100% found this document useful (6 votes)
25 views

PDF Intelligent Computing & Optimization Pandian Vasant download

Pandian

Uploaded by

sahmihayor
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (6 votes)
25 views

PDF Intelligent Computing & Optimization Pandian Vasant download

Pandian

Uploaded by

sahmihayor
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

Experience Seamless Full Ebook Downloads for Every Genre at textbookfull.

com

Intelligent Computing & Optimization Pandian


Vasant

https://textbookfull.com/product/intelligent-computing-
optimization-pandian-vasant/

OR CLICK BUTTON

DOWNLOAD NOW

Explore and download more ebook at https://textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Smart and Sustainable Intelligent Systems Sustainable


Computing and Optimization 1st Edition Namita Gupta
(Editor)
https://textbookfull.com/product/smart-and-sustainable-intelligent-
systems-sustainable-computing-and-optimization-1st-edition-namita-
gupta-editor/
textboxfull.com

Intelligent Computing Systems Carlos Brito-Loeza

https://textbookfull.com/product/intelligent-computing-systems-carlos-
brito-loeza/

textboxfull.com

Intelligent Computing: Proceedings of the 2018 Computing


Conference, Volume 2 Kohei Arai

https://textbookfull.com/product/intelligent-computing-proceedings-of-
the-2018-computing-conference-volume-2-kohei-arai/

textboxfull.com

Intelligent Computing Proceedings of the 2020 Computing


Conference Volume 3 Kohei Arai

https://textbookfull.com/product/intelligent-computing-proceedings-of-
the-2020-computing-conference-volume-3-kohei-arai/

textboxfull.com
Intelligent Computing Proceedings of the 2020 Computing
Conference Volume 2 Kohei Arai

https://textbookfull.com/product/intelligent-computing-proceedings-of-
the-2020-computing-conference-volume-2-kohei-arai/

textboxfull.com

Intelligent Computing Proceedings of the 2020 Computing


Conference Volume 1 Kohei Arai

https://textbookfull.com/product/intelligent-computing-proceedings-of-
the-2020-computing-conference-volume-1-kohei-arai/

textboxfull.com

Intelligent Computing Theories and Application De-Shuang


Huang

https://textbookfull.com/product/intelligent-computing-theories-and-
application-de-shuang-huang/

textboxfull.com

Intelligent Computing and Internet of Things Kang Li

https://textbookfull.com/product/intelligent-computing-and-internet-
of-things-kang-li/

textboxfull.com

Optimization Models in Steganography Using Metaheuristics


Intelligent Systems Reference Library 187 Sarmah

https://textbookfull.com/product/optimization-models-in-steganography-
using-metaheuristics-intelligent-systems-reference-library-187-sarmah/

textboxfull.com
Advances in Intelligent Systems and Computing 866

Pandian Vasant
Ivan Zelinka
Gerhard-Wilhelm Weber Editors

Intelligent
Computing &
Optimization
Advances in Intelligent Systems and Computing

Volume 866

Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: kacprzyk@ibspan.waw.pl
The series “Advances in Intelligent Systems and Computing” contains publications on theory,
applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all
disciplines such as engineering, natural sciences, computer and information science, ICT, economics,
business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the
areas of modern intelligent systems and computing such as: computational intelligence, soft computing
including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms,
social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and
society, cognitive science and systems, Perception and Vision, DNA and immune based systems,
self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics including
human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent
data analysis, knowledge management, intelligent agents, intelligent decision making and support,
intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings
of important conferences, symposia and congresses. They cover significant recent developments in the
field, both of a foundational and applicable character. An important characteristic feature of the series is
the short publication time and world-wide distribution. This permits a rapid and broad dissemination of
research results.

Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: nikhil@isical.ac.in
Members
Rafael Bello Perez, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba
e-mail: rbellop@uclv.edu.cu
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: escorchado@usal.es
Hani Hagras, University of Essex, Colchester, UK
e-mail: hani@essex.ac.uk
László T. Kóczy, Széchenyi István University, Győr, Hungary
e-mail: koczy@sze.hu
Vladik Kreinovich, University of Texas at El Paso, El Paso, USA
e-mail: vladik@utep.edu
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan
e-mail: ctlin@mail.nctu.edu.tw
Jie Lu, University of Technology, Sydney, Australia
e-mail: Jie.Lu@uts.edu.au
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: epmelin@hafsamx.org
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: nadia@eng.uerj.br
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland
e-mail: Ngoc-Thanh.Nguyen@pwr.edu.pl
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: jwang@mae.cuhk.edu.hk

More information about this series at http://www.springer.com/series/11156


Pandian Vasant Ivan Zelinka

Gerhard-Wilhelm Weber
Editors

Intelligent Computing &


Optimization

123
Editors
Pandian Vasant Gerhard-Wilhelm Weber
Department of Fundamental and Applied Institute of Applied Mathematics
Sciences METU
Universiti Teknologi Petronas Ankara, Ankara, Turkey
Tronoh, Perak, Malaysia

Ivan Zelinka
Faculty of Electrical Engineering
and Computer Science
VŠB TU Ostrava
Ostrava, Czech Republic

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-3-030-00978-6 ISBN 978-3-030-00979-3 (eBook)
https://doi.org/10.1007/978-3-030-00979-3

Library of Congress Control Number: 2018955576

© Springer Nature Switzerland AG 2019


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

The first edition of the International Conference on Intelligent Computing and


Optimization (ICO 2018) will be held during October 4–5, 2018, at Hard Rock
Hotel Pattaya in Pattaya, Thailand. The objective of the international conference is
to bring together the global research scholars, experts, and scientists in the research
areas of Intelligent Computing and Optimization from all over the world to share
their knowledge and experiences on the current research achievements in these
fields. This conference provides a golden opportunity for global research commu-
nity to interact and share their novel research results, findings, and innovative
discoveries among their colleagues and friends. The proceedings of ICO 2018 is
published by Springer (Advances in Intelligent Systems and Computing) and
indexed by DBLP, EI, Google Scholar, Scopus, and Thomson ISI.
For this edition, the conference proceedings covered the innovative, original, and
creative research areas of sustainability, smart cities, meta-heuristics optimization,
cyber security, block chain, big data analytics, IoTs, renewable energy, artificial
intelligence, power systems, reliability, and simulation. The authors are very
enthusiastic to present the final presentation at the conference venue of Hard Rock
Hotel in Pattaya, Thailand. The organizing committee would like to sincerely thank
all the authors and the reviewers for their wonderful contribution for this confer-
ence. The best and high-quality papers have been selected and reviewed by
International Program Committee in order to publish in Advances in Intelligent
System and Computing by Springer.
ICO 2018 will be an eye-opener for the research scholars across the planet in the
research areas of innovative computing and novel optimization techniques and with
the cutting-edge methodologies. This conference could not have been organized
without the strong support and help from the staff members of Hard Rock Hotel
Pattaya, Springer, Click Internet Traffic Sdn Bhd, and the organizing committee of
ICO 2018. We would like to sincerely thank Prof. Igor Litvinchev (Nuevo Leon
State University (UANL), Mexico), Prof. Nikolai Voropai (Energy Systems
Institute SB RAS, Russia), and Waraporn Nimitsuphachaisin (Hard Rock Hotel
Pattaya) for their great help and support in organizing the conference.

v
vi Preface

We also appreciate the fruitful guidance and support from Prof. Gerhard
Wilhelm Weber (Poznan University of Technology, Poland; Middle East Technical
University, Turkey), Prof. Rustem Popa (“Dunarea de Jos” University in Galati,
Romania), Prof. Valeriy Kharchenko (Federal Scientific Agroengineering
Center VIM, Russia), Dr. Wonsiri Punurai (Mahidol University), Prof. Milun Babic
(University of Kragujevac, Serbia), Prof. Ivan Zelinka (VSB-TU Ostrava, Czech
Republic), Dr. Jose Antonio Marmolejo (Universidad Anahuac Mexico Norte,
Mexico), Prof. Gilberto Perez Lechuga (University of Autonomous of Hidalgo
State, Mexico), Prof. Ugo Fiore (Federico II University, Italy), Prof. Weerakorn
Ongsakul (Asian Institute of Technology, Thailand), Prof. Rui Miguel Silva
(Portugal), Mr. Sattawat Yamcharoew (Sparrow Energy Corporation, Thailand),
Mr. K. C. Choo (CO2 Networks, Malaysia), and Dr. Vinh T. Le (Ton Duc Thang
University, Vietnam).
Our book of proceedings provides a premium reference to graduate and post-
graduate students, decision makers, and investigators in private domains, univer-
sities, traditional and emerging industries, governmental and non-governmental
organizations, in the fields of various operational research, AI, geo- and earth
sciences, engineering, management, business, and finance, where ever one has to
represent and solve uncertainty-affected practical and real-world problems. In the
forthcoming times, mathematicians, statisticians, computer scientists, game theo-
rists and economists, physicist, chemists, representatives of civil, electrical, and
electronic engineering, but also biologists, scientists on natural resources, neuro-
scientists, social scientists, and representatives of the humanities, are warmly
welcome to enter into this discourse and join the collaboration for reaching even
more advanced and sustainable solutions. It is well understood that predictability in
uncertain environments is a core request and an issue in all fields of engineering,
science, and management. In this regard, this proceedings book is following a quite
new perspective; eventually, it has the promise to become very significant in both
academia and practice and very important for mankind!
Finally, we would like to sincerely thank Dr. Thomas Ditzinger, Dr. Almas
Schimmel, and Ms. Parvathi Krishnan of Springer for the wonderful help and
support in publishing ICO 2018 conference proceedings in Advances in Intelligent
Systems and Computing.

October 2018 Pandian Vasant


Gerhard-Wilhem Weber
Ivan Zelinka
Contents

А System for Monitoring the Number and Duration of Power Outages


and Power Quality in 0.38 kV Electrical Networks . . . . . . . . . . . . . . . . 1
Alexander Vinogradov, Vadim Bolshev, Alina Vinogradova,
Tatyana Kudinova, Maksim Borodin, Anastasya Selesneva,
and Nikolay Sorokin
A Novel Application of System Survival Signature in Reliability
Assessment of Offshore Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Tobias-Emanuel Regenhardt, Md Samdani Azad, Wonsiri Punurai,
and Michael Beer
Security Assurance Against Cybercrime Ransomware . . . . . . . . . . . . . . 21
Habib ur Rehman, Eiad Yafi, Mohammed Nazir, and Khurram Mustafa
SAR: A Graph-Based System with Text Stream Burst
Detection and Visualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Tham Vo Thi Hong and Phuc Do
Detection of Black Hole Attacks in Mobile Ad Hoc
Networks via HSA-CBDS Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Ahmed Mohammed Fahad, Abdulghani Ali Ahmed,
Abdullah H. Alghushami, and Sammer Alani
Network Intrusion Detection Framework Based on Whale Swarm
Algorithm and Artificial Neural Network in Cloud Computing . . . . . . . 56
Ahmed Mohammed Fahad, Abdulghani Ali Ahmed,
and Mohd Nizam Mohmad Kahar
The ‘Smart’ as a Project for the City Smart Technologies
for Territorial Management Planning Strategies . . . . . . . . . . . . . . . . . . 66
Cinzia Bellone and Vasiliki Geropanta

vii
viii Contents

The ‘Governance’ for Smart City Strategies


and Territorial Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Cinzia Bellone, Pietro Ranucci, and Vasiliki Geropanta
T-MPP: A Novel Topic-Driven Meta-path-Based Approach
for Co-authorship Prediction in Large-Scale Content-Based
Heterogeneous Bibliographic Network in Distributed Computing
Framework by Spark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Phuc Do, Phu Pham, Trung Phan, and Thuc Nguyen
Optimization of Hybrid Wind and Solar Renewable Energy System
by Iteration Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Diriba Kajela Geleta and Mukhdeep Singh Manshahia
Modeling of Solar Photovoltaic Thermal Modules . . . . . . . . . . . . . . . . . 108
Vladimir Panchenko, Valeriy Kharchenko, and Pandian Vasant
Thermo Physical Principles of Cogeneration Technology
with Concentration of Solar Radiation . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Peter Nesterenkov and Valeriy Kharchenko
Artificial Bee Colony Algorithm for Solving the Knight’s
Tour Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Anan Banharnsakun
The Model of Optimization of Grain Drying with Use
of Eletroactivated Air . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Dmitry Budnikov and Alexey N. Vasilev
Model of Improved a Kernel Fast Learning Network Based
on Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Mohammed Hasan Ali and Mohamed Fadli Zolkipli
Vehicular Ad Hoc Network: An Intensive Review . . . . . . . . . . . . . . . . . 158
Ayoob A. Ayoob, Gang Su, and Muamer N. Mohammed
Optimization of the Parameters of the Elastic Damping Mechanism
in Class 1,4 Tractor Transmission for Work in the Main
Agricultural Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Sergey Senkevich, Vladimir Kravchenko, Veronika Duriagina,
Anna Senkevich, and Evgeniy Vasilev
Energy-Efficient Pasteurizer of Liquid Products Using
IR and UV Radiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Dmitry Tikhomirov, Alexey Kuzmichev, Sergey Rastimeshin,
Stanislav Trunov, and Stepan Dudin
CAIAS Simulator: Self-driving Vehicle Simulator for AI Research . . . . 187
Sabir Hossain, Abdur R. Fayjie, Oualid Doukhi, and Deok-jin Lee
Contents ix

Vision-Based Driver’s Attention Monitoring System


for Smart Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Lamia Alam and Mohammed Moshiul Hoque
Characterizing Current Features of Malicious Threats on Websites . . . 210
Wan Nurulsafawati Wan Manan, Abdul Ghani Ali Ahmed,
and Mohd Nizam Mohmad Kahar
A Deep Learning Framework on Generation of Image Descriptions
with Bidirectional Recurrent Neural Networks . . . . . . . . . . . . . . . . . . . 219
J. Joshua Thomas and Naris Pillai
Feature of Operation PV Installations with Parallel and Mixed
Commutation Photocells . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Pavel Kuznetsov and Leonid Yuferev
The Functional Dependencies of the Drying Coefficient for the Use
in Modeling of Heat and Moisture-Exchange Processes . . . . . . . . . . . . . 239
Alexey N. Vasilyev, Alexey A. Vasilyev, and Dmitriy A. Budnikov
Investigation Model for Locating Data Remnants on Cloud Storage . . . 246
Khalid Abdulrahman, Abdulghani Ali Ahmed,
and Muamer N. Mohammed
An Intelligent Expert System for Management Information System
Failure Diagnosis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Kamal Mohammed Alhendawi and Ala Aldeen Al-Janabi
Fuzz Test Case Generation for Penetration Testing in Mobile Cloud
Computing Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Ahmad Salah Al-Ahmad and Hasan Kahtan
Application of Travelling Salesman Problem for Minimizing Travel
Distance of a Two-Day Trip in Kuala Lumpur via Go KL City Bus . . . 277
Wan Nor Ashikin Wan Ahmad Fatthi, Mea Haslina Mohd Haris,
and Hasan Kahtan
An Analysis of Structure Heterogeneity of Lithium Silicate Melts . . . . . 285
Vu Tri Vien, Mai Van Dung, Nguyen Manh Tuan, Tran Thanh Nam,
and Le The Vinh
Mathematical Modeling of the Work of the Flow-Meter
Flowmeter-Doser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Alexey N. Vasilyev, Alexey A. Vasilyev, Dmitry A. Shestov,
Denis V. Shilin, and Pavel E. Ganin
Framework for Faction of Data in Social Network Using Link Based
Mining Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
B. Bazeer Ahamed and D. Yuvaraj
x Contents

Application of Various Computer Tools for the Optimization


of the Heat Pump Heating Systems with Extraction of Low-Grade
Heat from Surface Watercourses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
A. Sychov, V. Kharchenko, P. Vasant, and G. Uzakov
Epilepsy Detection from EEG Signals Using Artificial
Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Amer A. Sallam, Muhammad Nomani Kabir, Abdulghani Ali Ahmed,
Khalid Farhan, and Ethar Tarek
Evaluation of the Silicon Solar Cell Parameters . . . . . . . . . . . . . . . . . . . 328
Valeriy Kharchenko, Boris Nikitin, Pavel Tikhonov, Vladimir Panchenko,
and Pandian Vasant
Optimization of Microclimate Parameters Inside
Livestock Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Gennady N. Samarin, Alexey N. Vasilyev, Alexander A. Zhukov,
and Sergey V. Soloviev
Blockchain Technology in Smart City: A New Opportunity for Smart
Environment and Smart Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
F. Orecchini, A. Santiangeli, F. Zuccari, Alessandra Pieroni,
and Tiziano Suppa
Trend Detection Analyses of Rainfall of Whole India for the Time
Period 1950–2006 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Sanju R. Phulpagar, Sudhansu S. Mohanta, and Ganesh D. Kale
Multi-criteria Decision Making Problems in Hierarchical Technology
of Electric Power System Expansion Planning . . . . . . . . . . . . . . . . . . . . 362
N. I. Voropai
Insight into Microstructure of Lead Silicate Melts from Molecular
Dynamics Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Thanh-Nam Tran, Nguyen Van Yen, Mai Van Dung, Tran Thanh Dung,
Huynh Van Van, and Le The Vinh
A Strategy for Minimum Time Equilibrium Targetting
in Epidemic Diseases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Manuel De la Sen, Asier Ibeas, Santiago Alonso-Quesada, and Raul Nistal
A Hybrid Approach for the Prevention of Railway Accidents Based
on Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Habib Hadj-Mabrouk
Visual Analytics Solution for Scheduling Processing Phases . . . . . . . . . . 395
J. Joshua Thomas, Bahari Belaton, Ahamad Tajudin Khader, and Justtina
Contents xi

Investigation of Emotions on Purchased Item Reviews Using Machine


Learning Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
P. K. Kumar, S. Nandagopalan, and L. N. Swamy
Algorithms for a Bit-Vector Encoding of Trees . . . . . . . . . . . . . . . . . . . 418
Kaoutar Ghazi, Laurent Beaudou, and Olivier Raynaud
Dynamic Programming Solution to ATM Cash Replenishment
Optimization Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Fazilet Ozer, Ismail Hakki Toroslu, Pinar Karagoz, and Ferhat Yucel
Prediction of Crop Yields Based on Fuzzy Rule-Based System (FRBS)
Using the Takagi Sugeno-Kang Approach . . . . . . . . . . . . . . . . . . . . . . . 438
Kalpesh Borse and Prasit G. Agnihotri
Land Use Land Cover Analysis of Khapri Watershed in Dang
District Using Remote Sensing (RS) and Geographical Information
System (GIS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Ashish Guruji and Prasit Agnihotri
Recovery Method of Supply Chain Under Ripple Effect: Supply Chain
Event Management (SCEM) Application . . . . . . . . . . . . . . . . . . . . . . . . 455
Fanny Palma, Jania A. Saucedo, and José A. Marmolejo
Investigating the Reproducibility and Generality of the Pilot
Environmental Performance Index (EPI 2006) . . . . . . . . . . . . . . . . . . . . 466
Tatiana Tambouratzis, Angela Mathioudaki, and Kyriaki Bardi
New Smart Power Management Hybrid System
Photovoltaic-Fuel Cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Mohammed Tarik Benmessaoud, A. Boudghene Stambouli,
Pandian Vasant, S. Flazi, H. Koinuma, and M. Tioursi
Deep Convolutional Network Based Saliency Prediction for Retrieval
of Natural Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Shanmugam Nandagopalan and Pandralli K. Kumar
Optimization of Parameters and Operation Modes of the Heat Pump
in the Environment of the Low-Temperature Energy Source . . . . . . . . . 497
Evgenia Tutunina, Alexey Vaselyev, Sergey Korovkin,
and Sergey Senkevich
A Data Confidentiality Approach to SMS on Android . . . . . . . . . . . . . . 505
Tun Myat Aung, Kaung Htet Myint, and Ni Ni Hla
Analysis of Attribute-Based Secure Data Sharing with Hidden Policies
in Smart Grid of IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515
Nishant Doshi
xii Contents

A Single Allocation P-Hub Maximal Covering Model for Optimizing


Railway Station Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
Sunarin Chanta and Ornurai Sangsawang
Path-Relinking for Fire Station Location . . . . . . . . . . . . . . . . . . . . . . . . 531
Titima Srianan and Ornurai Sangsawang
Modeling and Optimization of Flexible Manufacturing Systems:
A Stochastic Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539
Gilberto Pérez Lechuga and Francisco Martínez Sánchez
Monkey Algorithm for Packing Circles with Binary Variables . . . . . . . 547
Rafael Torres-Escobar, José Antonio Marmolejo-Saucedo, Igor Litvinchev,
and Pandian Vasant
Machine Learning Applied to the Measurement of Quality
in Health Services in Mexico: The Case of the Social Protection
in Health System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560
Roman Rodriguez-Aguilar, Jose Antonio Marmolejo-Saucedo,
and Pandian Vasant
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
А System for Monitoring the Number
and Duration of Power Outages and Power
Quality in 0.38 kV Electrical Networks

Alexander Vinogradov1, Vadim Bolshev1(&), Alina Vinogradova1,


Tatyana Kudinova2, Maksim Borodin2, Anastasya Selesneva2,
and Nikolay Sorokin2
1
Federal Scientific Agroengineering Centre VIM, 1-St Institutsky Proezd, 5,
109428 Moscow, Russia
{winaleksandr,alinawin}@rambler.ru,
vadimbolshev@gmail.com
2
Orel State Agrarian University named after N.V. Parakhin, General Rodin Str.,
69, 302019 Orel, Russia
{t.kudinova77,anastasiya.selezneva.1995}@mail.ru,
maksimka-borodin@yandex.ru, sorokinnc@rambler.ru

Abstract. The proposed system for monitoring number and duration of power
outages and power quality in 0.38 kV power networks makes it possible to
shorten the power supply restoration time by approximately one hour by
reducing the time for obtaining information about the damage and by approx-
imately one hour by the reduction of the time for determining the location and
type of damage. Besides, the effect can also be obtained by minimizing power
quality inconsistency time with the standardized values. The sensors of the
monitoring system are proposed to be located at customer inputs or at several
network points, for example, at the beginning, in the middle or at the end of the
power network as well as at the transformer substation bus bars.

Keywords: Power supply reliability  Power quality


Monitoring power supply reliability  Monitoring power quality
Power supply restoration time

1 Introduction

The power supply system efficiency can be assessed by the indices of power supply
reliability and power quality. The methods and means for improving power supply
reliability and power quality (PQ) [1, 2] are considered in publications of different
authors. As such measures the use of the technical condition monitoring of transmis-
sion lines and network equipment operating modes are considered, which makes it
possible to identify and prevent the causes of failures in the networks [3–5]. Much
attention is paid to the development of technical and economic mechanisms to stim-
ulate consumers and electric grid companies to increase power quality parameters [6].
The works of both Russian and foreign researchers are devoted to this subject [7–16].

© Springer Nature Switzerland AG 2019


P. Vasant et al. (Eds.): ICO 2018, AISC 866, pp. 1–10, 2019.
https://doi.org/10.1007/978-3-030-00979-3_1
2 A. Vinogradov et al.

2 Materials and Methods

Structure analysis of power supply restoration time after network failures made it
possible [17, 18] to determine it by the formula:

trest: ¼ tinf :obt: þ tinf :rec: þ trep: þ tharmonize ð1Þ

where tinf :obt: is the time of infornation obtaining, h.; tinf :rec: is the time for information
recognizing, h.; trep: is the time for repairing damage, h.; tharmonize is the time to
harmonize connection and disconnection, h.
The power supply restoration time can be reduced significantly by the implemen-
tation of a monitoring systems that controls the power outages and the voltage devi-
ation and automatically informs the dispatcher about the outages on specific network
sections.
The damage from power supply outages of consumers depends on the duration of
power outage in a network supplying consumers and the type of disconnected con-
sumers [19, 20]. The causes of outages may be wire breaks in any part of the power
lines, short circuits in the line, a power failure on the 10 kV side etc. Depending on the
cause, outages can occur either for all consumers connected to the network under
consideration, or for a part of consumers, for example, when a wire breaks. The more
sensors of outages and voltage deviations the monitoring system has, the more infor-
mative it is, the more situations in the monitored network can be recognized. The most
rational option is the installation of the sensors at the input of each consumer. But this
variant of sensor placement can lead to a rise in the cost of a system, therefore, in case
of insufficient budget the sensors can be installed in several points of the network, for
example at the beginning, in the middle and at the end of the transmission line as well
as on the buses of the transformer substation. This will allow having the information
about the status of the whole network and monitoring the main network parameters on
its different section.
In works [6, 21] it was justified that the sensors for monitoring power quality
indices were worth to install at customer inputs as well as the sensors of power supply
reliability. It is proposed to control the parameters of power quality using information
obtained from these sensors. The combination of monitoring of power supply outages
and power quality indices along with the automated measuring and the electric power
fiscal (or technical) accounting is promising. Theoretically, such an opportunity exists.
At present, a rather wide range of metering devices equipped with means to monitor
power outages and power quality is produced. This is a series of MAYAK meters,
meters of signal frequency receivers equipped with the corresponding functions. But
practically these possibilities are not used. Firstly, this is due to the impossibility to
read and send the specified information remotely via AMISEPFA channels because
they are used only for power consumption data transmission. The information about
power outages in these meters are only stored in the meter archive. Secondly, the use of
meters equipped with all the necessary capabilities is quite expensive. They are several
times more expensive than meters transmitting data only about power consumption. In
addition, consumer energy meters send information about power outages occurring in
the internal consumer network without getting information about their reasons.
А System for Monitoring the Number and Duration 3

Although power outages might be caused by switching off in the external network,
tripouting a switching device at the customer input or even the disconnection by the
customer for servicing the wiring.

3 Results

A variant of the sensor location scheme that allows taking into account number and
duration of power outages as well as the voltage deviation is shown in Fig. 1.

Fig. 1. Scheme of the device for monitoring number and duration of power outages and voltage
deviation level at the consumer inputs.

The sensor circuit (Fig. 1) contains the switching device SD 1, the voltage sensor
VS 2, the overvoltage sensor OVS 13, the undervoltage sensor UVS 14, the short-
circuit sensor SCS 4, the overload sensor OLS 5, the information processing unit IPU
10, the NOT 3 element, the NOT 7 element, the OR 6 element, the AND 8 element, the
element Memory 9, Data Acquisition and Transmission Device DATD 11, the data
from which are transferred to the the electric grid company dispatcher EGCD 12.
In the normal operation mode there is voltage in the power transmission line
supplying a consumer and there is no overload or short circuit in the internal network of
the consumer. Thus the signal is present at the output of the voltage sensor VS 2 and
there is no signal at the outputs of the elements SCS 4 and OLS 5. There is also no
signal from the outputs of the sensors OVS 13 and UVS 14. In this case, the output of
NOT7 is signaled to one of the inputs of the AND 8 element, and there is no signal at
the outputs of the elements NOT 3, OR 6, AND 8, Memory 8, Memory 11. In this case,
the signal from the output of the voltage sensor VS 2 is sent to reset the element
Memory 9. The circuit does not start.
At the moment of failure in the transmission line, the voltage at the consumer input
disappears, that is, the signal from the output of the element VS 2 disappears.
Accordingly the signal appears at the output of NOT 3, which is fed to the input of the
AND 8 element. If there are no signals at the sensor outputs the short-circuit current of
the SCS 4 and the overload sensor OLS 5, the signal at the output of the NOT 7
element is present and fed to the second input of the AND 8 element. At both inputs
AND 8 there are signals, hence a signal will appear at its output, which will be
4 A. Vinogradov et al.

memorized by the Memory 9 element and transmitted to the information processing


unit IPU 10. The IPU 10 stores the fact of power outages and its duration. The
disconnection signal is transmitted via the DATD 11 to the electric grid company
dispatcher (EGCD 12). When the voltage in the transmission line is restored, the VS 2
sensor will detect its presence, the signal with VS 2 will “reset” the element Memory 9,
the circuit will return to its original state.
In case if a short-circuit current appears in the consumer’s internal network and
after its disappearing there is the voltage in the power line, the circuit will work as
follows. At the moment of the short-circuit current appearance at the output of the SCS
4 element there will be a signal which will be fed to the input of the OR 6 element and
from its output to the input of the NOT 7 element and also to the information pro-
cessing unit IPU 10. IPU 10 unit fixes the facts of the short-circuit current and over-
loads in the internal network of the consumer. At the output of the element NOT 7, the
signal during the period of the presence of short-circuit current will be absent. At the
same time the short-circuit current in the consumer network will cause a failure in the
input voltage. As a result, the signal will disappear at the output of the sensor VS 2 and
at the output of the element NOT 3 the signal appears that it will feed one of the inputs
of the element AND 8. But the signal at the AND 8 output will not appear because of
the signal absence at its second input. After the short-circuit current has disappeared
because of the switching device disconnection, the signal from the SCS 4 output will
disappear as well. The voltage level at the input will return, a signal will appear at the
output of the VS 2 and the signal at the output of the NOT 3 will disappear. The circuit
will not start. Thus in this operation mode the block IPU 10 will detect the fact of a
short circuit in the consumer network without switching off the input voltage.
In case if short circuit current occures in the internal network of the consumer and
there is non-selective tripping of the switch installed in the power line, the circuit will
work as follows. At the moment of the appearance of the short circuit current, at the
output of the element SCS 4 there will be a signal that will be fed to the input of the OR
6 element. A signal from the OR 6 element will be sent to the input of the element NOT
7 and to the information processing unit IPU 10. unit IPU 10 fixes the facts of short
circuit and overloading in the internal network of the consumer. At the output of the
element NOT 7 the signal during the period of the short-circuit current will be absent.
At the same time a short circuit in the consumer’s network will cause a voltage drop at
the input. As a result the signal will disappear at the output of the VS 2 sensor and will
appear at the output of the element NOT 3 and be fed to one of the inputs of the AND 8
element. Due to the absence of a signal at its second input during the short-circuit
current flow the element AND 8 will not work and the signal at its output will not
appear. Also, the signal will appear at the output of the UVS 14 element and will be fed
to the IPU 10. After the short-circuit current has disappeared due to the disconnection
of the switching device installed in the power line, the signal from the output of the
SCS 4 will disappear. But due to the nonselective disconnection of the switching
device in the line, the voltage at the consumer input will disappear as well. Therefore,
the signal at the output of the VS 2 will not appear and the signal at the output of the
NOT 3 will not disappear. Thus, signals will be fed to both inputs of AND 8, and a
signal will appear at its output. This signal, memorized by the element Memory 9, will
be fed to the input of the block IPU 10. The fact and duration of the voltage outage at
А System for Monitoring the Number and Duration 5

the consumer input will be fixed by this unit. Also, in this operation mode the block
IPU 10 will detect a short circuit in the customer network. The information about these
facts will be stored in the IPU and will be transmitted through the DATD and the
corresponding data transmitting channel to the dispatcher.
If there is an overload in the internal network of the consumer and after its dis-
appearance the voltage in the transmission line does not disappear, the circuit will work
as follows. At the moment of the overload current appearance a signal will appear at the
output of the element OLS 5 which will be fed to the input of the element OR 6. From
the output of the element OR 6 the signal will come to the input of the element NOT 7
as well as to the information processing unit IPU 10, which fixes the facts of the short
circuit and overloads in the consumer internal network. During the presence of the
overload current the signal at the output of the element NOT 7 will be absent. At the
output of the sensor VS 2 the signal will not disappear, so a signal at the output of the
element NOT 3 will not appear. Because there is no signal on one of the inputs, the
element AND 8 will not work and there will be no the signal at its output. After a
consumer switching device get be disconnected the overload current will disappear and
the signal from the output of OLS 5 disappears as well. Thus, in this operation mode
the IPU 10 unit will record the fact of an overload in the consumer’s network without
switching off the input voltage.
The situation where there is the non-selective disconnection of a power line
switching device during an overload in the consumer network is generally analogous to
the situation of non-selective triggering of the switching device during a short circuit in
the consumer network The difference is that the input signal of the element OR 6 will
be fed from the sensor OLS 5 instead of the element SCS 4. In this case the block IPU
10 will fix a disconnection in the line as well as an overload in the consumer network.
Both the history of accounting number and duration of power outages and the facts
of short circuits and overloads in the consumer network are stored in the memory of
IPU 10 in the form of protocols; all these data can be transferred to the dispatching
office of the electric grid company.
In case of exceeding the voltage deviation level in one or another side of the
normalized value, a signal will appear at the output of the high-voltage sensors OVS 13
or the low-voltage sensors UVS 14, which will be transmitted to the IPU 10 and further
to the dispatching office of the electric grid company.
Thus, the supposed device supports automatic calculation of the amount of the
consumed power, accounting of the number and duration of power outages, monitoring
and recording of emergency situations in the consumer network along with and voltage
drops in the consumer electrical network. The information on the discrepancy of the
voltage deviation is sent to the block IPU 10 and transmitted by means of the data
transfer device via one of the channels (PLC, JPS, JPRS, Glonass, radio…) to the
electric grid company dispatcher (EGCD 12).
Using the devices mentioned above the system for monitoring number and duration
of power outages and the power quality in electrical networks of 0.38 kV can be
performed as follows. The sensors for monitoring power quality indices and sensors for
recording number and duration of power outages can be installed at the consumer
inputs (in the simplest case only the level of voltage deviation at the customer input can
be used as a monitored power quality index). Both types of sensors can be combined
6 A. Vinogradov et al.

into one device (for example, a device for monitoring number and duration of power
outages and voltage deviation - DMNDCandVD).
The information from the DMNDCandVD goes to the data processing unit and is
transmitted by means of the data transfer device via one of the channels to the electric
grid company dispatcher (EGCD) (Fig. 2).

Fig. 2. System for monitoring the quantuty and duration of power outages and the power quality
in 0.38 kV electrical networks

According to the Fig. 2 TS is a Transformer Substation; DMNDCandVD is the


Device for Monitoring Number and Duration of Power Outages and Voltage Deviation;
S1… Sn are Consumers; EGCD is the Electric Grid Company Dispatcher; DATD is the
Data Acquisition and Transmission Device.
The system works as follows. The information from the DMNDCandVD of each
consumer is collected in the DATD and sent to the EGCD. There on the basis of this
information a company dispatcher make decisions about the need for voltage regulation
or for sending a repair team. The DMNDCandVD is also installed at the TS and
connected to TS buses. This device monitors voltage deviation and voltage loss on the
TS buses. The information about this is transmitted to the EGCD by means of the
DATD. The DMNDCandVD installed on outgoing transmission lines from the TS
work similarly. They are connected after the automatic switches of outgoing trans-
mission lines and monitor voltage disappearance, voltage deviation at the beginning of
the transmission lines. If a power scheme do not has a back-up power and the moni-
toring task of voltage deviation is not required, the control of power outages can be
made cheaper by installing voltage monitoring devices on transformer substation buses
and on outgoing lines. In this case the voltage disappearance on the transmission line
shows electricity supply interruption for the consumers connected to it. The voltage
А System for Monitoring the Number and Duration 7

disappearance on the transformer substation buses shows the power supply interruption
for all consumers connected to the TS. But this method is not acceptable if transmission
lines are equipped with means of automatic transfer switch, partitioning means and if it
is also necessary to control voltage deviation level at consumer inputs. Therefore, the
system version where all consumers inputs are equipped with the DMNDCandVD are
more justified since it is more functional and allows identifying some network modes
other ways cannot detect. For example, if a wire (of a phase) breaks in the area between
consumers S2 and S3, the signal from the DMNDCandVD installed at the consumer S3
will show the voltage failure presence and the DMNDCandVD installed at the con-
sumer S2 will indicate that the voltage is present. Thus, the system for monitoring
number and duration of power outages will find the place of the break.

4 Discussions

The economic efficiency of the system application can vary depending on the tasks
assigned to it. The system application of monitoring the number and duration of power
outages allows obtaining an economic effect mainly by reducing the power supply
restoration time. In this case the recovery time based on the analysis of works [18, 22]
can be shorten by approximately one hour by reducing the time for obtaining infor-
mation about the damage and by approximately one hour by the reduction of the time
for determining the location and type of damage. In total, the recovery time can be
reduced by approximately 2 h. In determining the effect it is also necessary to take into
account the reliability indices of the network under discussion since they can be dif-
ferent depending on whether the cable or overhead lines which are used in either urban
or rural areas [2].
The effect of reducing the power supply restoration time can be determined as
follows. First, it is required to estimate the failure probability in the considered net-
works during a year. In papers [23, 24] there is literature data on the failure rate for
0.38 kV networks. According to them the failure intensity for 0.38 kV power networks
is 2.7 failures per 100 km during a year, for power transformers is 3.5 failures per
100 km during a year, for the 10 kV overhead lines is 35.9 failures per 100 km during
a year.
For 0.38 kV overhead lines with a length LOL and failure rate of 2.7 failures per
100 km during a year the probable number of failures per year is determined as follows:

2:7  LOL
NOL ¼ failures per year: ð2Þ
100

For power transformers with number ntr and failure rate 3,5 failures per 100 km
during a year the probable number of failures per year is determined as follows:

3:5  nTR
NTR ¼ failures per year: ð3Þ
100
8 A. Vinogradov et al.

The failures number per year for other network elements can be determined
similarly.
The next step is to determine the electricity shortage per year for a given number of
failures for power supply system elements.
The power undersupply is determined by the formula:

Wundersupply ¼ N  Tav  Prat ð4Þ

where Prat - rated power of the load connected to the faulty equipment; Tav - the
average power supply restoration time, which according to [13] is equal to 5.86 h.
The reduction of power undersupply is defined as follows:

Wred: ¼ Wundersupply  Wundersupply:l: ð5Þ

where Wundersupply:l: – power undersupply when implementing a monitoring system.


In the above sequence, it is possible to assess the economic damage caused by the
power undersupply to consumers during power outages.
If there is voltage deviation monitoring, the effect of reducing the power supply
restoration time will be added by a number of effects achieved by observing network
voltage regime, which does not deviate beyond the normative values. The calculation
of this effect is described in [25] in detail.

5 Conclusions
1. It is possible to increase power supply system efficiency by monitoring number and
duration of power outages and power quality in 0.38 kV electrical networks. The
proposed system for monitoring number and duration of power outages and power
quality makes it possible to shorten the power supply restoration time and to obtain
the necessary data on network operating modes and network failures.
2. The sensors for monitoring power outages and power quality are proposed to be
located at the consumer inputs or at several network points, for example at the
beginning, in the middle and at the end of transmission lines as well as on trans-
former substation buses. It makes it possible to expand the system informativeness
and the possibilities of using it to diagnose failures in a controlled network.
3. Economic efficiency of the system is achieved mainly by reducing the power supply
restoration time. The power supply restoration time can be reduced by approxi-
mately 1 h by reducing the time for obtaining information about the damage and
approximately 1 h by reducing the time for determining the location and the type of
damage. Thus, the recovery time on average can be reduced by 2 h. Besides, the
effect can also be obtained by minimizing power quality inconsistency time with the
standardized values.
А System for Monitoring the Number and Duration 9

References
1. Vinogradov, A., Vinogradova, A.: Improving the Reliability of Electricity Supply for Rural
Consumers by Sectioning and Reserving 0.38 kV Transmission Lines: Monograph.
Publishing House of FSBEI HE Orel State Agrarian University (2016)
2. Leschinskaya, T., Magadeyev, E.: Methodology for Choosing the Optimal Option to
Improve the Reliability of Power Supply to Agricultural Consumers. Publishing House of
FSBEI HPE Moscow State Agroengineering University (2008)
3. Vinogradov, A., Sinyakov, A., Semenov, A.: Computer program for choosing a monitoring
system for the technical condition of overhead power lines. Sci. Pract. Mag. Agrotec. Power
Supply 3(12), 52–61 (2016)
4. Kostikov, I.: CAT-1 monitoring system – increase of capacity and reliability in power lines.
Power Eng. 3(38) (2011)
5. Samarin, A., Rygalin D, Shklyaev, A.: Modern technologies of monitoring of electric power
networks of power lines. Natural and technical sciences, 2(58), 341–347 (2012)
6. Borodin, M., Vinogradov, A.: Increase of Efficiency of Electricity Systems Functioning by
Measuring Monitoring of Electricity Quality: Monograph. Publishing House of FSBEI HE
Orel State Agrarian University (2014)
7. Bolshev, V., Vinogradov, A.: Review of foreign sources devoted to increasing the efficiency
of power supply systems. In: Energy Saving and Efficiency in Technical Systems: Materials
of the IV International Scientific and Technical Conference of Students, Young Scientists
and Specialists, pp. 372–373. Tambov State Technical University (2017)
8. Li, J., Song, X., Wang, Yu.: Service restoration for distribution network considering the
uncertainty of restoration time. In: the 3rd International Conference on Systems and
Informatics (ICSAI). IEEE (2016)
9. Orichab, J.: Analysis of the interrelated factors affecting efficiency and stability of power
supply in developing countries. In: AFRICON 2009. IEEE (2009)
10. Gheorghe, S., Tanasa, C., Ene, S., Mihaescu, M. Power quality, energy efficiency and the
performance in electricity distribution and supply companies. In: The 18th International
Conference and Exhibition on Electricity Distribution, Turin. IET (2005)
11. Santarius, P., Krejci, P., Brunclik, Z., Prochazka, K., Kysnar, F.: Evaluation of power quality
in regional distribution networks. In: the 23rd International Conference on Electricity
Distribution. AIM, Lyon (2015)
12. Irwin, L.: Asset management benefits from a wide area power quality monitoring system. In:
The 23rd International Conference on Electricity Distribution. AIM, Lyon (2010)
13. Dhapare, S., Lothe, N., Ramachandran, P.: Power quality monitoring with smart meters. In:
the 23rd International Conference on Electricity Distribution. AIM, Lyon (2015)
14. Saele, H., Foosnas J., Kristoffersen, V., Nordal, T., Grande, O., Bremdal, B.: Network tariffs
and energy contracts. In: The CIRED Workshop “Challenges of Implementing Active
Distribution System Management”. AIM, Rome (2014)
15. Mandatova, P, Massimiano, M., Verreth, D., Gonzalez C.: Network tariff structure for a
smart energy system. In: The CIRED Workshop Challenges of implementing Active
Distribution System Management. AIM, Rome (2014)
16. Goswami, A., Gupta, C., Singh, G.: An analytical approach for assessment of voltage sags.
International Journal of Electric Power Energy Systems, 31(7–8), pp. 418-426 (2009)
17. Vinogradov, A., Vasiliev, A., Semenov, A., Sinyakov, A.: Analysis of the time of breaks in
power supply for rural consumers and methods of reducing it due to monitoring the technical
condition of power lines. Bulletin of All-Russian Institute of Electrification of Agriculture, 2
(27), pp. 3–11. (2017)
10 A. Vinogradov et al.

18. Vinogradov, A., Vasiliev, A., Bolshev, V., Semenov, A., Borodin, M.: Time factor for
determination of power supply system efficiency of rural consumers. In: Kharchenko, V.,
Vasant, P. (eds.), Handbook of Research on Renewable Energy and Electric Resources for
Sustainable Rural Development, pp. 394–420 (2018). https://doi.org/10.4018/978-1-5225-
3867-7.ch017
19. Papkov, B., Osokin, V.: Probabilistic and Statistical Methods for Assessing the Reliability of
Elements and Systems of Electric Power Industry: Theory, Examples, Tasks: Textbook.
Stary Oskol, TNT (2017)
20. Khorolsky, V., Taranov, M., Petrov, D.: Technical and Economic Calculations of Electrical
Distribution Networks. Publishing House Terra Print, Rostov-on-Don (2009)
21. Golikov, I. Vinogradov, A.: Adaptive Automatic Voltage Regulation in Rural Electric
Networks 0.38 kV: Monograph. Publishing House of FSBEI HE Orel State Agrarian
University (2017)
22. Vinogradov, A., Sinyakov, A., Semenov, A.: Analysis of the time of restoration of power
supply to rural consumers in case of power line failures. Theor. Sci. Practical J. Innov.
Agribus. Prob. Prospects 1(13), 12–22 (2017)
23. Semenov, A., Selezneva, A., Vinogradov, A.: Comparison of reliability indicators of air and
cable lines in urban and rural areas. In: The Main Directions of the Development of
Technology in Agrobusiness: The Materials of the VII All-Russian Scientific and Practical
Conference, Knyaginino, pp. 71–75 (2015)
24. Vinogradov, A., Perkov, R.: Analysis of the damage ability of electrical equipment in
electrical networks and measures to improve the reliability of electricity supply to
consumers. Bulletin of the Nizhniy Novgorod State Engineering and Economic Institute, 12
(55), pp.12–20. (2015)
25. Perova, M: Economic Problems and Prospects of Qualitative Power Supply of Agricultural
Consumers in Russia, Moscow (2007)
A Novel Application of System Survival
Signature in Reliability Assessment
of Offshore Structures

Tobias-Emanuel Regenhardt1 , Md Samdani Azad2(B) , Wonsiri Punurai2 ,


and Michael Beer1
1
Institute for Risk and Reliability, Leibniz University Hanover, Callinstrasse 34,
30167 Hanover, Germany
regenhardt@irz.uni-hannover.de
2
Department of Civil and Environmental Engineering, Mahidol University,
25/25 Putthamonthon, Nakhon Pathom 73170, Thailand
mdsamdani.aza@student.mahidol.ac.th

Abstract. Offshore platforms are large structures consisting of a


large number of components of various types. Thus a variety of
methods are usually necessary to assess the structural reliability of
these structures, ranging from Finite-Elements-methods to Monte-Carlo-
Simulations. However, often reliability information is only available for
the members and not for the overall, complex, system. The recently intro-
duced survival signature provides a way to separate the structural analy-
sis from the behaviour of the individual members. Thus it is then possible
to use structural reliability methods to obtain information about how the
failure of several constituent members of the offshore platform leads to
overall system failure. This way it is possible to separate the structural
from time-dependent information, allowing flexible and computationally
efficient computation of reliability predictions.

Keywords: Structural reliability · Offshore platforms


Survival signature · System reliability

1 Introduction
Offshore jacket platforms are generally used for oil and gas production in shal-
low and intermediate water depths. Adequate performance of the platforms is
ensured by designing for a service life. However, a large numbers of these steel
structures are operating exceeded their design life due to high cost of replace-
ment. Consequently, the safety of these offshore platforms creates strong reasons
to develop effective methods for the reliability assessment.
For large offshore structures, reliability measures usually concern the struc-
tural reliability under the impact of external influences such as fatigue, and cor-
rosion environment. As structural reliability concerns the behavior of an object
under physical conditions, a safety assessment should prove that the risk of
c Springer Nature Switzerland AG 2019
P. Vasant et al. (Eds.): ICO 2018, AISC 866, pp. 11–20, 2019.
https://doi.org/10.1007/978-3-030-00979-3_2
12 T.-E. Regenhardt et al.

structural failure is acceptable. The standard methods give some indications,


such as design code, reserve strength ratio, and a probabilistic value. Design
codes are claimed to be very conservative, as more knowledge of the structure is
gained through some years after design thereby leading to more accurate anal-
ysis results. Methods based on reserve strength ratio can provide insight into
the reserve strength of a structure [12]. The reserve strength ratio (RSR) can
be obtained from the ratio of ultimate load capacity of the structure divided
by the 100 year design load. But it will not cover possible failure modes that
could happen to the structure as it provides information regarding the global
failure phenomenon as well. Structural reliability methods typically account for
the capacity versus loading, particularly deal with uncertainties of structural
loads and their effects as well as resistance [14].
Reliability theories basically developed from the concepts of uncertainties
(wind, wave and earthquake). An incremental loading approach till the ulti-
mate capacity was conducted for structural reliability is delineated. However,
the structural reliability methods are not sufficient measures as they are not
consistent with the derivation of the reliability target levels. This is because the
reliability assessments deliberates the reliability considering the intensity of envi-
ronmental conditions (Loads, Corrosion) but not give enough information over
time rather these provide information over fixed time. To reduce risk, a better
approach is to consider all functional parts of the structure, if present (facili-
ties on offshore platforms, the connections between platforms, pipes, dominant
failure modes etc.), exploring patterns and inter-relationships within subsystems
and seeing undesired events as the products of the working of the system. Some
conventional tools have been used including Failure Tree Analysis (FTA) [11],
Failure Mode and Effects Analysis (FMEA) [9], recently, researchers are pay-
ing more attention to the statistical techniques. For instance, grey correlation
analysis [2], Bayesian Probability [19], Neural network [21], Fuzzy logic evalu-
ation [8,20] and survival signature computing [4] have been applied to the risk
assessments in engineering and related fields.
The aim of this paper is to contribute to offshore reliability assessment by
using the recently developed survival signature formalism [4]. With this formal-
ism it is possible to predict the reliability of a complex system (as, in this case,
an offshore platform) from knowledge about the individual constituents (the
platform members). With this, it is possible to divide the reliability assessment
into two individual steps. Firstly the system structural system is analysed. This
is achieved through finding the combinations of failing members that lead to
total failure of the whole offshore platform. Secondly, the information about the
members’ reliability over time is multiplied with the corresponding entries of the
survival signature to predict the overall reliability.
A Novel Application of System Survival Signature 13

2 The Survival Signature


2.1 System Reliability Applying the Survival Signature
The state of a any system set together of m independent and different compo-
m
nents can be represented by a state vector x ∈ {0, 1} with xi = 0 denoting a
dysfunctional and xi = 1 a functional component i.
m
The global structure function ϕ : {0, 1} → {0, 1} contains information
whether the system is in a working state (ϕ = 1) or not (ϕ = 0 ) for any possible
x. Usually the observed systems are restricted to coherent systems. This refers to
systems with ϕ not decreasing in any dimension of x. This assumption is sound
as most common systems are not becoming dysfunctional while gaining more
functional components. Two additional assumptions are ϕ(0) = 0 and ϕ(1) = 1.
These are intuitive, yet not necessary. However, in this paper the monotonicity
of the system is assumed and thus these two conditions and the coherency of the
system are assumed as well.
For more complex systems, every component belongs to one of K different
types, while each set of components of type k ∈ {1, 2, ..., K} consists of mk
K
elements and the sum of all mk equals the number of components k=1 = m.
The amount of functional components of type k present in the system are denoted
as lk . This leads to mlkk possible combinations of component type k under
the assumption of independent failure of all components. Then the set S(l) is
the collection of all state vectors that fulfil the condition that l = (l1 , l2 , ..., lk )
components are working. The system’s survival signature Φ is now defined as
the probability that the system is functional if exactly lk components of type
k are functional [23]. The survival signature is an array of K dimensions with
mk +1 entries in each dimension (including the case that none of the components
of that type function). For components with exchangeable random failure times
the survival signature is given by
 K   −1
 lk
Φ(l1 , l2, .., lK ) = × ϕ(x). (1)
i=1
mk
x∈S(l)

The survival signature can be applied to the computation of the survival


function of the system: P (TS > t). It provides the probability that a random
failure time TS of the system follows a specific point in time t. This provides the
reliability of the system in time. Under the assumption of the failure times of the
components being independently and identically distributed (iid ), with respect
to a known cumulative distribution function [15]. Fk (t), the survival function of
the system observed is found to be
m0 mk
 K  
 lk l
P (TS > t) = ... Φ(l) × Fk (t)mk −lk [1 − Fk (t)] k . (2)
mk
l1 =0 lk =0 k=1

Equations (1) and (2) indicate show that - for exact computation - many
different states need to be evaluated and that the size of the survival signature
14 T.-E. Regenhardt et al.

itself is growing multilinearly. However, for small- and medium-sized systems


the survival signature can be calculated exactly or by Monte Carlo Simulation
methods. The use of signature frameworks can be useful in several ways. It
seperates the information about the system in two subproblems to be solved. If
the system structure is unchanged, the survival signature stays the same even
if the behaviour of the components changes. Thus testing of components in
simulations is computationally efficient. Additionally, additions to the framework
can easily be done, for example in case of repairable systems [22] or in case of
components with multiple states [5].

2.2 Obtaining the Survival Signature from Structural Simulations

The calculation of the Φ necessitate knowledge about the behaviour of the system
under failure of the components. Usually due to complexity, an explicit global
structure function is often not given. Instead, the states of the system can be
evaluated by various means, including reliability block diagrams and cut-sets,
binary decision diagrams, and failure tree analysis [17].
With reliability block diagrams, it is simple to visualize the behaviour of small
systems. However, the search of cut-sets in a block diagram is NP-hard and can
be very time consuming [18]. Binary decision diagrams can provide fast means
to calculate the survival signature once the decision diagram data structure is
available. However, the calculation of the decision diagram is also dependent on
finding the cut-sets of the system and can be, inherently, slow.
For structural reliability, one is usually concerned with the behaviour of a
structure under load. Thus the interaction of the various components is not
modelled in any way described above - instead, the structure is modelled and
analysed in frameworks of mechanical simulation methods (commonly, finite ele-
ments methods) concerned with the actual physical behaviour.
In this work, a bridge over this gap is presented. A large structure consists
of several, possibly redundant, components. This means that the system might
still be operational after the failure of some of the components. Thus, structural
simulation can show various failure modes of the system under load. If a struc-
tural simulation of the structure results in a failing component, the structure is
updated and the simulation started again. This is repeated until the simulation
results show that the structure is failing in total. All failed components until
this point are saved in a failure mode. By variation of the load parameters, all
components prone to failure are identified and several failure modes are identi-
fied. These failure modes can be used as cut-sets in computation of the survival
signature. Equation (1) can be evaluated using these cut-sets to compute the
values of ϕ(x) for all x (exact computation) or a representative sample (Monte
Carlo Simulation). In this study, the Monte-Carlo approach was used as the
amount of combinations to be checked is of medium size. The largest amount of
combinations that is possible is for the entry placed directly in the middle of the
 3  
array ( 32 · 84 = 1890). Thus a sample size of 2000 samples was used.
A Novel Application of System Survival Signature 15

3 Reliability of an Offshore Jacket Platform


3.1 Structural Model

The jacket platform is taken from [16]. The Jacket is designed for shallow water
depth of approximately 65.31 m. It is a 4-legged jacket containing pile inside
the legs. The jacket is modeled as 2 × 2 square grid. The overall dimensions are
8 × 8 m at top elevation and 21.76 × 21.76 m at the mud line. The total height is
81 m. Two types of bracings are used named as horizontal bracings and vertical
bracings. The horizontal bracings are installed at five levels. The vertical bracings
are provided as single bracings till the bottom level. At the bottom level, it was
provided as K-bracings to impart more stiffness and reduce buckling. The jacket
support/foundation is modelled as fixed support system. The jacket is modelled
in SAP2000 as shown in Fig. 1. Member properties of the jacket are also taken
from [16]. The top mass of the oil and gas platform is simplified as a lumped
mass for the easiness finite element modelling. The total weight of the topside
is assumed as 1250 tons, which is equally applied over four legs where each leg,
is carrying 312.5 tons at the top nodes of the jacket structures platform.

Fig. 1. (a) Three-dimensional model of the jacket (b) Grouping of the components

3.2 Generation of Failure Tress

Non-linear static (pushover) analysis is performed to understand the behaviour


of structure against lateral load pattern following the procedure of FEMA356
[6,9]. The behaviour of the force displacement curve can be observed from the
analysis as well. In this step, the structure is incrementally loaded over its yield-
ing capacity and to observe the ultimate load level. The failed elements are
16 T.-E. Regenhardt et al.

recorded up to the ultimate load level. Here the damage level is not considered
because the aim is to grasp the failure behaviour of members up to ultimate
load level. Here the term failure behaviour is defined as how the member fails
chronologically and which member is followed by another member. Load has
been applied along three different directions comprising of 0◦ , 90◦ and 45◦ . The
typical pushover curve is shown in Fig. 2 which is adopted from FEMA356 [6]
and the ultimate load level is the point ‘C’. The failure tree can be observed in
Fig. 3.

Fig. 2. Non-linear force curve

Fig. 3. Failure tree of the offshore platform under various loads

The tree is generated for three different load directions. For zero degree of
direction, the first damage is observed in member 26. After that, this member
is followed by members 31, 41, 30, 27, 38, and 49. When the damage initiates
in member 49, the load level reached the ultimate level. For 90◦ direction, the
Exploring the Variety of Random
Documents with Different Content
With keen-biting sword, | from the son of the
king.”

23. . . . . . . . . | . . . . . . . .
They cut out the heart | from the breast of Hjalli,
On a platter they bore it, | and brought it to
Gunnar.

24. Then Gunnar spake forth, | the lord of the


folk:
“Here have I the heart | of Hjalli the craven,
Unlike to the heart | of Hogni the valiant,
For it trembles still | as it stands on the platter;
Twice more did it tremble | in the breast of the
man.”

25. Then Hogni laughed | when they cut out the


heart
Of the living helm-hammerer; | tears he had not.
. . . . . . . . | . . . . . . . .
On a platter they bore it, | and brought it to
Gunnar.

[492]

26. Then Gunnar spake forth, | the spear of the


Niflungs:
“Here have I the heart | of Hogni the valiant,
Unlike to the heart | of Hjalli the craven,
Little it trembles | as it lies on the platter,
Still less did it tremble | when it lay in his breast.

27. “So distant, Atli, | from all men’s eyes,


Shalt thou be as thou | . . . . . from the gold.
. . . . . . . . | . . . . . . . .
. . . . . . . . | . . . . . . . .

28. “To no one save me | is the secret known


Of the Niflungs’ hoard, | now Hogni is dead;
Of old there were two, | while we twain were
alive,
Now is none but I, | for I only am living.

29. “The swift Rhine shall hold | the strife-gold of


heroes,
That once was the gods’, | the wealth of the
Niflungs, [493]
In the depths of the waters | the death-rings shall
glitter,
And not shine on the hands | of the Hunnish
men.”

Atli spake:

30. “Ye shall bring the wagon, | for now is he


bound.”
* * * * * *

31. On the long-maned Glaum | rode Atli the


great,
About him were warriors | . . . . . . . .
But Guthrun, akin | to the gods of slaughter,
Yielded not to her tears | in the hall of tumult.

[494]

Guthrun spake:

32. “It shall go with thee, Atli, | as with Gunnar


thou heldest
The oaths ofttimes sworn, | and of old made firm,
By the sun in the south, | by Sigtyr’s mountain,
By the horse of the rest-bed, | and the ring of Ull.”

33. Then the champer of bits | drew the chieftain


great,
The gold-guarder, down | to the place of death.
. . . . . . . . | . . . . . . . .

34. By the warriors’ host | was the living hero


Cast in the den | where crawling about
Within were serpents, | but soon did Gunnar
With his hand in wrath on | the harp-strings
smite; [495]
The strings resounded,— | so shall a hero,
A ring-breaker, gold | from his enemies guard.

35. Then Atli rode | on his earth-treading steed,


Seeking his home, | from the slaughter-place;
There was clatter of hoofs | of the steeds in the
court,
And the clashing of arms | as they came from the
field.

36. Out then came Guthrun | to meeting with Atli,


With a golden beaker | as gift to the monarch:
“Thou mayst eat now, chieftain, | within thy
dwelling,
Blithely with Guthrun | young beasts fresh
slaughtered.”

37. The wine-heavy ale-cups | of Atli resounded,


When there in the hall | the Hunnish youths
clamored,
And the warriors bearded, | the brave ones,
entered.

[496]

38. Then in came the shining one, |


. . . . . . . .
. . . . . . . . | and drink she bore them;
Unwilling and bitter | brought she food to the
warrior,
Till in scorn to the white-faced | Atli did she
speak:

39. “Thou giver of swords, | of thy sons the


hearts
All heavy with blood | in honey thou hast eaten;
Thou shalt stomach, thou hero, | the flesh of the
slain,
To eat at thy feast, | and to send to thy followers.

40. “Thou shalt never call | to thy knees again


Erp or Eitil, | when merry with ale;
Thou shalt never see | in their seats again
The sharers of gold | their lances shaping,
(Clipping the manes | or minding their steeds.)”

41. There was clamor on the benches, | and the


cry of men, [497]
The clashing of weapons, | and weeping of the
Huns,
Save for Guthrun only, | she wept not ever
For her bear-fierce brothers, | or the boys so dear,
So young and so unhappy, | whom with Atli she
had.

42. Gold did she scatter, | the swan-white one,


And rings of red gold | to the followers gave she;
The fate she let grow, | and the shining wealth
go,
Nor spared she the treasure | of the temple itself.

43. Unwise then was Atli, | he had drunk to


wildness,
No weapon did he have, | and of Guthrun
bewared not;
Oft their play was better | when both in gladness
Each other embraced | among princes all.

44. With her sword she gave blood | for the bed
to drink, [498]
With her death-dealing hand, | and the hounds
she loosed,
The thralls she awakened, | and a firebrand threw
In the door of the hall; | so vengeance she had.

45. To the flames she gave all | who yet were


within,
And from Myrkheim had come | from the murder
of Gunnar;
The timbers old fell, | the temple was in flames,
The dwelling of the Buthlungs, | and the shield-
maids burned,
They were slain in the house, | in the hot flames
they sank.
46. Now the tale is all told, | nor in later time
Will a woman in byrnie | avenge so her brothers;
The fair one to three | of the kings of the folk
Brought the doom of death | ere herself she died.

Still more is told in the Greenland ballad of Atli. [480]

[Contents]

NOTES
[482]

Prose. On the marriage of Guthrun to Atli at the instigation of her


brothers, Gunnar and Hogni, and on the slaying of Atli and his two
sons, Erp and Eitil, cf. Drap Niflunga and note.

1. Line 1 apparently is in Fornyrthislag. Knefröth (the name is spelt


in various ways, and its meaning is uncertain): in the Atlamol (stanza
4) there are two messengers, one named Vingi and the other
unnamed; the annotator combines the two versions in the Drap
Niflunga. Benches, etc.: the adjective rendered “round the hearth,”
which etymologically it ought to mean, is made obscure by its
application to “helmets” in stanzas 3 and 17. [483]

2. Falseness: i.e., Gunnar’s followers concealed their fear and hatred


of the Huns at the feast; but the word may mean “fear of treachery.”
War-hall: the word used is “Valhall,” the name of Othin’s hall of slain
warriors.
3. Myrkwood the secret (the adjective is literally “unknown”): the
forest which divided Atli’s realm from that of the Gjukungs; cf.
Oddrunargratr, 23 and note. Around the hearth: the adjective is the
same one which is applied to “benches” in stanza 1 (cf. note); it may
be an error here, or it may possibly have the force of “of your
followers,” i.e., Gunnar is to arm the men of his household (those
who are round his hearth) for the journey.

4. Slaves, etc.: some editions have “swords in plenty.” Scarlet: the


word apparently means “slaughter-red,” “blood-red,” but it may
mean something entirely different. [484]

5. Gnitaheith: here the dragon Fafnir had his lair (cf. Gripisspo, 11).
Sigurth doubtless owned it after Fafnir’s death, and the Gjukungs
after they had killed Sigurth. Possibly they had given it to Atli in
recompense for the death of his sister, Brynhild, and he now offered
to restore it to them, or—as seems more likely—the poet was not
very clear about its ownership himself. Stems: i.e., the gilded stems
of ships, carved like dragons,—an evident northern touch, if the
word is correct, which is by no means certain. Danp: this name was
early applied to a mythical Danish king (cf. Rigsthula, 49 and note),
but it may have been fabricated by error out of the word
“Danparstaþir” (the phrase here used is “staþi Danpar”), used in the
Hervararsaga of a field of battle between the Goths and the Huns,
and quite possibly referring to the region of the Dnieper. The name
seems to have clung to the Atli tradition long after it had lost all
definite significance. Myrkwood: cf. note on stanza 3. [485]

7. The stanza is clearly in bad shape; the manuscript indicates line 5


as beginning a new stanza. In line 5 the manuscript has “and shield”
after “helm.” Kjar: Gering ingeniously identifies this Kjar with Kjar
the father of Olrun, mentioned in the Völundarkvitha, introductory
prose and stanza 2, on the basis of a genealogy in the Flateyjarbok,
in which Authi, the grandfather of Kjar (by no means certainly the
same man) and Buthli, father of Atli, are mentioned as making a
raiding voyage together. This identification, however, rests on slight
evidence.

8. The manuscript does not name the speaker. One editor gives the
first sentence to Gunnar. She, etc.: Guthrun, seeking to warn her
brothers of Atli’s treachery, sends them a ring with a wolf’s hair as a
sign of danger; in the Atlamol (stanza 4) she sends a message
written in runes; cf. Drap Niflunga. Heath-dweller: wolf. [486]

9. In line 1 the manuscript has “His comrades did not urge Gunnar,”
but the name, involving a metrical error, seems to have been
inserted through a scribal blunder.

10. The manuscript indicates no lacuna, but probably two lines have
dropped out, for the Volsungasaga paraphrase runs: “Give us to
drink in great cups, for it may well be that this shall be our last
feast.” Fjornir: Gunnar’s cup-bearer.

11. Bugge thinks this stanza is spoken by Gunnar’s terrified


followers; Grundtvig assigns it to Hogni. Apparently, however,
Gunnar means that if he and his men are not valiant enough to
make the journey and return safely, it matters little what may
happen to them. Niflungs: regarding the application of this name to
Gunnar’s Burgundians cf. Brot, 17 and note. Bears: these “black”
bears have been used as arguments against the Greenland origin of
the poem. And make glad the dogs: i.e., by giving them corpses to
eat, but the phrase in the original is more than doubtful. [487]

12. Some editions in line 2 read “home of the Niflungs” instead of


“their home,” and others “home of the Huns,” the manuscript
reading being “home of the men.” Heir: the Atlamol (stanza 28)
names two sons of Hogni, Snævar and Solar, both of whom make
the journey with their father and are killed. The Volsungasaga,
combining the two versions, says that Snævar and Solar went with
their father, and implies that it was a third and still younger son who
said: “Farewell, and have a good time” (thus literally).
13. Myrkwood: cf. stanza 3 and note; the journey is here made by
land, whereas in the Atlamol it is made partly by boat; cf. Atlamol,
34 and note. Whip-fearers: horses, but there is some uncertainty as
to the word.

14. In line 1 the manuscript has “land” instead of “halls,” which


involves a metrical error. Watch-towers: the word used is identical
with the name of Othin’s watch-tower, Hlithskjolf (cf. Grimnismol,
introductory prose). Buthli: the manuscript has “Bikki,” which has led
some editors to transfer this stanza to [488]the Hamthesmol, placing
it between stanzas 16 and 17; it seems more likely, however, that
“Bikki” was a scribal error for “Buthli.” Regarding Bikki cf.
Sigurtharkvitha en skamma, 63 and note. Line 4 is apparently in
Fornyrthislag.

15. Line 1 in the manuscript is apparently incorrectly copied, and


some editions omit “Mid weapons and lances” and assume a gap in
either line 1 or line 3.

17. This may be the remains of two stanzas; the manuscript marks
line 5 as beginning a new stanza. Editorial conjectures are
[489]numerous and varied. Household: the phrase is the same
“helms round the hearth” commented on in stanza 3. Some editions
insert a conjectural line after line 3. Sword-norns, etc.: the line is
exceedingly obscure, and the phrase rendered “sword-norns” may
mean “corpse-norns.” Apparently it refers to the warrior-women of
the Huns, the “shield-maids” of line 5 and of stanza 45. Roman
writers refer to the warrior-women among the early Germanic tribes,
and the tradition, closely allied to that of the Valkyries, attached
itself readily to the ferocious Huns. Den of snakes: concerning the
manner of Gunnar’s death cf. Drap Niflunga.

18. The manuscript indicates no lacuna and does not name the
speaker; perhaps a line similar to line 1 of stanza 24 (or 26) should
be inserted here. Rhine: Gunnar’s Burgundian home is here clearly
localized. After this stanza it is probable that a passage describing
the battle has been lost.

19. These two lines, apparently the remains of a full stanza,


[490]may belong after stanza 20. Burgundians’ king: the phrase may
mean “Burgundians’ men,” i.e., they bound all the Burgundians who
were left alive after the battle. This is the only place in the poems in
which the name “Burgundian” appears; that the poet had no very
clear conception of its meaning is indicated by the fact that in stanza
21 he calls Gunnar “king of the Goths.”

20. Apparently a Fornyrthislag stanza, though most editions have


attempted to expand the lines into Malahattr. The exploits of Hogni
(Hagene), with the names of many of his victims, are told in the
Nibelungenlied. The fire: in the Nibelungenlied Kriemhild has the hall
set on fire, and the Burgundians fight amid the flames. Line 4 is
clearly defective, and some editors regard the name “Gunnar” as all
that is left of the first two lines of stanza 21.

21. Again apparently the remains of a Fornyrthislag stanza. Editors


have attempted various combinations of the lines. Gold: presumably
Sigurth’s treasure.

22. The manuscript does not indicate the speaker; perhaps a first
line similar to line 1 of stanza 24 should appear here. Some editors,
however, assume that a line is missing after line 3. [491]Gunnar
demands proof that Hogni is dead because, as stanza 28 shows, he
is unwilling to die himself until he is assured that the secret of the
treasure will perish with him. He did not, of course, intend that the
heart should be cut from the living Hogni.

23. Most editions assume a gap (lines 1–2, 2–3 or 3–4). Hjalli: Atli’s
cook, killed to deceive Gunnar, as Atli hoped to wring the secret of
the hoard from Hogni if Gunnar remained silent. In the Atlamol
(stanzas 59–60) Atli’s men prepare to kill Hjalli, but he is spared at
Hogni’s intercession.
25. Helm-hammerer (literally “helmet-smith”): warrior, i.e., Hogni.
No gap indicated in the manuscript. [492]

26. Line 1 may belong elsewhere (stanzas 18 or 22).

27. Apparently the remains of two Fornyrthislag lines; the


manuscript combines them with lines 1–2 of stanza 28. Gunnar
foretells Atli’s speedy death.

28. Apparently in Fornyrthislag. The manuscript indicates line 3 as


the beginning of a stanza, and many editions combine lines 3–4 with
stanza 29. This stanza explains Gunnar’s demand for Hogni’s heart in
stanza 22.

29. The manuscript marks line 3, and not line 1, as the beginning of
a stanza. Rhine, etc.: the stanza shows the blending of [493]three
different traditions with regard to the treasure: the German tradition
of the gold of the Rhine (cf. Völundarkvitha, 16, and Sigurtharkvitha
en skamma, 16), the tradition, likewise German, of the hoard of the
Nibelungen (Niflungs), early blended with the first one, and finally
the northern tradition of the theft of Andvari’s treasure by Othin,
Hönir, and Loki (cf. Reginsmol, 1–9).

30. Apparently all that is left of a full stanza. The manuscript does
not name Atli as the speaker, and Grundtvig inserts: “Then Atli
called, | the king of the Huns,” as a first line. Some editors
combine this line with the two lines of stanza 33. Wagon: in Brot,
16, Gunnar is led to his death in the serpents’ den on horseback, not
in a wagon.

31. The stanza in the original is hopelessly confused. Glaum: this


horse of Atli’s is mentioned by name elsewhere. Long-maned:
uncertain. The manuscript indicates no gap, but something has
evidently been lost. Gods of slaughter: perhaps the phrase, usually
applied to Othin and the other gods, is here used simply to mean
“heroes,” i.e., Atli, Gunnar, and Hogni. Line 4 suggests Guthrun’s
tearlessness after Sigurth’s death (cf. Guthrunarkvitha II, 11). [494]
32. The manuscript does not indicate the speaker. Sigtyr (“Victory-
God”): Othin; what particular mountain (if any) is meant is unknown.
Horse of the rest-bed: probably this means “bedpost,” i.e., the
support of the marriage-bed. Ull: the archer-god, cf. Grimnismol, 5
and note. Nothing is known of his ring.

33. Apparently the remains of a Fornyrthislag stanza. Some editors


combine the two lines with the line here indicated as stanza 30.
Champer of bits: horse. The manuscript indicates no gap.

34. Six Fornyrthislag lines which editors have tried to reconstruct in


all sorts of ways. The manuscript marks line 5 as the beginning of a
new stanza. Regarding the serpents’ den, Gunnar’s harp-playing, and
the manner of his death, cf. Drap Niflunga and Oddrunargratr, 27–
30, and notes. In Atlamol, 62, Gunnar plays the harp with his feet,
his hands being bound, and some editors change hand in line 4 to
“foot.” Lines 5–6 may be interpolated, or, as Bugge maintains, lines
1–4 may have been expanded out of two lines. [495]

35. The manuscript marks line 3 as beginning a new stanza. Two


(possibly three) of the lines appear to be in Fornyrthislag. Field: so
the manuscript, involving a metrical error; many editions have
“wood.”

36. Young beasts: Guthrun means Atli’s sons, Erp and Eitil, but of
course he thinks she refers to newly slaughtered beasts; cf.
Guthrunarkvitha II, 41–45.

37. Youths: a conjectural addition. The brave ones is also


conjectural, the manuscript having “each.” No gap indicated in the
manuscript; some editions insert as line 3 or line 4 a slightly altered
version of line 2 of stanza 45. [496]

38. No gap indicated in the manuscript, but the two fragments


cannot be fitted together as one line. The shining one: Guthrun.
39. Giver of swords: generous prince, i.e., Atli. Honey: cf.
Guthrunarkvitha II, 42. To send to thy followers: literally, “to send
from thy high seat.”

40. Apparently a Fornyrthislag stanza. Merry with ale: presumably


this refers to Atli, but the manuscript reading makes it apply to the
two boys. Sharers of gold: princes. Line 5 is either interpolated or all
that is left of a separate stanza.

41. The text of the whole stanza has required a considerable


amount of emendation. Lines 3–5 may have been expanded out of
two lines, or line 5 may be an interpolation, possibly from stanza
[497]12 of the Guthrunarhvot. Weapons: the word literally means
“good-weaving,” and may refer to silken garments, but this hardly
fits the noun here rendered “clashing.” Wept not: cf. stanza 31 and
note.

42. Line 1 appears to be in Fornyrthislag. Guthrun distributes Atli’s


treasures among his followers apparently to prevent their wrath at
the slaying of Erp and Eitil from turning against her; Atli, as stanza
43 shows, is too drunk to realize or prevent what she is doing.

43. The second half of line 4 is apparently an error, but none of the
editorial suggestions have improved it.

44. Guthrun allows the dogs and the house-thralls, who had no part
in Gunnar’s death, to escape before she burns the dwelling [498]with
all who are left therein. In Atlamol, stanzas 83–84, Atli is slain by a
son of Hogni (Hniflung?) with Guthrun’s help.

45. Some editions transfer line 2 to stanza 37; others reject line 3 as
interpolated. Myrkheim (“Dark-Home”): probably identical with
Myrkwood; cf. stanza 3. Temple: probably both here and in stanza
42 the word means little more than the place where Atli’s treasures
were kept; the poet was by no means literal in his use of terms
connected with the heathen religion. Buthlungs: sons of Buthli, i.e.,
Atli and his family. Shield-maids: cf. stanza 17 and note.
46. The entire stanza is very likely a later addition. Three kings: Atli
and his two sons, Erp and Eitil. [499]
[Contents]
ATLAMOL EN GRÖNLENZKU
The Greenland Ballad of Atli
[Contents]

Introductory Note
Many of the chief facts regarding the Atlamol, which follows the
Atlakvitha in the Codex Regius, are outlined in the introductory note
to the earlier Atli lay. That the superscription in the manuscript is
correct, and that the poem was actually composed in Greenland, is
generally accepted; the specific reference to polar bears (stanza 17),
and the general color of the entire poem make this origin
exceedingly likely. Most critics, again, agree in dating the poem
nearer 1100 than 1050. As to its state of preservation there is some
dispute, but, barring one or two possible gaps of some importance,
and the usual number of passages in which the interpolation or
omission of one or two lines may be suspected, the Atlamol has
clearly come down to us in fairly good shape.

Throughout the poem the epic quality of the story itself is


overshadowed by the romantically sentimental tendencies of the
poet, and by his desire to adapt the narrative to the understanding
of his fellow-Greenlanders. The substance of the poem is the same
as that of the Atlakvitha; it tells of Atli’s message to the sons of
Gjuki, their journey to Atli’s home, the slaying of Hogni and Gunnar,
Guthrun’s bitterness over the death of her brothers, and her bloody
revenge on Atli. Thus in its bare outline the Atlamol represents
simply the Frankish blending of the legends of the slaughter of the
Burgundians and the death of Attila (cf. Gripisspo, introductory
note). But here the resemblance ends. The poet has added
characters, apparently of his own creation, for the sake of episodes
which would appeal to both the men and the women of the
Greenland settlement. Sea voyages take the place of journeys by
land; Atli is reproached, not for cowardice in battle, but for weakness
at the Thing or great council. The additions made by the poet are
responsible for the Atlamol’s being the longest of all the heroic
poems in the Eddic collection, and they give it a kind of emotional
vividness, but it has little of the compressed intensity of the older
poems. Its greatest interest lies in its demonstration of the manner
in which a story brought to the North from the South Germanic lands
could be adapted to the understanding and tastes of its
[500]eleventh century hearers without any material change of the
basic narrative.

In what form or forms the story of the Gjukungs and Atli reached the
Greenland poet cannot be determined, but it seems likely that he
was familiar with older poems on the subject, and possibly with the
Atlakvitha itself. That the details which are peculiar to the Atlamol,
such as the figures of Kostbera and Glaumvor, existed in earlier
tradition seems doubtful, but the son of Hogni, who aids Guthrun in
the slaying of Atli, appears, though under another name, in other
late versions of the story, and it is impossible to say just how much
the poet relied on his own imagination and how far he found
suggestions and hints in the prose or verse stories of Atli with which
he was familiar.

The poem is in Malahattr (cf. Introduction) throughout, the verse


being far more regular than in the Atlakvitha. The compilers of the
Volsungasaga evidently knew it in very much the form in which we
now have it, for in the main it is paraphrased with great fidelity.

[Contents]
1. There are many who know | how of old did
men
In counsel gather; | little good did they get;
In secret they plotted, | it was sore for them later,
And for Gjuki’s sons, | whose trust they deceived.

2. Fate grew for the princes, | to death they were


given;
Ill counsel was Atli’s, | though keenness he had;
[501]
He felled his staunch bulwark, | his own sorrow
fashioned,
Soon a message he sent | that his kinsmen should
seek him.

3. Wise was the woman, | she fain would use


wisdom,
She saw well what meant | all they said in secret;
From her heart it was hid | how help she might
render,
The sea they should sail, | while herself she
should go not.

4. Runes did she fashion, | but false Vingi made


them,
The speeder of hatred, | ere to give them he
sought;
Then soon fared the warriors | whom Atli had
sent,
And to Limafjord came, | to the home of the
kings.

5. They were kindly with ale, | and fires they


kindled, [502]
They thought not of craft | from the guests who
had come;
The gifts did they take | that the noble one gave
them,
On the pillars they hung them, | no fear did they
harbor.

6. Forth did Kostbera, wife | of Hogni, then come,


Full kindly she was, | and she welcomed them
both;
And glad too was Glaumvor, | the wife of Gunnar,
She knew well to care | for the needs of the
guests.

7. Then Hogni they asked | if more eager he


were,
Full clear was the guile, | if on guard they had
been;
Then Gunnar made promise, | if Hogni would go,
And Hogni made answer | as the other counseled.
8. Then the famed ones brought mead, | and fair
was the feast, [503]
Full many were the horns, | till the men had drunk
deep;
. . . . . . . . | . . . . . . . .
Then the mates made ready | their beds for
resting.

9. Wise was Kostbera, | and cunning in rune-craft,


The letters would she read | by the light of the
fire;
But full quickly her tongue | to her palate clave,
So strange did they seem | that their meaning she
saw not.

10. Full soon then his bed | came Hogni to seek,


. . . . . . . . | . . . . . . . .
The clear-souled one dreamed, | and her dream
she kept not,
To the warrior the wise one | spake when she
wakened:

11. “Thou wouldst go hence, Hogni, | but heed


my counsel,— [504]
Known to few are the runes,— | and put off thy
faring;
I have read now the runes | that thy sister wrote,
And this time the bright one | did not bid thee to
come.

12. “Full much do I wonder, | nor well can I see,


Why the woman wise | so wildly hath written;
But to me it seems | that the meaning beneath
Is that both shall be slain | if soon ye shall go.
But one rune she missed, | or else others have
marred it.”

Hogni spake:

13. “All women are fearful; | not so do I feel,


Ill I seek not to find | till I soon must avenge it;
The king now will give us | the glow-ruddy gold;
I never shall fear, | though of dangers I know.”

Kostbera spake:

14. “In danger ye fare, | if forth ye go thither, [505]


No welcoming friendly | this time shall ye find;
For I dreamed now, Hogni, | and nought will I
hide,
Full evil thy faring, | if rightly I fear.

15. “Thy bed-covering saw I | in the flames


burning,
And the fire burst high | through the walls of my
home.”

Hogni spake:

“Yon garment of linen | lies little of worth,


It will soon be burned, | so thou sawest the bed-
cover.”

Kostbera spake:

16. “A bear saw I enter, | the pillars he broke,


And he brandished his claws | so that craven we
were;
With his mouth seized he many, | and nought was
our might,
And loud was the tumult, | not little it was.”

[506]

Hogni spake:

17. “Now a storm is brewing, | and wild it grows


swiftly,
A dream of an ice-bear | means a gale from the
east.”

Kostbera spake:
18. “An eagle I saw flying | from the end through
the house,
Our fate must be bad, | for with blood he
sprinkled us;
. . . . . . . . | . . . . . . . .
From the evil I fear | that ’twas Atli’s spirit.”

Hogni spake:

19. “They will slaughter soon, | and so blood do


we see,
Oft oxen it means | when of eagles one dreams;
[507]
True is Atli’s heart, | whatever thou dreamest.”
Then silent they were, | and nought further they
said.

20. The high-born ones wakened, | and like


speech they had,
Then did Glaumvor tell | how in terror she
dreamed,
. . . . . . . . | . . . . . . . .
. . . . . Gunnar | two roads they should go.

Glaumvor spake:

21. “A gallows saw I ready, | thou didst go to thy


hanging,
Thy flesh serpents ate, | and yet living I found
thee;
. . . . . . . . | . . . . . . . .
The gods’ doom descended; | now say what it
boded.”

* * * * * *

22. “A sword drawn bloody | from thy garments I


saw,— [508]
Such a dream is hard | to a husband to tell,—
A spear stood, methought, | through thy body
thrust,
And at head and feet | the wolves were howling.”

Gunnar spake:

23. “The hounds are running, | loud their barking


is heard,
Oft hounds’ clamor follows | the flying of spears.”

Glaumvor spake:

24. “A river the length | of the hall saw I run,


Full swiftly it roared, | o’er the benches it swept;
O’er the feet did it break | of ye brothers twain,
The water would yield not; | some meaning there
was.”
* * * * * *

25. “I dreamed that by night | came dead women


hither, [509]
Sad were their garments, | and thee were they
seeking;
They bade thee come swiftly | forth to their
benches,
And nothing, methinks, | could the Norns avail
thee.”

Gunnar spake:

26. “Too late is thy speaking, | for so is it settled;


From the faring I turn not, | the going is fixed,
Though likely it is | that our lives shall be short.”

27. Then bright shone the morning, | the men all


were ready,
They said, and yet each | would the other hold
back;
Five were the warriors, | and their followers all
But twice as many,— | their minds knew not
wisdom.

28. Snævar and Solar, | they were sons of Hogni,


Orkning was he called | who came with the
others, [510]
Blithe was the shield-tree, | the brother of
Kostbera;
The fair-decked ones followed, | till the fjord
divided them,
Full hard did they plead, | but the others would
hear not.

29. Then did Glaumvor speak forth, | the wife of


Gunnar,
To Vingi she said | that which wise to her seemed:
“I know not if well | thou requitest our welcome,
Full ill was thy coming | if evil shall follow.”

30. Then did Vingi swear, | and full glib was his
speech,
. . . . . . . . | . . . . . . . .
“May giants now take me | if lies I have told ye,
And the gallows if hostile | thought did I have.”

31. Then did Bera speak forth, | and fair was her
thought, [511]
. . . . . . . . | . . . . . . . .
“May ye sail now happy, | and victory have,
To fare as I bid ye, | may nought your way bar.”

32. Then Hogni made answer,— | dear held he his


kin,—
courage, ye wise ones, | whatsoever may come;
Though many may speak, | yet is evil oft mighty,
And words avail little | to lead one homeward.

33. They tenderly looked | till each turned on his


way,
Then with changing fate | were their farings
divided.

34. Full stoutly they rowed, | and the keel clove


asunder,
Their backs strained at the oars, | and their
strength was fierce; [512]
The oar-loops were burst, | the thole-pins were
broken,
Nor the ship made they fast | ere from her they
fared.

35. Not long was it after— | the end must I tell—


That the home they beheld | that Buthli once had;
Loud the gates resounded | when Hogni smote
them;
Vingi spake then a word | that were better unsaid:

36. “Go ye far from the house, | for false is its


entrance,
Soon shall I burn you, | ye are swiftly smitten;
I bade ye come fairly, | but falseness was under,
Now bide ye afar | while your gallows I fashion.”
37. Then Hogni made answer, | his heart yielded
little, [513]
And nought did he fear | that his fate held in
store:
“Seek not to affright us, | thou shalt seldom
succeed;
If thy words are more, | then the worse grows thy
fate.”

38. Then Vingi did they smite, | and they sent


him to hell,
With their axes they clove him | while the death-
rattle came.

39. Atli summoned his men, | in mail-coats they


hastened,
All ready they came, | and between was the
courtyard.

* * * * * *

40. Then came they to words, | and full wrathful


they were: [514]
“Long since did we plan | how soon we might slay
you.”

Hogni spake:
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like