The influence of the virtual guard ring width(GRW)on the performance of the p-well/deep n-well single-photon avalanche diode(SPAD)in a 180 nm standard CMOS process was investigated.TCAD simulation demonstrates that th...The influence of the virtual guard ring width(GRW)on the performance of the p-well/deep n-well single-photon avalanche diode(SPAD)in a 180 nm standard CMOS process was investigated.TCAD simulation demonstrates that the electric field strength and current density in the guard ring are obviously enhanced when GRW is decreased to 1μm.It is experimentally found that,compared with an SPAD with GRW=2μm,the dark count rate(DCR)and afterpulsing probability(AP)of the SPAD with GRW=1μm is significantly increased by 2.7 times and twofold,respectively,meanwhile,its photon detection probability(PDP)is saturated and hard to be promoted at over 2 V excess bias voltage.Although the fill factor(FF)can be enlarged by reducing GRW,the dark noise of devices is negatively affected due to the enhanced trap-assisted tunneling(TAT)effect in the 1μm guard ring region.By comparison,the SPAD with GRW=2μm can achieve a better trade-off between the FF and noise performance.Our study provides a design guideline for guard rings to realize a low-noise SPAD for large-array applications.展开更多
Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new ...Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new energy theft detection(ETD)techniques have been proposed by utilising different data mining(DM)techniques,state&network(S&N)based techniques,and game theory(GT)techniques.Here,a detailed survey is presented where many state-of-the-art ETD techniques are studied and analysed for their strengths and limitations.Three levels of taxonomy are presented to classify state-of-the-art ETD techniques.Different types and ways of energy theft and their consequences are studied and summarised and different parameters to benchmark the performance of proposed techniques are extracted from literature.The challenges of different ETD techniques and their mitigation are suggested for future work.It is observed that the literature on ETD lacks knowledge management techniques that can be more effective,not only for ETD but also for theft tracking.This can help in the prevention of energy theft,in the future,as well as for ETD.展开更多
With the development of advanced metering infrastructure(AMI),large amounts of electricity consumption data can be collected for electricity theft detection.However,the imbalance of electricity consumption data is vio...With the development of advanced metering infrastructure(AMI),large amounts of electricity consumption data can be collected for electricity theft detection.However,the imbalance of electricity consumption data is violent,which makes the training of detection model challenging.In this case,this paper proposes an electricity theft detection method based on ensemble learning and prototype learning,which has great performance on imbalanced dataset and abnormal data with different abnormal level.In this paper,convolutional neural network(CNN)and long short-term memory(LSTM)are employed to obtain abstract feature from electricity consumption data.After calculating the means of the abstract feature,the prototype per class is obtained,which is used to predict the labels of unknown samples.In the meanwhile,through training the network by different balanced subsets of training set,the prototype is representative.Compared with some mainstream methods including CNN,random forest(RF)and so on,the proposed method has been proved to effectively deal with the electricity theft detection when abnormal data only account for 2.5%and 1.25%of normal data.The results show that the proposed method outperforms other state-of-the-art methods.展开更多
With the application of the advanced measurement infrastructure in power grids,data driven electricity theft detection methods become the primary stream for pinpointing electricity thieves.However,owing to anomaly sub...With the application of the advanced measurement infrastructure in power grids,data driven electricity theft detection methods become the primary stream for pinpointing electricity thieves.However,owing to anomaly submergence,which shows that the usage patterns of electricity thieves may not always deviate from those of normal users,the performance of the existing usage-pattern-based method could be affected.In addition,the detection results of some unsupervised learning algorithm models are abnormal degrees rather than“0-1”to ascertain whether electricity theft has occurred.The detection with fixed threshold value may lead to deviation and would not be sufficiently flexible to handle the detection for different scenes and users.To address these issues,this study proposes a new electricity theft detection method based on load shape dictionary of users.A corresponding strategy for tunable threshold is proposed to optimize the detection effect of electricity theft,and the efficacy and applicability of the proposed adaptive electricity theft detection method were verified from numerical experiments.展开更多
Avalanche photon diode and avalanche diode array, working in Geiger mode, have single photon detection capability. The structure of guard ring is the key factor to avoid the premature edge breakdown of the avalanche d...Avalanche photon diode and avalanche diode array, working in Geiger mode, have single photon detection capability. The structure of guard ring is the key factor to avoid the premature edge breakdown of the avalanche diode and increase the maximum bias voltage. A new structure of the guard ring is proposed in this letter, in which the floating guard ring is put outside the p-well guard ring. Simulation results indicate that the maximum bias voltage of the proposed guard ring is higher than that of the state-of-the-art methods.展开更多
窃电行为不仅会扰乱正常用电秩序,更会影响电网的供电质量和安全运行。针对窃电检测工作中所面临的用户正常用电行为与窃电行为多样化问题,该文提出一种基于多阶段递推数据分析的低压台区窃电检测方法。该方法第1阶段对嫌疑窃电台区进...窃电行为不仅会扰乱正常用电秩序,更会影响电网的供电质量和安全运行。针对窃电检测工作中所面临的用户正常用电行为与窃电行为多样化问题,该文提出一种基于多阶段递推数据分析的低压台区窃电检测方法。该方法第1阶段对嫌疑窃电台区进行判定,针对当日线损不是明显激增的情况,提出基于台区线损综合波动率、总分表电流差异率、线损和电流曲线的突变点时间重合度的三步分析法,为窃电嫌疑用户的检测提供了良好的条件;第2阶段提出基于最优特征集的时间序列相似性度量方法,基于欧氏距离度量曲线间数值特征,同时基于动态时间规整(dynamic time warping,DTW)算法度量曲线间的形态特征,实现窃电嫌疑用户的初步筛选;第3阶段提出基于核函数和惩罚参数优化的支持向量机二次深度检测模型(optimize kernel-function and penalty-parameters support vector machine,OKPSVM),其中惩罚参数采用综合改进的粒子群(improved particle swarm optimization,IPSO)算法。通过算例仿真和实际工程应用,整体优化后的支持向量机模型(IPSO-OKPSVM)能够提高深度窃电检测的精准性和适用性。展开更多
基金supported by the Jiangsu Agricultural Science and Technology Innovation Fund of China(No.CX(21)3062)the National Natural Science Foundation of China(No.62171233).
文摘The influence of the virtual guard ring width(GRW)on the performance of the p-well/deep n-well single-photon avalanche diode(SPAD)in a 180 nm standard CMOS process was investigated.TCAD simulation demonstrates that the electric field strength and current density in the guard ring are obviously enhanced when GRW is decreased to 1μm.It is experimentally found that,compared with an SPAD with GRW=2μm,the dark count rate(DCR)and afterpulsing probability(AP)of the SPAD with GRW=1μm is significantly increased by 2.7 times and twofold,respectively,meanwhile,its photon detection probability(PDP)is saturated and hard to be promoted at over 2 V excess bias voltage.Although the fill factor(FF)can be enlarged by reducing GRW,the dark noise of devices is negatively affected due to the enhanced trap-assisted tunneling(TAT)effect in the 1μm guard ring region.By comparison,the SPAD with GRW=2μm can achieve a better trade-off between the FF and noise performance.Our study provides a design guideline for guard rings to realize a low-noise SPAD for large-array applications.
基金supported by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Sk?odowska-Curie Grant Agreement(801522)Science Foundation Ireland and co-funded by the European Regional Development Fund through the ADAPT Centre for Digital Content Technology(13/RC/2106_P2)。
文摘Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new energy theft detection(ETD)techniques have been proposed by utilising different data mining(DM)techniques,state&network(S&N)based techniques,and game theory(GT)techniques.Here,a detailed survey is presented where many state-of-the-art ETD techniques are studied and analysed for their strengths and limitations.Three levels of taxonomy are presented to classify state-of-the-art ETD techniques.Different types and ways of energy theft and their consequences are studied and summarised and different parameters to benchmark the performance of proposed techniques are extracted from literature.The challenges of different ETD techniques and their mitigation are suggested for future work.It is observed that the literature on ETD lacks knowledge management techniques that can be more effective,not only for ETD but also for theft tracking.This can help in the prevention of energy theft,in the future,as well as for ETD.
基金supported by National Natural Science Foundation of China(No.52277083).
文摘With the development of advanced metering infrastructure(AMI),large amounts of electricity consumption data can be collected for electricity theft detection.However,the imbalance of electricity consumption data is violent,which makes the training of detection model challenging.In this case,this paper proposes an electricity theft detection method based on ensemble learning and prototype learning,which has great performance on imbalanced dataset and abnormal data with different abnormal level.In this paper,convolutional neural network(CNN)and long short-term memory(LSTM)are employed to obtain abstract feature from electricity consumption data.After calculating the means of the abstract feature,the prototype per class is obtained,which is used to predict the labels of unknown samples.In the meanwhile,through training the network by different balanced subsets of training set,the prototype is representative.Compared with some mainstream methods including CNN,random forest(RF)and so on,the proposed method has been proved to effectively deal with the electricity theft detection when abnormal data only account for 2.5%and 1.25%of normal data.The results show that the proposed method outperforms other state-of-the-art methods.
基金supported by the National Natural Science Foundation of China(U1766210).
文摘With the application of the advanced measurement infrastructure in power grids,data driven electricity theft detection methods become the primary stream for pinpointing electricity thieves.However,owing to anomaly submergence,which shows that the usage patterns of electricity thieves may not always deviate from those of normal users,the performance of the existing usage-pattern-based method could be affected.In addition,the detection results of some unsupervised learning algorithm models are abnormal degrees rather than“0-1”to ascertain whether electricity theft has occurred.The detection with fixed threshold value may lead to deviation and would not be sufficiently flexible to handle the detection for different scenes and users.To address these issues,this study proposes a new electricity theft detection method based on load shape dictionary of users.A corresponding strategy for tunable threshold is proposed to optimize the detection effect of electricity theft,and the efficacy and applicability of the proposed adaptive electricity theft detection method were verified from numerical experiments.
文摘Avalanche photon diode and avalanche diode array, working in Geiger mode, have single photon detection capability. The structure of guard ring is the key factor to avoid the premature edge breakdown of the avalanche diode and increase the maximum bias voltage. A new structure of the guard ring is proposed in this letter, in which the floating guard ring is put outside the p-well guard ring. Simulation results indicate that the maximum bias voltage of the proposed guard ring is higher than that of the state-of-the-art methods.
文摘窃电行为不仅会扰乱正常用电秩序,更会影响电网的供电质量和安全运行。针对窃电检测工作中所面临的用户正常用电行为与窃电行为多样化问题,该文提出一种基于多阶段递推数据分析的低压台区窃电检测方法。该方法第1阶段对嫌疑窃电台区进行判定,针对当日线损不是明显激增的情况,提出基于台区线损综合波动率、总分表电流差异率、线损和电流曲线的突变点时间重合度的三步分析法,为窃电嫌疑用户的检测提供了良好的条件;第2阶段提出基于最优特征集的时间序列相似性度量方法,基于欧氏距离度量曲线间数值特征,同时基于动态时间规整(dynamic time warping,DTW)算法度量曲线间的形态特征,实现窃电嫌疑用户的初步筛选;第3阶段提出基于核函数和惩罚参数优化的支持向量机二次深度检测模型(optimize kernel-function and penalty-parameters support vector machine,OKPSVM),其中惩罚参数采用综合改进的粒子群(improved particle swarm optimization,IPSO)算法。通过算例仿真和实际工程应用,整体优化后的支持向量机模型(IPSO-OKPSVM)能够提高深度窃电检测的精准性和适用性。