Systems and methods for managing smart alarms
11443610 · 2022-09-13
Assignee
Inventors
Cpc classification
Y04S20/00
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
H02J3/0012
ELECTRICITY
G05B23/024
PHYSICS
Y04S10/18
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
Y02B90/20
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
Y04S10/30
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
G08B21/182
PHYSICS
Y04S10/52
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
Y02E60/00
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
G08B29/00
PHYSICS
G01R19/2513
PHYSICS
G05B23/0281
PHYSICS
International classification
G08B29/00
PHYSICS
G08B27/00
PHYSICS
Abstract
A method for managing smart alarms in an electrical system includes processing electrical measurement data from or derived from energy-related signals captured or derived by at least one intelligent electronic device of a monitoring and control system to identify at least one of power events in the electrical system, or alarms triggered in response to any identified power events. Information related to the identified power events and the identified alarms may be aggregated, and relevant event and/or alarm management groups and/or relevant event and/or alarm periods may be identified from the aggregated information. One or more actions may be triggered, avoided or avoid triggering in response to the identified event management groups and/or the identified event and/or alarm periods. Systems for managing smart alarms are also provided herein.
Claims
1. A method for managing smart alarms in an electrical system, the method comprising: processing electrical measurement data from or derived from energy-related signals captured or derived by at least one intelligent electronic device (IED) of a monitoring and control system (MCS) to identify at least one of power events in the electrical system, or alarms triggered in response to any identified power events; aggregating information related to the identified power events and the identified alarms; identifying relevant event and/or alarm management groups and/or relevant event and/or alarm periods from the aggregated information, the event management groups including groups and/or sequences of the identified power events, and/or groups and/or sequences of alarm events triggered in response to the identified alarms; identifying discriminant characteristics in the events and/or alarms and/or groups and/or sequences and/or periods and/or aggregated information; and triggering, avoiding or postponing triggering of one or more actions in response to the identified event management groups and/or the identified event and/or alarm periods.
2. The method of claim 1, wherein the energy-related signals captured or derived by the at least one IED include at least one of: voltage, current, energy, active power, apparent power, reactive power, harmonic voltages, harmonic currents, total voltage harmonic distortion, total current harmonic distortion, harmonic power, individual phase currents, three-phase currents, phase voltages, line voltages and power factor.
3. The method of claim 1, wherein identifying the power events includes identifying power quality event types of the of the power events, the power quality event types including at least one of: a voltage sag, dip or undervoltage, a voltage swell or overvoltage, a voltage or current transient, impulse or spike or notch, a temporary interruption or outage, a voltage unbalance, a voltage flicker, a voltage or current harmonic distortion, a phase shift, a frequency fluctuation, or other voltage or current fluctuations or disturbance (including noise).
4. The method of claim 1, wherein at least one of the alarms is triggered in response to the electrical measurement data being above one or more upper alarm thresholds or below one or more lower alarm thresholds, or at least one of the alarms is triggered in response to multiple power events or event groups or event periods or event sequences of the identified power events.
5. The method of claim 1, wherein each IED of the at least one IED is installed or located at a respective metering point of a plurality of metering points in the electrical system, and the energy-related signals captured by each IED are associated with the respective metering point.
6. The method of claim 5, wherein at least one load is installed or located at each metering point of the plurality of metering points, and each IED is configured to monitor the at least one load installed or located at the respective metering point at which the IED is installed or located, wherein the energy-related signals captured by the IED are associated with the at least one load.
7. The method of claim 1, wherein the information related to the identified power events and the identified alarms is aggregated based on at least one of: locations of the identified power events in the electrical system, geographic location, application and/or usage, time period(s) or interval(s) or co-occurrences, criticality of the identified alarms to a particular process or application, and device type(s) of the at least one IED.
8. The method of claim 1, wherein identifying discriminant characteristics in the aggregated information, comprises: identifying breakpoints associated with the event and/or alarm periods; modeling each of the event and/or alarm periods; classifying each of the modeled event and/or alarm periods; and identifying discriminant characteristics in each of the modeled event and/or alarm periods.
9. The method of claim 8, wherein the event and/or alarm periods are identified based on detected changes in relevant data from the aggregated information, and the breakpoints associated with the event and/or alarm periods correspond to significant change points in the aggregated information separating one event and/or alarm period from a next event and/or alarm period of the event and/or alarm periods.
10. The method of claim 8, wherein modeling each of the event and/or alarm periods, comprises: determining a best possible model for each of the event and/or alarm periods; and modeling each of the event and/or alarm periods based on the determined best possible model.
11. The method of claim 10, wherein the best possible model is determined by comparing each event and/or alarm period of the event and/or alarm periods with a previous event and/or alarm period of the event and/or alarm periods.
12. The method of claim 11, wherein an impact of each event and/or alarm period on the electrical system is compared with the impact of a previous event and/or alarm period on the electrical system to determine the best possible model, or to use as discriminant characteristic of each event and/or alarm period in further analysis, determined action or visualization.
13. The method of claim 8, wherein each of the modeled event and/or alarm periods is classified as stable, rising or dropping based on an analysis of the modeled event and/or alarm periods.
14. The method of claim 8, wherein the each of the event and/or alarm periods is classified through curve fitting techniques using one or more statistical or machine learning algorithms where slope or slope variations of the event and/or alarm periods are modeled.
15. The method of claim 1, further comprising: determining a relative criticality score of each of the identified discriminant characteristics to a process or an application associated with the electrical system over a particular time period.
16. The method of claim 15, wherein the relative criticality score is based on an impact of the identified discriminant characteristics to the process or the application over the particular time period.
17. The method of claim 16, wherein the impact of the identified discriminant characteristics is related to tangible or intangible costs associated with the identified discriminant characteristics to the process or the application.
18. The method of claim 15, further comprising: using the determined relative criticality score to prioritize responding to the identified alarms.
19. The method of claim 1, further comprising: visually representing the aggregated events and/or alarms with their related information, groupings, periods, identified discriminant characteristics on at least one plot, wherein the at least one plot is presented in a report, or on a display device of at least one of the at least one IED and other devices of the MCS.
20. The method of claim 8, further comprising: triggering relevant alarms or actions by comparing a real time or time aggregated status of number and/or type of events and/or alarms and/or groups and/or sequences and/or periods and/or any aggregated information or discriminant characteristic, to a derived threshold or type from the model of any of the event and/or alarm periods.
21. The method of claim 8, further comprising: derive from the groupings and the discriminant characteristics the actionable information and recommendations for the system users to reduce the number of events/alarms in a report or through an IED or any of the components of the MCS or any other system connected to the MCS.
22. The method of claim 1, wherein the identified events and/or the identified alarms are enriched with the normal behavior profiles derived from waveform captures associated with the energy-related signals and then are used as comparison for the discriminant dimensions identification and groupings.
23. The method of claim 1, wherein the actions that are triggered or postponed include at least one of: shutting down or turning on at least one component in the electrical system, adjusting one or more parameters associated with the at least one component, selectively interrupting power at one or more locations in the electrical system, shutting down or turning on a specific related process in a building management system or in a manufacturing SCADA system, or generating an alarm or sending a status change reusable by other control systems or generating a report.
24. The method of claim 23, wherein the at least one component includes at least one load in the electrical system.
25. The method of claim 1, wherein the actions that are avoided include launching a specific process step which would be normal in the schedule.
26. The method of claim 1, wherein the actions are automatically performed by a control device of the MCS.
27. The method of claim 26, wherein the at least one IED includes the control device, or the at least one IED is communicatively coupled with the control device.
28. A monitoring and control system (MCS) for managing smart alarms in an electrical system, the MCS comprising: at least one intelligent electronic device (IED) including a processor and memory coupled to the processor, the processor and the memory configured to: process electrical measurement data from or derived from energy-related signals captured or derived by the at least one IED to identify power events in the electrical system, and to identify alarms triggered in response to the identified power events; aggregate information related to the identified power events and the identified alarms; identify relevant event management groups and/or relevant event and/or alarm periods from the aggregated information, the event management groups including groups and/or sequences of the identified power events, and/or groups and/or sequences of alarm events triggered in response to the identified alarms; identifying discriminant characteristics in the events and/or alarms and/or groups and/or sequences and/or periods and/or aggregated information; and trigger, avoid or postpone triggering of one or more actions in response to the identified event management groups and/or the identified event and/or alarm periods.
29. The system of claim 28, wherein the at least one IED includes a plurality of IEDs arrange in a hierarchical configuration in the electrical system.
30. The system of claim 29, wherein each IED of the plurality of IEDs is communicatively coupled to other IEDs of the plurality of IEDs, and each IED is configured to share electrical measurement data from or derived from energy-related signals derived or captured by the IED with the other IEDs.
31. The system of claim 30, wherein the shared electrical measurement data is processed to identify the power events in the electrical system, and to identify the alarms triggered in response to the identified power events.
32. The system of claim 28, wherein the MCS includes at least one user device in communication with the at least one IED.
33. The system of claim 32, wherein the at least one user device is capable of configuring the at least one IED.
34. The system of claim 28, wherein the processor and the memory of the at least one IED are further configured to: determine a relative criticality score of each of identified discriminant characteristics to a process or an application associated with the electrical system over a particular time period; and use the determined relative criticality score to prioritize responding to the identified alarms.
35. A monitoring and control system (MCS) for managing smart alarms in an electrical system, the MCS comprising: at least one intelligent electronic device (IED) configured to capture or derive energy-related signals in the electrical system; and a diagnostic computing system communicatively coupled to the at least one IED, the diagnostic computing system including a processor and memory coupled to the processor, the processor and the memory configured to: process electrical measurement data from or derived from the energy-related signals captured or derived by the at least one IED to identify power events in the electrical system, and to identify alarms triggered in response to the identified power events; aggregate information related to the identified power events and the identified alarms; identify relevant event management groups and/or relevant event and/or alarm periods from the aggregated information, the event management groups including groups and/or sequences of the identified power events, and/or groups and/or sequences of alarm events triggered in response to the identified alarms; identifying discriminant characteristics in the events and/or alarms and/or groups and/or sequences and/or periods and/or aggregated information; and trigger, avoid or postpone triggering of one or more actions in response to the identified event management groups and/or the identified event and/or alarm periods.
36. The system of claim 35, wherein the at least one IED includes a plurality of IEDs, and aggregating information related to the identified power events and the identified alarms includes: aggregating information related to the identified power events and the identified alarms from the plurality of IEDs.
37. The system of claim 35, wherein the processor and the memory of the diagnostic computing system are further configured to: determine a relative criticality score of each of identified discriminant characteristics to a process or an application associated with the electrical system over a particular time period; and use the determined relative criticality score to prioritize responding to the identified alarms.
38. The method of claim 1, wherein the triggering, avoiding or postponing triggering of one or more actions is performed based on: the identified event management groups and identified discriminant characteristics associated therewith, and/or the identified event and identified discriminant characteristics associated therewith, and/or the identified alarm periods and identified discriminant characteristics associated therewith.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The foregoing features of the disclosure, as well as the disclosure itself may be more fully understood from the following detailed description of the drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
DETAILED DESCRIPTION
(15) The features and other details of the concepts, systems, and techniques sought to be protected herein will now be more particularly described. It will be understood that any specific embodiments described herein are shown by way of illustration and not as limitations of the disclosure and the concepts described herein. Features of the subject matter described herein can be employed in various embodiments without departing from the scope of the concepts sought to be protected.
(16) Referring to
(17) Each network node 126 can include a computer system, such as an intelligent electronic device (IED), to sense, monitor, capture and analyze energy-related data on the electrical system. In accordance with the various embodiments, the IED can capture signal waveforms representative of voltage, current, power or other measurable electrical property on the electrical system, create power event profiles, perform event analysis to identify power events and additional information including alarms triggered in response to power events, and perform other operations as part of the systems and methods for managing smart alarms described herein. The IED can be a smart device such as a smart power meter or other power equipment, or be incorporated into or associated with a power meter or other power equipment on the electrical system. The architecture can include a plurality of IEDs arranged at different upstream and downstream positions in a hierarchical level or layer relationship on the electrical system (e.g., as shown in
(18) In some embodiments, a user may view information about the IEDs (e.g., IED make, model, type, etc.) and data collected by the IEDs (e.g., energy usage statistics) using at least one of the user devices 114 and 116. Additionally, in some embodiments the user may configure the IEDs using at least one of the user devices 114 and 116. Each user device 114 and 116 can include a computing device, for example, a desktop computer, a laptop computer, a handheld computer, a tablet computer, a smart phone, and/or the like. Additionally, each user device 114 and 116 can include or be coupled to one or more input/output devices, for example, to facilitate user interaction with the IEDs (e.g., to view information about the IEDs).
(19) In some embodiments, the MCS may also include, or be communicatively coupled to, a diagnostic computing system 125 via the communication network 124. In some embodiments, the above-discussed IEDs and user devices 114 and 116 of the MCS may be directly communicatively coupled to the diagnostic computing system 125. In other embodiments, the IEDs and user devices 114 and 116 may be indirectly communicatively coupled to the diagnostic computing system 125, for example, through an intermediate device, such as a cloud-connected hub or a gateway. The cloud-connected hub (or the gateway) may, for example, provide the IEDs and the user devices 114 and 116 with access to the diagnostic computing system 125.
(20) The diagnostic computing system 125 may be an example of a cloud computing system, or cloud-connected computing system. In embodiments, the diagnostic computing system may be a server located within one or more of the facilities 108, 110 and 112, or may be remotely-located cloud-based service. The diagnostic computing system 125 may include computing functional components similar to those of the IEDs in some embodiments, but may generally possess greater numbers and/or more powerful versions of components involved in data processing, such as processors, memory, storage, interconnection mechanisms, etc. The diagnostic computing system 125 can be configured to implement a variety of analysis techniques to identify patterns in received measurement data from the IEDs, as discussed further below. The various analysis techniques discussed herein further involve the execution of one or more software functions, algorithms, instructions, applications, and parameters, which are stored on one or more sources of memory communicatively coupled to the diagnostic computing system 125. In certain embodiments, the terms “function”, “algorithm”, “instruction”, “application”, or “parameter” may also refer to a hierarchy of functions, algorithms, instructions, applications, or parameters, respectively, operating in parallel and/or tandem. A hierarchy may comprise a tree-based hierarchy, such as a binary tree, a tree having one or more child nodes descending from each parent node, or combinations thereof, wherein each node represents a specific function, algorithm, instruction, application, or parameter.
(21) In embodiments, since the diagnostic computing system 125 is connected to the cloud, it may access additional cloud-connected devices or databases (not shown) via the cloud. For example, the diagnostic computing system 125 may access historical measurement data previously received from the at least one IED, historical power event and/or alarm data, or other data that may be useful in analyzing current measurement data received from the at least one IED. In embodiments, the cloud-connected devices or databases may correspond to a device or database associated with one or more external data sources.
(22) In embodiments, by leveraging the cloud-connectivity and enhanced computing resources of the diagnostic computing system 125 relative to the IEDs, sophisticated analysis can be performed on data retrieved from one or more IEDs, as well as on additional sources of data that may be received (e.g., from other devices in the electrical system, such as humidity and temperature sensors), when appropriate. This analysis can be used to dynamically control one or more parameters, processes, conditions or devices (e.g., 102, 104 and 106) associated with the electrical system.
(23) In embodiments, the parameters, processes, conditions or equipment are dynamically controlled by one or more control devices of the MCS. In embodiments, the control devices may correspond to, include, or be included one or more of the above-discussed IEDs, diagnostic computing system and/or other devices within or external to the electrical system.
(24) It is understood that the network architecture shown in
(25) Referring to
(26) The memory device 142 may include volatile memory, such as DRAM or SRAM, for example. The memory device 142 may store programs and data collected during operation of the IED 140. For example, in embodiments in which the IED 140 is configured to monitor or measure one or more electrical parameters associated with one or more devices or loads in an electrical system, the memory device 142 may store the monitored electrical parameters (e.g., from energy-related signals captured or derived by the IED 140).
(27) The storage system 144 may include a computer readable and writeable nonvolatile recording medium, such as a disk or flash memory, in which signals are stored that define a program to be executed by the controller 141 or information to be processed by the program. The controller 141 may control transfer of data between the storage system 144 and the memory device 142 in accordance with known computing and data transfer mechanisms. In embodiments, the electrical parameters monitored or measured by the IED 140 may be stored in the storage system 144.
(28) The I/O port 146 can be used to couple loads (e.g., shown in
(29) The communication module 148 may be configured to couple the IED 140 to one or more external communication networks or devices. These networks may be private networks within a building in which the IED 140 is installed, or public networks, such as the Internet. In embodiments, the communication module 148 may also be configured to couple the IED 140 to a cloud-connected hub, or to a cloud-connected central processing unit, associated with a network system architecture including IED 140.
(30) The IED controller 141 may include one or more processors that are configured to perform specified function(s) of the IED 140. The processor(s) can be a commercially available processor, such as the well-known Pentium™, Core™, or Atom™ class processors available from the Intel Corporation. Many other processors are available, including programmable logic controllers. The IED controller 141 can execute an operating system to define a computing platform on which application(s) associated with the IED 140 can run.
(31) In embodiments, the electrical parameters monitored or measured by the IED 140 may be received at an input of the controller 141 as IED input data, and the controller 141 may process the measured electrical parameters to generate IED output data or signals at an output thereof. In embodiments, the IED output data or signals may correspond to an output of the IED 140. The IED output data or signals may be provided at I/O port(s) 146, for example. In embodiments, the IED output data or signals may be received by a diagnostic computing system, for example, for further processing (e.g., to identify power events, as briefly discussed above in connection with
(32) Components of the IED 140 may be coupled together by the interconnection mechanism 143, which may include one or more busses, wiring, or other electrical connection apparatus. The interconnection mechanism 143 may enable communications (e.g., data, instructions, etc.) to be exchanged between system components of the IED 140.
(33) It is understood that IED 140 is but one of many potential configurations of IEDs in accordance with various aspects of the disclosure. For example, IEDs in accordance with embodiments of the disclosure may include more (or fewer) components than IED 140. Additionally, in embodiments one or more components of IED 140 may be combined. For example, in embodiments memory 142 and storage 144 may be combined.
(34) Referring to
(35) The illustrated electrical system includes a plurality of metering locations (here, M.sub.1, M.sub.2, M.sub.3, etc.). In embodiments in which the electrical system is a “completely metered” system, for example, at least one IED is installed at the first metering location M.sub.1, at least one IED is installed at the second metering location M.sub.2, and so forth. Connection 1 is a physical point in the electrical system where energy flow (as measured at M.sub.1 by the at least one IED installed at M.sub.1) diverges to provide energy to the left electrical system branch (associated with metering locations M.sub.3, M.sub.4, M.sub.7, M.sub.8) and the right electrical system branch (associated with metering locations M.sub.2, M.sub.5, M.sub.6, M.sub.9, M.sub.10). In accordance with some embodiments of this disclosure, as will be discussed further below, the IEDs installed at the various metering locations (here, M.sub.1, M.sub.2, M.sub.3, etc.) may share electrical measurement data from or derived from energy-related signals captured by or derived from the IEDs. The shared electrical measurement data may be used, for example, to identify power events in the electrical system, and to identify alarms triggered in response to the identified power events. For example, IEDs installed at metering locations M.sub.7, M.sub.8 may share electrical measurement data with an IED installed at metering location M.sub.3 to identify power events at metering location M.sub.3, and to identify alarms triggered in response to the identified power events at metering location M.sub.3.
(36) In the illustrated example, the IED installed at metering location M.sub.3 is considered to be “upstream” from the IEDs installed at metering locations M.sub.7, M.sub.8. Additionally, in the illustrated example, the IEDs installed at metering locations M.sub.7, M.sub.8 are considered to be downstream relative to the IED installed at metering location M.sub.3. As used herein, the terms “upstream” and “downstream” are used to refer to electrical locations within an electrical system. More particularly, the electrical locations “upstream” and “downstream” are relative to an electrical location of an IED collecting data and providing this information. For example, in an electrical system including a plurality of IEDs, one or more IEDs may be positioned (or installed) at an electrical location that is upstream relative to one or more other IEDs in the electrical system, and the one or more IEDs may be positioned (or installed) at an electrical location that is downstream relative to one or more further IEDs in the electrical system. A first IED or load that is positioned on an electrical circuit upstream from a second IED or load may, for example, be positioned electrically closer to an input or source of the electrical system (e.g., a utility feed) than the second IED or load. Conversely, a first IED or load that is positioned on an electrical circuit downstream from a second IED or load may be positioned electrically closer to an end or terminus of the electrical system than the other IED. The above-described first and second IEDs can record an electrical event's voltage and current phase information (e.g., by sampling the respective signals) and communicatively transmit this information to a diagnostic computing system (e.g., 125, shown in
(37) It is understood that the above-discussed configuration or arrangement of IEDs is but one of many potential configurations of IEDs in an electrical system.
(38) Referring to
(39) The flowcharts do not depict the syntax of any particular programming language. Rather, the flowcharts illustrate the functional information one of ordinary skill in the art requires to fabricate circuits or to generate computer software to perform the processing required of the particular apparatus. It should be noted that many routine program elements, such as initialization of loops and variables and the use of temporary variables are not shown. It will be appreciated by those of ordinary skill in the art that unless otherwise indicated herein, the particular sequence of blocks described is illustrative only and can be varied. Thus, unless otherwise stated, the blocks described below are unordered; meaning that, when possible, the blocks can be performed in any convenient or desirable order including that sequential blocks can be performed simultaneously and vice versa. It will also be understood that various features from the flowcharts described below may be combined in some embodiments. Thus, unless otherwise stated, features from one of the flowcharts described below may be combined with features of other ones of the flowcharts described below, for example, to capture the various advantages and aspects of systems and methods associated with “smart alarms” sought to be protected by this disclosure.
(40) Referring to
(41) As illustrated in
(42) The energy-related signals measured or derived by the at least one IED may include, for example, at least one of: voltage, current, energy, active power, apparent power, reactive power, harmonic voltages, harmonic currents, total voltage harmonic distortion, total current harmonic distortion, harmonic power, individual phase currents, three-phase currents, phase voltages, and line voltages as a few examples. It is understood that other types of energy-related signals may be captured or derived by the at least one IED.
(43) At block 210, electrical measurement data from or derived from the energy-related signals captured or derived by the at least one IED at block 205, is processed (e.g., on the at least one IED, on the diagnostic computing system, and/or remote from the at least one IED and the diagnostic computing system) to identify power events in the electrical/power system. The identified power events may be associated with the metering location(s) in which the at least one IED is installed, a load or loads (e.g., 102, 104, 106, shown in
(44) In some embodiments, identifying the power events includes identifying power quality event types of the of the power events. The power quality event types may include, for example, at least one of: a voltage sag, a voltage swell, a voltage or current transient, a temporary interruption, and voltage or current harmonic distortion as a few examples. It is understood that other types of power quality events may be identified.
(45) Identifying the power events may additionally or alternatively include identifying a magnitude (or magnitudes) of the power events, a duration (or durations) of the power events, a location (or locations) of the power events in the electrical/power system, and/or other information that may be helpful for identifying alarms (i.e., smart alarms) triggered in response to the identified power events, e.g., at block 215, as will be discussed further below. In some embodiments, the magnitude(s), duration(s), location(s) and/or other information may be determined based on electrical measurement data from or derived from energy-related signals captured or derived by a plurality of IEDs, for example, in embodiments in which the at least one IED includes a plurality of IEDs located at a respective plurality of metering location in the electrical/power system. For example, the plurality of IEDs may share the energy-related signals captured or derived by the plurality of IEDs with select ones of the plurality of IEDs (or the diagnostic computing system), and the shared energy-related signals may be used to determine the magnitude(s), duration(s), location(s) and/or other information associated with the identified power event. This may include determining differences between the different measured levels of disturbances of power quality events (e.g., the magnitude or duration) as they propagate through the electrical/power system as this may be inferred from the energy-related signals and the location of each IED. In some embodiments, the energy-related signals captured or derived by the plurality of IEDs may be stored on a memory device associated with the plurality of IEDs, on a memory device associated with a diagnostic computing system, and/or on another memory device depending on the implementation of the method 200 (e.g., on the at least one IED, on the diagnostic computing system, and/or on another device or system).
(46) At block 215, it is determined if any alarms have been, or should be, triggered in response to the identified power events. In some embodiments, alarms may be triggered (e.g., automatically, or semi-automatically) in response to the identified power events. For example, a load monitored by an IED in the electrical/power system may have an upper alarm threshold and/or a lower alarm threshold, and an alarm (or alarms) may be triggered in response to voltage and/or current signals captured by the IED, e.g., at block 205, being above the upper alarm threshold and/or below the lower alarm threshold. An anomalous voltage condition, for example, which is one example type of power event, corresponds to a measured IED voltage being above one or more upper alarm thresholds or below one or more lower alarm thresholds. In some embodiments, an alarm (or alarms) may be triggered in response to the anomalous voltage condition. In some embodiments, the upper alarm thresholds and the lower alarm thresholds, e.g., associated with anomalous voltage condition and/or other power events, align with a recommended operational range of one or more loads, processes, and/or systems monitored by the IEDs in the electrical/power system.
(47) An alarm trigger may result in one or more portions (e.g., loads) of the electrical/power system being controlled, e.g., automatically by the IED, diagnostic computing device, and/or other system(s) or device(s) on which the method 200 is implemented. For example, an alarm trigger may result in a load monitored by the IED being adjusted (e.g., turned off, or having one or more parameters adjusted).
(48) Additionally, or alternatively, an alarm trigger may result in a notification or alert indicating the alarm being sent to one or more devices or systems of the MCS, for example. In some embodiments, the MCS, or a user of the MCS, may take an action (or actions) in response to the notification or alert. Example actions may include controlling the above-mentioned one or more portions of the electrical/power system, or delaying, changing the sequence or even postponing a process in another system (e.g., in a Power SCADA system, or in a building management system, or in a manufacturing SCADA system, are but few examples). It is understood that other actions may, of course, be performed.
(49) At block 220, information relating to the identified power events and/or alarms is aggregated (e.g., the number of daily events or alarms, or the number of groups of time-wise-overlapping events, or the impact on the downstream loads, are but few examples among many others). The information relating to the power events and/or alarms may be aggregated, for example, for a particular time period or interval, e.g., daily, as shown by plot 300 in
(50) As one example, the aggregated information may include an aggregated sum (or count) of power events and/or alarms for a day, as shown in
(51) As apparent from discussions above, in some embodiments the aggregated information may be plotted, as illustrated by plot 300 shown in
(52) At block 225, relevant event management groups and/or relevant event and/or alarm periods are identified from the aggregated information. In accordance with various aspects of this disclosure, the event management groups include groups and/or sequences of the identified power events, and/or groups and/or sequences of alarm events triggered in response to the identified alarms. Groups and/or sequences of the power events may include, for example, groups and/or sequences of the power events occurring over a particular time period, in a particular metering location, etc. Additionally, groups and/or sequences of the alarm events may include groups and/or sequences of alarm events occurring over a particular time period, in a particular metering location, etc. In accordance with various aspects of this disclosure, the alarm events correspond to events resulting from the triggering of multiple alarms, e.g., from the alarms identified at block 215.
(53) The relevant event and/or alarm periods identified from the aggregated information may be predetermined periods, e.g., daily periods, extracted from the aggregated information in some embodiments. Additionally, in some embodiments the relevant periods are identified or selected based on detected changes in relevant data from the aggregated information. As one example, the relevant periods may be identified based on breakpoints identified in the aggregated information. Breakpoints (e.g., 320, 330, 340, shown in
(54) At block 225, outliers or extreme (or obvious) outliers may also be identified in the aggregated information in some embodiments (e.g., for refining the aggregated information prior to the event management groups and/or event and/or alarm groups being identified from the aggregated information, or to perform specific analysis on these groups of outliers, such as inferring patterns to provide the maintenance team with more actionable recommendations in a periodic report). As used herein, “outliers” and “extreme outliers” refer to data in the aggregated information that does fit within normal boundaries or acceptable limits of the aggregated information (i.e., is not normal data). To determine what is an “outlier” or an “extreme outlier”, the system may use simple statistical calculations and rules (e.g., the standard approach of comparing each data points value with the median value +/−1.5*IQR for an “outlier” and median+3*IQR for an “extreme outlier” (of all the data points of the group/period). The IQR being the Inter-Quantile Ratio, the value between the 75.sup.th and the 25.sup.th percentile) or some more advance techniques (e.g., DBSCAN or Isolation Forest algorithms).
(55) Referring again briefly to
(56) Returning to method 200, at block 230, which is optional in some embodiments, one or more actions may be triggered, avoided or postponed in response to or based on the event management groups and/or the event and/or alarm periods identified at block 225. The actions, preventative or otherwise, may affect at least one component of the electrical/power system, for example, a load (e.g., 120, shown in
(57) In some embodiments, the actions that are triggered or postponed may also include selectively interrupting power at one or more location in the electrical/power system, generating an alarm or report, shutting off something in a manufacturing process or taking preventative action, as a few further examples. Additionally, the actions that are avoided may include launching a specific process or step which would be normal in the schedule, as an example. As one example of such “postponing a normal process steps” in a Power SCADA environment, not energizing a capacitor bank while voltage is already lower than normal due to some other load, process or action would be an illustration. As another example, delaying turning on the HVAC rooftop unit while some heavy motor is started in the manufacturing plant may be an illustration in another domain.
(58) In some embodiments, the actions that are triggered, avoided or postponed are automatically performed by a control device of the MCS. In some embodiments, the at least one IED responsible for capturing the energy-related signals, e.g., at block 205, includes the control device. In other embodiments, one or more other portions of the MCS includes the control device. For example, in some embodiments the diagnostic computing system of the MCS may include the control device.
(59) Subsequent to block 230 (or 225), the method may end in some embodiments. In other embodiments, the method may return to block 205 and repeat again. For example, in embodiments in which it is desirable to continuously (or semi-continuously) capture energy-related signals and to dynamically analyze these captured energy-related signals for power events and/or alarms, the method may return to block 205. Alternatively, in embodiments in which it is desirable to analyze a single set of captured energy-related signals, for example, the method may end. In some embodiments in which the method ends after block 230 (or 225), the method may be initiated again in response to user input and/or a control signal, for example.
(60) It is understood that method 200 may include one or more additional blocks in some embodiments. For example, the method 200 may include identifying discriminant characteristics associated with the aggregated information (i.e., the aggregated information from block 220), and determining a relative criticality score of each of the identified discriminant characteristics to a process or an application associated with the electrical/power system, as described further below in connection with
(61) Referring to
(62) Similar to method 200, method 400 may be implemented on a processor of at least one IED (e.g., 121, shown in
(63) As illustrated in
(64) As briefly discussed above in connection with method 200, the breakpoints (e.g., 510, 520, etc. shown in
(65) In some embodiments, the breakpoints are identified or selected, for example, using a machine learning algorithm. The machine learning algorithm (self-learning, self-organizing, self-identification) may optimize the number of change points. It may be a combination of several machine learning algorithms and rules. One example would optimize the number and place of the change points by minimizing the RSS (residual sum of square) and using a penalty score for more change points (these are machine learning typical tasks, so are considered as state of the art) as well as using a rule such as defining a minimal duration of any period (e.g., not less than 14 days as one example).
(66) As briefly discussed above in connection with method 200, in some embodiments the relevant periods (e.g., shown in
(67) At block 410, each of the identified event and/or alarm periods is modeled, for example, as illustrated by plot 500 shown in
(68) At block 415, each of the modeled event and/or alarm periods is classified or categorized, for example, as stable, rising, dropping, etc. based on an analysis of the modeled event and/or alarm periods. Referring briefly to
(69) In some embodiments, each of the modeled event and/or alarm periods is classified through curve fitting techniques, for example, using one or more statistical learning algorithms where slope or slope variations of the event and/or alarm periods are modeled. In one such embodiment a list of possible curves is used and the best matching curve (using again the RSS as key metrics) is then selected for each period. For illustration purposes only, a very simple list of such curves may be made of linear regression, exponential functions and polynomial regressions. In another embodiment, a machine learning “curve fitting in R” algorithm is applied.
(70) At block 420, discriminant characteristics are identified in each of the modeled event and/or alarm periods. The aim of this step is to explain what Example discriminant characteristics that may be identified may include, for example, particular devices (e.g., IEDs) or locations (e.g., metering locations) in the electrical/power system associated with a “high” (or greater than “normal”) amount of power events and/or alarms in the electrical/power system. Additionally, example discriminant characteristics that may identify patterns may include days of the week and/or daily times and/or seasons on which a significant number of power events and/or alarms occur. For example, it may be observed that a “higher” (or greater than “normal”) amount of power events and/or alarms occur on Sundays at 5 PM. From this observance, further analysis may occur to determine why a “higher” (or greater than “normal”) amount of power events and/or alarms occur on Sundays at 5 PM. For example, it may be determined that a “higher” (or greater than “normal”) amount of power events and/or alarms occur on Sundays at 5 PM since this is when updates (e.g., time sync operations, and/or software and/or hardware updates) typically occur in the electrical/power system. Additional aspects of identification of discriminant characteristics are described further below in connection with
(71) After block 420, the method may end in some embodiments. In other embodiments, the method may return to block 405 and repeat again (e.g., in response to receiving additional information related to power events and/or alarms). Similar to method 200, it is understood that method 400 may include one or more additional blocks in some embodiments. For example, in some embodiments the method 200 may include determining a relative criticality score of each of the identified discriminant characteristics to a process or an application associated with the electrical/power system, e.g., over a predetermined time period. The relative criticality score may be based, for example, on an impact of the identified discriminant characteristics to the process or the application, e.g., over the predetermined time period. In some embodiments, the impact of the identified discriminant characteristics is related to tangible or intangible costs associated with the identified discriminant characteristics to the process or the application. In some embodiments, the relative criticality score is presented on at least one plot of the at least one plot visually representing the identified discriminant characteristics. Additionally, in some embodiments the relative criticality score may be used prioritize responding to the identified alarms (e.g., at block 230 of method 200).
(72) Referring to
(73) As illustrated in
(74) The above-discussed time dimensions may indicate, for example, time of day (hours or minutes) of discriminant events (e.g., as shown in
(75) Count and identification (or spread) of meter dimensions may indicate, for example, how many meters (e.g., IEDs) are associated with or responsible for detecting a particular percentage of events in the electrical/power system, which meters are in the top ten for detecting events, etc. (e.g., as shown in
(76) At block 610, dimensions are extracted from events identified from the electrical measurement data. In some embodiments, the events identified from the electrical measurement data may correspond to power events identified from electrical measurement data at block 210 of method 200, for example.
(77) Example dimensions that may be extracted may include, for example, pre-event and post-event information from energy-related signals (or waveforms) associated with the electrical measurement data. As previously discussed, electrical measurement data may be from or derived from energy-related signals captured by at least one IED in an electrical/power system. Dimensions may also be extracted from event text labels, for example, which are re-use in further analysis and/or displayed on a plot illustrating the electrical measurement data and/or associated identified events (e.g., extracting the two dimensions of power quality issue=sag, and phase=A, from the various different labels “VA sag”, “voltage dip ph.A”, “Phase A voltage sag”, all three meaning the same thing=“Voltage Sag on Phase A). The event text labels may be automatically generated in some embodiments, and manually (or semi-automatically) generated in other embodiments to tag a group of events, or to re-tag in a non-ambiguous way, the events (e.g., call all voltage sags on phase A, “Voltage Sag Phase A”).
(78) Further example dimensions that may be extracted may include power quality type(s) further distinctions/groups of the events identified from the electrical measurement data, for example, non-steady state power quality types such as sag, swell, transient, etc. as one dimension, distinguished from another dimension of steady state power quality types such as power factor, harmonics, etc. Protection types, such as those that may be used in triggering, avoiding or postponing triggering one of more actions at block 230 of method 200, for example, may also be extracted from the electrical measurement data in some embodiments. Example protection types may include thermal trip, short trip, earth leakage trip, etc., as a few examples. It is understood that other types of dimensions may be extracted from events identified in the electrical measurement data.
(79) In one embodiment, the dimensions are extracted by observing differences between one phase and another phase for measurements (e.g., voltage sag magnitude measurements) obtained or derived from measurements by each meter or IED in the electrical/power system.
(80) At block 615, other dimensions may be extracted from events identified from the electrical measurement data and/or other systems (e.g., sensors or devices) in the electrical/power system, for example, to identify a source (or sources) of problems in the electrical/power system. These other dimensions may include, for example, operation type(s), such as status changed from “on” to “off”, “maintenance on operation—start”, etc. The other dimensions may also include internal system warnings, such as a warning “DB full alarm” generated in response to a database of one or more systems in the electrical/power system having a full database. Additionally, the other example dimensions may include power monitoring health status, for example, of the power monitoring and control system responsible for monitoring and controlling the electrical/power system. The power monitoring health status may indicate, for example, time sync loss, loss of communications, etc. It is understood that further dimensions may be extracted.
(81) In some embodiments, the other dimensions may be extracted from automatically detected configurations of the electrical/power system (e.g., number and type of IEDs, number and type of loads, etc.), for example, from sensor data received from one or more sensors in the electrical/power system that may be helpful for identifying dimensions in the electrical/power system. One example of sensor would be temperature or vibrations measured on the electrical equipment/load (e.g., on a motor or a transformer). In some embodiments, the other dimensions may also be extracted from electrical/power system configuration data manually input by a user, for example, as may be received from a user device (e.g., 114, shown in
(82) At block 620, discriminant dimensions, for example, from the dimensions identified or extracted at blocks 605, 610, and 615, are selectively combined or aggregated. For example, discriminant dimensions (e.g., frequency of events per day) associated with one meter in the electrical/power system may be combined with like discriminant dimensions (e.g., frequency of events per day) associated with another meter in the electrical/power system, to determine a combined number of discriminant dimensions, e.g., frequency of events in the electrical/power system per day. This can be done systematically by pairwise aggregating the dimensions as illustrated in
(83) At block 625, independent dimensions are identified, for example, from the dimensions identified or extracted at blocks 605, 610, and 615. For example, it may be determined that dimensions associated with priority score of an event, e.g., as shown in
(84) At block 630, linked dimensions are identified, for example, from the dimensions identified or extracted at blocks 605, 610, and 615. For example, days of week dimensions may be linked to dimensions associated with particular times of day, e.g., as shown in
(85) After block 630, the method may end in some embodiments. In other embodiments, the method may return to block 605 and repeat again (e.g., in response to receiving additional electrical measurement data). Similar to methods 200 and 400, it is understood that method 600 may include one or more additional blocks in some embodiments.
(86) Referring to
(87) Referring to
(88) The information shown in
(89) Referring to
(90) Referring to
(91) Referring to
(92) Referring to
(93) Referring to
(94) As illustrated in
(95) In accordance with some aspects of this disclosure, conducting discriminant analysis includes (among all the other previously described processes, methods, calculations and results and examples, and not limited to any or all of these) finding the linked dimensions of day time (e.g., 30 minute intervals) and of day of week (e.g., on Mondays) described in the descriptions of and illustrated in
(96) In accordance with some aspects of this disclosure, conducting discriminant analysis per dimension, focusing on each single period (or on other sub-groups such as certain hours of each day e.g., morning, afternoon, night time periods), may provide for deeper relevant analysis of discriminant dimensions (e.g., than conducting discriminant analysis for a full day). The analysis per period may be a preparation step of further analysis steps, such as is the case in this exemplary flow diagram where 805 is preparation for 810 and then for 815.
(97) At block 810, the combination of all (or substantially all) the discriminant dimensions are analyzed, for example, to enable identification of what is discriminating for each period versus other periods at block 815. For example, returning briefly to
(98) At block 820, the differences between one period (e.g., period 5) and a next period (e.g., period 4), for each of the periods, may be quantified. For example, it may be determined that period 5 has three (or another number) more new discriminant dimensions than period 4. This may in one embodiment aim at disaggregating the “inherited” discriminant dimensions form each one of the previous periods. The goal in this case could be to provide a “historical steps of unresolved issues” diagnostic report to help a new user who arrived on the site after the previous expert retired, to gain understanding of the number and importance of the ongoing events. This example may identify which previous periods' event types become the new normal, when not resolved. A typical graph of such a case would be a “step by step” increasing number of events. Reference 820 would then show how many of the events would be added from one period to the next. In such a case, again additional assumptions would need to be confirmed such as subtracting the previous periods numbers of events and checking that the same discriminating dimensions continue on, even if more and more blurred by the addition of the next unresolved issues. At block 825, discriminant characteristics, such as those discussed in connection with figures above and described in the previous example of step wise increments of quantities related to unresolved issues piling on each other, are identified based on the quantified differences.
(99) In some embodiments, at block 830 (which is optional in some embodiments), the discriminant characteristics associated each period and/or information associated with the discriminant characteristics (such as priority scores as shown in
(100) After block 830, the method may end in some embodiments. In other embodiments, the method may return to block 805 and repeat again (e.g., in response to receiving additional electrical measurement data). Similar to methods 200, 400 and 600, it is understood that method 800 may include one or more additional blocks in some embodiments.
(101) Referring to
(102) Referring also to plot 1900 shown in
(103) Referring to
(104) As illustrated in
(105) At block 1010, all (or substantially all) dimensions may be “pulled in” or otherwise extracted or identified from each of the groups formed at block 1005. In some embodiments, the dimensions may include both discriminant and non-discriminant dimensions.
(106) At block 1015, power quality profiles may be identified for each of the groups (and subparts of the groups in some instances), for example, using a power quality profile library. In accordance with some embodiments of this disclosure, the power quality profile library is stored on or accessed by the system(s) or device(s) on which method 1000 is implemented. As one example, the power quality profile library may be accessed from a storage device associated with a cloud-computing device containing the latest power quality profiles.
(107) At block 1020, pattern analysis techniques are used to identify patterns in the each of the groups, for example, based on the power quality profiled identified at block 1015. Some of the patterns were already alluded to previously: Daily hourly patterns (e.g., most SooE, or the longest duration SooE, or the SooE with most alarms/events appear at 17h30), days of week patterns (e.g., on Sundays). Other examples of patterns are seasonal patterns (e.g., temperature related, holidays related), amongst many others. A simple calculation of which pattern has the most “explanatory capability” explains most cases, in the most distinctive way (from the other SooE clusters for example).
(108) At block 1025, the groups (or subparts of the groups) as well as the discriminant dimensions are analyzed for obvious or non-obvious links, possibly based on the identified patterns at block 1020. Examples of linked dimensions are shown, for example, in
(109) At block 1030, sequence(s) analysis techniques are used to analyze internal sequences of the groups (e.g., the SooE cluster 1 may show a pattern of sags, followed by interruptions), as well as between the different SooE (e.g., a pattern of a cluster 1 SooE generally followed later by a SooE of cluster 2), possibly the ones linked at block 1025.
(110) After block 1030, the method may end in some embodiments. In other embodiments, the method may return to block 1005 and repeat again (e.g., in response to additionally power events being identified). Similar to methods 200, 400, 600 and 800, it is understood that method 1000 may include one or more additional blocks in some embodiments.
(111) Referring to
(112) Referring to
(113) In accordance with some aspects of this disclosure, a “extreme outlier day” may be detected by the electrical/power system either at a specific location (e.g., at a specific IED), or at the aggregated level of all monitored points (e.g., all the IEDs and all the electrical devices capable of monitoring or creating events or alarms). The system dynamically defines for each IED and for the global system (as well as for other relevant locations in the electrical/power system hierarchy), a threshold of what is the value which defines an “extreme outlier day” as described previously (e.g., using the median value+3*IQR, of the current/active period, so of the period for which no new change point has been determined active since the last identified change point). If during any day, the number of events exceeds this threshold, the system may issue a warning in some embodiments. This warning may be an alarm visualized in the mobile application on the user devices, or a message sent per SMS or email.
(114) In accordance with another implementation, the user may request a “current state diagnostic” after receiving a notification of an “extreme outlier day”. The system will then run all the discriminating analysis as previously described. The main difference is that it will take the current state of this day as if it was a new period following the current one. In
(115) In some embodiment, a second alarm threshold may be defined in a system, “remembering” the worst day ever of the past. This may create an additional alarm if during an “extreme outlier day”, this second threshold is also exceeded. This may in turn trigger additional actions, such as sending a notification to more users/managers as one example among others.
(116) In another embodiment, the system may send the next day a summary report of such an “extreme outlier day” to a pre-defined list of users. This may include a trend evaluation (e.g., applying predictive algorithms and trends analysis, especially if the issue was detected late the previous day, and is constantly accelerating).
(117) As described above and as will be appreciated by those of ordinary skill in the art, embodiments of the disclosure herein may be configured as a system, method, or combination thereof. Accordingly, embodiments of the present disclosure may be comprised of various means including hardware, software, firmware or any combination thereof.
(118) It is to be appreciated that the concepts, systems, circuits and techniques sought to be protected herein are not limited to use in the example applications described herein (e.g., power monitoring system applications) but rather, may be useful in substantially any application where it is desired to manage smart alarms in an electrical system. While particular embodiments and applications of the present disclosure have been illustrated and described, it is to be understood that embodiments of the disclosure not limited to the precise construction and compositions disclosed herein and that various modifications, changes, and variations can be apparent from the foregoing descriptions without departing from the spirit and scope of the disclosure as defined in the appended claims.
(119) Having described preferred embodiments, which serve to illustrate various concepts, structures and techniques that are the subject of this patent, it will now become apparent to those of ordinary skill in the art that other embodiments incorporating these concepts, structures and techniques may be used. Additionally, elements of different embodiments described herein may be combined to form other embodiments not specifically set forth above.