Skip to main content

Machine Learning Aided Efficient Tools for Risk Evaluation and Operational Planning of Multiple Contingencies

  • Chapter
  • First Online:
Chaos Modeling and Control Systems Design

Part of the book series: Studies in Computational Intelligence ((SCI,volume 581))

Abstract

In power system reliability assessment, the system security limits and adequacy indices depend on the set of contingencies analyzed. Consequently the final solution strategies for short term operational and long term investment planning studies also depend on the set of contingencies considered for planning. Generally, planning is done for the most critical contingency, with the assumption that the solution strategy for the most constraining contingency will also perform well on the contingencies that have lower severity. But this is not always true. In reality, under highly stressed and uncertain nature of power system conditions, the operational rules for the most constraining contingency may not be effective for all other contingencies. In fact some contingencies, which are generally less severe, may have more pronounced ill-effect during certain other operating conditions. Therefore, it is important to perform a comprehensive contingency analysis of many contingencies under several operating conditions (a computationally burdensome task), screen the most important ones among them that may violate the probabilistic reliability criteria, and devise effective solution strategies. Thus, the focus of this chapter is to devise a computationally efficient operational planning strategy against voltage stability phenomena for many critical contingencies. The chapter accomplishes this with the help of a hybrid approach that combines the strength of model-based analytical indicators and data driven techniques to design two important aspects of planning for multiple contingencies, namely: risk based contingency ranking and contingency grouping. Utilizing realistic probability distributions of operating conditions together with machine learning techniques makes the risk assessment process of multiple contingencies credible and computationally tractable. In order to group the contingencies efficiently for devising a common solution strategy, the chapter introduces a novel graphical index, termed as progressive entropy that captures the degree of overlap among post-contingency performances of various contingencies. The objective of the proposed contingency grouping method is to strike a balance between producing simple and accurate operational guidelines for multiple contingencies, while reducing the operational complexity in terms of the total number of guidelines that operators handle.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    ASSESS, TROPIC, METRIX software website: http://www.rte-france.com/htm/an/activites/assess.jsp.

References

  1. Ajjarapu, V.: Computational Techniques for voltage stability assessment and control. Springer, New York (2006)

    Google Scholar 

  2. Alt, H., Godau, M.: Computing the Fréchet distance between two polygonal curves. Int. J. Comput. Geom. Appl. 5, 75–91 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  3. Amjady, N., Esmaili, M.: Application of a new sensitivity analysis framework for voltage contingency ranking. IEEE Trans. Power Syst. 20, 973–983 (2005)

    Article  Google Scholar 

  4. Cholley, P., Lebrevelec, C., Vitet, S., de Pasquale, M.: Constructing operating rules to avoid voltage collapse: a statistical approach. In: Proceedings of International Conference on Power System Technology, POWERCON ‘98, vol 2: 14 (1998)

    Google Scholar 

  5. Devroye, L.: Non-Uniform Random Variate Generation. Springer, Newyork (1986)

    Book  MATH  Google Scholar 

  6. Diao, R., Sun, K., Vittal, V., O’Keefe, R.J., Richardson, M.R., Bhatt, N., Stradford, D., Sarawgi, S.K.: Decision tree-based online voltage security assessment using PMU measurements. IEEE Trans. Power Syst. 24, 832–839 (2009)

    Article  Google Scholar 

  7. Fischer, D., Szabados, B., Poehlman, S.: Automatic contingency grouping using partial least squares and feed forward neural network technologies applied to the static security assessment problem. In: Large Engineering Systems Conference on Power Engineering, pp. 84–89 (2003)

    Google Scholar 

  8. Genc, I., Diao, R., Vittal, V., Kolluri, S., Mandal, S.: Decision tree-based preventive and corrective control applications for dynamic security enhancement in power systems. IEEE Trans. Power Syst. (2010)

    Google Scholar 

  9. Greene, S., Dobson, I., Alvarado, F.L.: Sensitivity of the loading margin to voltage collapse with respect to arbitrary parameters. In: IEEE PES Winter Meeting, Baltimore (1996)

    Google Scholar 

  10. Hatziargyriou, N.D., Contaxis, G.C., Sideris, N.C.: A decision tree method for on-line steady state security assessment. IEEE Trans. Power Syst. 9, 1052–1061 (1994)

    Article  Google Scholar 

  11. Henry, S., Pompee, J., Devatine, L., Bulot, M., Bell, K.: New trends for the assessment of power system security under uncertainty. IEEE PES Power Syst. Conf. Expos. 3, 1380–1385 (2004)

    Google Scholar 

  12. Hsiao, T.Y., Hsieh, C.A., Lu, C.N.: A risk-based contingency selection method for SPS applications. IEEE Trans. Power Syst. 21, 1009–1010 (2006)

    Article  Google Scholar 

  13. Krishnan, V., McCalley, J. D., Henry, S., Issad, S.: High information content database generation for data mining based power system operational planning studies. In: IEEE PES General Meeting (2010)

    Google Scholar 

  14. Krishnan, V., McCalley, J.D., Henry, S., Issad, S.: Efficient database generation for decision tree based power system security assessment. IEEE Trans. Power Syst. 26, 2319–2327 (2011)

    Article  Google Scholar 

  15. Lebrevelec, C., Schlumberger, Y., de Pasquale, M.: An application of a risk based methodology for defining security rules against voltage collapse. IEEE Power Eng. Soc. Summer Meet. 1, 185–190 (1999)

    Google Scholar 

  16. Lee, B., Kwon, S., Lee, J., et al.: Fast contingency screening for online transient stability monitoring and assessment of the KEPCO system. IEE Proc. Gener., Trans. Distrib. 150, 399–404 (2003)

    Article  Google Scholar 

  17. Pandit, M., Srivastava, L., Sharma, J.: Fast voltage contingency selection using fuzzy Parallel self-organizing hierarchical neural network. IEEE Trans. Power Syst. 18(2), 657–664 (2003)

    Article  Google Scholar 

  18. Rovnyak, S., Kretsinger, S., Thorp, J., Brown, D.: Decision trees for real-time transient stability prediction. IEEE Trans. Power Syst. 9, 1417–1426 (1994)

    Article  Google Scholar 

  19. Schlumberger, Y., Pompee, J., de Pasquale, M.: Updating operating rules against voltage collapse using new probabilistic techniques. IEEE/PES Trans. Distrib. Conf. Exhib.: Asia Pac. 2: 1139–1144 (2002)

    Google Scholar 

  20. Senroy, N., Heydt, G.T., Vittal, V.: Decision tree assisted controlled islanding. IEEE Trans. Power Syst. 21, 1790–1797 (2006)

    Article  Google Scholar 

  21. Sigrist, L., Egido, I., Sánchez-Úbeda, E.F., Rouco, L.: Representative operating and contingency scenarios for the design of UFLS schemes. IEEE Trans. Power Syst. 25, 906–913 (2010)

    Article  Google Scholar 

  22. Unger, E.A., Harn, L., Kumar, V.: Entropy as a measure of database information. In: Proceedings of the Sixth Annual Computer Security Applications Conference pp. 80–87 (1990)

    Google Scholar 

  23. Vittal, V., Kliemann, W., Ni, Y.X., Chapman, D.G., Silk, A.D., Sobajic, D.J.: Determination of generator groupings for an islanding scheme in the Manitoba hydro system using the method of normal forms. IEEE Trans. Power Syst. 13, 1345–1351 (1998)

    Article  Google Scholar 

  24. Wan, H., McCalley, J.D., Vittal, V.: Risk based voltage security assessment. IEEE Trans. Power Syst. 15, 1247–1254 (2000)

    Article  Google Scholar 

  25. Wehenkel, L., Pavella, M., Euxibie, E., Heilbronn, B.: Decision tree based transient stability method a case study. IEEE Trans. Power Syst. 9, 459–469 (1994)

    Article  Google Scholar 

  26. Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann Publishers, San Fransisco, CA (2000)

    Google Scholar 

  27. Wyss, W.G., Jorgensen, K.H.: A User’s Guide to LHS: Sandia’s Latin Hypercube Sampling Software. Sandia Natl. Laboratories R. SAND98-0210, Albuquerque, NM (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Venkat Krishnan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Krishnan, V. (2015). Machine Learning Aided Efficient Tools for Risk Evaluation and Operational Planning of Multiple Contingencies. In: Azar, A., Vaidyanathan, S. (eds) Chaos Modeling and Control Systems Design. Studies in Computational Intelligence, vol 581. Springer, Cham. https://doi.org/10.1007/978-3-319-13132-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13132-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13131-3

  • Online ISBN: 978-3-319-13132-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics