Skip to main content

Bad Data Identification Based on Optimized Local Outlier Detection Algorithm

  • Conference paper
  • First Online:
Geo-Spatial Knowledge and Intelligence (GRMSE 2016)

Abstract

This paper propose an optimized local outlier factor algorithm based on hierarchical clustering over grid bad measurement information, which affect the running safety of power grids phenomenon seriously. The method adopt statistical theory to evaluate the equipment running data and state information. Meanwhile, use clustering algorithm to analyze these data, to achieve the purpose of data reduction. While the relative entropy for data confirm the weight and thus enhance the accuracy of the algorithm. Experimental results show that the algorithm can quickly identify the bad power grid data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yu, E.: State Estimation of Power System. Water Conservancy and Electric Power Press, Beijing (1985)

    Google Scholar 

  2. Abur, A., Gomez, A.: Power System State Estimation: Theory and Implementation. Marcel Dekker, New York (2004)

    Book  Google Scholar 

  3. Ali, A., Kim, H.: Identifying the unknown circuit breaker statuses in power networks. IEEE Trans. Power Syst. 10(4), 2029–2037 (1995)

    Article  Google Scholar 

  4. Agyemang, M., Ezeife, CI.: LSC-Mine: algorithm for mining local outliers. In: Proceedings of the 15th Information Resource Management Association (IRMA) International Conference, New Orleans, vol. 1, pp. 5–8 (2004)

    Google Scholar 

  5. Wang, L.: Integrated Research Clusters Based on Hierarchical Clustering Method. Hebei University, Baoding (2010)

    Google Scholar 

  6. Xingzhong, Y., Liu, W.: An improved cohesion hierarchical clustering algorithm. Jishou Univ. (Nat. Sci.) 4(32), 11–14 (2011)

    Google Scholar 

  7. Jiang, F., Sui, Y., Cao, C.: An information entropy-based approach to outlier detection in rough sets. Expert Syst. Appl. 37, 6338–6344 (2010)

    Article  Google Scholar 

  8. Zhang, J., Sun, Z., Song, Y., Ni, W., Yan, Y.: Outlier mining of high dimensional massive data based on information theory. 38(7), 148–151 (2011)

    Google Scholar 

  9. Li, B.: Bad remote signal identification based on expert system

    Google Scholar 

  10. Li, C., Sun, Z.: Grid OF: Efficient outlier detection algorithms for large data sets. Comput. Res. Dev. 40(11), 1586–1592 (2004)

    Google Scholar 

  11. He, G., Chang, N., Dong, S.: Identification based on set theory grid state estimation: (A) modeling. Autom. Electr. Power Syst. 40(5), 25–31 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingxian Qi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Qi, J., Cao, Y., Shi, J. (2017). Bad Data Identification Based on Optimized Local Outlier Detection Algorithm. In: Yuan, H., Geng, J., Bian, F. (eds) Geo-Spatial Knowledge and Intelligence. GRMSE 2016. Communications in Computer and Information Science, vol 698. Springer, Singapore. https://doi.org/10.1007/978-981-10-3966-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3966-9_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3965-2

  • Online ISBN: 978-981-10-3966-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics