IBERAMIA 2002: Advances in Artificial Intelligence — IBERAMIA 2002 pp 519-525 | Cite as
Machine Learning Models for Online Dynamic Security Assessment of Electric Power Systems
Conference paper
First Online:
Abstract
In this paper we compare two machine learning algorithms (Support Vector Machine and Multi Layer Perceptrons) to perform on-line dynamic security assessment of an electric power system. Dynamic simulation is properly emulated by training SVM and MLP models, with a small amount of information. The experiments show that although both models produce reasonable predictions, the performance indexes of the SVM models are better than those of the MLP models. However the MLP models are of considerably reduced complexity.
Keywords
Support Vector Machine Support Vector Machine Model Multi Layer Perceptron Electric Power System Machine Learn Model
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- 1.Sobajic D.J., Pao Y.: “On-Line Transient Stability Evaluation by Associative Dichotomous Classification”, IEEE Transaction on Power Systems, Vol 4, Feb. 1989Google Scholar
- 2.Mitchell M., Peças Lopes J.A., Fidalgo J.N., McCalley J.: “Using a Neural Network to Predict the Dynamic Frequency Response of a Power System to an Under-Frequency Load Shedding Scenario”, IEEE Summer Meeting, 2000Google Scholar
- 3.Hatziargyriou N., Peças Lopes J.A., Karapidakis E., Vasconcelos M.H.: “On-Line Dynamic Security Assessment of Power Systems in Large Islands with High Wind Power Penetration”, PSCC’99, 13th Power System Computational Conference, Vol 1, Trondheim, Norway, June 1999Google Scholar
- 5.Hatziargyriou N., Papathanassiou S., Papadopulos M.: “Decision Trees for Fast Security Assessment of Autonomous Power Systems with large Penetration from Renewables”, IEEE Transaction on Energy Conversion, Vol. 10, No. 2, June 1995Google Scholar
- 6.Vasconcelos M.H., Peças Lopes J.A.: “Pruning Kernel Regression Trees for Security Assessment of the Crete Network”, ACAI’99, Workshop on Application of Machine Learning, July 1999Google Scholar
- 7.Burges C.: “A tutorial on Support Vector Machines for Patter Recognition”, http://www.kernel-machines.org/
- 8.Cristianini N., Shawe-Taylor J.: “An introduction to Support Vector Machines”, Cambridge University Press, 2000Google Scholar
- 9.Campbell C.: “Kernel Methods: A survey of Current Techniques”, http://www.kernelmachines.org/
- 11.Campbell C.: “An Introduction to Kernel Methods”, In R.J. Howlett and L.C. Jain, editors, Radial Basis Function Networks: Design and Applications, page 31. Springer-Verlag, Berlin, 2000Google Scholar
- 12.Schölkopf B.: Statistical Learning and Kernel Methods, http://research.Microsoft.com/~bsc
- 13.Platt J.:“Fast Training of Support Vector Machines using Sequential Minimal Optimization”, http://www.research.microsoft.com/~jplatt
- 14.Hertz J., Krogh A., Palmer R.: “Introduction to the Theory of Neural Computation”, Addison-Wesley, Redwood City, 1991Google Scholar
- 15.Veropoulos K., Campbell C., Cristianini N.: “Controlling the Sensitivity of Support Vector Machines”, Proceedings of the International Joint Conference on Artificial Intelligence, Stockholm, Sweden, 1999 (IJCAI99), Workshop ML3, p. 55–60.Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2002