Yoseba K. Penya

Yoseba K. Penya

About

64
Publications
33,328
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,225
Citations
Citations since 2017
0 Research Items
535 Citations
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100
2017201820192020202120222023020406080100

Publications

Publications (64)
Conference Paper
Full-text available
Short-term load forecasting (STLF) is a major column in every day's life of power networks nowadays. Attached or bordering primary substation may share common features such as temperature, humidity, wind direction and force, etc. and, therefore, they may present similar changes in their consumption profile. Following this idea, we address here the...
Conference Paper
Full-text available
So far the worlds of building automation and power networks have co-existed electrically attached but without data interaction, with different, and sometimes divergent, goals and requirements. The smartgrid community is coping nowadays with a new phase in the deployment of its vision: the integration of smart buildings, making use of their services...
Conference Paper
Full-text available
Building automation has grown in parallel to energy smart grids without much interaction. However, at present, these two worlds cannot remain separated any more, as long as intelligent buildings become another node of the grid. This paper shows that this integration can be performed in practice as long as a harmonized knowledge/data model for the t...
Article
The smart grid vision demands both syntactic interoperability in order to physically be able to interchange data and semantic interoperability to properly understand and interpret its meaning. The IEC and the EPRI have backed to this end the harmonization of two widely used industrial standards, the CIM and the IEC 61850, as the global unified onto...
Article
Full-text available
We present here a combined aggregative short-term load forecasting method for smart grids, a novel methodology that allows us to obtain a global prognosis by summing up the forecasts on the compounding individual loads. More accurately, we detail here three new approaches, namely bottom-up aggregation (with and without bias correction), top-down ag...
Article
This paper presents an application of business intelligence (BI) for electricity management systems in the context of the Smart Grid domain. Combining semantic Web technologies (SWT) and elements of grid computing (GC), we have designed a distributed architecture of intelligent nodes, which are called power grid distributed nodes (PGDINs). This dis...
Article
Full-text available
Short-term load forecasting (STLF) in buildings differs from its broader counterpart in that the load to be predicted does not seem to be stationary, seasonal and regular but, on the contrary, it may be subject to sudden changes and variations on its consumption behaviour. Classical STLF methods do not react fast enough to these perturbations (i.e....
Article
Full-text available
The smart grid revolution demands a huge effort in redesigning and enhancing current power networks, as well as integrating emerging scenarios such as distributed generation, renewable energies or the electric vehicle. This novel situation will cause a huge flood of data that can only be handled, processed and exploited in real-time with the help o...
Conference Paper
Foundries are a very energy-demanding industry due to the intensive use of furnaces which purpose is to melt metallic resources. Nowadays, the scheduling of the orders and the optimisation of the foundry process itself is carried out based on expert knowledge acquired over years of experience, loosely taking into account energy costs and hourly ele...
Article
Full-text available
Long-term load forecasting aims at predicting the evolution of the electric consumption in a certain area in order to resize the grid in accordance. There are two components to study: the increment in existing consumption and the appearance of new clients. We focus here on the latter. With this pur-pose, we present an ongoing work that applies agen...
Article
Full-text available
Cloud computing provides a new promising parading to offer services. It brings the opportunity to develop new business models in the Internet. Classic accounting solutions fail to full fill the new requirements of these services due to their structural design. To understand these new constrains, we study the different actors and processes that inte...
Article
The transition from distribution and transport power networks into the so-called smart grid paradigm must cope with many problems, one of them being the high amount of related standard protocols. Achieving interoperability between them is the key to this goal. We focus here on the IEC 60870, a standard for high-voltage meter control and management....
Conference Paper
Full-text available
Short-term load forecasting (STLF) is one of the main pillars of the smart grid vision since a reliable prediction helps reducing the deviation in the generation and, consequently, increases the overall efficiency. Classic STLF methods range from statistical models to more complicated Artificial Intelligence approaches. All of them presents remarka...
Conference Paper
The transition from distribution and transport power networks into the so-called smart grid vision must cope with many problems, one of them being the large amount of related standard protocols. Bringing them to work together in an standard fashion is the key to this goal. We focus here on the IEC 60870, the Spanish standard for high-voltage meter...
Conference Paper
Full-text available
The arrival of the smart grid paradigm has brought a number of novel initiatives that aim at increasing the level of energy efficiency of buildings such as smart metering or demand side management. Still, all of them demand an accurate load estimation. Short-term load forecasting in buildings presents additional requirements, among others the need...
Conference Paper
Smart grids and the semantic web are two recent paradigms that come hand in hand. On the one side, the evolution of current power networks demands dealing with big amounts of data that must be processed to gain valuable information. On the other, semantic web technologies that directly address this data enrichment and knowledge extraction. Further,...
Conference Paper
Full-text available
The smart grid revolution demands a huge effort redesigning and enhancing current power networks, as well as integrating emerging scenarios such as distributed generation, renewable energies and the electric vehicle. This novel scenario will present a huge flood of data that can be only handled, processed, and exploited with the help of cutting-edg...
Conference Paper
Full-text available
Cloud computing is the new paradigm that has changed traditional computer business schemes: static, close, centralised, and proprietary methods cannot cope with the new requirements that have emerged. Still, this new scenario poses a number of opportunities to use and novel problems to be faced. Specifically, we focus on the accounting of cloud com...
Conference Paper
Network planning presents a number of difficulties and risks but performed in an optimal way may turn beneficial. In this work we address a new way of achieving optimal network planning for Voice over IP (VoIP) services by using historical data to profile service usage. We show how to obtain a sound set of service use clusters based on calling beha...
Article
Full-text available
Automation systems strongly depend on the amount, quality, and richness of their sensor information. For decades, scientists have investigated towardsmore accurate and cheaper sensors as well as new sensors for previously undetectable properties or substances. With these enhancements the problem of too complex sensor information and sensor fusion r...
Conference Paper
Full-text available
Mechanical properties are the attributes that measure the faculty of a metal to withstand several loads and tensions. Specifically, ultimate tensile strength is the force a material can resist until it breaks and, thus, it is one of the variables to control in the foundry process. The only way to examine this feature is the use of destructive inspe...
Conference Paper
Full-text available
High-precision foundry production is subjected to rigorous quality controls in order to ensure a proper result. Such exams, however, are extremely expensive and only achieve good results in a posteriori fashion. In previous works, we presented a defect prediction system that achieved a 99% success rate. Still, this approach did not take into accoun...
Conference Paper
Full-text available
Microshrinkages are known as probably the most difficult defects to avoid in high-precision foundry. The presence of this failure renders the casting invalid, with the subsequent cost increment. Modelling the foundry process as an expert knowledge cloud allows properly-trained machine learning algorithms to foresee the value of a certain variable,...
Article
Full-text available
The deployment of the Internet of Services and the Internet of Things (IS&IT) is a challenge that goes hand on hand with the convergence of a global system of telecommunications. This migration, also known as the emergence of the Next-Generation Networks and Services, is based on all-IP enabling technologies. Such networks transfers voice, data, an...
Conference Paper
Full-text available
Short-term load forecasting (STLF) has become an essential tool in the electricity sector. It has been object of vast research since energy load is known to be non-linear and, therefore, very difficult to predict with accuracy. We focus here on non-residential building STLF, an special case of STLF where weather shows smaller influence on the load...
Conference Paper
Full-text available
Computer networks are nowadays subject to an increasing number of attacks. Intrusion Detection Systems (IDS) are designed to protect them by identifying malicious behaviours or improper uses. Since the scope is different in each case (register already-known menaces to later recognise them or model legitimate uses to trigger when a variation is dete...
Conference Paper
Full-text available
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks carry voice, data, and multimedia traffic over the Internet, providing users with the information they want in any format, amount, device, place or moment. Still, there ar...
Conference Paper
Full-text available
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. Hence, malware detection has become a critical topic in computer security. Currently, signature-based detection is the most extended method within commercial antivirus. Al...
Conference Paper
Full-text available
Malware is any kind of program explicitly designed to harm, such as viruses, trojan horses or worms. Since the amount of malware is growing exponentially, it already poses a serious security threat. Therefore, every incoming code must be analysed in order to classify it as malware or benign software. These tests commonly combine static and dynamic...
Conference Paper
Full-text available
Ultimate tensile strength (UTS) is the force a material can resist until it breaks. The only way to examine this mechanical property is the employment of destructive inspections with the subsequent cost increment. Modelling the foundry process as an expert knowledge cloud allows properly-trained machine-learning algorithms to foresee the value of U...
Conference Paper
Full-text available
Mechanical properties are the attributes of a metal to withstand several forces and tensions. Specifically, ultimate tensile strength is the force a material can resist until it breaks. The only way to examine this mechanical property is the employment of destructive inspections that renders the casting invalid with the subsequent cost increment. I...
Conference Paper
Full-text available
Microshrinkages are known as probably the most difficult defects to avoid in high-precision foundry. The presence of this failure renders the casting invalid, with the subsequent cost increment. Modelling the foundry process as an expert knowledge cloud allows properly-trained machine learning algorithms to foresee the value of a certain variable,...
Conference Paper
Full-text available
Microshrinkages are known as probably the most difficult defects to avoid in high-precission foundry. Depending on the magnitude of this defect, the piece in which it appears must be rejected with the subsequent cost increment. Modelling this environment as a probabilistic constellation of interrelated variables allows Bayesian networks to infer ca...
Conference Paper
Full-text available
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually follow two different strategies. The first one aims at detecting forbidden usage of the network and the second one concentrates on finding illegitimate behaviour. The first me...
Conference Paper
Full-text available
Microshrinkages are known as probably the most difficult defects to avoid in high-precision foundry due to the large number of factors involved in their apparition. The presence of this failure renders the casting invalid, with the subsequent cost increment. Bayesian networks allow to model the foundry process as a probabilistic constellation of in...
Conference Paper
Full-text available
Network intrusion detection systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it targets, NIDS can be oriented to detect misuses (by defining all possible attacks) or anomalies (by modelling legitimate behaviour to find those that do not fit into that model)....
Conference Paper
Full-text available
Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it targets, an NIDS can be oriented to detect misuses (by defining all possible attacks) or anomalies (by modelling legitimate behaviour and detecting those that do not fit on that m...
Article
The deregulation of the electricity industry in many countries has created a number of marketplaces in which producers and consumers can operate in order to more effectively manage and meet their energy needs. To this end, this paper develops a new model for electricity retail where end-use customers choose their supplier from competing electricity...
Conference Paper
Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it targets, an NIDS can be oriented to detect misuses (by defining all possible attacks) or anomalies (by modelling legitimate behaviour and detecting those that do not fit on that m...
Conference Paper
Full-text available
The deregulation of the electricity industry in Europe has created a number of marketplaces in which producers and consumers can operate in order to more effectively manage and meet their energy needs. To this end, in previous work we introduced a new market design where consumers allocate the supply of the energy they need in a number of simultane...
Conference Paper
The deregulation of the electricity industry in many countries has created a number of marketplaces in which producers and consumers can operate in order to more effectively manage and meet their energy needs. To this end, this paper develops a new model for electricity retail where end-use customers choose their supplier from competing electricity...
Conference Paper
Full-text available
This paper addresses the ongoing discussion on influencing factors of auto- matic essay scoring with latent semantic analysis (LSA). Throughout this paper, we contribute to this discussion by presenting,evidence for the effects of the parameters text pre-processing, weighting, singular value dimensionality and type of similarity measure on the ,sco...
Conference Paper
The deregulation of the electricity industry in many countries has created a number of marketplaces in which producers and consumers can operate in order to more effectively manage and meet their energy needs. To this end, this paper develops a new model for electricity retail where end-use customers choose their supplier from competing electricity...
Article
The deregulation of the electricity industry in many countries has created a number of marketplaces in which producers and consumers can operate in order to more effectively manage and meet their energy needs. To this end, this paper develops a new model for electricity retail where end-use customers choose their supplier from competing electricity...
Article
Software agents have been already introduced successfully in the scope of embedded technology as smart controllers of intelligent systems. This paper presents a further application that deals with the interoperability problem between different fieldbus networks. Overcoming the lack of space in the embedded nodes that compose the fieldbus network, s...
Article
Artificial intelligence has devised solutions for scheduling problems that haven't been already applied to building -automation specific issues and could be beneficial. This paper presents one of these methods, a parallel-genetic algorithm for the optimisation of a multi-objective demand-side management system, and outlines the design of the archit...
Article
Mass-customized production systems are challenging in that they intend to provide custom-specific products at the price of conventional mass production. Since this also includes small production volumes, the manufacturing systems must achieve flexibility, easy reconfigurability, and a totally product-oriented approach. In this paper, we introduce a...
Conference Paper
Software agents have been already introduced successfully in the scope of embedded technology as smart controllers of intelligent systems. This paper pr esents a further application that deals with the interoperability problem between different fieldbus networks. Overcoming the lack of space in the embedded nodes that com- pose the fieldbus network...
Article
Recent trends have profusely shown the benefits of powering flexible-automation plants by means of multi-agent systems. Although agent systems present some plug-and-participate characteristics per nature, this solution seems to be not enough. Therefore, the controversy on enforcing them with Jini-like technology is still open. This paper explores t...
Article
Recently, the worldwide spread of e -business has led industry into a scenario where flexi-bility, reconfigurability and a product-oriented ap-proach are necessary to successfully deal with the new requirements of the market. This paper presents the EU-funded PABADIS project (Plant Automation Based on Distribution Systems), which tackles these prob...
Article
Mass-customized production systems are challenging in that they intend to provide custom-specific products at the price of conventional mass production. Since this also includes small production volumes, the manufacturing systems must achieve flexibility, easy reconfigurability, and a totally prod-uct-oriented approach. In this paper, we introduce...
Article
The current state of the art in production planning is still dominated by largely centralized solutions. More dis-tributed approaches require a substantial increase in com-munication, and network load becomes an important factor. This paper presents a distributed plant automation approach based on mobile software agents and investigates the network...
Article
The current state of the art in production planning is still dominated by largely centralized solutions. More distributed approaches require a substantial in-crease in communication, and network load becomes an important factor. This paper presents a distributed plant automation approach based on mobile software agents and investigates the network...
Article
Nowadays, state-of-the-art agent platforms cannot run on fieldbus systems, due to the constrained characteristics that the nodes present. Therefore, field area networks (FANs) are far from taking advantage of software agents and di stributed intelligence techniques. This paper tackles both problems: it describes first a lightweight agent platform s...

Network

Cited By

Projects

Projects (2)
Archived project