itesla Project Innovative Tools for Electrical System Security within Large Areas
|
|
|
- Amie Lamb
- 10 years ago
- Views:
Transcription
1 itesla Project Innovative Tools for Electrical System Security within Large Areas Samir ISSAD RTE France PSCC 2014 Panel Session 22/08/2014 Advanced data-driven modeling techniques for Power Systems
2 Content 1. itesla Project general presentation 2. Data mining & analysis in the project 3. Offline MC analysis : historical data mining and sampling 4. Security indexes and screening rules with Decision Trees 2
3 Content 1. itesla Project general presentation 2. Data mining & analysis in the project 3. Offline MC analysis : historical data mining and sampling 4. Security indexes and screening rules with Decision Trees 3
4 itesla Project general presentation A european funded project Under the 7th Framework Package (FP7) itesla partners : Transmission System Operators Universities Research Centers Industrials & IT providers 4
5 itesla Project general presentation To develop a toolbox that will be needed by Transmission System Operators to operate the European power system in the years to come 1. To model the increasing amount of uncertainties in the decision process 2. To take into account system dynamics in the security assessment 3. To model preventive and corrective actions and take them into account in the decision process 4. To provide a solution to a continuous optimization problem from 2 days ahead to real time under uncertainty 5. To develop an open and interoperable toolbox Uncert ainties Action recomm endatio n Dynam ics New online security assessment 5
6 Starting point: the existing solution Online External data (forecasts and snapshots) Data acquisition and storage Merging module Contingency screening (static Load-Flow) Synthesis of recommendations for the operator
7 Upgrade #1: dynamic simulations Online External data (forecasts and snapshots) Data acquisition and storage Merging module Contingency screening (Time domain simulations) Info to the operator about transient stability Offline validation of dynamic models Synthesis of recommendations for the operator
8 Upgrade #2: uncertainties Online External data (forecasts and snapshots) Data acquisition and storage Use of historical data to build uncertainty patterns Merging module Offline validation of dynamic models Monte Carlo approach using base case + uncertainties Contingency screening (Time domain simulations) Synthesis of recommendations for the operator M contingencies N sampled states = NxM online dynamic simulations to be performed in a 15 min time window
9 Upgrade #3: Filtering process Online Offline External data (forecasts and snapshots) Data acquisition and storage Computation of security rules Sampling of stochastic variables Merging module Elaboration of starting network states Contingency screening (several stages) Impact Analysis (time domain simulations) Offline validation of dynamic models Time domain simulations Synthesis of recommendations for the operator Data mining on the results of simulation
10 Upgrade #3: Filtering process Offline workflow properties: Not permanently running: only on demand for offline security rules update Called one day per week Use of historical data and data mining techniques to build similar situations to forecast not yet available Offline computation platform has much more computation capacity than the online platform but only used periodically Online workflow properties: online does not mean real time but permanently running Analyses forecasts from D-2 to real time Requires results of offline workflow High filtering rate expected to reduce the online time domain simulations Number of online samples << Number of offline sampled cases 10
11 Proposed final architecture Online Offline External data (forecasts and snapshots) Offline validation of dynamic models Improvements of defence and restoration plans Data acquisition and storage Merging module Contingency screening (several stages) Time domain simulations Synthesis of recommendations for the operator Computation of security rules Sampling of stochastic variables Elaboration of starting network states Impact Analysis (time domain simulations) Data mining on the results of simulation Anticipate Classify Analyse
12 Content 1. itesla Project general presentation 2. Data mining & analysis in the project 3. Offline MC analysis : historical data mining and sampling 4. Security indexes and screening rules with Decision Trees 12
13 Data mining & analysis in the project Data mining techniques will be widely used to extract knowledge from a Bigdata dataset, in particular : to model various stochastic variables through analysis of historical data in order to build realistic samples of network situations to analyze correlations between stochastic variables to build up criteria to detect unacceptable situations to compute confidence intervals of forecast variables in order to replace the classical security assessment of the best estimate situation by a more probabilistic approach 13
14 Data mining & analysis in the project The IT architecture will be chosen to cope with: - a large volume of data and results of simulations to be processed - high performance requirements (data mining algorithms, dynamic simulations, etc.) Different kinds of HPC-type solutions will be investigated A full scale IT system will be used during the project to demonstrate the relevance of the chosen solution and the feasibility of the itesla SA approach at the Pan-European level 14
15 Data mining & analysis in the project Data management Data mining services Dynamic simulation Optimizers Graphical interfaces External data (forecasts and snapshots) Data acquisition and storage Computation of security rules Sampling of stochastic variables Merging module Elaboration of starting network states Contingency screening (several stages) Impact Analysis (time domain simulations) Offline validation of dynamic models Improvements of defence and restoration plans Time domain simulations Synthesis of recommendations for the operator Data mining on the results of simulation
16 Data mining & analysis in the project Data management Data mining services Dynamic simulation Optimizers Graphical interfaces External data (forecasts and snapshots) Data acquisition and storage Computation of security rules Sampling of stochastic variables Merging module Elaboration of starting network states Contingency screening (several stages) Impact Analysis (time domain simulations) Offline validation of dynamic models Improvements of defence and restoration plans Time domain simulations Synthesis of recommendations for the operator Data mining on the results of simulation
17 Data mining & analysis in the project Data management Data mining services Dynamic simulation Optimizers Graphical interfaces External data (forecasts and snapshots) Data acquisition and storage Computation of security rules Sampling of stochastic variables Merging module Elaboration of starting network states Contingency screening (several stages) Impact Analysis (time domain simulations) Offline validation of dynamic models Improvements of defence and restoration plans Time domain simulations Synthesis of recommendations for the operator Data mining on the results of simulation
18 Data mining & analysis in the project Data management Data mining services Dynamic simulation Optimizers Graphical interfaces External data (forecasts and snapshots) Data acquisition and storage Computation of security rules Sampling of stochastic variables Merging module Elaboration of starting network states Contingency screening (several stages) Impact Analysis (time domain simulations) Offline validation of dynamic models Improvements of defence and restoration plans Time domain simulations Synthesis of recommendations for the operator Data mining on the results of simulation
19 Data mining & analysis in the project Data management Data mining services Dynamic simulation Optimizers Graphical interfaces External data (forecasts and snapshots) Data acquisition and storage Computation of security rules Sampling of stochastic variables Merging module Elaboration of starting network states Contingency screening (several stages) Impact Analysis (time domain simulations) Offline validation of dynamic models Improvements of defence and restoration plans Time domain simulations Synthesis of recommendations for the operator Data mining on the results of simulation
20 Data mining & analysis in the project Data management Data mining services Dynamic simulation Optimizers Graphical interfaces External data (forecasts and snapshots) Data acquisition and storage Computation of security rules Sampling of stochastic variables Merging module Elaboration of starting network states Contingency screening (several stages) Impact Analysis (time domain simulations) Offline validation of dynamic models Improvements of defence and restoration plans Time domain simulations Synthesis of recommendations for the operator Data mining on the results of simulation
21 Content 1. itesla Project general presentation 2. Data mining & analysis in the project 3. Offline MC analysis : historical data mining and sampling 4. Security indexes and screening rules with Decision Trees 21
22 Offline MC analysis : historical data mining and sampling Online Offline External data (forecasts and snapshots) Data acquisition and storage Computation of security rules Sampling of stochastic variables Merging module Elaboration of starting network states Contingency screening (several stages) Impact Analysis (time domain simulations) Offline validation of dynamic models Improvements defence and restoration plans Time domain simulations Synthesis of recommendations for the operator Data mining on the results of simulation 22
23 Offline MC analysis : historical data mining and sampling Input Sampling of external variables Starting point initialisation Dynamic simulations Result classification Extract screening rules Generate snapshots of external (i.e. not controllable) stochastic variables Sampling of: Load levels (active, reactive) Renewable generation capacity (wind, solar, ) Generator availabilities Challenges: Sample full range of parameters that can be encountered on-line (in a future time frame) Obtain sufficient sample density to capture system behaviour at all points Key tasks: Extract probability distributions from historical data Sample high-dimensional dependent variables (e.g. thousands of load points) Use feedback to bias sampling towards high information regions Output 8/27/
24 Offline MC analysis : historical data mining and sampling Data dimensionality 1,000s of stochastic variables Size of historical library 10,000s of historical measurements per variable Non-Gaussian data Non-Gaussian marginals Non-linear dependence Correlation is not enough! 24
25 Offline MC analysis : historical data mining and sampling Historical data Principal Component Analysis Data Clustering ecdf Vine Copula Construction C-Vine Decomposition Copula Family Selection Maximum Likelihood Parameter Estimation Goodness-of-fit Test Sampled data Back- Projection ecdf -1 Copula Sampling Actual domain (MW) PC domain (MW) Rank-uniform domain [0,1] 25
26 Information Retained Offline MC analysis : historical data mining and sampling PCA is used to reduce the dimension of data, by only retaining variables that contain significant information. Principal Components are linear combinations of the original data e.g. 1: Total system load 2: North-South load variation Etc.. 100% 80% 60% 40% 20% 95% 0% Number of Principal Components 26
27 Offline MC analysis : historical data mining and sampling Clustering techniques are useful in partitioning the observed data according to the different modes of the stochastic parameters. 27
28 Offline MC analysis : historical data mining and sampling Copula Basics 28
29 Offline MC analysis : historical data mining and sampling The Gumbel copula is an asymmetric Archimedean copula, exhibiting greater dependence in the positive tail. theta=1.5 theta=4
30 Offline MC analysis : historical data mining and sampling Copulas are used to capture a wide range of non-linear dependencies while decoupling from the non-gaussian marginals. Family: Clayton Parameter: 0.83 BEST FIT 30
31 Offline MC analysis : historical data mining and sampling Example Sampled 31
32 Offline MC analysis : historical data mining and sampling Example Historical data 32
33 Offline MC analysis : historical data mining and sampling In statistical significance testing, the p-value is the probability of obtaining a test statistic at least as extreme as the one that was actually observed, assuming that the null hypothesis is true. In the previous work, we use Anderson-Darling test to do the Goodness-of-fit test for choosing the best pair-copula to fit it on each two pairs of data. However, we only use the calculated Anderson-Darling Statistics to compare and choose the smallest one to determine the best family of copula. In fact, we should use P-value instead of the AD statistics to choose the best family of every pair copula. As the distribution we want to check is Chi-Square distribution, the P-value can be directly obtained by searching the Chi-square distribution table. In Matlab, function chi2pval can get the p-value by inputting the statistic and the degree of freedom. Finally, for k=65, the p-value of the overall sampling output for this case is about which means this technique works very well.
34 Content 1. itesla Project general presentation 2. Data mining & analysis in the project 3. Offline MC analysis : historical data mining and sampling 4. Security indexes and screening rules with Decision Trees 34
35 Security indexes and screening rules with Decision Trees Input Sampling of external variables Starting point initialisation Dynamic simulations Classify the outcome of each simulation Approach: use dynamic simulation trajectory to compute 5 security indexes measuring different aspects of system performance Overloads Over/under voltages Small signal stability Transient stability Voltage stability Result classification Extract screening rules Challenges: Identifying most suitable security indexes Converting simulator output to security indexes Key tasks: Study of security indexes and their properties Output 8/27/
36 Security indexes and screening rules with Decision Trees Input Sampling of external variables Starting point initialisation Dynamic simulations Result classification Analysis: extract screening rules Produce screening rules to be used by online platform for security assessment Approach: Store classification results in database Mine data to extract rules per contingency Rules take the form of decision trees Challenges Screening rules should be conservative Data analysis is performed in many dimensions Extract screening rules Output (WP5) Key tasks Comparison of data mining methods Communication standard regarding screening rule requirements 8/27/
37 Security indexes and screening rules with Decision Trees Building security rules ( here on 2D for the sake of clarity actually dimensions ) 37
38 Security indexes and screening rules with Decision Trees Building security rules 38
39 Security indexes and screening rules with Decision Trees Building security rules 39
40 Security indexes and screening rules with Decision Trees Building security rules Inequalities on input variables Tree leafs give security status 40
41 Security indexes and screening rules with Decision Trees Convexity constraint? Usage of Reduced variables Examples of Issues encountered If so, need to store PCA definitions as part of security rules Validity domain : usage? Feedback for refining sampling process (importance sampling) Attribute selection Rule encoding Etc.
42 Thanks you for your attention! 42
A progressive method to solve large-scale AC Optimal Power Flow with discrete variables and control of the feasibility
A progressive method to solve large-scale AC Optimal Power Flow with discrete variables and control of the feasibility Manuel Ruiz, Jean Maeght, Alexandre Marié, Patrick Panciatici and Arnaud Renaud [email protected]
Better decision making under uncertain conditions using Monte Carlo Simulation
IBM Software Business Analytics IBM SPSS Statistics Better decision making under uncertain conditions using Monte Carlo Simulation Monte Carlo simulation and risk analysis techniques in IBM SPSS Statistics
Tail-Dependence an Essential Factor for Correctly Measuring the Benefits of Diversification
Tail-Dependence an Essential Factor for Correctly Measuring the Benefits of Diversification Presented by Work done with Roland Bürgi and Roger Iles New Views on Extreme Events: Coupled Networks, Dragon
Learning outcomes. Knowledge and understanding. Competence and skills
Syllabus Master s Programme in Statistics and Data Mining 120 ECTS Credits Aim The rapid growth of databases provides scientists and business people with vast new resources. This programme meets the challenges
Synchronized real time data: a new foundation for the Electric Power Grid.
Synchronized real time data: a new foundation for the Electric Power Grid. Pat Kennedy and Chuck Wells Conjecture: Synchronized GPS based data time stamping, high data sampling rates, phasor measurements
Curriculum Map Statistics and Probability Honors (348) Saugus High School Saugus Public Schools 2009-2010
Curriculum Map Statistics and Probability Honors (348) Saugus High School Saugus Public Schools 2009-2010 Week 1 Week 2 14.0 Students organize and describe distributions of data by using a number of different
Contents. List of Figures. List of Tables. List of Examples. Preface to Volume IV
Contents List of Figures List of Tables List of Examples Foreword Preface to Volume IV xiii xvi xxi xxv xxix IV.1 Value at Risk and Other Risk Metrics 1 IV.1.1 Introduction 1 IV.1.2 An Overview of Market
How To Understand The Theory Of Probability
Graduate Programs in Statistics Course Titles STAT 100 CALCULUS AND MATR IX ALGEBRA FOR STATISTICS. Differential and integral calculus; infinite series; matrix algebra STAT 195 INTRODUCTION TO MATHEMATICAL
Structural Health Monitoring Tools (SHMTools)
Structural Health Monitoring Tools (SHMTools) Getting Started LANL/UCSD Engineering Institute LA-CC-14-046 c Copyright 2014, Los Alamos National Security, LLC All rights reserved. May 30, 2014 Contents
ANALYTICS IN BIG DATA ERA
ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut
Fluency With Information Technology CSE100/IMT100
Fluency With Information Technology CSE100/IMT100 ),7 Larry Snyder & Mel Oyler, Instructors Ariel Kemp, Isaac Kunen, Gerome Miklau & Sean Squires, Teaching Assistants University of Washington, Autumn 1999
Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval
Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!
Modelling framework for power systems. Juha Kiviluoma Erkka Rinne Niina Helistö Miguel Azevedo
S VISIONS SCIENCE TECHNOLOGY RESEARCH HIGHLIGHT 196 Modelling framework for power systems Juha Kiviluoma Erkka Rinne Niina Helistö Miguel Azevedo VTT TECHNOLOGY 196 Modelling framework for power systems
Institute of Actuaries of India Subject CT3 Probability and Mathematical Statistics
Institute of Actuaries of India Subject CT3 Probability and Mathematical Statistics For 2015 Examinations Aim The aim of the Probability and Mathematical Statistics subject is to provide a grounding in
STA 4273H: Statistical Machine Learning
STA 4273H: Statistical Machine Learning Russ Salakhutdinov Department of Statistics! [email protected]! http://www.cs.toronto.edu/~rsalakhu/ Lecture 6 Three Approaches to Classification Construct
The Need for Training in Big Data: Experiences and Case Studies
The Need for Training in Big Data: Experiences and Case Studies Guy Lebanon Amazon Background and Disclaimer All opinions are mine; other perspectives are legitimate. Based on my experience as a professor
Statistics Graduate Courses
Statistics Graduate Courses STAT 7002--Topics in Statistics-Biological/Physical/Mathematics (cr.arr.).organized study of selected topics. Subjects and earnable credit may vary from semester to semester.
Software and Hardware Solutions for Accurate Data and Profitable Operations. Miguel J. Donald J. Chmielewski Contributor. DuyQuang Nguyen Tanth
Smart Process Plants Software and Hardware Solutions for Accurate Data and Profitable Operations Miguel J. Bagajewicz, Ph.D. University of Oklahoma Donald J. Chmielewski Contributor DuyQuang Nguyen Tanth
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Dynamic Security Assessment in the Future Grid. Vijay Vittal Ira A. Fulton Chair Professor Arizona State University
1 Dynamic Security Assessment in the Future Grid Vijay Vittal Ira A. Fulton Chair Professor Arizona State University 2 Key requirements for DSA Need to perform DSA as close to real time as possible Need
joint Resource Optimization and Scheduler
www.siemens.com/spectrum-power joint Resource Optimization and Scheduler All forecasting and planning applications in one component. Answers for infrastructure and cities. joint Resource Optimization and
Study Plan. MASTER IN (Energy Management) (Thesis Track)
Plan 2005 T Study Plan MASTER IN (Energy Management) (Thesis Track) A. General Rules and Conditions: 1. This plan conforms to the regulations of the general frame of the programs of graduate studies. 2.
Model Calibration and Predictive Analysis using PEST Version 10. 2006 Course Outline
Model Calibration and Predictive Analysis using PEST Version 10 2006 Course Outline 1 Table of Contents Introduction...3 What you will learn...3 What is Nonlinear Parameter Estimation?...3 What is PEST?...4
Data Mining Techniques Chapter 6: Decision Trees
Data Mining Techniques Chapter 6: Decision Trees What is a classification decision tree?.......................................... 2 Visualizing decision trees...................................................
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
Data Mining: An Overview. David Madigan http://www.stat.columbia.edu/~madigan
Data Mining: An Overview David Madigan http://www.stat.columbia.edu/~madigan Overview Brief Introduction to Data Mining Data Mining Algorithms Specific Eamples Algorithms: Disease Clusters Algorithms:
Bootstrapping Big Data
Bootstrapping Big Data Ariel Kleiner Ameet Talwalkar Purnamrita Sarkar Michael I. Jordan Computer Science Division University of California, Berkeley {akleiner, ameet, psarkar, jordan}@eecs.berkeley.edu
Silvermine House Steenberg Office Park, Tokai 7945 Cape Town, South Africa Telephone: +27 21 702 4666 www.spss-sa.com
SPSS-SA Silvermine House Steenberg Office Park, Tokai 7945 Cape Town, South Africa Telephone: +27 21 702 4666 www.spss-sa.com SPSS-SA Training Brochure 2009 TABLE OF CONTENTS 1 SPSS TRAINING COURSES FOCUSING
+ The Killer Question For Every Manager
+ Glen B. Alleman Thomas J. Coonce Big Data Meets Earned Value Management We have lots data. How can we use it to make predictive and prescriptive forecasts of future performance to increase Probability
Gerard Mc Nulty Systems Optimisation Ltd [email protected]/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I
Gerard Mc Nulty Systems Optimisation Ltd [email protected]/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I Data is Important because it: Helps in Corporate Aims Basis of Business Decisions Engineering Decisions Energy
COPYRIGHTED MATERIAL. Contents. List of Figures. Acknowledgments
Contents List of Figures Foreword Preface xxv xxiii xv Acknowledgments xxix Chapter 1 Fraud: Detection, Prevention, and Analytics! 1 Introduction 2 Fraud! 2 Fraud Detection and Prevention 10 Big Data for
SMIB A PILOT PROGRAM SYSTEM FOR STOCHASTIC SIMULATION IN INSURANCE BUSINESS DMITRII SILVESTROV AND ANATOLIY MALYARENKO
SMIB A PILOT PROGRAM SYSTEM FOR STOCHASTIC SIMULATION IN INSURANCE BUSINESS DMITRII SILVESTROV AND ANATOLIY MALYARENKO ABSTRACT. In this paper, we describe the program SMIB (Stochastic Modeling of Insurance
10426: Large Scale Project Accounting Data Migration in E-Business Suite
10426: Large Scale Project Accounting Data Migration in E-Business Suite Objective of this Paper Large engineering, procurement and construction firms leveraging Oracle Project Accounting cannot withstand
Java Modules for Time Series Analysis
Java Modules for Time Series Analysis Agenda Clustering Non-normal distributions Multifactor modeling Implied ratings Time series prediction 1. Clustering + Cluster 1 Synthetic Clustering + Time series
15.496 Data Technologies for Quantitative Finance
Paul F. Mende MIT Sloan School of Management Fall 2014 Course Syllabus 15.496 Data Technologies for Quantitative Finance Course Description. This course introduces students to financial market data and
Variables Control Charts
MINITAB ASSISTANT WHITE PAPER This paper explains the research conducted by Minitab statisticians to develop the methods and data checks used in the Assistant in Minitab 17 Statistical Software. Variables
Non Linear Dependence Structures: a Copula Opinion Approach in Portfolio Optimization
Non Linear Dependence Structures: a Copula Opinion Approach in Portfolio Optimization Jean- Damien Villiers ESSEC Business School Master of Sciences in Management Grande Ecole September 2013 1 Non Linear
Is a Data Scientist the New Quant? Stuart Kozola MathWorks
Is a Data Scientist the New Quant? Stuart Kozola MathWorks 2015 The MathWorks, Inc. 1 Facts or information used usually to calculate, analyze, or plan something Information that is produced or stored by
Introduction to Engineering System Dynamics
CHAPTER 0 Introduction to Engineering System Dynamics 0.1 INTRODUCTION The objective of an engineering analysis of a dynamic system is prediction of its behaviour or performance. Real dynamic systems are
Pricing of a worst of option using a Copula method M AXIME MALGRAT
Pricing of a worst of option using a Copula method M AXIME MALGRAT Master of Science Thesis Stockholm, Sweden 2013 Pricing of a worst of option using a Copula method MAXIME MALGRAT Degree Project in Mathematical
Fairfield Public Schools
Mathematics Fairfield Public Schools AP Statistics AP Statistics BOE Approved 04/08/2014 1 AP STATISTICS Critical Areas of Focus AP Statistics is a rigorous course that offers advanced students an opportunity
Medical Information Management & Mining. You Chen Jan,15, 2013 [email protected]
Medical Information Management & Mining You Chen Jan,15, 2013 [email protected] 1 Trees Building Materials Trees cannot be used to build a house directly. How can we transform trees to building materials?
Principles of Inventory and Materials Management
Principles of Inventory and Materials Management Second Edition Richard J. Tersine The University of Oklahoma m North Holland New York Amsterdam Oxford TECHNISCHE HOCHSCHULE DARMSTADT Fochbereich 1 Gesamthiblio-thek
Principles of Data Mining by Hand&Mannila&Smyth
Principles of Data Mining by Hand&Mannila&Smyth Slides for Textbook Ari Visa,, Institute of Signal Processing Tampere University of Technology October 4, 2010 Data Mining: Concepts and Techniques 1 Differences
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Pair-copula constructions of multiple dependence
Pair-copula constructions of multiple dependence Kjersti Aas The Norwegian Computing Center, Oslo, Norway Claudia Czado Technische Universität, München, Germany Arnoldo Frigessi University of Oslo and
Tracking Groups of Pedestrians in Video Sequences
Tracking Groups of Pedestrians in Video Sequences Jorge S. Marques Pedro M. Jorge Arnaldo J. Abrantes J. M. Lemos IST / ISR ISEL / IST ISEL INESC-ID / IST Lisbon, Portugal Lisbon, Portugal Lisbon, Portugal
Development Period 1 2 3 4 5 6 7 8 9 Observed Payments
Pricing and reserving in the general insurance industry Solutions developed in The SAS System John Hansen & Christian Larsen, Larsen & Partners Ltd 1. Introduction The two business solutions presented
Predictive Modeling and Big Data
Predictive Modeling and Presented by Eileen Burns, FSA, MAAA Milliman Agenda Current uses of predictive modeling in the life insurance industry Potential applications of 2 1 June 16, 2014 [Enter presentation
Opportunities to Overcome Key Challenges
The Electricity Transmission System Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia
STATISTICA Solutions for Financial Risk Management Management and Validated Compliance Solutions for the Banking Industry (Basel II)
STATISTICA Solutions for Financial Risk Management Management and Validated Compliance Solutions for the Banking Industry (Basel II) With the New Basel Capital Accord of 2001 (BASEL II) the banking industry
Statistics 3202 Introduction to Statistical Inference for Data Analytics 4-semester-hour course
Statistics 3202 Introduction to Statistical Inference for Data Analytics 4-semester-hour course Prerequisite: Stat 3201 (Introduction to Probability for Data Analytics) Exclusions: Class distribution:
Data Analysis with MATLAB. 2013 The MathWorks, Inc. 1
Data Analysis with MATLAB 2013 The MathWorks, Inc. 1 Agenda Introduction Data analysis with MATLAB and Excel Break Developing applications with MATLAB Solving larger problems Summary 2 Modeling the Solar
ANALYTICS IN BIG DATA ERA
ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut
APPLICATION OF DATA MINING TECHNIQUES FOR BUILDING SIMULATION PERFORMANCE PREDICTION ANALYSIS. email [email protected]
Eighth International IBPSA Conference Eindhoven, Netherlands August -4, 2003 APPLICATION OF DATA MINING TECHNIQUES FOR BUILDING SIMULATION PERFORMANCE PREDICTION Christoph Morbitzer, Paul Strachan 2 and
Study to Determine the Limit of Integrating Intermittent Renewable (wind and solar) Resources onto Pakistan's National Grid
Pakistan Study to Determine the Limit of Integrating Intermittent Renewable (wind and solar) Resources onto Pakistan's National Grid Final Report: Executive Summary - November 2015 for USAID Energy Policy
RAVEN: A GUI and an Artificial Intelligence Engine in a Dynamic PRA Framework
INL/CON-13-28360 PREPRINT RAVEN: A GUI and an Artificial Intelligence Engine in a Dynamic PRA Framework ANS Annual Meeting C. Rabiti D. Mandelli A. Alfonsi J. J. Cogliati R. Kinoshita D. Gaston R. Martineau
Performance Analysis of Data Mining Techniques for Improving the Accuracy of Wind Power Forecast Combination
Performance Analysis of Data Mining Techniques for Improving the Accuracy of Wind Power Forecast Combination Ceyda Er Koksoy 1, Mehmet Baris Ozkan 1, Dilek Küçük 1 Abdullah Bestil 1, Sena Sonmez 1, Serkan
Quantitative Methods for Finance
Quantitative Methods for Finance Module 1: The Time Value of Money 1 Learning how to interpret interest rates as required rates of return, discount rates, or opportunity costs. 2 Learning how to explain
PSS SINCAL - Overview -
PSS SINCAL - Overview - PTI Day Buenos Aires, October 19/20, 2010 Dr. Michael Schwan,, Siemens PTI (Germany) www.siemens.com/energy/power-technologies PSS SINCAL Overview Page 3 Network Calculation Software
A Case Study in Software Enhancements as Six Sigma Process Improvements: Simulating Productivity Savings
A Case Study in Software Enhancements as Six Sigma Process Improvements: Simulating Productivity Savings Dan Houston, Ph.D. Automation and Control Solutions Honeywell, Inc. [email protected] Abstract
What is Modeling and Simulation and Software Engineering?
What is Modeling and Simulation and Software Engineering? V. Sundararajan Scientific and Engineering Computing Group Centre for Development of Advanced Computing Pune 411 007 [email protected] Definitions
Distributed Flexible AC Transmission System (D FACTS) Jamie Weber. [email protected], 217 384 6330 ext. 13
Distributed Flexible AC Transmission System (D FACTS) Jamie Weber [email protected], 217 384 6330 ext. 13 Slide Preparation: Kate Rogers Davis [email protected], 217 384 6330, Ext 14 2001 South First
A Programme Implementation of Several Inventory Control Algorithms
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume, No Sofia 20 A Programme Implementation of Several Inventory Control Algorithms Vladimir Monov, Tasho Tashev Institute of Information
Better planning and forecasting with IBM Predictive Analytics
IBM Software Business Analytics SPSS Predictive Analytics Better planning and forecasting with IBM Predictive Analytics Using IBM Cognos TM1 with IBM SPSS Predictive Analytics to build better plans and
CS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning.
Lecture Machine Learning Milos Hauskrecht [email protected] 539 Sennott Square, x5 http://www.cs.pitt.edu/~milos/courses/cs75/ Administration Instructor: Milos Hauskrecht [email protected] 539 Sennott
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Azure Machine Learning, SQL Data Mining and R
Azure Machine Learning, SQL Data Mining and R Day-by-day Agenda Prerequisites No formal prerequisites. Basic knowledge of SQL Server Data Tools, Excel and any analytical experience helps. Best of all:
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Chapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
Machine Learning and Pattern Recognition Logistic Regression
Machine Learning and Pattern Recognition Logistic Regression Course Lecturer:Amos J Storkey Institute for Adaptive and Neural Computation School of Informatics University of Edinburgh Crichton Street,
PROGRAM DIRECTOR: Arthur O Connor Email Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements
Data Analytics (MS) PROGRAM DIRECTOR: Arthur O Connor CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: Arthur O Connor, [email protected] URL:
Maschinelles Lernen mit MATLAB
Maschinelles Lernen mit MATLAB Jérémy Huard Applikationsingenieur The MathWorks GmbH 2015 The MathWorks, Inc. 1 Machine Learning is Everywhere Image Recognition Speech Recognition Stock Prediction Medical
The Artificial Prediction Market
The Artificial Prediction Market Adrian Barbu Department of Statistics Florida State University Joint work with Nathan Lay, Siemens Corporate Research 1 Overview Main Contributions A mathematical theory
REAL-TIME POWER SYSTEM SIMULATOR TRAINING PROGRAM
USAID ENERGY POLICY PROGRAM POST-TRAINING EVALUATION REAL-TIME POWER SYSTEM SIMULATOR TRAINING PROGRAM OCTOBER 5-29, 2015 November 2015 This program is made possible by the support of the American people
How To Analyze The Time Varying And Asymmetric Dependence Of International Crude Oil Spot And Futures Price, Price, And Price Of Futures And Spot Price
Send Orders for Reprints to [email protected] The Open Petroleum Engineering Journal, 2015, 8, 463-467 463 Open Access Asymmetric Dependence Analysis of International Crude Oil Spot and Futures
Prescriptive Analytics. A business guide
Prescriptive Analytics A business guide May 2014 Contents 3 The Business Value of Prescriptive Analytics 4 What is Prescriptive Analytics? 6 Prescriptive Analytics Methods 7 Integration 8 Business Applications
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Cluster Analysis. Alison Merikangas Data Analysis Seminar 18 November 2009
Cluster Analysis Alison Merikangas Data Analysis Seminar 18 November 2009 Overview What is cluster analysis? Types of cluster Distance functions Clustering methods Agglomerative K-means Density-based Interpretation
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Overview This 4-day class is the first of the two data science courses taught by Rafal Lukawiecki. Some of the topics will be
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
Simple Linear Regression Inference
Simple Linear Regression Inference 1 Inference requirements The Normality assumption of the stochastic term e is needed for inference even if it is not a OLS requirement. Therefore we have: Interpretation
Predict Influencers in the Social Network
Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, [email protected] Department of Electrical Engineering, Stanford University Abstract Given two persons
Project description. Power Electronics for Reliable and Energy efficient Renewable Energy Systems
Project description Title: Power Electronics for Reliable and Energy efficient Renewable Energy Systems OBJECTIVES Principal objective Provide competence and decision basis for enabling reliable and energy
Chapter Managing Knowledge in the Digital Firm
Chapter Managing Knowledge in the Digital Firm Essay Questions: 1. What is knowledge management? Briefly outline the knowledge management chain. 2. Identify the three major types of knowledge management
Pontifical Catholic University of Parana Mechanical Engineering Graduate Program
Pontifical Catholic University of Parana Mechanical Engineering Graduate Program 3 rd PUCPR International PhD School on Energy Non-Deterministic Approaches for Assessment of Building Energy and Hygrothermal
Unsupervised Data Mining (Clustering)
Unsupervised Data Mining (Clustering) Javier Béjar KEMLG December 01 Javier Béjar (KEMLG) Unsupervised Data Mining (Clustering) December 01 1 / 51 Introduction Clustering in KDD One of the main tasks in
