Weitere Kapitel dieses Buchs durch Wischen aufrufen
Power system security assessment involves ascertaining the post-contingency security status based on the pre-contingency operating conditions. A system operator accomplishes this by the knowledge of critical system attributes which are closely tied to the system security limits. For instance, voltage levels, reactive power reserves, reactive power flows are some of the attributes that drive the voltage stability phenomena, and hence provide easy guidelines for the operators to monitor and maneuver the highly stressed power system to a secure state. With tremendous advancements in computational power and machine learning techniques, there is increased ability to produce security guidelines that are highly accurate and robust under a wide variety of system conditions. Particularly, the decision trees, a data mining tool, has lend itself well in extracting highly useful and succinct knowledge from a very large repository of historical information. The most vital and sensitive part of such a decision tree based security assessment is the stage of training database generation, a computationally intensive process which involves sampling many system operating conditions and performing power system contingency assessment simulations on them. The classification performance of operating guidelines under realistic testing scenarios depend heavily on the quality of the training database used to generate the decision trees. So the primary objective of this chapter is to develop an improvised database generation process that creates a satisfactory training database by sampling the most influential operating conditions from the input operating parameter state space prior to the stage of power system contingency simulation. Embedding such intelligence to the system scenario sampling process enhances the information content in the training database, while minimizing the computing requirements to generate it. This chapter will clearly explain and demonstrate the process of identifying such high information contained sampling space and the advantage of deriving security guidelines from decision trees that exclusively use such an enhanced training database.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Abed, A. M. (1999). WSCC voltage stability criteria, under voltage load shedding strategy, and reactive power reserve monitoring methodology. In IEEE Power Engineering Society Summer Meeting (pp. 191–197), July 18–22, 1999, Edmonton, Alta. doi: 10.1109/PESS.1999.784345.
Beshir, M. J. (1999). Probabilistic based transmission planning and operation criteria development for the Western Systems Coordinating Council. In IEEE Power Engineering Society Summer Meeting (pp. 134–139), July 18–22, 1999, Edmonton, Alta. doi: 10.1109/PESS.1999.784334.
Billinton, R., Salvaderi, L., McCalley, J. D., Chao, H., Seitz, Th, Allan, R. N., et al. (1997). Reliability issues in today’s electric power utility environment. IEEE Transactions Power Systems, 12(4), 1708–1714. CrossRef
Cholley, P., Lebrevelec, C., Vitet, S., & De Pasquale, M. (1998). Constructing operating rules to avoid voltage collapse: A statistical approach. In Proceedings of International Conference on Power System Technology, POWERCON ’98 (pp. 1468–1472), August 18–21, 1998, Beijing. doi: 10.1109/ICPST.1998.729331.
Chowdhury, A. A., & Koval, D. O. (2006). Probabilistic assessment of transmission system reliability performance. In IEEE Power Engineering Society General Meeting, Montreal, Que. doi: 10.1109/PES.2006.1709096.
Cutsem, T. V., Wehenkel, L., Pavella, M., Heilbronn, B., & Goubin, M. (1993). Decision tree approaches to voltage security assessment. In IEE Proceedings on Generation, Transmission and Distribution (Vol. 140, No. 3, pp. 189–198).
Dobson, I., & Lu, L. (2002). New methods for computing a closest saddle node bifurcation and worst case load power margin for voltage collapse. IEEE Transactions Power Systems, 8(3), 905–913. CrossRef
Dy-Liacco, T. E. (1997). Enhancing power system security control. IEEE Computer Applications in Power, 10(3), 38–41. CrossRef
Foody, G. M. (1999). The significance of border training patterns in classification by a feed forward neural network using back propagation learning. International Journal of Remote Sensing, 20(18), 3549–3562. CrossRef
Genc, I., Diao, R., Vittal, V., Kolluri, S., & Mandal, S. (2010). Decision tree-based preventive and corrective control applications for dynamic security enhancement in power systems. IEEE Transactions Power Systems, 25(3), 1611–1619. CrossRef
Greene, S., Dobson, I., & Alvarado, F. L. (1997). Sensitivity of the loading margin to voltage collapse with respect to arbitrary parameters. IEEE Transactions on Power Systems, 12(1), 262–272. CrossRef
Henry, S., Lebrevelec, C., and Schlumberger, Y. (1999). Defining operating rules against voltage collapse using a statistical approach: The EDF experience. In International Conference on Electric Power Engineering, PowerTech Budapest, August 29–September 2, 1999, Budapest, Hungary. doi: 10.1109/PTC.1999.826461.
Henry, S., Bréda-Séyès, E., Lefebvre, H., Sermanson, V., & Béna, M. (2006). Probabilistic study of the collapse modes of an area of the French network. In Proceedings of the 9th International Conference on Probabilistic Methods Applied to Power Systems (pp. 1–6), June 11–15, 2006, Stockholm. doi: 10.1109/PMAPS.2006.360261.
Henry, S., Pompee, J., Bulot, M., and Bell, K. (2004a). Applications of statistical assessment of power system security under uncertainty. In International Conference on Probabilistic Methods Applied to Power Systems (pp. 914–919). September 16–16, 2004, Ames, IA.
Henry, S., Pompee, J., Devatine, L., Bulot, M., and Bell, K. (2004b). New trends for the assessment of power system security under uncertainty. In IEEE PES Power Systems Conference and Exposition (pp. 1380–1385), Oct 10–13, 2004. doi: 10.1109/PSCE.2004.1397731.
Hormann, W., Leydold, J., & Derflinger, G. (2004). Automatic non-uniform random variate generation. Newyork: Springer. CrossRef
Jacquemart, Y., Wehenkel, L., & Pruvot, P. (1996). Practical contribution of a statistical methodology to voltage security criteria determination. In Proceedings of the 12th Power Systems Computation Conference (pp. 903–910).
Jiantao, X., Mingyi, H., Yuying, W., & Yan, F. (2003). A fast training algorithm for support vector machine via boundary sample selection. In Proceedings of the International Conference on Neural Networks and Signal Processing (pp. 20–22), December 14–17, 2003, Nanjing. doi: 10.1109/ICNNSP.2003.1279203.
Krishnan, V., Liu, H., and McCalley, J. D. (2009). Coordinated reactive power planning against power system voltage instability. In IEEE/PES Power Systems Conference and Exposition (pp. 1–8), March 15–18, 2009, Seattle, WA. doi: 10.1109/PSCE.2009.4839926.
Lebrevelec, C., Schlumberger, Y., & De Pasquale, M. (1999). An application of a risk based methodology for defining security rules against voltage collapse. In IEEE Power Engineering Society Summer Meeting (pp. 185–190), Jul 18–22, 1999, Edmonton, Alta. doi: 10.1109/PESS.1999.784344.
Lebrevelec, C., Cholley, P., Quenet, J.F., & Wehenkel, L. (1998). A statistical analysis of the impact on security of a protection scheme on the French power system. In Proceedings of International Conference on Power System Technology, POWERCON (pp. 1102–1106), Aug 18–21, 1998, Beijing. doi: 10.1109/ICPST.1998.729256.
Li, W., & Choudhury, P. (2007). Probabilistic transmission planning. IEEE Power and Energy Magazine, 5(5), 46–53. CrossRef
Long, B., & Ajjarpau, V. (1999). The sparse formulation of ISPS and its application to voltage stability margin sensitivity and estimation. IEEE Transactions on Power Systems, 14(3), 944–951. CrossRef
Martigne, H., Cholley, P., King, D., & Christon, J. (2001). Statistical method to determine operating rules in the event of generator dropout on EDF French Guyana Grid. In Proceedings of IEEE Power Tech (pp. 1–5), Sep 10–13, 2001, Porto. doi: 10.1109/PTC.2001.964599.
Niimura, T., Ko, H. S., Xu, H., Moshref, A., and Morison, K. (2004). Machine learning approach to power system dynamic security analysis. IEEE PES Power Systems Conference and Exposition (pp. 1084–1088), October 10–13, 2004. doi: 10.1109/PSCE.2004.1397549.
Papaefthymiou, G., & Kurowicka, D. (2009). Using copulas for modeling stochastic dependence in power system uncertainty analysis. IEEE Transactions Power Systems, 24(1), 40–49. CrossRef
Paul J., Bell K. (2004). A flexible and comprehensive approach to the assessment of large-scale power system security under uncertainty. International Journal of Electrical Power & Energy Systems, 26(4), 265–272.
Pierre, J., Lebrevelec, C., & Wehenkel, L. (1999). Automatic learning methods applied to dynamic security assessment of power systems. In International Conference on Electric Power Engineering. PowerTech Budapest, Aug 29–Sept 2, 1999, Budapest, Hungary. doi: 10.1109/PTC.1999.826612.
Rencher, A. (1995). Methods of multivariate analysis. New York: Wiley. MATH
Schlumberger, Y., Lebrevelec, C., & De Pasquale, M. (1999). Power systems security analysis-new approaches used at EDF. IEEE Power Engineering Society Summer Meeting (pp. 147–151), Jul 18–22, 1999, Edmonton, Alta. doi: 10.1109/PESS.1999.784337.
Schlumberger, Y., Pompee, J., & De Pasquale, M. (2002). Updating operating rules against voltage collapse using new probabilistic techniques. In IEEE/PES Transmission and Distribution Conference and Exhibition: Asia Pacific (pp. 1139-1144), October 6–10, 2002. doi: 10.1109/TDC.2002.1177638.
Senroy, N., Heydt, G. T., & Vittal, V. (2006). Decision tree assisted controlled islanding. IEEE Transactions Power Systems, 21(4), 1790–1797. CrossRef
Singh, C., & Mitra, J. (1997). Composite system reliability evaluation using state space pruning. IEEE Transactions Power Systems, 12(1), 471–479. CrossRef
Thisted, R. A. (1988). Elements of statistical computing. New York: Chapman and Hal Ltd.
Unger, E. A., Harn, L., and Kumar, V. (1990). Entropy as a measure of database information. In Proceedings of the Sixth Annual in Computer Security Applications Conference (pp. 80–87), December 3–7, 1990, Tucson, AZ. doi: 10.1109/CSAC.1990.143755.
Wan, H., McCalley, J. D., & Vittal, V. (2000). Risk based voltage security assessment. IEEE Transactions Power Systems, 15(4), 1247–1254. CrossRef
WECC. (2003, April). NERC/WECC planning strandards. Available at, http://www.wecc.biz/documents/library/procedures/planning/WECC-NERC_Planning%20Standards_4-10-03.pdf.
Wehenkel, L. (1997). Machine learning approaches to power-system security assessment. IEEE Expert, IEEE Intelligent Systems and Their Applications, 12(5), 60–72.
Wehenkel, L. (1998). Automatic learning techniques in power systems. Berlin: Kluwer Academic Publishers.
Wehenkel, L., Glavic, M., Geurts, P., & Ernst, D. (2006). Automatic learning of sequential decision strategies for dynamic security assessment and control. In IEEE Power Engineering Society General Meeting, Montreal, Que. doi: 10.1109/PES.2006.1708874.
Witten, I. H., & Frank, E. (2000). Data mining: Practical machine learning tools and techniques with Java implementations. San Fransisco, CA: Morgan Kaufmann Publishers.
Wyss, W. G., & Jorgensen, K. H. (1998). A user’s guide to LHS: Sandia’s latin hypercube sampling software. Sandia National Laboratories Report SAND98-0210, Albuquerque, NM.
Xiao, F., & McCalley, J. D. (2007). Risk-based security and economy tradeoff analysis for real-time operation. IEEE Transactions Power Systems, 22(4), 2287–2288. CrossRef
Yu, X., & Singh, C. (2004). Expected power loss calculation including protection failures using importance sampling and SOM. In IEEE Power Engineering Society General Meeting (pp 206–211), June 6–10, 2004. doi: 10.1109/PES.2004.1372787.
Zhou, G., & McCalley, J. D. (1999). Composite security boundary visualization. IEEE Transactions Power Systems, 14(2), 725–731. CrossRef
Zhou, Q., Davidson, J., & Fouad, A. A. (1994). Application of artificial neural networks in power system security and vulnerability assessment. IEEE Transactions Power Systems, 9(1), 525–532. CrossRef
- Enhanced Power System Security Assessment Through Intelligent Decision Trees
Neuer Inhalt/© ITandMEDIA, Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung/© astrosystem | stock.adobe.com