You are on page 1of 5

Non Intrusive Load Monitoring in Chaotic Switched

Networks
Pedro Garciaa,b , Xavier Domingueza , David Chizaa and Jose Restrepoa
a
Facultad de Ingenierı́a en Ciencias Aplicadas,
Universidad Técnica del Norte, Ibarra, Ecuador.
b
Laboratorio de Sistemas Complejos, Facultad de Ingenierı́a, Universidad Central de Venezuela.
{pgarcia, exdominguez, jdchiza, jarestrepo}@utn.edu.ec

Abstract—This work presents a nonintrusive load disaggre- transient state of an appliance corresponds to the time period
gation scheme. The proposed methodology uses a kernel based between the device’s off and steady state operation and vice
nonlinear regression strategy to analyze a set of RLC loads with versa. This usually results from sudden changes in the circuit.
chaotic switching, considering the time series of the total power
consumption. The employed approach, to the authors’ knowledge, This can be an on or off transient, depending on the changes
represents a novelty in the treatment of the problem. The attained in the load condition. The transient pattern of most electrical
results suggest that the exposed methodology can be useful in the appliances is different between them, which makes them
design of efficient load disaggregation tactics. suitable for load identification [4]. Non-traditional signatures
such as temperature, light sensing and time of day, can also
Index Terms—Chaotic Switching, Kernel Methods, Non-
Intrusive Load Monitoring, Nonlinear Regression help to improve the identification.

I. I NTRODUCTION Since the NILM method employs only one set of sensors
at the utilitys entry point, it involves the use of identification
Modern smart grids and microgrids have the advantage
algorithms on the collected signatures before recognizing the
of increasing quality of service; while allowing performing
connected loads. Within the set of strategies to perform NILM,
energy efficiency strategies. To achieve this, the smart grid
there are several methods from the computational intelligence
or microgrid controller needs detailed information on the
field, such as: Back Propagation Artificial Neural Network
consumption behavior of the different loads within the
(ANN) with Artificial Immune Algorithm [5], Multilayer
system. There are basically two approaches to do such load
Feed Forward ANN [6], ANN with genetic programming [7],
monitoring, the first is using intrusive load monitoring (ILM)
supervised self-organizing map (SSOM)/Bayesian identifier
methods and the second is using nonintrusive load monitoring
[8], and classification with Neural Network Classifier and
(NILM) methods. The intrusive approach uses individual
Bayes Classifier [9].
measurements at every load of interest. Therefore, the need
of many sets of sensors in ILM systems makes it expensive,
In any of the above mentioned strategies, the activity
complex in installation and more difficult to maintain. Also,
recognition during appliance monitoring can have different
the need of smart appliances in ILM systems is common for
levels of granularity depending on the application [10] such
the load monitoring.
as the recognition of daily living pattern activities, occupancy
detection and user appliance correlation. This information
On the other hand, in the NILM approach, there is no
is useful as it permits the inference of underlying patterns
need for intrusion into the individual or group of appliances
which are useful when designing a high-performance load
when monitoring their power consumption. Rather, the load
monitoring system. Regardless of the employed methodology,
identification relies on the analysis of voltage and current
the common goal of NILM systems consists in providing
waveforms measured at the electrical services entry point, to
fine-grained energy decomposition per appliances in order to
infer the nature, operating conditions and power consumption,
procure the optimization of the energy consumption while
of each load [1].
preserving the comfort of the users.
There are three categories for classifying the load signatures
This work proposes a non-intrusive load disaggregation
under NILM [2]: steady state signatures, transient signatures
scheme, by using a nonlinear modeling strategy based on
and non-traditional signatures. Steady state signatures
the kernel-Adaline algorithm. To achieve this goal, the aim
correspond to load features extracted when the appliance is
of this work is twofold. First, the method uses a simple
on its steady state operation, which include steady state real
model of a power network, simulated as RLC branches that
power, reactive power, rms current, rms voltage, power factor
are connected and disconnected through chaotic witching,
and harmonics, see for instance [3]. On the other hand, the
that is, with a disordered but deterministic dynamic. Second,
978-1-5386-6657-9/18/$31.00 2018
c IEEE the presented method employs an approach to transform the
NILM problem into a non-linear regression problem, whose disordered. Here, the implementation of S(t) begins by con-
solution is approximate using the kernel-Adaline algorithm verting the continuous states from the chaotic Logistic map
[11]. Although the first objective is straightforward to fulfill, xn+1 = 4xn (1 − xn ), into a chaotic binary signal as follows:
the idea developed in the second, as far as we know, is 
1 xn ≤ 1/2
unpublished. Even though the number of loads used in the rn =
K xn > 1/2
simulation is small, the proposed methodology can be scaled
to bigger systems.
The continuous switching functions Sj (t) are then constructed,
This paper is organized as follows: Section I provides a defining the state of each switch as Sj (t) = rn , with n = b τtj c,
brief introduction to the research topic. Section II explains the i. e. the entire part of τtj , where τj are a set of parameters
employed mathematical modeling for a network of electrical that dilates the binary signals Sn and provide flexibility to the
loads. In Section III, NILM is approached as a nonlinear model, allowing to change the frequency of the switching but
regression problem. Simulation results are exhibited in Section keeping its disordered feature. Here, K = 105 is a constant
IV. Finally, conclusions are addressed. large enough to simulate the switch in OFF condition or an
appliance in standby.
II. A SIMPLE MODEL FOR A NETWORK OF ELECTRICAL
LOADS In this way the time series xn with discrete time and
In [12], the MIT group suggested the use of four appliance continuous states is transformed into a function of binary states
models to develop the identification algorithms: on/off, finite with chaotic evolution and continuous time. The resulting
state machines, continuously variable and permanent state system of differential equations is numerically integrated, to
devices. As a first approach this work considers only on/off later estimate the total current’s rms value, as a function of
linear appliances. Nevertheless, with a few modifications, the time. The results are shown in Fig. 2.
exposed tactic could be extended to other type of loads.
A simple switched RLC circuit, shown in Fig. 1, serves to 1.0

simulate an electric network made of on/off loads.


0.8

A
in , S n

0.6
R
Line resistance
S1(t) S2(t) SM(t)
0.4
Supply
voltage V RLC RLC RLC
Load M 0.2
Load 1 Load 2

0.0
0 500 1000 1500 2000

Fig. 1. Electric network. Every load is represented by a RLC circuit, whose Fig. 2. Total current and switching dynamics. The black and gray lines
values of R, L and C can be set in order to simulate a particular appliance. represents, the rms value of the total current and the switching states,
respectively.

This network in turn can be represented as a system of As indicated by [13] and as observed in practice, the
coupled differential equations: complexity of the signal q(t) increases with: the number of
devices, the switching frequency of the devices, the number of
dq d2 q1 dq1 q1 states of the devices and the number of devices with similar
R + L1 2 + R1 S1 (t) + =  cos(wt), power consumption.
dt dt dt C1
dq d2 q2 dq2 q2 III. NILM AS A NONLINEAR REGRESSION PROBLEM
R + L2 2 + R2 S2 (t) + =  cos(wt),
dt dt dt C2
.. In this section we attempt to state the problem of non
. intrusive load monitoring from the point of view of dynamical
dq d2 qM dqM qM systems theory. In this approach, the observation of the system
R + LM + RM SM (t) + =  cos(wt),
dt dt2 dt CM is frequently performed by monitoring the evolution of some
state variables, namely x(t), taken at uniformly spaced times.
where, q = q1 + q2 + q3 + · · · + qM . The set of all allowed states x(t) is called state space A.

The switching Sj (t), with j = 1, . . . , M , follows a chaotic Thus, if the purpose is to predict the future evolution of
dynamic, in the sense that the dynamic is deterministic but some dynamical system, xn+1 = f (xn ) with x ∈ Rm , then
the analysis using embedding methods is a popular alternative In our case, we use the Gaussian kernel
[14], [15]. In these approaches, the data is organized in delay
ku−vk2
vectors xn = (xn , xn−1 , · · · , xn−d+1 ). Taken’s theorem [16] − 2p2
K(u, v) = e ,
shows that under general conditions, if d = 2m + 1, there is
a difeomorphism Φ : A → Rd such that the dynamical rule to perform the mapping and its inverse, being p the width of
governing the evolution of the reconstructed states xn is given a Gaussian function centered in every sample. The solution
by xn+1 = Φ ◦ f ◦ Φ−1 (xn ), this is, to the linear problem that now appears, i.e. the estimation of
the w parameters, can be inferred using the kernel-Adaline
xn+1 = F (xn ). algorithm [11]:

An approximation of F can be constructed from the obser- Choose wk = a random number in [0, 1] ∀ k ∈ [0, N ] and η.
vations xn and used to forecast the evolution of the system. WHILE stopping criterion not met
In our case, we are dealing with a succession {ij }, j = FOR j = 1 to N
1, 2, . . . , N , of N values of the total current measured at choose input pattern ij
uniform intervals and {Sjk }, with j = 1, 2, . . . , N and k = calculate output of the kernel Adaline F (ω, ij ) =
PN
1, 2, . . . , M , the time series of the states of the k-th switch in k=1 wk K(ij , ik ) + w0
the time j. update corresponding multipliers and bias by the rule:
If the state of the set of the switches is re-coded as a real wk ← wk + η(sj − F (ω, ij ))
number, we attain: END FOR
M
END WHILE
imax X k−1 k
sj = 2 Sj , (1)
M This algorithm is a generalization of the linear Adaline[18]
k=0
that allows to approximate non-linear functional relationships,
where imax is the maximum value of the total current. In but using strategies for the solution of linear problems. This
this regard, the problem of non intrusive load monitoring can algorithm minimizes the least mean squared cost function and
be transformed in the determination of an approach for the additionally, it has the advantage of being numerically robust
dynamical rule F , in the form: and conceptually simple.

s̃j = F (ω, ij ), IV. R ESULTS


In order to expose the performance of the designed strategy,
where the in advance vectors ij are constructed as a network of four RLC loads with a chaotic switching is
ij = (ij , ij+1 , · · · , ij+d−1 ), d is a parameter related to simulated. In this case, a total of 2 × 103 data have been
the influence of the present state of the switch sj in the future generated. The data, is divided into two segments: one of 1350
of ij and ω is a vector of parameters. This function provides points which will be used to estimate the parameters in (2) and
a relation between the present state of the switches and the another 650 points intended for the validation of the approach.
future values of the total current. Naturally, an approximation
of this function allows to estimate the activity of individual The presentation of the attained results begins by exposing,
loads given the actual value of the total current. in Fig. 3, the convergence of the parameters of the kernel-
Adaline ω0 and one ωr , with r randomly chosen considering
This strategy differs from the usual one employed in the the data from the training or modeling segment. In this figure,
theory of dynamical systems in the construction of the state the inset shows the evolution of the mean error of the switching
vectors. In this case, instead of constructing vectors with state prediction, defined as:
the current state and their predecessors, the state vectors,
which we have called in advance vectors, are constructed N
1 X (n)
with the current state and future values of the variable. This E(n) = |si − s̃i |,
N i=1
is a consequence of the causal relationship between sn and in .
(n)
where, s̃i is the prediction of the i-th switching state, in
An efficient alternative to approximate F , is the kernel the n-th iteration of the WHILE loop of the kernel-Adaline
regression method. In this approach the data is mapped to algorithm.
a high dimensional space by ϕ(.) and F is fitted by a linear
combination of the ϕ(ij ) [17]. Then, by means of reproductive Additionally, Fig. 4 shows the strategy’s performance. It il-
kernels of Hilbert spaces, K(·, ·), it is possible to perform the lustrates the quality of the predictions when using the proposed
mapping and its inverse implicitly. So that: model in the case of the data corresponding to the training
N
segment. Here, the continuous line shows the evolution of the
F (ω, ij ) =
X
wk K(ij , ik ) + w0 . (2) switching represented as in (1), and the dashed line shows
k=1
the modeling using (2) when d = 8. It is easy to note that,
0.5
1.0
0.7
0.6
0.4 0.5
0.8

E(n)
0.4
0.3
0.2
0.3 0.1

sn ,s n
0.6

˜
0.0
ωr , ω0

0 100 200 300 400 500

0.2 n
0.4

0.1
0.2

0.0
0.0
0 100 200 300 400 500 600
0 100 200 300 400 500

n n
Fig. 3. Adaline training showing the evolution of the parameter ω0 and ωr , Fig. 5. The continuous and dashed lines represents, the switching dynamic
with r randomly chosen. The inset shows the evolution of the modeling error. and it approximation, respectively, in the case of the validation segment.

1.0 Due to the lack of solid benchmarking tools to compare


the performance of different disaggregation strategies, the
0.8 comparison of these techniques is out of the scope of this
work.
0.6 Finally, it is worth mentioning that the NILM problem is
sn ,s n
˜

highly interesting, not only for its practical applications in


0.4 energy consumption efficiency, but also from the point of
view of dynamical systems theory. In this field, it represents
0.2 a complex problem of coupled linear systems of differential
equations, but not autonomous due to the involved complex
0.0
switching functions.
0 200 400 600 800 1000 1200

n ACKNOWLEDGMENT
The authors would like to thank Universidad Técnica del
Fig. 4. The continuous and dashed line represents, the switching dynamic
and it approximation, respectively, in the case of the training segment. Norte (UTN) in Ibarra-Ecuador for the support to this work
under FICA research project: ”Design and implementation of
a NILM strategy based on artificial intelligence techniques”
this dimension is dependent on the sampling rate which is the (Diseño e implementación de un esquema de desagregación
integration step in this case. Nevertheless, the study of this de cargas no intrusivo basado en estrategias de inteligencia
relation is beyond the scope of this work. artificial).
Lastly, Fig. 5 exhibits the outcome for the case of the data R EFERENCES
corresponding to the validation segment.
[1] M. Zeifman and K. Roth, “Nonintrusive appliance load monitoring:
V. C ONCLUSIONS Review and outlook,” IEEE Transactions on Consumer Electronics,
vol. 57, no. 1, pp. 76–84, February 2011.
A NILM scheme, based on nonlinear regression strategy and [2] I. Abubakar, S. Khalid, M. Mustafa, H. Shareef, and
implemented by means of the kernel-Adaline algorithm, has M. Mustapha, “Application of load monitoring in appliances
been presented. This representation of NILM, as a non-linear energy management a review,” Renewable and Sustainable Energy
Reviews, vol. 67, pp. 235 – 245, 2017. [Online]. Available:
regression problem using kernel regression strategies, as far as http://www.sciencedirect.com/science/article/pii/S136403211630555X
we know, represents a novelty in the treatment of the problem. [3] R. Banerjee, “Development of pc based transient current analysis system
The numerical experiments suggests that although the fore- using microcontroller and hall effect sensor,” Int. J. Eng. Res. Gen. Sci,
vol. 3, pp. 321–326, 2015.
cast accuracy is appropriate, the quality of the disaggregation [4] C. Duarte, P. Delmar, K. W. Goossen, K. Barner, and E. Gomez-Luna,
using this method depends on the τi parameter. This fact rep- “Non-intrusive load monitoring based on switching voltage transients
resents an interesting theoretical and computational problem and wavelet transforms,” in 2012 Future of Instrumentation International
Workshop (FIIW) Proceedings, Oct 2012, pp. 1–4.
which guides future research. [5] M.-S. Tsai and Y.-H. Lin, “Modern development of an adaptive non-
Considering the characteristics of the proposed representa- intrusive appliance load monitoring system in electricity energy conser-
tion of the problem, the extension to the case of networks vation,” Applied Energy, vol. 96, pp. 55 – 73, 2012, smart Grids.
[6] D. L. Racines and J. E. Candelo, “Non intrusive load identification
with loads of another type or with more elements could be with power and impedance obtained from smart meters,” Int. J. Eng.
addressed in a simple manner. Technology, vol. 6, no. 4, pp. 1867–1876, 2014.
[7] H.-H. Chang, “Load identification of non-intrusive load-monitoring the IEEE, vol. 80, no. 12, pp. 1870–1891, Dec 1992.
system in smart home,” WSEAS Transactions on Systems, vol. 9, no. 5, [13] C. Nalmpantis and D. Vrakas, “Machine learning approaches for non-
pp. 498–510, 2010. intrusive load monitoring: from qualitative to quantitative comparation,”
[8] L. Du, J. A. Restrepo, Y. Yang, R. G. Harley, and T. G. Habetler, “Nonin- 01 2018.
trusive, self-organizing, and probabilistic classification and identification [14] J. D. Farmer and J. J. Sidorowich, “Predicting chaotic time series,”
of plugged-in electric loads,” IEEE Transactions on Smart Grid, vol. 4, Phys. Rev. Lett., vol. 59, pp. 845–848, Aug 1987. [Online]. Available:
no. 3, pp. 1371–1380, Sept 2013. https://link.aps.org/doi/10.1103/PhysRevLett.59.845
[9] S. Semwal, G. Shah, and R. S. Prasad, “Identification residential appli- [15] P. Garcı́a, J. Jiménez, A. Marcano, and F. Moleiro, “Local optimal
ance using nialm,” in 2014 IEEE International Conference on Power metrics and nonlinear modeling of chaotic time series,” Phys.
Electronics, Drives and Energy Systems (PEDES), Dec 2014, pp. 1–6. Rev. Lett., vol. 76, pp. 1449–1452, Feb 1996. [Online]. Available:
[10] A. Ridi, C. Gisler, and J. Hennebert, “User interaction event detection https://link.aps.org/doi/10.1103/PhysRevLett.76.1449
in the context of appliance monitoring,” in 2015 IEEE International [16] F. Takens, “Detecting strange attractors in turbulence,” in Dynamical
Conference on Pervasive Computing and Communication Workshops systems and turbulence, Warwick 1980. Springer, 1981, pp. 366–381.
(PerCom Workshops), March 2015, pp. 323–328. [17] P. Garcı́a and A. Merlitti, “Haar basis and nonlinear modeling of
[11] T.-T. Frießand R. Harrison, “A kernel-based adaline for complex systems,” The European Physical Journal Special Topics, vol.
function approximation,” Intelligent Data Analysis, vol. 3, 143, no. 1, pp. 261–264, 2007.
no. 4, pp. 307 – 313, 1999. [Online]. Available: [18] B. Widrow and M. E. Hoff, “Adaptive switching circuits,” in 1960 IRE
http://www.sciencedirect.com/science/article/pii/S1088467X99000256 WESCON Convention Record, Part 4, Institute of Radio Engineers. New
[12] G. W. Hart, “Nonintrusive appliance load monitoring,” Proceedings of York: Institute of Radio Engineers, 8 1960, pp. 96–104.

You might also like