Impact of axial displacement on power transformer FRA signature
- Hashemnia, Naser, Abu-Siada, Ahmed, Islam, Syed
- Authors: Hashemnia, Naser , Abu-Siada, Ahmed , Islam, Syed
- Date: 2013
- Type: Text , Conference proceedings , Conference paper
- Relation: 2013 IEEE Power and Energy Society General Meeting, PES 2013; Vancouver, Canada; 21st-25th July 2013 p. 1-4
- Full Text:
- Reviewed:
- Description: Frequency response analysis (FRA) is gaining global popularity in detecting power transformer winding movement due to the development of FRA test equipment. However, because FRA relies on graphical analysis, interpretation of its signatures is still a very specialized area that calls for skillful personnel to detect the sort and likely place of the fault as so far, there is no reliable standard code for FRA signature classification and quantification. This paper investigates the impact of transformer winding axial displacement on its FRA signature as a step toward the establishment of reliable codes for FRA interpretation. In this context a detailed model for a singlephase transformer is simulated using 3D finite element analysis to emulate a close to real transformer. The impact of axial displacement on the electrical distributed parameters model that are calculated based on the transformer physical dimension is examined to investigate how model’s parameters including inductance and capacitance matrices change when axial displacement takes place within a power transformer.
- Authors: Hashemnia, Naser , Abu-Siada, Ahmed , Islam, Syed
- Date: 2013
- Type: Text , Conference proceedings , Conference paper
- Relation: 2013 IEEE Power and Energy Society General Meeting, PES 2013; Vancouver, Canada; 21st-25th July 2013 p. 1-4
- Full Text:
- Reviewed:
- Description: Frequency response analysis (FRA) is gaining global popularity in detecting power transformer winding movement due to the development of FRA test equipment. However, because FRA relies on graphical analysis, interpretation of its signatures is still a very specialized area that calls for skillful personnel to detect the sort and likely place of the fault as so far, there is no reliable standard code for FRA signature classification and quantification. This paper investigates the impact of transformer winding axial displacement on its FRA signature as a step toward the establishment of reliable codes for FRA interpretation. In this context a detailed model for a singlephase transformer is simulated using 3D finite element analysis to emulate a close to real transformer. The impact of axial displacement on the electrical distributed parameters model that are calculated based on the transformer physical dimension is examined to investigate how model’s parameters including inductance and capacitance matrices change when axial displacement takes place within a power transformer.
A comparison of bidding strategies for online auctions using fuzzy reasoning and negotiation decision functions
- Kaur, Preetinder, Goyal, Madhu, Lu, Jie
- Authors: Kaur, Preetinder , Goyal, Madhu , Lu, Jie
- Date: 2017
- Type: Text , Journal article
- Relation: IEEE Transactions on Fuzzy Systems Vol. 25, no. 2 (2017), p. 425-438
- Full Text:
- Reviewed:
- Description: Bidders often feel challenged when looking for the best bidding strategies to excel in the competitive environment of multiple and simultaneous online auctions for same or similar items. Bidders face complicated issues for deciding which auction to participate in, whether to bid early or late, and how much to bid. In this paper, we present the design of bidding strategies, which aim to forecast the bid amounts for buyers at a particular moment in time based on their bidding behavior and their valuation of an auctioned item. The agent develops a comprehensive methodology for final price estimation, which designs bidding strategies to address buyers' different bidding behaviors using two approaches: Mamdani method with regression analysis and negotiation decision functions. The experimental results show that the agents who follow fuzzy reasoning with a regression approach outperform other existing agents in most settings in terms of their success rate and expected utility.
- Authors: Kaur, Preetinder , Goyal, Madhu , Lu, Jie
- Date: 2017
- Type: Text , Journal article
- Relation: IEEE Transactions on Fuzzy Systems Vol. 25, no. 2 (2017), p. 425-438
- Full Text:
- Reviewed:
- Description: Bidders often feel challenged when looking for the best bidding strategies to excel in the competitive environment of multiple and simultaneous online auctions for same or similar items. Bidders face complicated issues for deciding which auction to participate in, whether to bid early or late, and how much to bid. In this paper, we present the design of bidding strategies, which aim to forecast the bid amounts for buyers at a particular moment in time based on their bidding behavior and their valuation of an auctioned item. The agent develops a comprehensive methodology for final price estimation, which designs bidding strategies to address buyers' different bidding behaviors using two approaches: Mamdani method with regression analysis and negotiation decision functions. The experimental results show that the agents who follow fuzzy reasoning with a regression approach outperform other existing agents in most settings in terms of their success rate and expected utility.
An Attention-Based Approach for Single Image Super Resolution
- Liu, Yuan, Wang, Yuancheng, Li, Nan, Cheng, Xu, Zhang, Yifeng, Huang, Yongming, Lu, Guojun
- Authors: Liu, Yuan , Wang, Yuancheng , Li, Nan , Cheng, Xu , Zhang, Yifeng , Huang, Yongming , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 24th International Conference on Pattern Recognition, ICPR 2018; Beijing, China; 20th-24th August 2018 Vol. 2018, p. 2777-2784
- Full Text:
- Reviewed:
- Description: The main challenge of single image super resolution (SISR) is the recovery of high frequency details such as tiny textures. However, most of the state-of-the-art methods lack specific modules to identify high frequency areas, causing the output image to be blurred. We propose an attention-based approach to give a discrimination between texture areas and smooth areas. After the positions of high frequency details are located, high frequency compensation is carried out. This approach can incorporate with previously proposed SISR networks. By providing high frequency enhancement, better performance and visual effect are achieved. We also propose our own SISR network composed of DenseRes blocks. The block provides an effective way to combine the low level features and high level features. Extensive benchmark evaluation shows that our proposed method achieves significant improvement over the state-of-the-art works in SISR.
- Authors: Liu, Yuan , Wang, Yuancheng , Li, Nan , Cheng, Xu , Zhang, Yifeng , Huang, Yongming , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 24th International Conference on Pattern Recognition, ICPR 2018; Beijing, China; 20th-24th August 2018 Vol. 2018, p. 2777-2784
- Full Text:
- Reviewed:
- Description: The main challenge of single image super resolution (SISR) is the recovery of high frequency details such as tiny textures. However, most of the state-of-the-art methods lack specific modules to identify high frequency areas, causing the output image to be blurred. We propose an attention-based approach to give a discrimination between texture areas and smooth areas. After the positions of high frequency details are located, high frequency compensation is carried out. This approach can incorporate with previously proposed SISR networks. By providing high frequency enhancement, better performance and visual effect are achieved. We also propose our own SISR network composed of DenseRes blocks. The block provides an effective way to combine the low level features and high level features. Extensive benchmark evaluation shows that our proposed method achieves significant improvement over the state-of-the-art works in SISR.
Building roof plane extraction from LIDAR data
- Awrangjeb, Mohammad, Lu, Guojun
- Authors: Awrangjeb, Mohammad , Lu, Guojun
- Date: 2013
- Type: Text , Conference paper
- Relation: 2013 International Conference on Digital Image Computing: Techniques and Applications (DICTA)
- Full Text:
- Reviewed:
- Description: This paper presents a new segmentation technique to use LIDAR point cloud data for automatic extraction of building roof planes. The raw LIDAR points are first classified into two major groups: ground and non-ground points. The ground points are used to generate a 'building mask' in which the black areas represent the ground where there are no laser returns below a certain height. The non-ground points are segmented to extract the planar roof segments. First, the building mask is divided into small grid cells. The cells containing the black pixels are clustered such that each cluster represents an individual building or tree. Second, the non-ground points within a cluster are segmented based on their coplanarity and neighbourhood relations. Third, the planar segments are refined using a rule-based procedure that assigns the common points among the planar segments to the appropriate segments. Finally, another rule-based procedure is applied to remove tree planes which are generally small in size and randomly oriented. Experimental results on three Australian sites have shown that the proposed method offers high building detection and roof plane extraction rates.
- Authors: Awrangjeb, Mohammad , Lu, Guojun
- Date: 2013
- Type: Text , Conference paper
- Relation: 2013 International Conference on Digital Image Computing: Techniques and Applications (DICTA)
- Full Text:
- Reviewed:
- Description: This paper presents a new segmentation technique to use LIDAR point cloud data for automatic extraction of building roof planes. The raw LIDAR points are first classified into two major groups: ground and non-ground points. The ground points are used to generate a 'building mask' in which the black areas represent the ground where there are no laser returns below a certain height. The non-ground points are segmented to extract the planar roof segments. First, the building mask is divided into small grid cells. The cells containing the black pixels are clustered such that each cluster represents an individual building or tree. Second, the non-ground points within a cluster are segmented based on their coplanarity and neighbourhood relations. Third, the planar segments are refined using a rule-based procedure that assigns the common points among the planar segments to the appropriate segments. Finally, another rule-based procedure is applied to remove tree planes which are generally small in size and randomly oriented. Experimental results on three Australian sites have shown that the proposed method offers high building detection and roof plane extraction rates.
A performance review of recent corner detectors
- Awrangjeb, Mohammad, Lu, Guojun
- Authors: Awrangjeb, Mohammad , Lu, Guojun
- Date: 2013
- Type: Text , Conference paper
- Relation: International Conference on Digital Image Computing: Techniques and Applications, 26 November 2013 to 28 November 2013 p. 157-164
- Full Text:
- Reviewed:
- Description: Contour-based corner detectors directly or indirectly estimate a significance measure (eg, curvature) on the points of a planar curve and select the curvature extrema points as corners. A number of promising contour-based corner detectors have recently been proposed. They mainly differ in how the curvature is estimated on each point of the given curve. As the curvature on a digital curve can only be approximated, it is important to estimate a curvature that remains stable against significant noises, for example, geometric transformations and compression, on the curve. Moreover, in many applications, for instance, in content-based image retrieval, a fast corner detector is a prerequisite. So, it is also a primary characteristic that how much time a corner detector takes for corner detection in a given image. In addition, different authors evaluated their detectors on different platforms using different evaluation systems. Evaluation systems that depend on human judgements and visual identification of corners are manual and too subjective. Application of a manual system on a large test database will be expensive. Therefore, it is important to evaluate the detectors on a common platform using an automatic evaluation system. This paper first reviews six most recent and highly performed corner detectors and analyse their theoretical running time. Then it uses an automatic evaluation system to analyse their performance. Both the robustness to noise and efficiency are estimated to rank the detectors.
- Authors: Awrangjeb, Mohammad , Lu, Guojun
- Date: 2013
- Type: Text , Conference paper
- Relation: International Conference on Digital Image Computing: Techniques and Applications, 26 November 2013 to 28 November 2013 p. 157-164
- Full Text:
- Reviewed:
- Description: Contour-based corner detectors directly or indirectly estimate a significance measure (eg, curvature) on the points of a planar curve and select the curvature extrema points as corners. A number of promising contour-based corner detectors have recently been proposed. They mainly differ in how the curvature is estimated on each point of the given curve. As the curvature on a digital curve can only be approximated, it is important to estimate a curvature that remains stable against significant noises, for example, geometric transformations and compression, on the curve. Moreover, in many applications, for instance, in content-based image retrieval, a fast corner detector is a prerequisite. So, it is also a primary characteristic that how much time a corner detector takes for corner detection in a given image. In addition, different authors evaluated their detectors on different platforms using different evaluation systems. Evaluation systems that depend on human judgements and visual identification of corners are manual and too subjective. Application of a manual system on a large test database will be expensive. Therefore, it is important to evaluate the detectors on a common platform using an automatic evaluation system. This paper first reviews six most recent and highly performed corner detectors and analyse their theoretical running time. Then it uses an automatic evaluation system to analyse their performance. Both the robustness to noise and efficiency are estimated to rank the detectors.
Integration of LIDAR data and orthoimage for automatic 3D building roof plane extraction
- Awrangjeb, Mohammad, Fraser, Clive, Lu, Guojun
- Authors: Awrangjeb, Mohammad , Fraser, Clive , Lu, Guojun
- Date: 2013
- Type: Text , Conference paper
- Relation: 2013 IEEE International Conference on Multimedia and Expo (ICME)
- Full Text:
- Reviewed:
- Description: Automatic 3D extraction of building roofs from remotely sensed data is important for many applications including city modeling. This paper proposes a new method for automatic 3D roof extraction through an effective integration of LIDAR (Light Detection And Ranging) data and multispectral orthoimagery. Using the ground height from a DEM (Digital Elevation Model), the raw LIDAR points are separated into two groups. The first group contains the ground points that are exploited to constitute a `ground mask'. The second group contains the non-ground points which are segmented using an innovative image line guided segmentation technique to extract the roof planes. The image lines extracted from the grey-scale version of the orthoimage are classified into several classes such as `ground', `tree', `roof edge' and `roof ridge' using the ground mask and colour and texture information from the orthoimagery. During roof plane extraction the lines from the later two classes are used to fit roof planes to the neighbouring non-ground LIDAR points. Finally, a new rule-based procedure is applied to remove planes constructed on trees. Experimental results show that the proposed method successfully removes vegetation and offers high extraction rates.
- Authors: Awrangjeb, Mohammad , Fraser, Clive , Lu, Guojun
- Date: 2013
- Type: Text , Conference paper
- Relation: 2013 IEEE International Conference on Multimedia and Expo (ICME)
- Full Text:
- Reviewed:
- Description: Automatic 3D extraction of building roofs from remotely sensed data is important for many applications including city modeling. This paper proposes a new method for automatic 3D roof extraction through an effective integration of LIDAR (Light Detection And Ranging) data and multispectral orthoimagery. Using the ground height from a DEM (Digital Elevation Model), the raw LIDAR points are separated into two groups. The first group contains the ground points that are exploited to constitute a `ground mask'. The second group contains the non-ground points which are segmented using an innovative image line guided segmentation technique to extract the roof planes. The image lines extracted from the grey-scale version of the orthoimage are classified into several classes such as `ground', `tree', `roof edge' and `roof ridge' using the ground mask and colour and texture information from the orthoimagery. During roof plane extraction the lines from the later two classes are used to fit roof planes to the neighbouring non-ground LIDAR points. Finally, a new rule-based procedure is applied to remove planes constructed on trees. Experimental results show that the proposed method successfully removes vegetation and offers high extraction rates.
A critical analysis of mobility management related issues of wireless sensor networks in cyber physical systems
- Al-Muhtadi, Jalal, Qiang, Ma, Zeb, Khan, Chaudhry, Junaid, Imran, Muhammad
- Authors: Al-Muhtadi, Jalal , Qiang, Ma , Zeb, Khan , Chaudhry, Junaid , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 16363-16376
- Full Text:
- Reviewed:
- Description: Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record**
- Authors: Al-Muhtadi, Jalal , Qiang, Ma , Zeb, Khan , Chaudhry, Junaid , Imran, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Access Vol. 6, no. (2018), p. 16363-16376
- Full Text:
- Reviewed:
- Description: Mobility management has been a long-standing issue in mobile wireless sensor networks and especially in the context of cyber physical systems its implications are immense. This paper presents a critical analysis of the current approaches to mobility management by evaluating them against a set of criteria which are essentially inherent characteristics of such systems on which these approaches are expected to provide acceptable performance. We summarize these characteristics by using a quadruple set of metrics. Additionally, using this set we classify the various approaches to mobility management that are discussed in this paper. Finally, the paper concludes by reviewing the main findings and providing suggestions that will be helpful to guide future research efforts in the area. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record**
Bio-inspired network security for 5G-enabled IoT applications
- Saleem, Kashif, Alabduljabbar, Ghadah, Alrowais, Nouf, Al-Muhtadi, Jalal, Imran, Muhammad, Rodrigues, Joel
- Authors: Saleem, Kashif , Alabduljabbar, Ghadah , Alrowais, Nouf , Al-Muhtadi, Jalal , Imran, Muhammad , Rodrigues, Joel
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE access Vol. 8, no. (2020), p. 1-1
- Full Text:
- Reviewed:
- Description: Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform will quickly grow to be populated with billions or more objects by making every electrical appliance, car, and even items of furniture smart and connected. The 5th generation (5G) and beyond networks will further boost these IoT systems. The massive utilization of these systems over gigabits per second generates numerous issues. Owing to the huge complexity in large-scale deployment of IoT, data privacy and security are the most prominent challenges, especially for critical applications such as Industry 4.0, e-healthcare, and military. Threat agents persistently strive to find new vulnerabilities and exploit them. Therefore, including promising security measures to support the running systems, not to harm or collapse them, is essential. Nature-inspired algorithms have the capability to provide autonomous and sustainable defense and healing mechanisms. This paper first surveys the 5G network layer security for IoT applications and lists the network layer security vulnerabilities and requirements in wireless sensor networks, IoT, and 5G-enabled IoT. Second, a detailed literature review is conducted with the current network layer security methods and the bio-inspired techniques for IoT applications exchanging data packets over 5G. Finally, the bio-inspired algorithms are analyzed in the context of providing a secure network layer for IoT applications connected over 5G and beyond networks.
- Authors: Saleem, Kashif , Alabduljabbar, Ghadah , Alrowais, Nouf , Al-Muhtadi, Jalal , Imran, Muhammad , Rodrigues, Joel
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE access Vol. 8, no. (2020), p. 1-1
- Full Text:
- Reviewed:
- Description: Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform will quickly grow to be populated with billions or more objects by making every electrical appliance, car, and even items of furniture smart and connected. The 5th generation (5G) and beyond networks will further boost these IoT systems. The massive utilization of these systems over gigabits per second generates numerous issues. Owing to the huge complexity in large-scale deployment of IoT, data privacy and security are the most prominent challenges, especially for critical applications such as Industry 4.0, e-healthcare, and military. Threat agents persistently strive to find new vulnerabilities and exploit them. Therefore, including promising security measures to support the running systems, not to harm or collapse them, is essential. Nature-inspired algorithms have the capability to provide autonomous and sustainable defense and healing mechanisms. This paper first surveys the 5G network layer security for IoT applications and lists the network layer security vulnerabilities and requirements in wireless sensor networks, IoT, and 5G-enabled IoT. Second, a detailed literature review is conducted with the current network layer security methods and the bio-inspired techniques for IoT applications exchanging data packets over 5G. Finally, the bio-inspired algorithms are analyzed in the context of providing a secure network layer for IoT applications connected over 5G and beyond networks.
DC fault identification in multiterminal HVDC systems based on reactor voltage gradient
- Hassan, Mehedi, Hossain, M., Shah, Rakibuzzaman
- Authors: Hassan, Mehedi , Hossain, M. , Shah, Rakibuzzaman
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Access Vol. 9, no. (2021), p. 115855-115867
- Full Text:
- Reviewed:
- Description: With the increasing number of renewable generations, the prospects of long-distance bulk power transmission impels the expansion of point-to-point High Voltage Direct Current (HVDC) grid to an emerging Multi-terminal high-voltage Direct Current (MTDC) grid. The DC grid protection with faster selectivity enhances the operational continuity of the MTDC grid. Based on the reactor voltage gradient (RVG), this paper proposes a fast and reliable fault identification technique with precise discrimination of internal and external DC faults. Considering the voltage developed across the modular multilevel converter (MMC) reactor and DC terminal reactor, the RVG is formulated to characterise an internal and external DC fault. With a window of four RVG samples, the fault is detected and discriminated by the proposed main protection scheme amidst a period of five sampling intervals. Depending on the reactor current increment, a backup protection scheme is also proposed to enhance the protection reliability. The performance of the proposed scheme is validated in a four-terminal MTDC grid. The results under meaningful fault events show that the proposed scheme is capable to identify the DC fault within millisecond. Moreover, the evaluation of the protection sensitivity and robustness reveals that the proposed scheme is highly selective for a wide range of fault resistances and locations, higher sampling frequencies, and irrelevant transient events. Furthermore, the comparison results exhibit that the proposed RVG method improves the discrimination performance of the protection scheme and thereby, proves to be a better choice for future DC fault identification.
- Authors: Hassan, Mehedi , Hossain, M. , Shah, Rakibuzzaman
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Access Vol. 9, no. (2021), p. 115855-115867
- Full Text:
- Reviewed:
- Description: With the increasing number of renewable generations, the prospects of long-distance bulk power transmission impels the expansion of point-to-point High Voltage Direct Current (HVDC) grid to an emerging Multi-terminal high-voltage Direct Current (MTDC) grid. The DC grid protection with faster selectivity enhances the operational continuity of the MTDC grid. Based on the reactor voltage gradient (RVG), this paper proposes a fast and reliable fault identification technique with precise discrimination of internal and external DC faults. Considering the voltage developed across the modular multilevel converter (MMC) reactor and DC terminal reactor, the RVG is formulated to characterise an internal and external DC fault. With a window of four RVG samples, the fault is detected and discriminated by the proposed main protection scheme amidst a period of five sampling intervals. Depending on the reactor current increment, a backup protection scheme is also proposed to enhance the protection reliability. The performance of the proposed scheme is validated in a four-terminal MTDC grid. The results under meaningful fault events show that the proposed scheme is capable to identify the DC fault within millisecond. Moreover, the evaluation of the protection sensitivity and robustness reveals that the proposed scheme is highly selective for a wide range of fault resistances and locations, higher sampling frequencies, and irrelevant transient events. Furthermore, the comparison results exhibit that the proposed RVG method improves the discrimination performance of the protection scheme and thereby, proves to be a better choice for future DC fault identification.
A probabilistic reverse power flows scenario analysis framework
- Demazy, Antonin, Alpcan, Tansu, Mareels, Iven
- Authors: Demazy, Antonin , Alpcan, Tansu , Mareels, Iven
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE open access journal of power and energy Vol. 7, no. (2020), p. 524-532
- Full Text:
- Reviewed:
- Description: Distributed Energy Resources (DER), mainly residential solar PV, are embedded deep within the power distribution network and their adoption is fast increasing globally. As more customers participate, these power generation units cause Reverse Power Flow (RPF) at the edge of the grid, directed upstream into the network, thus violating one of the traditional design principles for power networks. The effects of a single residential solar PV system is negligible, but as the adoption by end-consumers increases to high percentages, the aggregated effect is no longer negligible and must be considered in the design and configuration of power networks. This article proposes a framework that helps to predict the RPF intensity probability for any given scenario of DER penetration within the distribution network. The considered scenario parameters are the number and location of each residential DERs, their capacity and the daily net-load profiles. Classical simulation-based approach for this is not scalable as it relies on solving the load-flow equations for each individual scenario. The framework leverages machine learning techniques to make fast and precise RPF prediction within the network for each scenario. The framework enables the Distribution Network Service Providers (DNSPs) to assess DERs penetration scenarios at a granular level, derive and localise the RPF risks and assess the respective impacts on the installed assets for network planning purpose. The framework is illustrated with scenario analysis conducted on an IEEE 123 bus system and OpenDSS and shown that it can lead to multiple orders of magnitude savings in computational time while retaining an accuracy of 94% or above compared to classical brute force simulations.
- Authors: Demazy, Antonin , Alpcan, Tansu , Mareels, Iven
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE open access journal of power and energy Vol. 7, no. (2020), p. 524-532
- Full Text:
- Reviewed:
- Description: Distributed Energy Resources (DER), mainly residential solar PV, are embedded deep within the power distribution network and their adoption is fast increasing globally. As more customers participate, these power generation units cause Reverse Power Flow (RPF) at the edge of the grid, directed upstream into the network, thus violating one of the traditional design principles for power networks. The effects of a single residential solar PV system is negligible, but as the adoption by end-consumers increases to high percentages, the aggregated effect is no longer negligible and must be considered in the design and configuration of power networks. This article proposes a framework that helps to predict the RPF intensity probability for any given scenario of DER penetration within the distribution network. The considered scenario parameters are the number and location of each residential DERs, their capacity and the daily net-load profiles. Classical simulation-based approach for this is not scalable as it relies on solving the load-flow equations for each individual scenario. The framework leverages machine learning techniques to make fast and precise RPF prediction within the network for each scenario. The framework enables the Distribution Network Service Providers (DNSPs) to assess DERs penetration scenarios at a granular level, derive and localise the RPF risks and assess the respective impacts on the installed assets for network planning purpose. The framework is illustrated with scenario analysis conducted on an IEEE 123 bus system and OpenDSS and shown that it can lead to multiple orders of magnitude savings in computational time while retaining an accuracy of 94% or above compared to classical brute force simulations.