Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

2022

Machine learning

Institution
Publication
Publication Type

Articles 1 - 30 of 55

Full-Text Articles in Physical Sciences and Mathematics

Prediction Method And Application Of Gas Emission From Mining Workface Based On Stl-Eemd-Ga-Svr, Lin Haifei, Liu Shihao, Zhou Jie, Xu Peiyun, Shuang Haiqing Dec 2022

Prediction Method And Application Of Gas Emission From Mining Workface Based On Stl-Eemd-Ga-Svr, Lin Haifei, Liu Shihao, Zhou Jie, Xu Peiyun, Shuang Haiqing

Coal Geology & Exploration

Accurate prediction of gas emission can provide important basis for mine ventilation and the prevention and measures of gas disasters. In order to improve the prediction accuracy of gas emission in the mining workface, the monitoring data of gas emission were decomposed into the trend term, periodic term and irregular fluctuation term by the Seasonal-Trend decomposition procedure based on Loess (STL) based on the monitoring data of gas emission from the mining workface of Huangling Mine in Shaanxi. Besides, the irregular fluctuation term was further broken down into the Intrinsic Mode Functions (IMFs) components with different characteristics and the residual …


Application Of Artificial Intelligence To Lithium-Ion Battery Research And Development, Zhen-Wei Zhu, Jing-Yi Qiu, Li Wang, Gao-Ping Cao, Xiang-Ming He, Jing Wang, Hao Zhang Dec 2022

Application Of Artificial Intelligence To Lithium-Ion Battery Research And Development, Zhen-Wei Zhu, Jing-Yi Qiu, Li Wang, Gao-Ping Cao, Xiang-Ming He, Jing Wang, Hao Zhang

Journal of Electrochemistry

Lithium-ion batteries (LIBs) have become one of the best solutions to the energy storage issue in modern society. However, the battery materials and device development are both complex, and involve multivariable problems. Traditional trial-and-error approach, which relies on researchers to conduct experiments, has encountered bottlenecks in the improvement of the battery performance. Artificial intelligence (AI) is the most potential technology to deal with this issue due to its powerful high-speed and capabilities of processing massive data. In particular, the capability of machine learning (ML) algorithms in assessing multidimensional data variables and discovering patterns in the sets are expected to assist …


Generation Of Phase Transitions Boundaries Via Convolutional Neural Networks, Christopher Alexis Ibarra Dec 2022

Generation Of Phase Transitions Boundaries Via Convolutional Neural Networks, Christopher Alexis Ibarra

Open Access Theses & Dissertations

Accurate mapping of phase transitions boundaries is crucial in accurately modeling the equation of state of materials. The phase transitions can be structural (solid-solid) driven by temperature or pressure or a phase change like melting which defines the solid-liquid melt line. There exist many computational methods for evaluating the phase diagram at a particular point in temperature (T) and pressure (P). Most of these methods involve evaluation of a single (P,T) point at a time. The present work partially automates the search for phase boundaries lines utilizing a machine learning method based on convolutional neural networks and an efficient search …


Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque Dec 2022

Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque

Electrical & Computer Engineering Theses & Dissertations

Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (ITS), and cybernetics. Today critical infrastructures (CIs) (e.g., energy systems, electric grids, etc.) and other CPSs (e.g., manufacturing industries, autonomous transportation systems, etc.) are experiencing challenges in dealing with cyberattacks. Major cybersecurity concerns are rising around CPSs because of their ever-growing use of information technology based automation. Often the security concerns are limited to probability-based possible attack …


Predicting The Stability Of Open Stopes Using Machine Learning, Alicja Szmigiel, Derek B. Apel Nov 2022

Predicting The Stability Of Open Stopes Using Machine Learning, Alicja Szmigiel, Derek B. Apel

Journal of Sustainable Mining

The Mathews stability graph method was presented for the first time in 1980. This method was developed to assess the stability of open stopes in different underground conditions, and it has an impact on evaluating the safety of underground excavations. With the development of technology and growing experience in applying computer sciences in various research disciplines, mining engineering could significantly benefit by using Machine Learning. Applying those ML algorithms to predict the stability of open stopes in underground excavations is a new approach that could replace the original graph method and should be investigated. In this research, a Potvin database …


Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr. Nov 2022

Design Of Secure Communication Schemes To Provide Authentication And Integrity Among The Iot Devices, Vidya Rao Dr.

Technical Collection

The fast growth in Internet-of-Things (IoT) based applications, has increased the number of end-devices communicating over the Internet. The end devices are made with fewer resources and are low battery-powered. These resource-constrained devices are exposed to various security and privacy concerns over publicly available Internet communication. Thus, it becomes essential to provide lightweight security solutions to safeguard data and user privacy. Elliptic Curve Cryptography (ECC) can be used to generate the digital signature and also encrypt the data. The method can be evaluated on a real-time testbed deployed using Raspberry Pi3 devices and every message transmitted is subjected to ECC. …


Application Of Machine Learning And Cyber Security In Smart Grid, Soham Dutta Dr. Nov 2022

Application Of Machine Learning And Cyber Security In Smart Grid, Soham Dutta Dr.

Technical Collection

Unplanned islanding of microgrids is a major hindrance in providing continuous power supply to the critical loads. The detection of these islanding instants needs to be very fast so that the distributed generators (DG) are able to take control actions in minimum time. Due to high quality data at a rapid rate, micro phasor measurement unit (μ-PMU) are becoming widely popular in distribution system and micro grids. These μ-PMUs can be leveraged for island detection. However, the working of μ-PMU is hugely dependent on communication network for data transmission which is prone to cyber-attacks. In view of the above facts, …


Cnn-Based Dendrite Core Detection From Microscopic Images Of Directionally Solidified Ni-Base Alloys, Xiaoguang Li Oct 2022

Cnn-Based Dendrite Core Detection From Microscopic Images Of Directionally Solidified Ni-Base Alloys, Xiaoguang Li

Theses and Dissertations

Dendrite core is the center point of the dendrite. The information of dendrite core is very helpful for material scientists to analyze the properties of materials. Therefore, detecting the dendrite core is a very important task in the material science field. Meanwhile, because of some special properties of the dendrites, this task is also very challenging. Different from the typical detection problems in the computer vision field, detecting the dendrite core aims to detect a single point location instead of the bounding-box. As a result, the existing regressing bounding-box based detection methods can not work well on this task because …


Learning To Play An Imperfect Information Card Game Using Reinforcement Learning, Buğra Kaan Demi̇rdöver, Ömer Baykal, Ferdanur Alpaslan Sep 2022

Learning To Play An Imperfect Information Card Game Using Reinforcement Learning, Buğra Kaan Demi̇rdöver, Ömer Baykal, Ferdanur Alpaslan

Turkish Journal of Electrical Engineering and Computer Sciences

Artificial intelligence and machine learning are widely popular in many areas. One of the most popular ones is gaming. Games are perfect testbeds for machine learning and artificial intelligence with various scenarios and types. This study aims to develop a self-learning intelligent agent to play the Hearts game. Hearts is one of the most popular trick-taking card games around the world. It is an imperfect information card game. In addition to having a huge state space, Hearts offers many extra challenges due to its nature. In order to ease the development process, the agent developed in the scope of this …


Comparison Of Ml Algorithms To Distinguish Between Human Or Human-Like Targets Using The Hog Features Of Range-Time And Range-Doppler Images In Through-The-Wall Applications, Yunus Emre Acar, İsmai̇l Saritaş, Ercan Yaldiz Sep 2022

Comparison Of Ml Algorithms To Distinguish Between Human Or Human-Like Targets Using The Hog Features Of Range-Time And Range-Doppler Images In Through-The-Wall Applications, Yunus Emre Acar, İsmai̇l Saritaş, Ercan Yaldiz

Turkish Journal of Electrical Engineering and Computer Sciences

When detecting the human targets behind walls, false detections occur for many systematic and environmental reasons. Identifying and eliminating these false detections is of great importance for many applications. This study investigates the potential of machine learning (ML) algorithms to distinguish between the human and human-like targets behind walls. For this purpose, a stepped-frequency continuous-wave (SFCW) radar has been set up. Experiments have been carried out with real human targets and moving plates imitating a regular breath of a healthy human. Unlike conventional methods, human and human-like returns are classified using range-Doppler images containing range and Doppler information. Then, the …


Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug Sep 2022

Analyzing Microarchitectural Residue In Various Privilege Strata To Identify Computing Tasks, Tor J. Langehaug

Theses and Dissertations

Modern multi-tasking computer systems run numerous applications simultaneously. These applications must share hardware resources including the Central Processing Unit (CPU) and memory while maximizing each application’s performance. Tasks executing in this shared environment leave residue which should not reveal information. This dissertation applies machine learning and statistical analysis to evaluate task residue as footprints which can be correlated to identify tasks. The concept of privilege strata, drawn from an analogy with physical geology, organizes the investigation into the User, Operating System, and Hardware privilege strata. In the User Stratum, an adversary perspective is taken to build an interrogator program that …


Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao Sep 2022

Enabling Rapid Chemical Analysis Of Plutonium Alloys Via Machine Learning-Enhanced Atomic Spectroscopy Techniques, Ashwin P. Rao

Theses and Dissertations

Analytical atomic spectroscopy methods have the potential to provide solutions for rapid, high fidelity chemical analysis of plutonium alloys. Implementing these methods with advanced analytical techniques can help reduce the chemical analysis time needed for plutonium pit production, directly enabling the 80 pit-per-year by 2030 manufacturing goal outlined in the 2018 Nuclear Posture Review. Two commercial, handheld elemental analyzers were validated for potential in situ analysis of Pu. A handheld XRF device was able to detect gallium in a Pu surrogate matrix with a detection limit of 0.002 wt% and a mean error of 8%. A handheld LIBS device was …


Data-Driven Research On Engineering Design Thinking And Behaviors In Computer-Aided Systems Design: Analysis, Modeling, And Prediction, Molla Hafizur Rahman Aug 2022

Data-Driven Research On Engineering Design Thinking And Behaviors In Computer-Aided Systems Design: Analysis, Modeling, And Prediction, Molla Hafizur Rahman

Graduate Theses and Dissertations

Research on design thinking and design decision-making is vital for discovering and utilizing beneficial design patterns, strategies, and heuristics of human designers in solving engineering design problems. It is also essential for the development of new algorithms embedded with human intelligence and can facilitate human-computer interactions. However, modeling design thinking is challenging because it takes place in the designer’s mind, which is intricate, implicit, and tacit. For an in-depth understanding of design thinking, fine-grained design behavioral data are important because they are the critical link in studying the relationship between design thinking, design decisions, design actions, and design performance. Therefore, …


Emotion Detection Using An Ensemble Model Trained With Physiological Signals And Inferred Arousal-Valence States, Matthew Nathanael Gray Aug 2022

Emotion Detection Using An Ensemble Model Trained With Physiological Signals And Inferred Arousal-Valence States, Matthew Nathanael Gray

Electrical & Computer Engineering Theses & Dissertations

Affective computing is an exciting and transformative field that is gaining in popularity among psychologists, statisticians, and computer scientists. The ability of a machine to infer human emotion and mood, i.e. affective states, has the potential to greatly improve human-machine interaction in our increasingly digital world. In this work, an ensemble model methodology for detecting human emotions across multiple subjects is outlined. The Continuously Annotated Signals of Emotion (CASE) dataset, which is a dataset of physiological signals labeled with discrete emotions from video stimuli as well as subject-reported continuous emotions, arousal and valence, from the circumplex model, is used for …


Learning From Machines: Insights In Forest Transpiration Using Machine Learning Methods, Morgan Tholl Jul 2022

Learning From Machines: Insights In Forest Transpiration Using Machine Learning Methods, Morgan Tholl

Dissertations and Theses

Machine learning has been used as a tool to model transpiration for individual sites, but few models are capable of generalizing to new locations without calibration to site data. Using the global SAPFLUXNET database, 95 tree sap flow data sites were grouped using three clustering strategies: by biome, by tree functional type, and through use of a k-means unsupervised clustering algorithm. Two supervised machine learning algorithms, a random forest algorithm and a neural network algorithm, were used to build machine learning models that predicted transpiration for each cluster. The performance and feature importance in each model were analyzed and compared …


Development Of A Hybrid System Based On Abc Algorithm For Selection Of Appropriate Parameters For Disease Diagnosis From Ecg Signals, Ersi̇n Ersoy, Gazi̇ Erkan Bostanci, Mehmet Serdar Güzel Jul 2022

Development Of A Hybrid System Based On Abc Algorithm For Selection Of Appropriate Parameters For Disease Diagnosis From Ecg Signals, Ersi̇n Ersoy, Gazi̇ Erkan Bostanci, Mehmet Serdar Güzel

Turkish Journal of Electrical Engineering and Computer Sciences

The number of people who die due to cardiovascular diseases is quite high. In our study, ECG (electrocar-diogram) signals were divided into segments and waves based on temporal boundaries. Signal similarity methods such as convolution, correlation, covariance, signal peak to noise ratio (PNRS), structural similarity index (SSIM), one of the basic statistical parameters, arithmetic mean and entropy were applied to each of these sections. In addition, a square error-based new approach was applied and the difference of the signs from the mean sign was taken and used as a feature vector. The obtained feature vectors are used in the artificial …


Models And Machine Learning Techniques For Improving The Planning And Operation Of Electricity Systems In Developing Regions, Santiago Correa Cardona Jun 2022

Models And Machine Learning Techniques For Improving The Planning And Operation Of Electricity Systems In Developing Regions, Santiago Correa Cardona

Doctoral Dissertations

The enormous innovation in computational intelligence has disrupted the traditional ways we solve the main problems of our society and allowed us to make more data-informed decisions. Energy systems and the ways we deliver electricity are not exceptions to this trend: cheap and pervasive sensing systems and new communication technologies have enabled the collection of large amounts of data that are being used to monitor and predict in real-time the behavior of this infrastructure. Bringing intelligence to the power grid creates many opportunities to integrate new renewable energy sources more efficiently, facilitate grid planning and expansion, improve reliability, optimize electricity …


Improving Pain Assessment Using Vital Signs And Pain Medication For Patients With Sickle Cell Disease: Retrospective Study, Swati Padhee, Gary K. Nave Jr, Tanvi Banerjee, Daniel M. Abrams, Nirmish Shah Jun 2022

Improving Pain Assessment Using Vital Signs And Pain Medication For Patients With Sickle Cell Disease: Retrospective Study, Swati Padhee, Gary K. Nave Jr, Tanvi Banerjee, Daniel M. Abrams, Nirmish Shah

Computer Science and Engineering Faculty Publications

Background: Sickle cell disease (SCD) is the most common inherited blood disorder affecting millions of people worldwide. Most patients with SCD experience repeated, unpredictable episodes of severe pain. These pain episodes are the leading cause of emergency department visits among patients with SCD and may last for several weeks. Arguably, the most challenging aspect of treating pain episodes in SCD is assessing and interpreting a patient's pain intensity level. Objective: This study aims to learn deep feature representations of subjective pain trajectories using objective physiological signals collected from electronic health records. Methods: This study used electronic health record data collected …


Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina Jun 2022

Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina

Electrical & Computer Engineering Faculty Publications

To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.


Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld May 2022

Local Learning Algorithms For Stochastic Spiking Neural Networks, Bleema Rosenfeld

Dissertations

This dissertation focuses on the development of machine learning algorithms for spiking neural networks, with an emphasis on local three-factor learning rules that are in keeping with the constraints imposed by current neuromorphic hardware. Spiking neural networks (SNNs) are an alternative to artificial neural networks (ANNs) that follow a similar graphical structure but use a processing paradigm more closely modeled after the biological brain in an effort to harness its low power processing capability. SNNs use an event based processing scheme which leads to significant power savings when implemented in dedicated neuromorphic hardware such as Intel’s Loihi chip.

This work …


Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness, Nicholas Furth May 2022

Un-Fair Trojan: Targeted Backdoor Attacks Against Model Fairness, Nicholas Furth

Theses

Machine learning models have been shown to be vulnerable against various backdoor and data poisoning attacks that adversely affect model behavior. Additionally, these attacks have been shown to make unfair predictions with respect to certain protected features. In federated learning, multiple local models contribute to a single global model communicating only using local gradients, the issue of attacks become more prevalent and complex. Previously published works revolve around solving these issues both individually and jointly. However, there has been little study on the effects of attacks against model fairness. Demonstrated in this work, a flexible attack, which we call Un-Fair …


A Comprehensive Survey For Non-Intrusive Load Monitoring, Efe İsa Tezde, Eray Yildiz May 2022

A Comprehensive Survey For Non-Intrusive Load Monitoring, Efe İsa Tezde, Eray Yildiz

Turkish Journal of Electrical Engineering and Computer Sciences

Energy-saving and efficiency are as important as benefiting from new energy sources to supply increasing energy demand globally. Energy demand and resources for energy saving should be managed effectively. Therefore, electrical loads need to be monitored and controlled. Demand-side energy management plays a vital role in achieving this objective. Energy management systems schedule an optimal operation program for these loads by obtaining more accurate and precise residential and commercial loads information. Different intellegent measurement applications and machine learning algorithms have been proposed for the measurement and control of electrical devices/loads used in buildings. Of these, nonintrusive load monitoring (NILM) is …


Nucleate Boiling Under Different Gravity Values: Numerical Simulations & Data-Driven Techniques., Sandipan Banerjee May 2022

Nucleate Boiling Under Different Gravity Values: Numerical Simulations & Data-Driven Techniques., Sandipan Banerjee

Electronic Theses and Dissertations

Nucleate boiling is important in nuclear applications and cooling applications under earth gravity conditions. Under reduced gravity or microgravity environment, it is significant too, especially in space exploration applications. Although multiple studies have been performed on nucleate boiling, the effect of gravity on nucleate boiling is not well understood. This dissertation primarily deals with numerical simulations of nucleate boiling using an adaptive Moment-of-Fluid (MoF) method for a single vapor bubble (water vapor or Perfluoro-n-hexane) in saturated liquid for different gravity levels. Results concerning the growth rate of the bubble, specifically the departure diameter and departure time have been provided. The …


Deep Learning Object-Based Detection Of Manufacturing Defects In X-Ray Inspection Imaging, Juan C. Parducci May 2022

Deep Learning Object-Based Detection Of Manufacturing Defects In X-Ray Inspection Imaging, Juan C. Parducci

Mechanical & Aerospace Engineering Theses & Dissertations

Current analysis of manufacturing defects in the production of rims and tires via x-ray inspection at an industry partner’s manufacturing plant requires that a quality control specialist visually inspect radiographic images for defects of varying sizes. For each sample, twelve radiographs are taken within 35 seconds. Some defects are very small in size and difficult to see (e.g., pinholes) whereas others are large and easily identifiable. Implementing this quality control practice across all products in its human-effort driven state is not feasible given the time constraint present for analysis.

This study aims to identify and develop an object detector capable …


Machine Learning Classification Of Digitally Modulated Signals, James A. Latshaw May 2022

Machine Learning Classification Of Digitally Modulated Signals, James A. Latshaw

Electrical & Computer Engineering Theses & Dissertations

Automatic classification of digitally modulated signals is a challenging problem that has traditionally been approached using signal processing tools such as log-likelihood algorithms for signal classification or cyclostationary signal analysis. These approaches are computationally intensive and cumbersome in general, and in recent years alternative approaches that use machine learning have been presented in the literature for automatic classification of digitally modulated signals. This thesis studies deep learning approaches for classifying digitally modulated signals that use deep artificial neural networks in conjunction with the canonical representation of digitally modulated signals in terms of in-phase and quadrature components. Specifically, capsule networks are …


Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny May 2022

Data-Driven Framework For Understanding & Modeling Ride-Sourcing Transportation Systems, Bishoy Kelleny

Civil & Environmental Engineering Theses & Dissertations

Ride-sourcing transportation services offered by transportation network companies (TNCs) like Uber and Lyft are disrupting the transportation landscape. The growing demand on these services, along with their potential short and long-term impacts on the environment, society, and infrastructure emphasize the need to further understand the ride-sourcing system. There were no sufficient data to fully understand the system and integrate it within regional multimodal transportation frameworks. This can be attributed to commercial and competition reasons, given the technology-enabled and innovative nature of the system. Recently, in 2019, the City of Chicago the released an extensive and complete ride-sourcing trip-level data for …


Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta Apr 2022

Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Today, the use of Internet of Things (IoT) devices is higher than ever and it is growing rapidly. Many IoT devices are usually manufactured by home appliance manufacturers where security and privacy are not the foremost concern. When an IoT device is connected to a network, currently there does not exist a strict authentication method that verifies the identity of the device, allowing any rogue IoT device to authenticate to an access point. This thesis addresses the issue by introducing methods for continuous and re-authentication of static and dynamic IoT devices, respectively. We introduce mechanisms and protocols for authenticating a …


Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu Apr 2022

Deapsecure Computational Training For Cybersecurity: Third-Year Improvements And Impacts, Bahador Dodge, Jacob Strother, Rosby Asiamah, Karina Arcaute, Wirawan Purwanto, Masha Sosonkina, Hongyi Wu

Modeling, Simulation and Visualization Student Capstone Conference

The Data-Enabled Advanced Training Program for Cybersecurity Research and Education (DeapSECURE) was introduced in 2018 as a non-degree training consisting of six modules covering a broad range of cyberinfrastructure techniques, including high performance computing, big data, machine learning and advanced cryptography, aimed at reducing the gap between current cybersecurity curricula and requirements needed for advanced research and industrial projects. By its third year, DeapSECURE, like many other educational endeavors, experienced abrupt changes brought by the COVID-19 pandemic. The training had to be retooled to adapt to fully online delivery. Hands-on activities were reformatted to accommodate self-paced learning. In this paper, …


Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen Apr 2022

Machine Learning Based Medical Image Deepfake Detection: A Comparative Study, Siddharth Solaiyappan, Yuxin Wen

Engineering Faculty Articles and Research

Deep generative networks in recent years have reinforced the need for caution while consuming various modalities of digital information. One avenue of deepfake creation is aligned with injection and removal of tumors from medical scans. Failure to detect medical deepfakes can lead to large setbacks on hospital resources or even loss of life. This paper attempts to address the detection of such attacks with a structured case study. Specifically, we evaluate eight different machine learning algorithms, which include three conventional machine learning methods (Support Vector Machine, Random Forest, Decision Tree) and five deep learning models (DenseNet121, DenseNet201, ResNet50, ResNet101, VGG19) …


Intra-Hour Solar Forecasting Using Cloud Dynamics Features Extracted From Ground-Based Infrared Sky Images, Guillermo Terrén-Serrano Apr 2022

Intra-Hour Solar Forecasting Using Cloud Dynamics Features Extracted From Ground-Based Infrared Sky Images, Guillermo Terrén-Serrano

Electrical and Computer Engineering ETDs

Due to the increasing use of photovoltaic systems, power grids are vulnerable to the projection of shadows from moving clouds. An intra-hour solar forecast provides power grids with the capability of automatically controlling the dispatch of energy, reducing the additional cost for a guaranteed, reliable supply of energy (i.e., energy storage). This dissertation introduces a novel sky imager consisting of a long-wave radiometric infrared camera and a visible light camera with a fisheye lens. The imager is mounted on a solar tracker to maintain the Sun in the center of the images throughout the day, reducing the scattering effect produced …