<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">IASC</journal-id>
<journal-id journal-id-type="nlm-ta">IASC</journal-id>
<journal-id journal-id-type="publisher-id">IASC</journal-id>
<journal-title-group>
<journal-title>Intelligent Automation &#x0026; Soft Computing</journal-title>
</journal-title-group>
<issn pub-type="epub">2326-005X</issn>
<issn pub-type="ppub">1079-8587</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">37277</article-id>
<article-id pub-id-type="doi">10.32604/iasc.2023.037277</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>SCADA Data-Based Support Vector Machine for False Alarm Identification for Wind Turbine Management</article-title>
<alt-title alt-title-type="left-running-head">SCADA Data-Based Support Vector Machine for False Alarm Identification for Wind Turbine Management</alt-title>
<alt-title alt-title-type="right-running-head">SCADA Data-Based Support Vector Machine for False Alarm Identification for Wind Turbine Management</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Peco Chac&#x00F3;n</surname><given-names>Ana Mar&#x00ED;a</given-names></name></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Ram&#x00ED;rez</surname><given-names>Isaac Segovia</given-names></name></contrib>
<contrib id="author-3" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Garc&#x00ED;a M&#x00E1;rquez</surname><given-names>Fausto Pedro</given-names></name><email>faustopedro.garcia@uclm.es</email></contrib>
<aff id="aff-1"><institution>Ingenium Research Group, Universidad Castilla-La Mancha</institution>, <addr-line>Ciudad Real, 13071</addr-line>, <country>Spain</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Fausto Pedro Garc&#x00ED;a M&#x00E1;rquez. Email: <email>faustopedro.garcia@uclm.es</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2023</year></pub-date>
<pub-date date-type="pub" publication-format="electronic"><day>11</day><month>9</month><year>2023</year></pub-date>
<volume>37</volume>
<issue>3</issue>
<fpage>2595</fpage>
<lpage>2608</lpage>
<history>
<date date-type="received"><day>28</day><month>10</month><year>2022</year></date>
<date date-type="accepted"><day>24</day><month>2</month><year>2023</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2023 Peco Chac&#x00F3;n et al.</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Peco Chac&#x00F3;n et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_IASC_37277.pdf"></self-uri>
<abstract>
<p>Maintenance operations have a critical influence on power generation by wind turbines (WT). Advanced algorithms must analyze large volume of data from condition monitoring systems (CMS) to determine the actual working conditions and avoid false alarms. This paper proposes different support vector machine (SVM) algorithms for the prediction and detection of false alarms. K-Fold cross-validation (CV) is applied to evaluate the classification reliability of these algorithms. Supervisory Control and Data Acquisition (SCADA) data from an operating WT are applied to test the proposed approach. The results from the quadratic SVM showed an accuracy rate of 98.6&#x0025;. Misclassifications from the confusion matrix, alarm log and maintenance records are analyzed to obtain quantitative information and determine if it is a false alarm. The classifier reduces the number of false alarms called misclassifications by 25&#x0025;. These results demonstrate that the proposed approach presents high reliability and accuracy in false alarm identification.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Machine learning classification</kwd>
<kwd>support vector machine</kwd>
<kwd>false alarm</kwd>
<kwd>wind turbine</kwd>
<kwd>cross-validation</kwd>
</kwd-group>
<funding-group>
<award-group id="awg1">
<funding-source>Ministerio de Ciencia e Innovaci&#x00F3;n (Spain) and the European Regional Development</funding-source>
<award-id>PID2021-125278OB-I00</award-id>
</award-group>
</funding-group>
</article-meta>
</front>
<body>
<sec id="s1"><label>1</label><title>Introduction</title>
<p>The current energy crisis, together with the high demand, requires new forms of energy generation, greater security of supply, improvements in efficiency and sustainable prices for this generation. The achievement of climate change agreement goals depends strongly on renewable energies, being the essential solution for reducing CO<sub>2</sub> emissions [<xref ref-type="bibr" rid="ref-1">1</xref>]. The advantages of renewable energy include cost-effectiveness and environmental responsibility. Renewable generation should be more than 80&#x0025; of the total electricity generation by 2050, and solar photovoltaic (PV) and wind power energies will contribute to two-thirds of this growth. In particular, wind energy is expected to play a critical role in the renewable energy transition due to technological advances and governmental incentives. Wind power generation is increasing gradually, and the tendency is projected to continue in the future. The installed wind power capacity currently stands at 837&#x2005;GW in the world, including 94&#x2005;GW of new wind energy capacity installed in 2021, achieving an annual growth of 12&#x0025;. It is expected to have more than 550&#x2005;GW of new capacity in the next five years [<xref ref-type="bibr" rid="ref-2">2</xref>].</p>
<p>The wind energy industry has a relevant challenge to reach competitiveness through systemic technological innovations. WT rotating components operate under heavy dynamic loads, generating a high probability of failure. The costs associated with the operation and maintenance (O&#x0026;M) of WTs are estimated to be between 5&#x0025; and 30&#x0025; of the overall costs of wind energy production, and proper maintenance management operations are necessary to minimize potential critical failures. Maintenance operations cause elevated downtimes, although proper maintenance activities with periodical inspections allow failure detection and replacement of damaged components. Several types of CMS are applied for WT maintenance, providing information about the condition of the WT to perform remote supervisory and diagnosis to reduce maintenance operations. Some of the most relevant techniques are based on vibration analysis, acoustic monitoring, thermography and analysis of electric parameters, among others. The SCADA system also collects data from the WT related to critical components, e.g., rotors, generators and pitch mechanisms, among others, and storages it for further data processing. The alarm can help operators determine the actual condition of WTs [<xref ref-type="bibr" rid="ref-3">3</xref>,<xref ref-type="bibr" rid="ref-4">4</xref>]. However, the alarm dataset often has short or periodic activations, and it is necessary to apply techniques for filtering and interpretation of these alarms [<xref ref-type="bibr" rid="ref-5">5</xref>]. A false alarm is triggered when the SCADA system reports a fault, but in some cases, there is not a failure, i.e., the actual state of the WT is healthy, causing unnecessary maintenance tasks and increasing O&#x0026;M costs [<xref ref-type="bibr" rid="ref-6">6</xref>]. False alarm detection requires robust algorithms to obtain reliable data from the SCADA dataset [<xref ref-type="bibr" rid="ref-7">7</xref>,<xref ref-type="bibr" rid="ref-8">8</xref>]. The selection of appropriate signal processing and data analysis techniques is essential for a correct interpretation of WT data.</p>
<p>Machine learning (ML) algorithms have been demonstrated to be one of the most relevant techniques for false alarm identification [<xref ref-type="bibr" rid="ref-9">9</xref>]. ML techniques recognize patterns in a dataset by learning from the data. There are two types: supervised and unsupervised. Supervised learning uses different techniques to predict the outputs using input data initially labeled through the application of classifications and forecasting models [<xref ref-type="bibr" rid="ref-10">10</xref>]. Although artificial neural networks are usually applied for data analysis, SVM can be applied in fault detection for WT maintenance management. SVM presents due to easy implementation, high accuracy, high generalization capability even with small datasets, reduction of overfitting with excellent parameter tuning and the application of nonlinear Kernels, allowing the classification of nonlinear data and high strength for two-group classification [<xref ref-type="bibr" rid="ref-11">11</xref>,<xref ref-type="bibr" rid="ref-12">12</xref>]. SVM is one of the most applied supervised learning for classification and regression problems, where the increasing evolution of publications on the SVM algorithm is compared to other relevant ML algorithms, mainly: K-nearest neighbor (KNN) and Decision Tree (DT), see <xref ref-type="fig" rid="fig-1">Fig. 1</xref>.</p>
<fig id="fig-1"><label>Figure 1</label><caption><title>Evolution of SVM, KNN and DT publications in recent years, adapted from [<xref ref-type="bibr" rid="ref-13">13</xref>]</title></caption><graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_37277-fig-1.tif"/></fig>
<p>Several authors are applying SVM for fault detection and forecasting. Arcos Jimenez et al. [<xref ref-type="bibr" rid="ref-14">14</xref>] applied ultrasonic CMS to identify blade delamination in WTs. Different ML techniques analyzed the ultrasonic signals acquired during the experimental procedure and Quadratic Discriminant Analysis and Quadratic SVM achieved the best results. SVM was also employed to identify and diagnose WT faults [<xref ref-type="bibr" rid="ref-15">15</xref>]. A novel approach for WT blade ice detection was presented in [<xref ref-type="bibr" rid="ref-16">16</xref>], where different variations of SVM were applied for fault identification, achieving accuracies around 100&#x0025;. A novel approach presented by H&#x00FC;bner et al. [<xref ref-type="bibr" rid="ref-17">17</xref>] used SVM to identify mass imbalance in WT rotors with more than 84&#x0025; accuracy. Mishra et al. [<xref ref-type="bibr" rid="ref-18">18</xref>] trained different SVM models for bearing condition monitoring, and the model achieved 99&#x0025; of accuracy without analyzing false alarms.</p>
<p>Despite the advantages and great potential of SVM, it is not widely implemented in the determination of false alarms, and it is estimated to be applied in only 6.25&#x0025; of the cases with ML techniques [<xref ref-type="bibr" rid="ref-19">19</xref>]. Leahy et al. [<xref ref-type="bibr" rid="ref-20">20</xref>] applied different SVM with acceptable results although several false points are undetected, being necessary more filtering and data processing phases. The application of SVM requires new filtering techniques to ensure high reliability in processing large datasets. Dhiman et al. [<xref ref-type="bibr" rid="ref-21">21</xref>] used adaptive threshold for false alarm detection and twin SVM with a 10-fold CV in a gearbox case study. The overall accuracy was 95&#x0025;, and the authors aimed to determine false alarms without obtaining a conclusive result. Wu et al. [<xref ref-type="bibr" rid="ref-22">22</xref>] combined principal component analysis and SVM to identify normal and abnormal conditions, achieving 76&#x0025;&#x2212;98&#x0025; accuracy. The authors compared SVM with other techniques and demonstrated that SVM is one of the most significant techniques for this type of classification problems. The combination of SVM with statistical and filtering process allows higher accuracies for false alarm identification.</p>
<p>This analysis of the current state of the art shows the necessity of new methodologies combined with SVM to apply the capabilities provided by SVM that are currently implemented for fault detection in WT but not for false alarms from the SCADA system.</p>
<p>The main contributions of this paper are summarized as follows:
<list list-type="bullet">
<list-item><p>The application of a novel data-based approach to detect false alarms is a novelty in the current state of the art. Several studies are focused on analyzing failures but false alarm identification is currently a challenge studied in few references and focused on the application of artificial neural networks [<xref ref-type="bibr" rid="ref-23">23</xref>]. The use of SVM classifiers with different kernels to determine if an alarm is false has not been found in the literature, and the authors usually applied the same SVM classifier. The method developed in this work can be used to increase the reliability of WTs with historical SCADA data.</p></list-item>
<list-item><p>The analysis of misclassifications has been performed by providing values for the different types of alarms. The misclassification points are also examined simultaneously with the alarm log and the maintenance log to provide important information to determine the causes of false alarms.</p></list-item>
</list></p>
<p>This paper is organized as follows: <xref ref-type="sec" rid="s2">Section 2</xref> describes the methodology applied, analyzing the SVM algorithm and the CV process, the different SVMs applied, and the validation method used, as well as the different metrics classifiers; <xref ref-type="sec" rid="s3">Section 3</xref> shows the results obtained with different variations of SVM using SCADA data from an operating WT; <xref ref-type="sec" rid="s4">Section 4</xref> provides the main conclusions and discussions of this study.</p>
</sec>
<sec id="s2"><label>2</label><title>Methodology</title>
<p>This paper presents an approach to detect false alarm activations. The main phases of the methodology include filter processes, SVM classification algorithms, validation techniques and the use of the alarm log information provided by the operators to analyze misclassifications. The scheme of the methodology is shown in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>.</p>
<fig id="fig-2"><label>Figure 2</label><caption><title>Flowchart of the methodology</title></caption><graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_37277-fig-2.tif"/></fig>
<p>The initial data acquisition and filtering processes provide several signals and alarms. The approach presented in this work selects 34 variables to be applied as predictors to classify the alarm according to the alarm log. The SCADA system provides the alarm log that defines the typology and description of the alarm and the activation and deactivation periods, among others. The data determine critical alarms and obtain average alarm periods, average periods without alarms and related signals to each alarm. This phase performs an initial filtering phase where the empty values, or wrong measurements caused by issues in the SCADA system, are deleted and not considered for the study. This phase also includes a time synchronization of the SCADA variables and the alarm log to simplify data analysis. The second phase applies different SVM classifiers to compare the results and enhance the reliability of the analysis. For this particular case study, linear, quadratic, cubic, fine Gaussian, medium Gaussian and coarse Gaussian are selected for being some of the most applied SVM kernels with high accuracy. The objective of providing different SVM algorithms is to increase the robustness of the methodology, selecting the most suitable technique in all the cases. The results are validated by k-fold CV because this method is one of the most relevant techniques for estimating prediction errors. Several authors have widely implemented 5-fold or 10-fold CVs and this particular case study applied a 5-fold CV for the validation. The results from the validations of all the techniques are compared in terms of accuracy and computational costs to determine the most suitable technique for this case study. The approach presented in this paper determines that only the misclassifications determined by the best technique are analyzed in further phases. This methodology ensures high suitability, avoiding wrong misclassification points that may reduce the reliability of the results. The qualitative information of the alarm and maintenance log is applied to confirm if maintenance tasks, or external factors, may have caused these alarms, and the approach identifies false alarms.</p>
<sec id="s2_1"><label>2.1</label><title>SVM Classification Algorithm</title>
<p>SVM is an algorithm for complex data analysis and fault detection [<xref ref-type="bibr" rid="ref-24">24</xref>,<xref ref-type="bibr" rid="ref-25">25</xref>]. SVM classifier aims to identify boundaries between several data classes with the most significant possible margin of separation with the construction of an optimal separation between hyperplanes [<xref ref-type="bibr" rid="ref-26">26</xref>], see <xref ref-type="fig" rid="fig-3">Fig. 3</xref>.</p>
<fig id="fig-3"><label>Figure 3</label><caption><title>SVM bases</title></caption><graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_37277-fig-3.tif"/></fig>
<p>The input training data is defined by <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2208;</mml:mo><mml:msup><mml:mrow><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>N</mml:mi></mml:mrow></mml:msup><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:mo>+</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:mn>1</mml:mn><mml:mo>}</mml:mo></mml:mrow></mml:math></inline-formula>, being <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> the input value and <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> the assigned class. The hyperplane that separates different objects is defined by <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>:
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:mi>&#x03C9;</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>&#x03D5;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>x</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mi>b</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></disp-formula>where <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mi>&#x03C9;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msup><mml:mrow><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow></mml:mrow><mml:mrow><mml:mi>M</mml:mi></mml:mrow></mml:msup></mml:math></inline-formula> and <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:mi>b</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="double-struck">R</mml:mi></mml:mrow></mml:mrow></mml:math></inline-formula>. The quadratic programming proposes a global and unique solution, and the optimal hyperplane with the maximum separation is given by <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref>:
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:msub><mml:mi>n</mml:mi><mml:mrow><mml:mi>&#x03C9;</mml:mi><mml:mo>,</mml:mo><mml:mi>b</mml:mi></mml:mrow></mml:msub><mml:mfrac><mml:mn>1</mml:mn><mml:mn>2</mml:mn></mml:mfrac><mml:mtext>&#x00A0;</mml:mtext><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mi>&#x03C9;</mml:mi><mml:mo fence="false" stretchy="false">|</mml:mo><mml:msup><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mi>C</mml:mi><mml:msubsup><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msubsup><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mtext>&#x00A0;</mml:mtext><mml:mrow><mml:mtext mathvariant="italic">subject</mml:mtext></mml:mrow><mml:mtext>&#x00A0;</mml:mtext><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mi>&#x03C9;</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>&#x03D5;</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mi>b</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2265;</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>m</mml:mi><mml:mo>.</mml:mo></mml:math></disp-formula></p><p>being <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:mi>&#x03C4;</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> the error defined by the training.</p>
<p>The kernel function <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mi>K</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> given in <xref ref-type="disp-formula" rid="eqn-3">Eq. (3)</xref> is applied when the data points are too close, where it is impossible to directly define the hyperplanes in the original feature space and present difficulties in the dataset separation.
<disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mi>F</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:msubsup><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msubsup><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mn>2</mml:mn></mml:mfrac><mml:msubsup><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>.</mml:mo><mml:mi>k</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msubsup><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mi>K</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mtext>&#x00A0;</mml:mtext><mml:mrow><mml:mtext mathvariant="italic">subject</mml:mtext></mml:mrow><mml:mtext>&#x00A0;</mml:mtext><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:msubsup><mml:mrow><mml:mo>&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>m</mml:mi></mml:mrow></mml:msubsup><mml:msub><mml:mi>y</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:mi>C</mml:mi><mml:mo>&#x2265;</mml:mo><mml:msub><mml:mi>&#x03B1;</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2265;</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mi>m</mml:mi></mml:math></disp-formula></p>
<p>It is essential to select a proper kernel function to optimize the solution because the matching kernel functional form must be known to solve the dual problem. The main characteristics of the dataset determines the type of kernel function to be implemented. Different kernel functions have been selected in this research, mainly linear, polynomial or Gaussian, given by <xref ref-type="disp-formula" rid="eqn-4">Eqs. (4)</xref>&#x2013;<xref ref-type="disp-formula" rid="eqn-6">(6)</xref>, respectively. The standard deviation parameter is denoted by &#x03B4;, while the parameter <italic>P</italic> specifies the polynomial degree.
<disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mi>K</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></disp-formula>
<disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:mi>K</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msup><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo><mml:mrow><mml:mi>P</mml:mi></mml:mrow></mml:msup></mml:math></disp-formula>
<disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:mi>K</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>exp</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mo fence="false" stretchy="false">|</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo fence="false" stretchy="false">|</mml:mo><mml:msup><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:msup><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:mrow></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>Gaussian kernel cases are classified into the following categories:
<list list-type="bullet">
<list-item><p>Fine Gaussian: Class distinctions are made to an acceptable degree. N is the number of predictors, and the kernel scale is <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mrow><mml:msqrt><mml:mi>N</mml:mi></mml:msqrt></mml:mrow><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:math></inline-formula>.</p></list-item>
<list-item><p>Medium Gaussian: It is less distinct than the previous case; hence its kernel scale is <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:msqrt><mml:mi>N</mml:mi></mml:msqrt></mml:math></inline-formula>.</p></list-item>
<list-item><p>Coarse Gaussian: The class distinctions are less accurate in this scenario, and the kernel scale is <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mn>4</mml:mn><mml:mo>&#x22C5;</mml:mo><mml:msqrt><mml:mi>N</mml:mi></mml:msqrt></mml:math></inline-formula>.</p></list-item>
</list></p>
</sec>
<sec id="s2_2"><label>2.2</label><title>CV and Confusion Matrix</title>
<p>The purpose of validation is to evaluate the performance of the model. The K-fold CV method divides the data set into k subsets or folds. The results validation after each iteration and the frequent use of randomized subsamples for training and validation are the main advantages [<xref ref-type="bibr" rid="ref-27">27</xref>]. Hierarchical sampling is applied to preserve the consistency of the data distribution to acquire each subset [<xref ref-type="bibr" rid="ref-28">28</xref>]. The partitioned folds are trained and tested in K iterations, leaving one fold per iteration for testing and training the model on the remaining K-1 folds, see <xref ref-type="fig" rid="fig-4">Fig. 4</xref>. The accuracy achieved in each iteration is averaged to determine the model accuracy [<xref ref-type="bibr" rid="ref-29">29</xref>].</p>
<fig id="fig-4"><label>Figure 4</label><caption><title>CV method based on [<xref ref-type="bibr" rid="ref-30">30</xref>]</title></caption><graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_37277-fig-4.tif"/></fig>
<p>The confusion matrix is used for the statistical classification of processes to determine the effectiveness of the categorization models [<xref ref-type="bibr" rid="ref-31">31</xref>]. The confusion matrix is divided into rows and columns to show the results of the classifier. The columns correspond to the classes predicted by the model, and the rows represent the actual classes. Correctly classified cases are shown on the diagonal, while the remaining cells are misclassifications points. The confusion matrix presents the following states for this case study:
<list list-type="bullet">
<list-item><p>True Positive (TP): the alarm has been accurately classified.</p></list-item>
<list-item><p>False Positive (FP): indicates the number of cases of alarm activations when the WT status is healthy and is considered as a misclassification.</p></list-item>
<list-item><p>False Negative (FN): it also designates a misclassification because it is determined that there is no alarm when the actual state of the system has an alarm activation.</p></list-item>
<list-item><p>True Negative (TN): the healthy state of the WT has been correctly detected and no alarms were activated.</p></list-item>
</list></p>
<p>Several indicators are widely applied to quantify the effectiveness of classification methods. Accuracy, sensitivity, true positive rate (TPR) and false negative rate (FNR) are the performance metrics used in this study. The accuracy is the ratio of the number of successfully classified samples to the total number of cases.
<disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:mi>A</mml:mi><mml:mrow><mml:mtext>ccuracy</mml:mtext></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mrow><mml:mtext>TP</mml:mtext></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mtext>TN</mml:mtext></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mtext>TP</mml:mtext></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mtext>TN</mml:mtext></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mtext>FP</mml:mtext></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mtext>FN</mml:mtext></mml:mrow></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>TPR, also known as sensitivity, is the proportion of successfully classified observations in each true class [<xref ref-type="bibr" rid="ref-32">32</xref>].
<disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:mrow><mml:mtext>True</mml:mtext></mml:mrow><mml:mtext>&#x00A0;</mml:mtext><mml:mrow><mml:mtext>Positive</mml:mtext></mml:mrow><mml:mtext>&#x00A0;</mml:mtext><mml:mrow><mml:mtext>Rate</mml:mtext></mml:mrow><mml:mtext>&#x00A0;</mml:mtext><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>TPR</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mtext>TP</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>TP</mml:mtext></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mtext>FN</mml:mtext></mml:mrow></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>FNR is the percentage of incorrectly classified negative observations in each negative class, see <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref>.
<disp-formula id="eqn-9"><label>(9)</label><mml:math id="mml-eqn-9" display="block"><mml:mrow><mml:mtext>False</mml:mtext></mml:mrow><mml:mtext>&#x00A0;</mml:mtext><mml:mrow><mml:mtext>Negative</mml:mtext></mml:mrow><mml:mtext>&#x00A0;</mml:mtext><mml:mrow><mml:mtext>Rate</mml:mtext></mml:mrow><mml:mtext>&#x00A0;</mml:mtext><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>FNR</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mtext>FN</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>TP</mml:mtext></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mtext>FN</mml:mtext></mml:mrow></mml:mrow></mml:mfrac><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mi>R</mml:mi></mml:math></disp-formula></p>
</sec>
</sec>
<sec id="s3"><label>3</label><title>Case Study</title>
<p>This approach is tested with SCADA data from a working WT that acquired data every 10&#x2005;min, and this study is composed of more than 22000 observations. Classification techniques aim to correlate the response variable and independent variables or predictors. For this case study, 34 SCADA signals are selected as predictor variables, and the alarm log is applied as response variable. The alarm log of the wind farm classifies all the alarms into 17 groups according to a component. The number of activations is acquired from the SCADA system, and determines that alarms related to states specification (401) and ambient conditions alarms (185) are the most frequent alarms, as it is shown in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>. The deactivated alarm associated with class 0, with 21795 activations, is also considered for this study due to the high number of registers.</p>
<fig id="fig-5"><label>Figure 5</label><caption><title>Different types of alarms and corresponding activations</title></caption><graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_37277-fig-5.tif"/></fig>
<p>This study determines that the number of K-fold has not a relevant influence on the accuracy of the analysis. However, the periods of the calculation periods depend on the number of K, having higher computational periods for higher K. The best results in accuracy and computational costs are obtained using the 5-Fold CV. <xref ref-type="fig" rid="fig-6">Fig. 6a</xref> shows the 5-fold CV accuracy and training time, and <xref ref-type="fig" rid="fig-6">Fig. 6b</xref> the misclassification for the different SVM classification models. The coarse Gaussian presented the worst accuracy results with higher misclassification points and training periods, and this technique is not considered for further steps. Cubic and quadratic SVM showed similar results, but the quadratic SVM classifier provided the best accuracy with the lowest training time and the number of misclassifications.</p>
<fig id="fig-6"><label>Figure 6</label><caption><title>Performance of different SVM classifiers: (a) accuracy and training time; (b) misclassifications</title></caption><graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_37277-fig-6a.tif"/><graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_37277-fig-6b.tif"/></fig>
<p>The receiver operating characteristic (ROC) curve is a graph that demonstrates the performance of a classifier and displays the ratio of the TP rate and FP rate, known as the false positive ratio. The area under the curve (AUC) shows the accuracy of the classifier [<xref ref-type="bibr" rid="ref-33">33</xref>]. The performance of the classifier is better when the area AUC increases [<xref ref-type="bibr" rid="ref-34">34</xref>], being an effective model when AUC is close to 1. The period without alarm activations is classified as the positive class, and the interval where an alarm is triggered is in the negative class. SVM quadratic model can accurately classify 100&#x0025; of the cases to the positive class when no alarm is triggered. On the other hand, this classifier can only classify 65&#x0025; of the negative classes, see <xref ref-type="fig" rid="fig-7">Fig. 7</xref>.</p>
<fig id="fig-7"><label>Figure 7</label><caption><title>ROC curve for quadratic SVM model</title></caption><graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_37277-fig-7.tif"/></fig>
<p><xref ref-type="fig" rid="fig-8">Fig. 8</xref> shows the performance of the classifier for each alarm type and identifies the types of alarms where the classifier has performed poorly: the diagonal elements show the cases where the predicted class and true class are the same; The blue cells show the percentage of correctly classified cases (TPR); The orange cells are the proportion of observations incorrectly classified by true class (FNR). In this case, the classifier obtains the best results for the types of alarms with more activations, representing 99&#x0025; of the sample. There are several types of alarms: alarm deactivated, states specification, ambient conditions alarms and combination of alarms. Some alarm types are difficult to classify accurately, caused by the small number of cases shown in the data sample. However, this does not influence the overall accuracy of the classifier, which is 98.6&#x0025;.</p>
<fig id="fig-8"><label>Figure 8</label><caption><title>TPR and FNR values for each alarm type</title></caption><graphic mimetype="image" mime-subtype="tif" xlink:href="IASC_37277-fig-8.tif"/></fig>
<p><xref ref-type="table" rid="table-1">Table 1</xref> shows the number of cases of each type of alarm in the study sample.</p>
<table-wrap id="table-1"><label>Table 1</label><caption><title>Confusion matrix with number of observations</title></caption>
<table frame="hsides" >
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<tbody>
<tr>
<td align="left"></td>
<td align="left">No alarm activation</td>
<td align="left">21770</td>
<td align="left">14</td>
<td align="left">6</td>
<td align="left">2</td>
<td align="left">1</td>
<td align="left">2</td>
</tr>
<tr>
<td/>
<td align="left">States specification</td>
<td align="left">126</td>
<td align="left">273</td>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left">2</td>
</tr>
<tr>
<td/>
<td align="left">Control box system alarms</td>
<td align="left">1</td>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left">1</td>
</tr>
<tr>
<td/>
<td align="left">Ambient conditions alarms</td>
<td align="left">33</td>
<td align="left">1</td>
<td align="left">151</td>
<td align="left"/>
<td align="left"/>
<td align="left"/>
</tr>
<tr>
<td/>
<td align="left">Speed sensors alarms</td>
<td align="left">6</td>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left"/>
</tr>
<tr>
<td>TRUE</td>
<td align="left">Yaw system alarms</td>
<td align="left">60</td>
<td align="left"/>
<td align="left"/>
<td align="left">10</td>
<td align="left"/>
<td align="left">1</td>
</tr>
<tr>
<td>CLASS</td>
<td align="left">Gearbox system alarms</td>
<td align="left">3</td>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left"/>
</tr>
<tr>
<td/>
<td align="left">Power converter alarms</td>
<td align="left">27</td>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left"/>
</tr>
<tr>
<td/>
<td align="left">Hydraulic unit alarms</td>
<td align="left">3</td>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left"/>
</tr>
<tr>
<td/>
<td align="left">Various alarms</td>
<td align="left">6</td>
<td align="left">2</td>
<td align="left"/>
<td align="left"/>
<td align="left"/>
<td align="left"/>
</tr>
<tr>
<td/>
<td align="left">Combination of alarms</td>
<td align="left">17</td>
<td align="left">4</td>
<td align="left">1</td>
<td align="left"/>
<td align="left"/>
<td align="left">84</td>
</tr>
<tr>
<td/>
<td align="left">No alarm activation</td>
<td align="left">No alarm activation</td>
<td align="left">States specification</td>
<td align="left">Ambient conditions alarms</td>
<td align="left">Yaw system alarms</td>
<td align="left">Power converter alarms</td>
<td align="left">Combination of alarms</td>
</tr>
<tr>
<td align="left"/>
<td align="center" colspan="7">PREDICTED CLASS</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The misclassification points are not correctly predicted by the SVM model, being candidates to be considered false alarms. <xref ref-type="table" rid="table-2">Table 2</xref> shows the misclassifications quantified by the algorithm for each type of alarm. The causes of the misclassifications are examined using the maintenance and the alarm log as decision variables for false alarm detection.</p>
<table-wrap id="table-2"><label>Table 2</label><caption><title>Analysis of misclassifications</title></caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Assigned number</th>
<th align="left">Type of alarm</th>
<th align="left">Misclassifications</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">0</td>
<td align="left">No alarm activated</td>
<td align="left">25</td>
</tr>
<tr>
<td align="left">1</td>
<td align="left">States specification</td>
<td align="left">128</td>
</tr>
<tr>
<td align="left">4</td>
<td align="left">Ambient condition alarms</td>
<td align="left">33</td>
</tr>
<tr>
<td align="left">6</td>
<td align="left">Yaw system alarms</td>
<td align="left">60</td>
</tr>
<tr>
<td align="left">9</td>
<td align="left">Power converter alarm</td>
<td align="left">27</td>
</tr>
<tr>
<td align="left">16</td>
<td align="left">Combination of alarms</td>
<td align="left">17</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The type of alarm, defined as &#x201C;no alarm activation&#x201D; (0), presented 25 misclassification points considered false negatives by the SVM. The alarms about states specifications presented 128 misclassification points, with 29 cases considered as false alarms. This type of alarm includes different WT damage states, and the high number of misclassifications is considered normal. Once the alarm log is analyzed, it is demonstrated that the time of the alarm activations was about seconds, and these alarms were not showing any WT failure. The &#x201C;ambient condition&#x201D; alarm (4) showed 10 cases of turbulence alarm level. The classifier cannot recognize it, and 9 cases are considered false alarms because they occurred before and/or after the alarm predictions. The &#x201C;yaw system&#x201D; alarm (6) presented 60 misclassification points, and 17 were considered false alarms because of the time of the alarm activation was seconds. The &#x201C;power converter&#x201D; alarm presented eight possible false alarms of 27 cases because the low time of the alarm activations. The &#x201C;combination of alarms&#x201D; (16) presented 17 misclassification cases with desynchronization between the start or the end of the alarm times about to the periods predicted.</p>
<p>The total number of false alarms detected was 80 cases, i.e., 25.07&#x0025; of false alarms are detected with the proposed approach. These results are elevated compared to similar studies with a false alarm rate of around 10&#x0025;&#x2013;15&#x0025; [<xref ref-type="bibr" rid="ref-35">35</xref>]. This result is significant because the approach presented in this paper increases the detection of false alarms more than 10&#x0025; compared to other studies. The distribution of false alarms between the different types of alarms represents the same distribution and only the alarm about states specification presents more misclassifications. The overall accuracy is 98.6&#x0025;, higher than all the research studies analyzed in the state of the art, demonstrating the strength of the methodology. It is concluded that the combination of different SVM techniques improves the alarm data analysis in specific cases where the number of misclassification points is elevated. The alarm log is essential to test and validate the results.</p>
<p>For future research work, it is recommended the use of more alarms to test the efficiency of the classification algorithms and their implementation in real time.</p>
</sec>
<sec id="s4"><label>4</label><title>Conclusions</title>
<p>The wind energy industry is expanding, which requires new monitoring systems and predictive maintenance to reduce downtimes to reach competitiveness in the global energy market. CMS and supervisory control and data acquisition produce large amounts and a variety of data, requiring advanced algorithms. The false alarms associated with false failures increase maintenance costs and downtimes. ML algorithms are widely applied for fault detection and diagnosis due to their accuracy. This paper presents a novel approach based on a SVM with a k-fold CV for false alarm identification. The main objective of this approach is to identify false alarms by analyzing misclassifications. Several SVM algorithms are proposed to increase the accuracy and reliability of the overall method. The accuracy of the quadratic SVM model with 5-fold CV provided the best results, 98.6&#x0025; accuracy, and reduced training and misclassification times. The TPR identifies the time intervals that the alarms are deactivated, being 99.9&#x0025; and 81.6&#x0025; for ambient conditions alarms. It is demonstrated that the number of false alarms can be decreased by 25.07&#x0025; using the quadratic support vector classifier.</p>
</sec>
</body>
<back>
<sec><title>Funding Statement</title>
<p>The work reported herein was supported financially by the Ministerio de Ciencia e Innovaci&#x00F3;n (Spain) and the European Regional Development Fund under the Research Grant WindSound Project (Ref.: PID2021-125278OB-I00).</p></sec>
<sec sec-type="COI-statement"><title>Conflicts of Interest</title>
<p>The authors declare they have no conflicts of interest to report regarding the present study.</p></sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O.</given-names> <surname>Sadeghian</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Moradzadeh</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Mohammadi-Ivatloo</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Abapour</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Anvari-Moghaddam</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>A comprehensive review on energy saving options and saving potential in low voltage electricity distribution networks: Building and public lighting</article-title>,&#x201D; <source>Sustainable Cities and Society</source>, vol. <volume>72</volume>, pp. <fpage>103064</fpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Lee</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Zhao</surname></string-name></person-group>. <person-group person-group-type="author"><collab>Global Wind Report 2022</collab></person-group>. &#x201C;<article-title>Global wind energy council</article-title>,&#x201D; <year>2022</year>. [Online]. Available: <ext-link ext-link-type="uri" xlink:href="https://gwec.net/global-wind-report-2022/">https://gwec.net/global-wind-report-2022/</ext-link></mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F. P.</given-names> <surname>Garc&#x00ED;a M&#x00E1;rquez</surname></string-name>, <string-name><given-names>I.</given-names> <surname>Segovia Ram&#x00ED;rez</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Mohammadi-Ivatloo</surname></string-name> and <string-name><given-names>A. P.</given-names> <surname>Marug&#x00E1;n</surname></string-name></person-group>, &#x201C;<article-title>Reliability dynamic analysis by fault trees and binary decision diagrams</article-title>,&#x201D; <source>Information</source>, vol. <volume>11</volume>, pp. <fpage>324</fpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Qiu</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Feng</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Infield</surname></string-name></person-group>, &#x201C;<article-title>Fault diagnosis of wind turbine with SCADA alarms based multidimensional information processing method</article-title>,&#x201D; <source>Renewable Energy</source>, vol. <volume>145</volume>, pp. <fpage>1923</fpage>&#x2013;<lpage>1931</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F. P.</given-names> <surname>Garcia Marquez</surname></string-name>, <string-name><given-names>I.</given-names> <surname>Segovia Ramirez</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Pliego Marugan</surname></string-name></person-group>, &#x201C;<article-title>Decision making using logical decision tree and binary decision diagrams: A real case study of wind turbine manufacturing</article-title>,&#x201D; <source>Energies</source>, vol. <volume>12</volume>, pp. <fpage>1753</fpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. M.</given-names> <surname>Peco Chac&#x00F3;n</surname></string-name>, <string-name><given-names>I.</given-names> <surname>Segovia Ram&#x00ED;rez</surname></string-name> and <string-name><given-names>F. P.</given-names> <surname>Garc&#x00ED;a M&#x00E1;rquez</surname></string-name></person-group>, &#x201C;<article-title>False alarms analysis of wind turbine bearing system</article-title>,&#x201D; <source>Sustainability</source>, vol. <volume>12</volume>, pp. <fpage>7867</fpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Shitharth</surname></string-name></person-group>, &#x201C;<article-title>An enhanced optimization based algorithm for intrusion detection in SCADA network</article-title>,&#x201D; <source>Computers &#x0026; Security</source>, vol. <volume>70</volume>, pp. <fpage>16</fpage>&#x2013;<lpage>26</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>I. S.</given-names> <surname>Ramirez</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Mohammadi-Ivatloo</surname></string-name> and <string-name><given-names>F. P. G.</given-names> <surname>M&#x00E1;rquez</surname></string-name></person-group>, &#x201C;<article-title>Alarms management by supervisory control and data acquisition system for wind turbines</article-title>,&#x201D; <source>Eksploatacja i Niezawodnosc</source>, vol. <volume>23</volume>, pp. <fpage>110</fpage>&#x2013;<lpage>116</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Garc&#x00ED;a</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Fausto</surname></string-name> and <string-name><given-names>P. G.</given-names> <surname>Alfredo</surname></string-name></person-group>, &#x201C;<article-title>A comprehensive review of artificial intelligence and wind energy</article-title>,&#x201D; <source>Archives of Computational Methods in Engineering</source>, pp. <fpage>1</fpage>&#x2013;<lpage>24</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Stetco</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Dinmohammadi</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Zhao</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Robu</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Flynn</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Machine learning methods for wind turbine condition monitoring: A review</article-title>,&#x201D; <source>Renewable Energy</source>, vol. <volume>133</volume>, pp. <fpage>620</fpage>&#x2013;<lpage>635</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Mahesh</surname></string-name></person-group>, &#x201C;<article-title>Machine learning algorithms-a review</article-title>,&#x201D; <source>International Journal of Science and Research</source>, vol. <volume>9</volume>, pp. <fpage>381</fpage>&#x2013;<lpage>386</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Laouti</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Sheibat-Othman</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Othman</surname></string-name></person-group>, &#x201C;<article-title>Support vector machines for fault detection in wind turbines</article-title>,&#x201D; <source>IFAC Proceedings Volumes</source>, vol. <volume>44</volume>, pp. <fpage>7067</fpage>&#x2013;<lpage>7072</lpage>, <year>2011</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>Dimensions</collab></person-group>. <source>Overview in SVM Publications</source>. <publisher-name>Digital Science &#x0026; Research Solutions Inc.</publisher-name>, <year>2023</year>. [Online]. Available: <ext-link ext-link-type="uri" xlink:href="https://app.dimensions.ai/analytics/publication/overview/timeline?search_mode=content&#x0026;search_text=SVM&#x0026;search_type=kws&#x0026;search_field=text_search">https://app.dimensions.ai/analytics/publication/overview/timeline?search_mode=content&amp;search_text=SVM&amp;search_type=kws&amp;search_field=text_search</ext-link></mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Arcos Jimenez</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>C. Q.</given-names> <surname>Gomez Mu&#x00F1;oz</surname></string-name> and <string-name><given-names>F. P.</given-names> <surname>Garcia Marquez</surname></string-name></person-group>, &#x201C;<article-title>Maintenance management based on machine learning and nonlinear features in wind turbines</article-title>,&#x201D; <source>Renewable Energy</source>, vol. <volume>146</volume>, pp. <fpage>316</fpage>&#x2013;<lpage>328</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Liang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zheng</surname></string-name>, <string-name><given-names>R. X.</given-names> <surname>Gao</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>An integrated fault diagnosis and prognosis approach for predictive maintenance of wind turbine bearing with limited samples</article-title>,&#x201D; <source>Renewable Energy</source>, vol. <volume>145</volume>, pp. <fpage>642</fpage>&#x2013;<lpage>650</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. A.</given-names> <surname>Jim&#x00E9;nez</surname></string-name>, <string-name><given-names>F. P. G.</given-names> <surname>M&#x00E1;rquez</surname></string-name>, <string-name><given-names>V. B.</given-names> <surname>Moraleda</surname></string-name> and <string-name><given-names>C. Q. G.</given-names> <surname>Mu&#x00F1;oz</surname></string-name></person-group>, &#x201C;<article-title>Linear and nonlinear features and machine learning for wind turbine blade ice detection and diagnosis</article-title>,&#x201D; <source>Renewable Energy</source>, vol. <volume>132</volume>, pp. <fpage>1034</fpage>&#x2013;<lpage>1048</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>H&#x00FC;bner</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Pinheiro</surname></string-name>, <string-name><given-names>C.</given-names> <surname>de Souza</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Franchi</surname></string-name>, <string-name><given-names>L.</given-names> <surname>da Rosa</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Detection of mass imbalance in the rotor of wind turbines using support vector machine</article-title>,&#x201D; <source>Renewable Energy</source>, vol. <volume>170</volume>, pp. <fpage>49</fpage>&#x2013;<lpage>59</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>R. K.</given-names> <surname>Mishra</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Choudhary</surname></string-name>, <string-name><given-names>A. R.</given-names> <surname>Mohanty</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Fatima</surname></string-name></person-group>, &#x201C;<article-title>Multi-domain bearing fault diagnosis using support vector machine</article-title>,&#x201D; in <conf-name>2021 IEEE 4th Int. Conf. on Computing, Power and Communication Technologies (GUCON)</conf-name>, <publisher-loc>Kuala Lumpur, Malaysia</publisher-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>6</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>A. M.</given-names> <surname>Peco Chac&#x00F3;n</surname></string-name>, <string-name><given-names>I.</given-names> <surname>Segovia Ram&#x00ED;rez</surname></string-name> and <string-name><given-names>F. P.</given-names> <surname>Garc&#x00ED;a M&#x00E1;rquez</surname></string-name></person-group>, &#x201C;<article-title>State of the art of artificial intelligence applied for false alarms in wind turbines</article-title>,&#x201D; <source>Archives of Computational Methods in Engineering</source>, pp. <fpage>1</fpage>&#x2013;<lpage>25</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Leahy</surname></string-name>, <string-name><given-names>R. L.</given-names> <surname>Hu</surname></string-name>, <string-name><given-names>I. C.</given-names> <surname>Konstantakopoulos</surname></string-name>, <string-name><given-names>C. J.</given-names> <surname>Spanos</surname></string-name>, <string-name><given-names>A. M.</given-names> <surname>Agogino</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Diagnosing and predictingwind turbine faults from scada data using support vector machines</article-title>,&#x201D; <source>International Journal of Prognostics and Health Management</source>, vol. <volume>9</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>11</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. S.</given-names> <surname>Dhiman</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Deb</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Muyeen</surname></string-name> and <string-name><given-names>I.</given-names> <surname>Kamwa</surname></string-name></person-group>, &#x201C;<article-title>Wind turbine gearbox anomaly detection based on adaptive threshold and twin support vector machines</article-title>,&#x201D; <source>IEEE Transactions on Energy Conversion</source>, vol. <volume>36</volume>, pp. <fpage>3462</fpage>&#x2013;<lpage>3469</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Wu</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Ma</surname></string-name></person-group>, &#x201C;<article-title>Alarms-related wind turbine fault detection based on kernel support vector machines</article-title>,&#x201D; <source>The Journal of Engineering</source>, vol. <volume>2019</volume>, pp. <fpage>4980</fpage>&#x2013;<lpage>4985</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W. C. E.</given-names> <surname>Teixeira</surname></string-name>, <string-name><given-names>M. &#x00C1;.</given-names> <surname>Sanz-Bobi</surname></string-name> and <string-name><given-names>R. C. L.</given-names> <surname>de Oliveira</surname></string-name></person-group>, &#x201C;<article-title>Applying intelligent multi-agents to reduce false alarms in wind turbine monitoring systems</article-title>,&#x201D; <source>Energies</source>, vol. <volume>15</volume>, pp. <fpage>7317</fpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. M.</given-names> <surname>Islam</surname></string-name> and <string-name><given-names>J. -M.</given-names> <surname>Kim</surname></string-name></person-group>, &#x201C;<article-title>Reliable multiple combined fault diagnosis of bearings using heterogeneous feature models and multiclass support vector machines</article-title>,&#x201D; <source>Reliability Engineering &#x0026; System Safety</source>, vol. <volume>184</volume>, pp. <fpage>55</fpage>&#x2013;<lpage>66</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>I.</given-names> <surname>Burman</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Som</surname></string-name></person-group>, &#x201C;<article-title>Predicting students academic performance using support vector machine</article-title>,&#x201D; in <conf-name>2019 Amity Int. Conf. on Artificial Intelligence (AICAI)</conf-name>, <publisher-loc>New Delhi, India</publisher-loc>, pp. <fpage>756</fpage>&#x2013;<lpage>759</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D. C.</given-names> <surname>Toledo-P&#x00E9;rez</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Rodr&#x00ED;guez-Res&#x00E9;ndiz</surname></string-name>, <string-name><given-names>R. A.</given-names> <surname>G&#x00F3;mez-Loenzo</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Jauregui-Correa</surname></string-name></person-group>, &#x201C;<article-title>Support vector machine-based EMG signal classification techniques: A review</article-title>,&#x201D; <source>Applied Sciences</source>, vol. <volume>9</volume>, pp. <fpage>4402</fpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Bergmeir</surname></string-name> and <string-name><given-names>J. M.</given-names> <surname>Ben&#x00ED;tez</surname></string-name></person-group>, &#x201C;<article-title>On the use of cross-validation for time series predictor evaluation</article-title>,&#x201D; <source>Information Sciences</source>, vol. <volume>191</volume>, pp. <fpage>192</fpage>&#x2013;<lpage>213</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Jia</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Liu</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>A hybrid wind power forecasting approach based on Bayesian model averaging and ensemble learning</article-title>,&#x201D; <source>Renewable Energy</source>, vol. <volume>145</volume>, pp. <fpage>2426</fpage>&#x2013;<lpage>2434</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Refaeilzadeh</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Tang</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Cross-validation</article-title>,&#x201D; <source>Encyclopedia of Database Systems</source>, vol. <volume>5</volume>, pp. <fpage>532</fpage>&#x2013;<lpage>538</lpage>, <year>2009</year>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Q.</given-names> <surname>Ren</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Li</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Han</surname></string-name></person-group>, &#x201C;<article-title>Tectonic discrimination of olivine in basalt using data mining techniques based on major elements: A comparative study from multiple perspectives</article-title>,&#x201D; <source>Big Earth Data</source>, vol. <volume>3</volume>, pp. <fpage>8</fpage>&#x2013;<lpage>25</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Shen</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Jin</surname></string-name>, <string-name><given-names>&#x00C1;. A.</given-names> <surname>Cabrera</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Perer</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Zhu</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Designing alternative representations of confusion matrices to support non-expert public understanding of algorithm performance</article-title>,&#x201D; in <source>Proc. of the ACM on Human-Computer Interaction</source>, vol. <volume>4</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>22</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C. S.</given-names> <surname>Hong</surname></string-name> and <string-name><given-names>T. G.</given-names> <surname>Oh</surname></string-name></person-group>, &#x201C;<article-title>TPR-TNR plot for confusion matrix</article-title>,&#x201D; <source>Communications for Statistical Applications and Methods</source>, vol. <volume>28</volume>, pp. <fpage>161</fpage>&#x2013;<lpage>169</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Rizwan ul</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Li</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Online dynamic security assessment of wind integrated power system using SDAE with SVM ensemble boosting learner</article-title>,&#x201D; <source>International Journal of Electrical Power &#x0026; Energy Systems</source>, vol. <volume>125</volume>, pp. <fpage>106429</fpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Kotu</surname></string-name> and <string-name><given-names>B.</given-names> <surname>Deshpande</surname></string-name></person-group>, &#x201C;<chapter-title>Model evaluation</chapter-title>,&#x201D; In: <person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Kotu</surname></string-name> and <string-name><given-names>B.</given-names> <surname>Deshpande</surname></string-name></person-group> (Eds.), <source>Data Science</source>, <edition>Second Edition</edition>, pp. <fpage>263</fpage>&#x2013;<lpage>279</lpage>, <publisher-loc>Burlington, Massachusetts, USA</publisher-loc>: <publisher-name>Morgan Kaufmann</publisher-name>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C. Q.</given-names> <surname>Gomez Munoz</surname></string-name>, <string-name><given-names>R.</given-names> <surname>de la Hermosa Gonzalez-Carrato</surname></string-name>, <string-name><given-names>J. R.</given-names> <surname>Trapero Arenas</surname></string-name> and <string-name><given-names>F. P.</given-names> <surname>Garcia Marquez</surname></string-name></person-group>, &#x201C;<article-title>A novel approach to fault detection and diagnosis on wind turbines</article-title>,&#x201D; <source>Global Nest Journal</source>, vol. <volume>16</volume>, no. <issue>6</issue>, pp. <fpage>1029</fpage>&#x2013;<lpage>1037</lpage>, <year>2014</year>.</mixed-citation></ref>
</ref-list>
</back></article>