Please use this identifier to cite or link to this item:
http://13.232.72.61:8080/jspui/handle/123456789/415
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sreekumaran, Sreedevi | - |
dc.contributor.author | Nair, Lekshmi | - |
dc.contributor.author | Nagesh, H. | - |
dc.date.accessioned | 2018-10-12T04:35:23Z | - |
dc.date.available | 2018-10-12T04:35:23Z | - |
dc.date.issued | 2015-04 | - |
dc.identifier.citation | Sreekumaran, Sreedevi., Nair, Lekshmi., & Nagesh, H. (2015). Power System Security Assessment and Contingency Analysis using Supervised Learning Approach. International Journal of Advance Engineering and Research Development, 2(4), 637-646 | en_US |
dc.identifier.issn | e-2348-4470 | - |
dc.identifier.issn | p-2348-6406 | - |
dc.identifier.uri | http://13.232.72.61:8080/jspui/handle/123456789/415 | - |
dc.description.abstract | The most important requirement and need for proper operation of power system is maintenance of the system security. The security assessment analysis is done to determine until what period the power system remains in the safe operable mode. Contingency screening is done to identify critical contingencies in order to take preventive actions at the right time. The severity of a contingency is determined by two scalar performance indices: Voltage-reactive power performance index(ππΌπ£π) and line MVA performance index(ππΌππ£π). Performance indices are calculated based on the conventional method known as Newton Raphson load flow program. Contingency ranking is done based on the severity of the contingencies. In this proposed work, contingency analysis is done with IEEE 14 bus. Since the system parameters are dynamic in nature and keeps on changing, there is need of soft computing technologies. Supervised learning approach that uses Feed-Forward Artificial Neural Network(FFNN) is employed using pattern recognition methodology for security assessment and contingency analysis. A feature selection technique based on the correlation coefficient has been employed to identify the inputs for thee FFNN. With these soft computing techniques, greater accuracy is achieved | en_US |
dc.language.iso | en | en_US |
dc.publisher | IJAERD | en_US |
dc.subject | Electrical engineering | en_US |
dc.subject | Electronics Engineering | en_US |
dc.subject | Neural network | en_US |
dc.subject | Static security assessment | en_US |
dc.title | Power System Security Assessment and Contingency Analysis using Supervised Learning Approach. | en_US |
dc.type | Article | en_US |
Appears in Collections: | Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Power System Security.pdf | 748.76 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.