“…Main Objective Approach Main Security Predictor (s) [16] Short-term voltage stability online prediction Online Voltage magnitude [14] Transient stability prediction Offline Rotor angle [19] Framework for transient stability prediction Offline Rotor angle [41] Prediction of the transient Stability Boundary Offline Voltage magnitude and rotor angle [42] Static security assessment Offline Voltage magnitude [43] Security assessment for multiple contingencies Offline Voltage magnitude [7] Power systems security assessment Offline Voltage magnitude [15] voltage stability prediction Online Voltage magnitude [44] Online static security Assessment Online Voltage magnitude and angle [45] Online transient stability prediction Online Voltage magnitude and rotor angle Security predictors in existing frameworks and techniques have largely been determined by changes in system load and generation. These determinants are effective for conventional grids with insignificant penetration of non-synchronous generators.…”
Section: Referencesmentioning
confidence: 99%
“…One of the recent strategies is the application of a suitable machine learning algorithm to the existing dataset containing the historical security information of the grid. These machine learning-based prediction techniques were implemented in [14][15][16][17]. These techniques have shown their effectiveness to predict the security of the grid in case of transient security [14], frequency deviation [17], and distance to insecurity [18], without considering the penetration of any type of distributed generation into the grid.…”
Section: Introductionmentioning
confidence: 99%
“…These techniques have shown their effectiveness to predict the security of the grid in case of transient security [14], frequency deviation [17], and distance to insecurity [18], without considering the penetration of any type of distributed generation into the grid. The techniques were based on only one system variable (voltage [14][15][16]18], frequency [17]). Considering the grid with high penetration of RES-DG, the proposed techniques may not be applicable under changing inertia and system loading.…”
The proliferation of renewable energy sources distributed generation (RES-DG) into the grid results in time-varying inertia constant. To ensure the security of the grid under varying inertia, techniques for fast security assessment are required. In addition, considering the high penetration of RES-DG units into the modern grids, security prediction using varying grid features is crucial. The computation burden concerns of conventional time-domain security assessment techniques make it unsuitable for real-time security prediction. This paper, therefore, proposes a fast security monitoring model that includes security prediction and load shedding for security control. The attributes considered in this paper include the load level, inertia constant, fault location, and power dispatched from the renewable energy sources generator. An incremental Naïve Bayes algorithm is applied on the training dataset developed from the responses of the grid to transient stability simulations. An additive Gaussian process regression (GPR) model is proposed to estimate the load shedding required for the predicted insecure states. Finally, an algorithm based on the nodes’ security margin is proposed to determine the optimal node (s) for the load shedding. The average security prediction and load shedding estimation model training times are 1.2 s and 3 s, respectively. The result shows that the proposed model can predict the security of the grid, estimate the amount of load shed required, and determine the specific node for load shedding operation.
“…Main Objective Approach Main Security Predictor (s) [16] Short-term voltage stability online prediction Online Voltage magnitude [14] Transient stability prediction Offline Rotor angle [19] Framework for transient stability prediction Offline Rotor angle [41] Prediction of the transient Stability Boundary Offline Voltage magnitude and rotor angle [42] Static security assessment Offline Voltage magnitude [43] Security assessment for multiple contingencies Offline Voltage magnitude [7] Power systems security assessment Offline Voltage magnitude [15] voltage stability prediction Online Voltage magnitude [44] Online static security Assessment Online Voltage magnitude and angle [45] Online transient stability prediction Online Voltage magnitude and rotor angle Security predictors in existing frameworks and techniques have largely been determined by changes in system load and generation. These determinants are effective for conventional grids with insignificant penetration of non-synchronous generators.…”
Section: Referencesmentioning
confidence: 99%
“…One of the recent strategies is the application of a suitable machine learning algorithm to the existing dataset containing the historical security information of the grid. These machine learning-based prediction techniques were implemented in [14][15][16][17]. These techniques have shown their effectiveness to predict the security of the grid in case of transient security [14], frequency deviation [17], and distance to insecurity [18], without considering the penetration of any type of distributed generation into the grid.…”
Section: Introductionmentioning
confidence: 99%
“…These techniques have shown their effectiveness to predict the security of the grid in case of transient security [14], frequency deviation [17], and distance to insecurity [18], without considering the penetration of any type of distributed generation into the grid. The techniques were based on only one system variable (voltage [14][15][16]18], frequency [17]). Considering the grid with high penetration of RES-DG, the proposed techniques may not be applicable under changing inertia and system loading.…”
The proliferation of renewable energy sources distributed generation (RES-DG) into the grid results in time-varying inertia constant. To ensure the security of the grid under varying inertia, techniques for fast security assessment are required. In addition, considering the high penetration of RES-DG units into the modern grids, security prediction using varying grid features is crucial. The computation burden concerns of conventional time-domain security assessment techniques make it unsuitable for real-time security prediction. This paper, therefore, proposes a fast security monitoring model that includes security prediction and load shedding for security control. The attributes considered in this paper include the load level, inertia constant, fault location, and power dispatched from the renewable energy sources generator. An incremental Naïve Bayes algorithm is applied on the training dataset developed from the responses of the grid to transient stability simulations. An additive Gaussian process regression (GPR) model is proposed to estimate the load shedding required for the predicted insecure states. Finally, an algorithm based on the nodes’ security margin is proposed to determine the optimal node (s) for the load shedding. The average security prediction and load shedding estimation model training times are 1.2 s and 3 s, respectively. The result shows that the proposed model can predict the security of the grid, estimate the amount of load shed required, and determine the specific node for load shedding operation.
“…Indicators in the literature for predicting or detecting transient stability status or STV stability status can be classified into the direct indicators and the indirect indicators. Rotor angle and frequency of synchronous generators are two direct indicators to determine the transient stability status [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28], also the slip of induction motors and voltage magnitudes are two direct indicators to evaluate STV stability status [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29]. The voltage magnitudes are indirect indicators for predicting the transient instability and have shown successful performances, reported by [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28].…”
Section: Introductionmentioning
confidence: 99%
“…Rotor angle and frequency of synchronous generators are two direct indicators to determine the transient stability status [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28], also the slip of induction motors and voltage magnitudes are two direct indicators to evaluate STV stability status [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29]. The voltage magnitudes are indirect indicators for predicting the transient instability and have shown successful performances, reported by [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28]. The frequency of synchronous generators may increase or decrease by transient instability or STV instability (i.e.…”
A novel agent-based online prediction method is presented in this paper, to predict the status of both transient and short-term voltage (STV) stability, against fault occurrence. In the proposed method, the trajectories of the relative frequency deviation (ΔF) and the power imbalance (ΔP) are estimated by employing the third-degree polynomial curve fitting method. By tracking the estimated trajectories on ΔF-ΔP plane and checking some simple defined rules, an early prediction of both transient and STV instability is achieved in an organized multi-agent system (MAS). In order to evaluate the performance of the proposed algorithm, the method has been tested on IEEE 39-bus system, IEEE 118-bus system and IEEE Nordic test system. Based on the obtained results, the proposed algorithm has an overall accuracy of 99.5% under symmetrical and asymmetrical faults, PMU measurement error, different operating points and topological changes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.