Skip to main content

Showing 1–6 of 6 results for author: Wallom, D

.
  1. arXiv:2306.03581  [pdf

    eess.SY

    Optimal sizing of solar photovoltaic and lithium battery storage to reduce grid electricity reliance in buildings

    Authors: Han Kun Ren, Malcolm McCulloch, David Wallom

    Abstract: In alignment with the Paris Agreement, the city of Oxford in the UK aims to become carbon neutral by 2040. Renewable energy help achieve this target by reducing the reliance on carbon-intensive grid electricity. This research seeks to optimally size solar photovoltaic and lithium battery storage systems, reducing Oxford's grid electricity reliance in buildings. The analysis starts with modeling th… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: 10 pages, 8 figures, published in the conference of ECEEE 2022 Summer Study on energy efficiency: agents of change

    Report number: 8-096-22

    Journal ref: ECEEE 2022 Summer Study on energy efficiency: agents of change, (2022), 1199-1208, ECEEE

  2. arXiv:2304.10686  [pdf, other

    eess.SY cs.LG

    A generalised multi-factor deep learning electricity load forecasting model for wildfire-prone areas

    Authors: Weijia Yang, Sarah N. Sparrow, David C. H. Wallom

    Abstract: This paper proposes a generalised and robust multi-factor Gated Recurrent Unit (GRU) based Deep Learning (DL) model to forecast electricity load in distribution networks during wildfire seasons. The flexible modelling methods consider data input structure, calendar effects and correlation-based leading temperature conditions. Compared to the regular use of instantaneous temperature, the Mean Absol… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

  3. arXiv:2301.10628  [pdf, other

    eess.SY

    Incentive-weighted Anomaly Detection for False Data Injection Attacks Against Smart Meter Load Profiles

    Authors: Martin Higgins, Bruce Stephen, David Wallom

    Abstract: Spot pricing is often suggested as a method of increasing demand-side flexibility in electrical power load. However, few works have considered the vulnerability of spot pricing to financial fraud via false data injection (FDI) style attacks. In this paper, we consider attacks which aim to alter the consumer load profile to exploit intraday price dips. We examine an anomaly detection protocol for c… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

  4. arXiv:2212.07757  [pdf, other

    eess.SY cs.CR cs.LG

    Spatial-Temporal Anomaly Detection for Sensor Attacks in Autonomous Vehicles

    Authors: Martin Higgins, Devki Jha, David Wallom

    Abstract: Time-of-flight (ToF) distance measurement devices such as ultrasonics, LiDAR and radar are widely used in autonomous vehicles for environmental perception, navigation and assisted braking control. Despite their relative importance in making safer driving decisions, these devices are vulnerable to multiple attack types including spoofing, triggering and false data injection. When these attacks are… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

  5. Anomaly Detection for Industrial Big Data

    Authors: Neil Caithness, David Wallom

    Abstract: As the Industrial Internet of Things (IIoT) grows, systems are increasingly being monitored by arrays of sensors returning time-series data at ever-increasing 'volume, velocity and variety' (i.e. Industrial Big Data). An obvious use for these data is real-time systems condition monitoring and prognostic time to failure analysis (remaining useful life, RUL). (e.g. See white papers by Senseye.io, an… ▽ More

    Submitted 9 April, 2018; originally announced April 2018.

    Comments: 9 pages; 11 figures

    Journal ref: In Proceedings of the 7th International Conference on Data Science, Technology and Applications - Volume 1: DATA (2018), ISBN 978-989-758-318-6, pages 285-293

  6. The Physics of the B Factories

    Authors: A. J. Bevan, B. Golob, Th. Mannel, S. Prell, B. D. Yabsley, K. Abe, H. Aihara, F. Anulli, N. Arnaud, T. Aushev, M. Beneke, J. Beringer, F. Bianchi, I. I. Bigi, M. Bona, N. Brambilla, J. B rodzicka, P. Chang, M. J. Charles, C. H. Cheng, H. -Y. Cheng, R. Chistov, P. Colangelo, J. P. Coleman, A. Drutskoy , et al. (2009 additional authors not shown)

    Abstract: This work is on the Physics of the B Factories. Part A of this book contains a brief description of the SLAC and KEK B Factories as well as their detectors, BaBar and Belle, and data taking related issues. Part B discusses tools and methods used by the experiments in order to obtain results. The results themselves can be found in Part C. Please note that version 3 on the archive is the auxiliary… ▽ More

    Submitted 31 October, 2015; v1 submitted 24 June, 2014; originally announced June 2014.

    Comments: 928 pages, version 3 (arXiv:1406.6311v3) corresponds to the alpha, beta, gamma version of the book, the other versions use the phi1, phi2, phi3 notation

    Report number: SLAC-PUB-15968, KEK Preprint 2014-3

    Journal ref: Eur. Phys. J. C74 (2014) 3026