You are on page 1of 9

IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 25, NO.

2, MAY 2010 957

Design of a Real-Time Security Assessment


Tool for Situational Awareness Enhancement
in Modern Power Systems
Ruisheng Diao, Student Member, IEEE, Vijay Vittal, Fellow, IEEE, and Naim Logic, Senior Member, IEEE

Abstract—Detailed security analysis for contingencies In many instances the hazardous impacts of contingen-
( = 1 2 3 . . .) in a real-time setting is still a great challenge cies can be easily ignored until their occurrence, because their
due to the significant computational burden. This paper takes ad- probabilities of occurrence are quite low. Without timely sit-
vantage of phasor measurement units (PMUs) and decision trees
(DTs) to develop a real-time security assessment tool to assess four
uational awareness, system operators may not have sufficient
important post-contingency security issues, including voltage mag- time to arm preventive or corrective controls in order to ensure
nitude violation (VMV), thermal limit violation (TV), voltage sta- system security in case of a dangerous initiating event. More-
bility (VS) and transient stability (TS). The proposed scheme is over, such a disturbance can further result in cascading outages
tested on the Salt River Project (SRP) power system represented by and cause a long-term power interruption to customers in a large
a series of operating conditions (OCs) during a representative day. area, such as the blackout that occurred on August 14, 2003 in
The properly trained DTs demonstrate excellent prediction perfor-
mance. Robustness tests for the offline trained DTs are performed North America [1]. Therefore, the development of a tool to ac-
on a group of changed OCs that were not included for training the curately assess security issues and provide sufficiently fast pre-
DTs and the idea of tuning critical system attributes for preventive diction results in case of critical contingencies is an important
controls is also presented to improve system security. requirement for real-time operation of modern power systems.
Index Terms—Classification tree, decision tree, online security The advent of machine learning tools including neural net-
assessment, preventive control, regression tree, thermal violation, work (NN), decision trees, support vector machines (SVMs)
transient stability, voltage magnitude violation, voltage stability. and self organizing maps (SOMs) provides a promising solu-
tion to achieve this goal [2]. Such technologies take advantage
of exhaustive offline studies to uncover the inherent system at-
I. INTRODUCTION tributes related to an objective and provide accurate and fast pre-
diction models for online application using real-time measure-
S modern power systems are being operated at a more
A stressed level because of deregulation and the difficulty
of adding new transmission capacity, occurrence of critical con-
ments. Compared to other machine learning tools decision trees
have a unique feature that utilizes the thresholds of attributes
(linear classifiers) to predict the considered objective. The ob-
tingencies may violate secure operation limits and even initiate tained thresholds not only help to build a predictive model, but
severe stability problems. A severe contingency can result in ad- also generate online nomograms for system operators to arm
verse impacts on the system in terms of various security issues, control actions.
determined by the disturbance type and severity. So far, the most The use of decision trees in the field of power systems dates
accurate and practical measure to assess different security issues back to the late 1980s [3]. Various applications of decision
is via commercial simulation packages by properly modeling trees (DTs) have been reported thereafter, depending on the
system components. However, such a detailed analysis method design of methodologies to describe the problems to be solved.
in a near real-time manner is still a great challenge due to the In [4], decision trees were trained offline to find the critical
high nonlinearity and high dimensionality of large scale power clearing time to assess transient stability. A real-time transient
systems. The data dimensionality problem in fact makes it im- stability prediction method was proposed in [5] by collecting
possible to scan all combinations of post-contingency rotor angles as predictors, which was tested
contingencies in a reasonable time frame. Traditionally system on the New England 39-bus test system at various operating
dynamic security analysis is carried out on a few preselected conditions. Other efforts involving DTs were also reported in
contingencies in the time interval of several minutes (e.g., most voltage security monitoring and estimation, loss of synchro-
of and some of the important contingencies). nism detection and the timing of controlled separation strategy
[6]–[10]. In [11], an online transient security assessment
Manuscript received July 10, 2009; revised August 31, 2009. First published scheme using DTs and PMUs was presented to predict whether
December 01, 2009; current version published April 21, 2010. This work was an contingency can violate transient security criteria
supported in part by Salt River Project and in part by the Power System Engi-
neering Research Center. Paper no. TPWRS-00530-2009.
by collecting PMU measured pre-scenario system attributes as
R. Diao and V. Vittal are with the Department of Electrical Engineering, Ari- security predictors. In [12], another approach was proposed
zona State University, Tempe, AZ 85287 USA (e-mail: ruisheng.diao@asu.edu; to evaluate voltage security problems caused by con-
vijay.vittal@asu.edu).
N. Logic is with the Salt River Project, Phoenix, AZ 85287-5706 USA
tingencies at stressed OCs. The PMU measured voltage phase
(e-mail: Naim.Logic@srpnet.com). angle difference, current flow, active power flow, reactive power
Digital Object Identifier 10.1109/TPWRS.2009.2035507 flow, square of voltage magnitude and the monitored current
0885-8950/$26.00 © 2009 IEEE

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
958 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 25, NO. 2, MAY 2010

magnitude multiplied by branch impedance are used as voltage


security indicators. The properly trained DTs have shown good
prediction performance (prediction accuracy on the test set
around 95%).
However, several important factors that might influence the
performance of offline trained DTs were not considered in [11]
and [12], including:
1) At normal operating conditions, contingencies
usually do not initiate system instability in operational
models of power systems and therefore the obtained
databases may contain too few insecure cases to train
DTs. The impacts of contingencies should be in-
cluded when training DTs.
2) The OCs generated in [11] and [12] represented typ-
ical operating snapshots during various periods of time,
but the real-time historical dispatch information in the
system was not considered when training offline trees.
This choice might affect DT robustness.
3) The simulations performed in [11] and [12] did not con-
sider detailed load models in the system, which may sig-
nificantly affect simulation results.
In order to further improve DT accuracy and robustness, this
paper takes advantage of previous algorithms developed in [12]
to develop an improved scheme for real-time security assess-
ment. More practical and innovative considerations are included
from different perspectives, by collecting more predictors and
building efficient databases. Actual monitored data obtained for
a whole day is used to generate the databases to train the DTs.
Another novel development is the use of regression trees (RTs),
which is another type of DT compared to classification trees Fig. 1. Flowchart of the improved methodology.
(CTs), for the assessment of VMV and TV problems caused by
contingencies which are very common issues encoun-
tered by operators. Instead of merely providing a secure or in- fast prediction results regarding the potential severity of certain
sure classification result, regression trees are trained to predict contingencies. The thresholds in the DTs also provide nomo-
the severity of a contingency. Two performance indices are de- grams that define operating regions with different risk levels.
fined in this paper to quantify the impacts of VMV and TV prob- Preventive controls can be performed to enhance system secu-
lems, as prediction objectives. Regression trees provide an indi- rity before the occurrence of critical contingencies if the current
cation of the number of overloaded lines and buses with voltage OC enters a high-risk region. If for some reason preventive con-
magnitude violations following a contingency. A higher index trols are not available, corrective controls have to be taken to
value indicates a larger number of problematic elements and a ensure security once a critical contingency occurs.
more severe impact on the system. Therefore this method pro- More details regarding the three-step scheme and the ad-
vides more useful information than a classification result. In the vantages in performing online system security assessment
development of such a scheme, the idea of applying DTs to the are provided in [12, Section III] and not repeated here. This
design of preventive control is also developed. work mainly focuses on addressing the concerns identified
This proposed scheme depicted in Fig. 1, includes three steps: and further enhancing DT performance for online application.
1) offline DT training (24-h look-ahead), 2) periodic DT update The improved scheme is then tested on the SRP system model
(hourly) and 3) online application. represented by a series of real-time OCs during a given day.
The main idea is to first perform exhaustive offline simula- The results exhibit that the improved methodology can obtain
tions to assess the four security issues for the forecasted OCs (a DTs with very high prediction accuracy and demonstrate good
day ahead) using a list of pre-selected and contin- robustness. The rest of this paper is organized as follows.
gencies. A separate DT with good prediction ability is trained In Section II, the basic principles of decision trees including
specifically for the assessment of each type of security issue. CTs and RTs are briefly introduced. Details regarding OC
Two classification trees are trained for stability issues while two generation, system modeling for the SRP system, contingency
regression trees are trained for voltage magnitude and overload selection and database (DB) building for DT training are
violation issues. These DTs are periodically updated every hour discussed. Two performance indices to quantify the impacts
(or when necessary) in order to continuously perform well on of the post-contingency VMV and TV issues are also defined.
the changed OCs that are unforeseen in the offline DT training. Section III provides the performance of the four decision tree
For online application, PMU measurements of critical attributes models including two regression trees and two classification
selected by DTs are made and fed into the DT models to obtain trees. The robustness of the DTs is then tested on unforeseen

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
DIAO et al.: DESIGN OF A REAL-TIME SECURITY ASSESSMENT TOOL 959

OCs in Section IV and a method to enhance DT performance • TSAT: Transient security assessment tool. It is used
is tested. Section V presents a DT assisted approach to design for detailed time-domain simulation to assess tran-
preventive controls in order to improve system security. Fi- sient stability.
nally, conclusions and ideas for future work are provided in 2) CART: Classification and Regression Trees, developed
Section VI. by Salford Systems, CA [15].
3) MATLAB is used for data collection, database creation
II. METHODOLOGY DESCRIPTION and program interface design.

A. Classification Trees and Regression Trees C. System Studied—the SRP Power System

A decision tree (a type of supervised machine learning tool) The SRP system model provided is a part of the Western
[13], [14] is a tree-structured predictive model for a given “ob- Electricity Coordinating Council (WECC) system that contains
jective” characterized by a vector of attributes (or predictors). approximately 17 252 buses, 3115 generators and 14 989 trans-
Based on the nature of the objective (either categorical or nu- mission lines for security analysis. SRP serves a large number
merical), DTs can be categorized as classification trees and re- of customers in central Arizona in the U.S. The voltage level
gression trees respectively. In this effort, all the CTs and RTs in this model ranges from 11 kV to 500 kV. More than 620
are trained and tested using a commercial package, called clas- buses, 720 transmission lines, 120 transformers and 110 gen-
sification and regression trees (CART) [15], [16]. erators are monitored by SRP. Currently, there are 33 PMUs
In CART, a decision tree has a binary structure with two types installed on 230-kV and 500-kV buses in the SRP system. The
of nodes, the internal node with two child nodes and terminal real-time measurements of these PMUs are used as important
node without any child node. Each terminal node provides a security predictors to train DT models.
prediction result of the form secure (S), insecure (I) or a per-
D. OC Generation
formance index value. For the purpose of training a good DT, a
learning set and a test set in the same format are required. The 1) Basic OCs: The main goal of this sub-section is to create
learning set is first used to train a maximal tree by recursively a series of OCs that can accurately represent different system
splitting a parent node into two purer child nodes until further snapshots during a representative day, July 21, 2008. The data
splitting can no longer improve accuracy and this maximal tree provided by the SRP staff include the load change pattern, gen-
is then pruned step by step to generate a series of smaller DTs in erator dispatch and capacitor status during this day, with all
order to attenuate the over-fitting problem. The main goal is to major transmission lines in service. Based on this information,
partition all the cases in a high dimensional space into various MATLAB codes are developed to interface with PSAT to change
sub-regions with homogeneous cases in each region. Details re- system states to their desired values at different time instants.
garding splitting and stopping rules and DT pruning algorithms Thus, 96 OCs are generated for the whole day, from 0:00 am,
are provided in [14]. The performances of these smaller DTs on 0:15 am, 0:30 am,…, to 23:45 pm. Each of the created OCs is
the test set are scored in terms of the misclassification cost for tuned to comply with the following criteria:
CTs and mean-square error for RTs. The optimal tree is there- • Voltage magnitudes of all the SRP buses are within the
fore defined as the tree model with the lowest prediction error range 0.95 p.u.–1.1 p.u.
on the test set. • There are no overloaded transmission lines in the SRP area.
When applied to power system security assessment, classifi- • There are no overloaded transformers in the SRP area.
cation trees are quite suitable for evaluating stability problems 2) More OCs for Information Enrichment: From the obser-
because the prediction objective is secure or insecure following vations in [12], the data distribution in a high dimensional space
a contingency. On the other hand, regression trees can effec- plays an important role in affecting DT performance. Since the
tively quantify the severity of the VMV and TV problems by DT is a supervised data mining technique, the more useful in-
defining performance indices as prediction objectives. formation it learns, the better it performs. Therefore, more oper-
ating conditions are generated around the 96 basic OCs in order
B. Analysis Tools to enrich system information and enhance DT performance. Be-
tween any two adjacent OCs, four additional data points are de-
In this paper, three major tools are used to develop the pro-
termined by assuming a linear pattern of load change. This idea
posed scheme:
is explained using the equations below and it is shown in Fig. 2:
1) : Dynamic security analysis tool, developed
by Powertech Lab, Canada [17]. This package is used to
generate system OCs and run different types of security (1)
simulations. It provides a user-friendly interface and in-
cludes the following sub-packages:
• PSAT: Powerflow and short-circuit analysis tool, (2)
which is used to run power flow analysis and create
time-series OCs. where and represent the active and reactive power de-
• VSAT: Voltage security assessment tool, which is mand of a load, respectively. is the bus number where a load
used to evaluate voltage stability, thermal violation is connected; is the number of OCs and refers to the number
and voltage magnitude violation issues following of inserted data points. The active power outputs of the gen-
contingencies. erators in the SRP area are also changed in a similar manner.

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
960 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 25, NO. 2, MAY 2010

Fig. 4. Load components in the SRP system.

loss of a heavily loaded transmission line or transformer may


Fig. 2. Idea of inserting more OCs by assuming linearization. cause voltage magnitude violation and/or thermal violation
problems, both of which are common but very important issues
that operators face in real-time operation. Each contingency in
the above two lists is assigned a unique identification number
that is used as an important security predictor for DT training.

F. Load Modeling
Load modeling is a very complicated topic and requires spe-
cial attention to perform security simulations because it plays
an important role in affecting the simulation results. Normally,
using constant impedance model provides an optimistic result
whereas the constant power model gives a more pessimistic re-
sult [18]. In the SRP system, about 70% of the loads are motors
in residential, industrial and commercial areas according to the
SRP operating staff. For the purpose of obtaining a more real-
Fig. 3. Active power demand at the created 476 OCs in SRP. istic system behavior, the load components in SRP are assumed
to use the combination in Fig. 4 and the exact percentage of each
portion requires further investigation:
Each of the inserted OCs is tuned to comply with the secure • 30% of the loads are modeled as constant and .
operating criteria defined previously. The status of transmission • 70% of the loads are considered as induction motors
lines and transformers are not changed, based on the assumption (voltage dependent models).
that system maintenance is scheduled a day ahead. The topology The mathematical models used for different load components
change in the system only results from the occurrence of contin- are shown below:
gencies. Following this step, 380 additional OCs are generated • 30% of the loads are assumed to be air conditioners [19]:
around the 96 basic OCs.
Therefore, a total of OCs are generated to rep- and (3)
resent the system conditions during this whole day. That means
one power flow file is created for every 3 min. Fig. 3 depicts • 20% of the loads are large industrial motors [20]:
the total active load level in the SRP system for the created 476
OCs. and (4)
E. Contingency Selection
• 20% of the loads in SRP are small industrial motors [20]:
In this section, two lists of contingencies are considered for
different types of security analysis: and (5)
1) First, a list of contingencies on the branches above
200-kV level in the SRP area is created to assess the
• The remaining 30% of the loads are constant and :
VMV and TV issues. This contingency list con-
tains 87 contingencies to be scanned. (6)
2) A second list of contingencies is created to assess
VS and TS issues. This list is provided by the SRP staff,
which includes 181 multi-line outages, generator out- G. Database Building for DT Training
ages, transformer outages and even shunt element out- 1) Prediction Objectives: As introduced above, the analyses
ages. for post-contingency VMV, TV and VS problems are conducted
This is due to the fact that an contingency usually in VSAT, which uses a static analysis method to assess system
cannot cause severe stability problems in a realistic power behavior. Once a contingency occurs, e.g., loss of one or more
system at normal OCs that satisfy NERC criteria. However, the branches, VSAT resolves the power flow without the faulted

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
DIAO et al.: DESIGN OF A REAL-TIME SECURITY ASSESSMENT TOOL 961

branch(es) and checks different system states against the de- 2) Predictor Selection: Since the main objective of the pro-
fined secure ranges for VMV and TV verification. If the power posed scheme is to predict whether a certain contingency can
flow fails to converge, a voltage instability result will be de- cause various security problems at the current OC, the predic-
clared and this is the main criterion for VS assessment. In order tors should contain sufficient information that accurately cap-
to effectively quantify the impact of an contingency on tures real-time system behavior following contingencies. As a
the system, two performance indices need to be defined for the consequence, three types of predictors are used in this work.
VMV and TV problems. The four prediction objectives are pro- The first one is the contingency ID representing different
vided below separately. and contingencies. The second type is taken from the
For VMV pre-disturbance system attributes that are directly measured by
If the voltage magnitude of any bus in the SRP area violates PMUs because PMUs have the capability of simultaneously ob-
the range 0.93 p.u.–1.1 p.u. following a branch outage, this serving system states across a wide area in a much faster and
case is considered voltage magnitude insecure. Its impact more accurate manner compared to the traditional supervisory
is quantified using a performance index, PI_vmv, defined control and data acquisition (SCADA) system. These predictors
in the following [21]: include voltage phase angle difference among different PMU
buses (A_x_y), active power flow (P_x_y), reactive power flow
(7) (Q_x_y) and current flow (I_x_y) on PMU-measured transmis-
sion lines. x and y are bus numbers where PMUs are installed.
A third type of predictors includes the real-time active power
where is the total number of buses with voltage mag- outputs of generators, because the generation pattern also plays
nitude violated in the SRP area; is the difference a critical role in determining system security. In addition, the
between the post-contingency voltage magnitude and active power outputs can be used to design preventive controls,
1.0 p.u.; and is the maximum allowable voltage as discussed in Section V.
magnitude deviation. If the voltage magnitude of a bus in In the SRP system, the candidate predictors include all the
SRP is 1.15 p.u., the performance index value of this bus measurements from the 33 available PMU buses, 82 PMU-mon-
is calculated as itored transmission lines and 116 generators monitored by SRP.
Since the proposed scheme collects pre-contingency system at-
tributes, the four databases created for the four security issues
share the same predictors.
Under the condition that all the bus voltage magnitudes are 3) Database Building: The creation of each database for DT
within the normal range after an contingency occurs, training considers an important improvement that deletes the
the index value will be zero. In contrast, if voltage magni- contingencies in the contingency lists that never cause system
tudes on many buses violate the secure range, a very large insecurity at any of the considered OCs (Noc). Such a database
index value is attained. Such a definition provides system only keeps the critical contingencies (Ncc) that have the possi-
operators a clearer view of the severity of a contingency at bility to cause insecurity. This helps to reduce redundancy and
the current operating condition. improve efficiency. The database therefore contains
For TV cases for DT training.
If the current magnitude on any branch in the SRP area ex-
ceeds 100% of its short term thermal rating after a single III. TEST RESULTS
line outage, this simulation case is considered thermal in-
A. VMV and TV Assessment
secure. A second performance index, PI_ol, is defined as
follows: Security analyses using the contingency list for VMV
and TV assessment are conducted in VSAT on the created 476
OCs. A total number of simulations are there-
(8)
fore conducted offline. Each simulation case has two results in
terms of VMV and TV assessment individually. The simulation
where is the total number of overloaded branches in the results indicate that only four contingencies have the pos-
SRP area after losing a single branch; is the post- sibility to cause the VMV problem and there are 40 contingen-
contingency current magnitude on the overloaded branch cies that can initiate thermal violation problems. At peak load
; and is the magnitude of the current rating of the conditions, more contingencies will cause problems; while at
branch . If there are no overloaded lines, this index is zero. light load conditions, fewer of these contingencies cause trou-
If many branches are overloaded, this index will be very bles. Two critical contingency lists are built to store the critical
large. contingencies for VMV and TV assessment respectively. Thus,
For VS two databases including DB_VMV with cases
If a contingency at an OC causes the divergence of power and DB_TV with cases are separately built
flow analysis, this simulation case is considered voltage for DT training.
instability. In CART, two optimal regression trees RT_VMV and RT_TV
For TS are trained by setting the testing method to “randomly select
The transient stability criterion is selected as the “angle 20% of the cases as a test set”, whose performances on the whole
stability margin,” defined in TSAT. databases are given in Table I.

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
962 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 25, NO. 2, MAY 2010

TABLE I
PERFORMANCE OF RTS FOR VMV AND TV ASSESSMENT

Fig. 6. Nomogram determined by the top system attributes in CT_VS.

TABLE II
PERFORMANCE OF CT_VS AND CT_TS ON THE LEARNING SET AND TEST SET

Fig. 5. Nomogram determined by the top system attributes in RT_VMV.

One feasible measure of a regression tree model is the root power system stabilizers (PSSs) and other control devices in the
mean square (RMS) error defined as whole WECC system is used to run time-domain simulations.
The results indicate there are six critical contingencies that
(9) can lead to voltage instability at the 476 OCs. Besides, three
contingencies can initiate transient instability and they
are all related to the loss of big power plants. At higher load
where is the total number of cases to be tested in a database; conditions, these contingencies are more likely to cause tran-
is the actual value of the performance index of the th case in sient instability because the involved generators output more
the database; and is the predicted value of the performance active power during peak load periods. Correspondingly, two
index for the th case correspondingly. The testing results on the databases, DB_VS containing cases and DB_TS
whole databases provide a RMS error value of 0.115 for VMV consisting of 1428 cases are generated to train classification
assessment and 0.138 for TV assessment, indicating a high pre- trees.
diction accuracy level. In addition, a nomogram is created using Similarly, 20% of the cases are randomly selected as a test set
the critical system attributes for VMV assessment in Fig. 5. Dif- in CART therefore two optimal classification trees CT_VS and
ferent operating regions are determined in the nomogram with CT_TS are trained for the assessment of voltage stability and
an average VMV severity level in case of the corresponding con- transient stability respectively. By testing this tree model on the
tingencies. created DBs, it can be observed that very high prediction accu-
It is important to note that larger regression tree models can racy is achieved as shown in Table II. In CT_VS, 19 PMU mea-
yield higher accuracy for the created DBs, but they may not per- surements are used for online application and in CT_TS there
form well on the changed OCs due to the over-fitting problem. are three PMU measurements selected. As an example, a nomo-
In addition, their complexity is much higher than smaller trees gram determined by the top system attributes in CT_VS is drawn
(more than 100 terminal nodes). A compromise between com- in Fig. 6 to assess voltage stability online.
plexity and accuracy is made here to obtain the final DT models.
IV. ROBUSTNESS TEST AND ENHANCEMENT
B. VS and TS Assessment Robustness serves as another very important measure to
Due to the fact that the assessment result of a stability sim- judge the goodness of fit of a predictive model for real-time
ulation case is either secure or insecure, classification trees are application. In the previous section, the offline trained decision
trained for this objective. The list of 181 contingencies trees exhibit excellent prediction ability for the offline created
( , 3 or 4) is used to evaluate voltage stability and transient databases. However, in terms of statistical analysis, the proce-
stability in the SRP area. Thus, a total number of dure to form the test sets may be biased because all the cases
simulations are conducted in VSAT and TSAT separately in the test sets and learning sets come from the same number
to assess the two objectives for the whole day. The provided dy- of OCs generated. This section is therefore designed to test the
namic data file containing all the available generators, exciters, robustness of offline trained DT models using OCs not used for

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
DIAO et al.: DESIGN OF A REAL-TIME SECURITY ASSESSMENT TOOL 963

TABLE III TABLE IV


PERFORMANCE OF CT_VS ON THE NEW DATABASE FOR 288 OCS PERFORMANCE OF CT_TS ON THE NEW DATABASE FOR 288 OCS

DT training. An approach to improve the DT performance on the simulation results on the 288 OCs. Its performance is shown
the totally unforeseen cases is also tested. in Table IV. The overall prediction accuracy is 98.26%.

A. Generation of Changed OCs C. Performance Enhancement


In order to achieve this goal, a new set of OCs are generated The tests above show good prediction performance of DTs
by randomly changing the load levels in the SRP area. This step on the unforeseen OCs, although the accuracy is not as high as
accounts for the forecasting error of the load levels during the those reported in Section III. The observed drop in the accuracy
next day. For each of the 96 basic OCs, three additional OCs are is reasonable because the new databases for the 288 changed
generated by randomly changing the SRP loads within 90% to OCs are not used for DT training. In fact, there are several fac-
110% of their original values. The following equations are used tors that affect the performance of DT models on the unseen
to modify the loads to their desired levels: cases.
1) The similarity between the cases for DT training and the
(10) ones for testing.
2) The over-fitting problem is a common problem in the
(11) field of machine learning techniques, which usually uses
(12) too many predictors (compared to the useful information
that they carry) to derive a model with high complexity.
(13) As introduced in [14], the “ -fold cross validation” approach
(14) provides a promising approach to improve accuracy by training
(15) a comprehensive DT model from multiple training processes
for a given database. This method divides the whole database
where is the bus number where a load is connected; is the into groups with equal number of cases. Each subgroup of
number of the current OC. The subscripts _high, _low and _0 cases is used once as a test set to test the DT model while the
refer to upper limit, lower limit and the original values, respec- remaining groups form the learning set for DT growing.
tively; and are randomly generated numbers ranging from 0 The training process is repeated times and a comprehensive
to 1. In these new OCs, the status of transmission lines and trans- DT model will be attained as the final optimal tree for online
formers are not changed; but generator power outputs, shunt el- application. This idea is tested in this section by setting ,
ements and transformer tap ratios in the SRP area are adjusted which is industrial commonly used standard.
if necessary in order to ensure that all of the system states are The efforts in Section III are then repeated by changing the
working within normal limits. As a result, 288 additional OCs DT testing method to “ -fold cross validation” in CART, instead
are generated to test the robustness of the previously trained of randomly selecting 20% of the cases as a test set. As a con-
DT models using the four critical contingency lists obtained in sequence, four re-trained decision trees including RT_VMV’,
Section III. RT_TV’, CT_VS’ and CT_TS’ are created. They are then tested
on the four databases created for the 288 changed OCs. All of
B. Offline DT Performance the re-trained DTs show improved performance on the unseen
For VMV and TV cases, as shown in Table V. From the performance compar-
The new databases for VMV and TV assessment using the ison between the two different DT training methods, it is rec-
288 OCs (DB_VMV’ and DB_TV’) contain ommended to use the “ -fold cross validation method” for DT
cases and cases, respectively. training which can effectively enhance the prediction accuracy
After dropping the two databases down the regression tree on the totally unseen data.
models, RT_VMV and RT_TV, the RMS errors are 0.178
and 0.165, respectively. V. SECURITY BOUNDARY VISUALIZATION
FOR PREVENTIVE CONTROL
For VS and TS
For the VS test, the 288 changed OCs are used to run In this section, a decision tree based approach to visualize
voltage stability simulations at the six critical contingen- the security boundary is proposed to prevent system insecurity.
cies causing voltage instability. A database with This method first chooses a few controllable system attributes
cases is used to test the decision tree model, CT_VS. selected by the offline trained DTs, as the only contributors to
The test result is shown in Table III. The overall accuracy be tuned during the preventive control process. The selected at-
on this new DB is 96.41%. tributes are then changed step by step to cover an evenly-dis-
Similarly, the offline trained classification tree for transient tributed data space for security analyses. Classification trees are
stability assessment, CT_TS, is tested on a new DB created from then trained to identify the security boundary for the purpose

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
964 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 25, NO. 2, MAY 2010

TABLE V
DT PERFORMANCE COMPARISON ON THE 288 CHANGED OCS

of separating secure cases from insecure ones. The obtained


boundary is finally used as a guide to design preventive con- Fig. 7. Visualization of the security boundary for preventive control.
trol strategies.
This section uses one critical contingency that may cause
voltage stability as an example to explain the detailed procedure. analysis for this specific contingency. In this way, 1331 oper-
The design of preventive controls for the transient stability can ating conditions are created with their simulation results shown
follow steps similar to those discussed below. in Fig. 7. The database created from these OCs is then used to
train a classification tree for identifying the security boundary.
A. Contingency Example
C. Security Boundary Identification
The example chosen is the loss of two 500-kV lines in the SRP From the shape of the security boundary observed in Fig. 7,
area which is the No. 9 contingency in the critical contingency linear combinations of predictors for splitting are used to train
list for VS assessment. It may cause voltage instability at some a classification tree [16]. The optimal decision tree model pro-
of the 476 basic OCs. vides a flat surface defined by the three generators:
B. Key Attributes
The main goal of preventive controls is to maneuver the
system attributes away from the voltage insecure region in case
of a critical contingency. Therefore, the selection of predictors By using this linear split, most of the secure cases have been
for preventive control should be directly controlled by system successfully classified. Although a few insecure cases are mis-
operators. The critical attributes that affect power flow solution classified, such a boundary can still serve as a good guide for
are the load levels and generator power outputs. Since shedding preventive control by simply increasing the threshold to a higher
the loads at the current OC before a critical contingency is level (e.g., from 253.3 to 280). The shifted boundary will be
not a recommended choice to ensure system security, tuning more conservative and guarantees that all of the cases in this re-
the active power outputs from generators becomes the only gion are secure. The main reason for the observed uncertainty
possible and practical approach to design preventive controls. between the two surfaces is that decision tree methodology only
Shedding loads can also serve as an effective corrective control uses linear splits to split the data space, which may not work
action if a voltage instability result is predicted after a contin- very well when the boundary exhibits some nonlinear charac-
gency actually occurs. The topic of corrective control design is teristics. In addition, the uncertainty may be caused due to nu-
beyond the scope of this effort and not discussed here. merical errors when solving the power flow. A degree of conser-
A subset of the database DB_VS consisting of all the simula- vatism is recommended by allowing a small margin away from
tion cases for contingency No. 9 is filtered, with the predictors to the determined security boundary. With this choice of boundary,
be the outputs of all the generators provided. Training a deci- additional constraints (like the lowest economical cost) can be
sion tree on this small database identifies three critical machines considered to obtain the optimal point to be tuned to.
that affect voltage stability caused by this contingency most di-
rectly, which are PG_15147_1, PG_15918_1 and PG_15169_1. VI. CONCLUSION AND FUTURE WORK
One of the insecure OCs is randomly picked (e.g., OC237) This paper proposes a decision tree assisted scheme for on-
as an example to demonstrate the procedure for applying pre- line security assessment. By exhaustive offline simulations on
ventive control. At this OC, all the other system attributes are the forecasted operating conditions a day ahead, regression trees
kept constant except the power outputs of the three generators are trained to assess voltage magnitude violation and thermal vi-
and the swing bus. The three generators are tuned one after an- olation problem following contingencies. Classification
other to evenly cover the 3 dimensional data space. The scanning trees are trained for the real-time assessment of voltage stability
step length is set as 30 MW and the machine output limits are and transient stability problems following contingencies.
enforced. For each generated data point, a power flow solution This scheme is tested on the SRP power system using the real
is obtained in PSAT and VSAT is used to run voltage stability time OCs during the day July 21, 2008. From the test results,

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
DIAO et al.: DESIGN OF A REAL-TIME SECURITY ASSESSMENT TOOL 965

properly trained decision trees perform very well to assess dif- [8] S. Rovnyak, C. Taylor, and Y. Sheng, “Decision trees using apparent re-
ferent security issues in a near real time manner. The offline sistance to detect impending loss of synchronism,” IEEE Trans. Power
Del., vol. 15, no. 4, pp. 1157–1162, Oct. 2000.
trained DTs select critical system attributes as good system se- [9] R. Diao, V. Vittal, K. Sun, S. Kolluri, S. Mandal, and F. Galvan,
curity indicators and help to build online nomograms for situa- “Decision tree assisted controlled separation for preventing cascading
tional awareness enhancement. Robustness of the offline trained events,” in Proc. IEEE/PES Power Systems Conf. Expo., Seattle, WA,
Mar. 2009.
DTs is also tested on new OCs around the basic OCs. It is proved [10] N. Senroy, G. T. Heydt, and V. Vittal, “Decision tree assisted controlled
that “ -fold cross validation” is a good measure to attenuate islanding,” IEEE Trans. Power Syst., vol. 21, no. 4, pp. 1790–1797,
the over-fitting problem and train DT models for online applica- Nov. 2006.
[11] K. Sun, S. Likhate, V. Vittal, V. Kolluri, and S. Mandal, “An online
tion. Finally, decision trees are also used to visualize the security dynamic security assessment scheme using phasor measurements and
boundary for a particular contingency that may cause voltage decision trees,” IEEE Trans. Power Syst., vol. 22, no. 4, pp. 1935–1943,
instability. The boundary can be used as an effective guide to Nov. 2007.
design preventive controls to ensure system security. [12] R. Diao, K. Sun, V. Vittal, R. O’Keefe, M. R. N. Bhatt, D. Stradford,
and S. Sarawgi, “Decision tree based online voltage security assess-
In this effort, a static analysis approach in VSAT is used to ment using PMU measurements,” IEEE Trans. Power Syst., vol. 24,
evaluate voltage stability. In future work, time domain simula- no. 2, pp. 832–839, May 2009.
tions can be used as an alternative in order to obtain a more re- [13] I. H. Witten and E. Frank, Data Mining-Practical Machine Learning
Tools and Techniques. San Francisco, CA: Elsevier, 2005.
liable and comprehensive assessment result. More realistic load [14] L. Breiman, J. Friedman, R. A. Olshen, and C. J. Stone, Classification
models, especially for the motors, should be considered. The and Regression Trees. Belmont, CA: Wadsworth, 1984.
PMU location selection in this paper comes from the actual lo- [15] Salford Systems, CART. [Online]. Available: http://www.salford-sys-
tems.com/cart.php.
cations of 33 PMUs in the SRP system. With the current se- [16] CART for Windows V5.0—User’s Guide. San Diego, CA: Salford
lection, the test results have shown quite high prediction accu- Systems.
racy. Whether the signals from these PMUs are sufficient to sup- [17] DSATools Dynamic Security Assessment Software. [Online]. Avail-
able: http://www.dsatools.com/.
port this online scheme at future OCs (e.g., in several months [18] P. M. Anderson and A. A. Fouad, Power System Control and Stability,
or several years) requires further investigation. If more PMUs Second ed. Piscataway, NJ: IEEE/Wiley, 2003.
are needed, the topic of minimal PMU set and optimal PMU [19] C. W. Taylor, Power System Voltage Stability. New York: McGraw-
Hill, 1994.
location becomes another important aspect to be addressed in [20] T. V. Cutsem and C. Vournas, Voltage Stability of Electric Power Sys-
order to reduce investment while ensuring DT accuracy and ro- tems. Norwell, MA: Kluwer, 1998.
bustness. The idea of tuning generator active power outputs for [21] A. J. Wood and B. F. Wollenberg, Power Generation, Operation and
preventive controls needs to be extended to allow multi-contin- Control. New York: Wiley, 1996.
gency conditions. If the security boundary is highly nonlinear,
piece-wise linearization of DTs will be used to approximate the
nonlinear surface. Meanwhile, additional constraints like mini-
Ruisheng Diao (S’08) received the B.S. and M.S. degrees in the Department of
mizing the rescheduling cost and the generator rescheduling ca- Electrical Engineering of Zhejiang University, Hangzhou, China, in 2004 and
pacity need to be considered to find the optimal preventive con- 2006, respectively, and the Ph.D. degree in the Department of Electrical Engi-
trol strategy. neering of Arizona State University, Tempe, in 2009.
He is currently with Pacific Northwest National Laboratory (PNNL), Rich-
REFERENCES land, WA, as a Power System Research Engineer. His research interests include
power system stability and control, online security assessment, integration of
[1] Final Report on the August 14th Blackout in the United States and renewable energy, and power system dynamic behavior.
Canada: Causes and Recommendations, U.S.—Canada Power System
Outage Task Force. [Online]. Available: https://reports.energy.gov/.
[2] L. A. Wehenkel, Automatic Learning Techniques in Power Systems.
Norwell, MA: Kluwer, 1998.
[3] L. Wehenkel, T. V. Cutsem, and M. Ribbens-Pavella, “An artificial in- Vijay Vittal (S’78–F’97) received the B.E. degree in electrical engineering from
telligence framework for on-line transient stability assessment of power the B.M.S. College of Engineering, Bangalore, India, in 1977, the M.Tech. de-
systems,” IEEE Trans. Power Syst., vol. 4, no. 2, pp. 789–800, May gree from the Indian Institute of Technology, Kanpur, India, in 1979, and the
1989. Ph.D. degree from Iowa State University, Ames, in 1982.
[4] L. Wehenkel and M. Pavella, “Decision trees and transient stability of Dr. Vittal is a member of the National Academy of Engineering.
electric power systems,” Automatica, vol. 27, no. 1, pp. 115–134, Jan.
1991.
[5] S. Rovnyak, S. Kretsinger, J. Thorp, and D. Brown, “Decision trees for
real-time transient stability prediction,” IEEE Trans. Power Syst., vol. Naim Logic (S’00–M’05–SM’09) received the B.Sc. degree from the Univer-
9, no. 3, pp. 1417–1426, Aug. 1994. sity of Sarajevo, Sarajevo, Bosnia and Herzegovina, the M.Sc. degree from the
[6] T. Cutsem, L. Wehenkel, M. Pavella, B. Heilbronn, and M. Goubin, University of Zagreb, Zagreb,, Croatia, and the Ph.D. degree from Arizona State
“Decision tree approaches to voltage security assessment,” Proc. Inst. University, Tempe.
Elect. Eng., vol. 140, no. 3, pp. 189–198, May 1993. Dr. Logic is currently with the Power System Operations Department–Com-
[7] R. F. Nuqui, A. G. Phadke, R. Schulz, and N. Bhatt, “Fast on-line puter Applications Group of Salt River Project (SRP), Phoenix, AZ. His research
voltage security monitoring using synchronized phasor measurements interests are in the area of power system state estimation, application of synchro-
and decision trees,” in Proc. IEEE Power Eng. Soc. Winter Meeting, nized phasor measurements, and power system reliability.
Jan. 2001, vol. 3, pp. 1347–1352. Dr. Logic is also a registered Professional Engineer in the State of Arizona.

Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.

You might also like