2013
DOI: 10.1109/tpwrs.2013.2246822
|View full text |Cite
|
Sign up to set email alerts
|

Online dynamic security assessment with missing pmu measurements: A data mining approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
84
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 147 publications
(84 citation statements)
references
References 19 publications
0
84
0
Order By: Relevance
“…For the two power systems, the corresponding WAMS was assumed to have a hierarchical architecture [28]. The power systems were monitored with different areas, and the PMU measurements from different substations in different areas were collected, time aligned by the phasor data concentrator, and then submitted to the monitoring center.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…For the two power systems, the corresponding WAMS was assumed to have a hierarchical architecture [28]. The power systems were monitored with different areas, and the PMU measurements from different substations in different areas were collected, time aligned by the phasor data concentrator, and then submitted to the monitoring center.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…In the literature, ensemble learning has been widely used in power system dynamic security assessment [9,10,12,16,23]. For ensemble learning, a set of single learning units are individually trained and combined together to make the final decision.…”
Section: Elm Ensemble Learningmentioning
confidence: 99%
“…To achieve fast real-time TSA, intelligent system IS-based methods have been identified as a promising solution [7][8][9][10][11][12][13][14][15][16]. In IS-based TSA, the conventional T-D simulation data constructs the database to train the intelligent models at offline stage, and then the trained models can perform fast online TSA with the minimal computation effort.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The above discussed approaches, including [16], uses databases generated in off-line aiming to cover all the possible operating conditions and topology changes. The application of data mining techniques to speed up the DSA process by using the historical data from large databases is investigated in [25] and [26]. However, it is challenging to determine if an initially trained network is valid to assess the stability of a particular system state once the system state is evolved to a different operating state or a different network topology.…”
Section: Machine Learning Techniquesmentioning
confidence: 99%