systems
- Anomaly Detection Techniques and Applications
- Advanced Decision-Making Techniques
- Network Security and Intrusion Detection
- Advanced Database Systems and Queries
- Computational Physics and Python Applications
- Distributed and Parallel Computing Systems
- Logic, Reasoning, and Knowledge
- Electricity Theft Detection Techniques
- Service-Oriented Architecture and Web Services
- Reconstructive Surgery and Microvascular Techniques
- Advanced Data and IoT Technologies
- Constraint Satisfaction and Optimization
- Power System Reliability and Maintenance
- IoT and Edge/Fog Computing
- Business Process Modeling and Analysis
China Southern Power Grid (China)
2013-2025
Sun Yat-sen University
2010
Effective energy management and optimal utilization of assets are crucial for a nation’s progress prosperity. However, as electricity travels from power plants to end users, it incurs two types losses: Technical Losses (TL) Non-Technical (NTL). TLs arise outdated or inefficient technologies, whereas NTLs result abnormal usage, including theft, which is often conducted reduce expenses. These losses pose significant challenges maintaining grid reliability in reduced profits utility operators....
Abstract This paper first analyzes the process and characteristics of big data cloud computing. A cloud-based architecture for power grid wide-area monitoring is proposed. uses parallel computing mining to provide relevant auxiliary decision-making grid. The this based on Hadoop a brief description demonstrated. Finally, two scenarios visualization scheduling decision are briefly described.
Abstract It is very important to detect abnormal Access IP of power grid dispatching platform accurately and rapidly ensure the safety production. An Isolation Forest K-means fusion algorithm proposed, which not only solves deficiency being able anomalies in binary classification, but also defect threshold setting based on artificial experience or prior assumptions by designing a strategy for anomalies. The data southern taken as an example evaluate proposed model. Through control...
Abstract Network attacks are one of the main threats to stable operation smart grid equipment. As a real-time monitoring system prevent network attacks, intrusion detection is widely used in protection. However, massive data transmission process contains large number redundant and irrelevant features, which makes it difficult for time reduce efficiency. Feature selection method solve this kind problem. It can improve speed by filtering characteristics data. Therefore, hybrid feature...
Abstract This paper proposes a SCADA platform architecture for cloud-based micro-service system with real time data process. Firstly, the main functions of “collection, processing, storage, interaction and display” are analyzed. Then, based on formation principle, technical solutions cloud computing integration illustrated. The system, front collection subsystem service Finally, application scenario is
Power flow diagram is an important tool of modern Energy Management System (EMS) for system operators to schedule the operation and maintenance plan, examine security situation dispatch in real-time.Manually creation power large scale grid time consuming error prone.In previous research, exposure detail information inside substations that interest incremental update generated diagrams are not supported automatic generation diagrams.In this paper, we propose dynamic viewport display method...
In modern power grid, especially with the development of ultra high voltage (UHV) and AC-DC hybrid scale complexity transmission network increase a lot.System operators need to quickly grasp real-time operation situation make decision ensure security economics grid.GUI (graphical user interfaces) has become essential components control center.Power flow diagrams other such as substation present provide interface for remote control.Manually creation maintenance is totally unacceptable it very...
Substations are described in detail the Substation Configuration Description (SCD) file Language (SCL) for intelligent substations according to IEC61850 standard, including primary equipment and topology, secondary smart equipment, measurement communication, etc. After SCD of downstream substation is got, corresponding grid logic view upstream main station system can be established theoretically. The analyzed this paper, relationship model objects constructed, generating standard spatial...
Objective To evaluate the outcome of free hypothenar perforator flap, with different vascular perforators, in fingerskin defects repairment. Methods From April 2014 to September 2016, 15 cases skin on finger were treated based perforators.Patients had nerves, vessels, tendons or bone exposure.Defects ranged from 1.5 cm×3.5 cm 2.0 cm×4.5 size. Fivecases flap a cutaneous branch ulnar artery, 8 acutaneous digital 2 superficial volar arch.Donor site was closed...