Conceptual Analysis of Different Clustering Techniques for Static Security Investigation

Power system contingency studies play a pivotal role in maintaining the security and integrity of modern power system operation. However, the number of possible contingencies is enormous and mostly vague. Therefore, in this paper, two well-known clustering techniques namely K-Means (KM) and Fuzzy C-Means (FCM) are used for contingency screening and ranking. The performance of both algorithms is comparatively investigated using IEEE 118-bus test system. Considering various loading conditions and multiple outages, the IEEE 118-bus contingencies have been generated using fast-decoupled power flow (FDPF). Silhouette analysis and fuzzy partition coefficient techniques have been profitably exploited to offer an insight view of the number of centroids. Moreover, the principal component analysis (PCA) has been used to extract the dominant features and ensure the consistency of passed data with artificial intelligence algorithms’ requirements. Although analysis of comparison results showed excellent compatibility between the two clustering algorithms, the FCM model was found more suitable for power system static security investigation.

[1]  Anjan Bose,et al.  On-line power system security analysis , 1992, Proc. IEEE.

[2]  Lawrence Jenkins,et al.  Composite Criteria based Network Contingency Ranking using Fuzzy Logic Approach , 2002 .

[3]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[4]  Manjaree Pandit,et al.  Fast voltage contingency selection using fuzzy parallel self-organizing hierarchical neural network , 2003 .

[5]  S. P. Nangrani,et al.  Power system security assessment using ranking based on combined MW-chaotic performance index , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.

[6]  S.N. Singh,et al.  Parallel radial basis function neural network based fast voltage estimation for contingency analysis , 2004, 2004 IEEE International Conference on Electric Utility Deregulation, Restructuring and Power Technologies. Proceedings.

[7]  Liangzhong Yao,et al.  Vulnerability assessment for cascading failures in electric power systems , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[8]  J.A.D. Pinto,et al.  Contingency screening and ranking algorithm using two different sets of security performance indices , 2003, 2003 IEEE Bologna Power Tech Conference Proceedings,.

[9]  S Kalyani,et al.  Supervised fuzzy C-means clustering technique for security assessment and classification in power systems , 2010 .

[10]  Jose M. Arroyo,et al.  Application of a genetic algorithm to n-K power system security assessment , 2013 .

[11]  R. Sunitha,et al.  Online Static Security Assessment Module Using Artificial Neural Networks , 2013, IEEE Transactions on Power Systems.

[12]  Tao Wang,et al.  Complex Network-Based Cascading Faults Graph for the Analysis of Transmission Network Vulnerability , 2019, IEEE Transactions on Industrial Informatics.

[13]  J. Harris Fuzzy Logic Applications in Engineering Science , 2005 .

[14]  S. S. Hassan,et al.  Detection of power system operation violations via fuzzy set theory , 1996 .

[15]  Armando Martins Leite da Silva,et al.  A Method for Ranking Critical Nodes in Power Networks Including Load Uncertainties , 2016, IEEE Transactions on Power Systems.

[16]  Manjaree Pandit,et al.  Cascade fuzzy neural network based voltage contingency screening and ranking , 2003 .

[17]  D. Chatterjee,et al.  N-1-1 AC contingency analysis as a part of NERC compliance studies at midwest ISO , 2010, IEEE PES T&D 2010.

[18]  B. Fardanesh,et al.  Assessing vulnerability to cascading outages , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[19]  Tarlochan S. Sidhu,et al.  Contingency screening for steady-state security analysis by using FFT and artificial neural networks , 2000 .

[20]  G. Irisarri,et al.  Methods for contingency screening and ranking for voltage stability analysis of power systems , 1995, Proceedings of Power Industry Computer Applications Conference.

[21]  Shai Ben-David,et al.  Understanding Machine Learning: From Theory to Algorithms , 2014 .

[22]  Turgay Yalcin,et al.  Detection of blackouts by using K-means clustering in a power system , 2012 .

[23]  José Vicente Canto dos Santos,et al.  New genetic algorithms for contingencies selection in the static security analysis of electric power systems , 2015, Expert Syst. Appl..

[24]  Manuel A. Matos,et al.  Multicontingency steady state security evaluation using fuzzy clustering techniques , 2000 .

[25]  J. Bezdek,et al.  FCM: The fuzzy c-means clustering algorithm , 1984 .

[26]  Babak Rezaee,et al.  A cluster validity index for fuzzy clustering , 2010, Fuzzy Sets Syst..

[27]  Wesam M. Ashour,et al.  Efficient and Fast Initialization Algorithm for K- means Clustering , 2012 .

[28]  K. R. Sudha,et al.  Fuzzy C-Means clustering for robust decentralized load frequency control of interconnected power system with Generation Rate Constraint , 2012 .

[29]  Buhan Zhang,et al.  Security risk assessment using fast probabilistic power flow considering static power-frequency characteristics of power systems , 2014 .

[30]  Jianlan Li,et al.  A vulnerability model for power system dynamic security assessment , 2014 .

[31]  R. Sunitha,et al.  A Composite Security Index for On-line Steady-state Security Evaluation , 2011 .

[32]  Francisco Sandoval Hernández,et al.  Contingency evaluation and monitorization using artificial neural networks , 2010, Neural Computing and Applications.

[33]  D. S. Javan,et al.  On-line Voltage and Power Flow Contingencies Ranking Using Enhanced Radial Basis Function Neural Network and Kernel Principal Component Analysis , 2012 .

[34]  Chanan Singh,et al.  Steady state and dynamic security assessment in composite power systems , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[35]  Dahai You,et al.  Quick and effective multiple contingency screening algorithm based on long-tailed distribution , 2016 .

[36]  Jianzhong Tong,et al.  On-line transient stability screening of 14,000-bus models using TEPCO-BCU: Evaluations and methods , 2010, IEEE PES General Meeting.

[37]  I. Dobson,et al.  Risk Assessment of Cascading Outages: Methodologies and Challenges , 2012, IEEE Transactions on Power Systems.

[38]  Azah Mohamed,et al.  A NEW CLUSTERING TECHNIQUE FOR POWER SYSTEM VOLTAGE STABILITY ANALYSIS , 1995 .

[39]  Michael C. Pacis,et al.  Algorithm development for Power System Contingency screening and ranking using Voltage-Reactive Power Performance Index , 2016, 2016 IEEE Region 10 Conference (TENCON).

[40]  Sanjay Kumar Dubey,et al.  Comparative Analysis of K-Means and Fuzzy C- Means Algorithms , 2013 .

[41]  J.A.D. Pinto,et al.  The Performance Indices to Contingencies Screening , 2006, 2006 International Conference on Probabilistic Methods Applied to Power Systems.

[42]  G. Ejebe,et al.  Automatic Contingency Selection , 1979, IEEE Transactions on Power Apparatus and Systems.

[43]  Yushu SUN,et al.  Cascading failure analysis of power flow on wind power based on complex network theory , 2014 .

[44]  A.K. Sinha,et al.  Identification of Catastrophic Failures in Power System Using Pattern Recognition and Fuzzy Estimation , 2009, IEEE Transactions on Power Systems.

[45]  S. Grillo,et al.  Indices for fast contingency ranking in large electric power systems , 2010, Melecon 2010 - 2010 15th IEEE Mediterranean Electrotechnical Conference.

[46]  C. Singh,et al.  A practical approach for integrated power system vulnerability analysis with protection failures , 2004, IEEE Transactions on Power Systems.

[47]  D. Niebur,et al.  Power system static security assessment using the Kohonen neural network classifier , 1991, [Proceedings] Conference Papers 1991 Power Industry Computer Application Conference.

[48]  Mladen Kezunovic,et al.  Static security analysis based on weighted vulnerability index , 2011, 2011 IEEE Power and Energy Society General Meeting.

[49]  T. Ross Fuzzy Logic with Engineering Applications , 1994 .

[50]  Lei Li,et al.  On-Line Static Security Assessment of Power System Based on a New Half-Against-Half Multi-Class Support Vector Machine , 2011, 2011 3rd International Workshop on Intelligent Systems and Applications.

[51]  Guorui Zhang,et al.  Application of synchrophasor measurements for improving operator situational awareness , 2011, 2011 IEEE Power and Energy Society General Meeting.

[52]  C. Jensen,et al.  Power System Security Assessment Using Neural Networks: Feature Selection Using Fisher Discrimination , 2001, IEEE Power Engineering Review.

[53]  Bassam A. Hemade,et al.  Synchrophasor measurements-based on-line power system steady-state security indices—part I: Methodology , 2016, 2016 Eighteenth International Middle East Power Systems Conference (MEPCON).

[54]  Bassam A. Hemade,et al.  Generated power-based composite security index for evaluation of cascading outages , 2017, 2017 Nineteenth International Middle East Power Systems Conference (MEPCON).

[55]  Habib Rajabi Mashhadi,et al.  A fast static security assessment method based on radial basis function neural networks using enhanced clustering , 2013 .

[56]  M. Kezunovic,et al.  Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF) Method , 2005, 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific.

[57]  K. Shanti Swarup,et al.  Particle swarm optimization based K-means clustering approach for security assessment in power systems , 2011, Expert Syst. Appl..

[58]  Federico Milano,et al.  A computational intelligence-based suite for vulnerability assessment of electrical power systems , 2010, Simul. Model. Pract. Theory.

[59]  Jun Yan,et al.  Cascading Failure Analysis With DC Power Flow Model and Transient Stability Analysis , 2015, IEEE Transactions on Power Systems.