Skip to main content
Log in

Design of pattern recognition system for static security assessment and classification

  • Industrial and Commercial Application
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

Static security analysis is an important study carried out in the control centers of electric utilities. Static security assessment (SSA) is the process of determining whether the current operational state is in a secure or emergency (insecure) state. Conventional method of security evaluation involves performing continuous load flow analysis, which is highly time consuming and infeasible for real-time applications. This led to the application of pattern recognition (PR) approach for static security analysis. This paper presents a more efficient design of a PR system suitable for on-line SSA. The feature selection stage in the PR system uses many algorithms to select the optimal feature set. This paper proposes the use of Support Vector Machine (SVM), a recently introduced machine learning tool, in the classifier design stage of PR system. The developed PR system is implemented in IEEE standard test systems for SSA and classification. The performance of SVM classifier is compared with the conventional K-nearest neighbor, method of least squares and neural network classifiers. Simulation results prove that the SVM-PR classifier outperforms other equivalent classifier algorithms, giving high classification accuracy and less misclassification rate. The feasibility of SVM-PR classifier for on-line security assessment process is also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Biesiada J, Duch W (2008) Feature selection for high-dimensional data: a Pearson redundancy based filter. Adv Soft Comput 45:242–249

    Article  Google Scholar 

  2. Boudour M, Hellal A (2006) Combined use of supervised and unsupervised learning for large scale power system static security assessment. Int J Electr Power Energy Syst 26(2):157–163

    Google Scholar 

  3. Chang C, Lin C (2001) LIBSVM: a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm

  4. Chang C, Chung T, Lo K (1990) Application of pattern recognition technique to power system security analysis and optimization. IEEE Trans Power Syst 5(3):835–841

    Article  Google Scholar 

  5. Dash M, Liu H (1997) Feature selection for classification. Intell Data Anal 1(3):131–156

    Article  Google Scholar 

  6. Gheyas I, Smith L (2010) Feature subset selection in large dimensionality domains. Pattern Recogn 43(1):5–13

    Article  MATH  Google Scholar 

  7. Gunal S, Edizkan R (2008) Subspace based feature selection for pattern recognition. Inform Sci 178(19):3716–3726

    Article  Google Scholar 

  8. Guyon I, Elisseeff A (2003) An introduction to variable and feature selection. J Mach Learn Res 3:1157–1182

    MATH  Google Scholar 

  9. Haghifam M, Zebarjadi V (1996) Fuzzy Logic and neural network approach to static security assessment for electric power systems. In: Proceedings of 4th European congress on intelligent techniques and soft computing, vol 3, pp 2009–2013

  10. Haykin S (2008) Neural networks: a comprehensive foundation. Prentice Hall, New Jersey

  11. Huang S (2001) Static security assessment of a power system using query-based learning approaches with genetic enhancement. IEE Proc Gen Transm Distrib 148:319

    Article  Google Scholar 

  12. Kanal L (1974) Patterns in pattern recognition: 1968–1974. IEEE Trans Inform Theory 20(6):697–722

    Article  MathSciNet  MATH  Google Scholar 

  13. Lanzi P (1997) Fast feature selection with genetic algorithms: a filter approach. In: Proceedings of 1997 IEEE international conference on evolutionary computation, pp 537–540

  14. Liao Y, Vemuri V (2002) Use of k-nearest neighbor classifier for intrusion detection. Comput Secur 21(5):439–448

    Article  Google Scholar 

  15. Liu H, Li J, Wong L (2002) A comparative study on feature selection and classification methods using gene expression profiles and proteomic patterns. Genome Inform Ser 13:51–60

    Google Scholar 

  16. Lo K, Peng L (1997) Design of artificial neural networks for on-line static security assessment problems. In: Proceedings of the fourth international conference on advances in power system control, operation and management, APSCOM-97 (Conf. Publ. No. 450), vol 1, 1997

  17. Lopes J, Barbosa F, de Så J (1988) On-line transient stability assessment and enhancement by pattern recognition techniques. Electric Power Compon Syst 15(4):293–310

    Google Scholar 

  18. Lotlikar R, Kothari R (2000) Bayes-optimality motivated linear and multi-layered perceptron-based dimensionality reduction. IEEE Trans Neural Netw 11(2):452–463

    Article  Google Scholar 

  19. Lotlikar R, Kothari R (2000) Fractional-step dimensionality reduction. IEEE Trans Pattern Anal Mach Intell 22(6):623–62

    Article  Google Scholar 

  20. Luan W, Lo K, Yu Y (2000) Ann-based pattern recognition technique for power system security assessment. In: Proceedings of the international conference on electric utility deregulation and restructuring and power technologies, 2000, DRPT 2000, pp 197–202

  21. Min J, Lee Y (2005) Bankruptcy prediction using support vector machine with optimal choice of kernel function parameters. Expert Syst Appl 28(4):603–614

    Article  Google Scholar 

  22. Mohamed A, Maniruzzaman S, Hussain A (2001) Static security assessment of a power system using genetic-based neural network. Electric Power Compon Syst 29(12):1111–1121

    Article  Google Scholar 

  23. Mohammadi M, Gharehpetian G (2009) Application of core vector machines for on-line voltage security assessment using a decision tree based feature selection algorithm. IET Gen Transm Distrib 3(8):701–712

    Article  Google Scholar 

  24. Morison K, Wang L, Kundur P (2004) Power system security assessment. IEEE Power Energy Mag 2(5):30–39

    Article  Google Scholar 

  25. Moulin LS, Da Silva APA, El-Sharkawi MA, Marks RJ (2004) Support vector machines for transient stability analysis of large-scale power systems. IEEE Trans Power Syst 19(2):818–825

    Article  Google Scholar 

  26. Oh S (1986) A pattern recognition and associative memory approach to power system security assessment. IEEE Trans Syst Man Cybern 16(1):62–72

    Article  Google Scholar 

  27. Pai M (2005) Computer techniques in power system analysis. Tata McGraw-Hill, New Delhi

  28. Pang C, Koivo A, El-Abiad A (1973) Application of pattern recognition to steady-state security evaluation in a power system. IEEE Trans Syst Man Cybern 3(6):622–631

    Article  Google Scholar 

  29. Pang C, Prabhakara F, El-Abiad A, Koivo A (1974) Security evaluation in power systems using pattern recognition. IEEE Trans Power Apparatus Syst 93(3):969–976

    Google Scholar 

  30. Saeh I, Khairuddin A (2008) Static security assessment using artificial neural network. In: Proceedings of the 2nd IEEE international power and energy conference, 2008, PECon 2008, pp 1172–1178

  31. Shah S, Shahidehpour S (1988) Automated reasoning: a new concept in power system security analysis. In: Proceedings of the international workshop on artificial intelligence for industrial applications, 1988, IEEE AI’88, pp 58–63

  32. Shahidehpour M, Wang Y (2003) Communication and control in electric power systems: applications of parallel and distributed processing. Wiley-IEEE, New Jersey

  33. Shin H, Cho S (2006) Response modeling with support vector machines. Expert Syst Appl 30(4):746–760

    Article  Google Scholar 

  34. Souza J, Do Coutto Filho M, Schilling M (2002) Fast contingency selection through a pattern analysis approach. Electric Power Syst Res 62(1):13–19

    Article  Google Scholar 

  35. Sugumaran V, Muralidharan V, Ramachandran K (2007) Feature selection using decision tree and classification through proximal support vector machine for fault diagnostics of roller bearing. Mech Syst Signal Process 21(2):930–942

    Article  Google Scholar 

  36. Swarup K, Corthis P (2006) Power system static security assessment using self-organizing neural network. J Indian Inst Sci 86:327–342

    Google Scholar 

  37. Ukil A (2007) Intelligent systems and signal processing in power engineering. Springer, London

  38. Yang J, Honavar V (1998) Feature subset selection using a genetic algorithm. IEEE Intell Syst 13(2):44–49

    Article  Google Scholar 

  39. Zimmerman R, Murillo-Sánchez C (2007) MATPOWER Version 3.2: a MATLAB power system simulation package. User’s manual. Power Systems Engineering Research Center (PSERC)

Download references

Acknowledgments

The authors like to thank IIT Madras for providing necessary facilities and resources to carry out this research work. The first author also likes to thank K.L.N. College of Engineering, Madurai and AICTE, India, for providing an opportunity to pursue Doctoral programme at IIT Madras under Quality Improvement Programme scheme.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Kalyani.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kalyani, S., Swarup, K.S. Design of pattern recognition system for static security assessment and classification. Pattern Anal Applic 15, 299–311 (2012). https://doi.org/10.1007/s10044-011-0218-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-011-0218-x

Keywords

Navigation