Skip to main content

Feature Reduction Techniques for Power System Security Assessment

  • Conference paper
Advances in Natural Computation (ICNC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4221))

Included in the following conference series:

  • 1023 Accesses

Abstract

Neural Networks (NN) have been applied to the security assessment of power systems and have shown great potential for predicting the security of large power systems. The curse of dimensionality states that the required size of the training set for accurate NN increases exponentially with the size of input dimension. Thus, an effective feature reduction technique is needed to reduce the dimensionality of the operating space and create a high correlation of input data with the decision space. This paper presents a new feature reduction technique for NN-based power system security assessment. The proposed feature reduction technique reduces the computational burden and the NN is rapidly trained to predict the security of power systems. The proposed feature reduction technique was implemented and tested on IEEE 50-generator, 145-bus system. Numerical results are presented to demonstrate the performance of the proposed feature reduction technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Fisher, R.A.: The Use of Multiple Measurements in Taxonomic Problems. Annals of Eugenics 7, 179–188 (1936)

    Google Scholar 

  2. Weerasooriya, S., El-Sharkawi, M.A.: Use of Karhunen-Loe’ve Expansion in Training Neural Networks for Static Security Assessment. In: Proceedings of the First International Forum on Applications of Neural Networks to Power Systems, pp. 59–64 (1991)

    Google Scholar 

  3. Schalkoff, R.J.: Pattern Recognition: Statistical, Structural and Neural Approaches. John Wiley & Sons, Chichester (1992)

    Google Scholar 

  4. Bishop, C.M.: Neural Networks for Pattern Recognition. Oxford University Press, Oxford (1995)

    Google Scholar 

  5. Ripley, B.D.: Pattern Recognition and Neural Networks. Cambridge University Press, Cambridge (1996)

    MATH  Google Scholar 

  6. Zayan, M.B., El-Sharkawi, M.A., Prasad, N.R.: Comparative Study of feature Extraction Techniques for Neural Network Classifier. In: Proceedings of Intelligent Systems Applications to Power Systems, pp. 400–404 (1996)

    Google Scholar 

  7. Rao, C.R.: The Utilization of Multiple Measurements in Problems of Biological Classfication. Journal of the Royal Statistical Society Series, 159–203 (1948)

    Google Scholar 

  8. Duda, R.O., Hart, P.E.: Pattern Classification and Scene Analysis. John Wiley & Sons, Chichester (1973)

    MATH  Google Scholar 

  9. Kittler, J., Etemadi, A., Choakjarernwanit, N.: Feature Selection and Extraction in Pattern Recognition. In: Pattern Recognition and Image Processing in Physics. Proceedings of the 37th Scottish University Summer School in Physics (1990)

    Google Scholar 

  10. Jensen, C.A.: Application of Computational Intelligence to Power System Security Assessment. Ph.D. Dissertation. University of Washington (1999)

    Google Scholar 

  11. Jensen, C.A., El-Sharkawi, M.A., Marks, R.J.: Power System Security Assessment Using Neural Networks: Feature Selection Using Fisher Discrimination. IEEE Transactions on Power Systems, 757–763 (2001)

    Google Scholar 

  12. EPRI Report: Dynamic Security Analysis – Feasibility Evaluation Report. EPRI (1994)

    Google Scholar 

  13. Mansour, Y., Vaahedi, E., El-Sharkawi, M.A.: Dynamic Security Contingency Screening and Ranking Using Neural Networks. IEEE Transactions on Neural Networks 8, 942–950 (1997)

    Article  Google Scholar 

  14. IEEE Committee Report: Transient Stability Test Systems for Direct Stability Methods. IEEE Transactions on Power Systems, 37–44 (1992)

    Google Scholar 

  15. Taylor, C.W., Erickson, D.C.: Recording and Analyzing the July 2 Cascading Outage. IEEE Computer Applications in Power 10, 26–30 (1997)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, M., Joo, SK. (2006). Feature Reduction Techniques for Power System Security Assessment. In: Jiao, L., Wang, L., Gao, Xb., Liu, J., Wu, F. (eds) Advances in Natural Computation. ICNC 2006. Lecture Notes in Computer Science, vol 4221. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11881070_73

Download citation

  • DOI: https://doi.org/10.1007/11881070_73

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45901-9

  • Online ISBN: 978-3-540-45902-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics