-
Tolerance of Reinforcement Learning Controllers against Deviations in Cyber Physical Systems
Authors:
Changjian Zhang,
Parv Kapoor,
Eunsuk Kang,
Romulo Meira-Goes,
David Garlan,
Akila Ganlath,
Shatadal Mishra,
Nejib Ammar
Abstract:
Cyber-physical systems (CPS) with reinforcement learning (RL)-based controllers are increasingly being deployed in complex physical environments such as autonomous vehicles, the Internet-of-Things(IoT), and smart cities. An important property of a CPS is tolerance; i.e., its ability to function safely under possible disturbances and uncertainties in the actual operation. In this paper, we introduc…
▽ More
Cyber-physical systems (CPS) with reinforcement learning (RL)-based controllers are increasingly being deployed in complex physical environments such as autonomous vehicles, the Internet-of-Things(IoT), and smart cities. An important property of a CPS is tolerance; i.e., its ability to function safely under possible disturbances and uncertainties in the actual operation. In this paper, we introduce a new, expressive notion of tolerance that describes how well a controller is capable of satisfying a desired system requirement, specified using Signal Temporal Logic (STL), under possible deviations in the system. Based on this definition, we propose a novel analysis problem, called the tolerance falsification problem, which involves finding small deviations that result in a violation of the given requirement. We present a novel, two-layer simulation-based analysis framework and a novel search heuristic for finding small tolerance violations. To evaluate our approach, we construct a set of benchmark problems where system parameters can be configured to represent different types of uncertainties and disturbancesin the system. Our evaluation shows that our falsification approach and heuristic can effectively find small tolerance violations.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Generalized two-point visual control model of human steering for accurate state estimation
Authors:
Rene Mai,
Katherine Sears,
Grace Roessling,
Agung Julius,
Sandipan Mishra
Abstract:
We derive and validate a generalization of the two-point visual control model, an accepted cognitive science model for human steering behavior. The generalized model is needed as current steering models are either insufficiently accurate or too complex for online state estimation. We demonstrate that the generalized model replicates specific human steering behavior with high precision (85\% reduct…
▽ More
We derive and validate a generalization of the two-point visual control model, an accepted cognitive science model for human steering behavior. The generalized model is needed as current steering models are either insufficiently accurate or too complex for online state estimation. We demonstrate that the generalized model replicates specific human steering behavior with high precision (85\% reduction in modeling error) and integrate this model into a human-as-advisor framework where human steering inputs are used for state estimation. As a benchmark study, we use this framework to decipher ambiguous lane markings represented by biased lateral position measurements. We demonstrate that, with the generalized model, the state estimator can accurately estimate the true vehicle state, providing lateral state estimates with under 0.25 m error on average across participants. However, without the generalized model, the estimator cannot accurately estimate the vehicle's lateral state.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
Design and Implementation of Energy-Efficient Wireless Tire Sensing System with Delay Analysis for Intelligent Vehicles
Authors:
Shashank Mishra,
Jia-Ming Liang
Abstract:
The growing prevalence of Internet of Things (IoT) technologies has led to a rise in the popularity of intelligent vehicles that incorporate a range of sensors to monitor various aspects, such as driving speed, fuel usage, distance proximity and tire anomalies. Nowadays, real-time tire sensing systems play important roles for intelligent vehicles in increasing mileage, reducing fuel consumption, i…
▽ More
The growing prevalence of Internet of Things (IoT) technologies has led to a rise in the popularity of intelligent vehicles that incorporate a range of sensors to monitor various aspects, such as driving speed, fuel usage, distance proximity and tire anomalies. Nowadays, real-time tire sensing systems play important roles for intelligent vehicles in increasing mileage, reducing fuel consumption, improving driving safety, and reducing the potential for traffic accidents. However, the current tire sensing system drains a significant vehicle' energy and lacks effective collection of sensing data, which may not guarantee the immediacy of driving safety. Thus, this paper designs an energy-efficient wireless tire sensing system (WTSS), which leverages energy-saving techniques to significantly reduce power consumption while ensuring data retrieval delays during real-time monitoring. Additionally, we mathematically analyze the worst-case transmission delay of the system to ensure the immediacy based on the collision probabilities of sensor transmissions. This system has been implemented and verified by the simulation and field trial experiments. These results show that the proposed scheme provides enhanced performance in energy efficiency and accurately identifies the worst transmission delay.
△ Less
Submitted 27 May, 2024; v1 submitted 9 May, 2024;
originally announced May 2024.
-
A GNN Approach for Cell-Free Massive MIMO
Authors:
Lou Salaun,
Hong Yang,
Shashwat Mishra,
Chung Shue Chen
Abstract:
Beyond 5G wireless technology Cell-Free Massive MIMO (CFmMIMO) downlink relies on carefully designed precoders and power control to attain uniformly high rate coverage. Many such power control problems can be calculated via second order cone programming (SOCP). In practice, several order of magnitude faster numerical procedure is required because power control has to be rapidly updated to adapt to…
▽ More
Beyond 5G wireless technology Cell-Free Massive MIMO (CFmMIMO) downlink relies on carefully designed precoders and power control to attain uniformly high rate coverage. Many such power control problems can be calculated via second order cone programming (SOCP). In practice, several order of magnitude faster numerical procedure is required because power control has to be rapidly updated to adapt to changing channel conditions. We propose a Graph Neural Network (GNN) based solution to replace SOCP. Specifically, we develop a GNN to obtain downlink max-min power control for a CFmMIMO with maximum ratio transmission (MRT) beamforming. We construct a graph representation of the problem that properly captures the dominant dependence relationship between access points (APs) and user equipments (UEs). We exploit a symmetry property, called permutation equivariance, to attain training simplicity and efficiency. Simulation results show the superiority of our approach in terms of computational complexity, scalability and generalizability for different system sizes and deployment scenarios.
△ Less
Submitted 8 February, 2024;
originally announced March 2024.
-
Subjective and Objective Analysis of Indian Social Media Video Quality
Authors:
Sandeep Mishra,
Mukul Jha,
Alan C. Bovik
Abstract:
We conducted a large-scale subjective study of the perceptual quality of User-Generated Mobile Video Content on a set of mobile-originated videos obtained from the Indian social media platform ShareChat. The content viewed by volunteer human subjects under controlled laboratory conditions has the benefit of culturally diversifying the existing corpus of User-Generated Content (UGC) video quality d…
▽ More
We conducted a large-scale subjective study of the perceptual quality of User-Generated Mobile Video Content on a set of mobile-originated videos obtained from the Indian social media platform ShareChat. The content viewed by volunteer human subjects under controlled laboratory conditions has the benefit of culturally diversifying the existing corpus of User-Generated Content (UGC) video quality datasets. There is a great need for large and diverse UGC-VQA datasets, given the explosive global growth of the visual internet and social media platforms. This is particularly true in regard to videos obtained by smartphones, especially in rapidly emerging economies like India. ShareChat provides a safe and cultural community oriented space for users to generate and share content in their preferred Indian languages and dialects. Our subjective quality study, which is based on this data, offers a boost of cultural, visual, and language diversification to the video quality research community. We expect that this new data resource will also allow for the development of systems that can predict the perceived visual quality of Indian social media videos, to control scaling and compression protocols for streaming, provide better user recommendations, and guide content analysis and processing. We demonstrate the value of the new data resource by conducting a study of leading blind video quality models on it, including a new model, called MoEVA, which deploys a mixture of experts to predict video quality. Both the new LIVE-ShareChat dataset and sample source code for MoEVA are being made freely available to the research community at https://github.com/sandeep-sm/LIVE-SC
△ Less
Submitted 5 January, 2024;
originally announced January 2024.
-
IndoorGNN: A Graph Neural Network based approach for Indoor Localization using WiFi RSSI
Authors:
Rahul Vishwakarma,
Rucha Bhalchandra Joshi,
Subhankar Mishra
Abstract:
Indoor localization is the process of determining the location of a person or object inside a building. Potential usage of indoor localization includes navigation, personalization, safety and security, and asset tracking. Commonly used technologies for indoor localization include WiFi, Bluetooth, RFID, and Ultra-wideband. Among these, WiFi's Received Signal Strength Indicator (RSSI)-based localiza…
▽ More
Indoor localization is the process of determining the location of a person or object inside a building. Potential usage of indoor localization includes navigation, personalization, safety and security, and asset tracking. Commonly used technologies for indoor localization include WiFi, Bluetooth, RFID, and Ultra-wideband. Among these, WiFi's Received Signal Strength Indicator (RSSI)-based localization is preferred because of widely available WiFi Access Points (APs). We have two main contributions. First, we develop our method, 'IndoorGNN' which involves using a Graph Neural Network (GNN) based algorithm in a supervised manner to classify a specific location into a particular region based on the RSSI values collected at that location. Most of the ML algorithms that perform this classification require a large number of labeled data points (RSSI vectors with location information). Collecting such data points is a labor-intensive and time-consuming task. To overcome this challenge, as our second contribution, we demonstrate the performance of IndoorGNN on the restricted dataset. It shows a comparable prediction accuracy to that of the complete dataset. We performed experiments on the UJIIndoorLoc and MNAV datasets, which are real-world standard indoor localization datasets. Our experiments show that IndoorGNN gives better location prediction accuracies when compared with state-of-the-art existing conventional as well as GNN-based methods for this same task. It continues to outperform these algorithms even with restricted datasets. It is noteworthy that its performance does not decrease a lot with a decrease in the number of available data points. Our method can be utilized for navigation and wayfinding in complex indoor environments, asset tracking and building management, enhancing mobile applications with location-based services, and improving safety and security during emergencies.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
Investigating Robustness in Cyber-Physical Systems: Specification-Centric Analysis in the face of System Deviations
Authors:
Changjian Zhang,
Parv Kapoor,
Romulo Meira-Goes,
David Garlan,
Eunsuk Kang,
Akila Ganlath,
Shatadal Mishra,
Nejib Ammar
Abstract:
The adoption of cyber-physical systems (CPS) is on the rise in complex physical environments, encompassing domains such as autonomous vehicles, the Internet of Things (IoT), and smart cities. A critical attribute of CPS is robustness, denoting its capacity to operate safely despite potential disruptions and uncertainties in the operating environment. This paper proposes a novel specification-based…
▽ More
The adoption of cyber-physical systems (CPS) is on the rise in complex physical environments, encompassing domains such as autonomous vehicles, the Internet of Things (IoT), and smart cities. A critical attribute of CPS is robustness, denoting its capacity to operate safely despite potential disruptions and uncertainties in the operating environment. This paper proposes a novel specification-based robustness, which characterizes the effectiveness of a controller in meeting a specified system requirement, articulated through Signal Temporal Logic (STL) while accounting for possible deviations in the system. This paper also proposes the robustness falsification problem based on the definition, which involves identifying minor deviations capable of violating the specified requirement. We present an innovative two-layer simulation-based analysis framework designed to identify subtle robustness violations. To assess our methodology, we devise a series of benchmark problems wherein system parameters can be adjusted to emulate various forms of uncertainties and disturbances. Initial evaluations indicate that our falsification approach proficiently identifies robustness violations, providing valuable insights for comparing robustness between conventional and reinforcement learning (RL)-based controllers
△ Less
Submitted 25 March, 2024; v1 submitted 13 November, 2023;
originally announced November 2023.
-
Autonomous Advanced Aerial Mobility -- An End-to-end Autonomy Framework for UAVs and Beyond
Authors:
Sakshi Mishra,
Praveen Palanisamy
Abstract:
Develo** aerial robots that can both safely navigate and execute assigned mission without any human intervention - i.e., fully autonomous aerial mobility of passengers and goods - is the larger vision that guides the research, design, and development efforts in the aerial autonomy space. However, it is highly challenging to concurrently operationalize all types of aerial vehicles that are operat…
▽ More
Develo** aerial robots that can both safely navigate and execute assigned mission without any human intervention - i.e., fully autonomous aerial mobility of passengers and goods - is the larger vision that guides the research, design, and development efforts in the aerial autonomy space. However, it is highly challenging to concurrently operationalize all types of aerial vehicles that are operating fully autonomously sharing the airspace. Full autonomy of the aerial transportation sector includes several aspects, such as design of the technology that powers the vehicles, operations of multi-agent fleets, and process of certification that meets stringent safety requirements of aviation sector. Thereby, Autonomous Advanced Aerial Mobility is still a vague term and its consequences for researchers and professionals are ambiguous. To address this gap, we present a comprehensive perspective on the emerging field of autonomous advanced aerial mobility, which involves the use of unmanned aerial vehicles (UAVs) and electric vertical takeoff and landing (eVTOL) aircraft for various applications, such as urban air mobility, package delivery, and surveillance. The article proposes a scalable and extensible autonomy framework consisting of four main blocks: sensing, perception, planning, and controls. Furthermore, the article discusses the challenges and opportunities in multi-agent fleet operations and management, as well as the testing, validation, and certification aspects of autonomous aerial systems. Finally, the article explores the potential of monolithic models for aerial autonomy and analyzes their advantages and limitations. The perspective aims to provide a holistic picture of the autonomous advanced aerial mobility field and its future directions.
△ Less
Submitted 2 December, 2023; v1 submitted 8 November, 2023;
originally announced November 2023.
-
Decentralization of Energy Systems with Blockchain: Bridging Top-down and Bottom-up Management of the Electricity Grid
Authors:
Sakshi Mishra,
Roohallah Khatami,
Yu Christine Chen
Abstract:
For more than a century, the grid has operated in a centralized top-down fashion. However, as distributed energy resources (DERs) penetration grows, the grid edge is increasingly infused with intelligent computing and communication capabilities. Thus, the bottom-up approach to grid operations inclined toward decentralizing energy systems will likely gain momentum alongside the existing centralized…
▽ More
For more than a century, the grid has operated in a centralized top-down fashion. However, as distributed energy resources (DERs) penetration grows, the grid edge is increasingly infused with intelligent computing and communication capabilities. Thus, the bottom-up approach to grid operations inclined toward decentralizing energy systems will likely gain momentum alongside the existing centralized paradigm. Decentralization refers to transferring control and decision-making from a centralized entity (individual, organization, or group thereof) to a distributed network. It is not a new concept - in energy systems context or otherwise. In the energy systems context, however, the complexity of this multifaceted concept increases manifolds due to two major reasons - i) the nature of the commodity being traded (the electricity) and ii) the enormity of the traditional electricity sector's structure that builds, operates, and maintains this capital-intensive network. In this work, we aim to highlight the need for and outline a credible path toward restructuring the current operational architecture of the electricity grid in view of the ongoing decentralization trends with an emphasis on peer-to-peer energy trading. We further introduce blockchain technology in the context of decentralized energy systems problems. We also suggest that blockchain is an effective technology for facilitating the synergistic operations of top-down and bottom-up approaches to grid management.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
Control-Oriented Modeling and Layer-to-Layer Spatial Control of Powder Bed Fusion Processes
Authors:
Xin Wang,
Bumsoo Park,
Robert G. Landers,
Sandipan Mishra,
Douglas A. Bristow
Abstract:
Powder Bed Fusion (PBF) is an important Additive Manufacturing (AM) process that is seeing widespread utilization. However, due to inherent process variability, it is still very costly and time consuming to certify the process and the part. This has led researchers to conduct numerous studies in process modeling, in-situ monitoring and feedback control to better understand the PBF process and decr…
▽ More
Powder Bed Fusion (PBF) is an important Additive Manufacturing (AM) process that is seeing widespread utilization. However, due to inherent process variability, it is still very costly and time consuming to certify the process and the part. This has led researchers to conduct numerous studies in process modeling, in-situ monitoring and feedback control to better understand the PBF process and decrease variations, thereby making the process more repeatable. In this study, we develop a layer-to-layer, spatial, control-oriented thermal PBF model. This model enables a framework for capturing spatially-driven thermal effects and constructing layer-to-layer spatial controllers that do not suffer from inherent temporal delays. Further, this framework is amenable to voxel-level monitoring and characterization efforts. System output controllability is analyzed and output controllability conditions are determined. A spatial Iterative Learning Controller (ILC), constructed using the spatial modeling framework, is implemented in two experiments, one where the path and part geometry are layer-invariant and another where the path and part geometry change each layer. The results illustrate the ability of the controller to thermally regulate the entire part, even at corners that tend to overheat and even as the path and part geometry change each layer.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
A Fog-based Smart Agriculture System to Detect Animal Intrusion
Authors:
**peng Miao,
Dasari Rajasekhar,
Shivakant Mishra,
Sanjeet Kumar Nayak,
Ramanarayan Yadav
Abstract:
Smart agriculture is one of the most promising areas where IoT-enabled technologies have the potential to substantially improve the quality and quantity of the crops and reduce the associated operational cost. However, building a smart agriculture system presents several challenges, including high latency and bandwidth consumption associated with cloud computing, frequent Internet disconnections i…
▽ More
Smart agriculture is one of the most promising areas where IoT-enabled technologies have the potential to substantially improve the quality and quantity of the crops and reduce the associated operational cost. However, building a smart agriculture system presents several challenges, including high latency and bandwidth consumption associated with cloud computing, frequent Internet disconnections in rural areas, and the need to keep costs low for farmers. This paper presents an end-to-end, fog-based smart agriculture infrastructure that incorporates edge computing and LoRa-based communication to address these challenges. Our system is deployed to transform traditional agriculture land of rural areas into smart agriculture. We address the top concern of farmers - animals intruding - by proposing a solution that detects animal intrusion using low-cost PIR sensors, cameras, and computer vision. In particular, we propose three different sensor layouts and a novel algorithm for predicting animals' future locations. Our system can detect animals before they intrude into the field, identify them, predict their future locations, and alert farmers in a timely manner. Our experiments show that the system can effectively and quickly detect animal intrusions while maintaining a much lower cost than current state-of-the-art systems.
△ Less
Submitted 12 August, 2023;
originally announced August 2023.
-
Representation Equivalent Neural Operators: a Framework for Alias-free Operator Learning
Authors:
Francesca Bartolucci,
Emmanuel de Bézenac,
Bogdan Raonić,
Roberto Molinaro,
Siddhartha Mishra,
Rima Alaifari
Abstract:
Recently, operator learning, or learning map**s between infinite-dimensional function spaces, has garnered significant attention, notably in relation to learning partial differential equations from data. Conceptually clear when outlined on paper, neural operators necessitate discretization in the transition to computer implementations. This step can compromise their integrity, often causing them…
▽ More
Recently, operator learning, or learning map**s between infinite-dimensional function spaces, has garnered significant attention, notably in relation to learning partial differential equations from data. Conceptually clear when outlined on paper, neural operators necessitate discretization in the transition to computer implementations. This step can compromise their integrity, often causing them to deviate from the underlying operators. This research offers a fresh take on neural operators with a framework Representation equivalent Neural Operators (ReNO) designed to address these issues. At its core is the concept of operator aliasing, which measures inconsistency between neural operators and their discrete representations. We explore this for widely-used operator learning techniques. Our findings detail how aliasing introduces errors when handling different discretizations and grids and loss of crucial continuous structures. More generally, this framework not only sheds light on existing challenges but, given its constructive and broad nature, also potentially offers tools for develo** new neural operators.
△ Less
Submitted 2 November, 2023; v1 submitted 31 May, 2023;
originally announced May 2023.
-
3D GANs and Latent Space: A comprehensive survey
Authors:
Satya Pratheek Tata,
Subhankar Mishra
Abstract:
Generative Adversarial Networks (GANs) have emerged as a significant player in generative modeling by map** lower-dimensional random noise to higher-dimensional spaces. These networks have been used to generate high-resolution images and 3D objects. The efficient modeling of 3D objects and human faces is crucial in the development process of 3D graphical environments such as games or simulations…
▽ More
Generative Adversarial Networks (GANs) have emerged as a significant player in generative modeling by map** lower-dimensional random noise to higher-dimensional spaces. These networks have been used to generate high-resolution images and 3D objects. The efficient modeling of 3D objects and human faces is crucial in the development process of 3D graphical environments such as games or simulations. 3D GANs are a new type of generative model used for 3D reconstruction, point cloud reconstruction, and 3D semantic scene completion. The choice of distribution for noise is critical as it represents the latent space. Understanding a GAN's latent space is essential for fine-tuning the generated samples, as demonstrated by the morphing of semantically meaningful parts of images. In this work, we explore the latent space and 3D GANs, examine several GAN variants and training methods to gain insights into improving 3D GAN training, and suggest potential future directions for further research.
△ Less
Submitted 8 April, 2023;
originally announced April 2023.
-
DeeBBAA: A benchmark Deep Black Box Adversarial Attack against Cyber-Physical Power Systems
Authors:
Arnab Bhattacharjee,
Tapan K. Saha,
Ashu Verma,
Sukumar Mishra
Abstract:
An increased energy demand, and environmental pressure to accommodate higher levels of renewable energy and flexible loads like electric vehicles have led to numerous smart transformations in the modern power systems. These transformations make the cyber-physical power system highly susceptible to cyber-adversaries targeting its numerous operations. In this work, a novel black box adversarial atta…
▽ More
An increased energy demand, and environmental pressure to accommodate higher levels of renewable energy and flexible loads like electric vehicles have led to numerous smart transformations in the modern power systems. These transformations make the cyber-physical power system highly susceptible to cyber-adversaries targeting its numerous operations. In this work, a novel black box adversarial attack strategy is proposed targeting the AC state estimation operation of an unknown power system using historical data. Specifically, false data is injected into the measurements obtained from a small subset of the power system components which leads to significant deviations in the state estimates. Experiments carried out on the IEEE 39 bus and 118 bus test systems make it evident that the proposed strategy, called DeeBBAA, can evade numerous conventional and state-of-the-art attack detection mechanisms with very high probability.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
R2 Loss: Range Restriction Loss for Model Compression and Quantization
Authors:
Arnav Kundu,
Chungkuk Yoo,
Srijan Mishra,
Minsik Cho,
Saurabh Adya
Abstract:
Model quantization and compression is widely used techniques to reduce usage of computing resource at inference time. While state-of-the-art works have been achieved reasonable accuracy with higher bit such as 4bit or 8bit, but still it is challenging to quantize/compress a model further, e.g., 1bit or 2bit. To overcome the challenge, we focus on outliers in weights of a pre-trained model which di…
▽ More
Model quantization and compression is widely used techniques to reduce usage of computing resource at inference time. While state-of-the-art works have been achieved reasonable accuracy with higher bit such as 4bit or 8bit, but still it is challenging to quantize/compress a model further, e.g., 1bit or 2bit. To overcome the challenge, we focus on outliers in weights of a pre-trained model which disrupt effective lower bit quantization and compression. In this work, we propose Range Restriction Loss (R2-Loss) for building lower bit quantization and compression friendly models by removing outliers from weights during pre-training. By effectively restricting range of weights, we mold the overall distribution into a tight shape to ensure high quantization bit resolution, therefore allowing model compression and quantization techniques can to utilize their limited numeric representation powers better. We introduce three different, L-inf R2-Loss, its extension Margin R2-Loss and a new Soft-Min-MaxR2-Loss to be used as an auxiliary loss during full-precision model training. These R2-Loss can be used in different cases such as L-inf and Margin R2-Loss would be effective for symmetric quantization, while Soft-Min-Max R2-Loss shows better performance for model compression. In our experiment, R2-Loss improves lower bit quantization accuracy with state-of-the-art post-training quantization (PTQ), quantization-aware training (QAT), and model compression techniques. With R2-Loss, MobileNet-V2 2bit weight and 8bit activation PTQ, MobileNet-V1 2bit weight and activation QAT, ResNet18 1bit weight compression are improved to 59.49% from 50.66%, 59.05% from 55.96%, and 52.58% from 45.54%, respectively.
△ Less
Submitted 11 February, 2024; v1 submitted 14 March, 2023;
originally announced March 2023.
-
Road Redesign Technique Achieving Enhanced Road Safety by Inpainting with a Diffusion Model
Authors:
Sumit Mishra,
Medhavi Mishra,
Taeyoung Kim,
Dongsoo Har
Abstract:
Road infrastructure can affect the occurrence of road accidents. Therefore, identifying roadway features with high accident probability is crucial. Here, we introduce image inpainting that can assist authorities in achieving safe roadway design with minimal intervention in the current roadway structure. Image inpainting is based on inpainting safe roadway elements in a roadway image, replacing acc…
▽ More
Road infrastructure can affect the occurrence of road accidents. Therefore, identifying roadway features with high accident probability is crucial. Here, we introduce image inpainting that can assist authorities in achieving safe roadway design with minimal intervention in the current roadway structure. Image inpainting is based on inpainting safe roadway elements in a roadway image, replacing accident-prone (AP) features by using a diffusion model. After object-level segmentation, the AP features identified by the properties of accident hotspots are masked by a human operator and safe roadway elements are inpainted. With only an average time of 2 min for image inpainting, the likelihood of an image being classified as an accident hotspot drops by an average of 11.85%. In addition, safe urban spaces can be designed considering human factors of commuters such as gaze saliency. Considering this, we introduce saliency enhancement that suggests chrominance alteration for a safe road view.
△ Less
Submitted 14 February, 2023;
originally announced February 2023.
-
Emotion Recognition With Temporarily Localized 'Emotional Events' in Naturalistic Context
Authors:
Mohammad Asif,
Sudhakar Mishra,
Majithia Tejas Vinodbhai,
Uma Shanker Tiwary
Abstract:
Emotion recognition using EEG signals is an emerging area of research due to its broad applicability in BCI. Emotional feelings are hard to stimulate in the lab. Emotions do not last long, yet they need enough context to be perceived and felt. However, most EEG-related emotion databases either suffer from emotionally irrelevant details (due to prolonged duration stimulus) or have minimal context d…
▽ More
Emotion recognition using EEG signals is an emerging area of research due to its broad applicability in BCI. Emotional feelings are hard to stimulate in the lab. Emotions do not last long, yet they need enough context to be perceived and felt. However, most EEG-related emotion databases either suffer from emotionally irrelevant details (due to prolonged duration stimulus) or have minimal context doubting the feeling of any emotion using the stimulus. We tried to reduce the impact of this trade-off by designing an experiment in which participants are free to report their emotional feelings simultaneously watching the emotional stimulus. We called these reported emotional feelings "Emotional Events" in our Dataset on Emotion with Naturalistic Stimuli (DENS). We used EEG signals to classify emotional events on different combinations of Valence(V) and Arousal(A) dimensions and compared the results with benchmark datasets of DEAP and SEED. STFT is used for feature extraction and used in the classification model consisting of CNN-LSTM hybrid layers. We achieved significantly higher accuracy with our data compared to DEEP and SEED data. We conclude that having precise information about emotional feelings improves the classification accuracy compared to long-duration EEG signals which might be contaminated by mind-wandering.
△ Less
Submitted 25 October, 2022;
originally announced November 2022.
-
MIMA -- Multifunctional IoT Integrated Menstrual Aid
Authors:
Jyothish Kumar J,
Subhankar Mishra,
Amish Bibhu,
Shreya Shivangi,
Sulagna Saha
Abstract:
Menstruation is the monthly shedding of the endometrium lining of a woman's uterus. The average age when girls start menstruating is around the age of 12 years (menarche), and the cycle continues until they attain menopause (about the age of 51). Medical research and analysis in this field reveal that most women have to go through a painful cycle of abdominal cramps along with sanitary pad rashes,…
▽ More
Menstruation is the monthly shedding of the endometrium lining of a woman's uterus. The average age when girls start menstruating is around the age of 12 years (menarche), and the cycle continues until they attain menopause (about the age of 51). Medical research and analysis in this field reveal that most women have to go through a painful cycle of abdominal cramps along with sanitary pad rashes, while painkillers or endurance ability are their go-to solution. Heat pads or hot water bags also help in pain reduction. Currently, the concept of period pants revolves around pad-free and hassle-free periods for women, whereas most women still prefer sanitary pads during their period cycle. MIMA aims at the development of IoT integrated smart, functional intimate wear for women that would help women comfort during menstruation by catering to issues of menstrual cramps, rashes, leakage and stains, malodor, etc. The proposed methodology has been implemented by referring to the online survey conducted from Indian women (17-58 years old). MIMA can provide comfort during the menstruation cycle with IoT integrated Heat-Pad and functional alterations in the garment for a rash-free, anti-odor, and leak-proof period.
△ Less
Submitted 26 October, 2022;
originally announced October 2022.
-
An Affective Video Database using Multimedia Content Analysis rated on Indian samples
Authors:
Sudhakar Mishra,
Narayanan Srinivasan,
Uma Shanker Tiwary
Abstract:
Availability of naturalistic affective stimuli is needed for creating the affective technological solution as well as making progress in affective science. Although a lot of progress in the collection of affective multimedia stimuli has been made in western countries, the technology and findings based on such monocultural datasets may not be scalable to other cultures. Moreover, the available data…
▽ More
Availability of naturalistic affective stimuli is needed for creating the affective technological solution as well as making progress in affective science. Although a lot of progress in the collection of affective multimedia stimuli has been made in western countries, the technology and findings based on such monocultural datasets may not be scalable to other cultures. Moreover, the available dataset on affective multimedia content has some experimenter bias in the initial manual selection of affective multimedia content. Hence, in this work, we mainly tried to address two problems. The first problem relates to the experimenter's subjective bias, and the second relates to the non-availability of affective multimedia dataset validated on Indian population. We tried to address both problems by reducing the experimenter's bias as much as possible. We adopted the data science and multimedia content analysis techniques to perform our initial collection and a further selection of stimuli. Our method resulted in a dataset with a wide variety in content, stimuli from Western and Indian cinema, and symmetric presence of stimuli along valence, arousal and dominance dimensions. We conclude that using our method, more cross-cultural affective stimuli datasets can be created, which is essential to make progress in affective technology and science.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
Face editing with GAN -- A Review
Authors:
Parthak Mehta,
Sarthak Mishra,
Nikhil Chouhan,
Neel Pethani,
Ishani Saha
Abstract:
In recent years, Generative Adversarial Networks (GANs) have become a hot topic among researchers and engineers that work with deep learning. It has been a ground-breaking technique which can generate new pieces of content of data in a consistent way. The topic of GANs has exploded in popularity due to its applicability in fields like image generation and synthesis, and music production and compos…
▽ More
In recent years, Generative Adversarial Networks (GANs) have become a hot topic among researchers and engineers that work with deep learning. It has been a ground-breaking technique which can generate new pieces of content of data in a consistent way. The topic of GANs has exploded in popularity due to its applicability in fields like image generation and synthesis, and music production and composition. GANs have two competing neural networks: a generator and a discriminator. The generator is used to produce new samples or pieces of content, while the discriminator is used to recognize whether the piece of content is real or generated. What makes it different from other generative models is its ability to learn unlabeled samples. In this review paper, we will discuss the evolution of GANs, several improvements proposed by the authors and a brief comparison between the different models. Index Terms generative adversarial networks, unsupervised learning, deep learning.
△ Less
Submitted 12 July, 2022;
originally announced July 2022.
-
A Learn-and-Control Strategy for Jet-Based Additive Manufacturing
Authors:
Uduak Inyang-Udoh,
Alvin Chen,
Sandipan Mishra
Abstract:
In this paper, we develop a predictive geometry control framework for jet-based additive manufacturing (AM) based on a physics-guided recurrent neural network (RNN) model. Because of its physically interpretable architecture, the model's parameters are obtained by training the network through back propagation using input-output data from a small number of layers. Moreover, we demonstrate that the…
▽ More
In this paper, we develop a predictive geometry control framework for jet-based additive manufacturing (AM) based on a physics-guided recurrent neural network (RNN) model. Because of its physically interpretable architecture, the model's parameters are obtained by training the network through back propagation using input-output data from a small number of layers. Moreover, we demonstrate that the model can be dually expressed such that the layer droplet input pattern for (each layer of) the part to be fabricated now becomes the network parameter to be learned by back-propagation. This approach is applied for feedforward predictive control in which the network parameters are learned offline from previous data and the control input pattern for all layers to be printed is synthesized. Sufficient conditions for the predictive controller's stability are then shown. Furthermore, we design an algorithm for efficiently implementing feedback predictive control in which the network parameters and input patterns (for the receding horizon) are learned online with no added lead time for computation. The feedforward control scheme is shown experimentally to improve the RMS reference tracking error by more than 30% over the state of the art. We also experimentally demonstrate that process uncertainties are compensated by the online learning and feedback control.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Usable Region Estimate for Assessing Practical Usability of Medical Image Segmentation Models
Authors:
Yizhe Zhang,
Suraj Mishra,
Peixian Liang,
Hao Zheng,
Danny Z. Chen
Abstract:
We aim to quantitatively measure the practical usability of medical image segmentation models: to what extent, how often, and on which samples a model's predictions can be used/trusted. We first propose a measure, Correctness-Confidence Rank Correlation (CCRC), to capture how predictions' confidence estimates correlate with their correctness scores in rank. A model with a high value of CCRC means…
▽ More
We aim to quantitatively measure the practical usability of medical image segmentation models: to what extent, how often, and on which samples a model's predictions can be used/trusted. We first propose a measure, Correctness-Confidence Rank Correlation (CCRC), to capture how predictions' confidence estimates correlate with their correctness scores in rank. A model with a high value of CCRC means its prediction confidences reliably suggest which samples' predictions are more likely to be correct. Since CCRC does not capture the actual prediction correctness, it alone is insufficient to indicate whether a prediction model is both accurate and reliable to use in practice. Therefore, we further propose another method, Usable Region Estimate (URE), which simultaneously quantifies predictions' correctness and reliability of confidence assessments in one estimate. URE provides concrete information on to what extent a model's predictions are usable. In addition, the sizes of usable regions (UR) can be utilized to compare models: A model with a larger UR can be taken as a more usable and hence better model. Experiments on six datasets validate that the proposed evaluation methods perform well, providing a concrete and concise measure for the practical usability of medical image segmentation models. Code is made available at https://github.com/yizhezhang2000/ure.
△ Less
Submitted 30 June, 2022;
originally announced July 2022.
-
Forecasting Solar Power Generation on the basis of Predictive and Corrective Maintenance Activities
Authors:
Soham Vyas,
Yuvraj Goyal,
Neel Bhatt,
Sanskar Bhuwania,
Hardik Patel,
Shakti Mishra,
Brijesh Tripathi
Abstract:
Solar energy forecasting has seen tremendous growth in the last decade using historical time series collected from a weather station, such as weather variables wind speed and direction, solar radiance, and temperature. It helps in the overall management of solar power plants. However, the solar power plant regularly requires preventive and corrective maintenance activities that further impact ener…
▽ More
Solar energy forecasting has seen tremendous growth in the last decade using historical time series collected from a weather station, such as weather variables wind speed and direction, solar radiance, and temperature. It helps in the overall management of solar power plants. However, the solar power plant regularly requires preventive and corrective maintenance activities that further impact energy production. This paper presents a novel work for forecasting solar power energy production based on maintenance activities, problems observed at a power plant, and weather data. The results accomplished on the datasets obtained from the 1MW solar power plant of PDEU (our university) that has generated data set with 13 columns as daily entries from 2012 to 2020. There are 12 structured columns and one unstructured column with manual text entries about different maintenance activities, problems observed, and weather conditions daily. The unstructured column is used to create a new feature column vector using Hash Map, flag words, and stop words. The final dataset comprises five important feature vector columns based on correlation and causality analysis.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
Adaptive Traffic Signal Control for Develo** Countries Using Fused Parameters Derived from Crowd-Source Data
Authors:
Sumit Mishra,
Vishal Singh,
Ankit Gupta,
Devanjan Bhattacharya,
Abhisek Mudgal
Abstract:
Advancement of mobile technologies has enabled economical collection, storage, processing, and sharing of traffic data. These data are made accessible to intended users through various application program interfaces (API) and can be used to recognize and mitigate congestion in real time. In this paper, quantitative (time of arrival) and qualitative (color-coded congestion levels) data were acquire…
▽ More
Advancement of mobile technologies has enabled economical collection, storage, processing, and sharing of traffic data. These data are made accessible to intended users through various application program interfaces (API) and can be used to recognize and mitigate congestion in real time. In this paper, quantitative (time of arrival) and qualitative (color-coded congestion levels) data were acquired from the Google traffic APIs. New parameters that reflect heterogeneous traffic conditions were defined and utilized for real-time control of traffic signals while maintaining the green-to-red time ratio. The proposed method utilizes a congestion-avoiding principle commonly used in computer networking. Adaptive congestion levels were observed on three different intersections of Delhi (India), in peak hours. It showed good variation, hence sensitive for the control algorithm to act efficiently. Also, simulation study establishes that proposed control algorithm decreases waiting time and congestion. The proposed method provides an inexpensive alternative for traffic sensing and tracking technologies.
△ Less
Submitted 11 March, 2022;
originally announced May 2022.
-
A Soft-Bodied Aerial Robot for Collision Resilience and Contact-Reactive Perching
Authors:
Pham H. Nguyen,
Karishma Patnaik,
Shatadal Mishra,
Panagiotis Polygerinos,
Wenlong Zhang
Abstract:
Current aerial robots demonstrate limited interaction capabilities in unstructured environments when compared with their biological counterparts. Some examples include their inability to tolerate collisions and to successfully land or perch on objects of unknown shapes, sizes, and texture. Efforts to include compliance have introduced designs that incorporate external mechanical impact protection…
▽ More
Current aerial robots demonstrate limited interaction capabilities in unstructured environments when compared with their biological counterparts. Some examples include their inability to tolerate collisions and to successfully land or perch on objects of unknown shapes, sizes, and texture. Efforts to include compliance have introduced designs that incorporate external mechanical impact protection at the cost of reduced agility and flight time due to the added weight. In this work, we propose and develop a light-weight, inflatable, soft-bodied aerial robot (SoBAR) that can pneumatically vary its body stiffness to achieve intrinsic collision resilience. Unlike the conventional rigid aerial robots, SoBAR successfully demonstrates its ability to repeatedly endure and recover from collisions in various directions, not only limited to in-plane ones. Furthermore, we exploit its capabilities to demonstrate perching where the 3D collision resilience helps in improving the perching success rates. We also augment SoBAR with a novel hybrid fabric-based, bistable (HFB) grasper that can utilize impact energies to perform contact-reactive gras** through rapid shape conforming abilities. We exhaustively study and offer insights into the collision resilience, impact absorption, and manipulation capabilities of SoBAR with the HFB grasper. Finally, we compare the performance of conventional aerial robots with the SoBAR through collision characterizations, gras** identifications, and experimental validations of collision resilience and perching in various scenarios and on differently shaped objects.
△ Less
Submitted 4 January, 2023; v1 submitted 27 April, 2022;
originally announced April 2022.
-
Seeker: Synergizing Mobile and Energy Harvesting Wearable Sensors for Human Activity Recognition
Authors:
Cyan Subhra Mishra,
Jack Sampson,
Mahmut Taylan Kandemir,
Vijaykrishnan Narayanan
Abstract:
There is an increasing demand for intelligent processing on emerging ultra-low-power internet of things (IoT) devices, and recent works have shown substantial efficiency boosts by executing inference tasks directly on the IoT device (node) rather than merely transmitting sensor data. However, the computation and power demands of Deep Neural Network (DNN)-based inference pose significant challenges…
▽ More
There is an increasing demand for intelligent processing on emerging ultra-low-power internet of things (IoT) devices, and recent works have shown substantial efficiency boosts by executing inference tasks directly on the IoT device (node) rather than merely transmitting sensor data. However, the computation and power demands of Deep Neural Network (DNN)-based inference pose significant challenges for nodes in an energy-harvesting wireless sensor network (EH-WSN). Moreover, these tasks often require responses from multiple physically distributed EH sensor nodes, which imposes crucial system optimization challenges in addition to per-node constraints.
To address these challenges, we propose \emph{Seeker}, a novel approach to efficiently execute DNN inferences for Human Activity Recognition (HAR) tasks, using both an EH-WSN and a host mobile device. Seeker minimizes communication overheads and maximizes computation at each sensor without violating the quality of service. \emph{Seeker} uses a \emph{store-and-execute} approach to complete a subset of inferences on the EH sensor node, reducing communication with the mobile host. Further, for those inferences unfinished because of harvested energy constraints, it leverages an \emph{activity aware coreset} (AAC) construction to efficiently communicate compact features to the host device where ensemble techniques are used to efficiently finish the inferences. \emph{Seeker} performs HAR with $86.8\%$ accuracy, surpassing the $81.2\%$ accuracy of a state of the art approach. Moreover, by using AAC, it lowers the communication data volume by $8.9\times$.
△ Less
Submitted 25 March, 2022;
originally announced April 2022.
-
Probabilistic Consensus on Feature Distribution for Multi-robot Systems with Markovian Exploration Dynamics
Authors:
Aniket Shirsat,
Shatadal Mishra,
Wenlong Zhang,
Spring Berman
Abstract:
In this paper, we present a consensus-based decentralized multi-robot approach to reconstruct a discrete distribution of features, modeled as an occupancy grid map, that represent information contained in a bounded planar 2D environment, such as visual cues used for navigation or semantic labels associated with object detection. The robots explore the environment according to a random walk modeled…
▽ More
In this paper, we present a consensus-based decentralized multi-robot approach to reconstruct a discrete distribution of features, modeled as an occupancy grid map, that represent information contained in a bounded planar 2D environment, such as visual cues used for navigation or semantic labels associated with object detection. The robots explore the environment according to a random walk modeled by a discrete-time discrete-state (DTDS) Markov chain and estimate the feature distribution from their own measurements and the estimates communicated by neighboring robots, using a distributed Chernoff fusion protocol. We prove that under this decentralized fusion protocol, each robot's feature distribution converges to the ground truth distribution in an almost sure sense. We verify this result in numerical simulations that show that the Hellinger distance between the estimated and ground truth feature distributions converges to zero over time for each robot. We also validate our strategy through Software-In-The-Loop (SITL) simulations of quadrotors that search a bounded square grid for a set of visual features distributed on a discretized circle.
△ Less
Submitted 26 April, 2022; v1 submitted 7 February, 2022;
originally announced February 2022.
-
An empirical model for feedforward control of laser powder bed fusion
Authors:
Aleksandr Shkoruta,
Bumsoo Park,
Sandipan Mishra
Abstract:
While considerable progress has recently been made in real-time melt pool monitoring for laser powder bed fusion (LPBF), results in in-situ melt pool control are relatively sparse, a major reason being lack of suitable control-oriented models. This study demonstrates an empirical control-oriented model of geometry-dependent melt pool behavior, and subsequent melt pool regulation with a model-based…
▽ More
While considerable progress has recently been made in real-time melt pool monitoring for laser powder bed fusion (LPBF), results in in-situ melt pool control are relatively sparse, a major reason being lack of suitable control-oriented models. This study demonstrates an empirical control-oriented model of geometry-dependent melt pool behavior, and subsequent melt pool regulation with a model-based feedforward controller for laser power. First, it shows that the melt pool "footprint" exponentially increases when the scan lines become shorter. The empirical model of this behavior is developed and validated on different geometries at different laser power levels. Second, the developed model is used to design a feedforward controller for obtaining optimal laser power profiles. This controller is then validated experimentally and is demonstrated to suppress the in-layer geometry-related melt pool signal deviations, for different part geometries.
△ Less
Submitted 24 January, 2022;
originally announced January 2022.
-
Towards Harmonious Decentralization of Energy Systems: A Vision of Interoperable Peer-to-Peer Energy Markets
Authors:
Sakshi Mishra,
Roohallah Khatami,
Yu Christine Chen
Abstract:
We present a hierarchical framework aimed at decentralizing the distribution systems market operations using localized peer-to-peer energy markets. Hierarchically designed decision-making algorithm approaches the power systems market operations from a bottom-up perspective. The three layers of the hierarchical framework operate in orchestration to enable prosumers (the grass-root actors) to maximi…
▽ More
We present a hierarchical framework aimed at decentralizing the distribution systems market operations using localized peer-to-peer energy markets. Hierarchically designed decision-making algorithm approaches the power systems market operations from a bottom-up perspective. The three layers of the hierarchical framework operate in orchestration to enable prosumers (the grass-root actors) to maximize their revenues - hence, a prosumer-centric framework. The design of the framework incorporates existing smart grid technologies (Virtual Power Plants, Microgrids, Distributed Energy Resources) and redefine their functional objectives to align them with the decentralization paradigm focused on empowering bottom-up grid operations approach. On one hand, the framework is enabling prosumers with simultaneous access to the buy-sell choices that help them maximize their cost savings while ensuring their consumption patterns and preferences are not being tradeoff as a result of top-down operational decisions. On the other hand, it is designed to operate in harmony with the existing top-down grid operations mechanisms - thereby reducing the potential friction in its adaptation. This marriage of the top-down and bottom-up operational approaches is facilitated through meticulous orchestration of operational timescales. Framework's novel design also incorporates scalability and interoperability considerations, thereby tackling the challenge of decentralization holistically.
△ Less
Submitted 17 November, 2023; v1 submitted 17 December, 2021;
originally announced December 2021.
-
Intelligent Acoustic Module for Autonomous Vehicles using Fast Gated Recurrent approach
Authors:
Raghav Rawat,
Shreyash Gupta,
Shreyas Mohapatra,
Sujata Priyambada Mishra,
Sreesankar Rajagopal
Abstract:
This paper elucidates a model for acoustic single and multi-tone classification in resource constrained edge devices. The proposed model is of State-of-the-art Fast Accurate Stable Tiny Gated Recurrent Neural Network. This model has resulted in improved performance metrics and lower size compared to previous hypothesized methods by using lesser parameters with higher efficiency and employment of a…
▽ More
This paper elucidates a model for acoustic single and multi-tone classification in resource constrained edge devices. The proposed model is of State-of-the-art Fast Accurate Stable Tiny Gated Recurrent Neural Network. This model has resulted in improved performance metrics and lower size compared to previous hypothesized methods by using lesser parameters with higher efficiency and employment of a noise reduction algorithm. The model is implemented as an acoustic AI module, focused for the application of sound identification, localization, and deployment on AI systems like that of an autonomous car. Further, the inclusion of localization techniques carries the potential of adding a new dimension to the multi-tone classifiers present in autonomous vehicles, as its demand increases in urban cities and develo** countries in the future.
△ Less
Submitted 6 December, 2021;
originally announced December 2021.
-
Resilient expansion planning of virtual energy plant with an integrated energy system -- reliability criteria of lines and towers
Authors:
Sambeet Mishra,
Henri Manninen,
Qiuwei Wu,
Chiara Bordin
Abstract:
Virtual power plants, while being virtual, rely on a physical network for operations. The portfolio of the virtual power plants is flexible in facilitating a wide range of resources including the local heat pumps. The power transmission network has the responsibility to ensure the security of supply, reliability of operation, planning, and expansion. The power transmission network and apparatus in…
▽ More
Virtual power plants, while being virtual, rely on a physical network for operations. The portfolio of the virtual power plants is flexible in facilitating a wide range of resources including the local heat pumps. The power transmission network has the responsibility to ensure the security of supply, reliability of operation, planning, and expansion. The power transmission network and apparatus including lines and towers are also aging with time. Furthermore, the transmission network covers a large geographical area which is expensive to maintain. The objective of this paper is to investigate the effect of power network conditions on power network expansion planning. The condition of the power network is determined by the maintenance cost of lines and a health index and a risk factor associated with the tower. The investigation begins with answering how the inclusion of heat pump impacts the decisions on network interventions. Thereafter, the condition network is factored into the decision-making by better understanding the impact of the network condition on the overall expansion planning. Furthermore, many sensitivity analyses are conducted to evaluate the trade-offs between decision variables such as cost of heat pump, coefficient of performance of heat pump, risk factors, and line and tower costs.
△ Less
Submitted 9 November, 2021;
originally announced November 2021.
-
Comparison of SVD and factorized TDNN approaches for speech to text
Authors:
Jeffrey Josanne Michael,
Nagendra Kumar Goel,
Navneeth K,
Jonas Robertson,
Shravan Mishra
Abstract:
This work concentrates on reducing the RTF and word error rate of a hybrid HMM-DNN. Our baseline system uses an architecture with TDNN and LSTM layers. We find this architecture particularly useful for lightly reverberated environments. However, these models tend to demand more computation than is desirable. In this work, we explore alternate architectures employing singular value decomposition (S…
▽ More
This work concentrates on reducing the RTF and word error rate of a hybrid HMM-DNN. Our baseline system uses an architecture with TDNN and LSTM layers. We find this architecture particularly useful for lightly reverberated environments. However, these models tend to demand more computation than is desirable. In this work, we explore alternate architectures employing singular value decomposition (SVD) is applied to the TDNN layers to reduce the RTF, as well as to the affine transforms of every LSTM cell. We compare this approach with specifying bottleneck layers similar to those introduced by SVD before training. Additionally, we reduced the search space of the decoding graph to make it a better fit to operate in real-time applications. We report -61.57% relative reduction in RTF and almost 1% relative decrease in WER for our architecture trained on Fisher data along with reverberated versions of this dataset in order to match one of our target test distributions.
△ Less
Submitted 13 October, 2021;
originally announced October 2021.
-
Development of User-friendly Smart Grid Architecture
Authors:
Swaroop Mishra
Abstract:
As systems like smart grid continue to become complex on a daily basis, emerging issues demand complex solutions that can deal with parameters in multiple domains of engineering. The complex solutions further demand a friendly interface for the users to express their requirements. Cyber-Physical systems deals with the study of techniques that are committed to modeling, simulating and solving the p…
▽ More
As systems like smart grid continue to become complex on a daily basis, emerging issues demand complex solutions that can deal with parameters in multiple domains of engineering. The complex solutions further demand a friendly interface for the users to express their requirements. Cyber-Physical systems deals with the study of techniques that are committed to modeling, simulating and solving the problems that emerge from a multi-disciplinary outlook towards futuristic systems. This thesis is mainly concerned with the development of user-friendly cyber-physical frameworks that can tackle various issues faced by the utilities and users of smart grid through a suitable choice of smart microgrid architecture.
△ Less
Submitted 31 August, 2021;
originally announced August 2021.
-
Image Complexity Guided Network Compression for Biomedical Image Segmentation
Authors:
Suraj Mishra,
Danny Z. Chen,
X. Sharon Hu
Abstract:
Compression is a standard procedure for making convolutional neural networks (CNNs) adhere to some specific computing resource constraints. However, searching for a compressed architecture typically involves a series of time-consuming training/validation experiments to determine a good compromise between network size and performance accuracy. To address this, we propose an image complexity-guided…
▽ More
Compression is a standard procedure for making convolutional neural networks (CNNs) adhere to some specific computing resource constraints. However, searching for a compressed architecture typically involves a series of time-consuming training/validation experiments to determine a good compromise between network size and performance accuracy. To address this, we propose an image complexity-guided network compression technique for biomedical image segmentation. Given any resource constraints, our framework utilizes data complexity and network architecture to quickly estimate a compressed model which does not require network training. Specifically, we map the dataset complexity to the target network accuracy degradation caused by compression. Such map** enables us to predict the final accuracy for different network sizes, based on the computed dataset complexity. Thus, one may choose a solution that meets both the network size and segmentation accuracy requirements. Finally, the map** is used to determine the convolutional layer-wise multiplicative factor for generating a compressed network. We conduct experiments using 5 datasets, employing 3 commonly-used CNN architectures for biomedical image segmentation as representative networks. Our proposed framework is shown to be effective for generating compressed segmentation networks, retaining up to $\approx 95\%$ of the full-sized network segmentation accuracy, and at the same time, utilizing $\approx 32x$ fewer network trainable weights (average reduction) of the full-sized networks.
△ Less
Submitted 6 July, 2021;
originally announced July 2021.
-
Microgrid Resilience: A Holistic and Context-Aware Resilience Metric
Authors:
Sakshi Mishra,
Ted Kwasnik,
Kate Anderson
Abstract:
Microgrids present an effective solution for the coordinated deployment of various distributed energy resources and furthermore provide myriad additional benefits such as resilience, decreased carbon footprint, and reliability to energy consumers and the energy system as a whole. Boosting the resilience of distribution systems is another major benefit of microgrids. This is because they can also s…
▽ More
Microgrids present an effective solution for the coordinated deployment of various distributed energy resources and furthermore provide myriad additional benefits such as resilience, decreased carbon footprint, and reliability to energy consumers and the energy system as a whole. Boosting the resilience of distribution systems is another major benefit of microgrids. This is because they can also serve as a backup power source when the utility grid operations are interrupted due to either high-probability low-impact events like a component failure or low-probability high-impact events - be it a natural disaster or a planned cyberattack. However, the degree to which any particular system can defend, adapt, and restore normal operation depends on various factors including the type and severity of events to which a microgrid is subjected. These factors, in turn, are dependent on the geographical location of the deployed microgrid as well as the cyber risk profile of the site where the microgrid is operating. Therefore, in this work, we attempt to capture this multi-dimensional interplay of various factors in quantifying the ability of the microgrid to be resilient in these varying aspects. This paper, thus, proposes a customized site-specific quantification of the resilience strength for the individual microgrid capability to absorb, restore, and adapt to the changing circumstances for sustaining the critical load when a low-probability high-impact event occurs - termed as - context-aware resilience metric. We also present a case study to illustrate the key elements of our integrated analytical approach.
△ Less
Submitted 31 July, 2021; v1 submitted 17 June, 2021;
originally announced June 2021.
-
Modelling resource allocation in uncertain system environment through deep reinforcement learning
Authors:
Neel Gandhi,
Shakti Mishra
Abstract:
Reinforcement Learning has applications in field of mechatronics, robotics, and other resource-constrained control system. Problem of resource allocation is primarily solved using traditional predefined techniques and modern deep learning methods. The drawback of predefined and most deep learning methods for resource allocation is failing to meet the requirements in cases of uncertain system envir…
▽ More
Reinforcement Learning has applications in field of mechatronics, robotics, and other resource-constrained control system. Problem of resource allocation is primarily solved using traditional predefined techniques and modern deep learning methods. The drawback of predefined and most deep learning methods for resource allocation is failing to meet the requirements in cases of uncertain system environment. We can approach problem of resource allocation in uncertain system environment alongside following certain criteria using deep reinforcement learning. Also, reinforcement learning has ability for adapting to new uncertain environment for prolonged period of time. The paper provides a detailed comparative analysis on various deep reinforcement learning methods by applying different components to modify architecture of reinforcement learning with use of noisy layers, prioritized replay, bagging, duelling networks, and other related combination to obtain improvement in terms of performance and reduction of computational cost. The paper identifies problem of resource allocation in uncertain environment could be effectively solved using Noisy Bagging duelling double deep Q network achieving efficiency of 97.7% by maximizing reward with significant exploration in given simulated environment for resource allocation.
△ Less
Submitted 17 June, 2021;
originally announced June 2021.
-
Collision Recovery Control of a Foldable Quadrotor
Authors:
Karishma Patnaik,
Shatadal Mishra,
Zachary Chase,
Wenlong Zhang
Abstract:
Autonomous missions of small unmanned aerial vehicles (UAVs) are prone to collisions owing to environmental disturbances and localization errors. Consequently, a UAV that can endure collisions and perform recovery control in critical aerial missions is desirable to prevent loss of the vehicle and/or payload. We address this problem by proposing a novel foldable quadrotor system which can sustain c…
▽ More
Autonomous missions of small unmanned aerial vehicles (UAVs) are prone to collisions owing to environmental disturbances and localization errors. Consequently, a UAV that can endure collisions and perform recovery control in critical aerial missions is desirable to prevent loss of the vehicle and/or payload. We address this problem by proposing a novel foldable quadrotor system which can sustain collisions and recover safely. The quadrotor is designed with integrated mechanical compliance using a torsional spring such that the impact time is increased and the net impact force on the main body is decreased. The post-collision dynamics is analysed and a recovery controller is proposed which stabilizes the system to a hovering location without additional collisions. Flight test results on the proposed and a conventional quadrotor demonstrate that for the former, integrated spring-damper characteristics reduce the rebound velocity and lead to simple recovery control algorithms in the event of unintended collisions as compared to a rigid quadrotor of the same dimension.
△ Less
Submitted 28 May, 2021; v1 submitted 25 May, 2021;
originally announced May 2021.
-
QUARC: Quaternion Multi-Modal Fusion Architecture For Hate Speech Classification
Authors:
Deepak Kumar,
Nalin Kumar,
Subhankar Mishra
Abstract:
Hate speech, quite common in the age of social media, at times harmless but can also cause mental trauma to someone or even riots in communities. Image of a religious symbol with derogatory comment or video of a man abusing a particular community, all become hate speech with its every modality (such as text, image, and audio) contributing towards it. Models based on a particular modality of hate s…
▽ More
Hate speech, quite common in the age of social media, at times harmless but can also cause mental trauma to someone or even riots in communities. Image of a religious symbol with derogatory comment or video of a man abusing a particular community, all become hate speech with its every modality (such as text, image, and audio) contributing towards it. Models based on a particular modality of hate speech post on social media are not useful, rather, we need models like multi-modal fusion models that consider both image and text while classifying hate speech. Text-image fusion models are heavily parameterized, hence we propose a quaternion neural network-based model having additional fusion components for each pair of modalities. The model is tested on the MMHS150K twitter dataset for hate speech classification. The model shows an almost 75% reduction in parameters and also benefits us in terms of storage space and training time while being at par in terms of performance as compared to its real counterpart.
△ Less
Submitted 15 December, 2020;
originally announced December 2020.
-
A Comprehensive Survey on Real-Time Voltage Stability Assessment for Power Systems
Authors:
Gourav Wadhwa,
Amandeep Kharb,
Satyam Mishra,
Mohit Kumar,
Shreyansh Srivastav
Abstract:
Accurate real-time assessment of power systems voltage stability has been an active area of research in the past few decades. In the past decade, after the development of phasor measurement units (PMU), a lot of discussions has been going on phasor measurement techniques for real-time voltage stability. The fundamental idea behind these methods is to find the Thevenin equivalents of the system, an…
▽ More
Accurate real-time assessment of power systems voltage stability has been an active area of research in the past few decades. In the past decade, after the development of phasor measurement units (PMU), a lot of discussions has been going on phasor measurement techniques for real-time voltage stability. The fundamental idea behind these methods is to find the Thevenin equivalents of the system, and then determine the voltage stability margin based on the equivalent circuits. Some approaches also include the use of Artificial Neural Networks (ANN), for online monitoring of voltage stability margins. These methods are really fast as compared to the other methods. It has been shown that if we can obtain the phase angles and voltage magnitude in real-time from the phasor measurement units (PMU), then the voltage stability margins can be obtained in real-time and we can initiate voltage stability control methods. We are going to discuss Thevenin's equivalent methods and Artificial Intelligence methods in detail in this paper. We will also introduce the traditional methods which were earlier used for power systems stability assessment such as Time Domain methods, Static Methods, and Sensitivity methods. We are going to finally compare these methods and try to give general guidance on choosing a power stability method.
△ Less
Submitted 21 November, 2020;
originally announced November 2020.
-
Estimating State of Charge for xEV batteries using 1D Convolutional Neural Networks and Transfer Learning
Authors:
Arnab Bhattacharjee,
Ashu Verma,
Sukumar Mishra,
Tapan K Saha
Abstract:
In this paper we propose a one-dimensional convolutional neural network (CNN)-based state of charge estimation algorithm for electric vehicles. The CNN is trained using two publicly available battery datasets. The influence of different types of noises on the estimation capabilities of the CNN model has been studied. Moreover, a transfer learning mechanism is proposed in order to make the develope…
▽ More
In this paper we propose a one-dimensional convolutional neural network (CNN)-based state of charge estimation algorithm for electric vehicles. The CNN is trained using two publicly available battery datasets. The influence of different types of noises on the estimation capabilities of the CNN model has been studied. Moreover, a transfer learning mechanism is proposed in order to make the developed algorithm generalize better and estimate with an acceptable accuracy when a battery with different chemical characteristics than the one used for training the model, is used. It has been observed that using transfer learning, the model can learn sufficiently well with significantly less amount of battery data. The proposed method fares well in terms of estimation accuracy, learning speed and generalization capability.
△ Less
Submitted 23 January, 2021; v1 submitted 2 November, 2020;
originally announced November 2020.
-
Deep-Learning-Based, Multi-Timescale Load Forecasting in Buildings: Opportunities and Challenges from Research to Deployment
Authors:
Sakshi Mishra,
Stephen M. Frank,
Anya Petersen,
Robert Buechler,
Michelle Slovensky
Abstract:
Electricity load forecasting for buildings and campuses is becoming increasingly important as the penetration of distributed energy resources (DERs) grows. Efficient operation and dispatch of DERs require reasonably accurate predictions of future energy consumption in order to conduct near-real-time optimized dispatch of on-site generation and storage assets. Electric utilities have traditionally…
▽ More
Electricity load forecasting for buildings and campuses is becoming increasingly important as the penetration of distributed energy resources (DERs) grows. Efficient operation and dispatch of DERs require reasonably accurate predictions of future energy consumption in order to conduct near-real-time optimized dispatch of on-site generation and storage assets. Electric utilities have traditionally performed load forecasting for load pockets spanning large geographic areas, and therefore forecasting has not been a common practice by buildings and campus operators. Given the growing trends of research and prototy** in the grid-interactive efficient buildings domain, characteristics beyond simple algorithm forecast accuracy are important in determining true utility of the algorithm for smart buildings. Other characteristics include the overall design of the deployed architecture and the operational efficiency of the forecasting system. In this work, we present a deep-learning-based load forecasting system that predicts the building load at 1-hour intervals for 18 hours in the future. We also discuss challenges associated with the real-time deployment of such systems as well as the research opportunities presented by a fully functional forecasting system that has been developed within the National Renewable Energy Laboratory Intelligent Campus program.
△ Less
Submitted 16 December, 2021; v1 submitted 12 August, 2020;
originally announced August 2020.
-
Probabilistic Resilience of DER systems -- A Simulation Assisted Optimization Approach
Authors:
Sakshi Mishra,
Kate Anderson
Abstract:
Energy systems resilience is becoming increasingly important as the frequency of major grid outages increases. In this work, we present a methodology to optimize a behind-the-meter distributed energy resource system to sustain a site's critical loads during a pre-defined utility outage period. With the fixed system design, we then propose an outage simulation approach to estimate the resilience po…
▽ More
Energy systems resilience is becoming increasingly important as the frequency of major grid outages increases. In this work, we present a methodology to optimize a behind-the-meter distributed energy resource system to sustain a site's critical loads during a pre-defined utility outage period. With the fixed system design, we then propose an outage simulation approach to estimate the resilience potential of the DER system to sustain loads beyond the fixed outage period - a yearlong resilience performance analysis. We apply statistical analysis to assess the system's resilience performance over a broader parametric problem space on an hourly, monthly, and yearly basis. We present a case study to demonstrate the impact of the pre-defined outage period on the resilience performance of the system. The case study shows that the probability of surviving a random outage of a given duration changes from 20 percent to 95 percent when the outage is modeled for a weekday instead of a weekend for the case study building.
△ Less
Submitted 1 December, 2020; v1 submitted 12 August, 2020;
originally announced August 2020.
-
DQI: A Guide to Benchmark Evaluation
Authors:
Swaroop Mishra,
Anjana Arunkumar,
Bhavdeep Sachdeva,
Chris Bryan,
Chitta Baral
Abstract:
A `state of the art' model A surpasses humans in a benchmark B, but fails on similar benchmarks C, D, and E. What does B have that the other benchmarks do not? Recent research provides the answer: spurious bias. However, develo** A to solve benchmarks B through E does not guarantee that it will solve future benchmarks. To progress towards a model that `truly learns' an underlying task, we need t…
▽ More
A `state of the art' model A surpasses humans in a benchmark B, but fails on similar benchmarks C, D, and E. What does B have that the other benchmarks do not? Recent research provides the answer: spurious bias. However, develo** A to solve benchmarks B through E does not guarantee that it will solve future benchmarks. To progress towards a model that `truly learns' an underlying task, we need to quantify the differences between successive benchmarks, as opposed to existing binary and black-box approaches. We propose a novel approach to solve this underexplored task of quantifying benchmark quality by debuting a data quality metric: DQI.
△ Less
Submitted 10 August, 2020;
originally announced August 2020.
-
Cyberattack on the Microgrids Through Price Modification
Authors:
Subhankar Mishra
Abstract:
Recent massive failures in the power grid acted as a wake up call for all utilities and consumers. This leads to aggressive pursue a more intelligent grid which addresses the concerns of reliability, efficiency, security, quality and sustainability for the energy consumers and producers alike. One of the many features of the smart grid is a discrete energy system consisting of distributed energy s…
▽ More
Recent massive failures in the power grid acted as a wake up call for all utilities and consumers. This leads to aggressive pursue a more intelligent grid which addresses the concerns of reliability, efficiency, security, quality and sustainability for the energy consumers and producers alike. One of the many features of the smart grid is a discrete energy system consisting of distributed energy sources capable of operating independently from the main grid known as the microgrid. The main focus of the microgrid is to ensure a reliable and affordable energy security. However, it also can be vulnerable to cyber attack and we study the effect of price modification of electricity attack on the microgrid, given that they are able to operate independently from the main grid. This attack consists of two stages, 1) Separate the microgrids from the main grid (islanding) and 2) Failing the nodes inside the microgrid. Empirical results on IEEE Bus data help us evaluate our approach under various settings of grid parameters.
△ Less
Submitted 15 May, 2020;
originally announced May 2020.
-
Threat from being Social: Vulnerability Analysis of Social Network Coupled Smart Grid
Authors:
Tianyi Pan,
Subhankar Mishra,
Lan N. Nguyen,
Gunhee Lee,
Jungmin Kang,
Jungtaek Seo,
My T. Thai
Abstract:
Social Networks (SNs) have been gradually applied by utility companies as an addition to smart grid and are proved to be helpful in smoothing load curves and reducing energy usage. However, SNs also bring in new threats to smart grid: misinformation in SNs may cause smart grid users to alter their demand, resulting in transmission line overloading and in turn leading to catastrophic impact to the…
▽ More
Social Networks (SNs) have been gradually applied by utility companies as an addition to smart grid and are proved to be helpful in smoothing load curves and reducing energy usage. However, SNs also bring in new threats to smart grid: misinformation in SNs may cause smart grid users to alter their demand, resulting in transmission line overloading and in turn leading to catastrophic impact to the grid. In this paper, we discuss the interdependency in the social network coupled smart grid and focus on its vulnerability. That is, how much can the smart grid be damaged when misinformation related to it diffuses in SNs? To analytically study the problem, we propose the Misinformation Attack Problem in Social-Smart Grid (MAPSS) that identifies the top critical nodes in the SN, such that the smart grid can be greatly damaged when misinformation propagates from those nodes. This problem is challenging as we have to incorporate the complexity of the two networks concurrently. Nevertheless, we propose a technique that can explicitly take into account information diffusion in SN, power flow balance and cascading failure in smart grid integratedly when evaluating node criticality, based on which we propose various strategies in selecting the most critical nodes. Also, we introduce controlled load shedding as a protection strategy to reduce the impact of cascading failure. The effectiveness of our algorithms are demonstrated by experiments on IEEE bus test cases as well as the Pegase data set.
△ Less
Submitted 15 May, 2020;
originally announced May 2020.
-
Reliable Local Explanations for Machine Listening
Authors:
Saumitra Mishra,
Emmanouil Benetos,
Bob L. Sturm,
Simon Dixon
Abstract:
One way to analyse the behaviour of machine learning models is through local explanations that highlight input features that maximally influence model predictions. Sensitivity analysis, which involves analysing the effect of input perturbations on model predictions, is one of the methods to generate local explanations. Meaningful input perturbations are essential for generating reliable explanatio…
▽ More
One way to analyse the behaviour of machine learning models is through local explanations that highlight input features that maximally influence model predictions. Sensitivity analysis, which involves analysing the effect of input perturbations on model predictions, is one of the methods to generate local explanations. Meaningful input perturbations are essential for generating reliable explanations, but there exists limited work on what such perturbations are and how to perform them. This work investigates these questions in the context of machine listening models that analyse audio. Specifically, we use a state-of-the-art deep singing voice detection (SVD) model to analyse whether explanations from SoundLIME (a local explanation method) are sensitive to how the method perturbs model inputs. The results demonstrate that SoundLIME explanations are sensitive to the content in the occluded input regions. We further propose and demonstrate a novel method for quantitatively identifying suitable content type(s) for reliably occluding inputs of machine listening models. The results for the SVD model suggest that the average magnitude of input mel-spectrogram bins is the most suitable content type for temporal explanations.
△ Less
Submitted 15 May, 2020;
originally announced May 2020.
-
An Efficient Machine Learning Approach for Accurate Short Term Solar Power Prediction
Authors:
Shaktinarayana Mishra,
Lokanath Tripathy,
Prachitara Satapathy,
P. K. Dash,
Nitasha Sahani
Abstract:
Solar based electricity generations have experienced strong and impactful growth in recent years. The regulation, scheduling, dispatching, and unit commitment of intermittent solar power is dependent on the accuracy of the forecasting methods. In this paper, a robust Expanded Extreme Learning Machine (EELM) is proposed to accurately predict solar power for different time horizons and weather condi…
▽ More
Solar based electricity generations have experienced strong and impactful growth in recent years. The regulation, scheduling, dispatching, and unit commitment of intermittent solar power is dependent on the accuracy of the forecasting methods. In this paper, a robust Expanded Extreme Learning Machine (EELM) is proposed to accurately predict solar power for different time horizons and weather conditions. The proposed EELM technique has no randomness due to the absence of random input layer weights and takes very less time to predict the solar power efficiently. The performance of the proposed EELM is validated through historical data collected from the National Renewable Energy Laboratory (NREL) through various performance metrics. The efficacy of the proposed EELM method is evaluated against basic ELM and Functional Link Neural Network (FLNN) for 5 minutes and 1 hour ahead time horizon.
△ Less
Submitted 26 March, 2020;
originally announced March 2020.
-
Multi-Terminal DC Fault Identification for MMC-HVDC Systems based on Modal Analysis -- A Localized Protection Scheme
Authors:
Vaibhav Nougain,
Sukumar Mishra,
George S. Misyris,
Spyros Chatzivasileiadis
Abstract:
We propose a localized protection scheme based on modal analysis in multi-terminal modular multilevel converter (MMC) based high voltage DC (HVDC) systems. The paper addresses the issues of localized protection scheme based DC fault identification, such as differentiating between external and internal faults, classification of type of fault contingency i.e., pole to pole (\textit{PTP}) or pole to…
▽ More
We propose a localized protection scheme based on modal analysis in multi-terminal modular multilevel converter (MMC) based high voltage DC (HVDC) systems. The paper addresses the issues of localized protection scheme based DC fault identification, such as differentiating between external and internal faults, classification of type of fault contingency i.e., pole to pole (\textit{PTP}) or pole to ground (\textit{PTG}) for high impedance faults (HIFs) in the system. The scheme works on equivalent network of multi-terminal MMC-HVDC system for a DC fault, using phase-modal transformation to analyse line-mode and zero-mode voltage across the current limiting reactor (CLR) for different possible contingencies in the presence of fault resistance. The protection scheme is validated to be reliable for HIFs and in the presence of White Gaussian Noise (WGN) in measurement. The scheme operation is validated to be intact for varying fault location, fault resistances and system transients.
△ Less
Submitted 22 June, 2020; v1 submitted 23 March, 2020;
originally announced March 2020.
-
Microgrid Resilience: A holistic approach for assessing threats, identifying vulnerabilities, and designing corresponding mitigation strategies
Authors:
Sakshi Mishra,
Kate Anderson,
Brian Miller,
Kyle Boyer,
Adam Warren
Abstract:
Microgrids are being increasing deployed to improve the operational flexibility, resilience, coordinated-energy management capabilities, self-adequacy, and increased reliability of power systems. This strong market growth is also driven by advances in power electronics, improved control systems, and the rapidly falling price and increased adoption of distributed energy generation technologies, lik…
▽ More
Microgrids are being increasing deployed to improve the operational flexibility, resilience, coordinated-energy management capabilities, self-adequacy, and increased reliability of power systems. This strong market growth is also driven by advances in power electronics, improved control systems, and the rapidly falling price and increased adoption of distributed energy generation technologies, like solar photovoltaics and storage. In the event of grid outages, microgrids can provide a backup source of power; providing resilience to the critical loads; however, this requires that the microgrid itself is resilient to physical and cyber threats. Building highly resilient microgrids requires a methodological assessment of potential threats, identification of vulnerabilities, and design of mitigation strategies. This paper provides a comprehensive review of threats, vulnerabilities, and mitigation strategies and develops a definition for microgrid resilience. The paper also develops a methodology for designing resilient microgrids by considering how microgrid designers and site owners evaluate threats, vulnerabilities, and consequences and choose the microgrid features required to address these threats under different situations.
△ Less
Submitted 1 January, 2020; v1 submitted 2 October, 2019;
originally announced October 2019.
-
Evaluation of Centralized and Distributed Microgrid Topologies Considering Power Quality Constraints
Authors:
Hallie Dunham,
Dylan Cutler,
Sakshi Mishra,
Xiangkun Li
Abstract:
Integration of renewable generation and energy storage technologies with conventional generation supports increased resilience, lower-costs, and clean energy goals. Traditionally, energy supply needs of rural off-grid communities have been addressed with diesel-generation. But with rapidly falling renewable generation costs, mini-grids are transforming into hybrid systems with a mix of renewables,…
▽ More
Integration of renewable generation and energy storage technologies with conventional generation supports increased resilience, lower-costs, and clean energy goals. Traditionally, energy supply needs of rural off-grid communities have been addressed with diesel-generation. But with rapidly falling renewable generation costs, mini-grids are transforming into hybrid systems with a mix of renewables, energy storage, and diesel-generation. Optimal design of hybrid mini-grid requires an understanding of both the economic and power quality impacts of different designs. Existing approaches to modeling distributed energy resources address the economic viability and power quality impacts via separate/loosely coupled models. Here, we extend REopt - a techno-economic optimization model developed at National Renewable Energy Laboratory - to consider both within a single model. REopt formulates the design problem as a mixed-integer linear program that solves a deterministic optimization problem for a site's optimal technology mix, sizing, and operation to minimize life cycle cost. REopt has traditionally not constrained the power injection based on power quality. In the work presented here, we expand the REopt platform to consider multiple connected nodes. In order to do this, we model power flow using a fixed-point linear approximation method. Resulting system sizes and voltage magnitudes are validated against the base REopt model, and solutions of established power flow models respectively. We then use the model to explore design considerations of mini-grids in Sub-Saharan Africa. Specifically, we evaluate under what combinations of line length and line capacity it is economically beneficial (or technically required based on voltage limits) to build isolated mini-grids versus an interconnected system that benefits from the economies of scale associated with a single, centralized generation system.
△ Less
Submitted 1 August, 2019;
originally announced August 2019.