Conceptual Analysis of Different Clustering Techniques for Static Security Investigation
暂无分享,去创建一个
[1] Anjan Bose,et al. On-line power system security analysis , 1992, Proc. IEEE.
[2] Lawrence Jenkins,et al. Composite Criteria based Network Contingency Ranking using Fuzzy Logic Approach , 2002 .
[3] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[4] Manjaree Pandit,et al. Fast voltage contingency selection using fuzzy parallel self-organizing hierarchical neural network , 2003 .
[5] S. P. Nangrani,et al. Power system security assessment using ranking based on combined MW-chaotic performance index , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.
[6] S.N. Singh,et al. Parallel radial basis function neural network based fast voltage estimation for contingency analysis , 2004, 2004 IEEE International Conference on Electric Utility Deregulation, Restructuring and Power Technologies. Proceedings.
[7] Liangzhong Yao,et al. Vulnerability assessment for cascading failures in electric power systems , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.
[8] J.A.D. Pinto,et al. Contingency screening and ranking algorithm using two different sets of security performance indices , 2003, 2003 IEEE Bologna Power Tech Conference Proceedings,.
[9] S Kalyani,et al. Supervised fuzzy C-means clustering technique for security assessment and classification in power systems , 2010 .
[10] Jose M. Arroyo,et al. Application of a genetic algorithm to n-K power system security assessment , 2013 .
[11] R. Sunitha,et al. Online Static Security Assessment Module Using Artificial Neural Networks , 2013, IEEE Transactions on Power Systems.
[12] Tao Wang,et al. Complex Network-Based Cascading Faults Graph for the Analysis of Transmission Network Vulnerability , 2019, IEEE Transactions on Industrial Informatics.
[13] J. Harris. Fuzzy Logic Applications in Engineering Science , 2005 .
[14] S. S. Hassan,et al. Detection of power system operation violations via fuzzy set theory , 1996 .
[15] Armando Martins Leite da Silva,et al. A Method for Ranking Critical Nodes in Power Networks Including Load Uncertainties , 2016, IEEE Transactions on Power Systems.
[16] Manjaree Pandit,et al. Cascade fuzzy neural network based voltage contingency screening and ranking , 2003 .
[17] D. Chatterjee,et al. N-1-1 AC contingency analysis as a part of NERC compliance studies at midwest ISO , 2010, IEEE PES T&D 2010.
[18] B. Fardanesh,et al. Assessing vulnerability to cascading outages , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.
[19] Tarlochan S. Sidhu,et al. Contingency screening for steady-state security analysis by using FFT and artificial neural networks , 2000 .
[20] G. Irisarri,et al. Methods for contingency screening and ranking for voltage stability analysis of power systems , 1995, Proceedings of Power Industry Computer Applications Conference.
[21] Shai Ben-David,et al. Understanding Machine Learning: From Theory to Algorithms , 2014 .
[22] Turgay Yalcin,et al. Detection of blackouts by using K-means clustering in a power system , 2012 .
[23] José Vicente Canto dos Santos,et al. New genetic algorithms for contingencies selection in the static security analysis of electric power systems , 2015, Expert Syst. Appl..
[24] Manuel A. Matos,et al. Multicontingency steady state security evaluation using fuzzy clustering techniques , 2000 .
[25] J. Bezdek,et al. FCM: The fuzzy c-means clustering algorithm , 1984 .
[26] Babak Rezaee,et al. A cluster validity index for fuzzy clustering , 2010, Fuzzy Sets Syst..
[27] Wesam M. Ashour,et al. Efficient and Fast Initialization Algorithm for K- means Clustering , 2012 .
[28] K. R. Sudha,et al. Fuzzy C-Means clustering for robust decentralized load frequency control of interconnected power system with Generation Rate Constraint , 2012 .
[29] Buhan Zhang,et al. Security risk assessment using fast probabilistic power flow considering static power-frequency characteristics of power systems , 2014 .
[30] Jianlan Li,et al. A vulnerability model for power system dynamic security assessment , 2014 .
[31] R. Sunitha,et al. A Composite Security Index for On-line Steady-state Security Evaluation , 2011 .
[32] Francisco Sandoval Hernández,et al. Contingency evaluation and monitorization using artificial neural networks , 2010, Neural Computing and Applications.
[33] D. S. Javan,et al. On-line Voltage and Power Flow Contingencies Ranking Using Enhanced Radial Basis Function Neural Network and Kernel Principal Component Analysis , 2012 .
[34] Chanan Singh,et al. Steady state and dynamic security assessment in composite power systems , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[35] Dahai You,et al. Quick and effective multiple contingency screening algorithm based on long-tailed distribution , 2016 .
[36] Jianzhong Tong,et al. On-line transient stability screening of 14,000-bus models using TEPCO-BCU: Evaluations and methods , 2010, IEEE PES General Meeting.
[37] I. Dobson,et al. Risk Assessment of Cascading Outages: Methodologies and Challenges , 2012, IEEE Transactions on Power Systems.
[38] Azah Mohamed,et al. A NEW CLUSTERING TECHNIQUE FOR POWER SYSTEM VOLTAGE STABILITY ANALYSIS , 1995 .
[39] Michael C. Pacis,et al. Algorithm development for Power System Contingency screening and ranking using Voltage-Reactive Power Performance Index , 2016, 2016 IEEE Region 10 Conference (TENCON).
[40] Sanjay Kumar Dubey,et al. Comparative Analysis of K-Means and Fuzzy C- Means Algorithms , 2013 .
[41] J.A.D. Pinto,et al. The Performance Indices to Contingencies Screening , 2006, 2006 International Conference on Probabilistic Methods Applied to Power Systems.
[42] G. Ejebe,et al. Automatic Contingency Selection , 1979, IEEE Transactions on Power Apparatus and Systems.
[43] Yushu SUN,et al. Cascading failure analysis of power flow on wind power based on complex network theory , 2014 .
[44] A.K. Sinha,et al. Identification of Catastrophic Failures in Power System Using Pattern Recognition and Fuzzy Estimation , 2009, IEEE Transactions on Power Systems.
[45] S. Grillo,et al. Indices for fast contingency ranking in large electric power systems , 2010, Melecon 2010 - 2010 15th IEEE Mediterranean Electrotechnical Conference.
[46] C. Singh,et al. A practical approach for integrated power system vulnerability analysis with protection failures , 2004, IEEE Transactions on Power Systems.
[47] D. Niebur,et al. Power system static security assessment using the Kohonen neural network classifier , 1991, [Proceedings] Conference Papers 1991 Power Industry Computer Application Conference.
[48] Mladen Kezunovic,et al. Static security analysis based on weighted vulnerability index , 2011, 2011 IEEE Power and Energy Society General Meeting.
[49] T. Ross. Fuzzy Logic with Engineering Applications , 1994 .
[50] Lei Li,et al. On-Line Static Security Assessment of Power System Based on a New Half-Against-Half Multi-Class Support Vector Machine , 2011, 2011 3rd International Workshop on Intelligent Systems and Applications.
[51] Guorui Zhang,et al. Application of synchrophasor measurements for improving operator situational awareness , 2011, 2011 IEEE Power and Energy Society General Meeting.
[52] C. Jensen,et al. Power System Security Assessment Using Neural Networks: Feature Selection Using Fisher Discrimination , 2001, IEEE Power Engineering Review.
[53] Bassam A. Hemade,et al. Synchrophasor measurements-based on-line power system steady-state security indices—part I: Methodology , 2016, 2016 Eighteenth International Middle East Power Systems Conference (MEPCON).
[54] Bassam A. Hemade,et al. Generated power-based composite security index for evaluation of cascading outages , 2017, 2017 Nineteenth International Middle East Power Systems Conference (MEPCON).
[55] Habib Rajabi Mashhadi,et al. A fast static security assessment method based on radial basis function neural networks using enhanced clustering , 2013 .
[56] M. Kezunovic,et al. Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF) Method , 2005, 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific.
[57] K. Shanti Swarup,et al. Particle swarm optimization based K-means clustering approach for security assessment in power systems , 2011, Expert Syst. Appl..
[58] Federico Milano,et al. A computational intelligence-based suite for vulnerability assessment of electrical power systems , 2010, Simul. Model. Pract. Theory.
[59] Jun Yan,et al. Cascading Failure Analysis With DC Power Flow Model and Transient Stability Analysis , 2015, IEEE Transactions on Power Systems.