A new BVM based approach to transient security assessment

被引:2
|
作者
Mohammadi, M. [1 ]
Gharehpetian, G. B. [2 ]
Raoofat, M. [1 ]
机构
[1] Shiraz Univ, Sch Elect & Comp Engn, Shiraz, Iran
[2] Amirkabir Univ Technol, Dept Elect Engn, Tehran, Iran
来源
关键词
ball vector machines (BVM); transient stability assessment; machine learning; feature selection; SUPPORT VECTOR MACHINES; POWER-SYSTEM SECURITY; EQUAL-AREA CRITERION; STABILITY ANALYSIS; NEURAL-NETWORKS;
D O I
10.1002/etep.394
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Machine Learning techniques have been extensively used in Power Systems Analysis during the last years. This paper describes a ball vector machine based algorithm for on-line transient security assessment of large-scale power systems. The proposed ball vector machine based security assessment reduces the training time and space complexities in comparison with support vector machines, artificial neural networks, and other machine learning based algorithms. In addition, the proposed algorithm has less support vectors and therefore is faster than existing algorithms for -line applications. A new decision tree based feature selection technique has been presented, too. The proposed ball vector machine based,algorithm has been applied to New England 39-bus test system. The simulation results show the effectiveness of the proposed algorithm for on-line transient security assessment procedure. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:1163 / 1176
页数:14
相关论文
共 50 条
  • [41] A Novel Approach to Network Security Situation Assessment Based on Attack Confidence
    Liu, Donghang
    Dong, Lihua
    Lv, Shaoqing
    Dong, Ying
    He, Fannv
    Wu, Chensi
    Zhang, Yuqing
    Ma, Hua
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 450 - 463
  • [42] FAST TRANSIENT SECURITY ASSESSMENT BY PATTERN-RECOGNITION
    GARCIA, G
    DESROCHES, P
    FANTIN, J
    INFORMATION AND DECISION TECHNOLOGIES, 1991, 17 (01): : 23 - 39
  • [43] New approach for threat classification and security risk estimations based on security event management
    Sancho, Jose Carlos
    Caro, Andres
    avila, Mar
    Bravo, Alberto
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 : 488 - 505
  • [44] An improved transient stability index for dynamic security assessment using a Marginally Unstable Injection (MUI) approach
    Cheung, KW
    2000 IEEE POWER ENGINEERING SOCIETY WINTER MEETING - VOLS 1-4, CONFERENCE PROCEEDINGS, 2000, : 931 - 936
  • [45] Context-based security policies:: A new modeling approach
    Brézillon, P
    Mostéfaoui, GK
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 154 - 158
  • [46] A new approach on interactive SOA security model based on automata
    Amouzegar, Hamidreza
    Mohammadi, Shahriar
    Tarokh, Mohammad Jafar
    Hidaji, Anahita Naghilouye
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 667 - 671
  • [47] A new approach to multilevel security based on trusted computing platform
    Zuo, Xiao-Dong
    Liu, Feng-Mei
    Ma, Chao-Bin
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2158 - +
  • [48] A new security protocol modeling approach based on πt calculus
    Han, Jin
    Cai, Shengwen
    Wang, Chongjun
    Lai, Haiguang
    Xie, Junyuan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (04): : 613 - 620
  • [49] Grid of security: a new approach of the network security
    Flauzac, Olivier
    Nolot, Florent
    Rabat, Cyril
    Steffenel, Luiz-Angelo
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 67 - 72
  • [50] A generalised approach to transient security enhancement in power markets
    Lin, XJ
    Yu, CW
    David, AK
    Chung, CY
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION, RESTRUCTURING AND POWER TECHNOLOGIES, VOLS 1 AND 2, 2004, : 65 - 71