From Optimization-Based Machine Learning to Interpretable Security Rules for Operation

Various supervised machine learning approaches have been used in the past to assess the power system security (also known as reliability). This is typically done by training a classifier on a large number of operating points whose postfault status (stable or unstable) has been determined via time-domain simulations. The output of this training process can be expressed as a security rule that is used online to classify an operating point. A critical, and little-studied aspect of these approaches is the interpretability of the rules produced. The lack of interpretability is a well-known issue of some machine learning approaches, especially when dealing with difficult classification problems. In the case of the security assessment of the power system, which is a complex mission-critical task, interpretability is a key requirement for the adoption and deployment by operators of these approaches. In this paper, for the first time, we explore the tradeoff between predictive accuracy and interpretability in the context of power system security assessment. We begin by demonstrating how decision trees (DTs) can be used to learn data-driven security rules and use the tree depth as a measure for interpretability. We leverage disjunctive programming to formulate novel training methods, capable of learning high-quality DTs while still maintaining interpretability. In particular, we propose two new approaches: 1) optimal classification trees is proposed for training DTs of low-depth and 2) greedy optimization-based tree is proposed for training DTs of intermediate depth, where the increased computational burden is managed by exploiting the nested tree structure. We also demonstrate that the ability to generate high-quality interpretable rules can actually translate to impressive benefits in terms of training requirements. Through case studies on the IEEE 68-bus system, we demonstrate that the proposed methods can produce DTs of higher quality compared to the state-of-the-art approach classification and regression tree approach, also if the DT was trained on a significant smaller database, resulting in computational savings of 80%. Given that generating a large training database is a practical bottleneck in these data-driven approaches, this is a significant breakthrough for real-world application.

[1]  Goran Strbac,et al.  Implementation of a Massively Parallel Dynamic Security Assessment Platform for Large-Scale Grids , 2017, IEEE Transactions on Smart Grid.

[2]  David J. Fleet,et al.  Efficient Non-greedy Optimization of Decision Trees , 2015, NIPS.

[3]  Ignacio E. Grossmann,et al.  Improved Big-M reformulation for generalized disjunctive programs , 2015, Comput. Chem. Eng..

[4]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[5]  Vijay Vittal,et al.  An Online Dynamic Security Assessment Scheme Using Phasor Measurements and Decision Trees , 2007 .

[6]  Steven Salzberg,et al.  Lookahead and Pathology in Decision Tree Induction , 1995, IJCAI.

[7]  Feng Zhao,et al.  Automatic Learning of Fine Operating Rules for Online Power System Security Control , 2016, IEEE Transactions on Neural Networks and Learning Systems.

[8]  Subhransu Ranjan Samantaray,et al.  Ensemble decision trees for phasor measurement unit-based wide-area security assessment in the operations time frame , 2010 .

[9]  B. Pal,et al.  Robust Control in Power Systems , 2005 .

[10]  E. Balas Disjunctive programming and a hierarchy of relaxations for discrete optimization problems , 1985 .

[11]  Zhe Chen,et al.  A Systematic Approach for Dynamic Security Assessment and the Corresponding Preventive Control Scheme Based on Decision Trees , 2014, IEEE Transactions on Power Systems.

[12]  Louis Wehenkel,et al.  Automatic Learning Techniques in Power Systems , 1997 .

[13]  Steven W. Norton,et al.  Generating Better Decision Trees , 1989, IJCAI.

[14]  David L. Woodruff,et al.  Pyomo — Optimization Modeling in Python , 2012, Springer Optimization and Its Applications.

[15]  S. Henry,et al.  Efficient Database Generation for Decision Tree Based Power System Security Assessment , 2011, IEEE Transactions on Power Systems.

[16]  Shaul Markovitch,et al.  Anytime Learning of Decision Trees , 2007, J. Mach. Learn. Res..

[17]  Goran Strbac,et al.  Sample-Derived Disjunctive Rules for Secure Power System Operation , 2018, 2018 IEEE International Conference on Probabilistic Methods Applied to Power Systems (PMAPS).

[18]  John Mingers,et al.  An Empirical Comparison of Pruning Methods for Decision Tree Induction , 1989, Machine Learning.

[19]  Goran Strbac,et al.  Data-Driven Power System Operation: Exploring the Balance Between Cost and Risk , 2019, IEEE Transactions on Power Systems.

[20]  Claus Leth Bak,et al.  An Accurate Online Dynamic Security Assessment Scheme Based on Random Forest , 2018, Energies.

[21]  Dimitris Bertsimas,et al.  Optimal classification trees , 2017, Machine Learning.

[22]  Leo Breiman,et al.  Classification and Regression Trees , 1984 .

[23]  Louis Wehenkel,et al.  Coupling of K-NN with decision trees for power system transient stability assessment , 1995, Proceedings of International Conference on Control Applications.

[24]  Ruisheng Diao,et al.  Design of a Real-Time Security Assessment Tool for Situational Awareness Enhancement in Modern Power Systems , 2010, IEEE Transactions on Power Systems.

[25]  Goran Strbac,et al.  A Deep Learning-Based Feature Extraction Framework for System Security Assessment , 2019, IEEE Transactions on Smart Grid.

[26]  Louis Wehenkel,et al.  Operating in the Fog: Security Management Under Uncertainty , 2012, IEEE Power and Energy Magazine.

[27]  G. Strbac,et al.  Online security assessment with load and renewable generation uncertainty: The iTesla project approach , 2016, 2016 International Conference on Probabilistic Methods Applied to Power Systems (PMAPS).

[28]  Been Kim,et al.  Towards A Rigorous Science of Interpretable Machine Learning , 2017, 1702.08608.

[29]  Lorenz T. Biegler,et al.  On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..