Steady-state Security Assessment Based on K-Means Clustering Algorithm and Phasor Measurement Units

被引:2
作者
Hemade, Bassam A. [1 ]
Ibrahim, Hamed A. [1 ]
Talaat, Hossam E. A. [2 ]
机构
[1] Suez Univ, Fac Ind Educ, Power & Elect Machines Dept, Suez, Egypt
[2] Future Univ, Elect Power Engn Dept, Fac Engn, Cairo, Egypt
关键词
Blackout; contingency screening and ranking; k-means algorithm; unsupervised clustering techniques; phasor measurement units; principal components analysis; silhouette analysis; static security assessment; synchronized measurements; TEXT FEATURE-SELECTION; NEURAL-NETWORK; RISK-ASSESSMENT; POWER; VOLTAGE;
D O I
10.2174/1874476105666190830112118
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Background: The security assessment plays a crucial role in the operation the modern interconnected power system network Methods: Hence, this paper addresses the application of k-means clustering algorithm equipped with Principal Component Analysis (PCA) and silhouette analysis for the classification of system security states. The proposed technique works on three principal axes; the first stage involves contingency quantification based on developed insecurity indices, the second stage includes dataset preparation to enhance the overall performance of the proposed method using PCA and silhouette analysis, and finally the application of the clustering algorithm over data. Results: The proposed composite insecurity index uses available synchronized measurements from Phasor Measurement Units (PMUs) to assess the development of cascading outages. Considering different operational scenarios and multiple levels of contingencies (up to N-3), Fast Decoupled Power Flow (FDPF) have been used for contingency replications. The developed technique applied to IEEE 14-bus and 57-bus standard test system for steady-state security evaluation. Conclusion: The obtained results ensure the robustness and effectiveness of the established procedure in the assessment of the system security irrespective of the network size or operating conditions.
引用
收藏
页码:559 / 570
页数:12
相关论文
共 54 条
[1]  
Abualigah L.M., 2016, 2016 7 INT C COMP SC, P1, DOI [DOI 10.1109/CSIT.2016.7549464, 10.1109/CSIT.2016.7549456, DOI 10.1109/CSIT.2016.7549456]
[2]   A new feature selection method to improve the document clustering using particle swarm optimization algorithm [J].
Abualigah, Laith Mohammad ;
Khader, Ahamad Tajudin ;
Hanandeh, Essam Said .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 25 :456-466
[3]   Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering [J].
Abualigah, Laith Mohammad ;
Khader, Ahamad Tajudin .
JOURNAL OF SUPERCOMPUTING, 2017, 73 (11) :4773-4795
[4]   Text feature selection with a robust weight scheme and dynamic dimension reduction to text document clustering [J].
Abualigah, Laith Mohammad ;
Khader, Ahamad Tajudin ;
Al-Betar, Mohammed Azmi ;
Alomari, Osama Ahmad .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 84 :24-36
[5]  
Abualigah LMQ., 2015, INT J COMPUTER SCI E, V5, P19, DOI DOI 10.5121/IJCSEA.2015.5102
[6]  
Agreira C.F., 2006, 2006 INT C PROB METH, DOI [10.1109/PMAPS.2006.360260, DOI 10.1109/PMAPS.2006.360260]
[7]  
Agreira C. I. F., 2003, 2003 IEEE Bologna PowerTech (IEEE Cat. No.03EX719)
[8]   Simulation of an adaptive artificial neural network for power system security enhancement including control action [J].
Al-Masri, Ahmed N. ;
Ab Kadir, M. Z. A. ;
Hizam, H. ;
Mariun, N. .
APPLIED SOFT COMPUTING, 2015, 29 :1-11
[9]  
[Anonymous], 2016, PATTERN RECOGNITION AND MACHINE LEARNING
[10]  
[Anonymous], 2014, Understanding Machine Learning: From Theory to Algorithms, DOI DOI 10.1017/CB09781107298019