IoT Machine Learning and Blockchain Technologies - Com Anotações
IoT Machine Learning and Blockchain Technologies - Com Anotações
• Artificial intelligence
• Cognitive Science and Brian Science
• Communication/Computer Networking Technologies and Applications
• Computation and Information Processing
• Computer Architectures
• Computer networks
• Computer Science
• Embedded Systems
• Evolutionary computation
• Information Modelling
• Information Theory
• Machine Intelligence
• Neural computing and machine learning
• Parallel and Distributed Systems
• Programming Languages
• Reconfigurable Computing
• Research Informatics
• Soft computing techniques
• Software Development
• Software Engineering
• Software Maintenance
For a list of other books in this series, visit www.riverpublishers.com
IoT, Machine Learning and Blockchain
Technologies for Renewable Energy
and Modern Hybrid Power Systems
Editors
C. Sharmeela
Anna University, India
P. Sanjeevikumar
Aarhus University, Denmark
P. Sivaraman
Vestas Technology R&D Chennai Pvt. Ltd, India
Meera Joseph
Independent Institute of Education, South Africa
River Publishers
Published, sold and distributed by:
River Publishers
Alsbjergvej 10
9260 Gistrup
Denmark
www.riverpublishers.com
c 2022 River Publishers
Preface xiii
Acknowledgments xv
1 Introduction to IoT 1
Asim Maharjan and Saju Khakurel
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Applications of IoT . . . . . . . . . . . . . . . . . . . . . . 6
1.3.1 Domestic Applications . . . . . . . . . . . . . . . . 6
1.3.2 Applications in Healthcare . . . . . . . . . . . . . . 7
1.3.3 Applications in E-commerce . . . . . . . . . . . . . 8
1.3.4 Industrial Applications . . . . . . . . . . . . . . . . 9
1.3.5 Applications in Energy . . . . . . . . . . . . . . . . 10
1.4 Technical Details of IoT . . . . . . . . . . . . . . . . . . . 11
1.4.1 Sensors . . . . . . . . . . . . . . . . . . . . . . . . 11
1.4.2 Actuators . . . . . . . . . . . . . . . . . . . . . . . 15
1.4.3 Processing Topologies . . . . . . . . . . . . . . . . 16
1.4.4 Communication Technologies . . . . . . . . . . . . 18
1.5 Recent Developments . . . . . . . . . . . . . . . . . . . . . 20
1.6 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 23
References . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
v
vi Contents
Index 271
Renewable energy resources are alternative to fossil fuels and it always stands
for ‘new findings’ with challenges by the researcher to fulfill the power and
energy demand. The book “IoT, Machine Learning and Blockchain Tech-
nologies for Renewable Energy and Modern Hybrid Power Systems” will
provide an enhanced solution for various aspects of IoT, machine learning,
and blockchain applications from the editors and diverse authors.
This book covers the different sections dealing with fundamentals and
applications of IoT, machine learning, and blockchain technologies in renew-
able energy and hybrid power systems. It includes case studies like power
quality monitoring for low voltage distribution systems through IoT, health
monitoring of distribution transformers through IoT, blockchain with SHA-
256, 384, and 512 application to renewable energy resources, etc.
It well describes topics with theoretical-based analysis and followed
by numerical solutions and simulation results, case studies which make
additional credit to readers for their future research or profession.
The chapters are lucidly covering the significant and bottle-neck chal-
lenges prevailing in the renewable energy and hybrid power systems, enabling
the reader to better understand. The book will be readily available as reference
materials for IoT, machine learning, and blockchain technology applications
to renewable energy & hybrid power systems, and enabling the student
community to create more interest and attention to take up the challenging
renewable energy profession for their endeavors.
It is a unified contribution by international authors from Europe, India,
China, Nepal, the USA, Egypt, Saudi Arabia, and Thailand.
Editors
xiii
Acknowledgement
Foremost, thanks to the Almighty for his everlasting love throughout this
endeavor.
Acknowledgments are always a phrase to appreciate the resources and
timely solutions either with the digital platform or real-time medium, timely
support and a bond of encouragement is the vital tool for teachers and
researchers from their Institutions. In these regards, we editors express our
sincere thanks to Mr. S. Muthukumaran, Director, TECH Engineering Ser-
vices, Chennai, India; Mr. S. Rajkumar, Executive, JLL, Bengaluru, India;
Mr. K. Sasikumar, Electrical Engineer, Mott MacDonald, Noida, India;
Center for Bioenergy and Green Engineering, Department of Energy Tech-
nology, Aalborg University, Esbjerg, Denmark, Department of Electrical
and Electronics Engineering, KPR Institute of Engineering and Technology,
Tamilnadu, India, Department of Electrical and Electronics Engineering, Col-
lege of Engineering Guindy, Anna University, Chennai, India, Independent
Institute of Education, Johannesburg, South Africa. Editors we got the full
support and executed the task promptly where our Institution devoted the time
and liberty for enhancement with research in particular to make this book a
great success.
I wish One and All for the devoted time frame effort for the grand success
of the book.
Editors
xv
List of Figures
xvii
xviii List of Figures
xxiii
List of Contributors
xxv
xxvi List of Contributors
xxix
xxx List of Abbreviations
Abstract
This chapter discusses the field of the Internet of Things, or better known as
IoT, and various concepts related to it along with its vast applications and var-
ious challenges faced by IoT in the present world. A bit of the history of IoT
is also given so that the readers can get a sense of how long ago the concept
of IoT was conceived before becoming the revolution it is today. It goes over
some of the important milestones in the history of IoT from its naming to its
widespread adoption. Some of the applications of IoT, namely, in households,
healthcare, industries, and renewable energies are also discussed to show the
fields that have already begun to integrate IoT technologies in their operation.
A brief description of the enabling technologies of IoT is also given with the
purpose that the readers will be able to grasp the overall working of an IoT
system. It then explores the recent developments and achievements in the
field of IoT to give readers a glimpse of the present-day landscape of IoT.
Finally, the chapter also touches upon the many different kinds of issues and
challenges that present-day IoT systems are facing. These range from the
technical aspects of IoT such as compatibility, interoperability, and security
to the more ethical aspects like privacy.
1
2 Introduction to IoT
1.1 Introduction
With the exponential evolution of technology in almost every field like
communication technology, digital technology, machinery, robotics, power
and energy, and many more, it is common to have a few of these advancing
technologies combined to form even more complex and advanced techniques
and systems. In recent years, there have been numerous researches for the
expansions in the existing systems to improve their efficiency and application
in various sectors. It was not until a few years back when there were cable line
telephones for communication. But due to the advancement and exploration
in the communication field along with the accelerating development in wire-
less technology and digital technology, today, almost every means of com-
munication is wireless along with the digitized systems embedded in it. And
now with the rapid replacement of smart technologies among all the existing
systems, almost all electronic gadgets are as smart as a human task would be.
Following this, the idea of convergence of multiple technologies gives rise
to various newer ideas for the implementation of the existing technologies for
a better and dynamic system. Internet of Things (IoT) is one of the mixtures
of such multiple existing technologies, which incorporates multiple technical
fields such as sensors, the Internet, software, real-time operating system
(RTOS), embedded systems, etc. The idea of IoT is to act as a bridge that
connects physical things from the real world to the virtual world through the
Internet. This concept of connecting the physical and the virtual worlds was
first initially proposed by Mark Weiser in the early 1900s, where IoT allows
physical objects of the real world to be able to be remotely controlled via
the advancing technologies through the Internet [7]. Later in 2005, the idea
of the IoT was officially introduced by the International Telecommunication
Union (ITU) at the World Summit that was held at the Information Society
in Tunisia. They also released an ITU Internet report which included an in-
depth knowledge about the IoT, its concepts, and its global effect around the
globe [24].
IoT is a large networking platform for interaction and control of multiple
electronic tools via the Internet. In simple words, it is a combination of sen-
sors, processors, and then controllers for actuation, which all communicate
through the use of the Internet. The data streams, from the sensors or any
other smart devices that acknowledge the change in environmental factors,
get stored up in a common platform where the necessary information gets
processed, computed, and analyzed. This filtered data can either be stored for
future reference or can be used immediately for taking actions like controlling
1.1 Introduction 3
or switching the other devices sharing the common platform in the network.
It carries the idea of independence of human interventions in monitoring and
control of any digital systems for efficient work through. These systems do
not possess any delay, minimize human effort by expanding the independence
of humans, efficiently utilize the resources, save time, and are transparent.
Figure 1.1 shows the concepts of IoT.
With the expanding knowledge, the unlimited possibility of implementa-
tion areas, and exponential advancement in technology, almost every human
task is replaceable with a monitoring and control system. Few sensors for
observing the changes in respective parameters of a dynamic environment,
a processor for implementing the required algorithm, and controllers or
actuators for maintaining the desired state. This idea expands the horizon of
IoT which now, with few advanced types of equipment, can be implemented
in almost every sector; for example, self-driving cars, medical recordings,
smart home systems, manufacturing to customer care, irrigation systems,
educational institutions, e-commerce, and so on. Figure 1.2 shows the various
elements that are involved in the monitoring and control of the physical
system through IoT.
A smart home can be considered the best example of IoT. The smart
home system incorporates all the features that an IoT has to offer along
with providing a clear concept on “What exactly is an IoT?” As mentioned
4 Introduction to IoT
Figure 1.2 Various elements involved in the monitoring and control of physical systems
through IoT [25].
earlier, IoT is a system where the physical objects are connected to a common
virtual platform for interacting with every other device in the network, which
are programmed to perform certain tasks that require less to no human
interventions.
In a smart home system, multiple sensors are embedded in different
locations of the house that tracks down the changes in a state like temperature,
lighting, air quality, etc. These sensors are the starting point in the system
whose data are then collected to a virtual cloud via the Internet. The data
in the cloud is then processed and filtered after which the processed data is
analyzed in real time. The endpoint to this system can be the APIs or the
controllers in the home itself. This system allows the user to make changes in
their homes when no one is physically present there or just monitor the activ-
ity that is taking place at the home when they are away. Either way, this sys-
tem excludes the human intervention, establishes a virtual connection among
the multiple devices, and takes necessary actions as it is programmed to.
Along with the existing system, there are numerous possibilities to
increase its ability of performance such as a system that connects the user
phone to the home system, calculates its distance from the home and unlocks
the doors, sets the temperature, and turns on the lights on the arrival of the
user. Furthermore, the expandability of these systems is just limited by human
ideas, and with the massive developments that have been occurring in this
field, there soon arrives a future where just the thought of outdoors triggered
in the brain can cause the car to be ready at the front door.
1.2 History 5
1.2 History
The term Internet of Things was first coined by Kevin Aston in 1999, in a
presentation for Procter & Gamble linking the concepts of radio-frequency
identification (RFID) to the company’s supply chain [1].
However, the first use of the IoT, as we know it now, was even before the
term was coined. The concept first appeared in the mid-1970s at the Com-
puter Science Department of Carnegie Mellon University in a Coke vending
machine. It allowed students to view the status of the vending machine, such
as knowing when the vending machine was full/empty or whether the drinks
inside the vending machine were hot or cold. The vending machines had
micro switches that were used to detect the coke bottles. These switches were
then connected to the university’s mainframe computer based on PDP-10. The
students could then inquire about the status of the vending machine through
an inquiry program written for it.
Back then, the Internet as we know it today did not exist. The communica-
tions were mostly carried out through ARPANET, which would later become
known as the Internet [2].
This is just one of the examples of the concepts of IoT being conceived
before the term was even coined. Many authors have written about devices
interacting with each other through wireless means and have talked about
such concepts in great detail. It is only now that such concepts have taken
concrete forms.
As the years progressed from the mid-1970s, the Internet became more
available to the general public. With large businesses adopting the Internet,
the vast possibilities tied with the Internet rapidly started coming to light.
With computers connected to every part of the world, sharing information
was trivial. Along with the development of the Internet, computers were
becoming smaller, faster, and more available. In 1991, author Mark Weiser
wrote the article “The Computer for the 21st Century” [7]. The concept of
Ubiquitous Computing began with it. The author depicted many real-life
situations illustrating the widespread adoption of computers in performing
day-to-day tasks such as making coffee, reading newspapers, identifying
oneself, and so on. The author also noted how interconnections among these
devices would present many challenges to the networking infrastructure back
then. In the present, however, network infrastructures are very developed and
network bandwidths of up to Gigabits are readily available. Thus, the future
depicted by Mark Weise has certainly turned out to be a reality in today’s
world.
6 Introduction to IoT
and then made to be readily available to the patient and other doctors and
professionals. This way, doctors who are treating the patient will have access
to all the prior records which can lead to a more efficient and accurate
diagnosis [8].
In addition to IoT, machine learning and data analytics have also seen
widespread adoption in healthcare. Machine learning in combination with IoT
can provide a very powerful tool for medical diagnosis. In [12], the authors
have proposed a predictive machine learning algorithm for the detection of
heart diseases by using data such as blood pressure, heart rate, respiratory
rate, and blood sugar. In [13], an IoT system for monitoring the health
condition of patients with high blood pressure is proposed by using HRV
parameters. Many similar studies regarding the field of data analytics in
conjunction with IoT for the medical sector can be found in [14].
in smart grids for robust and efficient delivery of power in smart grids [40].
To this extent, IoT provides a general framework to communicate information
between devices in a smart grid. It can also be used for monitoring and
metering the various power plants, domestic houses, and electric vehicles
which are all a part of the distributed smart grid network. IoT in smart grids
can also be used to monitor and collect consumer data which, when coupled
with data analysis techniques such as machine learning, can be used to create
energy management models (EMMs) [58]. The EMM can then be used to
optimize the performance of the smart grid. They can also be used to predict
and analyze consumer energy demand in the future. Therefore, IoT has a huge
potential in the future in the field of energy.
A. Temperature Sensor
As the name suggests, these sensors measure the temperature of the environ-
ment. They do so by using thermistors, thermocouples, and other semicon-
ductors. Figure 1.4 shows the typical sensor used to monitor both temperature
as well as humidity.
C. Photodetectors
The photodetectors are used to measure the intensity of light in the
environment. Two common light sensors are the light-dependent resistors
(LDRs) and the photodiode. An LDR varies its resistance according to the
amount of light falling on it. Photodiodes, on the other hand, work on the
principle of photoelectric effect where a photon from a light source striking a
semiconductor produces electrons, which, in turn, causes current to flow. The
typical LDR and photodiode are shown in Figure 1.6.
D. Infrared Sensors
Infrared (IR) sensors are used to detect IR radiations that are invisible to
the human eye. They have a wide number of applications such as object
and motion detection. IR can also be used for data transmission. These
sensors can be active or passive. An active sensor has a built-in IR generation
mechanism as well as receiving mechanism, whereas the passive IR sensor
only detects the incoming IR radiations. The typical passive IR sensor is
shown in Figure 1.7.
14 Introduction to IoT
E. Ultrasonic Sensors
Ultrasonic sensors are used for measuring distance. They work by measuring
the time difference between the transmitted and the reflected ultrasonic waves
which can then be converted into the distance by using the speed of the
ultrasonic wave. A typical ultrasonic sensor is shown in Figure 1.8.
F. Gas Sensors
Gas sensors are used to detect the presence and concentration of various
kinds of gases in the atmosphere. One of their major uses is in air pollution
monitoring, where the sensor is used to measure the harmful gases present in
the air such as CO2 , carbon monoxide, etc.
1.4 Technical Details of IoT 15
1.4.2 Actuators
Actuators are those components that convert an incoming signal such as
an electrical voltage into a physical form such as a force, velocity, light,
temperature, etc., or even into a non-mechanical form such as voltage and
current itself [42]. They receive an input signal from a controller and produce
an output that depends on the input signal. The output of the actuator interacts
with its surroundings to bring some kind of change to it. As an example, a
DC motor can be thought of as an actuator with an electrical voltage as its
input signal and the rotation of its shaft as the output. The rotation of the
shaft can interact with the physical world in several different ways, whether
it is changing the position of the system by driving some wheels, opening or
closing a door, pumping water, etc. Depending on the type of input signals
and the corresponding output signal, actuators can be classified into several
classes such as hydraulic, pneumatic, electric, mechanical, and so on [41].
In IoT-based systems, electric actuators are dominant primarily because
they can be controlled using electrical signals. Some examples of electric
actuators are DC motors, servo motors, electromechanical relays, etc. Electric
actuators are also versatile and flexible in the sense that input signals can be
controlled by the software running in the processor which allows for much
better control over their output. For example, the speed of a DC motor and
the position of a servo motor can be easily controlled through software. Thus,
by including programming logic, a single electric actuator can be used for
a vast number of applications. Furthermore, a processor can use the input
data from the sensors to generate the input signals for actuators. This is
a fundamental aspect of smart devices where devices can produce outputs
according to the inputs without any human interference [42]. The typical
example of the automatic door opening and closing is shown in Figure 1.9.
Figure 1.10 shows the simple automatic door opening system in which a
DC motor is used as an actuator whose goal is to simply open and close the
door. The camera acts as a sensor that gives pictures as input to the processor.
The processor is then tasked with person detection. When it detects someone
approaching the door, it gives an electrical signal to the DC motor to open
the door. Obviously, in an IoT-based system, we would be able to do much
16 Introduction to IoT
more than just opening and closing of doors based on the camera image.
With multiple of these systems placed at various locations along with popper
person identification, we can track people in buildings solely based on which
doors they have passed through.
amount of data from the customers before ordering new goods in the store.
Also, the store can use pre-existing systems for this task. The data logged
in a day can be sent to a cloud service, such as an item recommendation
system, which can perform data analysis on the customer data to figure out
the customer preferences and the kinds of items that customers are potentially
looking for. The cloud service can also be made available to be used by
other retail stores. This way, every store does not need to deploy its item
recommendation system and can use pre-existing ones, thus saving a large
amount of money and time. An illustration of an off-site processing system is
shown in Figure 1.11 [17].
for data transmission from one device to another through a single connection;
for example, from the sensor to a microprocessor or your phone to the nearby
Wi-Fi router. The network layer is responsible for data transmission through
the network, i.e., from the sensor node to your computer. The transport layer
is responsible for data transmission between processes, i.e., from the sensor
node to the program that is using the sensor node. The above layers deal with
data presentation and processing. These layers are generally present in every
communication system in one way or another.
The bottom four layers of the OSI layer are of particular importance.
Because of the wide variety of devices that are used, there is also a large
variation in the technology used in each of the layers. The physical and the
data link layers consist of various wired and wireless communication pro-
tocols used to connect two devices through a single link. Generally, sensors
are connected to microprocessors through a wired channel. The sensor can
communicate with the processor using various protocols such as I2C, SPI,
USART, and so on. The processors, being more powerful devices, are then
tasked with sending the data over the network which can be done through a
wired channel such as Ethernet or a wireless channel. IEEE 802.15.4, Zigbee,
LoRa, Bluetooth, Wi-Fi, and RFID are some of the popular technologies used
for wireless communication [17, 46].
20 Introduction to IoT
The other layers then deal with the transmission of data from the source
endpoint to the destination endpoint. Besides this, they also provide other
important functions such as device discovery, identification, and manage-
ment. Thus, we can classify the various protocols used in terms of their usage
into the groups as listed in Table 1.1 [17].
activities. The whole idea of IoT stands on data entry, its manipulation, and
necessary actions, but with the wide application area and increasing data
levels including some confidential information too, the future of IoT leans
toward complicated security and privacy issues. This concern is captivating
the concentration from both industry and academia for performing research
on IoT’s security and privacy. Along with the security issues, the future of
IoT also concerns the management issues like monitoring, updates, diagnos-
tics, crash analysis and reporting, processor speed, power consumption, OS,
standards and units, platforms, and so on. Hence, the recent development in
IoT is concerned with these factors, especially prioritizing the security and
privacy issues.
Since IoT connects multiple devices into a common network, the safest
and secure point-to-point connection is preferred. Various existing standards
have been used in attempts to solve the interconnection issues between the
devices in the network. Also, various alliances and standards such as ITU-
T, IEEE P2413, Allen Alliance, Open Connectivity Foundation, and IPSO
Alliances have suggested a framework for IoT and connectivity of local IoT
devices. OneM2M is one such proposed standard that aims to provide inte-
gration and interconnection between various smart IoT devices. The oneM2M
project was founded by the Standards Developing Organizations (SDOs) of
many countries such as Korea, USA, Japan, and so on [18].
The integrated circuits designed for IoT systems are focused on specific
purposes and thus mainly utilize a robust and powerful system on chips
(SoCs) for their operation. With security always being one of the most
important aspects of an IoT-based system, IoT systems need to have security
measures to protect the user data. Many different approaches for security in
IoT have been proposed in recent years using new technologies like artificial
intelligence (AI), machine learning, big data, and blockchain [55]. Some
approaches using blockchain to improve security and privacy have been
discussed in [53] and [54]. Similarly, a discussion on other approaches using
machine learning can be found in [56] and [57]. Utilizing the SoC nature
of IoT devices, a physically unclonable function (PUF) based cryptographic
security solution for IoT SoCs has been proposed which deploys a mechanism
using PUF and symmetric cryptography to provide a secure means for data
communication [47].
Besides the advancement that is dedicated solely to IoT, advancements in
other fields are also showing their impacts on bettering the IoT. The upcoming
generation of mobile technology is predicted to highly benefit the IoT field.
This is because of the invention of 5G technology though its specifications are
22 Introduction to IoT
yet to be finalized. With the greater speed of connectivity and lower latency,
it will be aiding in speeding up IoT devices and help in better remote access.
Another major emerging field is that of artificial intelligence (AI). Integration
of AI with IoT can be a boon to the world of innovation. Using the data
obtained from smart IoT devices in order to train themselves as smarter as a
human brain can be a game-changer to the world of automation. Self-driving
cars are a great example of this combination. Cloud computing is another
major area that is immensely alternating with every other data storage and
manipulation system available. The field of robotics has also seen the use of
IoT and other cloud technologies. This is referred to as cloud robotics that
aims to utilize IoT and other cloud services [48]. It allows robots to share
information and utilize many powerful resources that are distributed in the
cloud.
1.6 Challenges
Like many modern technologies, IoT also faces many challenges that prevent
it from widespread adoption. IoT faces challenges at both the technological
levels and at the ethical level. From a technological perspective, IoT faces
challenges such as interoperability, scalability, security and privacy concerns,
data concerns, etc.
With a large number of IoT systems being deployed, there is a higher
chance of interoperability issues, i.e., integration of different systems into a
single one. Many systems are proprietary and thus incompatible with each
other. Making them compatible would require compatibility at all levels such
as in hardware, protocols, etc. [19]. In order to overcome these issues, stan-
dards need to be developed which cover the technical requirements including
hardware and software requirements for all the devices for better interoper-
ability. Various efforts have been made by standards organizations like ITU,
ISO, IEEE, IEC, etc., to build standards for fundamental IoT technologies like
RFID, WSNs, etc. [20]. Scalability, on the other hand, brings along a lot of
other major issues. Most IoT systems have to be designed and used on a large
scale. This brings about the concerns of security and privacy among many
others. IoT is an amalgamation of all kinds of technologies that raise security
concerns at all levels. Each part of an IoT ecosystem must be secure against
vulnerabilities and be robust against outer disturbances and interference. A lot
of devices used in IoT have limited computational capabilities, which makes
it very difficult to implement robust security measures. This can open up
the entire ecosystem to vulnerabilities. One famous example of IoT security
References 23
being compromised is the Mirai botnet [21]. Mirai is a malware that targeted
IoT devices to create a very large botnet that was used for many distributed
denial of service (DDoS) attacks in 2016. It did so by guessing the credentials
of the devices. Many users did not change the credentials of the device
from the factory defaults due to which it was very easy for the malware to
infect hundreds of thousands of devices. An army of such devices was used
to conduct DDoS attacks on companies like Krebs on Security, OVH, and
Dyn. This alone highlights the disastrous risks of having vulnerabilities on
IoT-based systems.
In addition to this, privacy concerns also arise when we have devices that
can monitor our daily activities and transfer that data through a large network.
Any device that is connected to the Internet is susceptible to many different
forms of attack that involve stealing one’s identity, accessing other people’s
data, and so on. Websites like Shodan (shodan.io) allow people all over the
Internet to legitimately access other people’s devices like IP cameras [22]. In
this age, where privacy is of utmost importance, IoT devices have to maintain
the highest level of privacy possible.
1.7 Conclusion
In this chapter, a brief overview of the entire IoT ecosystem was presented
along with its history, applications, enabling technologies, and recent devel-
opments and challenges. IoT is a technology with vast applications in many
fields that affect our day-to-day lives. Improvements brought in the fields of
healthcare, industries, energy management, etc., by the sensing, monitoring,
and communicating capabilities of IoT have greatly upgraded our lifestyle
and it will keep on enhancing our lifestyle in the future as the IoT technology
further evolves. However, IoT is still not a technology that is without faults.
Many technical and ethical issues arising from the use of IoT have hindered
it from its widespread adoption. However, IoT remains one of the most
influential pieces of technology in the present world, and, thus, with ongoing
research and developments, these limitations will hopefully be overcome in
the near future. Therefore, IoT is a field with nearly limitless potential in the
foreseeable future.
References
[1] K. Ashton, “That ‘Internet of Things’ thing,” RFID Journal, 22-Jun-
2009. [Online]. Available: https://www.rfidjournal.com/that-internet-of
-things-thing. [Accessed: 07-Sep-2021].
24 Introduction to IoT
[2] “The ‘Only’ Coke Machine on the Internet,” Carnegie Mellon School of
Computer Science. [Online]. Available: https://www.cs.cmu.edu/~{}c
oke/history_long.txt. [Accessed: 07-Sep-2021].
[3] E. Dave, “The Internet of things: How the next evolution of the Internet
is changing everything,” 2011. [Online]. Available: https://www.cisco.
com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
[Accessed: 23-Oct-2021].
[4] C. Floerkemeier, E. Fleisch, M. Langheinrich, F. Mattern, and S.E.
Sarma, in Proceedings of the Internet of Things First International
Conference, IoT 2008, Zurich, Switzerland, March 26–28, 2008. Berlin,
Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
[5] E. Irmak and M. Bozdal, “Internet of Things (IoT): The most up-to-date
challenges, architectures, emerging trends and potential opportunities,”
International Journal of Computer Applications, vol. 179, pp. 20–27,
May 2018.
[6] N. Sharma, M. Shamkuwar, and I. Singh, “The history, present and
future with IoT,” Intelligent Systems Reference Library, pp. 27–51,
2018.
[7] M. Weiser, “The computer for the 21st century,” ACM Sigmobile Mobile
Computing and Communications Review, vol. 3, no. 3, pp. 3–11, 1999.
[8] R. De Michele and M. Furini, “IoT healthcare,” in Proceedings of the
5th EAI International Conference on Smart Objects and Technologies
for Social Good, 2019.
[9] K. Saleem, I.S. Bajwa, N. Sarwar, W. Anwar, and A. Ashraf, “IoT
healthcare: Design of smart and cost-effective sleep quality monitoring
system,” Journal of Sensors, vol. 2020, pp. 1–17, 2020.
[10] S. Allen, “2021 global health care sector outlook,” Deloitte, 25-Jun-
2021. [Online]. Available: https://www2.deloitte.com/global/en/pa
ges/life-sciences-and-healthcare/articles/global-health-care-sector-outl
ook.html. [Accessed: 07-Sep-2021].
[11] M. Ersue, D. Romascanu, J. Schönwälder, and A. Sehgal, “Management
of networks with constrained devices: Use cases,” no. 7548. RFC Editor,
May 2015.
[12] P.M. Kumar and U. Devi Gandhi, “A three-tier Internet of Things
architecture with machine learning algorithm for early detection of heart
diseases,” Computers & Electrical Engineering, vol. 65, pp. 222–235,
2018.
References 25
[13] R.N. Kirtana and Y.V. Lokeswari, “An IoT based remote HRV monitor-
ing system for hypertensive patients,” in Proceedings of 2017 Interna-
tional Conference on Computer, Communication and Signal Processing
(ICCCSP), 2017, pp. 1–6, doi: 10.1109/ICCCSP.2017.7944086.
[14] W. Li, Y. Chai, F. Khan, S.R. Jan, S. Verma, V.G. Menon, Kavita, and
X. Li, “A comprehensive survey on machine learning-based big data
analytics for IoT-enabled smart healthcare system,” Mobile Networks
and Applications, vol. 26, no. 1, pp. 234–252, 2021.
[15] T. de Vass, H. Shee, and S. Miah, “IoT in supply chain management:
Opportunities and challenges for businesses in early Industry 4.0 con-
text,” Operations and Supply Chain Management: An International
Journal, pp. 148–161, 2021.
[16] T.M. Brown-Brandl, “1 using RFID in animal management and more,”
Journal of Animal Science, vol. 97, no. Supplement_2, pp. 1–2, 2019.
[17] S. Misra, A. Mukherjee, and A. Roy, Introduction to IoT. Cambridge:
Cambridge University Press, 2021.
[18] H. Park, H. Kim, H. Joo, and J.S. Song, “Recent advancements in
the Internet-of-Things related standards: A onem2m perspective,” ICT
Express, vol. 2, no. 3, pp. 126–129, 2016.
[19] M. Noura, M. Atiquzzaman, and M. Gaedke, “Interoperability in inter-
net of things: Taxonomies and open challenges,” Mobile Networks and
Applications, vol. 24, no. 3, pp. 796–809, 2018.
[20] M. Aly, F. Khomh, Y.-G. Gueheneuc, H. Washizaki, and S. Yacout, “Is
fragmentation a threat to the success of the internet of things?,” IEEE
Internet of Things Journal, vol. 6, no. 1, pp. 472–487, 2019.
[21] M. Antonakakis et al., “Understanding the Mirai Botnet,” in Proceed-
ings of the 26th USENIX Conference on Security Symposium, 2017,
pp. 1093–1110.
[22] H. Lin and N. Bergmann, “IoT privacy and security challenges for smart
home environments,” Information, vol. 7, no. 3, pp. 44, 2016.
[23] Alexa Smart Home-Learn About Home Automation. [Online]. Available:
https://www.amazon.com/alexa-smart-home [Accessed: 23-Oct-2021].
[24] F. Wang, L. Hu, J. Hu, J. Zhou, and K. Zhao, “Recent advances in the
internet of things: Multiple perspectives,” IETE Technical Review, 2016,
doi: 10.1080/02564602.2016.1155419.
[25] Available: https://pixabay.com/illustrations/iot-internet-of-things-net
work-3337536/ [Accessed: 23-Oct-2021].
26 Introduction to IoT
[48] G. Hu, W.P. Tay, and Y. Wen, “Cloud robotics: architecture, challenges
and applications,” IEEE Network, vol. 26, no. 3, pp. 21-28, May-Jun.
2012, doi: 10.1109/MNET.2012.6201212.
[49] Available: https://www.freesvg.org [Accessed: 23-Oct-2021].
[50] D.C Motor image by Dcaldero8983, CC BY-SA 3.0. Available: https:
//creativecommons.org/licenses/by-sa/3.0, via Wikimedia Commons.
[51] Images by SparkFun, CC BY 2.0. Available: https://creativecommons.
org/licenses/by/2.0
[52] PIR image by Nowforever CC BY-SA 4.0. Available: https://creativeco
mmons.org/licenses/by-sa/4.0 via Wikimedia Commons.
[53] O. Alfandi, S. Khanji, L. Ahmad, and A. Khattak, “A survey on boosting
IoT security and privacy through blockchain,” Cluster Computing, vol.
24, no. 1, pp. 37–55, 2020.
[54] S.N. Mohanty, K.C. Ramya, S.S. Rani, D. Gupta, K. Shankar, S
K. Lakshmanaprabu, and A. Khanna, “An efficient lightweight inte-
grated blockchain (ELIB) model for IoT security and privacy,” Future
Generation Computer Systems, vol. 102, pp. 1027–1037, 2020.
[55] B.K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, “Survey on IoT
security: Challenges and solution using machine learning, artificial intel-
ligence and blockchain technology,” Internet of Things, vol. 11, 2020,
Art. no. 100227.
[56] R. Ahmad and I. Alsmadi, “Machine learning approaches to IoT secu-
rity: A systematic literature review,” Internet of Things, vol. 14, 2021,
Art. no. 100365.
[57] M.A. Amanullah, R.A. Habeeb, F.H. Nasaruddin, A. Gani, E. Ahmed,
A.S. Nainar, N.M. Akim, and M. Imran, “Deep learning and big data
technologies for IoT security,” Computer Communications, vol. 151,
pp. 495–517, 2020.
[58] W. Ahmed et al., “Machine learning based energy management model
for smart grid and renewable energy districts,” IEEE Access, vol. 8,
pp. 185059–185078, 2020, doi: 10.1109/ACCESS.2020.3029943.
[59] P. Sivaraman and C. Sharmeela, IoT-Based Battery Management Sys-
tem for Hybrid Electric Vehicle, in P. Sanjeevikumar (eds), Artificial
Intelligent Techniques for Electric and Hybrid Electric Vehicles, John
Wiley-Scrivener Publishing, 2020.
2
IoT and its Requirements for Renewable
Energy Resources
Abstract
The worldwide energy production is majorly based on fossil fuels, and it cov-
ers 84% of world key energy consumption as on 2020 statistics. To support
global energy demand, both government and private sectors have started to
focus the problems on fossil fuel depletion and the impact of Greenhouse
gas emissions in climatic change. To reduce the emission of Greenhouse
gas and to obtain energy transition of sustainable range, it is necessary to
integrate renewable energy in the power grid as per recent studies. Though
the renewable energy sector kept its phenomenal growth in the current sce-
nario and the prediction of its supply to fulfill two-thirds of global energy
demand in 2050, there are challenges in power generation, transmission, and
distribution where the economic feasibility plays a role. Modern technology,
such as the Internet of Things (IoT), plays an important role in overcoming
these problems and optimizing renewable energy supplies. Understanding the
use of IoT technology fosters trust in this sector to give a better solution
for renewable energy management such as generation, transmission, and
distribution, as well as effective energy sharing to the grid. This chapter
discusses IoT technologies and their integration in the renewable energy
sector to increase their efficiency. Furthermore, information transmission and
29
30 IoT and its Requirements for Renewable Energy Resources
storage for data analytics to provide optimum energy supply, and issues in
IoT implementation with solutions to security and privacy maintenance are
highlighted.
2.1 Introduction
2.1.1 IoT and its Necessity
The modern equipment offers effective communication among themselves
besides carrying out their functions, which supports effective system opera-
tion. In the fourth industrial revolution, robotics systems, wireless communi-
cation, the Internet of Things (IoT), cloud computing, and so on dominated
the functions [1]. Now the issue arises as to “Why should the equipment
in the system, or system to system, interact with each other?” The solution
is that by using effective communication, superfluous functions in the sys-
tem may be turned off to conserve energy and optimize system operations.
Furthermore, the gathering of operational information (equipment data and
environmental data) in real time via communication is utilized for data ana-
lytics to predict/measure equipment performance to avoid unexpected system
failure [2]. In addition, data analysis is utilized to make decisions on system
enhancements and adjustments depending on future demand. For more than
a decade, machines interacted using machine-to-machine (M2M) commu-
nication, a one-to-one communication method used to link one machine to
another [3]. However, when sensors and actuators are utilized with devices
for sending and receiving data to monitor the devices, transmission control
protocol/Internet protocol (TCP/IP) is used for large information transmission
between the communicating devices. Kevin Ashton invented the term “Inter-
net of Things” (IoT) in 1999, and his concept of IoT technology was based on
radio frequency identification (RFID) device communication, which differs
greatly from today’s IP-based connectivity. After 2011, the IoT boom was
happening with the network layer of IPv4 and IPv6, which became essential
to IoT with the aid of developing technologies. In this rapid development,
there are already 6.4 billion linked devices and sensors in IoT, with 5.5 million
devices connecting to IoT on a daily basis [4].
VRES, such as solar power grid systems and wind power grid systems,
plays a significant role in accomplishing the power sector decarbonization.
However, they are not the same as traditional power production systems. By
integrating the VRES in the distribution system, there will be possibilities for
the formation of difficulties and challenges in the operation of the distribution
network (DN) [5]. Furthermore, in the context of the growing role of VRES
in meeting current power demand, it is, therefore, imperative to address the
new problems that arise in power systems. If these problems and issues are
not addressed, they may endanger the reliability of the power supply system
as well as the decarbonization targets [6].
Table 2.1 lists RES challenges as per the root cause analysis and offers an
overview of the signs of growing VRE penetration discovered by a literature
study. The symptoms may be classified that correspond to the power system’s
essential performance criteria. The categories are briefly described in the
sections that follow. The end user’s primary performance requirement is
adequate power quality. The power quality factor includes the conditions
for uninterrupted power sources, consistent voltage and current parameters,
and safe conditions in the event of disruptions. The uniqueness and asyn-
chronous facts of VRES are two basic features that are primarily responsible
for power quality issues. The current factor is concerned with the effective
DN of electricity. In comparison to the other categories, the root causes
of problems in the flow category are numerous. The greatest proportion of
flow problems is caused by VRE unpredictability, modularity, and location
restrictions. The stability factor is concerned with power rate modulations and
voltage fluctuation, together with restart and recovery of the system after the
power distribution interruptions. The problems that deal with the balancing
of the power supply with short and long terms in the distributions systems
as well as managing the demand are the concerns of the eminence factor in
the VRES power generation system. This includes the management of the
power systems’ upgradation competency and maintaining low power gen-
eration levels among the systems. But VRES power generation fluctuations
and unpredictability create balancing problems. To summarize, the analysis
of causes in VRES stipulates a reliable foundation for the classification of
problems in power systems with its growth and adaptations.
32 IoT and its Requirements for Renewable Energy Resources
business outcomes. The IIoT is an extension of the IoT that has evolved as a
broad notion of applying the IoT to the industrial sector [8].
However, because of the integration requirement, it confronts specific
problems that distinguish it from other IoT systems and services. Although
the fundamental concepts of IIoT and IoT are similar, i.e., smart device
connections that enable remote operation of the equipment, receive and store
data, analyze the data, and supervise and control the variables that distinguish
the IIoT as the subcategory of IoT which develops the strict requirements for
uninterrupted services and security with efficient operational technology used
in the industrial fields. The industrial sector’s particular qualities - technology
and requirements – result in specialized solutions and services to support the
industrial division’s concentration on a customized IoT concept. As a result,
the industrial sector has taken a keen interest in the creation of specialized
ideas ranging from policy to technology services.
and store data, data acquisition devices that interact with the equipment
via encoders and decoders, sensors and actuators or machines, end service
devices, and consumer electronic devices that have embedded processing and
communication resources.
The connectivity of devices is the fundamental idea of IoT architecture
based on the ITU reference model. Figure 2.1 shows the architecture of
IoT wherein the model analyzes three communication techniques based on
the usage of gateways (G), local network (LN), and the CN. The smart
devices can connect openly, over LNs, and/or over the CN, without the
need for gateways, or they can communicate via gateways. The IIoT has
the key features of interconnectivity, scalability, diversity, service facility, the
dynamic information of the devices, and connectivity. Development becomes
a substantial factor that needs to be included at all levels of IIoT as the number
of connected devices increases dramatically. The development issue is present
not only to communication points and the number of smart devices but also
to the size of collected and transmitted data including its administration
in terms of huge storage and analyzing. The dynamic performances of the
devices, which turn on and off automatically or join and detach from CNs,
will complicate and demand more from the landscape.
which consists of four tiered layers, particularly device layer, network layer,
software and service assistance layer, and lastly application layer, and two
vertically integrated layers which are crosscutting the four-tiered layers,
defining managing as well as security capabilities and attributes to all hierar-
chical levels. The first layer that presents the device information, probably the
bottom in the hierarchy, consists of the performance of equipment and CNs.
Thinking about the primary interest of ITU in marketing communications,
the level describes communication-centered performance for the devices:
Importantly, the unit level includes protocol transformation because products
might put into action different protocols and, therefore, requires process
transformation for interoperability.
The network layer provides a summary of related protocols and the
conversion of the data from the devices to network-level protocols. This
layer contains information about how the network works, including how
the data in the model is transported. For networking, they may include
control options for accounting, authorization, authentication, mobility, and
network connectivity, while for transportation, they foresee user traffic trans-
portation along with the transport of management and management info for
(I)IoT service as well as applications. The service assistance and application
assistance layers include both service/application-specific and generic func-
tionality (capabilities) which allows (I)IoT applications as well as services.
Looking at the distributed character of (I)IoT services as well as programs,
there exists generic efficiency, like information processing and storage and
36 IoT and its Requirements for Renewable Energy Resources
to microgrids to carry out the optimal option. Four goals could be achieved
using the projected look as follows.
• Initially, it creates a self-contained IoT for transmitting and receiving
data from end-users.
• As a result of the foregoing, it regulates the power usage of products
based on the goals and constraints established by customers.
• Third, it provides buyers with feedback on their power consumption
patterns to help them save money and energy.
• Finally, it has inexhaustible power sources in the network.
It provides applications like remote monitoring, prognostic maintenance, and
cybersecurity and enhances the professional process, laborer well-being, and
then advanced distributed management.
To enhance the consumption of distributed power resources (DERs), the
grid must become more intelligent to improve traditional grid infrastructure
while also promising IoT coordination. Transmission operators can account
for the distribution and generation elements of the grid’s resources and
assets. Operators can regulate crucial aspects of the grid while also including
distribution. A decentralized strategy brings the generation near to the needed
load, reduces transmission losses as well as vulnerabilities, and expands
the overall dependability, versatility, efficiency, and sturdiness of the grid.
Communication is closer and bidirectional to near real-time, empowering
customers to be apt to oversee expenses and loads. Additionally, power fees
may be progressively unique. Besides, smart building products empower
intelligent equipment through the web. The smart grid bolsters the use of
even more nuanced and effective demand management plans as well as the
delivery of progressively educated methods by the customers. Intelligent
digital meters, also referred to as “smart meters,” are basic to the smart grid.
To enhance the utilization of unlimited energy resources, these grids improve
customer involvement infrastructure as well as assurance to sign up with IoT
at the community level. On a town level, a reasonable microgrid allows for
a bidirectional stream of communication and electricity between electricity
suppliers and customers. IIoT plays a critical role in addressing the issue
of non-accessibility of specific renewable energy solutions by monitoring
power use, energy generation, and integration, particularly for intelligent
microgrids. Smart microgrids improve nearby dependability by utilizing an
explicit dependability enhancement program that includes surplus distribu-
tion, clever switches, energy generation, energy storage, automation, and
other smart technologies. With the advances and switches in the electricity
38 IoT and its Requirements for Renewable Energy Resources
sector, utilities, as well as the power sector, constantly change for the long
term. Nevertheless, the grid is going to keep on being essential to the
electricity industry.
Insecure Interface:
IoT devices mostly have a screen for controlling or assigning the schedule.
This interface needs proper authentication to alter the operation.
Credentials:
Many people incorporate and use the default credentials due to a lack of
knowledge in changing the username and password. This is vulnerable to
hackers accessing and re-altering the operation.
Coding Practice:
The IoT devices are designed to be user-friendly so that the machine coding
can be changed as needed. But this has also been a challenge in privacy
concerns since the coding is done or altered without the proper coding ethics.
User Privacy:
When transitioning to advancement, the privacy of the customer/user
becomes much more important. For example, a grocery shop collects the
user’s information, particularly their location and the frequency of products
purchased. Unless the data is securely handled or encrypted, the health of the
user is exposed, which is a privacy thread concerning IoT.
Reducing Privacy Issues and Security Challenges:
IoT products are designed in such a way to be secure if the proper protocols
are followed.
Network Validation:
Proper scheduled validation needs to be done, such as network traffic and any
modifications in encryption. If the encryption is properly done, the security
issues can be reduced to some extent.
Edge Channel Validation:
With the aid of penetration assessment, the edge channel defense can be
validated for both software and hardware modules. This penetration will
reduce the recent threads on privacy issues.
Coding Ethics:
The codes of various products are kept secure to be utilized for marketing
purposes. Early safe code feedback is recommended to reduce the upcoming
challenges. On the other hand, the financial cost of rectifying the security
issues will be reduced if proper handling of the code is done at proper
intervals.
2.4 Challenges of IoT in EMS Post-implementation 41
Validation:
The competence to check and verify the actual devices connected and detect
if there is any new unknown device connected or accessing the data transmis-
sion and distribution. The energy supplier needs to validate the user’s smart
meter for consolidating the bill of use.
Genuineness:
The supplier needs to provide a security enhancement to the database so
that the accessed data or bill does not tamper illegally. Periodic software
enhancement is needed for smart meters, as the whole process relies on the
connected meter.
Inscrutability:
The secured data of the user should be made accessible only by the allocated
SG operator and the energy provider for that particular user. And, addition-
ally, the user is restricted to knowing only the particular data accessed and
not the whole accessed data of all consumers.
Privacy Protection:
Even though the SG operator and energy provider have the data of the user,
irrespective of the units consumed or energy price, the data should not be
used for any other purpose than the calculation procedure of the bill. Simply,
the data collected for billing should not be used for another purpose without
proper approval from the user.
Authentication:
Ensure that the allocated person from the SG is accessing the data on both
software and hardware. Periodic validation is required to ensure that the
allocation of rights for data access is needed. If any mismatch is noted in
the usage of power, the authorized person needs to make a field visit and
investigate whether there are any configuration issues in the smart meter or
any physical alterations have been made.
entire sensor and actuator collected data. Very few entities have invested in
developing an adequate storage space for housing all their device data. Many
have compromised on storing all the data by storing only the data based on
the need and its value. But this causes an issue when we need data, which, at
that time, may be considered unneeded. Increasing the number of data centers
will only be a part of the solution to deal with the daily increase in IoT device
usage. The proper segregation of data from the device is needed so that it is
only easily accessible with available bandwidth. For instance, if we need to
calculate the usage of power by a user, the accessing of smart meter details
should be simplified, and, most of the time, they need to be quickly accessible.
reported and made public, users’ trust in IoT devices will suffer. The data
management needs to fetch and provide the user-required data irrespective
of the available bandwidth. The issue occurs when there is saturation on the
Internet since most of the IoT devices are operated on IP. The usage of IoT
is fulfilled only when every user has trust and enhancement in the security of
the system.
Figure 2.4 (a) Exchange of information in client-server network. (b) Exchange of informa-
tion in P2P network.
access the data. The IoT-based smart grid data can be easily backtracked
consequently. In the next part, the major function of blockchain, which
benefits the IoT-implemented smart grid, is discussed.
• Nature of Distribution:
The distribution process is faster, reliable, and efficient due to the
elimination of various centralized architectural issues.
• Security Protection:
Since all the data transmission is encrypted cryptographically, the
reliability in the privacy protection is enhanced [12].
• Eminence:
The possibility of data backtracking helps in analyzing all the changes or
modifications made if any in the system. Easy traceability of blockchain
topology helps in tracing the changes that occurred in IoT devices [13].
• Credentials:
All the IoT devices have unique credentials so that the backtracking of
every IoT device is possible with the help of blockchain methodology.
Because of the shift from centralized to distributed generation, blockchain
technology has emerged as a promising solution for establishing a dependable
consensus mechanism. Blockchain allows P2P electronic payments and is
categorized into two classes, namely public chains and generalized private
chains. The public chain allows every individual or institution to join and
leave freely and is a fully open network. A private chain is a network in
which participants are subject to restrictions. Blockchain’s key characteris-
tics include its decentralized structure, distributed data storage mechanism,
consensus agreement, and asymmetric encryption for network security.
2.5 Solution to IoT Challenges 47
occurs as multiple data copies are created on networked nodes, and, also,
it would take extra storage space and more power consumption [17]. A
performance scalability problem exists in the blockchain system where the
consensus protocol can slow down the system when nodes are added. The
design flaws and bugs that exist in programs written by a human cannot be
fixed or reversed as blockchain techniques are irreversible. Verification tools
are to be designed for smart contracts or user-defined programs. Computer
network traffic occurs when the blockchain network is coordinated with other
infrastructures. Therefore, the differential functional energy organizations
have to co-operate for its implementation. The system may suffer due to
congestion in the network, deviation in voltage levels, and overloading when
integrated with physical grids.
differences and varied ranges concerning the union of IoT and cloud com-
puting systems. This difference is, to a significant degree, because of the
absence of regular tools to allow for the style of these remedies, and that
deteriorates the intricacy and also necessitates major work for their design
and architecture. This issue is aggravated by the absence of proper direction
and framework to meet non-functional and functional requirements as these
results hinge on their deployment and implementation. Additionally, data
produced by various IoT products does not obey any normal format, meaning
they are frequently signified in formats that are different, different devices,
and so on. Presently, you will find pervasive platforms and no tools for
describing IoT equipment and their distinctive capabilities in a uniform and
a regular means; so the program agents cannot just do the tasks of theirs,
for instance, automated detection and control of products (services, data,
and orchestration) [24]. One of several solutions to ease these problems is
certainly the reference architecture. The reference architectures can have fun
with an important part of the meaning of the structure blocks needed to
create architectural methods that mix IoT as well as cloud computing prin-
ciples. Referring architectures could be observed as intellectual architectures
integrating experience and science in a specific program domain, therefore
enabling the expansion, interoperability, tuning, and progress of program
systems within the specified domain.
Therefore, the recommendations indicated by reference architecture may
be viewed as important components in creating cloud-IoT besides their
increasing complexity and size. Additionally, because of the benefits of
2.5 Solution to IoT Challenges 51
much larger and more vulnerable issue that may be considered the biggest
challenge in IoT. This assumption is supported by the outstanding community
redistribution and, as a result, additional access points in the process, as well
as the inescapable importance of reliable power service. Furthermore, the
items are hooked up to have a simpler design than computer systems, which
makes it hard to implement security equipment online ordinarily. The IoT is a
great deal closer to actual existence than today’s Internet, and the private and
important info of customers and energy manufacturers is discussed on the
information system. Assaulting such a system will be the same as interfering
with the day-to-day operations of smart grid owners in the distribution,
transmission, and generation sectors.
The network and protocol security provide an Internet-protected com-
munication mechanism with identity management for authorization and
authentication to ensure that information is produced by a specific provider,
as well as limiting access, maintaining privacy, and establishing trust between
subscribers and entities to aid political aims. Finally, the most serious security
problems are IoT attack types such as denial of service (DoS), physical
2.5 Solution to IoT Challenges 53
used at any time. Some of the information can also be classified as critical
information. As a result, queries must be dynamically prioritized on the cloud
side. The bandwidth, noise, delay time, and program missing ratio are com-
monly used to calculate service quality. The level of service quality must be
determined by the data type and the urgency with which the information must
be delivered on the sync node (access point) [30]. In protocol supporting vari-
ous protocols for joining various objects on the Internet, even in the case, they
have homogeneous nature are found. For instance, an IoT sensor could use
unique protocols, like Wireless HART, IEEE 1451, Zig Bee, and also 6LOW-
PAN [31]. The gateway Hojo motor magnetic generator is required for a few
protocols, while others cannot be supported. The kind and gate of the sensor
utilized decide this. A sensor that is easier or cheaper to obtain has a higher
priority than others from the subscriber’s and user’s perspective. As a result,
there is no way to guarantee that the newly added sensor will be profitable.
The chart of typical gateway protocols could be used to solve this problem.
vehicles) and other moving objects, must map their real-time identification
to the new community they have entered. Assigning IPv6 addresses to this
pervasive network is wise since the IPv6 address space is deemed to be
ample to handle IoT systems. To overcome this issue, IPv6 employs the IP128
short address, which offers benefits such as Internet integration, continuous
connectivity, and rest compliance. SLoWPAN and Zig Bee IP protocols have
good compatibility with IPv6 in IoT-enabled embedded goods.
However, there are currently very few industrial platforms that have these
capabilities. Because of IoT adoption, devices will transition from human-
centered pursuits to networks featuring machine-to-human and machine-
to-machine connections, and IPv6 will pave the way. If IPv6 is used to
recognize the communications of objects, the widespread deployment of IPv6
becomes a contentious issue. Unless a proper, regular, and effective system
for cohabitation of IPv6 and IPv4 is implemented, the IPv6 to tools (objects)
project will not be successful [32]. According to research focused on the
coexistence of IPv6 and IPv4, the smooth transition to IPv6 should be further
developed.
2.6 Conclusion
With the rise in global demand for energy and the numerous barriers to its
extraction, like fossil fuel depletion, attention toward climate change prob-
lems, etc., the world is facing a new shift in energy generation. The advent of
IoT and its smart integration with current power distribution systems have
tremendously played a role in reducing the socioeconomic-environmental
impacts of the current energy distribution system, thus fulfilling the needs
of energy use. Faced with several challenges in this type of integrated power
distribution system, the state-of-the-art IoT power sector is poised to move
from the latest hierarchy to build a smarter, decentralized system. In this
study, we discuss the role of the IoT in the energy supply chain and the
application of smart grids in the power distribution system. Furthermore, this
article discusses the role of the IoT and its structure and challenges in inte-
grating it into the energy chain as well as tackling these challenges with IoT
support and its benefits. This study reviews the many components of an IoT
system, such as supporting communication and sensor technologies, and how
they might be used in the energy sector, such as temperature, humidity, light,
speed, passive infrared, and proximity sensors. Also, this study discusses
cloud computing and data analytic platforms, which are data analysis and
visualization tools that may be used for a variety of smart energy applications,
from buildings to smart cities. Moreover, this chapter highlights the after-
implementation challenges of IoT in energy management systems, such as
References 57
References
[1] Friess, D. A. (2016). Ecosystem services and disservices of Mangrove
forests: Insights from historical colonial observations. Forests, 7(9), 183.
https://doi.org/10.3390/f7090183.
[2] Gardoni, P., & Murphy, C. (2020). Society-based design: Promoting
societal well-being by designing sustainable and resilient infrastructure.
Sustainable and Resilient Infrastructure, 5(1-2), 4–19.
[3] Li, Z. Q., Xu, H., & Zhang, Y. (2014). Remote sensing of haze pollu-
tion based on satellite data: Method and system design. Environmental
Monitoring in China, 30(03), 159–165.
[4] Parker, D. S. (2020). The implementation of the Internet of Things
(IoT): A case study of the barriers that prevent implementation of
IoT within small and medium enterprises (SME), Doctoral dissertation,
Northcentral University.
[5] Muruganantham, B., Gnanadass, R., & Padhy, N. P. (2017). Challenges
with renewable energy sources and storage in practical distribution
systems. Renewable and Sustainable Energy Reviews, 73, 125–134.
[6] Sinsel, S. R., Riemke, R. L., & Hoffmann, V. H. (2020). Challenges and
solution technologies for the integration of variable renewable energy
sources—A review. Renewable Energy, 145, 2271–2285.
[7] Bhattacharjee, S., & Nandi, C. (2019). Implementation of industrial
internet of things in the renewable energy sector. In The Internet of
Things in the Industrial Sector, pp. 223–259, Springer, Cham.
[8] Serpanos, D., & Wolf, M. (2018). Industrial Internet of Things. In
Internet-of-Things (IoT) Systems, pp. 37–54, Springer, Cham.
[9] Al-Ali, A. R., Zualkernan, I. A., Rashid, M., Gupta, R., & AliKarar, M.
(2017). A smart home energy management system using IoT and big
data analytics approach. IEEE Transactions on Consumer Electronics,
63(4), 426–434.
[10] Salkuti, S. R. (2020). Challenges, issues and opportunities for the devel-
opment of smart grid. International Journal of Electrical and Computer
Engineering (IJECE), 10, 1179–1186.
58 IoT and its Requirements for Renewable Energy Resources
[22] Yassine, A., Singh, S., Hossain, M. S., & Muhammad, G. (2019). IoT
big data analytics for smart homes with fog and cloud computing. Future
Generation Computer Systems, 91, 563–573.
[23] Carvalho, O., Garcia, M., Roloff, E., Carreño, E. D., & Navaux, P.
O. (Sep. 2017). IoT workload distribution impact between edge and
cloud computing in a smart grid application. In Proceedings of the Latin
American High Performance Computing Conference, Springer, Cham,
pp. 203–217.
[24] Forcan, M., & Maksimoviæ, M. (2019). Cloud-fog-based approach
for smart grid monitoring simulation. Modelling Practice and Theory,
101988.
[25] Jamborsalamati, P., Fernandez, E., Hossain, M. J., & Rafi, F. H. M. (Nov.
2017). Design and implementation of a cloud-based IoT platform for
data acquisition and device supply management in smart buildings. In
Proceedings of the 2017 Australasian Universities Power Engineering
Conference (AUPEC), IEEE, pp. 1–6.
[26] Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure
integration of IoT and cloud computing. Future Generation Computer
Systems, 78, 964–975.
[27] Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research
opportunities. IEEE Internet of Things Journal, 3(6), 854–864.
[28] Cai, H., Xu, B., Jiang, L., & Vasilakos, A. V. (2016). IoT-based big data
storage systems in cloud computing: perspectives and challenges. IEEE
Internet of Things Journal, 4(1), 75–87.
[29] Zahoor, S., Javaid, S., Javaid, N., Ashraf, M., Ishmanov, F., & Afzal,
M. (2018). Cloud–fog–based smart grid model for efficient resource
management. Sustainability, 10(6), 2079.
[30] Mekala, M. S., & Viswanathan, P. (Aug. 2017). A survey: smart agricul-
ture IoT with cloud computing. In Proceedings of the 2017 international
conference on microelectronic devices, circuits and systems (ICMDCS),
IEEE, pp. 1–7.
[31] Aazam, M., Huh, E. N., St-Hilaire, M., Lung, C. H., & Lambadaris,
I. (2016). Cloud of things: Integration of IoT with cloud computing.
In Proceedings of the Robots and Sensor Clouds, Springer, Cham,
pp. 77–94. [45]. Stojmenovic, I. (Nov. 2014). Fog computing: A cloud to
the ground support for smart things and machine-to-machine networks.
In Proceedings of the 2014 Australasian Telecommunication Networks
and Applications Conference (ATNAC), IEEE, pp. 117–122.
60 IoT and its Requirements for Renewable Energy Resources
[32] Kaur, M. J., & Maheshwari, P. (Mar. 2016). Building smart cities appli-
cations using IoT and cloud-based architectures. In Proceedings of the
2016 International Conference on Industrial Informatics and Computer
Systems (CIICS), IEEE, pp. 1–5.
[33] Tom, R. J., & Sankaranarayanan, S. (Jun. 2017). IoT based SCADA inte-
grated with fog for power distribution automation. In Proceedings of the
2017 12th Iberian Conference on Information Systems and Technologies
(CISTI), IEEE, pp. 1–4.
[34] Khan, Z., Anjum, A., & Kiani, S. L. (Dec. 9–12, 2013). Cloud based
big data analytics for smart future cities. In Proceedings of the 2013
IEEE/ACM 6th International Conference on Utility and Cloud Comput-
ing, Dresden, Germany, pp. 381–386.
3
Power Quality Monitoring of Low Voltage
Distribution System Toward Smart
Distribution Grid Through IoT
Abstract
Smart distribution grid allows bidirectional power flow in the distribution
system with a mixture of multiple renewable energy sources. The distribution
system is highly affected by various power quality (PQ) disturbances like
harmonics, transients, undervoltage, overvoltage, unbalance, etc. Ensuring
the quality of power is supplied to the consumers is one of the major concerns
of the distribution company. The distribution company has to monitor the PQ
parameters at various locations of the smart distribution grid. This chapter
discusses the monitoring of various PQ problems, such as undervoltage,
overvoltage, interruption, and overload of a smart distribution system. It
employs the remote communication stations (RCS) at the various locations
of a smart distribution system. RCS monitors the various PQ parameters con-
tinuously and compares them with the reference value. It gives notifications
whenever the PQ parameters exceed the reference values. This Internet of
Things based monitoring system detects the PQ events such as undervoltage
and overvoltage, unbalanced voltage, and overload. It sends the details to the
distribution company/users using alert SMS and also on the web.
61
62 Power Quality Monitoring of Low Voltage Distribution System Toward Smart
3.1 Introduction
The distribution system is the last part of the power system, distributing
electric power to the end-users. The distribution system is the electrical
system between the sub-station and the consumer’s meters fed by the dis-
tribution system [1]. It comprises feeders, distributors, and service mains.
An AC distribution system is classified into a primary distribution system
and secondary distribution system. The primary distribution system voltages
vary in different countries. The typical primary distribution voltages are 33,
22, 11, kV carried by 3Φ, 3-W system and secondary distribution system
employs 415 V carried by 3Φ, 4-W system [2–5, 26]. Distribution systems
comprise residential, commercial, and industrial systems, and it distributes
the electric power supply to the end-users [6–8]. The distribution system
shall have high supply reliability, efficiency, and power supply quality to
its end-users [3]. To have such a distribution system, certain areas need
to be monitored and controlled. They are, location of fault identification,
clearing the fault in lesser time, effectively monitoring the power quality (PQ;
voltage and current variation), maintaining the voltage drop and PQ variation
within the acceptable tolerance limits, and maintaining the proper database of
failure/outage events [9, 10].
The distribution system is highly affected by various PQ disturbances,
such as harmonics, transients, undervoltage, overvoltage, unbalance, inter-
ruption, flicker, etc. [11–14]. The poor PQ results in premature equipment
failure, mal-operations, tripping of sensitive critical equipment, and financial
losses to end-users as well as distribution companies [15, 22]. Hence, it is
essential to monitor the PQ parameters at various locations of the distribution
grid to find out quality of the power supply is delivered to the end-users.
The equipment shall monitor the PQ parameters, such as voltage and
current transformer, PQ meter, or analyzer. With this equipment, PQ param-
eters like voltage sag, swell, transients, harmonics, flicker, etc., shall be
monitored/measured at the measurement point [16, 17]. There are two types
of PQ measurement carried out at the site. The first one is doing the mea-
surement after the failure of any devices/equipment, i.e., finding the reason
why the device/equipment failed. This method is widely used to find the
reason for failure and then propose a mitigation plan to avoid equipment
failure in the future. The second one is doing the measurement periodically
3.2 Introduction to Various PQ Characteristics 63
Figure 3.2 Typical block diagram of IoT-based monitoring of low voltage distribution
system.
1. Bluetooth communication;
2. Wi-Fi communication;
3. ZigBee communication;
4. GPS communication;
5. GPRS communication;
6. GSM communication.
1. Bluetooth Communication:
The Bluetooth communication technology is mostly used to establish com-
munication between mobile phones for data transfer in a short distance. This
method has a limited connectivity coverage area and is insecure, and free
from interference [27].
2. Wi-Fi Communication:
Like Bluetooth, Wi-Fi communication technology is also used for connection
between multiple equipment at lesser coverage distance. This method is
widely used for providing the Internet connection to the devices.
3. ZigBee Communication:
The wireless ZigBee communication is used for networking and connectivity
between the devices based on IEEE Std 802.15.4. This method is more
suitable for connecting many devices due to its network structure flexibility.
3.5 Power Quality Monitoring of Low Voltage Distribution System – Case Study 67
4. GPS Communication:
The global positioning system, in short form GPS, is satellite-based wireless
communication technology. This method offers a wider coverage range with
an accuracy range of +/-10 m.
5. GPRS Communication:
The general packet radio service, in short form GPRS, is widely used in
mobile phone communication across the globe. This method enables the
wireless connection from anywhere within the coverage range.
6. GSM Communication:
The global system for mobile, in short form GSM, is a widely used
mobile communication method. It has the frequency range of either 900 or
1800 MHz.
The experimental setup for the SLD shown in Figure 3.3 with the smart
monitoring system is shown in Figure 3.4. It consists of three-phase, 415-V,
50-Hz power source, loads (three numbers of single-phase lamps), microcon-
troller, GSM modem, current transformer, and potential transformer.
The control block diagram of the experimental setup shown in Figure 3.4
is shown in Figure 3.5. The PIC16F877A receives the load (lamps) voltage
and the current using the potential transformer and the current transformer,
respectively. It compares the voltages and current magnitudes with respect to
reference values (limits). If the limits are violated, an alarm is triggered in
addition to a pop-up on the LCD screen. The LCD and buzzer are used to
communicate the deviations in the measured voltage and current to the users
locally, while GSM-based communication is used for remote monitoring.
3.5 Power Quality Monitoring of Low Voltage Distribution System – Case Study 69
GSM modem can accept any GSM network as a SIM card and just like a
mobile phone with its unique phone number. This modem uses the RS232
port for communication with embedded applications. The SIM900A is a
complete dual-band GSM/GPRS solution in an SMT module featuring an
industry-standard interface; the SIM800 delivers GSM/GPRS 900/1800 MHz
performance for voice, SMS, data, and fax in a small form factor and with
low power consumption. The LCD can perform the local monitoring; remote
monitoring can be done through the website and mobile via SMS.
3.5.1 Undervoltage
An undervoltage is defined as a reduction of RMS voltage magnitude for over
a 1-minute time duration below specified limits. The nominal voltage is 240
V with a tolerance of ±10%. Hence, the reference voltage (lower limit) is
set as 216 V. If the monitored voltage is less than 216 V for over 1 minute,
the microcontroller sets off an alarm using the buzzer in addition to a pop-
up message on the LCD as “undervoltage.” The flow chart of undervoltage
identification is shown in Figure 3.6.
If the consumer’s phase voltage reduces below the reference value, an
alert notification is sent via SMS using the GSM module. Additionally,
the same information is recorded and communicated through a webpage.
Figure 3.7 illustrates the notifications received by the customer through
SMS text.
3.5.2 Overvoltage
An overvoltage is defined as the increase in RMS voltage magnitude over
a 1-minute time duration. The nominal voltage is 240 V with a tolerance
of ±10%. Hence, the reference voltage is set as 264 V. If the measured
70 Power Quality Monitoring of Low Voltage Distribution System Toward Smart
voltage is higher than 264 V for over 1 minute, then the microcontroller sets
off an alarm using the buzzer in addition to a pop-up message on the LCD
as “overvoltage.” The flow chart of overvoltage identification is shown in
Figure 3.8.
Figure 3.9 illustrates the SMS received by the consumer during the advent
of an upper limit violation on the voltage.
3.5 Power Quality Monitoring of Low Voltage Distribution System – Case Study 71
3.5.3 Interruption
An interruption is defined as a decrease in RMS voltage magnitude less than
0.1 pu. If the time duration is less than 1 minute, then it is called a momentary
interruption, and if it is 1 minute, it is called a sustained interruption. The
nominal voltage is 240 V with a tolerance of ±10%. Hence, the reference
voltage is set as 24 V. If the measured voltage is lesser than 24 V for less than
1 minute which is a momentary interruption and over 1-minute time duration
which is sustained interruption, then the microcontroller will send an alarm
through the buzzer and pop-up through LCD as an interruption. The flow
chart of interruption identification is shown in Figure 3.10.
72 Power Quality Monitoring of Low Voltage Distribution System Toward Smart
The end-user will receive the SMS in mobile phone for voltage interrup-
tion alert as shown in Figure 3.11.
overloading of branch circuits. For example, the nominal current of the load is
100 A. If the current flow in this branch is over 100 A, it is called overloading.
Up to 10% of the overloading (on the nominal value) is acceptable. To
identify the branch circuit’s overloading, the reference current is set as 0.2
A. If the measured current is higher than 0.2 A, the microcontroller will send
an alarm through the buzzer and pop-up through the LCD as overcurrent. The
flow chart of overvoltage identification is shown in Figure 3.12.
The end-user will receive the SMS in mobile phone for overcurrent alert
as shown in Figure 3.13.
3.6 Conclusion
In the modern world, electricity is one of the basic needs of human beings.
Supplying the quality and high reliable power supply is the most impor-
tant concern for all the distribution companies. This chapter discusses the
PQ monitoring at a low voltage smart distribution system through contin-
uous monitoring with advanced features like analyzing the PQ parameter,
storing/keeping the proper database, etc. It also sends the alert notification
to the users via SMS and real-time monitoring on the web page. Power
distribution companies can supply a more reliable power supply to their
customer by using this monitoring system.
References 75
References
[1] P. Sivaraman and C. Sharmeela, Introduction to electric distribution
system. In B. Kahn, H. H. Alhelou, and Ghassan (Eds.), Handbook of
Research on New Solutions and Technologies in Electrical Distribution
Networks. Hershey, PA: IGI Global, 2020, pp. 1–31.
[2] P. Sivaraman and C. Sharmeela, Existing issues associated with electric
distribution system. In B. Kahn, H. H. Alhelou, and Ghassan (Eds.),
Handbook of Research on New Solutions and Technologies in Electrical
Distribution Networks. Hershey, PA: IGI Global, 2020, pp. 1–31.
[3] T.S. Somkuwar and M.G. Panjwani, Review paper on electrical distri-
bution line monitoring, International Journal of Advance Research in
Computer and Communication Engineering, 2015.
[4] P. Sivaraman, D. Gunapriya, K. Parthiban, and S. Manimaran, Hybrid
fuzzy PSO algorithm for dynamic economic load dispatch, Journal
of Theoretical and Applied Information Technology, vol. 62, no. 3,
pp. 794–799, April 2014.
[5] P. Sivaraman, S. Manimaran, K. Parthiban, and D. Gunapriya, PSO
approach for dynamic economic load dispatch problem, International
Journal of Innovative Research in Science, Engineering and Technology,
vol. 3, no. 4, pp. 11905–11910, April 2014.
[6] P. Sivaraman, C. Sharmeela, R. Mahendran, and A. Thaiyal Nayagi,
Basic Electrical and Instrumentation Engineering. Hoboken, NJ: John
Wiley & Sons, 2020.
[7] P. Sivaraman, C. Sharmeela, and D.P. Kothari, Enhancing the voltage
profile in distribution system with 40 GW of solar PV rooftop in Indian
grid by 2022: A review, In Proceedings of 1st International Confer-
ence on Large Scale Grid Integration of Renewable Energy in India,
September 2017.
[8] IEEE Std 141-1993, IEEE Recommended Practice for Electrical Power
Distribution for Industrial Plants.
[9] IEEE Std 1100-2005, IEEE Recommended Practice for Powering and
Grounding Electronic Equipment.
[10] IEEE Std 1159-2019, IEEE Recommended Practice for Monitoring
Electric Power Quality.
[11] P. Sivaraman and C. Sharmeela, Power quality problems associated
with electric vehicle charging infrastructure. In P. Sanjeevikumar, C.
Sharmeela, and J. B. Holm-Nielsen (Eds.), Power Quality in Modern
Power Systems. Amsterdam: Elsevier, 2021.
76 Power Quality Monitoring of Low Voltage Distribution System Toward Smart
Abstract
Electricity places an important role in the modern world. Transformers are
one of the key piece of equipment in modern power systems. Because of
various reasons, the failure of transformers can happen unexpectedly, result-
ing in a power supply outage to the end-users. Distributed generation (DG)
allows the bidirectional power flow in the system with higher integration of
distributed renewable energy sources (RES), especially solar photovoltaics.
It is possible to install the solar PV system in the range between 10%
and 120% of the distribution transformer rating under the DG. Failures of
distribution transformers affect the power supply to end-users and the DG
integration into the distribution grid. Consistent monitoring of distribution
transformers by means of physical inspection is one of the major concerns
of distribution companies/end-users to prevent unexpected failure. Currently,
distribution transformer parameters like state of working (i.e., online/offline)
is monitored, and other parameters like oil level, oil temperatures, winding
temperature, etc., are not monitored from the remote end. This chapter
discusses the monitoring of health conditions of a laboratory prototype
250-VA single phase oil-immersed transformer using Internet of Things (IoT)
technology to achieve the conventional distribution systems toward a smart
distribution system.
79
80 Health Monitoring of a Transformer in a Smart Distribution System using IoT
4.1 Introduction
Conventionally, electricity is generated by large power plants at remote loca-
tions and the power is then transferred to the load center [3]. Power flow in the
conventional power system is unidirectional, and transformers here play an
important role. The modern electric power systems allow bidirectional power
flows with smart communication devices. The concept of distributed gener-
ation (DG) introduced localized power generation closer to the load center
and it allows bidirectional power flow into the system. It is possible to install
the solar PV system in the range between 10% and 120% of the distribution
transformer rating under the DG [22]. Failures of distribution transformers
affect the power supply to end-users and the DG integration into the distri-
bution grid. The end-users always need high reliability in input power supply
from the distribution company for trouble-free operation of their loads. The
supply’s reliability depends on the performance of the equipment in the sys-
tem, particularly transformers [23–25]. An unexpected failure of distribution
transformers results in power outages to the end-users, reducing the reliability
of the power supply. Usually, power or distribution transformers have a
20–35-year design lifetime, and this can be extended up to 60 years with
good maintenance in practice. Failure of distribution transformers is common
because of poor maintenance, overloading and harmonics, lightning over cur-
rent/voltages, internal/external loose connections, and internal/external short
circuits. Hence, monitoring transformers are essential for high supply relia-
bility to the end-users in the distribution system towards the smart distribution
system. Presently, PLC-based systems are used for monitoring transformers
locally at the site location. In a distribution system in metro cities, many dis-
tribution transformers are in place/operation, and it is difficult to monitor all
of them locally. Hence, it is essential to monitor all the distribution transform-
ers in a common/centralized location. An Internet of Things (IoT) based tech-
nology enables the monitoring of many distribution transformers used in the
distribution system at a commonplace, i.e., central monitoring control center
or main control center. An IoT-based system has been designed so that it will
continuously monitor the essential parameters of the transformers through-
out its day-to-day operation. The controller is used to compare the various
measured parameters (like the voltage, current, oil level, or temperature) with
the reference values. If any values exceed the reference value, it will give the
notification and/or alarm to prevent damage/failure/tripping.
4.2 Introduction to the Transformer 81
Figure 4.3 shows the typical block diagram of IoT-based health monitor-
ing of oil-immersed distribution transformer.
The IoT-based system monitors the oil-immersed transformer essential
parameters throughout its operation continuously. They are oil temperature,
winding temperature, oil level, voltage, and current flow. The sensors are used
to measure these parameters and communicate the measured values to the
microcontroller.
4.4.4 Microcontroller
A microcontroller is a device used to compare the various measured quan-
tities, such as oil temperature, winding temperature, oil level, voltage, and
current with the pre-defined or reference values. It will communicate with a
local LCD for local monitoring and remote monitoring through IoT. If any
of the measured values exceeds the reference value, it will initiate the alarm
and/or notification.
GSM acts as a receiver and will receive the signal from the remote site
location.
Figure 4.5(a) shows the experimental hardware setup, and the single-
phase transformer is shown in Figure 4.5(b).
Figure 4.6(b) Online screenshot of the web page – high winding temperature.
References 89
4.6 Conclusion
The IoT-based health monitoring of the transformer is presented in this
chapter. The essential parameters such as oil level, winding temperature,
oil temperature, ambient temperature rise, and transformer loading can be
monitored continuously throughout its operation. If any parameter exceeds
the reference value, it will give the abnormality alarm/notification. Necessary
preventive action needs to be taken immediately to prevent the transformer
from failing. The IoT-based method is very convenient for monitoring many
distribution transformers in urban distribution systems in metro cities like
Chennai. As compared with manual monitoring, this method is much useful
and reliable.
References
[1] J. Singh, S. Singh, and A. Singh, Distribution transformer failure modes,
effects, and criticality analysis (FMECA), Engineering Failure Analysis,
pp. 180–191, vol 99, 2019.
[2] R. Murugan and R. Ramasamy, Failure analysis of power transformer
for effective maintenance planning in electric utilities, Engineering
Failure Analysis, pp. 182–192, vol 55, 2015.
[3] P. Sivaraman, C. Sharmeela, R. Mahendran, and A. T. Nayagi, Basic
Electrical and Instrumentation Engineering, John Wiley & Sons, 2020.
[4] A.-R. AI-Ali, A. Khaliq, and M. Arshad, GSM-based distribution
transformer monitoring system, IEEE MELECON 2004, Croatia, May
12–15, 2004, pp. 999–1002, vol. 3.
[5] D. Duttachowdhury, V. Patil, A. Parab, R. Patel, and K. Niikum, Trans-
former monitoring and control using IoT, IOSR Journal of Engineering,
pp. 40–43, vol. 10, Mar. 2018.
[6] R. Singh and A. Singh, Causes of failure of distribution transformers
in India, 9th International Conference on Environment and Electrical
Engineering (EEEIC 2010), 2010, pp. 388–391.
[7] P. Sivaraman and C. Sharmeela, Introduction to electric distribution
system. In B. Kahn, H.H. Alhelou, & Ghassan (Eds.), Handbook of
Research on New Solutions and Technologies in Electrical Distribution
Networks, pp. 1–31. Hershey, PA: IGI Global, 2020.
90 Health Monitoring of a Transformer in a Smart Distribution System using IoT
[19] C.D. Oancea, GSM infrastructure used for data transmission, 7th Inter-
national Symposium on Advanced Topics in Electrical Engineering
(ATEE), May 2011, pp. 1–4.
[20] P. Kore, V. Ambare, A. Dalne, G. Amane, S. Kapse, and S. Bhavarkar,
IoT based distribution transformer monitoring and controlling system,
International Journal of Advance Research and Innovative Ideas in
Education, pp. 122–126, vol 5, no. 2, 2019.
[21] P. Dimpal, P. Mayank, G. Pratik, K. Pramod, and D. Kshitija, Monitor-
ing and controlling of transformer using IoT, International Journal of
Advance Research and Innovative Ideas in Education, pp. 1250–1256,
vol 6, no. 5, 2020.
[22] P. Sivaraman, C. Sharmeela, and D.P. Kothari, Enhancing the voltage
profile in distribution system with 40 GW of solar PV rooftop in Indian
grid by 2022: A review, 1st International Conference on Large Scale
Grid Integration of Renewable Energy in India, Sep. 2017.
[23] P. Sivaraman and C. Sharmeela, Power quality and its characteristics, In
P. Sanjeevikumar, C. Sharmeela, & J. B. Holm-Nielsen (Eds.), Power
Quality in Modern Power Systems, Cambridge, MA: Academic Press,
2021.
[24] P. Sivaraman and C. Sharmeela, Power system harmonics, In P. Sanjee-
vikumar, C. Sharmeela, & J. B. Holm-Nielsen (Eds.), Power Quality in
Modern Power Systems, Cambridge, MA: Academic Press, 2021.
5
Introduction To Machine Learning
Techniques
93
94 Introduction To Machine Learning Techniques
Y = f (x). (5.1)
5.2.1.1 Classification
If an output variable is categorical, then a classification algorithm is applied
to get intended results. This means it consists of classes for respective data
[9, 10].
98 Introduction To Machine Learning Techniques
y = f (x). (5.2)
5.2.1.2 Regression
For relating input variable and output variable, the regression algorithms
come into services and are applied for the prediction of continuous output
variables (output is always real value) [11]. Following are some favored
regression algorithms:
• linear regression;
• non-linear regression;
• Bayesian linear regression;
• regression trees.
The difference between the classification algorithm and the regression algo-
rithm is given in Table 5.2.
5.2.2.1 Clustering
In clustering, the objects are grouped into clusters such as one group of
objects with higher feature similarities and one new group of objects with
lower or no feature similarities.
5.2.2.2 Association
Association is used to find correlation within dataset variables. This means
the bunch of things that seem jointly in the dataset is determined by associa-
tion [14]. It is nothing but finding a rule which reports about the dataset.
The analysis of the market basket (a person wants to purchase A as well
as B) is the best example of association.
Following are some favored unsupervised learning algorithms.
• KNN (k-nearest neighbors);
• anomaly detection;
• K-means clustering;
• principle component analysis;
• neural networks.
Table 5.3 presents the advantages and disadvantages of both supervised and
unsupervised learning, as well as the difference between them, which is given
in Table 5.4.
Table 5.3 Advantages and disadvantages of supervised learning and unsupervised learning.
Supervised Advantages • It helps the model to predict the outruns
learning based on earlier experiences.
• It solves mostly occurring real-world issues.
• In this, we get a precise idea regarding
object classes.
Disadvantages • It cannot handle critical tasks.
• The computation time is large for model
training.
• It is not able to predict right outruns if the
test and train data are different.
Unsupervised Advantages • It handles critical tasks because it does not
learning comprise input labeled data.
• It is favored mostly because unlabeled data
is available simply as compared to labeled
data.
Disadvantages • It is a hard technique as compared to
supervised learning as it does not comprise
consistent outturns.
• The results might not seem so much correct
due to no pre-idea about outturns.
feedback, the smart factor or agent obtains a positive point and negative point,
respectively.
c) State () –
After the movement of smart factor or agent, the environment gives back
its place.
d) Action () –
The movements of the smart factor or agent inside the environment.
e) Policy () –
It is the plan of the action appealed by the smart factor or agent for the
following action or movement on the present state.
f) Reward () –
It is the feedback given to the smart factor or agent by the environment
or surrounding to assess the movement of smart factor or agent.
g) Q-value () –
It is similar to the value; even so, it catches one extra parameter like
current action or movement (a).
h) Value () –
It is inverse to the short-term reward and looked for long-term return.
b) Negative Reinforcement
It is inverse to the positive reinforcement and newly enhances the
tendency of coming behavior by keeping negative terms away.
It is highly productive than positive reinforcement and based on behavior
as well as places.
The difference between supervised learning and RL is given in
Table 5.5.
• Sigmoid Function:
This mathematical function is applied for mapping the predicted values to
probabilities. In this, assessment is done for real value into a different value
on a scale of 0 and 1. So, it is said that this algorithm is based on the threshold
value. The logistic regression values do not go across the boundary, and, due
to this, the S-form of the curve is structured and known as the logistic function
or sigmoid function.
• Theories:
The dependent variable must remain a categorical kind. The multi-
collinearity should not be applicable for the independent variable.
• Mathematical Equation:
This equation is gained from the linear regression equation. We have the
straight-line equation as follows:
y = b0 + b1 × 1 + b2 × 2 + · · · + bn × n. (5.3)
Now divide the above equation by 1 - y, and we get the following:
log [ y / (1 − y) ] = b0 + b1 × 1 + b2 × 2 + · · · + bn × n. (5.5)
• Make a node of the decision tree for covering the greatest attribute.
• Create newer decision trees by utilizing an earlier initiated subset of a
given dataset and repeat this process till getting the final node which
cannot be classified further which is nothing but leaf node.
How to select attribute for root and sub-nodes?
The attribute selection technique (ASM) is utilized for a selection of the
finest attribute for root and sub-nodes. It has two types as given below with
mathematical equations.
• Information Gain:
It computes the total of information about the class provided by the feature.
The formula for calculating information gain is as follows:
This algorithm is easy and valuable for decision-related issues and involves
less data cleaning.
• Mathematical Equation:
The basic equation of regression is given as follows:
y = c + b ∗ x. (5.9)
Here, b = coefficient of regression, c = constant, x = score of proceeding
independent variable, and y = score of projected dependent variable.
It is of two types, namely simple linear regression and multiple linear
regression.
The linear regression line represents the correlation between the depen-
dent and independent variables. Figure 5.8 signifies about positive linear
relationship, whereas Figure 5.9 depicts a negative linear relationship.
This equation provides the nearest neighbors for the newer data point in the
feature space as described for class C and class D in Figures 5.10 and 5.11.
The selection of value K in the model is completely trial and error based.
So, we have to go with some values for K, and if we get the intended results,
then we fix it further. Generally, K = 5 is favored in distinct issues. For lower
values of K, we find mostly outliers mean nosiness.
110 Introduction To Machine Learning Techniques
Figure 5.11 Feature space with classification of newer arising data point.
WithinClusterSumofSquares(WCSS) =
P i in Cluster1 Distance(P i C1)2
+ P i in Cluster2 Distance(P i C2)2
+ P i in Cluster3 Distance(P i C3)2
+ P i in Cluster4 Distance(P i C4)2. (5.11)
Here, P i in Cluster1 Distance(P i C1)2 is the sum of the square of the
distances concerning individual data point and related centroid inside the
cluster and is similar for every cluster. The distance between data points can
be calculated either by Manhattan distance or by Euclidean distance. That is
all about K-means for solving real-world issues.
applications [6]. Object detection and object tracking are now utilized in a
score of fields such as autonomous navigation, military applications, security
purposes, etc. [7].
Let us take some real-world examples with python programming.
image = cv2.imread("imagePath")
hog = cv2.HOGDescriptor()
hog.setSVMDetector(cv2.HOGDescriptor_getDefaultPeopleDetector())
while True:
imageDetect = imutils.resize(image, width=400)
timingdetails = datetime.datetime.now()
timingdetails = timingdetails.strftime(“%A %d %B %Y
%I:%M:%S%p”)
cv2.putText(imageDetect, timingdetails, (10, imageDetect.shape[0] - 10),
cv2.FONT_HERSHEY_SIMPLEX,
0.35, (255, 0, 255), 1)
threshold = 160
maximunValue = 255
framePath = “trumpGg.jpg”
frame = cv2.imread(framePath)
frame = imutils.resize(frame, 400)
kernelSize = 11
frame1 = cv2.GaussianBlur(src ,(3, 3),0,0)
laplacian = 10 * (cv2.Laplacian(frame1,cv2.CV_64F, ksize = kernelSize))
threshold, laplacian = cv2.threshold(laplacian , threshold, maximunValue,
cv2.THRESH_BINARY_INV)
cv2.imshow(“Laplacian”, dst)
cv2.imshow(“framea”, framea)
cv2.imshow(“frameb”, color)
cv2.imshow(“framec”, gray)
cv2.imshow(“framed”, frameb)
cv2.waitKey(0)
cv2.destroyAllWindows()
Output Image:
Figure 5.15 shows the output images of Instagram filtering.
station to the intended area. Whereas, the smart grid operates on double-
route interaction, and, in this, information and electricity are interchanged.
The energy Internet is also a booming concept which involves the trend of the
Internet of Things with smart grid power systems. The smart grid empowers
solar and wind types of renewable energies [25], [26]. Overall, ML techniques
help the modern hybrid power systems to predict and make decisions on
acquired data as shown in Figure 5.16. This makes the power system most
effective, credible, safe, and greener [29].
Let us have a look at some instances.
The composite inputs of time series are the major issue due to the
undetermined nature of supplies of renewable energy and it invites to apply
ML techniques such as convolutional neural network (CNN), multilayer per-
ception (MLP), long short-term memory (LSTM), recurrent neural network
(RNN), etc. These help to make predictions on short-term time-series in
resources of renewable energy and power system [28]. Specifically, solar
energy is the central resource of pure energy and is known for large electrical
5.6 Conclusion 117
power stations related to the smart grid. The administration and steady func-
tioning of the power system are affected by intermittency and randomness
of solar energy. For this, the CNN and LSTM types of ML techniques
are utilized for forecasting the photovoltaic (PV) output power correctly.
These techniques have been applied for actual PV data in Belgium and
Limberg [27].
The hybrid power plant consists of a wind generator and solar panels. In
this, neural network type of advanced ML technique has been applied to direct
the electricity allocation generated in hybrid power plant via controller [30].
The ML techniques help for the smart controlling and output predictions in
power system applications [31]. At the length, the renewable modern hybrid
power system is now the need in distinct human working fields.
5.6 Conclusion
In conclusion, the ML technique is the finest revolution for advancement in a
score of human working fields. It is of three types such as supervised learning,
unsupervised learning, and RL technique. Supervised learning resolves two
kinds of problems such as classification and regression, whereas unsupervised
learning functions for clustering and association issues. RL is utilized for
118 Introduction To Machine Learning Techniques
References
[1] A. Voulodimos, N. Doulamis, A. Doulamis, and E. Protopapadakis.
Deep learning for computer vision: A brief review. Computational
Intelligence and Neuroscience, 2018.
[2] E. Alpaydin. Introduction to Machine Learning, 2020, MIT Press,
Cambridge, MA, USA.
[3] T.D. Buskirk, A. Kirchner, A. Eck, and C.S. Signorino. An introduction
to machine learning methods for survey researchers. Survey Practice,
11(1), 1–10, 2018.
[4] M. Kubat. An Introduction to Machine Learning, 2017, Springer, Cham.
[5] J. Brownlee, Machine Learning Mastery with Python, 527, 100–120,
2016.
[6] O.S. Vaidya, R. Patil, G.M. Phade, and S.T. Gandhe. Embedded vision
based cost effective tele-operating smart robot. International Journal
of Innovative Technology and Exploring Engineering (IJITEE), 8(7),
1544–1550, 2019.
[7] R.R. Patil, O.S. Vaidya, G.M. Phade, and S.T. Gandhe. Qualified
scrutiny for real-time object tracking framework. International Journal
on Emerging Technologies, 11(3), 313–319, 2020.
[8] S.B. Kotsiantis, I. Zaharakis, and P. Pintelas. Supervised machine
learning: A review of classification techniques. Emerging Artificial
Intelligence Applications in Computer Engineering, 160(1), 3–24, 2007.
References 119
Abstract
At present, renewable energy resources like solar and wind attracted abundant
attention, and thanks to their green, clean, inexhaustible, and recycled nature
and them being free from carbon emission, renewable energy resources are
the foremost promising alternative to fossil fuels. Though renewable energy
resources are accessible freely, their higher upfront price, environmental
dependency, and lower efficiency act as a barrier to wider implementation.
The demerits of renewable energy resources are volatility, intermittence, and
uncertainty which affect the stability and reliability of large-scale renewable
integration into the power generation. Hence, researchers are exploring pos-
sibilities to boost accessibility and efficiency with the help of technology
such as machine learning. Deep learning, a promising kind of machine
learning technique, can be incorporated with renewable energy, especially
solar photovoltaic (PV) systems, in three major categories, such as fore-
casting, accessibility, and efficiency. Boosting the efficiency of a solar PV
system requires maximum power point tracking (MPPT), which maximizes
the extraction of available maximum power from PV modules. As the con-
ventional MPPT algorithms have no prior knowledge of the maximum power
point (MPP) at the beginning of the perturbation, these MPPTs demand
a long convergence time to achieve MPP. The need for prior knowledge
of MPP is necessary to start any conventional MPP algorithm, which the
121
122 Machine Learning Techniques for Renewable Energy Resources
6.1 Introduction
Despite the abundance of green energy resources today, fossil fuels remain
the world’s primary resource of energy. Fuels that are considered fossil
are hydrocarbons or their derivatives, together with natural resources like
coal, petroleum oil, and natural gas. Fuels take a long time to form; so
the well-known oil resource reserves are depleting faster than they can be
replenished. Also they release greenhouse gases, which cause environmental
change such as global warming, putting the environment at risk. Green energy
has, therefore, gained a great lot of attention worldwide in recent years. A
renewable energy source can be recycled into new energy in nature, such
as solar power, wind energy, tidal energy, or geothermal energy. Renewable
energy has two major advantages over fossil fuels. A few things to remember
about renewable energy resources are that they are abundant, renewable,
and inexhaustible. The second benefit is that renewable energy is carbon-
free, green, and clean and, thus, benefits the environment. In particular,
renewable energy can effectively reduce the emission of carbon monoxide
(CO), sulfur dioxide (SO2), and dust, thereby reducing atmospheric pollution
and greenhouse gas emissions. Aside from that, the use of renewable energy
can diminish the need to exploit petroleum, and this will also help to protect
the environment. It can reduce solid waste discharge, which reduces soil
pollution. By using renewable energy, water resources are also protected by
reducing the waste gases and waste liquids emitted during the process. Thus,
renewable energy has become very popular in recent years [1].
In light of the rapid industrialization of our planet, it has become clear
that excessive consumption of petroleum will accelerate the loss of fossil
fuel reserves and harm the environment. Ultimately, this will lead to health
concerns and global climate change. The wind and sun are currently the
fastest-growing energy sources, along with petroleum and nuclear energy.
Solar, wind, hydropower, biomass, waves, tides, and geothermal heat are
6.1 Introduction 123
Figure 6.1 Difference between deep learning with machine learning and artificial
intelligence.
6.2 Overview of Machine Learning 127
Figure 6.2 Difference between model (a) development of traditional programming and (b)
development of machine learning programming.
model. Then model assessment metrics are vital to enumerate the model. The
model assessment aims to evaluate the generalization accuracy of a model
on future information. Deep learning, a promising kind of machine learning
able to predict non-linear features, has been reported in the literature. Its
architectures are reported in the next section.
‘
h = tanh(Wh .xt +r ∗Uh .h(t−1)+bz ; ; h = z ∗h(t−1)+(1−z)∗h (6.4)
where
r is the relevance gate;
h is the current cell state;
h(t - 1) is the previous cell state;
W, U are weights;
z is the update gate.
multiplication step. The sigmoid type layer delivers output as a number which
is between 0 and 1. That output number describes what quantity of every
part ought to be let through. The output value of 0 suggests that “let nothing
through,” whereas a value of 1 suggests that “let everything through.” An
LSTM has three of those gates to save and control the cell states. They are
forget, input, and output gates. Every LSTM module comprises four layers
or structures. The primary layer of LSTM is to come to a decision on what
data is suitable to throw out from the past states (ht−1 and xt ) and is set by
sigmoid or forget gate layer based on output Ct−1 . If Ct−1 is 1, it denotes
“completely keep” and else “completely get rid of” which is shown in the
following equation:
where
ft is the forget gate;
it is the update gate;
Ct is the current cell state;
ht−1 is the previous output;
xt is the input;
W is the weight;
Ot is the output gate.
diode identity factor, as well as the modified one that includes a series resistor.
Figure 6.10 shows a PV cell with a single diode.
where Isc is the short circuit current provided by the PV panel at a reference
temperature and an irradiance of 1 kW/m2 , Ki (= 3 mA/◦ C) is the temperature
coefficient, G is the solar irradiance in kW/m2 , and T and Tref are measured
temperature and reference temperature, respectively. The output current is
then given in the following equation:
Figure 6.12 (a) V–I curve. (b) P–V curve under varying atmosphere condition.
like inductor ripple current, input ripple current, and minimum load. The
following sections summarize the design of the DC-DC buck and boost
converters formula and the values are tabulated in Table 6.3.
6.6 Simulation Results and Discussion 139
Figure 6.15 (a) Influence of irradiation variation. (b) Influence of temperature variation. (c)
Response of the proposed MPPT algorithm in PV system.
The comparison has also been made for the recorded V max from the data
logger and LSTM algorithm predicted value and is tabulated in Table 6.4.
It is also observed that the error percentage in both cases is very less in the
proposed LSTM algorithm. The training progress of V max is also shown in
Figure 6.18.
Figure 6.17 The predicted value of Vmax for another 365 days.
Figure 6.19 Converter output voltage with and without the utilization of LSTM Vref value
in P&O MPPT.
References
[1] Kotsiantis, S.B. Supervised machine learning: A review of classification
techniques. Informatica 2007, 31, 249–268.
[2] Qiu, J., Wu, Q., Ding, G., Xu, Y., Feng, S. A survey of machine learning
for big data processing. EURASIP J. Adv. Signal Process. 2016, 2016,
67.
[3] Gu, J., Wang, Z., Kuen, J., Ma, L., Shahroudy, A., Shuai, B., Liu, T.,
Wang, X., Wang, L., Wang, G., et al. Recent advances in convolutional
neural networks. Pattern Recognit. 2017, 1, 1–24.
[4] Amasyali, K., El-Gohary, N.M. A review of data-driven building energy
consumption prediction studies. Renew. Sustain. Energy Rev. 2018, 81,
1192–1205.
[5] Wang, H.Z., Lei, Z.X., Zhang, X. A review of deep learning for
renewable energy forecasting. Energy Convers. Manage. 2019, 198,
111799.
[6] Olabi, A.G. Renewable and energy storage system. Energy 2017, 136,
1–6.
[7] Zendehboudi, A., Baseer, M.A., Saidur, R. Application of support vector
machine models for forecasting solar and wind energy resources: A
review. J. Clean. Prod. 2018, 199, 272-285.
[8] Bosch, J., Kleissl, J. Cloud motion vectors from a network of ground
sensors in a solar power plant. Sol. Energy 2013, 95, 13–20.
[9] Dong, Z., Yang, D., Reindl, T., Walsh, W.M. Satellite image analysis and
a hybrid ESSS/ANN model to forecast solar irradiance in the tropics.
Energy Convers. Manage. 2014, 79, 66–73.
[10] Hohm, D.P., Ropp, M., 2000. Comparative study of maximum power
point tracking algorithms using an experimental, programmable, max-
imum power point tracking test bed, in: Conference Record of
the Twenty-Eighth IEEE Photovoltaic Specialists Conference, 2000,
pp.1699–1702.
References 147
[11] Inman, R.H., Pedro, H.T., Coimbra, C.F. Solar forecasting methods for
renewable energy integration. Prog. Energy Combust. Sci. 2013, 39,
535–576.
[12] Mahamadou, A.T., Mamadou, B.C., Brayima, D., Cristian, N. Ultra-
capacitors and batteries integration for power fluctuations mitigation
in wind-PV-diesel hybrid system. Int. J. Renew. Energy Res. 2011, 1,
86–95.
[13] Yang, D., Sharma, V., Ye, Z., Lim, L.I., Zhao, L., Aryaputera, A.W.
Forecasting of global horizontal irradiance by exponential smoothing,
using decompositions. Energy 2015, ISSN 0360-5442.
[14] Teleke, S., Baran, M., Bhattacharya, S., Huang, A. Rule-based control
of battery energy storage for dispatching intermittent renewable sources.
IEEE Trans. Sustain. Energy 2010, 1,117–124.
[15] Quesada-Ruiz, S., Chu, Y., Tovar-Pescador, J., Pedro, H., Coimbra,
C. Cloud-tracking methodology for intra-hour {DNI}forecasting. Sol.
Energy 2014, 102, 267–275.
[16] Yang, H., Kurtz, B., Nguyen, D., Urquhart, B., Chow, C.W., Ghonima,
M., Kleissl, J. Solar irradiance forecasting using a ground based sky
imager developed at UC San Diego. Sol. Energy 2014, 103, 502–524.
[17] Guerriero, P., Napoli, F.D., Vallone, G., d’Alessandro, V., Daliento, S.
Monitoring and diagnostics of PV plants by a wireless self-powered
sensor for individual panels. IEEE J. Photovolt. 2016, 6, 286–294.
[18] Nikitidou, E., Kazantzidis, A., Tzoumanikas, P., Salamalikis, V., Bais,
A. Retrieval of surface solar irradiance, based on satellite-derived cloud
information, in Greece. Energy 2015, 90(Part 1), 776–783.
[19] Yang, D., Quan, H., Disfani, V.R., Liu, L., Reconciling solar forecasts:
Geographical hierarchy. Solar Energy 2017, 146, 276–286.
[20] Wu, X., Zhu, X., Wu, G.Q., Ding, W. Data mining with big data. IEEE
Trans. Knowl. Data Eng. 2014, 26, 97–107.
[21] Wang H., Ruan J., Wang G., et al. Deep learning based interval state
estimation of AC smart grids against sparse cyber attacks. IEEE Trans.
Ind. Inf. 2018, 14(11), 4766–4778.
[22] Benjamin, P., Marc, M., Philippe, P., Batista, D. J. Historical trends in
global energy policy and renewable power system issues in Sub-Saharan
Africa: The case of solar PV. Energy Policy 2019, 127, 113–24.
[23] Yongning, Z., Lin, Y., Zhi, L., Xuri, S., Yansheng, L., Su, J. A novel
bidirectional mechanism based on time series model for wind power
forecasting. Applied Energy 2016, 177, 793–803.
148 Machine Learning Techniques for Renewable Energy Resources
[24] Laura, F.-P., Fermín, M., Martín, G.-R., Teresa, L. Assessing energy
forecasting inaccuracy by simultaneously considering temporal and
absolute errors. Energy Convers Manage 2017, 142, 533–546.
[25] Short, W., Packey, D.J., Holt, T.A. Manual for the Economic Evaluation
of Energy Efficiency and Renewable Energy Technologies. Golden,
CO, USA: U.S. Department of Energy Managed by Midwest Research
Institute for the U.S. Department of Energy, 1995.
[26] Gasparin, A., Lukovic, S., Alippi, C. Deep learning for time series
forecasting: The electric load case. arXiv, 2019.
[27] Jafar, A., Lee, M. Performance Improvements of Deep Residual Con-
volutional Network with Hyperparameter Opimizations. Seoul, Korea:
The Korea Institute of Information Scientists and Engineers, 2019,
pp. 13–15.
[28] Sezer, O.B., Gudelek, M.U., Ozbayoglu, A.M. Financial time series
forecasting with deep learning: A systematic literature review.
2005–2009, arXiv, 2019.
[29] Bengio, Y., Simard, P., Frasconi, P. Learning long-term dependencies
with gradient descent is difficult. IEEE Trans. Neural Netw. 1994, 5,
157–166.
[30] Chung, J., Gulcehre, C., Cho, K., Bengio, Y. Empirical evaluation of
gated recurrent neural networks consequence modeling. arXiv, 2014.
[31] Aslam, M., Lee, J., Kim, H., Lee, S., Hong, S. Deep learning models for
long-term solar radiation forecasting considering microgrid installation:
A comparative study. Energies 2019, 13, 147.
[32] Che, Y., Chen, L., Zheng, J., Yuan, L., Xiao, F. A novel hybrid model
of WRF and clearness index-based Kalman filter for day-ahead solar
radiation forecasting. Appl. Sci. 2019, 9, 3967.
[33] Zhang, X., Wei, Z. A hybrid model based on principal component
analysis, wavelet transform, and extreme learning machine optimized by
bat algorithm for daily solar radiation forecasting. Sustainability 2019,
11, 4138.
[34] Lai, C.S., McCulloch, M.D. Levelized cost of electricity for solar
photovoltaic and electrical energy storage. Appl. Energy 2017, 190,
191–203.
[35] Huang, C., Wang, L., Lai, L. Data-driven short-term solar irradiance
forecasting based on information of neighboring sites. IEEE Trans. Ind.
Electron. 2019, 66, 9918–9927.
7
Application of Optimization Technique
in Modern Hybrid Power Systems
Abstract
The load frequency control (LFC) is one of the operational problems in the
power system. The supply of reliable and quality power to its users is the
main aim of any electric power utility. The reliability of the power supply
requires that the demand and losses should be equal to power generation
in the power system. This balance is measured with the help of frequency
in the output line. Hence, controlling the generation based on the change
in load is carried out by the LFC. The frequency in the LFC areas and the
tie line connecting the LFC areas should be the same to ensure reliabil-
ity. In this research work, deregulated market structure two-area LFC and
a tie line connecting them are considered. Intelligent algorithms provide
better performance compared to the conventional optimization technique.
For the LFC problem in the two-area power system, this paper considers
the intelligent algorithms, namely flower pollination algorithm (FPA) and
differential evolution (DE). The hybrid DE-FPA algorithm is being developed
to manage the generating plant’s generation based on load variations at the
149
150 Application of Optimization Technique in Modern Hybrid Power Systems
7.1 Introduction
The main purpose of power system dynamics is to maintain a balance
between production and load. The proper quality of the power supply index
requires that the frequency and voltage be maintained within acceptable
limits. To improve system efficiency and meet demand, two or more regions
are interconnected by a tie line. The load variation within an area affects
the remaining areas, which will reflect the frequency [load frequency control
(LFC) - actual power] and voltage (AVR - reactive power changes).
In this work, we are considering the real power output of the generating
unit (LFC). LFC plays an important role in power system operation. The
objective of LFC is to control the real power of the generation to meet the
dynamic change in load demand. Thus, LFC regulates the MW power output
of generators within a control area in response to the changes in system
frequency and tie-line power, called area control error (ACE) [1].
In the literature, there are various types of control methods or log-
ics/algorithms proposed by various researchers for LFC regulation. In the
early stages integral, proportional–integral (PI), and proportional-integral
derivative (PID) have been used. Among them, PI is mostly used because
of its simplicity and is tuned using the Ziegler-Nichols method [2]. There
are numerous artificial intelligence based controllers used for LFC regulation
to reduce the settling time, undershoot, and overshoot. Some of the artifi-
cial intelligence based controllers are two-stage neural network fuzzy logic,
7.2 Modern Power System 151
neuro-fuzzy controllers, etc., and they are more suitable for modern complex
power systems with nonlinear characteristics [3, 4].
In the modern era with new technologies in the power industry, the
electrical power system is transferred to more emphasis on restructuring and
deregulation. The deregulated power system splits the conventional single
power system (from generating station to distribution) into three different
sections/verticals, namely generation companies in short form GENCOs,
transmission companies in short TRANSCOs, and distribution companies in
short DISCOs. These three different verticals are managed by independent
service or system operator (ISO). Various researchers have analyzed the LFC
problem in a deregulated environment [5, 6]. The DISCO participation matrix
(DPM) based LFC regulation for area control error participation factor (APF)
in the deregulated electrical power systems was discussed in [7].
In general, electrical power system consists of energy generation from
conventional as well as non-conventional energy resources, i.e., hydro, coal,
nuclear, solar, wind, biomass diesel, etc.; nowadays, non-conventional energy
resources are gradually replacing conventional sources because they are free
from environmental pollution and emissions, zero or lesser running cost, etc.
Wind energy is the domestic source of energy and is available in abundance.
In a deregulated power system, LFC becomes complicated when wind units
are integrated with the system.
Inertial control of the wind units provides coordination with conventional
systems [8, 9]. A wind unit supports the system by inertial control, pitch
control, and speed control [10]. Participation of doubly fed induction gener-
ator (DFIG) is analyzed through modified inertial control, which reflects the
frequency deviation by making use of kinetic energy of the turbine blades to
improve the frequency [11, 12].
Research on three areas deregulated power systems with optima PID
using imperialist competitive algorithms was discussed in [13]. Dynamic par-
ticipation of DFIG for hydrothermal deregulated power systems with fuzzy
controllers was discussed in [14]. Participation of DFIG in an asynchronous
power system using feedback control is discussed in [15] and the use of
intelligent algorithms such as firefly for deregulated power systems in [16].
including generation, transmission, and distribution and so has the sole right
to set the price of electric energy. As a result, VIU refers to the electric power
industry that is monopolized by a single utility.
Furthermore, while such interconnection improves reliability, it comes
with some drawbacks, including inefficient production, large losses, decaying
infrastructure, and poor management. As a result, deregulation in the electric
power industry is required, as is the creation of a separate autonomous
company for generation, transmission, and distribution.
participation in the LFC. ACE participation factors (Apf) indicate the ele-
ments that provide ACE to the participating GENCOs, and the sum of the
Apf in a given area must equal unity as shown in following equation:
m
Apf j = 1. (7.2)
j=1
Equation (7.4) shows the contract of DISCO with GENCO during the
steady-state condition.
n
ΔPLi,Loc = ΔPLi . (7.4)
i=1
1
ΔPf∗ = ΔX2 . (7.7)
Rw
Contribution of DFIG toward system inertia is given by the following
equation:
2H dΔf
= ΔPG + ΔPNC − ΔPtie1,2 − ΔPD − DΔf. (7.8)
f dt
From Figure 7.3, it is seen that additional reference power setting based
on the change in frequency using a washout filter with a time constant Tw and
Figure 7.4 Transfer function model of two areas’ deregulated power system.
160 Application of Optimization Technique in Modern Hybrid Power Systems
The scheduled steady-state tie-line power flow from area 1 to area 2 is the
difference between the demand of DISCOs in area 2 from GENCOs in the
area 1 and the demand of DISCOs in area 1 from the GENCOs in area 2,
which is given in the following equation:
2 4 4 2
ΔPtie1,2schedule = gpfij ΔPLjo − gpfij ΔPLoj .
i=1 j=3 i=3 j=1
(7.14)
The tie-line power flow from area 1 to area 2 is the product of the tie-line
coefficient and the difference between the change in frequency in area 1 and
the change in frequency in area 2, as given by the following equation:
2ΠT12
ΔPtie1,2actual = [Δf1 − Δf2 ] . (7.15)
s
Equation (7.16) gives the error in the tie-line power flow from area 1 to
area 2, which is the difference between the actual and scheduled value of the
tie-line power:
Equation (7.17) gives the error in tie-line power flow from area 2 to area 1:
4
4
ΔPgei = gpf ij ΔPLoj − apf ij ΔPU Ci . (7.20)
i=1 j=1
7.3 Optimization Techniques and Proposed Technique 161
7.3.1 Controllers
The tuning of controllers is more important for any system design; if tuning
is not done properly, the characteristics get affected and the system becomes
unstable. For the system under consideration, a Ziegler-Nichols-tuned con-
ventional PI controller is used.
7.3.2 PI Controller
When the change in error is high, a proportional controller will be beneficial
since it increases transient performance. When the error is small, the integral
control mode is effective, and the steady-state is improved. Although it has
the advantage of reducing overshoot, the derivative control mode increases
noise and makes the system less stable due to its high sensitivity [17]. As
the load changes, the derivative mode leads the system to become unstable.
Figure 7.5 shows the structure of a PI controller, with KP and KI denoting
proportional and integral gain values, respectively [18].
In this chapter, because of simplicity, flexibility, and easy design PI
controller has been chosen. Eqn (7.21) shows the mathematical model of the
PI controller
t
UPI = KP ACEi + KI ACEi dt (7.21)
0
where U P I is the controlled output of the PI controller, KP is the proportional
gain, and KI is integral gain, and ACE of the concerned area is ACE.
B. Mutation
The goal of mutation is to increase search variety in the parameter space while
also directing current vectors with a reasonable level of parameter variation
in a way that produces better results at the right moment. It maintains the
search’s robustness while also exploring new parts of the search area. There
are four types of mutation [8]. DE/rand/1/bin – Yi = Xr1 + F*(Xr2 – Xr3 )
The following four rules were employed to explain the concept of flower
pollination.
1. Cross and biotic pollination are considered global pollination, and
pollinator movement is compared to levy flight movement.
2. Abiotic and self-pollination take place as local pollination.
3. Pollinators such as birds and insects acquire flower constancy, which is
proportional to the resemblance of the two flowers involved and equal to
the reproduction likelihood.
4. The chance of switching from local to global pollination or vice versa
can be regulated, p = 0.7.
In global pollination, flower pollen is carried by pollinators like birds, wind,
and insects. This global pollination, i.e., rules 1 and 3 can be written as in the
following equation:
∗
xk+1
i = x k
i + γL (λ) g − x k
i (7.23)
From Table 7.1, the performance of the PI and DE-FPA tuned PI con-
trollers in area 1 declares that with peak overshoot and peak undershoot as
the performance index; the DE-FPA tuned PI controller has 27% and 26%
improvement over the conventional PI controller. The settling time of the
DE-FPA tuned PI controller is around 82% less than the PI controller.
Similarly, for area 2 with peak shoot and undershoot as the performance
index, the DE-FPA tuned PI controller showed an improvement of 27% and
23% over conventional PI controllers. The settling time of the DE-FPA tuned
PI controller is found to be 77% better when compared with the PI controller.
7.5 Conclusion
The deregulated power system has bilateral transactions for the effective
utilization of available resources. The RESs are intermittent for the continuity
of the power supply. Wind energy systems for electric power generation are
considered in this work. The major issue to solve in the bilateral transaction
168 Application of Optimization Technique in Modern Hybrid Power Systems
Appendix
References
[1] lgerd, O. I. “Electric energy systems theory: An introduction.” 1982.
[2] Kumar, J., Ng, K-H., and Sheble, G. “AGC simulator for price-based
operation-part II: Case study results.” IEEE Transactions on Power
Systems 12.2 (1997): 533–538.
[3] Christie, R. D., and Bose, A. “Load frequency control issues in power
system operations after deregulation.” IEEE Transactions on Power
Systems 11.3 (1996): 1191–1200.
[4] Donde, V., Pai, M. A., and Hiskens, I. A. “Simulation and optimization
in an AGC system after deregulation.” IEEE Transactions on Power
Systems 16.3 (2001): 481–489.
[5] Aditya, S. K., and Das, D. “Battery energy storage for load frequency
control of an interconnected power system.” Electric Power Systems
Research 58.3 (2001): 179–185.
[6] Selvaraju, R. K., and Somaskandan, G. “Impact of energy storage units
on load frequency control of deregulated power systems.” Energy 97
(2016): 214–228.
[7] Sasaki, T., Kadoya, T., and Enomoto, K. “Study on load frequency con-
trol using redox flow batteries.” IEEE Transactions on Power Systems
19.1 (2004): 660–667.
[8] Chidambaram, I. A., and Paramasivam, B. “Optimized load-frequency
simulation in restructured power system with redox flow batteries and
interline power flow controller.” International Journal of Electrical
Power & Energy Systems 50 (2013): 9–24.
[9] Shayeghi, H. A. S. H., Shayanfar, H. A., and Jalili, A. “Load frequency
control strategies: A state-of-the-art survey for the researcher.” Energy
Conversion and Management 50.2 (2009): 344–353.
[10] Tyagi, B., and Srivastava, S. C. “A LQG based load frequency con-
troller in a competitive electricity environment.” International Journal
of Emerging Electric Power Systems 2.2 (2005).
[11] Zamani, A. A., et al. “Optimal fuzzy load frequency controller with
simultaneous auto-tuned membership functions and fuzzy control rules.”
Turkish Journal of Electrical Engineering & Computer Sciences 22.1
(2014): 66–86.
[12] Zamani, A. A., et al. “Optimal fuzzy load frequency controller
with simultaneous auto-tuned membership functions and fuzzy con-
trol rules.” Turkish Journal of Electrical Engineering & Computer
Sciences 22.1 (2014): 66–86.
170 Application of Optimization Technique in Modern Hybrid Power Systems
India
4 College of Engineering at Wadi Addawaser, Prince Sattam bin Abdulaziz
Abstract
Due to the rapid adoption of intelligent power electronic devices and digital
technologies, traditional vertically designed power systems are being phased
out and replaced by modern hybrid power systems. Since its inception, the
power system has undergone numerous changes that have increased system
efficiency, increased the share of renewable energy, and made it easier to
control. However, such a rapid revolution in electrical power systems during
the current Industrial Revolution has increased its complexity. The primary
concerns are cybersecurity, forecasting supply and demand, optimal power
allocation, power quality maintenance, and a skilled workforce shortage.
Digital tools aid in load management and the optimization of various power
resources. Modern hybrid power systems, artificial intelligence techniques
such as machine learning and optimization algorithms, are emerging in
173
174 Application of Machine Learning Techniques in Modern Hybrid Power
the power sector for better control. Nonetheless, little research has been
conducted on machine learning applications in industries with integrated
power resources. Machine learning techniques will be used in the industries to
forecast supply and demand, make the best use of energy resources, etc. This
chapter aims to discuss the use of machine learning techniques in modern
hybrid power systems. A well-known large industry with multiple energy
resources has been considered for this purpose. All components of the power
system network are modeled, and simulations are run to determine the best
way to use them under various generation and load scenarios, weather condi-
tions, and financial conditions. For the case study considered, the simulated
results are validated using field data and ETAP software, and the results are
encouraging.
Keywords: Energy resources, machine learning (ML), artificial intelligence
(AI), optimization, ETAP, modern hybrid power systems (MHPS).
Notation: Upper-case (lower-case) boldface will denote matrices (column
vectors); (·)τ for transposition; (·)∗ for complex-conjugate; and (·)−1√ for
inverse. Re denotes the real part of the complex number, and j := −1
the imaginary unit. For a given N ×1 vector x, diag (x) returns N ×N
matrix with the elements of x in its diagonal. Finally, IN denotes N ×N
identity matrix; and 0N , 1N the N-dimensional vectors with all zeroes and
ones, respectively, and 0N ×M is N ×M matrix with all zeroes.
8.1 Introduction
The electrical power system (EPS) has undergone various modifications since
its inception. This is due to rapid technological improvements, computer
percolation, and intelligent electronic devices (IED) in EPS. Furthermore,
while the rising use of renewable energy (RE) such as wind and solar may
have given conventional EPS a facelift, it has made the system more complex
due to its intermittency and reliance on weather conditions [1]. Figure 8.1
depicts the main distinction between standard EPS and modern hybrid power
system (MHPS).
In addition, the EPS has modified its previous vertical shape of power
flow from top (generation) to bottom (consumption) (T2B) with bottom-to-
top (B2T) approach of inventory flow from consumer to generator to a two-
way approach, as illustrated in Figure 8.2.
Furthermore, the evolution of de-regulated electricity markets (DEM),
distributed generation (DG), microgrids (MGs), smart grids (SGs),
8.1 Introduction 175
(b) MHPS.
Figure 8.1 Electrical power system. (a) EPS. (b) MHPS.
176 Application of Machine Learning Techniques in Modern Hybrid Power
Figure 8.2 Power and inventory flow (traditional at left and MHPS at right).
smart appliances (SAs), and energy storage systems (ESS) has changed the
name of EPS to MHPS. Moreover, there are many expectations on EPS
globally in terms of the five Es, which are energy, efficiency, environment,
equipment, and economics. In addition to meeting these expectations, the
MHPS provides many benefits to humanity, including the utilization of
abundantly available renewables, de-centralized EPS, reduced operation and
maintenance costs, reduced losses, environmental protection, and so on.
However, such a rapid revolution in EPS during the current Industrial Revo-
lution (IR 4.0) has increased its complexity. The technical issues involved in
MHPS, as well as their mitigation strategies, are discussed in the following
sections of this chapter.
The paradigm shift in EPS needs new technologies such as ML and artificial
intelligence (AI), whereas ML is the way to achieve AI. ML is used in various
constituents of MHPS as shown in Table 8.1.
using the ML technique. Figure 8.3 depicts a single line diagram (SLD) for
the case study industry. The following are the details for the MHPS.
This section describes the power distribution network, CPP setup, and the
SPP details for the case study considered.
A coal-fired steam boiler is installed to meet the process plant’s need
for high-pressure steam at higher temperatures. Excess or waste steam is
used to power a turbine-generator (TG) set. The process plant’s total power
de-rating of 4% [17] were installed with six 1-MW inverters. These inverters
are grid-interactive and do not have reactive power capability. The power was
evacuated at the 6.6-kV level. The levelized cost of energy was estimated to
be US $ 0.1 (in July 2021).
The following operational interlocks are required for the joint manage-
ment of the CPP and SPP. If the CPP’s TG is tripped, the industry continues
to operate with assistance from the utility grid and SPP when it is available.
If the process load is suddenly reduced due to any abnormality in process
operations, the CPP will be islanded, and the SPP will be kept off to avoid
unauthorized power export to the grid and to prevent sudden voltage rise at
plant buses. Circuit breakers have an additional mechanical interlock for this
purpose (CB). When the CPP is not producing power, the SPP trips within
0.08 seconds (i.e., the trip time of CBs at CPP and SPP together). This
is well within the 0.16 seconds specified by [18]. Even though such local
PV integration reduces power losses by 3%-9% [19], this scenario indicates
a certain curtailment of RE; in this case, PV, for the efficient and secure
operation of power systems that are integrated with grids [20]. The design
efficiency of a CPP is 34% up to 16 MW, and it drops to 32% when the
load on the CPP is 14 MW. This is primarily due to the operation of SPP.
With the operational issues of CPP and SPP, there is an urgent need to find
an optimal solution for such industries. It is also necessary to investigate
irradiance forecasting techniques for a large-scale PV plant. This is the theme
of the ensuing subsection.
using ML Methods
Some of the metrics used in regression analysis are briefly explained
here [23].
1. Mean absolute error (MAE) is the absolute difference between the true
values and the predicted values. Since it is absolute, any negative sign in
the result is to be ignored. It takes the average of error from each sample,
as in the following equation:
MAE= True values – Predicted values
= |y −
y|/n (8.1)
Here, by squaring the difference between the true values and the pre-
dicted values, the higher error value can be penalized. It is the most
widely used metrics when the dataset contains too high or too low
values, but it is not useful when the data contain huge noise. It is the
variance of the error value.
3. Root mean squared error (RMSE) is the square root of MSE, which
gives better accuracy of the regression model, as in the following
equation:
(y− ŷ)2
RMSE = . (8.3)
n
It is more useful when large errors are present in the dataset. It is also
the standard deviation of errors.
8.4 A Prediction Case Study of ML in MHPS 185
Upon solving the optimal β, the test points are then used to obtain the
estimated values (ŷ1 , . . . , ŷk ) to unforeseen inputs (x1 , . . . , xn ). Note that
the problem (P1) is differentiable with respect to βand can be solved via
off-the-shelf convex optimization techniques. In this study, the predictions
from regression from problem (P1) are termed as model-based because the
coefficients of the input variables are exactly known.
The attention is then turned to the prediction techniques by ANNs which
are generally termed as model-free.
186 Application of Machine Learning Techniques in Modern Hybrid Power
Upon training, the ANN finds the optimal parameters (θ∗ , b∗ ) for each
layer. The trained ANN with optimal parameters is then used to estimate
the values for the unanticipated inputs [24]. When compared to model-
based techniques, ANNs (model-free) can model any degree of nonlinearity.
However, in practice, it is vital to evaluate the performance of both model-
based and model-free prediction strategies. Because the investigated case
study is a continuous-running process plant, the optimal judgments made
while accounting for predicting mistakes in the GHI play an important part in
decision making. As a result, the prediction accuracies of both model-based
and model-free models are analyzed in the next section. Figure 8.6 describes
the complete methodology of the optimal decision making in the MHPS using
model-based and model-free approaches.
site conditions change, the training must be repeated, and the corresponding
models are updated using the cloud software installed in the process plant.
Upon getting the prediction of GHI from model-based and model-free regres-
sion models, the best option is to be selected based on the following criteria
for each method:
1. smaller value of RMSE, MSE, and MAE;
2. R-squared value closer to 1.0;
3. simplicity and faster response.
they do not have much significance on irradiance values. Training the field
data without wind speed and sky cover is done and the results are shown in
Table 8.4. Here, a model with the R-squared of 0.76, RMSE of 132.06, and
MSE of 17439 with a fastest response time of 0.82 seconds is selected as the
best prediction model. The final prediction plot is as in Figure 8.7.
8.4 A Prediction Case Study of ML in MHPS 189
With the above results, the relation function for solar irradiance is
formulated as in the following equation:
ppv pv pv pv pv
n,t = dn An ηn Ĝn,t (8.7a)
onppv pv
n,min ≤ pn,t ≤ onpn,max
pv
(8.7b)
pv pv
ppv
n,t = 1 − αn,t pn,t (8.7c)
pv
0 ≤ αn,t ≤ 0.3∀n ∈ N . (8.7d)
In this work, the cost for operating SPP plant is given by ΓPV
n = k pv ppv
n,t ,
where k pv = $0.1/kWh.
Modeling of Captive Power Plant:
The equations governing the operation of CPP are given as follows:
CPP
qn,min ≤ qn,t
CPP
≤ qn,max
CPP
(8.8b)
where pCPP CPP
n,t and qn,t , respectively, denote the active and reactive powers of
the CPP. The cost for operating CPP is given by ΓCPP n = knCPP pCPP
n,t with
knCPP = $0.86/kWh. Since the efficiency of the CPP varies with the pCPP ,
t
this time-varying efficiency is not modeled in this work. However, we gauge
the efficiency of the CPP by the optimal pCPP t , i.e., when the optimal value
of the CPP is close to its maximum value, then the CPP operates at the peak
efficiency.
Furthermore, let pBL L BL L
n,t , pn,t , qn,t , and q n,t denote the active and reactive
power baseloads and loads of the processing plant.
The focus then shifts to branch-flow modeling of the processing plant’s
DN. Because power flow equations are nonlinear, the LinDistFlow approxi-
mation of power flow equations [28] are employed to solve the power flow
equations provided as follows:
Pn,t = Pj,t −pcn,t ∀n ∈ N0 (8.9a)
j∈Cj
Qn,t = Qj,t −qn,t
c
−qnsh vn,t ∀n ∈ N0 (8.9b)
j∈Cj
Since the CPP plant operates in the grid-connected mode, the bounds
on active and reactive powers supplied by the utility grid are given as
Equation (8.9f)–(8.9g)
min ≤ pt
pUG ≤ pUG
UG
max (8.9f)
UG
qmin ≤ qtUG ≤ qmax
UG
. (8.9g)
The cost of the active power imported from the utility grid is given as ΓUG
t =
k UG pUG
t , where k
UG = $0.11/kWh.
Figure 8.11 Load, PV, and net injections from the UG.
specifically the nodal voltages of the process plant, which are computed using
ETAP to see if the voltage magnitudes obey their respective lower and upper
bounds. The nodal voltage magnitudes should be well within the range for the
process plant to operate satisfactorily; otherwise, technical issues may arise,
resulting in abnormal operation. Specifically, the plants’ turbo generators and
SPP may trip if the voltage falls below the specified limits and results in the
complete production loss.
Figure 8.12 SLD of industry (left) and power flow result with ETAP (right).
and the ETAP are below 0.02% pu for all optimizations, i.e., model-based,
model-free, and true-prediction.
Next, nodal voltage magnitudes computed from the model-based, model-
free, and true-prediction optimization are depicted in Figure 8.13, from which
the following conclusions can be drawn.
Key Observations:
The voltage magnitudes of the model-based and model-free regression
approaches are nearly close when compared to the voltage magnitudes of
the true-GHI, as shown in Figure 8.13. Furthermore, when compared to
the model-based approach, the model-free regression approach performed
slightly worse in the first 3 hours. However, for the remainder of the time,
the model-free regression approach closely tracks the true-prediction. It is
worth noting that both the model-free and model-based approaches follow
their respective true values during the final hours, i.e., hours 8-10. Although,
both model-based and model-free regression models have training R2 values
in the range of 0.76-0.81, the process plants’ nodal voltage magnitude is well
within the bounds. As a result, it can be concluded that for the specific site
conditions, if the process plant loads are fixed, the solar forecasting error can
range between ±15%. According to the simulations, the majority of the SPP
active power generation is exported back to UG, allowing the CPP to operate
at full capacity, resulting in improved CPP efficiency. The focus then shifts to
the optimal value comparisons.
Optimal Value Comparisons:
In Table 8.6, Γ∗ represents the optimal value. According to Table 8.6, even
though both model-based and model-free regression models achieved the
same optimal value, this optimal value is less than the true-predicted optimal
value. However, the difference is negligible. As a result, even though the
respective R2 values of ML models are not close to 1.0, the ML methods
can still achieve the lower optimal value. Therefore, the process plants can
still be benefited even if the conventional forecasting methods are replaced
by the optimization-assisted ML methods.
8.6 Conclusion
The ML techniques are used to evaluate the optimal operation of a grid-
connected CPP coupled with an SPP. The case study of a well-known industry
of a comparable sort is chosen. Forecasting algorithms for solar irradiance
References 201
References
[1] M. L. Merlin Sajini, S. Suja, and S. Merlin Gilbert, “Impact analysis of
time-varying voltage-dependent load models on hybrid DG planning in
a radial distribution system using analytical approach,” IET Renewable
Power Generation, vol. 15, pp. 153–172, 2021.
[2] R. H. T. Moger, “Comprehensive review on low voltage ride through
capability of wind turbine generators,” International Transactions on
Electrical Energy Systems, vol. 30, 2020, Art. no. e12524.
[3] D. Chakravorty, J. Meyer, P. Schegner, S. Yanchenko, and M. Schocke,
“Impact of modern electronic equipment on the assessment of network
harmonic impedance,” IEEE Transactions on Smart Grid, vol. 8, no. 1,
pp. 382–390, Jan. 2017.
[4] B. K. Reddy and A. Kumar Singh, “Reactive power management and
protection coordination of distribution network with high solar photo-
voltaic penetration,” in Proceedings of 12th International Renewable
Engineering Conference (IREC), 2021, pp. 1-6.
[5] H. Wang, J. Wang, Z. Piao, X. Meng, C. Sun, G. Yuan, and S. Zhu,
“The optimal allocation and operation of an energy storage system with
high penetration grid-connected photovoltaic systems,” Sustainability,
vol. 12, no. 15, 2020.
[6] M. Usama, H. Mokhlis, M. Moghavvemi, N. N. Mansor, M. A.
Alotaibi, M. A. Azam, and B. A. Akram, “A comprehensive review
on protection strategies to mitigate the impact of renewable energy
202 Application of Machine Learning Techniques in Modern Hybrid Power
E-mail: [email protected]
∗ Corresponding Author
Abstract
It is important to search for the optimum method to compensate the system
reactive power in power systems. The capacitor bank is considered as one of
the efficient methods to compensate for the reactive power with a low running
cost. Optimal capacitor placement and sizing are key issues to improve the
impact of the capacitor bank for enhancing the quality and reliability of the
distribution system. Particle swarm optimization (PSO) algorithm has been
used in this chapter to select the optimal busbar to add the capacitor and to
design the optimal size of this capacitor bank to the distribution network.
This chapter discusses the importance of using the shunt capacitor bank for
reactive power compensation in terms of improving reliability, loadability,
and reduction of power losses. Moreover, this research discusses the ability
of automatic capacitor control scheme (ACCS) to add the optimal value
205
206 Establishing a Realistic Shunt Capacitor Bank with a Power System
online of the shunt capacitors. The proposed method in this chapter has been
validated with the IEEE 15-buses power system at 11.0 kV as an example to
select the optimal placement and sizing of capacitor banks by using a PSO
algorithm automated by the ACCS module for enhancing the quality of the
power system.
9.1 Introduction
Power systems around the world are faced with great challenges to keep up
with the increasing demand for electric power. Therefore, it is important to
ensure the stability, reliability, and efficiency of the power system [1]. The
reactive power compensation can improve the power system performance
and ensures a high level of stability, reliability, loadability, and efficiency.
The main challenge of reactive power compensation is to design the security
system with a stable reliability power system [2]. Undervoltage and low/poor
power factor in the distribution system will directly affect the system effi-
ciency and increase the power losses. Using the advanced control techniques
with the electrical power system can treat the shortage distribution efficiency
by compensating the reactive power using shunt capacitor banks, flexible
AC transmission system (FACTS) devices with the distribution network [3].
FACTS devices are more accurate and operate fast because it depends on the
thyristor for switching, but the FACTS devices are costlier to use with the
small-scale distribution network [4]. On the other hand, using the distributed
generation (DG) near the load is highly preferred because it can save the
generated power from conventional sources and decrease the power losses in
long transmission system. But the DG is depending on the renewable energy
sources that are directly related to natural environmental causes [5]. Using
the capacitor banks parallel with the system under control by the automatic
capacitor control scheme (ACCS) techniques can enhance the system voltage
by compensating the reactive power. Also, the capacitor bank is very easy
to install by using any spare feeder to connect the capacitor bank with
the system, which is more economic compared to the active filters or the
electric synchronous motors [6]. On further consideration, the capacitor bank
installation should be according to the system status and the value of bus
reactive power load requirements. Several methods can be used to select
9.1 Introduction 207
Figure 9.1 SLD shunt capacitor bank for reactive power compensation.
the capacitor allocation, for example, artificial intelligence (AI) [7], genetic
algorithm (GA) [8], etc. In this chapter, the particle swarm optimization
(PSO) algorithm has been used to optimize the location and size of the
capacitor bank in the power system to increase the reliability, stability, and
efficiency. PSO algorism has been chosen as an optimization tool because it
is very simple, effective, and accurate to catch global optimal solutions [9].
Figure 9.1 shows the single line diagram (SLD) of the shunt capacitor bank
for the reactive power compensation. The objective of this chapter can be
justified in two main points: the first one is studying the system offline which
is simulated by the known stable IEEE-15 bus system with expected load
extension which can be solved by the PSO algorithm for a more stable and
reliable system, and reduce cost. The results of using the PSO in this chapter
can be compared with another research’s method to describe the techno-
economic asset of using the PSO algorithm. The second contribution in this
chapter is the online working of the shunt capacitor bank with the power
system, where all researchers study the variant method to find the capacitor
bank value and allocation, but it is important to consider the load variant
during 24 hours duty time. The load variant is solved in this chapter by using
the ACCS new advanced control techniques.
208 Establishing a Realistic Shunt Capacitor Bank with a Power System
Figure 9.2 Average 24 hours load value during three months of Thailand.
9.2 Problem Statement 209
system; so the use of the ACCS is to work with the busbar online to add the
required optimal value.
So
B 1 = I 2 + I 3 + I 4 + I 5 + I 6 , B2 = I 3 + I 4 + I 5 + I 6
B3 = I4 + I 5 + I6 , B4 =I 5 + I6 , B5 =I6 .
where Kei is the constant cost for the energy load level i, Ti is the duration of
load level i, PLi is the power loss at ith load level with corresponding time
duration Ti , and Cj is the injection kVAR at the jth node.
The minimization of the objective function shown in Equation (9.7)
is subjected to power flow balance expressed as shown in the following
equation:
F(X,y) = 0. (9.8)
where X is the unknown power flow variables and y is the known or specified
(independent) variables.
Finally, the limits on voltage magnitude are expressed as follows:
∂PL K
= 2 (∝ij Qj + βij Pj ) (9.10)
∂Qi
j=1
where PL is the total power losses in the system, Qj is the reactive power at
busbar j, and K is the number of locations
rij Cos (θi − θj ) rij Sin (θi − θj )
∝ij = , βij =
Vi Vj Vi Vj
where θi is the voltage angle at node i, θj is the voltage angle at node j, and
rij is the real part of impedance between nodes i and j.
The sensitivity value can be calculated by Equation (9.4) at all nodes. So,
the higher sensitive location can be used as the coordinate busbar.
212 Establishing a Realistic Shunt Capacitor Bank with a Power System
Figure 9.5 A short transmission power system for the power flow indication.
= Vs Vr cos θ − Vr2 gsr + Vs Vr bsr sin θ +
+ j Vs Vr cos θ − Vr2 bsr − Vs Vr gsr sin θ (9.12)
and
This assumes that the system resistance is very smaller than the system
reactance. So, at no load, Vs = Vs ; therefore,
Vs Vs
Ir = − =− . (9.20)
Xsr Xsr
Thus,
∂Q
∂V = Short circuit current. (9.21)
Finally, the voltage changes ratio can calculate related to the short circuit
level system Ssc , as shown in the following equation:
Vs Vs Q
≈ ≈ . (9.22)
V V Ssc
So, Equation (9.21) means the voltage regulation is equal to the ratio of
the reactive power change to a short circuit. The obvious results are indicating
the receiving end voltage falls with the decrease in system short circuit
capacity or increase in system reactance.
where the change of the position of the particle “I” is represented as follows:
Si = Si1 , Si2 , Si3 . . . , Sik . (9.25)
where z is the inequality value constraint, zmin is the lower limits inequality
constraints, and zmax is the upper limits inequality constraints. The binding
fitness constraints are considered the first best particle, but if the results are
not satisfied, the method will be regenerated. By this method, the particles can
be generated, which guarantees to complete the infeasible particles to violate
the binding constraints.
Figure 9.8 MVA and MVAR loads in simulation IEEE-15 busbar distribution system.
Figure 9.9 Optimal singly capacitor bank value of the 15-busbar system.
Figure 9.10 Value of saving power losses in the 15-busbar system after using singly
capacitor bank.
Table 9.3 shows the result of voltage value after adding the capacitor bank.
Figure 9.11 shows the different voltage without adding the capacitor bank and
with adding the capacitor bank for IEEE-15 busbars without and with adding
the shunt capacitor bank. The power losses can be realized by adding a single
capacitor bank in busbar-3 which is 1013 kVAR. Also, at use two busbars
for compensation with using busbar-3 compensate system by 1013 kVAR,
the second capacitor of 321 kVAR at busbar-6 would provide more saving
power losses of 3.7 kW. Also, by adding the capacitor bank in busbar-6, it
must remove the capacitor by 142 kVAR from busbar-3 to get a further power
losses reduction by 0.5 kW; so busbar-3 was initially over-compensated.
Table 9.3 Voltage value at IEEE-15 busbar simulation system after adding the capacitor bank.
Bus Bus 1 Bus 2 Bus 3 Bus 4 Bus 5 Bus 6 Bus 7 Bus 8 Bus 9 Bus 10 Bus 11 Bus 12 Bus 13 Bus 14 Bus 15
no.
Bus 1.0250 1.0224 1.0069 1.0009 0.99985 1.0086 1.0063 1.007263 1.0188 1.01768 0.9990 0.9955 0.9942 0.9985 0.99835
voltage
9.7 Simulation System for Optimal Capacitor Allocation
223
224 Establishing a Realistic Shunt Capacitor Bank with a Power System
Figure 9.11 Voltage value for IEEE-15 busbars without and with adding the shunt capacitor
bank.
But, when both busbar-6 and busbar-3 are compensated, the total power loss
reduction will be 32.7 kW by 1192 kVAR of shunt capacitor banks (871
kVAR at busbar-3 and 321 kVAR at busbar-6). To compare these values with
the fuzzy-reasoning approach method, which is illustrated in reference [26]
and [27], where this method requires adding 1193 kVAR by 805 kVAR at
busbar-3 and 388 kVAR at busbar-6. Finally, using the PSO method can save
0.1-kW power losses and it has decreased the capacitor value by 1.0 kVAR.
Figure 9.13 Single line diagram for actual busbar voltage of 11 kV.
228 Establishing a Realistic Shunt Capacitor Bank with a Power System
the two power transformers in parallel. Table 9.4 shows the configuration
set values to operate the ACCS/IED; the operation logic is considered as
the continuous monitor to the actual reactive power in the two sections
individually.
Figure 9.14 Close and open individual logic ACCS/IED module command.
9.8 Automatic Capacitor Control Scheme 229
Figure 9.15 ACCS/IED logic for capacitor bank-1 and capacitor bank-2 at the close the bus
tie circuit breaker.
For section-1, as the reactive power value reached the setting value
(MVAR-2), the ACCS/IED will start to initiate the internal timer-1 to close
the capacitor bank-1 (C1) feeder circuit breaker to improve the reactive power
with section-1. After that, if the reactive power decreased to the open setting
value (MVAR-2), ACCS/IED directly initiates the internal timer-2 to send the
open command to the capacitor circuit breaker. At overvoltage in the busbar
system which senses through the voltage transformer (Busbar VT-A), ACCS
will open the capacitor after timer-7, as shown in Figure 9.14 for the close
and open individual logic commands. By the same mirror logic, ACCS/IED
can be used to control the adding or isolating of the bus section-2 capacitor
230 Establishing a Realistic Shunt Capacitor Bank with a Power System
bank-2 (C-2), which also detects the undervoltage for section -2 through the
voltage transformer (Busbar VT-B). While closing the bus tie circuit breaker,
the ACCS/IED module will calculate the reactive power for section-1 and
section-2. Figure 9.15 shows the close and open logic commands to the two
capacitor bank feeder circuit breakers while closing the bus tie circuit breaker.
As the value reaches (MVAR-3), ACCS/IED will start to initiate the internal
timer-3; as it reaches (MVAR-4), it will initiate the timer-4 to add the shunt
capacitor bank unit-1 with section-1 after timer-3 target. At this time, if the
reactive power decreased to be less than the setting (MVAR-4) value, the
timer-4 will be released; else it will continue to close the capacitor bank-2
with the system after the timer-4 target. In this case (bus tie circuit breaker
closed and capacitor bank-1 and capacitor bank-2 in service), if the reactive
power decreases to the open setting value, the ACCS/IED will start to initiate
the internal timer-5 and internal timer-6 to open the circuit breaker feeder for
the capacitor bank-2 after timer-5 target. After that, if the reactive power is
still less than the setting value, it will open the circuit breaker feeder for the
capacitor bank-1 after timer-6 target; else it will be released to keep the shunt
capacitor bank-1 in service.
9.9 Conclusion
Due to the power system extension and the increase in the reactive loads,
the power system has become more sensitive and critical. This extension will
influence the distribution network in finding some non-preferred conditions
as undervoltage, sag, underfrequency, and so on. In recent years, the reactive
power compensation devices have been increased and improved to reach
optimum reactive compensation at a low cost. The main reason for using
the shunt capacitor bank is present in the power utilities, large industrial
to maintain voltage profile at acceptable levels, and to compensate reactive
power in distribution and industrial networks, wherever needed and quick
amortization of investment are some of the reasons why the using of shunt
capacitor banks, which represent an essential reactive power compensation
element with the distribution power system. This chapter presented the
optimal capacitor bank allocation in the distribution systems by using the
PSO method. The approached method in this chapter has been obtained with
IEEE-15 busbar voltage as a sample power system, which investigated to
provide a total reduction power loss of 32.7 kW by using 1192 kVAR of
capacitors by (871 kVAR at busbar-3 and 321 kVAR at busbar-6). Also, this
chapter discussed the ACCS to add the shunt capacitor bank with the system
References 231
to improve voltage profile and reduce the active power loss by adding the
accurate required value. ACCS/IED control module simulated and discussed
in this chapter for the busbar voltage which classified to two sections, which
showed the operation steps at individual sections and at the close the bus
tie circuit breaker to be one part. Finally, this chapter aims to recommend the
power system designer and the researchers to use the PSO for offline planning
and ACCS to add the required capacitor value.
Conflict of Interest
The authors declare that this chapter has no conflict of interest.
Acknowledgement
Dr. Amer Nasr wishes to acknowledge Alfanar Company, especially Mr.
Amer Abdullah Alajmi (Vice President, Sales & Marketing, Alfanar Com-
pany, Saudi Arabia) and Mr. Osama Morsy (General Manager, Alfanar
Engineering Service, Alfanar Company, Saudi Arabia) for their supporting
throughout the completion of this research.
References
[1] A. M. Eltamaly and A. N. A. Elghaffar. (November, 2017). Modeling
of distance protection logic for out-of-step condition in power system.
Electrical Engineering, DOI: 10.1007/s00202-017-0667-3.
[2] A. M. Eltamaly, Y. Sayed, A. H. M. El-Sayed, and A. A. Elghaf-
far. (2020). Adaptive static synchronous compensation techniques with
the transmission system for optimum voltage control. Ain Shams
Engineering Journal, DOI: ttps://doi.org/10.1016/j.asej.2019.06.002
[3] A. M. Eltamaly and A. N. A. Elghaffar. (2017). Power flow control
for distribution generator in Egypt using facts devices. Acta Bulletin
of Engineering Journal, ISSN: 2067–3809.
[4] A. M. Eltamaly and A. N. A. Elghaffar. (August, 2018). Multi-control
module static VAR compensation techniques for enhancement of power
system quality. Annals of Faculty Engineering Journal. ISSN: 2601–
2332.
[5] A. M. Eltamaly and A. N. A. Elghaffar. (December, 2017). Techno-
economical study of using nuclear power plants for supporting electrical
grid in Arabian Gulf. 2(1), DOI: 10.1007/s40866-017-0031-8.
232 Establishing a Realistic Shunt Capacitor Bank with a Power System
[16] J. H. Teng. (2003). A direct approach for distribution system load flow
solutions. IEEE Transactions on Power Delivery, 18(3):882–887, DOI:
10.1109/TPWRD.2003.813818.
[17] N. Gnanase et al. (2016). Optimal placement of capacitors in radial dis-
tribution system using shark smell optimization algorithm. Ain Shams
Engineering Journal, 907-916, DOI: http://dx.doi.org/10.1016/j.asej.20
16.01.006.
[18] S. P. Singh and A. R. Rao. (2012). Optimal allocation of capacitors in
distribution systems using particle swarm optimization. Electrical Power
and Energy Systems Journal, 43:1267–1275, DOI: http://dx.doi.org/10.
1016/j.ijepes.2012.06.059.
[19] A. M. Eltamaly, M. Y. Sayed, A. H. M. El-Sayed, et al. (2020). Power
quality and reliability considerations of photovoltaic distributed gen-
eration. Technology and Economics of Smart Grids and Sustainable
Energy, 5:25, DOI: https://doi.org/10.1007/s40866-020-00096-2.
[20] M. R. Haghifam, et al. (2007). Genetic algorithm-based approach for
fixed and switchable capacitors placement in distribution systems with
uncertainty and time varying loads. IET Generation Transmission, &
Distribution, 1(2):244–252.
[21] A. R. Seifi. (2009). A new hybrid optimization method for optimum
distribution capacitor planning. Modern Applied Science Journal, 3(4).
[22] S. Corsi, Voltage Control and Protection in Electrical Power Systems,
Advances in Industrial Control, Chapter 2 Equipment for Voltage and
Reactive Power Control, DOI: 10.1007/978-1-4471-6636-8_2.
[23] J. C. Das. (2015). Power System Harmonics and Passive Filter Designs,
Book First Edition, chapter (11), John Wiley & Sons, Inc. IEEE, DOI:
10.1002/9781118887059.ch11.
[24] I. J. Hasan, et al., (2015). Optimal capacitor allocation in distribu-
tion system using particle swarm optimization. Applied Mechanics and
Materials, 699:770-775, DOI: 10.4028/www.scientific.net/AMM.699.7
70.
[25] M. A. Mohamed, et al. (2018). A PSO-based smart grid application for
optimum sizing of hybrid renewable energy systems. In Modeling and
Simulation of Smart Grid Integrated with Hybrid Renewable Energy
Systems, pp. 53–60, DOI: 10.1007/978-3-319-64795-1.
[26] M. H. Haque. (1999). Capacitor placement in radial distribution systems
for loss reduction. IEE Proceedings - Generation, Transmission, &
Distribution, 146(5), DOI: 10.1049/ip-gtd:19990495.
234 Establishing a Realistic Shunt Capacitor Bank with a Power System
Abstract
The energy field is developing rapidly in the direction of a distributed,
low-carbon, digital, and intelligent energy Internet. With its characteristics
of decentralization, group collaboration, peer-to-peer (P2P) communication,
smart contracts, anti-counterfeiting and tamper-proofing, openness, and trans-
parency, blockchain technology fits the development direction of the energy
industry to improve quality, efficiency, innovation, and reform. At present,
the energy industry of many countries has explored related applications,
especially in the business fields of power trading, power metering, microgrid,
and renewable energy. As the energy industry pays more attention to energy
conservation and energy efficiency, blockchain applications are also attracting
attention for optimizing the energy industry.
The International Renewable Energy Agency (IRENA) also lists
blockchain technology as one of the key innovations in the field of renewable
energy. IRENA pointed out in a report that to accelerate the development of
low-cost renewable energy, the world needs at least 30 innovative technol-
ogy tools and enables them to benefit from the scale of renewable energy.
Blockchain technology is one of them.
Blockchain technology is a distributed network data management and
data computing technology that uses cryptography technology and distributed
consensus protocols to ensure network transmission and access security and
realizes multi-party data maintenance, cross-validation, uniformity across the
network, and resistance to tampering. As an important evolution of a new
generation of information and communication technology, the characteristics
235
236 Introduction to Blockchain Technologies
prevent internal and external malicious attacks. However, due to its closed
network, it is not suitable for applications that need to be deployed on the
Internet and provides services across domains.
Consortium chain is limited to the participation of consortium members.
The read and write permissions on the chain and the permission to participate
in accounting are set according to the rules of the consortium. The data is
limited to the consortium organization and its users to have permission to
access or update. Consortium chain has achieved partial decentralization and
strong controllability. Practical byzantine fault tolerance (PBFT) and Raft
are often used on consortium chains and private chains. These characteristics
make the consortium chain have manageable and controllable practical needs
and technical support[6] .
10.2.1 Multi-Centralization
From an architectural point of view, the blockchain is based on a P2P
network. The damage or loss of any node will not affect the operation of the
entire system. The system has excellent robustness. Therefore, the blockchain
is a multi-centralized architecture. In terms of storage, the blockchain is a
distributed storage technology. Data is distributed and stored in all nodes
and a consensus is reached. There is no single center that holds the storage
right. Therefore, the blockchain is also a multi-centralized storage[7] . In terms
of governance, the blockchain has no centralized organization or institution,
and the rights and obligations between any nodes are equal. The blockchain
prevents a few people from controlling the entire blockchain system through
a consensus mechanism; so the governance of blockchain is decentralized or
multi-centralized.
blockchain system and optimize the user experience. At this stage, blockchain
technology consisting of core technology, expansion technology, and sup-
porting technology has gradually formed. In the future, it will continue to
innovate and evolve in data circulation, network scale, technical operation
and maintenance, and platform security.
Blockchain technology, as shown in Figure 10.1, is a comprehensive
technology; its technical composition can be divided into three categories:
core technology, expansion technology, and supporting technology accord-
ing to the degree of importance. Core technology refers to the technology
that a complete blockchain system must include, including cryptographic
algorithm, P2P network, consensus mechanism, smart contract, and data stor-
age. Expansion technology refers to related technology that further expands
blockchain service capabilities, including scalability, interoperability, collab-
orative governance, security, and privacy. Supporting technology refers to
related technology such as improving the security of the blockchain system
and optimizing user experience, including system management, infrastruc-
ture, operation, and maintenance.
is not widely used[15] . In most cases, this is due to the hash function, which
facilitates database searches. This is mostly used by consortium chain or
private chain which is deployed in private network.
The unstructured P2P network nodes do not have any specific orga-
nizational characteristics. Participating nodes randomly communicate with
other nodes. Compared with intense liquidity activities (for example, certain
nodes frequently join or leave the network), unstructured P2P networks are
considered to be robust. This is mostly used by the public chain which is
deployed in the Internet.
The hybrid P2P network combines the traditional client-server model
with a P2P architecture. For example, it can design a central server that
facilitates connections between peers. The interoperability between different
blockchains or on-chain and off-chain or blockchains and oracles may meet
hybrid networks.
Compared with the other two models, the hybrid model tends to improve
the overall performance. The hybrid network model combines the main
advantages of the two modes, while simultaneously achieving the two
characteristics of high efficiency and distribution.
2. PoS:
PoS, the Proof of Stake algorithm, is an improved consensus mechanism
designed for the shortcomings of the PoW. It is mainly through the
method of accounting for rights and interests to solve the problem of
inefficiency of the network, waste of resources, and consistency of each
node. Different from the PoW, which requires nodes to continuously
perform hash calculations to verify the validity of transactions, the PoS
adds node weights based on PoW and introduces tokens as the basis for
weighting and, based on the proportion and time of each node’s weight,
reduces the difficulty of PoW in proportion to speed up finding random
numbers. The advantage of the PoS is that it solves the problems of
waste of resources and low efficiency in PoW, but its decentralization is
weaker.
244 Introduction to Blockchain Technologies
3. DPoS:
DPoS, the deposit-based proof of stake algorithm, is an authorization
consensus mechanism similar to the board of directors. This mechanism
allows each token holder to vote on the nodes of the entire system, decide
which nodes can be trusted and act on their behalf for verification and
accounting, and generate a small amount of corresponding rewards.
The decentralization of the blockchain-based on the DPoS mecha-
nism relies on a certain number of representatives, rather than all users.
In such a blockchain, all nodes vote to elect a certain number of node
representatives, who will act on behalf of all nodes to confirm blocks and
maintain the orderly operation of the system. At the same time, all nodes
in the blockchain have the power to recall and appoint representatives
at any time. If necessary, all nodes can vote to disqualify the current
node representatives and re-elect new representatives to achieve real-
time democracy[20] . DPoS greatly improves the processing capacity of
the blockchain and reduces the maintenance cost of the blockchain, so
that the transaction speed is close to that of a centralized settlement
system.
2. Raft:
Paxos is indeed a very influential consensus algorithm. It can be said that
it has laid the foundation for distributed consensus algorithms. However,
due to its incomprehension and difficulty in implementation, it is very
difficult to implement a complete Paxos algorithm[22] . Therefore, there
are many Paxos variants, the most famous of which is the Raft consensus
algorithm.
Raft is a distributed consensus algorithm used to manage log repli-
cation consistency. Its functions are similar to Paxos, but Raft is easier
to understand and implement, and it is easier to apply to actual systems.
The difference is that Raft uses stronger assumptions to reduce the state
that needs to be considered. It decomposes the consistency problem into
three relatively independent sub-problems, namely leader election, log
replication, and security. This makes Raft easier to understand and easier
to apply to the establishment of actual systems. The Raft algorithm is
one of the more consensus algorithms adopted by the alliance chain.
3. PBFT:
PBFT, the practical Byzantine fault tolerance algorithm, is a distributed
system consensus algorithm that can tolerate Byzantine errors. The core
of PBFT is to form a consensus on the state of the network between
normal nodes[23] . It is a consensus mechanism that allows voting and
the minority obeys the majority. The algorithm can tolerate Byzantine
errors and can allow the participation of strong supervision nodes. The
algorithm has high performance and is suitable for the development
of enterprise-level platforms[24] . At present, the mainstream enterprise-
level blockchain solution Hyperledger Fabric and Hyperchain, which
were developed by Hangzhou Qulian Technology, both provide PBFT
implementation solutions. However, the original PBFT algorithm is not
perfect in terms of reliability and flexibility. Hyperchain has enhanced
reliability and flexibility and designed and implemented an improved
algorithm of PBFT, namely robust Byzantine fault tolerant (RBFT).
RBFT optimizes the execution process of the native PBFT algorithm,
adds dynamic data failure recovery and dynamic node addition and
deletion mechanisms, which greatly improves the stability, flexibility,
and availability of the system, and better meets the production envi-
ronment requirements of enterprise-level consortium chain. Realize the
single point automatic recovery, automatic recovery strategy of dynamic
246 Introduction to Blockchain Technologies
data of the ledger[24] . This strategy can ensure that the cluster dynam-
ically adds and deletes nodes and dynamic data failure recovery under
non-stop conditions greatly enhances the availability of the consensus
module and improves the overall transaction throughput and system
stability of the system while ensuring the strong consistency of the BFT
system performance, reaching ten thousand TPS and millimeter-level
delay[25] . RBFT’s automatic recovery mechanism makes the storage of
its node consistent with the latest storage state in the system as soon
as possible by actively requesting the block and the block information
that is being consensus. It solves the data recovery problem caused
by network jitter, sudden power failure, disk failure, etc., during the
operation of the blockchain network, which may cause the execution
speed of some nodes to lag behind most nodes or directly go down.
As shown in Table 10.1, the characteristics of common consensus
mechanisms are listed.
(1) Scalability
Scalability has become a key technology to improve system perfor-
mance. Broader scalability includes two aspects: performance scalability
and function scalability. Performance scalability focuses on increasing trans-
action throughput through vertical expansion, and functional scalability
focuses on enhancing blockchain service capabilities through horizontal
expansion[30] .
In Bitcoin, the efficiency of the consensus mechanism is the bottleneck of
performance scalability[31] . The overall performance of the whole blockchain
system is also impacted by the bandwidth and speed of the P2P network,
the performance of sign, verification, a hash of cryptographic algorithms, the
single node performance, the IO rate of storage, the execute rate of virtual
machine, etc. Therefore, scalability has become a key technology to further
enhance the processing capabilities of the blockchain.
At present, common scalability technologies include sharding mech-
anism, namespace mechanism, lightning network, state channel, directed
acyclic graph (DAG) consensus, on-chain, off-chain, side-chain, child-
chain, etc.
(2) Interoperability
Interoperability refers to the ability to exchange information between a
blockchain system instance and other system instances or components and
to use the exchanged information. Among them, other system instances refer
to all external system instances except the blockchain system instance. It
includes three aspects: application layer interoperability, inter-chain interop-
erability, off-chain data interoperability.
It refers to the ability to exchange information between the upper application
system instance and the underlying blockchain system instance and to use
the exchanged information. Specifically, it contains two meanings: (1) data
circulation and value sharing between different applications through the
underlying chain; (2) docking interaction between the upper-level application
system instance and the underlying blockchain system instance.
It refers to the ability to exchange information between different blockchain
system instances and use the exchanged information. It can also be called
cross-chain. It is mainly manifested in the process of information interaction
between different blockchain system instances, including homogeneous chain
interoperability and heterogeneous chain interoperability.
250 Introduction to Blockchain Technologies
the chain system and traditional Internet services, and it is versatile, such
as communication networks, cloud platforms, etc. Dedicated infrastructure
refers to the software and hardware resources specifically required during
the use of the chain system, such as unified chain resource management sys-
tem, and digital identity management system. The general infrastructure has
been relatively mature after years of development. Dedicated infrastructure
involves the development of blockchain governance and related standards
and specifications. The business is in the early stage of the industry. With
the eruption of the interconnection needs of different chains, it will promote
the construction of blockchain dedicated infrastructure.
(3) Operation and Maintenance
As a complex system that integrates cryptographic algorithms, P2P networks,
consensus mechanisms, smart contracts, and other technologies, blockchain
is difficult to deploy, operate, and maintain. To lower the barriers to the
use of blockchain technology, some blockchain platform applications have
emerged, such as blockchain as a service (BaaS) and blockchain fusion server
(BFS),and they greatly reduce the difficulty and workload of blockchain
system operation and maintenance.
BaaS supports one-stop research and development (R&D) services such
as the one-click deployment of alliance chains, visual monitoring operation
and maintenance, and smart contract R&D, helping users to focus more on the
R&D and innovation of core business and achieve rapid business on-chain.
BFS provides blockchain one-click deployment networking services, pre-
senting the original cumbersome and time-consuming manual deployment
process of blockchain networks in an automated and visual way. At the same
time, BFS, which is developed by Hangzhou Qulian Technology, provides a
full range of operation and maintenance services, through node monitoring
visualization, to meet the needs of monitoring data visualization in various
scenarios.
For some common operations in operation and maintenance operations,
it is recommended that developers formulate a unified operation specification
according to their environment, which helps to minimize operation errors and
reduce operational risks. Before deployment, a reasonable resource assess-
ment can reduce the frequency of later expansion and enable the system to
effectively carry the existing business volume while coping with the subse-
quent business growth for a certain period. In actual deployment, according
to the security of the organization’s private key, it can be divided into two
10.4 Conclusion 253
10.4 Conclusion
Blockchain technology is born from Bitcoin, which is perfectly integrated
with PoW, P2P network, and cryptographic algorithms, and is developed and
grown from Ethereum which is a nicely used smart contract. Now that it is
stepping into stage 3, where is its development direction?
With the advantages of decentralization or multi-centralization, being
tamper-proof, traceability, transparency, and high reliability, blockchain tech-
nology will be evolving rapidly from three aspects: core technology, expan-
sion technology, and supporting technology. The innovation of core tech-
nologies which include cryptographic algorithms, P2P network consensus
mechanism, smart contract, and data storage will improve the performance
of blockchain systems. The innovation of expansion technologies which
include scalability, interoperability, collaborative governance, security, and
privacy will enhance the service capabilities and application breadth of the
blockchain system. The innovation of supporting technologies which include
system management, infrastructure, operation, and maintenance will improve
usability and ease of use of blockchain systems.
As a technology to reconstruct production relations and information
infrastructure, fusion with Internet of Things, artificial intelligence, Big
data, cloud, and 5G, blockchain technology will be strong enough to face
the challenges and risks on compliance, large-scale applications, the real
economy, and digital economy.
254 Introduction to Blockchain Technologies
References
[1] IRENA, Innovation Landscape for a Renewable-Powered Future:
Solutions to Integrate Variable Renewables. Preview for Pol-
icy Makers. Abu Dhabi: International Renewable Energy Agency,
2019.
[2] Hellani, H., Sliman, L., Samhat, A. E., and Exposito, E., On Blockchain
Integration with Supply Chain: Overview on Data Transparency. Logis-
tics, 2021, 5(3): 46
[3] IRENA, Innovation Landscape Brief: Blockchain. Abu Dhabi: Interna-
tional Renewable Energy Agency, 2019.
[4] Livingston, D., Sivaram, V., Freeman, M., and Fiege, M., Applying
Blockchain Technology to Electric Power Systems, 2018.
[5] Idrees, S. M., Nowostawski, M., Jameel, R., and Mourya, A. K. Security
Aspects of Blockchain Technology Intended for Industrial Applications.
Electronics, 2021, 10(8): 951.
[6] China Academy of Information and Communications Technology
(CAICT), Blockchain White Paper, 2020. Available: http://www.trus
tedblockchain.cn/#/result/result/resultDetail/3b1928a5c5404eaf80958
db5f39bef21/0
[7] China Academy of Information and Communications Technology
(CAICT), Blockchain Interoperability White Paper, 2020. Available:
http://www.trustedblockchain.cn/-/result/result/resultDetail/c90ee9
57aaf74f20960813999b7ea6bd/0
[8] Musleh, A. S, Yao, G. and Muyeen, S. M., Blockchain Application in
Smart Grid-Review and Frameworks. IEEE Access, 2019, 7: 86746-
86757.
[9] Blockchain Technology [EB/OL]. [Accessed: 2020-04-03]. Available:
https://www.tenet.eu/our-key-tasks/innovations/blockchain-technolo
gy.
[10] Yli-Huumo, J., Ko, D., Choi, S., et al., Where is Current Research on
Blockchain Technology-A Systematic Review. PLoS One, 2016, 11(10):
e0163477.
[11] Castro, M. and Liskov, B. Practical Byzantine Fault Tolerance and
Proactive Recovery. ACM Transactions on Computer Systems (TOCS),
2002, 20(4): 398-461.
[12] Castro, M. and Liskov, B., Practical Byzantine Fault Tolerance. In
Proceedings of the Third Symposium on Operating Systems Design and
Implementation, 1999, 173-186.
References 255
[30] Dorri, A., Kanhere, S. S., and Jurdak, R., Blockchain in Internet of
Things: Challenges and Solutions. arXiv preprint arXiv:1608.05187,
2016.
[31] Cachin, C., Architecture of the Hyperledger Blockchain Fabric. In
Proceedings of the Workshop on Distributed Cryptocurrencies and
Consensus Ledger, 2016.
[32] Available: https://mp.weixin.qq.com/s/fjscjSNZf-kkqX97TBrNvQ.
11
Blockchain Technologies for Renewable
Energy Resources with Case Study:
SHA–256, 384, and 512
Abstract
Blockchain is a new technology that has captured the attention of energy
companies, supply companies, entrepreneurs, software companies, invest-
ment firms, government bodies, and academics. This chapter analyzes the
performance of the hardware used to simulate the peer-to-peer energy trading
between distributed generations with proof-of-work (PoW) consensus mech-
anism especially in the case of SHA-256, 384, and 512. The PoW mechanism
creates a blockchain environment to trade between parties without authoriza-
tion, and it establishes a systematic methodology for the trading of energy
with an advanced contract system. Performance is measured by the CPU and
GPU of the device during the complete period of simulation. Linear trendline
and percentage evaluation demonstrate different scenarios of three secure
hash algorithms (SHAs). The result shows that SHA-512 has the highest
performance efficiency in terms of hardware usage and transaction duration
in peer-to-peer energy trading systems. It means that SHA-512 takes more
memory size in creating a block than other SHAs; however, it has sustainable
development in the processing of the blockchain demonstration.
257
258 Blockchain Technologies for Renewable Energy Resources with Case Study
11.1 Introduction
Energy is an absolute necessity for developing a sustainable society. The
trading of energy is a vertical approach from generation to end-user; however,
technology advancements and market behavior have led to the inclusion of
customers into the electricity trading market, where prosumers can trade their
excessive amount of energy [14, 15]. This type of market can reduce carbon
emissions, generate profit for both prosumers and consumers, and benefit
the grid system without absolute centralized authorization. The decentralized
energy system is used to mitigate the information, communication, and tech-
nology in every aspect of the energy market to solve sustainable development
goals, energy efficiency, security, and optimization. Since diverse energy
sources exist, the market might be turbulent at any time [11–13].
The integration of blockchain is widely acknowledged as a paradigm shift
to a decentralized energy market with bi-directional power flow [16]. When
merged with smart contracts, it offers accessible, tamper-proof, and reliable
platforms that can allow technology solutions. This research allows us to
demonstrate the hardware performance in different usage of secure hash algo-
rithms (SHAs) at peer-to-peer energy trading between distributed generations
with a consensus mechanism. The proof-of-work (PoW) mechanism creates
a blockchain environment to trade between parties without authorization, and
it will establish a systematic methodology for the trading of energy with
an advanced contract system. The hypothesis is that transaction time in the
PoW mechanism with less computation power depends on the different use
of SHAs in the trading system. Additionally, the performance comparison is
evaluated on distinct SHAs used in the consensus mechanism-based trading
[17, 20–22].
11.3 Simulation
11.3.1 Energy Trading Model and Case Study
Prior research by the author demonstrates the ability to trade using blockchain
by SHA-256-based PoW. A total of 45 transactions had occurred includ-
ing the genesis block, and the output graph of the trading can be seen in
Figure 11.2 which illustrates the demand of the library building because it had
demand, when the demand by energy building had not occurred. Figure 11.3
11.3 Simulation 261
Figure 11.2 Demand power from Library building and net surplus solar power at Energy
building [10].
Figure 11.4 Heatmap visualization between transaction and hardware performance. (a)
SHA-256. (b) SHA-384. (c) SHA-512.
Figure 11.6 (a) CPU usage and (b) power consumption in different SHA scenarios.
Figure 11.7 GPU usage in different SHAs. (a) NVIDIA GeForce MX330. (b) Intel UHD.
Figure 11.8 Trendline models of hardware performance in SHAs. (a) GPU 1. (b) GPU 2. (c)
CPU.
as PoS, PoA, and so on. It has been pointed out that changing SHAs in
blockchain-based trading impacts the GPU, CPU, and RAM performance
significantly. Based on the result, the transaction system has been dominated
by the CPU and RAM, which never reaches the maximum in any hashing
algorithm scenario. Though they are two separate GPUs, GPU 2 performed
constantly, while GPU 1 simply oscillates as a spark at some certain period.
Other literature studies had measured the performance of blockchain trans-
actions and some by comparing different consensus mechanisms but never
in the same way as this research’s approach. This research indicates the
specific analysis of SHA roles in the trading model. As the nature of SHA,
512 bit is more secured than the others in the family of SHA-2 and has the
longest output ASCII code. When we compare each SHA model, it cannot be
indeed stated which one has the strongest and better performance. However,
in a conclusion, SHA-512 has accomplished the block transactions at the
lowest CPU and GPU usage at less duration than the SHA-256 and 384.
Furthermore, this approach is encouraged to perform in Ethereum’s platform
with improved long-term energy trading system whether other findings in the
aspect of security can be expected.
268 Blockchain Technologies for Renewable Energy Resources with Case Study
References
[1] Aarenstrup, R. (2021). MATLAB Blockchain Example, MATLAB Cen-
tral File Exchange. Retrieved: August 23, 2021. https://www.mathwork
s.com/matlabcentral/fileexchange/65419-matlab-blockchain-example
[2] Hartnett, S., Henly, C., Hesse, E., Hildebrandt, T., Jentzch, C., Krämer,
K., ... & Trbovich, A. (2018). The Energy Web Chain-Accelerating
the Energy Transition with an Open-Source, Decentralized Blockchain
Platform. Energy Web Foundation.
[3] Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
Decentralized Business Review, 21260.
[4] Andoni, M., Robu, V., Flynn, D., Abram, S., Geach, D., Jenkins, D.,
... & Peacock, A. (2019). Blockchain technology in the energy sector:
A systematic review of challenges and opportunities. Renewable and
Sustainable Energy Reviews, 100, 143–174.
[5] Heck, K., Mengelkamp, E., & Weinhardt, C. (2020). Blockchain-based
local energy markets: Decentralized trading on single-board computers.
Energy Systems, 12(3), 603–618. https://doi.org/10.1007/s12667-020-0
0399-4
[6] National Institute of Standards and Technology. (2015). Secure Hash
Standard (SHS). (U.S. Department of Commerce, Washington, DC),
Federal Information Processing Standards Publication (FIPS), 180–184.
https://doi.org/10.6028/NIST.FIPS.180-4
[7] Soshinskaya, M., Crijns-Graus, W. H., Guerrero, J. M., & Vasquez,
J. C. (2014). Microgrids: Experiences, barriers and success factors.
Renewable and Sustainable Energy Reviews, 40, 659–672.
[8] Tao, L., Schwaegerl, C., Narayanan, S., & Zhang, J. H. (2011, May).
From laboratory microgrid to real markets—Challenges and opportuni-
ties. In 8th International Conference on Power Electronics-ECCE Asia
(pp. 264–271). IEEE.
[9] Thu, K. S., & Ongsakul, W. (2020). Simulation of blockchain based
power trading with solar power prediction in prosumer consortium
model. In 2020 International Conference and Utility Exhibition on
Energy, Environment and Climate Change (ICUE). https://doi.org/10
.1109/icue49301.2020.9307086
[10] Thu, K. S., Aung, M. S., Ongsakul, W., & Manjiparambil, N. M. (2020).
The first national conference on engineering research. In Transition
of University to Prosumer Consortium Energy Model (pp. 168–172).
Yangon; Federation of Myanmar Engineering Societies.
References 269
[23] Li, Z., Kang, J., Yu, R., Ye, D., Deng, Q., & Zhang, Y. (2017).
Consortium blockchain for secure energy trading in industrial Inter-
net of Things. IEEE Transactions on Industrial Informatics, 14(8),
3690–3700.
[24] Hatziargyriou, N. (2014). Microgrids: Architectures and Control. Hobo-
ken, NJ: John Wiley & Sons.
[25] Basak, P., Chowdhury, S., nee Dey, S. H., & Chowdhury, S. (2012). A
literature review on integration of distributed energy resources in the
perspective of control, protection and stability of microgrid. Renewable
and Sustainable Energy Reviews, 16(8), 5545–5556.
Index
271
272 Index
M R
Machine learning (ML) 8, 93, 94, 95, Reactive compensation 212, 230
112, 204 Renewable energy 29, 79, 121, 156,
Machine learning techniques 93, 96, 179, 235, 257
115, 121
Machine learning techniques
for renewable energy 121 S
Modern hybrid power systems Secure hash algorithms (shas) 258
(MHPS) 116, 149, 173, 176 Sensor 9, 12, 14, 15, 44, 83, 84
MPPT algorithm 141, 142 SHA 240, 257, 260, 263
Smart contract 47, 235, 247, 252, 261
Smart distribution system 61, 63, 79
O Smart grid 38, 56, 117, 179
Optimization 38, 149, 161, 178, 193, Solar PV 79, 121, 134
214 Supervised and Unsupervised
Optimization techniques 161, 178, Learning 100
185 Supporting technology 238, 251, 253
P U
Particle swarm optimization (PSO) Ubiquitous computing 5
205, 207
Peer-to-peer 45, 201, 235, 241, 257,
263 W
Power quality (PQ) 61, 177 Wind energy conversion system 76
About the Editors
Meera K. Joseph (Senior Member IEEE and Senior Member SAIEE, PMI-
ITPSA) currently works as an Independent Contractor at the Independent
Institute of Education, South Africa. She has been the doctoral supervisor
for DBA students at the Milpark Business School from January 2021. For a
273
274 About the Editors
short period, she served as the HoD, School of IT and Business at AIE, South
Africa up to the end of December 2021. She earlier worked as the Associate
Professor at the DFC, Department of Electrical and Electronic Engineering
Technology, School of Electrical Engineering, University of Johannesburg
(UJ) until 2018 and held various positions at University of Johannesburg,
South Africa for 18 years (permanent roles). She received the degrees of
D.Phil. Engineering Management (rural women and information and commu-
nication technology field), UJ in April 2014, a master’s degree in Computer
Applications in 1998 from Bangalore University and a B.Sc. in Chemistry
(Physics and Mathematics sub.) from the University of Kerala, India. She has
authored or contributed to 75 research works and has around 20 years lectur-
ing experience in the computer engineering/ICT field. At UJ she was lecturing
subjects with labs related to Java/UML, C, Javascript and HTML, Linux,
VB, VBA/ VB.Net, MS Access/ SQL, C++, MS Office Applications, MS
VISIO. Her multidisciplinary research interests are ICT4D (information and
communication technology for development), smart grids, cloud computing,
AI and machine learning for development, computer networks, femtocells,
ICT for renewable energy research, ICT for power engineering research, ICT
for empowerment, data analytics, Blockchain in cybersecurity and the use of
ICT in engineering education.