Detection of Unauthorized Photo-Voltaic System Connection for Low Voltage Grids

Pouraltafi-Kheljan, Soheil
Göl, Murat
Vast and unauthorized penetration of the photovoltaic systems in distribution systems imposed inadequate monitoring challenge to system operators. Although the installation of required monitoring infrastructure does seem as a solution, due to the high installation cost, it is not considered a feasible one, at least for the near future. As an alternative approach, a two-stage method composed of an ANN-based mapping function, and a regression model is presented to detect unauthorized PV connections to the system. A gradient boosting machine is implemented to build the regression model and the corresponding confidence interval. The Monte Carlo simulations are utilized to generate synthetic training data-sets for both models. Finally, the performance of the approach is assessed with real data.


Detection of airport runways in optical satellite images
Zöngür, Uğur; Ulusoy, İlkay; Department of Electrical and Electronics Engineering (2009)
Advances in hardware and pattern recognition techniques, along with the widespread utilization of remote sensing satellites, have urged the development of automatic target detection systems. Automatic detection of airports is particularly essential, due to the strategic importance of these targets. In this thesis, a detection method is proposed for airport runways, which is the most distinguishing element of an airport. This method, which operates on large optical satellite images, is composed of a segmenta...
Efficient and Reliable Multicast of Data in APCO P25 Systems
Cigirkan, Gulay; Girici, Tolga; Yüksel Turgut, Ayşe Melda (2015-01-01)
In this paper, we investigate an efficient scheme for data multicasting in narrowband public safety radio systems. The proposed scheme uses fountain encoding, in order to avoid feedback messages for each individual packet. We first propose a multistage estimation scheme that is based on slotted random access and that does not require any prior knowledge of number of users. The rest of the proposed scheme consists of iterative transmission and feedback/estimation phases. In feedback phases, the base station ...
A framework for distributed intrusion detection systems
Öztosun, Ümit; Koçyiğit, Altan; Mumcuoğlu, Erkan; Department of Information Systems (2002)
Emergence of intrusion detection systems (IDSs) has leveraged the security of infor mation systems. However, they also introduced new problems. Plethora of intrusion detection systems are in common use today, using various different ways and tech niques for intrusion detection. It is not uncommon to see an information system uti lizes different IDSs, in order to combine advantages and to reduce disadvantages of individual systems. This often results in a confusion of systems that output informa tion in diff...
Examination of Target RCS Characteristics in FDA Radars
Cetintepe, Cagri; Demir, Şimşek (2014-07-11)
This paper reports on the preliminary analysis of frequency diverse array (FDA) radars for simple target geometries. The radar system employs an FDA and a isotropic element as the transmitter and receiver antennas, respectively, and illuminates a target consisting of an arbitrary arrangement of ideal point scatterers. After establishing a signal model for the voltage waveform received by this radar system, the study then considers particular target arrangements and compares the average received power to tha...
Design and analysis of nano-optical networks consisting of nanowires and optimized couplers
Altinoklu, Askin; Karaova, Gokhan; Ergül, Özgür Salih (2019-09-01)
We present computational design and investigation of nano-optical systems involving nanowires and well-designed nano-couplers to effectively transmit electromagnetic power in nanometer scales. Different nano-couplers, which consist of optimal arrangements of nano-cubes, are carefully designed by considering various scenarios, e.g., nanowire lines with sharp corners and junctions. An efficient combination of genetic algorithms and the multilevel fast multipole algorithm is used to find suitable configuration...
Citation Formats
S. Pouraltafi-Kheljan and M. Göl, “Detection of Unauthorized Photo-Voltaic System Connection for Low Voltage Grids,” presented at the 28th Signal Processing and Communications Applications Conference (SIU), ELECTR NETWORK, 2020, Accessed: 00, 2021. [Online]. Available: