
Memory disorders and dementia are a central factor in the decline of functioning and daily activities in older individuals. The workload related to standardized speech tests in clinical settings has led to a growing emphasis on developing automatic machine learning techniques for analyzing naturally spoken speech. This study presented a bag of acoustic words approach for distinguishing dementia patients from control individuals based on audio speech recordings. In this approach, each individual's speech was segmented into voiced periods, and these segments were characterized by acoustic features using the open-source openSMILE library. Word histogram representations were formed from the characterized speech segments of each speaker, which were used for classifying subjects. The formation of word histograms involved a clustering phase where feature vectors were quantized. It is well-known that partitional clustering involves instability in clustering results due to the selection of starting points, which can cause variability in classification outcomes. This study aimed to address instability by utilizing robust K-spatial-medians clustering, efficient K-means++ clustering initialization, and selecting the smallest clustering error from repeated clusterings. Additionally, the study employed feature selection based on the Wilcoxon signed-rank test to achieve computational efficiency in the methods. The results showed that it is possible to achieve a consistent 75% classification accuracy using only twenty-five features, both with the external ADReSS 2020 test data and through leave-one-subject-out cross-validation of the entire dataset. The results rank at the top compared to international research, where the same dataset and only acoustic features have been used to diagnose patients.
Citation: Marko Niemelä, Mikaela von Bonsdorff, Sami Äyrämö, Tommi Kärkkäinen. Classification of dementia from spoken speech using feature selection and the bag of acoustic words model[J]. Applied Computing and Intelligence, 2024, 4(1): 45-65. doi: 10.3934/aci.2024004
[1] | Zongying Feng, Guoqiang Tan . Dynamic event-triggered H∞ control for neural networks with sensor saturations and stochastic deception attacks. Electronic Research Archive, 2025, 33(3): 1267-1284. doi: 10.3934/era.2025056 |
[2] | Yawei Liu, Guangyin Cui, Chen Gao . Event-triggered synchronization control for neural networks against DoS attacks. Electronic Research Archive, 2025, 33(1): 121-141. doi: 10.3934/era.2025007 |
[3] | Xingyue Liu, Kaibo Shi, Yiqian Tang, Lin Tang, Youhua Wei, Yingjun Han . A novel adaptive event-triggered reliable H∞ control approach for networked control systems with actuator faults. Electronic Research Archive, 2023, 31(4): 1840-1862. doi: 10.3934/era.2023095 |
[4] | Chao Ma, Hang Gao, Wei Wu . Adaptive learning nonsynchronous control of nonlinear hidden Markov jump systems with limited mode information. Electronic Research Archive, 2023, 31(11): 6746-6762. doi: 10.3934/era.2023340 |
[5] | Chengbo Yi, Jiayi Cai, Rui Guo . Synchronization of a class of nonlinear multiple neural networks with delays via a dynamic event-triggered impulsive control strategy. Electronic Research Archive, 2024, 32(7): 4581-4603. doi: 10.3934/era.2024208 |
[6] | Hangyu Hu, Fan Wu, Xiaowei Xie, Qiang Wei, Xuemeng Zhai, Guangmin Hu . Critical node identification in network cascading failure based on load percolation. Electronic Research Archive, 2023, 31(3): 1524-1542. doi: 10.3934/era.2023077 |
[7] | Liping Fan, Pengju Yang . Load forecasting of microgrid based on an adaptive cuckoo search optimization improved neural network. Electronic Research Archive, 2024, 32(11): 6364-6378. doi: 10.3934/era.2024296 |
[8] | Ramalingam Sakthivel, Palanisamy Selvaraj, Oh-Min Kwon, Seong-Gon Choi, Rathinasamy Sakthivel . Robust memory control design for semi-Markovian jump systems with cyber attacks. Electronic Research Archive, 2023, 31(12): 7496-7510. doi: 10.3934/era.2023378 |
[9] | Nacera Mazouz, Ahmed Bengermikh, Abdelhamid Midoun . Dynamic design and optimization of a power system DC/DC converter using peak current mode control. Electronic Research Archive, 2025, 33(4): 1968-1997. doi: 10.3934/era.2025088 |
[10] | Yejin Yang, Miao Ye, Qiuxiang Jiang, Peng Wen . A novel node selection method for wireless distributed edge storage based on SDN and a maldistributed decision model. Electronic Research Archive, 2024, 32(2): 1160-1190. doi: 10.3934/era.2024056 |
Memory disorders and dementia are a central factor in the decline of functioning and daily activities in older individuals. The workload related to standardized speech tests in clinical settings has led to a growing emphasis on developing automatic machine learning techniques for analyzing naturally spoken speech. This study presented a bag of acoustic words approach for distinguishing dementia patients from control individuals based on audio speech recordings. In this approach, each individual's speech was segmented into voiced periods, and these segments were characterized by acoustic features using the open-source openSMILE library. Word histogram representations were formed from the characterized speech segments of each speaker, which were used for classifying subjects. The formation of word histograms involved a clustering phase where feature vectors were quantized. It is well-known that partitional clustering involves instability in clustering results due to the selection of starting points, which can cause variability in classification outcomes. This study aimed to address instability by utilizing robust K-spatial-medians clustering, efficient K-means++ clustering initialization, and selecting the smallest clustering error from repeated clusterings. Additionally, the study employed feature selection based on the Wilcoxon signed-rank test to achieve computational efficiency in the methods. The results showed that it is possible to achieve a consistent 75% classification accuracy using only twenty-five features, both with the external ADReSS 2020 test data and through leave-one-subject-out cross-validation of the entire dataset. The results rank at the top compared to international research, where the same dataset and only acoustic features have been used to diagnose patients.
Load frequency control (LFC) is significant for the safe and stable work of the power grids [1,2,3]. With the continuous breakthrough of new energy technology, new energy power generation methods are gradually combined with traditional power generation methods and the penetration rate of modern smart grids continues to increase. Wind power and photovoltaic power are the most widely used forms of new energy generation. However, wind energy and photovoltaic energy are characterized by dispersion, randomness, fluctuation and intermittency [4], which can affect the power grid, especially the frequency.
Usually, when the frequency of the power system fluctuates, the aggregator load changes its working state according to the scheduling instruction to prevent frequency fluctuation [5,6]. Most dynamic demand control models have been with thermostatically controlled devices, with air conditioning loads (ACs) accounting for a huge percentage of them [7,8]. However, most literature focused on how ACs can be controlled based on optimized thought, such as the method based on the load frequency modulation model [9]. Only a few studies have applied ACs to resolve external perturbations [10,11].
With the progress of ultra-high voltage technology and the increasing proportion of new energy in power generation [12,13,14], the communication data between power grid systems has become more complex, which also increases the communication pressure between power grids. In recent years, there has been a growing interest in event-triggered mechanisms (ETM) due to their potential in reducing communication and computation resources while maintaining stability and performance in complex systems [15,16,17,18,19]. ETM is designed to trigger actions and update processes in a system only when certain predefined conditions, or events, are met rather than at fixed time intervals. This smart adaptive strategy is particularly beneficial for systems in which resources are constrained or in dynamic environments where unnecessary updates could be costly. Kazemy et al. [15] have addressed synchronization of master-slave neural networks under deception attacks using event-triggered output feedback control to enhance stability and resilience.
While considering the limited network resources, we should also consider the security problems faced by networked systems [20]. Especially in recent years, industrial open networks have been attacked frequently. At present, network attacks are mainly divided into denial-of-service (DoS) attacks and spoofing attacks. DoS attacks can cause the loss of transmitted data [21], while spoofing attacks are launched by attackers that attempt to disrupt the availability of data [22]. Foroush and Martinez [23] showed that the general security problem of networked is DoS attack, which attempts to transmit a large amount of invalid data and intentionally interfere with network communication resources. Persis and Tesi [24] proved that on the premise of ensuring the asymptotic stability of the system, and the average active time of DoS attacks cannot exceed a certain percentage. In recent years, the research on the security of event-triggered networked systems has made some progress [15].
Inspired by the analysis presented above, this paper explores the application of an observer-based ETM for secure LFC in power systems, with the aim of ensuring the safety and stability of the power system. Considering the inherent instability caused by the increasing penetration of renewable energy in the grid, we treat it as a perturbation. In addition, this study proposes the integration of AC demand response as a control strategy to effectively regulate system frequency fluctuations. Additionally, this paper addresses key challenges related to network bandwidth limitations and potential DoS attacks by incorporating the ETM. A novel aspect of this work is the application of ETM to the observer rather than directly to the system state to mitigate the complexity and impracticalities associated with direct state measurement in real-world applications. The contribution of this paper is as follows:
ⅰ) The volatility associated with renewable energy generation is modeled as a perturbation, accounting for its unpredictable nature in the power system. To enhance the LFC, ACs demand response is incorporated as an effective tool to dynamically adjust the system's frequency in response to fluctuating generation conditions, thereby improving overall system resilience.
ⅱ) In contrast to conventional ETM that rely on direct measurement of system states, this paper introduces an observer-based ETM. By using an observer to estimate system states, this approach avoids the challenges and limitations of directly measuring these values, offering a practical solution for real-time control in large-scale, decentralized power networks.
Notations. U>0 means the matrix U is positive definite. ∗ stands for the corresponding symmetric term in the matrix. diag{⋯} stands for diagonal matrix.
First, considering the random disturbance of wind power and photovoltaic power generation, a multi-area smart grid control model is established with ACs participating in grid frequency regulation, as shown in Figure 1 [25]. System parameters and meanings are shown in Table 1, where kaci=micpikEER.
Symbol | Name |
Δfi | frequency deviation |
ΔPmi | generation mechanical output deviation |
ΔPtie−i | tie-line active power deviation |
ΔPwind,i | wind power deviation |
ΔPWi | output of wind turbine generator deviation |
ΔPsolar,i | solar power deviation |
ΔPSi | the deviations of output of photovoltaic |
ΔPaci | the deviations of output of ACs |
ΔPvi | valve position deviation |
ACEi | area control error |
Tgi | governor time constant |
Tti | turbine time constant |
Di | the generator unit damping coefficient |
TWi | the wind turbine generator time constant |
TPVi | the photovoltaic time constant |
Tij | lie-line synchronizing coefficient between the ith and jth control area |
daci | the damping coefficient |
kaci | the combined integral gain |
βi | frequency bias factor |
EER | energy efficiency ratio |
cpi | specific heat capacity of the air |
Ri | the speed drop |
k | gain factor in the smart thermostat |
Mi | the moment of inertia of the generator unit |
mi | the mass of air flow |
According to Figure 1, we can obtain
{Δ˙fi=1Mi(ΔPmi+ΔPvi−ΔPtie−i−ΔPaci−ΔPLi−DiΔfi)Δ˙Ptie−i(t)=2π(TiiΔfi−n∑j=1,j≠iTijΔfj)Δ˙Pmi=1Tti(ΔPvi−ΔPmi)Δ˙Pvi=1Tgi(u−ΔPvi−ΔfiRi)Δ˙PWi=1TWi(ΔPwind,i−ΔPWi)Δ˙PSi=1TPCi(ΔPsolar,i−ΔPSi)Δ˙Paci=(0.5kaci−DaciDi)Δfi+Daci(ΔPmi+ΔPWi−ΔPtie−i−ΔPaci−ΔPLi)ACEi=βiΔfi+ΔPtie−i, | (2.1) |
where Daci=2πdaciMi, Tii=∑nj=1,j≠iTij,i,j=1,2,…,n. Define
xi(t)=[ΔfiΔPtie−iΔPmiΔPviΔPWiΔPSiΔPaci]T, |
ωi(t)=[ΔPLiΔPwind,iΔPsolar,i]T,y(t)=ACEi. |
Then, we can obtain that
{˙xi(t)=Aiixi(t)+Biu(t)+Fiωi(t)−n∑j=1,j≠iAijxj(t)yi(t)=Cixi(t), | (2.2) |
where
Aii=[−DiMi−1Mi1Mi01Mi1Mi−1Mi2πN∑j=1,j≠iTij00000000−1Tii1Tii000−1RiTgi00−1Tgi0000000−1TWi0000000−1TPCi00.5kaci−DaciDi−DaciDaci0DaciDaci−Daci],Bi=[0001Tgi000], |
Fi=[−1Mi0000000000001TWi0001TPCi−Daci00],Ci=[βi100000]T,Aij=[(2,1)=−2πTij]. |
From (2.2), the state-space form of multi-area ACs LFC model can be described as
{˙x(t)=Ax(t)+Bu(t)+Fω(t)y(t)=Cx(t), | (2.3) |
with
A=[A11A12…A1nA21A22…A2n⋮⋮⋱⋮An1An2…Ann], |
C=diag{C1,C2,…,Cn},B=diag{B1,B2,…,Bn},F=diag{F1,F2,…,Fn}, |
x(t)=[x1(t)x2(t)…xn(t)]T,y(t)=[y1(t)y2(t)…yn(t)]T, |
ω(t)=[ωT1(t)ωT2(t)…ωTn(t)]T,u(t)=[u1(t)u2(t)…un(t)]T. |
The full-order state observer is constructed as
{˙ˆx(t)=Aˆx(t)+Bu(t)+L(y(t)−ˆy(t))ˆy(t)=Cˆx(t), | (2.4) |
where ˆy(t) is the observer output; ˆx(t) is the observer state and L is the observer gain to be solved.
In this paper, inspired by [26,27], and periodic event-triggered control schemes [28], we select the ETM activations:
tk+1=tk+min{lh|f[ˆx(tk),ζ(t)]≤0},f[ˆx(tk),ζ(t)]=ζT(t)Vζ(t)−σˆxT(tk)Vˆx(tk),ikh=tk+lh, | (2.5) |
where the difference between the most recent data sample and the current one is referred to as ζ(t), i.e., ζ(t)=ˆx(tk+lh)−ˆx(tk), lh is the intervals between tk and tk+1, l∈N,ikh∈(tk,tk+1], and σ is a threshold parameter.
Remark 1. Unlike traditional ETM that rely on state controllers, this paper introduces a novel approach using observer packets for triggering. This approach leverages the observer pattern, which offers significant advantages in terms of modularity and flexibility. Specifically, the observer pattern enables the seamless addition of new observers to the system without disrupting or modifying other components, ensuring a high degree of decoupling. Similarly, the observed object itself is free to evolve or modify its internal implementation without causing any adverse effects on the observers.
In addition, consider the time-varying delay dk caused by the network between the observer and the event generator [29]. Define d(t) as follows:
d(t)={t−tk,t∈I1t−tk−lh,t∈Il2,l=1,2,…,m−1t−tk−mh,t∈I3,dm≤d(t)≤dM, | (2.6) |
where I1=[tk+dk,tk+dk+h), Il2=[tk+dk+lh,tk+dk+lh+h), I2=∪l=m−1l=1Il2, I3=[tk+dk+mh,tk+1+dk+1), [tk+dk,tk+1+dk+1)=I1∪I2∪I3. Moreover, ˆx(tk) and ˆx(tk+ιh) with ι=1,2,…,m satisfy (2.5); dm (dM) denotes the lower (upper) bound on the time delay.
Remark 2. In a multi-area power system, data transmission is routine, but network delays are inevitable. These delays can arise from factors like communication latency or network congestion, and if ignored, they may compromise the accuracy of the measured data. In this study, we define the delay as dk and focus on the case where dk is shorter than the sampling interval. This ensures that the integrity of the data sequence is preserved, with each measurement arriving and being processed within its designated sampling period.
For t∈[tk+dk,tk+1+dk+1), we can define
ζ(t)={0,t∈I1ˆx(tk+lh)−ˆx(tk),t∈Il2ˆx(tk+mh)−ˆx(tk),t∈I3. | (2.7) |
In what follows, inspired by [30], the observer-based ETM u(t) can be written as
u(t)=Kˆx(tk), |
where K is the control gain matrix.
Based on (2.6) and (2.7), the observer-based ETM u(t) can be rewritten as
u(t)=Kˆx(tk)=K(ˆx(t−d(t))−ζ(t)). | (2.8) |
For a DOS attack in a network, define τ(ikh) as the attack state, τ(ikh)=1 as the attack occurred, and τ(ikh)=0 as the attack did not occur. In a typical power system, most DoS attacks fail to achieve their purpose, and only a fraction of these attacks cause notable disruptions. We divide DoS attacks into the following four types:
{{τ(ikh)=0,t∈(tk,tk+1):noDOSattackτ(ikh)=0,t∈(tk+1,tDOSk+1):noDOSattack{τ(ikh)=1,t∈(tk,tk+1):ineffectiveDosattackτ(ikh)=1,t∈(tk+1,tDOSk+1):effectiveDoSattacks. | (2.9) |
In addition, the energy of general DoS attacks is limited. Facing such attacks, we introduce elastic variable ζDoS(t) on the event triggering mechanism to represent the packet loss and delay caused by DoS attacks on the system [31]. We can obtain
tDoSk+1=tk+min{lh|f[ˆx(tk),ζ(t)]−τ(ikh)ζTDoS(t)VζDoS(t)≥0}, | (2.10) |
tDoSk+1−tk+1=ΔDoStk+1≤ΔDoS, | (2.11) |
where ΔDoS denotes the longest duration of a DoS attack and tDoSk+1 refers to an upcoming sampling moment affected by DoS.
Substituting (2.8) into sysetm (2.3) yields
{˙x(t)=Ax(t)+BKˆx(t−d(t))−BKζ(t)+Fω(t)y(t)=Cx(t). | (2.12) |
Substituting (2.8) into system (2.4) yields
˙ˆx(t)=Aˆx(t)+BKˆx(t−d(t))−BKζ(t)+LC(x(t)−ˆx(t)). | (2.13) |
Define the state error as δ(t)=x(t)−ˆx(t), then
˙δ(t)=(A−LC)δ(t)+Fω(t). | (2.14) |
Define the augmented state as ˜xT(t)=[xT(t)δT(t)], the augmented system is
{˙˜x(t)=A1˜x(t)+A2˜x(t−d(t))+B1ζ(t)+B2ω(t)y(t)=CE˜x(t), | (2.15) |
where
A1=[A00A−LC],A2=[0BK00],B1=[−BK0],B2=[FF],E=[I0]T. |
Definition 1 [32,33] For an arbitrary initial condition, given γ>0, the augmented system (2.15) is thought to be stable with H∞ performance if the following two conditions are met:
1) for ω(t)=0, the system is asymptotically stable;
2) for ω(t)∈ℓ2[0,∞), the following condition is satisfied:
∥y(t)∥2≤γ∥ω(t)∥2. |
Lemma 1. [34] For a given time delays constant dm and dM satisfying d(t)∈[dm,dM], for dM>dm>0, there exist matrices R2 and H when
[R2H∗R2]>0 |
for which the following inequality holds:
−(dM−dm)∫t−dmt−dM˙˜xT(s)R2˙˜x(s)ds≤[˜xT(t−dm)˜xT(t−d(t))˜xT(t−dM)]T[−R2R2−HH∗−2R2+H+HTR2−H∗∗−R2][˜x(t−dm)˜x(t−d(t))˜x(t−dM)]. |
Two theorems are given in this section. Theorem 1 illustrates the stability and H∞ performance of the augmented system, and Theorem 2 gives the design of an observer-based controller.
Theorem 1. For some given positive constants σ, dm and dM, the augmented system (2.15) is asymptotically stable with an H∞ performance index γ, if there exist positive definite matrices P, Q1, Q2, R1, R2, H and V with appropriate dimensions such that
Ω=[Ω11Ω12∗Ω22]<0, | (3.1) |
[R2H∗R2]>0, | (3.2) |
where
Ω11=[Π11R1PA20PB1PB2∗Π22R2−HH00∗∗Π33R2−H00∗∗∗−Q2−R200∗∗∗∗−V0∗∗∗∗∗−γ2I], |
Ω12=[dmAT1(dM−dm)AT1(CE)T00000dmAT2(dM−dm)AT20σΠT40000dmBT1(dM−dm)BT10−σIdmBT2(dM−dm)BT200], |
Ω22=diag{−R−11,−R−12,−I,−σV−1}, |
Π11=AT1P+PAT1+Q1+Q2−R1, |
Π22=−Q1−R1−R2, |
Π33=−2R2+H+HT, |
Π4=[I−I]. |
Proof. Select Lyapunov function as
V(t)=˜xT(t)P˜x(t)+∫tt−dm˜xT(s)Q1˜x(s)ds+∫tt−dM˜xT(s)Q2˜x(s)ds+dm∫tt−dm∫ts˙˜xT(v)R1˙˜x(v)dvds+(dM−dm)∫−dm−dM∫t−dmt−dM˙˜xT(v)R2˙˜x(v)dvds. |
From the augmented system (2.15), we have
˙V(t)=˙˜xT(t)P˜x(t)+˜xT(t)P˙˜x(t)+˜xT(t)Q1˜x(t)−˜xT(t−dm)Q1˜x(t−dm)+˜xT(t)Q2˜x(t)−˜xT(t−dM)Q2˜x(t−dM)+˙˜xT(t)[d2mR1+(dM−dm)2R2]˙˜x(t)−dm∫tt−dm˙˜xT(s)R1˙˜x(s)ds−(dM−dm)∫t−dmt−dM˙˜xT(s)R2˙˜x(s)ds. | (3.3) |
Using Jessen inequality, Lemma 1 and the Schur complement theorem, at the same time to join the event trigger condition, it can be concluded that
˙V(t)+yT(t)y(t)−γ2ωT(t)ω(t)≤ξT(t){Ω11+ΓT1[d2mR1+(dM−dm)2R2]Γ1+ΓT2Γ2+ΓT3Γ3}ξ(t)≤ξT(t)Ωξ(t), | (3.4) |
where
ξT(t)=[˜x(t),˜x(t−dm),˜x(t−d(t)),˜x(t−dM),ζ(t),ω(t)], |
Γ1=[A1,0,A2,0,B1,B2], |
Γ2=[CE,0,0,0,0,0], |
Γ3=[0,0,σΠ4,0,−σI,0]. |
Further, we achieve
yT(t)y(t)−γ2ωT(t)ω(t)≤−˙V(t). | (3.5) |
According to (3.4) and (3.5), the presence of λ>0 ensures that ˙V(t)<0 is satisfied when ω(t)=0, and we can achieve limt→∞V(t)=0.
By Definition 1, the augmented system (2.15) is asymptotically stable.
When ω(t)≠0, both sides of (3.5) integrate from 0 to +∞,
∫+∞0(yT(t)y(t)−γ2ωT(t)ω(t))dt≤V(0)−V(+∞). |
At zero original condition, we obtain
∥y(t)∥2≤γ∥ω(t)∥2. |
Since Ω<0, there exists a proper positive ε so that
ξT(t)Ωξ(t)≤−εV(t), |
˙V(t)+yT(t)y(t)−γ2ωT(t)ω(t)≤ξT(t)Ωξ(t)≤−εV(t)+τ(ikh)ζTDoS(t)VζDoS(t). |
Multiply the upper expression by eεt and integrate the result. Subsequently,
V(t)≤eεtV(0)+(1−e−εt)τ(ikh)ζTDoS(t)VζDoS(t)ε≤V(0)+τ(ikh)ζTDoS(t)VζDoS(t)ε. |
It is evident that
˜xT(t)P˜x(t)≤V(0)+τ(ikh)ζTDoS(t)VζDoS(t)ε, |
∥˜x(t)∥≤√V(0)+τ(ikh)ζTDoS(t)VζDoS(t)ελ(P)=Δ. |
In the presence of an attack, the system's security performance bounds uniformly, with a degradation no greater than Δ. This finishes the proof.
Theorem 2. For some given positive constants σ, dm and dM, the augmented system (2.15) is asymptotical stable with an H∞ performance index γ, if there exist positive definite matrices Xi, Y, S, ¯Qi, ¯Ri, ¯H and ¯V (i=1,2) with appropriate dimensions such that
¯Ω=[¯Ω11¯Ω12∗¯Ω22]<0, | (3.6) |
[¯R2¯H∗¯R2]>0, | (3.7) |
where
¯Ω11=[¯Π11¯R1Ψ10Ψ2B2∗¯Π22¯R2−¯H¯H00∗∗¯Π33¯R2−¯H00∗∗∗−¯Q2−¯R200∗∗∗∗−¯V0∗∗∗∗∗−γ2I], |
¯Ω12=[dmΨT0(dM−dm)ΨT0ΨT300000dmΨT1(dM−dm)ΨT10σ¯ΠT40000dmΨT2(dM−dm)ΨT20−σX2dmBT2(dM−dm)BT200], |
¯Ω22=diag{¯R1−2X,¯R2−2X,−I,σ(¯V−2X2)}, |
Ψ0=[AX100AX2−SC],Ψ1=[0BY00],Ψ2=[−BY0],Ψ3=[CX10], |
¯Π11=Ψ0+ΨT0+¯Q1+¯Q2−¯R1,¯Π22=−¯Q1−¯R1−¯R2, |
¯Π33=−2¯R2+¯H+¯HT,¯Π4=[X1−X2], |
X=[X10∗X2]. |
The control coefficient matrix of the observer-based controller is shown by: K=YX2−1, L=S¯X−12, with CX2=¯X2C.
Proof. Set P=[P10∗P2] and define X=P−1=[X10∗X2], ¯Qi=XTQiX, ¯Ri=XTRiX (i=1,2), ¯H=XTHX, ¯V=X2TVX2, Y=KX2, S=L¯X2. For X2=W[X210∗X22]WT, on the basis of [35], there exist ¯X2=MNX22N−1MT such that CX2=¯X2C.
Define Φ=diag{X,X,X,X,X2,I,I,I,I,I}, then pre- and postmultiply Φ and its transpose on both sides of (3.1). It is easy to know that −X¯R−1iX≤¯Ri−2X,(i=1,2), −X2¯V−1X2≤¯V−2X2. Finally, we can conclude that (3.1) is a sufficient condition to guarantee (3.6) holds. The proof is accomplished.
Remark 3. The power system under investigation is a complex continuous system, whose stabilization is further complicated by disturbances such as wind power generation, making the calculation of controller parameters a challenging task. Lyapunov theory is well used to facilitate analysis and predict system behavior, especially for complex systems.
In this part, we consider a simulation example for a two-area power system and demonstrate the usefulness of this method. The parameter values of system (2.15) are shown in Table 2 [25].
Tt | Tg | R | D | β | M | cp | m | k | dac | EER | T12 | TW | TPC | |
Area1 | 0.30 | 0.10 | 0.05 | 1.00 | 21.0 | 10 | 1.01 | 0.25 | 8 | 0.025 | 3.75 | 0.1968 | 0.30 | 0.30 |
Area2 | 0.40 | 0.17 | 1.50 | 21.5 | 12 | 15 | 0.015 |
Set σ=0.01, dM=0.1, dm=0.02 and the sampling period is h=0.05. The initial condition, in this simulation analysis, is given by ˜x(0)=[0.0010.001…0.001]. Next, by solving Theorem 2, the control gain K and the observer gain L are given by
K=[0.0003−0.00740000−0.00050.0003−0.008200000.0011−0.00010.00160000−0.0001−0.00010.00170000−0.0002], |
L=[0.04370.05470.0004−9.42840.00300.00300.0096−0.0012−0.05200.00030.0017000.0061−0.0007−0.05160.00080.0981000.00180.03650.0535−0.0129−0.11270.00210.00210.0186]T. |
Meanwhile, H∞ performance index γ=15.4285. Here we set the disturbance ω(t) occurs at every sampling instant as ω(t)=√0.161+t2, and the probability that the system suffers from an effective DoS is 0.3.
In this simulation, we analyze the effects of a DoS attack on system dynamics and control responses.
Figure 2 illustrates DoS attack signals from 0−10s denoted by τ(ikh), highlighting the attack's temporal characteristics and intervals of disrupted transmission.
The frequency deviation Δfi in the affected region, as depicted in Figure 3, shows fluctuations due to the DoS attack. However, it gradually stabilizes and tends toward zero, indicating a system tendency to regain frequency balance over time. This response underscores the system's capacity for frequency recovery even under compromised conditions.
Figure 4 presents the output power deviation ΔPaci of the ACs in the region under DoS attack. Notably, the fluctuations are contained within a narrow range, remaining below 0.1, demonstrating a limited impact on the output power deviation of the ACs. This outcome suggests that the control strategy maintains a relatively stable response in the face of attack-induced disturbances.
The area control error ACEi in Figure 5 provides insights into area control performance under the DoS attack.
Meanwhile, Figure 6 depicts the error between the observer state and the system state, revealing a similar pattern between them. While exhibiting oscillatory behavior, the rapid reduction of the error, however, is not completely zero due to the presence of perturbations. This suggests that the observer maintains some accuracy despite the attacks.
The timing of event triggers, illustrated in Figure 7, reveals that the maximum trigger interval significantly exceeds the sampling period. This long trigger interval shows the efficacy of the proposed ETM in maintaining system stability and efficiency under DoS conditions. The extended trigger interval also highlights the ETM's capability to manage communication load, triggering transmissions only when essential and thus enhancing safety and stability in the presence of network-based attacks.
In this paper, we have studied the problem of LFC with ACs under DoS attack considering ETM in network environment. When constructing the system model, we have considered the randomness of wind power generation and photovoltaic power generation and have also added the ACs to participate in the frequency regulation. In order to improve the utilization efficiency of network resources while resisting DoS attacks, an ETM has been proposed. During DoS attacks, system stability criteria and control design methods have been derived using H∞ stability theory and LMI techniques for co-designing controller and observer gains. Finally, the proposed control strategy has been applied to the two-area smart grid, and the results have shown that the control method is effective.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
This work was supported by Science and Technology Project of State Grid Anhui Electric Power Co., Ltd. (Grant No. 521205240016).
The authors declare there are no conflicts of interest.
[1] | M. W. Bondi, D. P. Salmon, A. W. Kaszniak, The neuropsychology of dementia, In: Neuropsychological assessment of neuropsychiatric and neuromedical disorders, Oxford: Oxford University Press, 2009,159–198. |
[2] | World Health Organization, Global action plan on the public health response to dementia 2017–2025, World Health Organization, 2017. |
[3] |
R. N. Kalaria, G. E. Maestre, R. Arizaga, R. P. Friedland, D. Galasko, K. Hall, et al., Alzheimer's disease and vascular dementia in developing countries: prevalence, management, and risk factors, Lancet Neurol., 7 (2008), 812–826. http://dx.doi.org/10.1016/S1474-4422(08)70169-8 doi: 10.1016/S1474-4422(08)70169-8
![]() |
[4] |
T. Ngandu, J. Lehtisalo, A. Solomon, E. Levälahti, S. Ahtiluoto, R. Antikainen, et al., A 2 year multidomain intervention of diet, exercise, cognitive training, and vascular risk monitoring versus control to prevent cognitive decline in at-risk elderly people (FINGER): a randomised controlled trial, Lancet Neurol., 385 (2015), 2255–2263. http://dx.doi.org/10.1016/S0140-6736(15)60461-5 doi: 10.1016/S0140-6736(15)60461-5
![]() |
[5] | M. F. Folstein, S. E. Folstein, P. R. McHugh, "Mini-mental state": a practical method for grading the cognitive state of patients for the clinician, J. Psychiat. Res., 12 (1975), 189–198. |
[6] |
Z. S. Nasreddine, N. A. Phillips, V. Bédirian, S. Charbonneau, V. Whitehead, I. Collin, et al., The montreal cognitive assessment, MoCA: a brief screening tool for mild cognitive impairment, J. Am. Geriatr. Soc., 53 (2005), 695–699. http://dx.doi.org/10.1111/j.1532-5415.2005.53221.x doi: 10.1111/j.1532-5415.2005.53221.x
![]() |
[7] | A. Heyman, G. Fillenbaum, F. Nash, Consortium to establish a registry for Alzheimer's disease: the CERAD experience, Neurology, 49 (1997), 1–26. |
[8] |
A. Konig, A. Satt, A. Sorin, R. Hoory, A. Derreumaux, R. David, et al., Use of speech analyses within a mobile application for the assessment of cognitive impairment in elderly people, Curr. Alzheimer Res., 15 (2018), 120–129. http://dx.doi.org/10.2174/1567205014666170829111942 doi: 10.2174/1567205014666170829111942
![]() |
[9] |
A. Roshanzamir, H. Aghajan, S. M. Soleymani, Transformer-based deep neural network language models for Alzheimer's disease risk assessment from targeted speech, BMC Med. Inform. Decis. Mak., 21 (2021), 92. http://dx.doi.org/10.1186/s12911-021-01456-3 doi: 10.1186/s12911-021-01456-3
![]() |
[10] | C. Guo, G. Pleiss, Y. Sun, K. Q. Weinberger, On calibration of modern neural networks, Proceedings of the 34th International Conference on Machine Learning, 70 (2017), 1321–1330. |
[11] |
S. de la Fuente Garcia, C. W. Ritchie, S. Luz, Artificial intelligence, speech, and language processing approaches to monitoring Alzheimer's disease: a systematic review, Journal of Alzheimer's Disease, 78 (2020), 1547–1574. http://dx.doi.org/10.3233/JAD-200888 doi: 10.3233/JAD-200888
![]() |
[12] | M. F. McTear, Z. Callejas, D. Griol, The conversational interface: talking to smart devices, Cham: Springer, 2016. http://dx.doi.org/10.1007/978-3-319-32967-3 |
[13] | G. Csurka, C. Dance, L. Fan, J. Willamowski, C. Bray, Visual categorization with bags of keypoints, ECCV, 1 (2004), 1–16. |
[14] | M. Schmitt, F. Ringeval, B. Schuller, At the border of acoustics and linguistics: bag-of-audio-words for the recognition of emotions in speech, Proceedings of Interspeech, 2016,495–499. http://dx.doi.org/10.21437/Interspeech.2016-1124 |
[15] |
L. Hernández-Domínguez, S. Ratté, G. Sierra-Martínez, A. Roche-Bergua, Computer-based evaluation of Alzheimer's disease and mild cognitive impairment patients during a picture description task, Alzh. Dement.-DADM, 10 (2018), 260–268. http://dx.doi.org/10.1016/j.dadm.2018.02.004 doi: 10.1016/j.dadm.2018.02.004
![]() |
[16] | S. Luz, Longitudinal monitoring and detection of Alzheimer's type dementia from spontaneous speech data, Proceedings of IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), 2017, 45–46. http://dx.doi.org/10.1109/CBMS.2017.41 |
[17] |
K. Lopez-de Ipiña, J. B. Alonso, J. Solé-Casals, N. Barroso, P. Henriquez, M. Faundez-Zanuy, et al., On automatic diagnosis of Alzheimer's disease based on spontaneous speech analysis and emotional temperature, Cogn. Comput., 7 (2015), 44–55. http://dx.doi.org/10.1007/s12559-013-9229-9 doi: 10.1007/s12559-013-9229-9
![]() |
[18] |
F. Haider, S. De La Fuente, S. Luz, An assessment of paralinguistic acoustic features for detection of Alzheimer's dementia in spontaneous speech, IEEE J.-STSP, 14 (2020), 272–281. http://dx.doi.org/10.1109/JSTSP.2019.2955022 doi: 10.1109/JSTSP.2019.2955022
![]() |
[19] | S. Luz, F. Haider, S. de la Fuente Garcia, D. Fromm, B. Macwhinney, Alzheimer's dementia recognition through spontaneous speech: the ADReSS challenge, Proceedings of Interspeech, 2020, 2172–2176. http://dx.doi.org/10.21437/Interspeech.2020-2571 |
[20] | F. Eyben, F. Weninger, F. Gross, B. Schuller, Recent developments in openSMILE, the munich open-source multimedia feature extractor, Proceedings of the 21st ACM International Conference on Multimedia, 2013,835–838. http://dx.doi.org/10.1145/2502081.2502224 |
[21] |
F. Eyben, K. R. Scherer, B. W. Schuller, J. Sundberg, E. André, C. Busso, et al., The geneva minimalistic acoustic parameter set (GeMAPS) for voice research and affective computing, IEEE T. Affect. Comput., 7 (2016), 190–202. http://dx.doi.org/10.1109/TAFFC.2015.2457417 doi: 10.1109/TAFFC.2015.2457417
![]() |
[22] | F. Eyben, M. Wöllmer, B. Schuller, OpenSMILE: the munich versatile and fast open-source audio feature extractor, Proceedings of the 18th ACM International Conference on Multimedia, 2010, 1459–1462. http://dx.doi.org/10.1145/1873951.1874246 |
[23] | M. S. S. Syed, Z. S. Syed, M. Lech, E. Pirogova, Automated screening for Alzheimer's dementia through spontaneous speech, Proceedings of Interspeech, 2020, 2222–2226. http://dx.doi.org/10.21437/Interspeech.2020-3158 |
[24] | M. Schmitt, B. Schuller, OpenXBOW–Introducing the passau open-source crossmodal bag-of-words toolkit, J. Mach. Learn. Res., 18 (2017), 1–5. |
[25] |
M. E. Celebi, H. A. Kingravi, P. A. Vela, A comparative study of efficient initialization methods for the k-means clustering algorithm, Expert Syst. Appl., 40 (2013), 200–210. http://dx.doi.org/10.1016/j.eswa.2012.07.021 doi: 10.1016/j.eswa.2012.07.021
![]() |
[26] |
J. Hämäläinen, S. Jauhiainen, T. Kärkkäinen, Comparison of internal clustering validation indices for prototype-based clustering, Algorithms, 10 (2017), 105. http://dx.doi.org/10.3390/a10030105 doi: 10.3390/a10030105
![]() |
[27] | M. Niemelä, T. Kärkkäinen, Improving clustering and cluster validation with missing data using distance estimation methods, In: Computational sciences and artificial intelligence in industry, Cham: Springer, 2022,123–133. http://dx.doi.org/10.1007/978-3-030-70787-3_9 |
[28] |
J. T. Becker, F. Boiler, O. L. Lopez, J. Saxton, K. L. McGonigle, The natural history of Alzheimer's disease: description of study cohort and accuracy of diagnosis, Arch. Neurol., 51 (1994), 585–594. http://dx.doi.org/10.1001/archneur.1994.00540180063015 doi: 10.1001/archneur.1994.00540180063015
![]() |
[29] | K. Hechmi, T. N. Trong, V. Hautamäki, T. Kinnunen, Voxceleb enrichment for age and gender recognition, Proceedings of 2021 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU), 2021,687–693. http://dx.doi.org/10.1109/ASRU51503.2021.9688085 |
[30] | European Broadcasting Union, Loudness normalisation and permitted maximum level of audio signals, EBU Recommendation, 2023. |
[31] | L. Breiman, Random forests, Mach. Learn., 45 (2001), 5–32. http://dx.doi.org/10.1023/A: 1010933404324 |
[32] | I. Guyon, A. Elisseeff, An introduction to variable and feature selection, J. Mach. Learn. Res., 3 (2003), 1157–1182. |
[33] |
A. K. Jain, Data clustering: 50 years beyond k-means, Pattern Recogn. Lett., 31 (2010), 651–666. http://dx.doi.org/10.1016/j.patrec.2009.09.011 doi: 10.1016/j.patrec.2009.09.011
![]() |
[34] | S. Äyrämö, Knowledge mining using robust clustering, Jyväskylä: University of Jyväskylä Printing, 2006. |
[35] | S. Äyrämö, T. Kärkkäinen, K. Majava, Robust refinement of initial prototypes for partitioning-based clustering algorithms, In: Recent advances in stochastic modeling and data analysis, Chania: World Scientific, 2007,473–482. http://dx.doi.org/10.1142/9789812709691_0056 |
[36] | D. Arthur, S. Vassilvitskii, k-means++: the advantages of careful seeding, Proceedings of the eighteenth annual ACM-SIAM symposium on discrete algorithms, 2007, 1027–1035. |
[37] | T. Kärkkäinen, S. Äyrämö, On computation of spatial median for robust data mining, Peoceedings of Evolutionary and Deterministic Methods for Design, Optimization and Control with Applications to Industrial and Societal Problems, 2005, 1–14. |
[38] |
M. Niemelä, S. Äyrämö, T. Kärkkäinen, Toolbox for distance estimation and cluster validation on data with missing values, IEEE Access, 10 (2022), 352–367. http://dx.doi.org/10.1109/ACCESS.2021.3136435 doi: 10.1109/ACCESS.2021.3136435
![]() |
[39] |
T. Cover, P. Hart, Nearest neighbor pattern classification, IEEE T. Informa. Theory, 13 (1967), 21–27. http://dx.doi.org/10.1109/TIT.1967.1053964 doi: 10.1109/TIT.1967.1053964
![]() |
[40] |
Y. Guo, T. Hastie, R. Tibshirani, Regularized linear discriminant analysis and its application in microarrays, Biostatistics, 8 (2007), 86–100. http://dx.doi.org/10.1093/biostatistics/kxj035 doi: 10.1093/biostatistics/kxj035
![]() |
[41] |
T. Kärkkäinen, Extreme minimal learning machine: Ridge regression with distance-based basis, Neurocomputing, 342 (2019), 33–48. http://dx.doi.org/10.1016/j.neucom.2018.12.078 doi: 10.1016/j.neucom.2018.12.078
![]() |
[42] | N. Cristianini, J. Shawe-Taylor, An introduction to support vector machines and other kernel-based learning methods, Cambridge: Cambridge university press, 2000. http://dx.doi.org/10.1017/CBO9780511801389 |
[43] |
J. Zhang, M. Marszałek, S. Lazebnik, C. Schmid, Local features and kernels for classification of texture and object categories: a comprehensive study, Int. J. Comput. Vision, 73 (2007), 213–238. http://dx.doi.org/10.1007/s11263-006-9794-4 doi: 10.1007/s11263-006-9794-4
![]() |
[44] | F. Wilcoxon, Individual comparisons by ranking methods, In: Breakthroughs in statistics, New York: Springer, 1992,196–202. http://dx.doi.org/10.1007/978-1-4612-4380-9_16 |
[45] |
F. Haider, S. Pollak, P. Albert, S. Luz, Emotion recognition in low-resource settings: an evaluation of automatic feature selection methods, Comput. Speech Lang., 65 (2021), 101119. http://dx.doi.org/10.1016/j.csl.2020.101119 doi: 10.1016/j.csl.2020.101119
![]() |
[46] |
P. Fränti, Efficiency of random swap clustering, J. Big Data, 5 (2018), 13. http://dx.doi.org/10.1186/s40537-018-0122-y doi: 10.1186/s40537-018-0122-y
![]() |
[47] |
T. F. Yap, J. Epps, E. Ambikairajah, E. H. C. Choi, Formant frequencies under cognitive load: effects and classification, EURASIP J. Adv. Signal Process., 2021 (2011), 219253. http://dx.doi.org/10.1155/2011/219253 doi: 10.1155/2011/219253
![]() |
[48] | T. F. Yap, J. Epps, E. Ambikairajah, E. H. C. Choi, Voice source features for cognitive load classification, Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2011, 5700–5703. http://dx.doi.org/10.1109/ICASSP.2011.5947654 |
[49] |
S. B. Scott, J. E. Graham-Engeland, C. G. Engeland, J. M. Smyth, D. M. Almeida, M. J. Katz, et al., The effects of stress on cognitive aging, physiology and emotion (ESCAPE) project, BMC Psychiatry, 15 (2015), 146. http://dx.doi.org/10.1186/s12888-015-0497-7 doi: 10.1186/s12888-015-0497-7
![]() |
[50] | D. V. L. Sidtis, W. Hanson, C. Jackson, A. Lanto, D. Kempler, E. J. Metter, Fundamental frequency (f0) measures comparing speech tasks in aphasia and Parkinson disease, J. Med. Speech-Lang. Pa., 12 (2004), 207–213. |
[51] | M. Little, P. McSharry, E. Hunter, J. Spielman, L. Ramig, Suitability of dysphonia measurements for telemonitoring of Parkinson's disease, Nat. Prec., 2008, 1–27. http://dx.doi.org/10.1038/npre.2008.2298.1 |
[52] |
R. Alshammri, G. Alharbi, E. Alharbi, I. Almubark, Machine learning approaches to identify Parkinson's disease using voice signal features, Front. Artif. Intell., 6 (2023), 1084001. http://dx.doi.org/10.3389/frai.2023.1084001 doi: 10.3389/frai.2023.1084001
![]() |
[53] |
D. Nickson, C. Meyer, L. Walasek, C. Toro, Prediction and diagnosis of depression using machine learning with electronic health records data: a systematic review, BMC Med. Inform. Decis. Mak., 23 (2023), 271. http://dx.doi.org/10.1186/s12911-023-02341-x doi: 10.1186/s12911-023-02341-x
![]() |
Symbol | Name |
Δfi | frequency deviation |
ΔPmi | generation mechanical output deviation |
ΔPtie−i | tie-line active power deviation |
ΔPwind,i | wind power deviation |
ΔPWi | output of wind turbine generator deviation |
ΔPsolar,i | solar power deviation |
ΔPSi | the deviations of output of photovoltaic |
ΔPaci | the deviations of output of ACs |
ΔPvi | valve position deviation |
ACEi | area control error |
Tgi | governor time constant |
Tti | turbine time constant |
Di | the generator unit damping coefficient |
TWi | the wind turbine generator time constant |
TPVi | the photovoltaic time constant |
Tij | lie-line synchronizing coefficient between the ith and jth control area |
daci | the damping coefficient |
kaci | the combined integral gain |
βi | frequency bias factor |
EER | energy efficiency ratio |
cpi | specific heat capacity of the air |
Ri | the speed drop |
k | gain factor in the smart thermostat |
Mi | the moment of inertia of the generator unit |
mi | the mass of air flow |
Tt | Tg | R | D | β | M | cp | m | k | dac | EER | T12 | TW | TPC | |
Area1 | 0.30 | 0.10 | 0.05 | 1.00 | 21.0 | 10 | 1.01 | 0.25 | 8 | 0.025 | 3.75 | 0.1968 | 0.30 | 0.30 |
Area2 | 0.40 | 0.17 | 1.50 | 21.5 | 12 | 15 | 0.015 |
Symbol | Name |
Δfi | frequency deviation |
ΔPmi | generation mechanical output deviation |
ΔPtie−i | tie-line active power deviation |
ΔPwind,i | wind power deviation |
ΔPWi | output of wind turbine generator deviation |
ΔPsolar,i | solar power deviation |
ΔPSi | the deviations of output of photovoltaic |
ΔPaci | the deviations of output of ACs |
ΔPvi | valve position deviation |
ACEi | area control error |
Tgi | governor time constant |
Tti | turbine time constant |
Di | the generator unit damping coefficient |
TWi | the wind turbine generator time constant |
TPVi | the photovoltaic time constant |
Tij | lie-line synchronizing coefficient between the ith and jth control area |
daci | the damping coefficient |
kaci | the combined integral gain |
βi | frequency bias factor |
EER | energy efficiency ratio |
cpi | specific heat capacity of the air |
Ri | the speed drop |
k | gain factor in the smart thermostat |
Mi | the moment of inertia of the generator unit |
mi | the mass of air flow |
Tt | Tg | R | D | β | M | cp | m | k | dac | EER | T12 | TW | TPC | |
Area1 | 0.30 | 0.10 | 0.05 | 1.00 | 21.0 | 10 | 1.01 | 0.25 | 8 | 0.025 | 3.75 | 0.1968 | 0.30 | 0.30 |
Area2 | 0.40 | 0.17 | 1.50 | 21.5 | 12 | 15 | 0.015 |