2020 IEEE Kansas Power and Energy Conference (KPEC) 2020
DOI: 10.1109/kpec47870.2020.9167534
|View full text |Cite
|
Sign up to set email alerts
|

UHF Partial Discharge Localization in Gas-Insulated Switchgears: Gradient Boosting Based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…The monitoring system is comprised of three sections, namely data pre-processing, feature extraction, and development of the classification model. In the data pre-processing module, the data acquired from the sensors is cleaned from inconsistent measurements, missing data points, and outliers to sidestep any possible false interpretations in the subsequent steps [32,33]. Next, data encoding, correlation analysis, and data normalization are implemented to feed in the required data into the AI model used.…”
Section: Applications Of Machine Learning In Pd Analysismentioning
confidence: 99%
“…The monitoring system is comprised of three sections, namely data pre-processing, feature extraction, and development of the classification model. In the data pre-processing module, the data acquired from the sensors is cleaned from inconsistent measurements, missing data points, and outliers to sidestep any possible false interpretations in the subsequent steps [32,33]. Next, data encoding, correlation analysis, and data normalization are implemented to feed in the required data into the AI model used.…”
Section: Applications Of Machine Learning In Pd Analysismentioning
confidence: 99%
“…Several milestones have been reached in presenting Machine Learning (ML) techniques for various sub-areas in SG [11]. However, shallow neural networks and sample ML models pose many challenges that make them seldom employed for complex problems in EPSs [12], [13]. These challenges broadly lie in two facts: Firstly, the nondeep-learning algorithms are ineffective for high-dimensional representations with unreasonable complexities [14], [15].…”
Section: B Emergence Of Deep Learningmentioning
confidence: 99%
“…To develop a thriving security ML application, the initial step involves collecting raw signals and generating a dataset. However, this process often encounters challenges, such as inconsistencies, imputations, and redundancies, which can lead to inaccurate results [5][6][7]. Therefore, employing proper data pre-processing techniques becomes imperative in the development of any successful machine learning application [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Semi-supervised models are combinations of supervised and unsupervised models, which train the model using a small number of labeled samples and a high number of unlabeled samples [4,5], while reinforcement learning models are trained based on rewarding the desired actions or punishing undesired behaviors. In such models, the agent attempts to interpret the environment, act, and learn via trial and error [6][7][8].…”
Section: Introductionmentioning
confidence: 99%