Now showing 1 - 10 of 27
  • Publication
    Centralized Model Predictive Control for Transient Frequency Control in Islanded Inverter-Based Microgrids
    ( 2023)
    Heins, T.
    ;
    Josevski, M.
    ;
    Gurumurthy, S.
    ;
    Grid-forming inverters can establish frequency and voltage regulation in autonomous microgrids by themselves without relying on the external grid and as such are significant enablers for the integration of inverter-interfaced renewable energy sources. The most prominent grid-forming strategies, the droop-based techniques, cannot provide an error-free frequency regulation after a step-wise disturbance and thus are completed by the secondary integral action. In this paper, we propose a model predictive control for fast frequency response in an AC, purely inverter-based microgrid operating in islanded mode. The controller acts as a secondary control unit and adjusts the control actions of the underlying droop controllers leading to an error-free frequency transient control. The controller has been designed leveraging the concept of frequency divider - a simple analytical formulation that estimates the frequency at every system bus. The proposed control is successful in providing a fast frequency response, i.e., it assures a system-wide error-free frequency regulation under different operating circumstances including load changes and varying X/R-ratios. Numerical simulations are carried out in the WSCC 9-Bus and IEEE 39-Bus systems to verify the performance of the proposed method during transients and a comparison with respect to the more common secondary frequency control is given.
  • Publication
    Transparency in Medical Arti¯cial Intelligence Systems
    ( 2023)
    Quakulinski L.
    ;
    Koumpis, Adamantios
    ;
    Beyan, Oya Deniz
    Many of the artificial intelligence (AI) systems used nowadays have a very high level of accuracy but fail to explain their decisions. This is critical, especially in sensitive areas such as medicine and the health area at large but also for applications of the law, finance etc., where explanations for certain decisions are needed and are often useful and valuable as the decision itself. This paper presents a review of four different methods for creating transparency in AI systems. It also suggests a list of criteria under which circumstances one should use which methods.
  • Publication
    Persistent Identification for Conferences
    ( 2022-04-05)
    Franken, Julian
    ;
    Birukou, Aliaksandr
    ;
    Eckert, Kai
    ;
    Fahl, Wolfgang
    ;
    Hauschke, Christian
    ;
    Persistent identification of entities plays a major role in the progress of digitization of many fields. In the scholarly publishing realm there are already persistent identifiers (PID) for papers (DOI), people (ORCID), organisation (GRID, ROR), books (ISBN) but there is no generally accepted PID system for scholarly events such as conferences or workshops yet. This article describes the relevant use cases that motivate the introduction of persistent identifiers for conferences. The use cases were mainly derived from interviews, discussions with experts and their previous work. As primary stakeholders who are involved in the typical conference event life cycle researchers, conference organizers, and data consumers were identified. The resulting list of use cases illustrates how PIDs for conference events will improve the current situation for these stakeholders and help with problems they are facing today.
  • Publication
    Temporal Performance Analysis for Block-Structured Process Models in Cortado
    ( 2022) ;
    Schade, Lukas
    ;
    ;
    Aalst, Wil van der
    Process mining techniques provide insights into operational processes by systematically analyzing event data generated during process execution. These insights are used to improve processes, for instance, in terms of runtime, conformity, or resource allocation. Time-based performance analysis of processes is a key use case of process mining. This paper presents the performance analysis functionality in the process mining software tool Cortado. We present novel performance analyses for block-structured process models, i.e., hierarchical structured Petri nets. By assuming block-structured models, detailed performance indicators can be calculated for each block that makes up the model. This detailed temporal information provides valuable insight into the process under study and facilitates analysts to identify optimization potential.
  • Publication
    A Service Oriented Architecture for the Digitalization and Automation of Distribution Grids
    ( 2022)
    Pau, Marco
    ;
    Mirz, Markus
    ;
    Dinkelbach, Jan
    ;
    McKeever, Padraic
    ;
    Ponci, Ferdinanda
    ;
    Modern distribution grids are complex systems that need advanced management for their secure and reliable operation. The Information and Communication Technology domain today offers unprecedented opportunities for the smart design of tools in support of grid operators. This paper presents a new philosophy for the digitalization and automation of distribution grids, based on a modular architecture of microservices implemented via container technology. This architecture enables a service-oriented deployment of the intelligence needed in the Distribution Management Systems, moving beyond the traditional view of monolithic software installations in the control rooms. The proposed architecture unlocks a broad set of possibilities, including cloud-based implementations, extension of legacy systems and fast integration of machine learning-based analytic tools. Moreover, it potentially opens a completely new market of turnkey services for distribution grid management, thus avoiding large upfront investments for grid operators. This paper presents the main concepts and benefits of the proposed philosophy, together with an example of field implementation based on open source components carried out in the context of the European project SOGNO.
  • Publication
    IoT Middleware Platforms for Smart Energy Systems
    ( 2022)
    Alfalouji, Q.
    ;
    Schranz, T.
    ;
    Kümpel, A.
    ;
    Schraven, M.
    ;
    Storek, T.
    ;
    Groß, Stephan
    ;
    ;
    Müller, D.
    ;
    Schweiger, G.
    Middleware platforms are key technology in any Internet of Things (IoT) system, considering their role in managing the intermediary communications between devices and applications. In the energy sector, it has been shown that IoT devices enable the integration of all network assets to one large distributed system. This comes with significant benefits, such as improving energy efficiency, boosting the generation of renewable energy, reducing maintenance costs and increasing comfort. Various existing IoT middlware solutions encounter several problems that limit their performance, such as vendor locks. Hence, this paper presents a literature review and an expert survey on IoT middleware platforms in energy systems, in order to provide a set of tools and functionalities to be supported by any future efficient, flexible and interoperable IoT middleware considering the market needs. The analysis of the results shows that experts currently use the IoT middleware mainly to deploy services such as visualization, monitoring and benchmarking of energy consumption, and energy optimization is considered as a future application to target. Likewise, non-functional requirements, such as security and privacy, play vital roles in the IoT platforms' performances.
  • Publication
    How Can Interactive Process Discovery Address Data Quality Issues in Real Business Settings? Evidence from a Case Study in Healthcare
    ( 2022)
    Benevento, E.
    ;
    Aloini, D.
    ;
    Aalst, Wil van der
    The focus of this paper is on how data quality can affect business process discovery in real complex environments, which is a major factor determining the success in any data-driven Business Process Management project. Many real-life event logs, especially healthcare ones, can suffer from several data quality issues, some of which cannot be solved by pre-processing or data cleaning techniques, leading to inaccurate results. We take an innovative Process Mining (PM) approach, termed Interactive Process Discovery (IPD), which combines domain knowledge with available data. This approach can overcome the limitations of noisy and incomplete event logs by putting “humans in the loop”, leading to improved business process modelling. This is particularly valuable in healthcare, where physicians have a tacit domain knowledge not available in the event log, and, thus, difficult to elicit. We conducted a two-step approach based on a controlled experiment and a case study in an Italian hospital. At each step, we compared IPD with traditional PM techniques to assess the extent to which domain knowledge helps to improve the accuracy of process models. The case study tests the effectiveness of IPD to uncover knowledge-intensive processes extracted from noisy real-life event logs. The evaluation has been carried out by exploiting a real dataset of an Italian hospital, involving the medical staff. IPD can produce an accurate process model that is fully compliant with the clinical guidelines by addressing data quality issues. Accurate and reliable process models can support healthcare organizations in detecting process-related issues and in taking decisions related to capacity planning and process re-design.
  • Publication
    On using contextual correlation to detect multi-stage cyber attacks in smart grids
    ( 2022)
    Sen, Ömer
    ;
    Velde, Dennis van der
    ;
    Wehrmeister, Katharina
    ;
    Hacker, Immanuel
    ;
    Henze, M.
    ;
    While the digitization of the distribution grids brings numerous benefits to grid operations, it also increases the risks imposed by serious cyber security threats such as coordinated, timed attacks. Addressing this new threat landscape requires an advanced security approach beyond established preventive IT security measures such as encryption, network segmentation, or access control. Here, detective capabilities and reactive countermeasures as part of incident response strategies promise to complement nicely the security-by-design approach by providing cyber security situational awareness. However, manually evaluating extensive cyber intelligence within a reasonable timeframe requires an unmanageable effort to process a large amount of cross-domain information. An automated procedure is needed to systematically process and correlate the various cyber intelligence to correctly assess the situation to reduce the manuel effort and support security operations. In this paper, we present an approach that leverages cyber intelligence from multiple sources to detect multi-stage cyber attacks that threaten the smart grid. We investigate the detection quality of the presented correlation approach and discuss the results to highlight the challenges in automated methods for contextual assessment and understanding of the cyber security situation.
  • Publication
    Enhanced Transformation of BPMN Models with Cancellation Features
    ( 2022)
    Lomidze, G.
    ;
    ;
    Li, C.-Y.
    ;
    Canceling ongoing process instances is a natural phenomenon in practice. As such, modeling cancellation behavior is supported in the Business Process Model and Notation (BPMN) via exception events. Event-data-driven analysis techniques using such process models, e.g., conformance checking, require converting the BPMN model into a formal process modeling representation, i.e., Petri nets. However, the existing transformation of BPMN models with exception events renders a classical Petri net, with various additional modeling constructs to mimic the exception behavior. Using such a model in a subsequent analysis renders an infeasible computational complexity. Hence, this paper presents a novel conversion of BPMN models with exception events into reset nets, significantly reducing the number of required invisible transitions in the corresponding transformation. Our results show that the enhanced conversion reduces the computational effort of using the converted models for conformance checking.
  • Publication
    Impact of Cyber-attacks on EV Charging Coordination: The Case of Single Point of Failure
    ( 2022)
    Gumrukcu, Erdem
    ;
    Arsalan, Ali
    ;
    Muriithi, Grace
    ;
    Joglekar, Charukeshi Mayuresh
    ;
    Aboulebdeh, Ahmed
    ;
    Alparslan Zehir, Mustafa
    ;
    Papari, Behnaz
    ;
    Expanding adoption of electric vehicles (EVs) and broad deployment of charging stations push the limits of distribution grid infrastructure and increase the importance of effective charging coordination. Smart EV chargers with several functionalities and charging coordination solutions that can manage the charging sessions of hundreds of EVs are becoming common, with the increasing risk of triggering significant operational problems in case of cyberattacks. The information exchange between the charging coordinator, distribution network operator, and users is essential in the scheduling of a large number of charging sessions, relying on customer preferences, without violating operational grid constraints. Both the user mobile apps used for charging session reservations and DSO-charging coordinator interfaces are vulnerable to cyberattacks which may cause considerable technical and economic consequences. An important concern is the potential impacts of attacks when a single node or communication link is compromised. This study investigates the impacts of false data injection (FDI) and hijacking attacks on EV charging coordination in case of a single point of failure. Hijacking of one user's mobile app and FDI attack on the DSO-charging coordinator interface are investigated by simulating a 24-hour scenario with 12 chargers, 34 realistic charging sessions, and an EV charging coordination approach based on each session's tolerance to delays. The study highlighted considerable negative impacts that could be encountered in case of a single point of failure in EV charging coordination.