Next Article in Journal
Indigenous Community Fishing Practices in Nagaland, Eastern Indian Himalayas
Next Article in Special Issue
Issues Concerning Interfaces with Inorganic Solid Electrolytes in All-Solid-State Lithium Metal Batteries
Previous Article in Journal
The Role of Regulation in the Development and Internationalization of Social Firms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Potential Failure Prediction of Lithium-ion Battery Energy Storage System by Isolation Density Method

China Huaneng Group Clean Energy Research Institute (CERI), Changping District, Beijing 102209, China
*
Author to whom correspondence should be addressed.
Sustainability 2022, 14(12), 7048; https://doi.org/10.3390/su14127048
Submission received: 13 May 2022 / Revised: 1 June 2022 / Accepted: 6 June 2022 / Published: 9 June 2022

Abstract

:
Lithium-ion battery energy storage systems have achieved rapid development and are a key part of the achievement of renewable energy transition and the 2030 “Carbon Peak” strategy of China. However, due to the complexity of this electrochemical equipment, the large-scale use of lithium-ion batteries brings severe challenges to the safety of the energy storage system. In this paper, a new method, based simultaneously on the concepts of statistics and density, is proposed for the potential failure prediction of lithium-ion batteries. As there are no strong assumptions about feature independence and sample distribution, and the estimation of the anomaly scores is conducted by integrating several trees on the isolation path, the algorithm has strong adaptability and robustness, simultaneously. For validation, the proposed method was first applied to two artificial datasets, and the results showed that the method was effective in dealing with different types of anomalies. Then, a comprehensive evaluation was carried out on six public datasets, and the proposed method showed a better performance with different criteria when compared to the conventional algorithms. Finally, the potential failure prediction of lithium-ion batteries of a real energy storage system was conducted in this paper. In order to make full use of the time series characteristics, voltage variation during a whole discharge cycle was taken as the representation of the operation condition of the lithium-ion batteries, and three different types of voltage deviation anomalies were successfully detected. The proposed method can be effectively used for the predictive maintenance of energy storage systems.

1. Introduction

The world’s renewable energy (RE), represented by photovoltaic and wind power, has been developing rapidly in recent years and is becoming one of the most viable ways to meet soaring energy demands and address environmental concerns [1]. However, the inherent intermittent characteristic of RE is bringing potential instability to the power grid. Just in time, as a strong backing to ensure the consumption of renewable energy and the reliability of the grid, energy storage has ushered in the leapfrog development [2,3,4]. On 15 July 2021, the China National Development and Reform Commission and the National Energy Administration jointly issued the “Guiding Opinions on Accelerating the Development of New Energy Storage” [5]. For the first time, the development goal of the energy storage industry has been defined and quantified at the national level, and it is expected that the installation scale of new energy storage will reach over 30 million kW by 2025, i.e., from 3.28 GW by the end of 2020 to 30 GW by 2025. In the next five years, the scale of the new energy storage market should expand to 10 times that of the current level, with a compound annual growth rate of more than 55%. At the same time, various provinces and cities have issued relevant policies, requiring that, in principle, the energy storage capacity of new energy projects should not be less than 10% to 20% of the installed capacity of new energy projects.
The lithium-ion battery (LIB) has become one of the most important energy storage technology routes [6,7], mainly due to its significant advantages with respect to other battery types [8,9,10], such as a longer lifecycle, a faster response speed, a lower self-discharge rate, and higher energy conversion efficiency. In China, a batch of one hundred megawatt-scale demonstration energy storage systems (ESSs) were combined successively to the grid in 2021, and the important application scenarios of the stable peak adjustment and fast frequency adjustment of the large-scale LIB-ESS were verified successfully. Even gigawatt scale energy storage systems are on the agenda in many provinces. However, at the same time, the large-scale use of LIBs brings severe challenges to the safety of ESSs [11,12], and this has become one of the biggest obstacles to the development of LIBs-ESS. Some relevant research has been conducted by former scholars [13,14,15,16], such as the estimation of the state of charge (SOC) [10,17], the healthy estimation according to capacity decline [18,19,20] or internal resistance increase [21], the remaining useful life (RUL) prediction, etc. However, the calculations require long-term battery operation data and even full lifecycle test data [22], and there is little research on the real-time potential failure prediction of LIBs.
In this paper, a new anomaly detection method is proposed for the real-time potential failure prediction of the LIBs of ESSs; this method integrates multiple binary trees and repeatedly estimates the density of the subset that a sample is in when it is on the isolation path. In fact, the approach is simultaneously related to statistics-based, density-based, and depth-based methods. Isolation density (iDensity) has the notion of density itself, which is estimated in the isolation process of a sample and, from the aspect of statistics, isolation density is in fact the real conditional probability density of the instance with multidimensional features. Compared with the former studies, the contributions of this paper are the following. (1) An unsupervised anomaly detection method is introduced for the diagnosis of the LIBS of ESSs; compared with the conventional SOH and RUL calculation methods, the real-time work condition of LIBs can be estimated in the case of no prior knowledge and long-running data. (2) A new LIB anomaly detection method is proposed in this paper; as there is no strong assumption about the data distribution, the method can adapt to datasets with different characteristics; it does not matter if the outliers are exposed or enclosed by the normal instances or even if they get together themselves. (3) Unaggregated voltage variations of a whole discharge cycle, instead of the instantaneous value, are employed for anomaly detection, then the anomalies the of the LIBs on the scales of the features and time series can be effectively detected, simultaneously.
The paper is organized as follows: in Section 2, the related work on anomaly detection methods and their advantages and drawbacks are discussed. In Section 3, a new anomaly detection method is proposed, and the mathematical interpretation is discussed. In Section 4, experiments and qualitative discussion of the proposed method are conducted by artificial datasets with different anomalies. In Section 5, experiments and quantitative comparisons with conventional methods are conducted by public datasets. In Section 6, as a case study, the proposed method is used for the anomaly detection of a real ESS. Finally, the paper is concluded in Section 7.

2. Related Work

Anomaly detection is the process of identifying the few and the different samples, with an unsupervised or a semi-supervised method; it has become a research hotspot in many application domains [23,24,25], such as fraud detection in the financial domain, intrusion detection in the cyber security domain, system fault detection in the industrial production domain, etc. However, there are several factors that make this apparently simple and clear task very challenging. (1) Anomalies are usually sparse, separated, or exposed instances. However, they cannot be well-defined, except by some basic and abstract assumptions. (2) Due to the difficulty of sample labeling, the most common scenario for anomaly detection is semi-supervised or unsupervised learning, i.e., identifying outliers based on their feature values only. (3) In the scenario of a multidimensional time series, there are usually complex features and even time series correlations implied in the dataset.
A variety of algorithms have been proposed by previous scholars [26], and most of the algorithms are based some explicit or implicit assumptions which determine the performance and the boundedness of the algorithm, simultaneously. In general, the stronger the assumptions, the less adaptable the algorithm.
Statistics-based methods have been widely used for anomaly detection. The histogram-based outlier score (HBOS) [27] is an efficient method for anomaly detection in large datasets. However, the basic assumption is that the features are independent of each other; consequently, the algorithm will fail for the detection of correlation anomalies. In distance-based methods, instances are determined to be abnormal or not by the measurement of distance, such as, for instance, in the method of k-nearest neighbors (KNN) [28]. In the cluster-based method, instances are determined abnormal or not by the degree of deviation from existing clusters, such as, for instance, in the method of k-means [29]. However, Euclidean distance is usually employed for the measurement of distance in KNN and K-Means. Therefore, an implicit assumption that the data will conform to the spherical distribution is introduced. The local outlier factor (LOF) [30] is a density-based method for anomaly detection [31]. In the LOF method, the dissimilarity of the reach distances of an instance and its k neighbors is used for the measurement of anomaly scores. However, the employment of Euclidean distance also introduces the implicit assumption of spherical distribution. In addition, the scope of “local” is difficult to define. Depth-based methods determine anomalies by delimiting molecular space, such as, for example, in the isolation forest (iForest) [32,33,34] method. The basic assumption is that outliers usually have a smaller depth on the lookup path. Because this is a weak hypothesis, iForest therefore shows better adaptability. However, iForest always tends to capture the exposed points, while the anomalies that are enclosed by normal instances are usually difficult to detect.

3. Isolation Density

A two-dimensional dataset is shown in Figure 1, where the blue points are considered to be normal samples, and the red point xi is an anomalous one. At first, a random value in a randomly selected dimension is generated, by which the samples are divided into two parts. Then, the density of the subsets that contain and do not contain xi, i.e., d and d’, are calculated. This process is repeated until xi is fully isolated, or the maximum isolation depth is reached; the process is just like that shown in Figure 1a–f. As di is the sequence of the density generated in the isolation process of xi, it is called the isolated density. The central assumption of the proposed method is that d will always be greater than d’ in the statistical sense.
Based on the idea of ensemble learning, xi is isolated independently by several binary trees, and the final isolation density of xi can be expressed as:
d i = 1 n t t = 1 n t ln ( d i t )
d i t = j = 1 n k i , j t × d i , j t = j = 1 n k i , j t × m j t V j t = k i , 1 t × m 1 t f = 1 n L f , j t + k i , 2 t × m 2 t f = 1 n L f , j t , , + k i , n t × m n t f = 1 n L f , j t = 1 V 0 ( k i , 1 t × m 1 t f = 1 n r f , j t + k i , 2 t × m 2 t f = 1 n r f , j t , , + k i , n t × m n t f = 1 n r f , j t ) = 1 V 0 ( k i , 1 t × m 1 t f = 1 n r f , j t + k i , 2 t × m 2 t f = 1 n r f , j t , , + k i , n t × m n t f = 1 n r f , j t ) = 1 V 0 j = 1 n k i , j t × m j t f = 1 n r f , j t
V 0 = f = 1 n L f , 0
r f , j t = L f , j t L f , 0
where d is the isolation density of sample x and nt and n’ denote the total number of binary trees and the depth of the isolation path of a binary tree, respectively. k is the corresponding weight, m is the total of the remaining samples, including xi on the isolation path, V is the hyper-cube volume on the isolation path, L is the length of the edge of the hyper-cube, r is the ratio of the edge length to the original length of the hyper-cube on the isolation path, and V0 is the original volume of the hyper-cube. Superscript t denotes the tth tree, and subscripts I, j, and f denote the ith sample, the jth isolation operation, and the fth feature, respectively.
The final isolation density di is the total estimated on the whole isolation path. That is, the consideration of the “outlier” of the algorithm includes not only the sample itself, but also its domain samples. At this point, the definition of “outlier” is introduced in this paper: the sample with a lower probability density, either by itself or in a subset including some neighborhood samples, is considered as an outlier.

4. Algorithm Validation by Artificial Datasets

In this section, we create two complex artificial datasets, i.e., a ring dataset and a double-moon dataset, which are used for the validation of the proposed method.

4.1. Circle Distribution Dataset

A circle dataset is shown in Figure 2; it can be seen that there is a strong nonlinear correlation between the two features; some anomaly points are distributed at the outside and the inside of the circle. The detection results are shown in Figure 3. As described above, due to the naive Bayesian assumption, HBOS is difficult to apply to the anomaly detection of complex datasets in most cases, as is shown in Figure 3a. The iForest method finds each sample through binary trees and detects the anomalies by the depth of the search path, because the anomalies often have less search path depth. On this important principle, the points exposed to the outside of the dataset are often easily detected as anomalies, while the points inside the dataset are often difficult to find. As is shown in Figure 3b, some of the points at the center of circle are incorrectly detected as normal ones by the iForest method. For the LOF method, the anomalies are judged by the relative density of the points with their surrounding ones; this is usually used for local anomaly detection. However, if the samples of a dataset are unevenly distributed, the LOF method often cannot provide the right results. As is shown in Figure 3c, although the points at the dataset center are sparse overall, the relatively dense points are still identified as normal ones, which is obviously not the desired result. Finally, Figure 3d shows the result of the proposed method; the circle distribution can be identified, and most of the points that do not fit the distribution are detected as anomalies.

4.2. Double-Moon Distribution Dataset

Figure 4 is a more difficult dataset, i.e., a double-moon distribution dataset. Many features are embodied in this dataset: strong nonlinear correlation, inside anomalies, and uneven distribution. The detection results are shown in Figure 5. As mentioned above, HBOS is not suitable for datasets with dependency variables; as is shown in Figure 5), the points in the regions of A and B are incorrectly detected as anomalies. iForest is not suitable for datasets with enclosed anomalies; as is shown in region A of Figure 5b, the points enclosed by the adjacent ones are incorrectly detected as normal. In addition, the LOF is not suitable for datasets with uneven distribution; as is shown in Figure 5c, the points at the regions of the lower left and upper right are incorrectly detected as normal. Finally, the detection results of the proposed method are shown in Figure 5d; for the regions that the conventional methods fail, the proposed method still can detect the normal or anomalous samples effectively.

5. Algorithm Validation by Public Datasets

Public datasets are used for the validity of the proposed method in this section. The public datasets are from the University of California Irvine (UCI) machine learning repository [35], which is a collection of databases, domain theories, and data generators that are used by the machine learning community for the empirical analysis of machine learning algorithms.

5.1. Evaluation Criteria of Algorithm Performance

Criteria are introduced in this section to evaluate the performance of the proposed method; they are accuracy a, recall r, precision p, F1 score f1, the Matthews correlation coefficient MCC, and mean score fm. Their formulas are described as follows:
a = T P + T N T P + T N + F P + F N
r = T P T P + F N
p = T P T P + F P
f 1 = 2 × p × r p + r
f m = p + r 2
M C C = T P × T N F P × F N ( T P + F P ) ( T P + F N ) ( T N + F P ) ( T N + F N )
where TP (true positive) is the number of positive samples that are correctly identified, FP (false positive) is the number of negative samples that are incorrectly identified as positive ones, FN (false negative) is the number of positive samples that are incorrectly identified as negative ones, and TN (true negative) is the number of negative samples that are correctly identified. At the same time, the receiver operating characteristic (ROC) is usually used to describe a series of false positive rates (FPRs) at different true positive rates (TPRs), and the area under the curve (AUC) can be regarded as a comprehensive index, which is defined as:
A U C = 0 1 F P R ( T P R ) d ( T P R )
T P R = T P T P + F N
F P R = F P F P + T N
In this paper, positive samples denote the abnormal samples, while negative samples denote the normal samples.

5.2. Wisconsin Breast Cancer Dataset

The original Wisconsin breast cancer dataset contains 32 dimensional features with a sample size of 569. The features are computed from a digitized image of a fine needle aspirate (FNA) of a breast mass. They describe the characteristics of the cell nuclei present in the image. There 367 samples of the modified dataset in this paper, among which the proportion of abnormal samples is 2.72%, and the feature dimension is 30. The detection results of each algorithm are shown in Table 1, where the bold characters in the table are the optimal results under the corresponding standards (the same as below).

5.3. Pen Handwriting Dataset

The pen handwriting dataset is a digit database which collected 250 samples from 44 writers and has a total of 10,992 samples with 16 features. There are 809 samples of the modified dataset, and the feature dimension is 16, among which the proportion of abnormal samples is 11.1%. The detection results of each algorithm are shown in Table 2.

5.4. Statlog (Shuttle) Dataset

The shuttle dataset contains 58,000 samples and 9 numerical attributes. The examples in the original dataset were in time order, and this time order could presumably be relevant in classification. However, this was not deemed relevant for the StatLog purposes; so, the order of the examples in the original dataset was randomized. There are 46,464 samples of the modified dataset in this paper, and the feature dimension is 9, among which the proportion of abnormal samples is 1.89%. The detection results of each algorithm are shown in Table 3.

5.5. KDD Cup 1999 Dataset

This is the dataset used for “The Third International Knowledge Discovery and Data Mining Tools Competition”, which was held in conjunction with KDD-99. The task is to build a network intrusion detector, i.e., a predictive model that can distinguish between “bad” connections (known as intrusions or attacks) and “good” normal connections. The original dataset contains 4,000,000 samples with 42 features. There are 620,089 samples of the modified dataset in this paper, and the feature dimension is 38, among which the proportion of abnormal samples is 0.17%. The detection results of each algorithm are shown in Table 4.

5.6. Banknote Authentication Dataset

The banknote authentication data were extracted from images that were taken from genuine and forged banknote-like specimens. For digitization, an industrial camera usually used for print inspection was used. The final images have 400 × 400 pixels. Due to the object lens and the distance to the investigated object, gray-scale pictures with a resolution of about 660 dpi were gained. The Wavelet Transform tool was used to extract features from the images. The dataset contains a total of 1372 samples with 4 features, 44.4% of which are anomalies. The detection results are shown in Table 5.

5.7. Multi-distribution Dataset

The multi-distribution dataset contains four normal distributions (one of which has low density), a micro cluster, and local anomalies. There is a total of 3000 samples with 2 features, 1.23% of which are anomalies. The detection results of the four methods are shown in Table 6.

6. Anomaly Detection of Lithium-ion Batteries

In this section, the anomaly detection of a real energy storage system of lithium-ion batteries is conducted. The ESS is constructed for the consumption of the renewable energy of a nearby wind-power plant, which consists of 12 battery compartments in parallel. A battery compartment consists of four battery piles in parallel. A battery pile consists of five battery clusters in parallel. A battery cluster consists of 18 battery packs in series. Finally, a battery pack is composed of 12 batteries in a series.

6.1. Description of Lithium-ion Battery Dataset

A difficulty for the anomaly detection of the lithium-ion batteries of an ESS is that the number of measurement parameters is very small. For the studied ESS, there are only three independent measurement parameters for lithium-ion batteries, i.e., voltage, current, and temperature. In addition, for the larger-scale ESSs, even temperature measurements are inadequate. So, in this paper, in order to increase the number of features, the voltage variation of the battery discharge process is taken as its characteristic sequence and is used for series-based anomaly detection.
A discharge process of the ESS was started on 1 November 2020 at 14:11, and it ended on 1 November 2020 at 15:10; it lasted 60 min. The real voltage variations are shown in Table 7, and the parameter variations are shown in Figure 6 at the same time, where the blue lines are the voltage variations of the lithium-ion batteries, and the red line is the current of the battery pile. As can be seen, as the discharge process goes on, the voltages of the batteries decrease gradually. Because the battery adopts a constant power discharge strategy, its current increases gradually as the voltage decreases. Because none of the voltages exceeded the threshold, no threshold-based alarm was triggered; however, some voltage trends seem to be quite different from the overall trend. We may not know the exact reasons behind these phenomena at that time. However, it is always helpful to identify them accurately when they occur.

6.2. Anomaly Detection of Lithium-ion Batteries

In this section, the voltage variations of the batteries are used for anomaly detection, and the results are shown in Figure 7, where the blue lines are the detected normal lithium-ion batteries, and the red lines are the anomalous ones; that is, a total of 11 batteries, which are significantly different from the other samples, showed detected anomalies by the proposed method.
As described above, at the beginning of discharge, the voltages of the batteries are consistent, relatively, and the maximum difference of voltage is about 0.04 V. However, as the discharge process progresses, the voltage difference becomes gradually larger, and at the end of the discharge, the maximum difference of voltage is about 0.27 V.
As can be seen, the batteries with detected anomalies present very different characteristics, i.e., some voltages of the batteries fluctuate wildly in the discharge process, while some voltages changed only as a sawtooth wave.

6.3. Result Analysis

Furthermore, all of the battery anomalies are shown in Figure 8, separately. It can be seen that the 11 samples have different abnormal forms, respectively. The blue lines indicate that the voltages of the batteries are fluctuating wildly in the discharge process; as can be seen, at a certain stage of discharge, the battery voltage fluctuates violently and deviates significantly from a normal value. The red lines indicate that the voltages of the batteries are fluctuating in a sawtooth wave; as can be seen, the voltage variation of the battery shows a certain regularity. In addition, the green line changes seem to be smoother; however, by careful analysis, they are still different from the other batteries. At the beginning of discharge, the voltage is lower than the others, while at the ending of discharge the voltage is higher than the others. Compared with the other curves, the green line is considered to be anomalous discharge behavior.
These abnormal behaviors could be a precursory manifestation of some underlying failure; for instance, the sawtooth wave oscillations may be caused by a sensor fault; the violent changes may be caused by a sensor fault or some sort of potential battery failure, while the smooth deviations from the normal values are more likely to be caused by battery degradation. However, due to the complex battery fault characteristics, long laboratory testing cycles, and some practical factors, sufficiently effective prior knowledge of the faults of the batteries is often not available.
The proposed potential failure prediction method in this paper is actually a fault prediction method based on unsupervised learning, which can identify abnormal batteries in advance before unknown potential faults occur. However, the abnormal causes of the identified batteries need to be carefully studied by experts or even by experiments; they may be caused by battery degradation or simple sensor errors. We cannot easily draw conclusions about the causes of the anomalies now; this is the focus of our subsequent research process.

7. Conclusions

With the rapid development of renewable energy in China and the intensive introduction of energy-storage-related policies, the installation capacity of the energy storage system in China has increased rapidly. At the same time, the safety problem of the main equipment of the energy storage system, i.e., the lithium-ion battery, is gradually being exposed. So, in the absence of sufficient prior knowledge, it is very important for the safe operation of the energy storage station to detect the abnormal running state of the batteries in time through unsupervised learning methods.
In this paper, a new method based on isolation density was proposed for anomaly detection and was fully verified by datasets with different types of anomalies. Finally, the anomaly detection of a real lithium-ion battery energy storage system was conducted, and 11 batteries were detected as being abnormal ones, including different kinds of anomaly conditions. The results are concluded as follows:
(1)
A new anomaly detection method based on isolation density was proposed in this paper and was fully verified by manual datasets and public datasets containing different types of anomalies.
(2)
Isolation density can be viewed as the sparse degree or probability density of the battery, from the aspects of density or statistics, respectively. As it inherently involves the idea of ensemble learning, without any prior assumption about the data distribution, the method is characterized by high adaptation and can effectively be used for the detection of many kinds of anomalies.
(3)
The voltage variations during a whole discharge process of the batteries are taken as the features of the work condition. Then, through the proposed method and time series data of the voltages, the batteries with different abnormal discharge states are effectively detected.
(4)
The abnormal discharge states can be divided into three classes: violent changes, sawtooth wave oscillations, and smooth deviations from normal values.

Author Contributions

Methodology, Y.Z., L.W. and J.W.; Software, Y.Z., L.W. and J.W.; Supervision, M.L.; Validation, M.L., L.W. and J.W.; Visualization, M.L., L.W. and J.W.; Writing—original draft, L.W. and J.W.; Writing—review & editing, Y.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This study has been supported by the Huaneng Group Headquarters Science and Technology Project of the Key Technology Research and System Development of Group Level Intelligence Operations Platform Construction (HNKJ21-H52) and the Fault Diagnosis Technology Research and System Development of Lithium-ion Battery Energy Storage Station Based on Mass Data (HNKJ21-H52-004).

Data Availability Statement

The data presented in this study are available on request from the corresponding author. The data are not publicly available due to ownership problem of the data.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

Abbreviations
AUCarea under the curve
ESSenergy storage system
FNfalse negative
FPfalse positive
FPRfalse positive rate
LOFlocal outlier factor
ROCreceiver operating characteristic
LIBlithium-ion battery
RErenewable energy
SOCstate of charge
TNtrue negative
TPtrue positive
TPRtrue positive rate
Mathematical Symbols
dithe isolation density of sample xi
d i t the insolation density of sample xi on the tth insolation tree
d i , j t the density of sample xi on the jth isolation step of the tth binary tree
kthe corresponding weight of insolation density
Lfthe interval length of feature
nthe total number of features
ntnumber of binary trees
ndepth of isolation path
pPrecision
Vthe hyper-cube volume
xithe ith sample

References

  1. Jiang, Y.; Kang, L.; Liu, Y. Optimal configuration of battery energy storage system with multiple types of batteries based on supply-demand characteristics. Energy 2020, 206, 118093. [Google Scholar] [CrossRef]
  2. Astaneh, M.; Dufo-López, R.; Roshandel, R.; Bernal-Agustin, J.L. A novel lifetime prediction method for lithium-ion batteries in the case of stand-alone renewable energy systems. Int. J. Electr. Power Energy Syst. 2018, 103, 115–126. [Google Scholar] [CrossRef]
  3. Bullich-Massagué, E.; Cifuentes-García, F.-J.; Glenny-Crende, I.; Cheah-Mañé, M.; Aragüés-Peñalba, M.; Díaz-González, F.; Gomis-Bellmunt, O. A review of energy storage technologies for large scale photovoltaic power plants. Appl. Energy 2020, 274, 115213. [Google Scholar] [CrossRef]
  4. Siddique, M.B.; Thakur, J. Assessment of curtailed wind energy potential for off-grid applications through mobile battery storage. Energy 2020, 201, 117601. [Google Scholar] [CrossRef]
  5. National Development and Reform Commission; National Energy Administration Guiding Opinions on Accelerating the Development of New Energy Storage. Available online: https://www.ndrc.gov.cn/xxgk/zcfb/ghxwj/202107/t20210723_1291321.html?code=&state=1232021 (accessed on 12 May 2022).
  6. Cao, W.; Qiu, Y.; Peng, P.; Jiang, F. A full-scale electrical-thermal-fluidic coupling model for li-ion battery energy storage systems. Appl. Therm. Eng. 2021, 185, 116360. [Google Scholar] [CrossRef]
  7. Wu, H.; Zhang, X.; Cao, R.; Yang, C. An investigation on electrical and thermal characteristics of cylindrical lithium-ion batteries at low temperatures. Energy 2021, 225, 120223. [Google Scholar] [CrossRef]
  8. Cadini, F.; Sbarufatti, C.; Cancelliere, F.; Giglio, M. State-of-life prognosis and diagnosis of lithium-ion batteries by data-driven particle filters. Appl. Energy 2019, 235, 661–672. [Google Scholar] [CrossRef]
  9. Choudhari, V.G.; Dhoble, D.A.S.; Sathe, T.M. A review on effect of heat generation and various thermal management systems for lithium ion battery used for electric vehicle. J. Energy Storage 2020, 32, 101729. [Google Scholar] [CrossRef]
  10. Deng, Z.; Hu, X.; Lin, X.; Che, Y.; Xu, L.; Guo, W. Data-driven state of charge estimation for lithium-ion battery packs based on Gaussian process regression. Energy 2020, 205, 118000. [Google Scholar] [CrossRef]
  11. Chen, Y.; Kang, Y.; Zhao, Y.; Wang, L.; Liu, J.; Li, Y.; Liang, Z.; He, X.; Tavajohif, N.; Li, B. A review of lithium-ion battery safety concerns: The issues, strategies, and testing standards. J. Energy Chem. 2021, 59, 83–99. [Google Scholar] [CrossRef]
  12. Meng, J.; Cai, L.; Stroe, D.-I.; Ma, J.; Luo, G.; Teodorescu, R. An optimized ensemble learning framework for lithium-ion Battery State of Health estimation in energy storage system. Energy 2020, 206, 118140. [Google Scholar] [CrossRef]
  13. Ge, M.-F.; Liu, Y.; Jiang, X.; Liu, J. A review on state of health estimations and remaining useful life prognostics of lithium-ion batteries. Measurement 2021, 174, 109057. [Google Scholar] [CrossRef]
  14. Hossain Lipu, M.S.; Hannan, M.A.; Hussain, A.; Ayob, A.; Saad, M.H.M.; Karim, T.F.; How, D.N.T. Data-driven state of charge estimation of lithium-ion batteries: Algorithms, implementation factors, limitations and future trends. J. Clean. Prod. 2020, 277, 124110. [Google Scholar] [CrossRef]
  15. Jia, S.; Ma, B.; Guo, W.; Li, Z.S. A sample entropy based prognostics method for lithium-ion batteries using relevance vector machine. J. Manuf. Syst. 2021, 61, 773–781. [Google Scholar] [CrossRef]
  16. Xu, T.; Peng, Z.; Wu, L. A novel data-driven method for predicting the circulating capacity of lithium-ion battery under random variable current. Energy 2021, 218, 119530. [Google Scholar] [CrossRef]
  17. Deng, Z.; Yang, L.; Cai, Y.; Deng, H.; Sun, L. Online available capacity prediction and state of charge estimation based on advanced data-driven algorithms for lithium iron phosphate battery. Energy 2016, 112, 469–480. [Google Scholar] [CrossRef]
  18. Diao, W.; Naqvi, I.H.; Pecht, M. Early detection of anomalous degradation behavior in lithium-ion batteries. J. Energy Storage 2020, 32, 101710. [Google Scholar] [CrossRef]
  19. Lee, J.; Kwon, D.; Pecht, M.G. Reduction of Li-ion battery qualification time based on prognostics and health management. IEEE Trans. Ind. Electron. 2018, 66, 7310–7315. [Google Scholar] [CrossRef]
  20. Khaleghi, S.; Karimi, D.; Beheshti, S.H.; Hosen, M.S.; Behi, H.; Berecibar, M.; Van Mierlo, J. Online health diagnosis of lithium-ion batteries based on nonlinear autoregressive neural network. Appl. Energy 2021, 282, 116159. [Google Scholar] [CrossRef]
  21. Guo, Y.; Huang, K.; Hu, X. A state-of-health estimation method of lithium-ion batteries based on multi-feature extracted from constant current charging curve. J. Energy Storage 2021, 36, 102372. [Google Scholar] [CrossRef]
  22. Zhang, M.; Kang, G.; Wu, L.; Guan, Y. A method for capacity prediction of lithium-ion batteries under small sample conditions. Energy 2022, 238, 122094. [Google Scholar] [CrossRef]
  23. Ju, H.; Lee, D.; Hwang, J.; Namkung, J.; Yu, H. PUMAD: PU Metric learning for anomaly detection. Inf. Sci. 2020, 523, 167–183. [Google Scholar] [CrossRef]
  24. Kim, T.; Park, C.H. Anomaly pattern detection for streaming data. Expert Syst. Appl. 2020, 149, 113252. [Google Scholar] [CrossRef]
  25. Song, W.; Dong, W.; Kang, L. Group anomaly detection based on Bayesian framework with genetic algorithm. Inf. Sci. 2020, 533, 138–149. [Google Scholar] [CrossRef]
  26. Wang, X.; Ahn, S.-H. Real-time prediction and anomaly detection of electrical load in a residential community. Appl. Energy 2020, 259, 114145. [Google Scholar] [CrossRef]
  27. Goldstein, M.; Dengel, A. Histogram-based Outlier Score (HBOS): A fast Unsupervised Anomaly Detection Algorithm. In Proceedings of the KI-2012: Poster and Demo Track, Saarbrücken, Germany, 24–27 September 2012; pp. 59–63. [Google Scholar]
  28. Wang, Y.; Pan, Z.; Dong, J. A new two-layer nearest neighbor selection method for kNN classifier. Knowl. Based Syst. 2022, 235, 107604. [Google Scholar] [CrossRef]
  29. Fahim, A. K and starting means for k-means algorithm. J. Comput. Sci. 2021, 55, 101445. [Google Scholar] [CrossRef]
  30. Breunig, M.M.; Kriegel, H.-P.; Ng, R.T.; Sander, J. LOF: Identifying Density-Based Local Outliers. Procacm Sigmod Intconfon Management of Data. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA, 15–18 May 2000. [Google Scholar]
  31. Ding, H.; Ding, K.; Zhang, J.; Wang, Y.; Gao, L.; Li, Y.; Chen, F.; Shao, Z.; Lai, W. Local outlier factor-based fault detection and evaluation of photovoltaic system. Sol. Energy 2018, 164, 139–148. [Google Scholar] [CrossRef]
  32. Liu, F.T.; Ting, K.M.; Zhou, Z.-H. Isolation-Based Anomaly Detection. ACM Trans. Knowl. Discov. Data 2012, 6, 1–39. [Google Scholar] [CrossRef]
  33. Li, T.; Liu, X.; Lin, Z.; Morrison, R. Ensemble offshore Wind Turbine Power Curve modelling—An integration of Isolation Forest, fast Radial Basis Function Neural Network, and metaheuristic algorithm. Energy 2022, 239, 122340. [Google Scholar] [CrossRef]
  34. Jiang, J.; Li, T.; Chang, C.; Yang, C.; Liao, L. Fault diagnosis method for lithium-ion batteries in electric vehicles based on isolated forest algorithm. J. Energy Storage 2022, 50, 104177. [Google Scholar] [CrossRef]
  35. UC Irvine Machine Learning Repository. Available online: http://archive.ics.uci.edu/ml/index.php2022 (accessed on 12 May 2022).
Figure 1. Anomaly detection of two-dimensional dataset by isolation density: (a) The first isolation operation; (b) The second isolation operation; (c) The third isolation operation; (d) The fourth isolation operation; (e) The fifth isolation operation; (f) The sixth isolation operation.
Figure 1. Anomaly detection of two-dimensional dataset by isolation density: (a) The first isolation operation; (b) The second isolation operation; (c) The third isolation operation; (d) The fourth isolation operation; (e) The fifth isolation operation; (f) The sixth isolation operation.
Sustainability 14 07048 g001
Figure 2. Circle distribution dataset.
Figure 2. Circle distribution dataset.
Sustainability 14 07048 g002
Figure 3. The detection results of four methods: (a) detection result of HBOS; (b) detection result of iForest; (c) detection result of LOF; (d) detection result of the proposed method.
Figure 3. The detection results of four methods: (a) detection result of HBOS; (b) detection result of iForest; (c) detection result of LOF; (d) detection result of the proposed method.
Sustainability 14 07048 g003
Figure 4. Double-moon distribution dataset.
Figure 4. Double-moon distribution dataset.
Sustainability 14 07048 g004
Figure 5. The detection results of four methods: (a) detection result of HBOS; (b) detection result of iForest; (c) detection result of LOF; (d) detection result of the proposed method.
Figure 5. The detection results of four methods: (a) detection result of HBOS; (b) detection result of iForest; (c) detection result of LOF; (d) detection result of the proposed method.
Sustainability 14 07048 g005
Figure 6. Parameter variations of the discharge process.
Figure 6. Parameter variations of the discharge process.
Sustainability 14 07048 g006
Figure 7. Detection results of lithium-ion batteries by the proposed method.
Figure 7. Detection results of lithium-ion batteries by the proposed method.
Sustainability 14 07048 g007
Figure 8. Three anomaly modes of voltages during discharge process.
Figure 8. Three anomaly modes of voltages during discharge process.
Sustainability 14 07048 g008
Table 1. Detection results of Wisconsin breast cancer dataset.
Table 1. Detection results of Wisconsin breast cancer dataset.
Methodsarpf1fmmccauc
HBOS0.931507 0.830000 0.732910 0.773643 0.781455 0.739036 0.973333
iForest0.941096 0.740000 0.819343 0.771269 0.779672 0.742948 0.987619
LOF0.956164 0.870000 0.834545 0.846955 0.852273 0.825007 0.987143
Our method0.9602740.8900000.8492610.8604060.8696300.8435690.993016
Bold fonts indicate the best values of each criterion of the four methods for the Wisconsin breast cancer dataset.
Table 2. Detection results of handwriting dataset.
Table 2. Detection results of handwriting dataset.
MethodsarPf1fmmccauc
HBOS0.537888 0.220000 0.828515 0.347421 0.524257 0.225380 0.784804
iForest0.7496890.6122220.9113010.7314370.7617620.5503130.935055
LOF0.9540370.9588890.9593210.9588730.9591050.9073390.991252
Our method0.9701860.9822220.9657630.9736980.9739930.9400660.992113
Bold fonts indicate the best values of each criterion of the four methods for the handwriting dataset.
Table 3. Detection results of space shuttle dataset.
Table 3. Detection results of space shuttle dataset.
MethodsarPf1fmmccauk
HBOS0.980532 0.960934 0.852222 0.903246 0.906578 0.894501 0.989560
iForest0.984245 0.976310 0.872326 0.921358 0.924318 0.914444 0.996031
LOF0.985353 0.986902 0.874377 0.927207 0.930640 0.921199 0.998799
Our method0.9861280.9997720.8794170.9339890.9395950.9298000.999225
Bold fonts indicate the best values of each criterion of the four methods for the space shuttle dataset.
Table 4. Detection results of KDD 1999 dataset.
Table 4. Detection results of KDD 1999 dataset.
Methodsarpf1fmmccauc
HBOS0.916730 0.858935 0.971104 0.910599 0.915020 0.840357 0.992173
iForest0.765162 0.551711 0.962672 0.701344 0.757191 0.586455 0.952720
LOF0.951331 0.922148 0.979244 0.947828 0.950696 0.906384 0.990327
Our method0.9921581.0000000.9846120.9922330.9923060.9844640.999962
Bold fonts indicate the best values of each criterion of the four methods for the KDD 1999 dataset.
Table 5. Detection results of banknotes dataset.
Table 5. Detection results of banknotes dataset.
MethodsaRpf1Fmmccauc
HBOS0.7916160.849180.8672290.8579180.8582050.46780.829684
iForest0.8950180.9788520.8905060.9324720.9346790.7165760.907079
LOF0.9750910.9827870.983670.9831790.9832280.9355190.994111
Our method0.9839610.994590.9839910.9892480.9892910.9580140.997232
Bold fonts indicate the best values of each criterion of the four methods for the banknotes dataset.
Table 6. Detection results of multi-distribution dataset.
Table 6. Detection results of multi-distribution dataset.
MethodsArpf1fmmccauc
HBOS:0.9788330.7810810.8682130.8209830.8246470.8118030.991721
iForest0.950500 0.275676 0.788182 0.406651 0.531929 0.446883 0.978098
LOF0.9926670.9783780.91180.9431450.9450890.9403430.999726
Our method0.9931670.9783780.9199280.9473880.9491530.9447490.999141
Bold fonts indicate the best values of each criterion of the four methods for the multi-distribution dataset.
Table 7. Battery voltages during a real discharge process.
Table 7. Battery voltages during a real discharge process.
Batteriesx1x2x3x4x5 x60
battery 13.2463.2443.2423.2423.2413.047
battery 23.2483.2453.2433.2423.2423.035
battery 33.2303.2273.2243.2243.2233.027
battery 43.2473.2443.2423.2423.2413.033
battery 53.2273.2243.2233.2223.2212.979
battery 2163.2493.2483.2463.2463.2453.054
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhu, Y.; Liu, M.; Wang, L.; Wang, J. Potential Failure Prediction of Lithium-ion Battery Energy Storage System by Isolation Density Method. Sustainability 2022, 14, 7048. https://doi.org/10.3390/su14127048

AMA Style

Zhu Y, Liu M, Wang L, Wang J. Potential Failure Prediction of Lithium-ion Battery Energy Storage System by Isolation Density Method. Sustainability. 2022; 14(12):7048. https://doi.org/10.3390/su14127048

Chicago/Turabian Style

Zhu, Yong, Mingyi Liu, Lin Wang, and Jianxing Wang. 2022. "Potential Failure Prediction of Lithium-ion Battery Energy Storage System by Isolation Density Method" Sustainability 14, no. 12: 7048. https://doi.org/10.3390/su14127048

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop