2022
DOI: 10.1016/j.ijepes.2021.107380
|View full text |Cite
|
Sign up to set email alerts
|

Machine-learned security assessment for changing system topologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 31 publications
0
13
0
Order By: Relevance
“…As shown in Fig. 2 , ML methods usually have an off-line training phase used in design of prompt classifiers or regressors for an online security assessment [ 13 , 81 , 87 ]. The training helps to acquire knowledge of the complex relationship between the initial system state and post contingency security status [ 25 ].…”
Section: Methods Of Power System Security Assessmentmentioning
confidence: 99%
“…As shown in Fig. 2 , ML methods usually have an off-line training phase used in design of prompt classifiers or regressors for an online security assessment [ 13 , 81 , 87 ]. The training helps to acquire knowledge of the complex relationship between the initial system state and post contingency security status [ 25 ].…”
Section: Methods Of Power System Security Assessmentmentioning
confidence: 99%
“…1. The first step is the time-ahead prediction of the available flexibility based on forecasts of the charging station generation and load, as well as EV arrival and departure times and energy demand [22]. Subsequently, such forecasts are fed as input to a multisite optimizer that provides 15-hour ahead optimal charging/ discharging schedules for an onsite BESS and an EV fleet moving between different sites during the day, thus being able to provide flexibility services at different locations.…”
Section: A Proposed Approachmentioning
confidence: 99%
“…The test system representing the PVbattery charging station included 168 kWh battery and 110 kWp PV systems, and 4 CPs. A fleet of 4 EVs with V2G technology moving between the charging station and the service site was sampled from real charging data provided by TotalEnergies [22]. The flexibility market framework shown in Fig.…”
Section: A Proposed Approachmentioning
confidence: 99%
“…The approach is to train an ML model offline when the computational time for simulations is abundant, and use the trained model to predict security and control actions in real time immediately before a fault or in response to it. Such methods are promising for real-time operation [79], [80] as their prediction requires minimal computational time, but have challenges related to the generation of training data [81], the interpretability of the prediction [82], their risks and probabilities of success [83], and their usability to other operating conditions and topologies [84], etc. Recently promising methods use the known dynamical model, i.e., the ODEs, to inform directly the ML training which can reduce the demands for training data [85], [86].…”
Section: E Real-time Dsamentioning
confidence: 99%