2013
DOI: 10.1016/j.ijepes.2012.07.065
|View full text |Cite
|
Sign up to set email alerts
|

Pattern analysis and classification for security evaluation in power networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 38 publications
0
14
0
Order By: Relevance
“…Static security problems can be assessed by adopting decision tree algorithms; however, it is possible to over-fit or trap decision tree algorithms into local minimum points [27]. In addition, the support vector machine (SVM) algorithm is another machine learning method for static security assessment [28,29]. In Kalyani et al [28] and Kalyani et al [29], considering line overload and voltage deviation indices in the power system, SVM algorithms are employed for evaluating static security.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Static security problems can be assessed by adopting decision tree algorithms; however, it is possible to over-fit or trap decision tree algorithms into local minimum points [27]. In addition, the support vector machine (SVM) algorithm is another machine learning method for static security assessment [28,29]. In Kalyani et al [28] and Kalyani et al [29], considering line overload and voltage deviation indices in the power system, SVM algorithms are employed for evaluating static security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, the support vector machine (SVM) algorithm is another machine learning method for static security assessment [28,29]. In Kalyani et al [28] and Kalyani et al [29], considering line overload and voltage deviation indices in the power system, SVM algorithms are employed for evaluating static security. Nevertheless, the SVM algorithm is difficult to implement if the scale of the training sets is too large.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The selection of variables of previously published works mainly applies the filter method that has to go through many stages (Dong et al, 2012;Kalyani & Swarup, 2013;Swarup, 2008). With this method, the first is based on the statistical criteria to filter out the good variables first, then ask the identifier to evaluate the accuracy to find the appropriate set of variables.…”
Section: Introductionmentioning
confidence: 99%
“…Along with the continuous urbanization in China, the scale of regional power systems keeps on increasing, which brings a great challenge to guarantee the secure and reliable operation of regional power systems [1,2]. To meet this challenge, it is extremely important to study power system security under both normal and faulty conditions so as to allow system operators to take proper control measures when system security levels become low.…”
Section: Introductionmentioning
confidence: 99%