تعداد نشریات | 43 |
تعداد شمارهها | 1,253 |
تعداد مقالات | 15,411 |
تعداد مشاهده مقاله | 51,249,569 |
تعداد دریافت فایل اصل مقاله | 14,256,751 |
A Cyber Secured optimal scheduling framework for AC microgrids based on dragonfly optimization and deep learning | ||
مجله مهندسی برق دانشگاه تبریز | ||
مقالات آماده انتشار، اصلاح شده برای چاپ، انتشار آنلاین از تاریخ 06 دی 1402 | ||
نوع مقاله: علمی-پژوهشی | ||
شناسه دیجیتال (DOI): 10.22034/tjee.2023.57914.4685 | ||
نویسندگان | ||
علی حیدری1؛ رضا اسلامی* 2 | ||
1دانشکده مهندسی برق دانشگاه صنعتی سهند تبریز | ||
2دانشکده مهندسی برق، دانشگاه صنعتی سهند تبریز، تبریز، ایران | ||
چکیده | ||
Smart grid is a cyber-physical system, a combination of physical devices and computational processes. Enhancing interaction between the cyber and physical layers is crucial for optimizing system operation, management, and security. Motivated by this, in this paper, a framework for solving the optimal scheduling of an AC-microgrid (ACMG) system, is presented. The optimal scheduling of the system is modelled as an optimization problem. Also, the dragonfly is utilized as a powerful optimization technique to solve the proposed optimization problem. On the other side, considering cyber-attacks as a great threat to the system which can cause disruption and outage in smart grids, a deep-learning-based method, long short-term memory (LSTM), along with the concept of prediction interval is utilized to develop a cyber-attack detection model for false data injection attacks on smart meters. In this structure, the optimization is carried out using dragonfly optimization. Also, the LSTM, which is a subset of recurrent neural networks, is designed. With an accuracy of 97%, this model can ensure the cyber-security of the structure. Furthermore, to demonstrate the excellence of the proposed method, it is compared to an Artificial Neural Network (ANN). As the results show, the deep learning LSTM approach outperforms the ANN method in terms of accuracy and cyber-security. The proposed cyber-attack detection model is first trained using historical data and then is used in real-time conditions. For investigating the effectiveness of the proposed approach, the modified IEEE 33-bus test system is utilized. The results significantly show the effectiveness of the proposed methodologies | ||
کلیدواژهها | ||
Optimal scheduling؛ False data injection attacks؛ AC microgrids؛ Dragonfly optimization technique؛ Practical swarm optimization | ||
مراجع | ||
| ||
آمار تعداد مشاهده مقاله: 89 |