2014
DOI: 10.1002/etep.1981
|View full text |Cite
|
Sign up to set email alerts
|

Data-mining-based approach for predicting the power system post-contingency dynamic vulnerability status

Abstract: Summary This paper proposes a data‐mining‐based approach for predicting the power system post‐contingency vulnerability status in real time. To this aim, the system dynamic vulnerability regions (DVRs) are first determined by applying singular value decomposition, by means of empirical orthogonal functions (EOFs), to a post‐contingency data base obtained from phasor measurement units (PMUs) adequately located throughout the system. In this way, the obtained pattern vectors (EOF scores) allow mapping the DVRs w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 36 publications
0
17
0
Order By: Relevance
“…1 Illustration of an IS for Post-Disturbance TSA Moreover, different system models may require substantially different lengths of observation windows to obtain reliable assessment results. In [17,21,22], a self-adaptive TSA scheme is proposed and adopted to obtain a reliable assessment result as fast as possible. In doing so, emergency control actions can be activated at an early time to timely avoid further instability propagation.…”
Section: Is-based Post-disturbance Tsamentioning
confidence: 99%
See 2 more Smart Citations
“…1 Illustration of an IS for Post-Disturbance TSA Moreover, different system models may require substantially different lengths of observation windows to obtain reliable assessment results. In [17,21,22], a self-adaptive TSA scheme is proposed and adopted to obtain a reliable assessment result as fast as possible. In doing so, emergency control actions can be activated at an early time to timely avoid further instability propagation.…”
Section: Is-based Post-disturbance Tsamentioning
confidence: 99%
“…In credibility check, the credible criterion is generally defined by a number of credible decision parameters, and a limit of the exiting methods [17,21,22] is that those parameters are usually manually set by experience.…”
Section: The Tradeoff Problemmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, we cannot use the CVSS to consider the nature of a network, and the CVSS merely classifies an attack as a local-access attack, an adjacent-network attack, or a general-network attack. Various methods have been proposed to resolve such CVSS-related problems, but these methods have not solved the essential problems, and they do not consider the nature of smart grid network [5][6][7][8][9][10][11][12][13][14].…”
Section: Problems With Existing Vulnerabilityquantification Techniquesmentioning
confidence: 99%
“…Especially, it is difficult to apply existing techniques in order to evaluate the security threats to smart grid. Although several studies [5][6][7][8][9][10][11][12][13][14] have been conducted from various standpoints to solve such problems, they do not present a fundamental solution. Also, there are some researches for SCADA or cyber infrastructure's security assessment, but these results cannot apply to smart grid network directly [15][16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%