By Topic

Border identification for power system security assessment using neural network inversion: an overview

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Kassabalidis, I.N. ; Dept. of Electr. Eng., Washington Univ., Seattle, WA, USA ; El-Sharkawi, M.A. ; Marks, R.J., II

Knowledge of the dynamic security border can provide an operator with valuable information on how to safely steer the power system away from vulnerable operating regions. The large set of non-linear differential equations that describe modern large-scale power systems makes it difficult to determine the security border either analytically or numerically in real time. As an alternative, neural networks trained off line on emulator data can provide a commensurate representation of the system transfer function, while significantly decreasing evaluation time. Using neural network inversion, sets of input points corresponding to a fixed output can be evaluated quickly. Different inversion procedures and their properties are reviewed here. We also review various metrics used for determining whether sufficient coverage of the border is achieved. Finally, we illustrate the use of border identification for preventive control when feature selection is initially performed to reduce the dimensionality of the input space

Published in:

Evolutionary Computation, 2002. CEC '02. Proceedings of the 2002 Congress on  (Volume:2 )

Date of Conference: