LS-SVM based capacitor anomaly identification method

  • Chunlin Lv
  • , Yuxi Deng
  • , Jinjun Liu
  • , Xiaotong Zhang
  • , Yan Zhang
  • , Fei Chang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The sudden failures caused by ESR abnormal increase cannot be identified by the conventional aging failure criterion. A two-dimensional data-driven based method is proposed to identify the abnormal state of capacitors. First, the least square support vector machine (LS-SVM) algorithm, a modified version of the SVM algorithm, is proposed to identify the abnormal state of capacitors. The regularization parameters and relaxation variables of the LS-SVM algorithm are established by grid search method. Then, the proposed LS-SVM algorithm and conventional k-means algorithm are applied to identify the abnormal state of capacitors based on the accelerated aging test results. The results show that the accuracy of the proposed model is significantly improved compared with k-means algorithm, increasing the identification sensitivity of the state on the failure boundary.

Original languageEnglish
Title of host publication2024 IEEE 10th International Power Electronics and Motion Control Conference, IPEMC 2024 ECCE Asia
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages4542-4546
Number of pages5
ISBN (Electronic)9798350351330
DOIs
StatePublished - 2024
Event10th IEEE International Power Electronics and Motion Control Conference, IPEMC 2024 ECCE Asia - Chengdu, China
Duration: 17 May 202420 May 2024

Publication series

Name2024 IEEE 10th International Power Electronics and Motion Control Conference, IPEMC 2024 ECCE Asia

Conference

Conference10th IEEE International Power Electronics and Motion Control Conference, IPEMC 2024 ECCE Asia
Country/TerritoryChina
CityChengdu
Period17/05/2420/05/24

Keywords

  • Anomaly detection
  • Capacitor
  • LS-SVM
  • Reliability modeling

Fingerprint

Dive into the research topics of 'LS-SVM based capacitor anomaly identification method'. Together they form a unique fingerprint.

Cite this