Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Machine Learning for Hybrid Line Stability Ranking Index in Polynomial Load Modeling under Contingency Conditions

    P. Venkatesh1,*, N. Visali2

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1001-1012, 2023, DOI:10.32604/iasc.2023.036268

    Abstract In the conventional technique, in the evaluation of the severity index, clustering and loading suffer from more iteration leading to more computational delay. Hence this research article identifies, a novel progression for fast predicting the severity of the line and clustering by incorporating machine learning aspects. The polynomial load modelling or ZIP (constant impedances (Z), Constant Current (I) and Constant active power (P)) is developed in the IEEE-14 and Indian 118 bus systems considered for analysis of power system security. The process of finding the severity of the line using a Hybrid Line Stability Ranking Index (HLSRI) is used for… More >

  • Open Access

    ARTICLE

    A Data Driven Security Correction Method for Power Systems with UPFC

    Qun Li, Ningyu Zhang*, Jianhua Zhou, Xinyao Zhu, Peng Li

    Energy Engineering, Vol.120, No.6, pp. 1485-1502, 2023, DOI:10.32604/ee.2023.022856

    Abstract The access of unified power flow controllers (UPFC) has changed the structure and operation mode of power grids all across the world, and it has brought severe challenges to the traditional real-time calculation of security correction based on traditional models. Considering the limitation of computational efficiency regarding complex, physical models, a data-driven power system security correction method with UPFC is, in this paper, proposed. Based on the complex mapping relationship between the operation state data and the security correction strategy, a two-stage deep neural network (DNN) learning framework is proposed, which divides the offline training task of security correction into… More >

Displaying 1-10 on page 1 of 2. Per Page