Pub Date : 2022-07-05DOI: 10.23919/SpliTech55088.2022.9854345
H. Belani, P. Šolić, M. Mimica
Well-being and health of aging population are becoming even greater challenges in the world population growing in size and proportion of older persons. World Health Organization claims that, by 2030, one in six people in the world will be aged 60 years or over, increasing from 1 billion to 1.4 billion. The same number will double by 2050. There is an immanent need to continuously deliver innovations for this population, taking into account not only health but also well-being aspects. Innovation pathway represents a generic framework of phases and stages common to implement innovations and accomplish their market reach, while fulfilling certain milestones on the way, starting with the need and idea, progressing through development, market entry, and eventually adoption. This paper provides an approach to optimisation of the innovation pathway to provide more precise steps and guidance for well-being, aging and health, delivering more integrative and inclusive pathway. Other contributions include the stakeholder 4P (patient, policy makers, providers and population) model, the innovation drivers and the innovation map that serve the proposed optimised innovation pathway. In order to provide guidance on the usage of such a pathway, a case study has been conducted with two examples from Croatian e-health ecosystem. Although the pathway application varies depending on the context, the proposed pathway serves as a solid starting point for further research and development.
{"title":"An Innovation Pathway for Well-Being, Aging and Health: A Croatian Case Study","authors":"H. Belani, P. Šolić, M. Mimica","doi":"10.23919/SpliTech55088.2022.9854345","DOIUrl":"https://doi.org/10.23919/SpliTech55088.2022.9854345","url":null,"abstract":"Well-being and health of aging population are becoming even greater challenges in the world population growing in size and proportion of older persons. World Health Organization claims that, by 2030, one in six people in the world will be aged 60 years or over, increasing from 1 billion to 1.4 billion. The same number will double by 2050. There is an immanent need to continuously deliver innovations for this population, taking into account not only health but also well-being aspects. Innovation pathway represents a generic framework of phases and stages common to implement innovations and accomplish their market reach, while fulfilling certain milestones on the way, starting with the need and idea, progressing through development, market entry, and eventually adoption. This paper provides an approach to optimisation of the innovation pathway to provide more precise steps and guidance for well-being, aging and health, delivering more integrative and inclusive pathway. Other contributions include the stakeholder 4P (patient, policy makers, providers and population) model, the innovation drivers and the innovation map that serve the proposed optimised innovation pathway. In order to provide guidance on the usage of such a pathway, a case study has been conducted with two examples from Croatian e-health ecosystem. Although the pathway application varies depending on the context, the proposed pathway serves as a solid starting point for further research and development.","PeriodicalId":295373,"journal":{"name":"2022 7th International Conference on Smart and Sustainable Technologies (SpliTech)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134051182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-05DOI: 10.23919/SpliTech55088.2022.9854362
B. C. Da Silva, H. M. C. Branco, Lucas Da Costa Sa, Ricardo de Andrade Lira Rabêlo
Transmission lines (TL) are one of the most important components of an electrical system and, due to their extension, they are the most vulnerable to faults. Fast and accurate fault location on transmission lines is necessary to reduce repair costs, maintain system reliability and cause the least damage to customers. In this context, this work proposes the implementation of a method for locating faults in TL using Mel-Frequency Cepstral Coefficients (MFCC) for processing voltage and/or current signals that will be analyzed by a genetic algorithm to extract the best parameters to be used in a curve fitting algorithm to determine the fault location. A general relative mean error of 7.05% was found. The highest relative errors were found near the measurement terminal. Since the largest errors are concentrated near the terminals, the method proved to be reliable.
{"title":"Faults Location in Transmission Lines using Mel Frequency Cepstral Coefficients","authors":"B. C. Da Silva, H. M. C. Branco, Lucas Da Costa Sa, Ricardo de Andrade Lira Rabêlo","doi":"10.23919/SpliTech55088.2022.9854362","DOIUrl":"https://doi.org/10.23919/SpliTech55088.2022.9854362","url":null,"abstract":"Transmission lines (TL) are one of the most important components of an electrical system and, due to their extension, they are the most vulnerable to faults. Fast and accurate fault location on transmission lines is necessary to reduce repair costs, maintain system reliability and cause the least damage to customers. In this context, this work proposes the implementation of a method for locating faults in TL using Mel-Frequency Cepstral Coefficients (MFCC) for processing voltage and/or current signals that will be analyzed by a genetic algorithm to extract the best parameters to be used in a curve fitting algorithm to determine the fault location. A general relative mean error of 7.05% was found. The highest relative errors were found near the measurement terminal. Since the largest errors are concentrated near the terminals, the method proved to be reliable.","PeriodicalId":295373,"journal":{"name":"2022 7th International Conference on Smart and Sustainable Technologies (SpliTech)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133376055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-05DOI: 10.23919/SpliTech55088.2022.9854355
Nils Jakob Johannesen, M. Kolhe, Morten Goodwin
Detection of anomalies based on smart meter data is crucial to identify potential risks and unusual events at an early stage. The available advanced information and communicating platform and computational capability renders smart grid prone to attacks with extreme social, financial and physical effects. The smart network enables energy management of smart appliances contributing support for ancillary services. Cyber threats could affect operation of smart appliances and hence the ancillary services, which might lead to stability and security issues. In this work, an overview is presented of different methods used in anomaly detection, performance evaluation of 3 models, the k-Nearest Neighbor, local outlier factor and isolated forest on recorded smart meter data from urban area and rural region
{"title":"Evaluating Anomaly Detection Algorithms through different Grid scenarios using k-Nearest Neighbor, iforest and Local Outlier Factor","authors":"Nils Jakob Johannesen, M. Kolhe, Morten Goodwin","doi":"10.23919/SpliTech55088.2022.9854355","DOIUrl":"https://doi.org/10.23919/SpliTech55088.2022.9854355","url":null,"abstract":"Detection of anomalies based on smart meter data is crucial to identify potential risks and unusual events at an early stage. The available advanced information and communicating platform and computational capability renders smart grid prone to attacks with extreme social, financial and physical effects. The smart network enables energy management of smart appliances contributing support for ancillary services. Cyber threats could affect operation of smart appliances and hence the ancillary services, which might lead to stability and security issues. In this work, an overview is presented of different methods used in anomaly detection, performance evaluation of 3 models, the k-Nearest Neighbor, local outlier factor and isolated forest on recorded smart meter data from urban area and rural region","PeriodicalId":295373,"journal":{"name":"2022 7th International Conference on Smart and Sustainable Technologies (SpliTech)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130100215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-05DOI: 10.23919/SpliTech55088.2022.9854356
Dražen Kustura, Frane Vlak, T. Matić, Marko Vukasović
This paper presents a modified approach for the calculation of longitudinal displacements (circumferential displacements) of an arbitrary point on the middle surface of thin-walled curved beams with constant radius of the curved centroid line and with a doubly symmetric open cross-sections (I and H cross-sections). The governing equations for thin-walled curved beams loaded in the plane of curvature are obtained from the equilibrium equations of the curved centroid line. Moreover, closed-form solutions for the case of in-plane loading of thin-walled curved beams obtained by the initial parameter method are compared with the solutions presented by other researchers and with the results of the finite element method analysis.
{"title":"In-plane Displacements of Thin-walled Curved Beams","authors":"Dražen Kustura, Frane Vlak, T. Matić, Marko Vukasović","doi":"10.23919/SpliTech55088.2022.9854356","DOIUrl":"https://doi.org/10.23919/SpliTech55088.2022.9854356","url":null,"abstract":"This paper presents a modified approach for the calculation of longitudinal displacements (circumferential displacements) of an arbitrary point on the middle surface of thin-walled curved beams with constant radius of the curved centroid line and with a doubly symmetric open cross-sections (I and H cross-sections). The governing equations for thin-walled curved beams loaded in the plane of curvature are obtained from the equilibrium equations of the curved centroid line. Moreover, closed-form solutions for the case of in-plane loading of thin-walled curved beams obtained by the initial parameter method are compared with the solutions presented by other researchers and with the results of the finite element method analysis.","PeriodicalId":295373,"journal":{"name":"2022 7th International Conference on Smart and Sustainable Technologies (SpliTech)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133239058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-05DOI: 10.23919/SpliTech55088.2022.9854214
F. Mustač, Lea Tomašić, Mirta Peček, Tin Galijašević, Andrea Grkinic, Filip Medić, M. Matovinović, D. Marcinko
When it comes to obesity, it is one of today's biggest problems from several perspectives. Obesity increases cardiovascular risk, can cause shortened life expectancy, and many others. The possibilities of treating obesity are growing every day, from pharmacological to surgical, but in the end, the key is to change life habits (lifestyle) that will enable a healthier life and a favorable trend in body mass index. Mobile applications stand out as very useful health intervention tool because they are available almost to everyone. The paper describes applications that count daily steps, caloric intake, and the ones which promote exercise. The most effective applications in reducing weight are those easy to use, combined with traditional healthy lifestyle methods, promoting healthy competition, giving positive feedback to users, with straightforward exercise and food intake plans and goal settings, apps measuring both the physical activity and caloric intake. Such applications improve the quality of life of people with obesity.
{"title":"Mobile applications and improving the quality of life in people with obesity","authors":"F. Mustač, Lea Tomašić, Mirta Peček, Tin Galijašević, Andrea Grkinic, Filip Medić, M. Matovinović, D. Marcinko","doi":"10.23919/SpliTech55088.2022.9854214","DOIUrl":"https://doi.org/10.23919/SpliTech55088.2022.9854214","url":null,"abstract":"When it comes to obesity, it is one of today's biggest problems from several perspectives. Obesity increases cardiovascular risk, can cause shortened life expectancy, and many others. The possibilities of treating obesity are growing every day, from pharmacological to surgical, but in the end, the key is to change life habits (lifestyle) that will enable a healthier life and a favorable trend in body mass index. Mobile applications stand out as very useful health intervention tool because they are available almost to everyone. The paper describes applications that count daily steps, caloric intake, and the ones which promote exercise. The most effective applications in reducing weight are those easy to use, combined with traditional healthy lifestyle methods, promoting healthy competition, giving positive feedback to users, with straightforward exercise and food intake plans and goal settings, apps measuring both the physical activity and caloric intake. Such applications improve the quality of life of people with obesity.","PeriodicalId":295373,"journal":{"name":"2022 7th International Conference on Smart and Sustainable Technologies (SpliTech)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133331479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-05DOI: 10.23919/SpliTech55088.2022.9854284
Ruben Sanchez Corcuera, A. Zubiaga, Aitor Almeida
Cases of organised disinformation campaigns on Twitter, including those reported by the social network itself in its Transparency centre, continue unabated. The negative consequences of these attacks in processes of great importance to societies, such as electoral processes or vaccination campaigns, have sparked research into detecting this type of malicious user. State-of-the-art models for bot detection use numerous information collected from profiles, tweets, or network archi-tecture to obtain competitive outcomes. On the other hand, these models allow for post-hoc detection of such users because they rely on fixed training datasets to classify users based on their previous activities. In contrast, we propose a proactive technique that uses user records to predict dangerous attacks before they occur as a measure to make social networks safer, fairer and less biased. For this purpose, our method uses a model that predicts malicious assaults by projecting users' embedding trajectories before completing their actions. We employed a Dynamic Directed Multigraph representation of temporal inter-actions between people in the Twittersphere for the experiments. By comparing them in the same data, our model outperforms state-of-the-art methods by 40.66% in F-score detecting malicious users preemptively. In addition, we propose a model selection study that evaluates the usefulness of several system components.
{"title":"Achieving Participatory Smart Cities by Making Social Networks Safer","authors":"Ruben Sanchez Corcuera, A. Zubiaga, Aitor Almeida","doi":"10.23919/SpliTech55088.2022.9854284","DOIUrl":"https://doi.org/10.23919/SpliTech55088.2022.9854284","url":null,"abstract":"Cases of organised disinformation campaigns on Twitter, including those reported by the social network itself in its Transparency centre, continue unabated. The negative consequences of these attacks in processes of great importance to societies, such as electoral processes or vaccination campaigns, have sparked research into detecting this type of malicious user. State-of-the-art models for bot detection use numerous information collected from profiles, tweets, or network archi-tecture to obtain competitive outcomes. On the other hand, these models allow for post-hoc detection of such users because they rely on fixed training datasets to classify users based on their previous activities. In contrast, we propose a proactive technique that uses user records to predict dangerous attacks before they occur as a measure to make social networks safer, fairer and less biased. For this purpose, our method uses a model that predicts malicious assaults by projecting users' embedding trajectories before completing their actions. We employed a Dynamic Directed Multigraph representation of temporal inter-actions between people in the Twittersphere for the experiments. By comparing them in the same data, our model outperforms state-of-the-art methods by 40.66% in F-score detecting malicious users preemptively. In addition, we propose a model selection study that evaluates the usefulness of several system components.","PeriodicalId":295373,"journal":{"name":"2022 7th International Conference on Smart and Sustainable Technologies (SpliTech)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130559559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-05DOI: 10.23919/SpliTech55088.2022.9854275
Karl Kiesel, Tom Deep, Austin Flaherty, S. Bhunia
The aim of this paper is to analyze the Accellion File Transfer Attack. In December 2020, a group of malicious actors breached the Accellion FTA system. The FTA system is used to transfer mass amounts of data quickly and efficiently between multiple systems. Once Accellion's appliance was breached, malicious actors copied data and threatened to release the data onto the internet if not paid a ransom. In order to prevent this from taking place, Accellion, as well as multiple client companies, assisted breached establishments with defense solutions, customer support, and ransom advice. Our findings indicate that Accellion was breached through four separate exploits. The main hacking methodology used was an SQL injection. Once into the system, attackers could view which transferred data was sensitive due to it being flagged with a special “sensitive” mark. Our findings are valuable because they express how companies should go about handling ransomware attacks. Our findings also indicate a solution for this type of attack and how a company should respond if they are faced with a ransomware attack.
{"title":"Analyzing Multi-Vector Ransomware Attack on Accellion File Transfer Appliance Server","authors":"Karl Kiesel, Tom Deep, Austin Flaherty, S. Bhunia","doi":"10.23919/SpliTech55088.2022.9854275","DOIUrl":"https://doi.org/10.23919/SpliTech55088.2022.9854275","url":null,"abstract":"The aim of this paper is to analyze the Accellion File Transfer Attack. In December 2020, a group of malicious actors breached the Accellion FTA system. The FTA system is used to transfer mass amounts of data quickly and efficiently between multiple systems. Once Accellion's appliance was breached, malicious actors copied data and threatened to release the data onto the internet if not paid a ransom. In order to prevent this from taking place, Accellion, as well as multiple client companies, assisted breached establishments with defense solutions, customer support, and ransom advice. Our findings indicate that Accellion was breached through four separate exploits. The main hacking methodology used was an SQL injection. Once into the system, attackers could view which transferred data was sensitive due to it being flagged with a special “sensitive” mark. Our findings are valuable because they express how companies should go about handling ransomware attacks. Our findings also indicate a solution for this type of attack and how a company should respond if they are faced with a ransomware attack.","PeriodicalId":295373,"journal":{"name":"2022 7th International Conference on Smart and Sustainable Technologies (SpliTech)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122177575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-05DOI: 10.23919/SpliTech55088.2022.9854294
Omayma M. Abdulmajeed, A. Jadallah, Ghassan A. Bilal, M. Arıcı
Solar energy has the most significant potential for power-producing systems. Profiteering this kind of renewable energy has got a considerable concern. The utilization of such renewable energy sources can minimize atmospheric pollutants (the leading cause of climate change). Researchers have investigated different designs and equipment to utilize the (Photovoltaic) PV modules temperature. The PV module's electricity generation is negatively affected by rising PV module temperature. As a solution, a (Photovoltaic/thermal) PV/T system provides heat gain and improves electrical efficiency via cooling the PV module. Many applications have considered the achievement of the best electrical and thermal performances. The current status of the hybrid PV/T solar collector system and methods such as using simulation approaches of their performances were included. The review highlighted some points, such as the solar energy gain, the layout of the bifluid-based PV/T system, and more applications of such a bifluid system. Electrical and thermal efficiencies of 17% and 76%, respectively, were achieved in the literature through the use of bifluid-based PV/ T systems. Furthermore, using PV/ T bifluid systems as an alternative to the conventional power-producing sources deals with solving the problem of atmospheric pollution; not only this, but the economic analysis has performed satisfactory results. Applications of bifluid-based PV/T systems are broad, including green-house, drying processes, building integrated systems, etc. These applications are recommended based on the satisfying results of electrical and thermal energies gained.
{"title":"Advanced PV/T Bifluid Solar Collector System: A Review","authors":"Omayma M. Abdulmajeed, A. Jadallah, Ghassan A. Bilal, M. Arıcı","doi":"10.23919/SpliTech55088.2022.9854294","DOIUrl":"https://doi.org/10.23919/SpliTech55088.2022.9854294","url":null,"abstract":"Solar energy has the most significant potential for power-producing systems. Profiteering this kind of renewable energy has got a considerable concern. The utilization of such renewable energy sources can minimize atmospheric pollutants (the leading cause of climate change). Researchers have investigated different designs and equipment to utilize the (Photovoltaic) PV modules temperature. The PV module's electricity generation is negatively affected by rising PV module temperature. As a solution, a (Photovoltaic/thermal) PV/T system provides heat gain and improves electrical efficiency via cooling the PV module. Many applications have considered the achievement of the best electrical and thermal performances. The current status of the hybrid PV/T solar collector system and methods such as using simulation approaches of their performances were included. The review highlighted some points, such as the solar energy gain, the layout of the bifluid-based PV/T system, and more applications of such a bifluid system. Electrical and thermal efficiencies of 17% and 76%, respectively, were achieved in the literature through the use of bifluid-based PV/ T systems. Furthermore, using PV/ T bifluid systems as an alternative to the conventional power-producing sources deals with solving the problem of atmospheric pollution; not only this, but the economic analysis has performed satisfactory results. Applications of bifluid-based PV/T systems are broad, including green-house, drying processes, building integrated systems, etc. These applications are recommended based on the satisfying results of electrical and thermal energies gained.","PeriodicalId":295373,"journal":{"name":"2022 7th International Conference on Smart and Sustainable Technologies (SpliTech)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-05DOI: 10.23919/SpliTech55088.2022.9854239
David Bačnar, Lolita Leytner, Rene Prenc, Veljko Jardas, J. Lerga
Smart meters are modernizing the electrical energy systems, solving numerous problems of the classical systems, and introducing new functionalities to the grid. This paper aims to give an insight into these systems in terms of their security and privacy aspects. Special attention is paid to the energy theft problem (meter tampering, physical anti-tampering measures, and theft detection methods). We, next, address other security issues present in remote metering (attack types, risks, and threats to the system). Also, necessary security requirements and signature-based, anomaly-based, and specification-based Intrusion Detection Systems (IDS) are defined. We conclude by listing privacy concerns arising due to the remote meters and advanced metering infrastructures (AMI) being installed more and more.
{"title":"On Security And Privacy In Smart Metering Systems","authors":"David Bačnar, Lolita Leytner, Rene Prenc, Veljko Jardas, J. Lerga","doi":"10.23919/SpliTech55088.2022.9854239","DOIUrl":"https://doi.org/10.23919/SpliTech55088.2022.9854239","url":null,"abstract":"Smart meters are modernizing the electrical energy systems, solving numerous problems of the classical systems, and introducing new functionalities to the grid. This paper aims to give an insight into these systems in terms of their security and privacy aspects. Special attention is paid to the energy theft problem (meter tampering, physical anti-tampering measures, and theft detection methods). We, next, address other security issues present in remote metering (attack types, risks, and threats to the system). Also, necessary security requirements and signature-based, anomaly-based, and specification-based Intrusion Detection Systems (IDS) are defined. We conclude by listing privacy concerns arising due to the remote meters and advanced metering infrastructures (AMI) being installed more and more.","PeriodicalId":295373,"journal":{"name":"2022 7th International Conference on Smart and Sustainable Technologies (SpliTech)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-05DOI: 10.23919/SpliTech55088.2022.9854260
Z. Šimić, D. Topić, Marina Dubravac
Optimal scheduling of the battery energy storage (BES) in a microgrid is presented in this paper. The microgrid model in this paper consists of a photovoltaic (PV) power plant, a wind generator (WG), battery energy storage (BES), load, and diesel generator (DG). BES is required to store the generation excess from renewable energy sources (RES). BES also can store energy from the main grid but optimization is required to decide when to charge and discharge the battery. The optimization goal is to minimize electricity costs when the main grid is available and fuel costs when it is not available. The optimization problem in this paper is a linear programming (LP) problem that is modeled and solved with Python Gurobi. Optimization results are presented for different cases. A DG is used only when the main grid is not available due to the high fuel price. Electricity cost from DG is 5.28 times higher than the cost from the grid for the first case and 4.36 times higher for the second case. There is no generation excess in the second case so the battery is not used when the main grid is not available.
{"title":"Optimal scheduling of battery energy storage in microgrid to minimize electricity and fuel costs","authors":"Z. Šimić, D. Topić, Marina Dubravac","doi":"10.23919/SpliTech55088.2022.9854260","DOIUrl":"https://doi.org/10.23919/SpliTech55088.2022.9854260","url":null,"abstract":"Optimal scheduling of the battery energy storage (BES) in a microgrid is presented in this paper. The microgrid model in this paper consists of a photovoltaic (PV) power plant, a wind generator (WG), battery energy storage (BES), load, and diesel generator (DG). BES is required to store the generation excess from renewable energy sources (RES). BES also can store energy from the main grid but optimization is required to decide when to charge and discharge the battery. The optimization goal is to minimize electricity costs when the main grid is available and fuel costs when it is not available. The optimization problem in this paper is a linear programming (LP) problem that is modeled and solved with Python Gurobi. Optimization results are presented for different cases. A DG is used only when the main grid is not available due to the high fuel price. Electricity cost from DG is 5.28 times higher than the cost from the grid for the first case and 4.36 times higher for the second case. There is no generation excess in the second case so the battery is not used when the main grid is not available.","PeriodicalId":295373,"journal":{"name":"2022 7th International Conference on Smart and Sustainable Technologies (SpliTech)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129258098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}