2012
DOI: 10.1109/tpwrs.2011.2162654
|View full text |Cite
|
Sign up to set email alerts
|

Importance Sampling of Injected Powers for Electric Power System Security Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2012
2012
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…5. The crossover probability is shown as in (14): (14) where P c is crossover probability, P cmax and P cmin are, respectively, the maximum and minimum of the crossover probability, f max and f avg are, respectively, the maximum fitness and the average fitness in the group, and f ' is the greater fitness of two individuals in crossover.…”
Section: Mutation Operationmentioning
confidence: 99%
See 1 more Smart Citation
“…5. The crossover probability is shown as in (14): (14) where P c is crossover probability, P cmax and P cmin are, respectively, the maximum and minimum of the crossover probability, f max and f avg are, respectively, the maximum fitness and the average fitness in the group, and f ' is the greater fitness of two individuals in crossover.…”
Section: Mutation Operationmentioning
confidence: 99%
“…DG2 island alternative tree contains the load nodes 5, 4, 3, 2, 1, 36, 37, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 6, 7, 8, 40, 41, 9, 42, 43, and 10. DG3 island alternative tree contains the load nodes 19,20,21,22,23,24,25,26,27,18,17,16,14,13,12,57, and 58.…”
Section: Case Of Fast Islands Partition Simulation Studymentioning
confidence: 99%
“…Actually, when constraint (14) is replaced by (15), the linear objective function (9) can only achieve its maximum at its boundaries, which are defined by (14) and other linear constraints in (10)- (13). Therefore, this relaxation of constraint (15) still gives the same optimal solutions for (9)- (14).…”
Section: Ecqp Modelmentioning
confidence: 99%
“…To accurately and efficiently assess power system security, large amounts of machine learning tools such as decision trees [9], extreme learning machine [10], and support vector machines [11] provide promising solutions. To alleviate the high computational complexity in these methods, several other technical measures, such as probabilistic neural network classifier [12] and important sampling methods [13], were introduced. However, the success of security assessment relies on the training set, which is determined by the performance of pattern classifiers.…”
Section: Introductionmentioning
confidence: 99%
“…However, precise calculation of polynomial coefficients may be difficult as the relationship between the uncertain parameters and the output of interest evolves with time. In another study, the uncertainty due to wind generation is incorporated using importance sampling [14] and fast sensitivity analysis approach [15], however, are not applicable for online transient stability assessment of a large power systems. Recently, a stochastic process-based load model was proposed using a structure preserving network [16].…”
mentioning
confidence: 99%