ABSTRACT

An algorithm based on the Fourier Transform (FT) and the k-nearest neighbors (K-NN) was proposed [11]. Still, this algorithm uses data windows corresponding to 1 cycle, thus their operation time is similar to the traditional protection algorithms.