Y04S40/20

System and method for estimating photovoltaic energy through irradiance to irradiation equating with the aid of a digital computer
11693152 · 2023-07-04 · ·

The accuracy of photovoltaic simulation modeling is predicated upon the selection of a type of solar resource data appropriate to the form of simulation desired. Photovoltaic power simulation requires irradiance data. Photovoltaic energy simulation requires normalized irradiation data. Normalized irradiation is not always available, such as in photovoltaic plant installations where only point measurements of irradiance are sporadically collected or even entirely absent. Normalized irradiation can be estimated through several methodologies, including assuming that normalized irradiation simply equals irradiance, directly estimating normalized irradiation, applying linear interpolation to irradiance, applying linear interpolation to clearness index values, and empirically deriving irradiance weights. The normalized irradiation can then be used to forecast photovoltaic fleet energy production.

Electrical system control for achieving long-term objectives, and related systems, apparatuses, and methods
11693375 · 2023-07-04 · ·

Systems and methods may use a low speed controller in addition to an economic optimizer to achieve long-term objectives without significantly disrupting or destabilizing an electrical system. Specific long-term objectives include maximizing a capacity factor incentive and regulating battery degradation, but the methods and systems herein can be extended to more long-term objectives. A low speed controller can adjust one or more parameters of a cost function based on the relation between the projected state of the electrical system and the one or more parameters to effectuate a change to the electrical system to attempt to comply with the long-term objective.

Resilient estimation for grid situational awareness

According to some embodiments, a system, method and non-transitory computer-readable medium are provided to protect a cyber-physical system having a plurality of monitoring nodes comprising: a normal space data source storing, for each of the plurality of monitoring nodes, a series of normal monitoring node values over time that represent normal operation of the cyber-physical system; a situational awareness module including an abnormal data generation platform, wherein the abnormal data generation platform is operative to generate abnormal data to represent abnormal operation of the cyber-physical system using values in the normal space data source and a generative model; a memory for storing program instructions; and a situational awareness processor, coupled to the memory, and in communication with the situational awareness module and operative to execute the program instructions to: receive a data signal, wherein the received data signal is an aggregation of data signals received from one or more of the plurality of monitoring nodes, wherein the data signal includes at least one real-time stream of data source signal values that represent a current operation of the cyber-physical system; determine, via a trained classifier, whether the received data signal is a normal signal or an abnormal signal, wherein the trained classifier is trained with the generated abnormal data and normal data; localize an origin of an anomaly when it is determined the received data signal is the abnormal signal; receive the determination and localization at a resilient estimator module; execute the resilient estimator module to generate a state estimation for the cyber-physical system. Numerous other aspects are provided.

INDUSTRIAL CONTROL SYSTEM DEVICE CLASSIFICATION

In an industrial control system (ICS), latent vectors are generated to represent identity or behaviors of host devices coupled to the ICS. A computing system captures communications transmitted by a host device across a network associated with the ICS. A set of values are extracted from one or more respective fields in the communication, then applied to a trained neural network. Values of a first set of fields are applied at an input layer of the trained neural network, while values of a second set of fields are applied at an output layer of the neural network. Based on the application of the neural network to the values extracted from the communication, the computing system generates a latent vector.

Ferrule-less fiber optic connector with re-coat layer to protect buckling portion of optical fiber

The present disclosure relates to using a coating to protect a portion of an optical fiber that is intended to buckle within a fiber optic connector. The fiber optic connector can include a bare fiber optical connector.

Power prediction system, power prediction device, power prediction method, program, and storage medium
11545829 · 2023-01-03 · ·

A power prediction system includes a battery removably mounted on an electric power device using electric power, a charging device configured to charge the battery, and a power prediction device configured to predict an amount of electric power capable of being supplied by the charging device to outside of the charging device through machine learning on the basis of usage information indicating at least one of the usage state and the usage environment of the charging device.

Methods, systems, and computer readable mediums for determining a system state of a power system using a convolutional neural network

Methods, systems, and computer readable mediums determining a system state of a power system using a convolutional neural network using a convolutional neural network are disclosed. One method includes converting power grid topology data corresponding to a power system into a power system matrix representation input and applying the power system matrix representation input to a plurality of convolutional layers of a deep convolutional neural network (CNN) structure in a sequential manner to generate one or more feature maps. The method further includes applying the one or more feature maps to a fully connected layer (FCL) operation for generating a respective one or more voltage vectors representing a system state of the power system.

Systems and methods for IT management of distributed computing resources on a peer-to-peer network
11546168 · 2023-01-03 · ·

Systems and methods for managing distributed computing resources including blockchain-based management of serverless computing and edge computing. Distributed computing resources are managed on a peer-to-peer network, and serverless functions are hosted on a distributed IT infrastructure. Developers for the serverless functions and providers of distributed IT infrastructure utilize a blockchain-based IT marketplace platform to make transactions relating to computing resource consumption.

A SECURITY DEVICE AND METHOD OF PROVENANCE VERIFICATION

A method of provenance verification comprises providing a plurality of security devices, each security device being provided with a key set comprising: a secret key, and a plurality of shared keys, each shared key being derived by generating a hash of the secret key and a salt value that is specific to a pair consisting of said security device and another of the plurality of security devices. The method also comprises configuring each security device to: generate and/or receive one or more messages; and perform at least one cryptographic operation on the message or messages, and/or on data derived therefrom, using a respective secret key of the security device and/or one of said shared keys.

SYSTEMS AND METHODS FOR NETWORKED MICROGRIDS
20220416541 · 2022-12-29 ·

A system for transferring energy based on predicted outages is described herein.