Professional Documents
Culture Documents
Abstract—Detailed security analysis for contingencies In many instances the hazardous impacts of contingen-
( = 1 2 3 . . .) in a real-time setting is still a great challenge cies can be easily ignored until their occurrence, because their
due to the significant computational burden. This paper takes ad- probabilities of occurrence are quite low. Without timely sit-
vantage of phasor measurement units (PMUs) and decision trees
(DTs) to develop a real-time security assessment tool to assess four
uational awareness, system operators may not have sufficient
important post-contingency security issues, including voltage mag- time to arm preventive or corrective controls in order to ensure
nitude violation (VMV), thermal limit violation (TV), voltage sta- system security in case of a dangerous initiating event. More-
bility (VS) and transient stability (TS). The proposed scheme is over, such a disturbance can further result in cascading outages
tested on the Salt River Project (SRP) power system represented by and cause a long-term power interruption to customers in a large
a series of operating conditions (OCs) during a representative day. area, such as the blackout that occurred on August 14, 2003 in
The properly trained DTs demonstrate excellent prediction perfor-
mance. Robustness tests for the offline trained DTs are performed North America [1]. Therefore, the development of a tool to ac-
on a group of changed OCs that were not included for training the curately assess security issues and provide sufficiently fast pre-
DTs and the idea of tuning critical system attributes for preventive diction results in case of critical contingencies is an important
controls is also presented to improve system security. requirement for real-time operation of modern power systems.
Index Terms—Classification tree, decision tree, online security The advent of machine learning tools including neural net-
assessment, preventive control, regression tree, thermal violation, work (NN), decision trees, support vector machines (SVMs)
transient stability, voltage magnitude violation, voltage stability. and self organizing maps (SOMs) provides a promising solu-
tion to achieve this goal [2]. Such technologies take advantage
of exhaustive offline studies to uncover the inherent system at-
I. INTRODUCTION tributes related to an objective and provide accurate and fast pre-
diction models for online application using real-time measure-
S modern power systems are being operated at a more
A stressed level because of deregulation and the difficulty
of adding new transmission capacity, occurrence of critical con-
ments. Compared to other machine learning tools decision trees
have a unique feature that utilizes the thresholds of attributes
(linear classifiers) to predict the considered objective. The ob-
tingencies may violate secure operation limits and even initiate tained thresholds not only help to build a predictive model, but
severe stability problems. A severe contingency can result in ad- also generate online nomograms for system operators to arm
verse impacts on the system in terms of various security issues, control actions.
determined by the disturbance type and severity. So far, the most The use of decision trees in the field of power systems dates
accurate and practical measure to assess different security issues back to the late 1980s [3]. Various applications of decision
is via commercial simulation packages by properly modeling trees (DTs) have been reported thereafter, depending on the
system components. However, such a detailed analysis method design of methodologies to describe the problems to be solved.
in a near real-time manner is still a great challenge due to the In [4], decision trees were trained offline to find the critical
high nonlinearity and high dimensionality of large scale power clearing time to assess transient stability. A real-time transient
systems. The data dimensionality problem in fact makes it im- stability prediction method was proposed in [5] by collecting
possible to scan all combinations of post-contingency rotor angles as predictors, which was tested
contingencies in a reasonable time frame. Traditionally system on the New England 39-bus test system at various operating
dynamic security analysis is carried out on a few preselected conditions. Other efforts involving DTs were also reported in
contingencies in the time interval of several minutes (e.g., most voltage security monitoring and estimation, loss of synchro-
of and some of the important contingencies). nism detection and the timing of controlled separation strategy
[6]–[10]. In [11], an online transient security assessment
Manuscript received July 10, 2009; revised August 31, 2009. First published scheme using DTs and PMUs was presented to predict whether
December 01, 2009; current version published April 21, 2010. This work was an contingency can violate transient security criteria
supported in part by Salt River Project and in part by the Power System Engi-
neering Research Center. Paper no. TPWRS-00530-2009.
by collecting PMU measured pre-scenario system attributes as
R. Diao and V. Vittal are with the Department of Electrical Engineering, Ari- security predictors. In [12], another approach was proposed
zona State University, Tempe, AZ 85287 USA (e-mail: ruisheng.diao@asu.edu; to evaluate voltage security problems caused by con-
vijay.vittal@asu.edu).
N. Logic is with the Salt River Project, Phoenix, AZ 85287-5706 USA
tingencies at stressed OCs. The PMU measured voltage phase
(e-mail: Naim.Logic@srpnet.com). angle difference, current flow, active power flow, reactive power
Digital Object Identifier 10.1109/TPWRS.2009.2035507 flow, square of voltage magnitude and the monitored current
0885-8950/$26.00 © 2009 IEEE
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
958 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 25, NO. 2, MAY 2010
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
DIAO et al.: DESIGN OF A REAL-TIME SECURITY ASSESSMENT TOOL 959
OCs in Section IV and a method to enhance DT performance • TSAT: Transient security assessment tool. It is used
is tested. Section V presents a DT assisted approach to design for detailed time-domain simulation to assess tran-
preventive controls in order to improve system security. Fi- sient stability.
nally, conclusions and ideas for future work are provided in 2) CART: Classification and Regression Trees, developed
Section VI. by Salford Systems, CA [15].
3) MATLAB is used for data collection, database creation
II. METHODOLOGY DESCRIPTION and program interface design.
A. Classification Trees and Regression Trees C. System Studied—the SRP Power System
A decision tree (a type of supervised machine learning tool) The SRP system model provided is a part of the Western
[13], [14] is a tree-structured predictive model for a given “ob- Electricity Coordinating Council (WECC) system that contains
jective” characterized by a vector of attributes (or predictors). approximately 17 252 buses, 3115 generators and 14 989 trans-
Based on the nature of the objective (either categorical or nu- mission lines for security analysis. SRP serves a large number
merical), DTs can be categorized as classification trees and re- of customers in central Arizona in the U.S. The voltage level
gression trees respectively. In this effort, all the CTs and RTs in this model ranges from 11 kV to 500 kV. More than 620
are trained and tested using a commercial package, called clas- buses, 720 transmission lines, 120 transformers and 110 gen-
sification and regression trees (CART) [15], [16]. erators are monitored by SRP. Currently, there are 33 PMUs
In CART, a decision tree has a binary structure with two types installed on 230-kV and 500-kV buses in the SRP system. The
of nodes, the internal node with two child nodes and terminal real-time measurements of these PMUs are used as important
node without any child node. Each terminal node provides a security predictors to train DT models.
prediction result of the form secure (S), insecure (I) or a per-
D. OC Generation
formance index value. For the purpose of training a good DT, a
learning set and a test set in the same format are required. The 1) Basic OCs: The main goal of this sub-section is to create
learning set is first used to train a maximal tree by recursively a series of OCs that can accurately represent different system
splitting a parent node into two purer child nodes until further snapshots during a representative day, July 21, 2008. The data
splitting can no longer improve accuracy and this maximal tree provided by the SRP staff include the load change pattern, gen-
is then pruned step by step to generate a series of smaller DTs in erator dispatch and capacitor status during this day, with all
order to attenuate the over-fitting problem. The main goal is to major transmission lines in service. Based on this information,
partition all the cases in a high dimensional space into various MATLAB codes are developed to interface with PSAT to change
sub-regions with homogeneous cases in each region. Details re- system states to their desired values at different time instants.
garding splitting and stopping rules and DT pruning algorithms Thus, 96 OCs are generated for the whole day, from 0:00 am,
are provided in [14]. The performances of these smaller DTs on 0:15 am, 0:30 am,…, to 23:45 pm. Each of the created OCs is
the test set are scored in terms of the misclassification cost for tuned to comply with the following criteria:
CTs and mean-square error for RTs. The optimal tree is there- • Voltage magnitudes of all the SRP buses are within the
fore defined as the tree model with the lowest prediction error range 0.95 p.u.–1.1 p.u.
on the test set. • There are no overloaded transmission lines in the SRP area.
When applied to power system security assessment, classifi- • There are no overloaded transformers in the SRP area.
cation trees are quite suitable for evaluating stability problems 2) More OCs for Information Enrichment: From the obser-
because the prediction objective is secure or insecure following vations in [12], the data distribution in a high dimensional space
a contingency. On the other hand, regression trees can effec- plays an important role in affecting DT performance. Since the
tively quantify the severity of the VMV and TV problems by DT is a supervised data mining technique, the more useful in-
defining performance indices as prediction objectives. formation it learns, the better it performs. Therefore, more oper-
ating conditions are generated around the 96 basic OCs in order
B. Analysis Tools to enrich system information and enhance DT performance. Be-
tween any two adjacent OCs, four additional data points are de-
In this paper, three major tools are used to develop the pro-
termined by assuming a linear pattern of load change. This idea
posed scheme:
is explained using the equations below and it is shown in Fig. 2:
1) : Dynamic security analysis tool, developed
by Powertech Lab, Canada [17]. This package is used to
generate system OCs and run different types of security (1)
simulations. It provides a user-friendly interface and in-
cludes the following sub-packages:
• PSAT: Powerflow and short-circuit analysis tool, (2)
which is used to run power flow analysis and create
time-series OCs. where and represent the active and reactive power de-
• VSAT: Voltage security assessment tool, which is mand of a load, respectively. is the bus number where a load
used to evaluate voltage stability, thermal violation is connected; is the number of OCs and refers to the number
and voltage magnitude violation issues following of inserted data points. The active power outputs of the gen-
contingencies. erators in the SRP area are also changed in a similar manner.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
960 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 25, NO. 2, MAY 2010
F. Load Modeling
Load modeling is a very complicated topic and requires spe-
cial attention to perform security simulations because it plays
an important role in affecting the simulation results. Normally,
using constant impedance model provides an optimistic result
whereas the constant power model gives a more pessimistic re-
sult [18]. In the SRP system, about 70% of the loads are motors
in residential, industrial and commercial areas according to the
SRP operating staff. For the purpose of obtaining a more real-
Fig. 3. Active power demand at the created 476 OCs in SRP. istic system behavior, the load components in SRP are assumed
to use the combination in Fig. 4 and the exact percentage of each
portion requires further investigation:
Each of the inserted OCs is tuned to comply with the secure • 30% of the loads are modeled as constant and .
operating criteria defined previously. The status of transmission • 70% of the loads are considered as induction motors
lines and transformers are not changed, based on the assumption (voltage dependent models).
that system maintenance is scheduled a day ahead. The topology The mathematical models used for different load components
change in the system only results from the occurrence of contin- are shown below:
gencies. Following this step, 380 additional OCs are generated • 30% of the loads are assumed to be air conditioners [19]:
around the 96 basic OCs.
Therefore, a total of OCs are generated to rep- and (3)
resent the system conditions during this whole day. That means
one power flow file is created for every 3 min. Fig. 3 depicts • 20% of the loads are large industrial motors [20]:
the total active load level in the SRP system for the created 476
OCs. and (4)
E. Contingency Selection
• 20% of the loads in SRP are small industrial motors [20]:
In this section, two lists of contingencies are considered for
different types of security analysis: and (5)
1) First, a list of contingencies on the branches above
200-kV level in the SRP area is created to assess the
• The remaining 30% of the loads are constant and :
VMV and TV issues. This contingency list con-
tains 87 contingencies to be scanned. (6)
2) A second list of contingencies is created to assess
VS and TS issues. This list is provided by the SRP staff,
which includes 181 multi-line outages, generator out- G. Database Building for DT Training
ages, transformer outages and even shunt element out- 1) Prediction Objectives: As introduced above, the analyses
ages. for post-contingency VMV, TV and VS problems are conducted
This is due to the fact that an contingency usually in VSAT, which uses a static analysis method to assess system
cannot cause severe stability problems in a realistic power behavior. Once a contingency occurs, e.g., loss of one or more
system at normal OCs that satisfy NERC criteria. However, the branches, VSAT resolves the power flow without the faulted
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
DIAO et al.: DESIGN OF A REAL-TIME SECURITY ASSESSMENT TOOL 961
branch(es) and checks different system states against the de- 2) Predictor Selection: Since the main objective of the pro-
fined secure ranges for VMV and TV verification. If the power posed scheme is to predict whether a certain contingency can
flow fails to converge, a voltage instability result will be de- cause various security problems at the current OC, the predic-
clared and this is the main criterion for VS assessment. In order tors should contain sufficient information that accurately cap-
to effectively quantify the impact of an contingency on tures real-time system behavior following contingencies. As a
the system, two performance indices need to be defined for the consequence, three types of predictors are used in this work.
VMV and TV problems. The four prediction objectives are pro- The first one is the contingency ID representing different
vided below separately. and contingencies. The second type is taken from the
For VMV pre-disturbance system attributes that are directly measured by
If the voltage magnitude of any bus in the SRP area violates PMUs because PMUs have the capability of simultaneously ob-
the range 0.93 p.u.–1.1 p.u. following a branch outage, this serving system states across a wide area in a much faster and
case is considered voltage magnitude insecure. Its impact more accurate manner compared to the traditional supervisory
is quantified using a performance index, PI_vmv, defined control and data acquisition (SCADA) system. These predictors
in the following [21]: include voltage phase angle difference among different PMU
buses (A_x_y), active power flow (P_x_y), reactive power flow
(7) (Q_x_y) and current flow (I_x_y) on PMU-measured transmis-
sion lines. x and y are bus numbers where PMUs are installed.
A third type of predictors includes the real-time active power
where is the total number of buses with voltage mag- outputs of generators, because the generation pattern also plays
nitude violated in the SRP area; is the difference a critical role in determining system security. In addition, the
between the post-contingency voltage magnitude and active power outputs can be used to design preventive controls,
1.0 p.u.; and is the maximum allowable voltage as discussed in Section V.
magnitude deviation. If the voltage magnitude of a bus in In the SRP system, the candidate predictors include all the
SRP is 1.15 p.u., the performance index value of this bus measurements from the 33 available PMU buses, 82 PMU-mon-
is calculated as itored transmission lines and 116 generators monitored by SRP.
Since the proposed scheme collects pre-contingency system at-
tributes, the four databases created for the four security issues
share the same predictors.
Under the condition that all the bus voltage magnitudes are 3) Database Building: The creation of each database for DT
within the normal range after an contingency occurs, training considers an important improvement that deletes the
the index value will be zero. In contrast, if voltage magni- contingencies in the contingency lists that never cause system
tudes on many buses violate the secure range, a very large insecurity at any of the considered OCs (Noc). Such a database
index value is attained. Such a definition provides system only keeps the critical contingencies (Ncc) that have the possi-
operators a clearer view of the severity of a contingency at bility to cause insecurity. This helps to reduce redundancy and
the current operating condition. improve efficiency. The database therefore contains
For TV cases for DT training.
If the current magnitude on any branch in the SRP area ex-
ceeds 100% of its short term thermal rating after a single III. TEST RESULTS
line outage, this simulation case is considered thermal in-
A. VMV and TV Assessment
secure. A second performance index, PI_ol, is defined as
follows: Security analyses using the contingency list for VMV
and TV assessment are conducted in VSAT on the created 476
OCs. A total number of simulations are there-
(8)
fore conducted offline. Each simulation case has two results in
terms of VMV and TV assessment individually. The simulation
where is the total number of overloaded branches in the results indicate that only four contingencies have the pos-
SRP area after losing a single branch; is the post- sibility to cause the VMV problem and there are 40 contingen-
contingency current magnitude on the overloaded branch cies that can initiate thermal violation problems. At peak load
; and is the magnitude of the current rating of the conditions, more contingencies will cause problems; while at
branch . If there are no overloaded lines, this index is zero. light load conditions, fewer of these contingencies cause trou-
If many branches are overloaded, this index will be very bles. Two critical contingency lists are built to store the critical
large. contingencies for VMV and TV assessment respectively. Thus,
For VS two databases including DB_VMV with cases
If a contingency at an OC causes the divergence of power and DB_TV with cases are separately built
flow analysis, this simulation case is considered voltage for DT training.
instability. In CART, two optimal regression trees RT_VMV and RT_TV
For TS are trained by setting the testing method to “randomly select
The transient stability criterion is selected as the “angle 20% of the cases as a test set”, whose performances on the whole
stability margin,” defined in TSAT. databases are given in Table I.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
962 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 25, NO. 2, MAY 2010
TABLE I
PERFORMANCE OF RTS FOR VMV AND TV ASSESSMENT
TABLE II
PERFORMANCE OF CT_VS AND CT_TS ON THE LEARNING SET AND TEST SET
One feasible measure of a regression tree model is the root power system stabilizers (PSSs) and other control devices in the
mean square (RMS) error defined as whole WECC system is used to run time-domain simulations.
The results indicate there are six critical contingencies that
(9) can lead to voltage instability at the 476 OCs. Besides, three
contingencies can initiate transient instability and they
are all related to the loss of big power plants. At higher load
where is the total number of cases to be tested in a database; conditions, these contingencies are more likely to cause tran-
is the actual value of the performance index of the th case in sient instability because the involved generators output more
the database; and is the predicted value of the performance active power during peak load periods. Correspondingly, two
index for the th case correspondingly. The testing results on the databases, DB_VS containing cases and DB_TS
whole databases provide a RMS error value of 0.115 for VMV consisting of 1428 cases are generated to train classification
assessment and 0.138 for TV assessment, indicating a high pre- trees.
diction accuracy level. In addition, a nomogram is created using Similarly, 20% of the cases are randomly selected as a test set
the critical system attributes for VMV assessment in Fig. 5. Dif- in CART therefore two optimal classification trees CT_VS and
ferent operating regions are determined in the nomogram with CT_TS are trained for the assessment of voltage stability and
an average VMV severity level in case of the corresponding con- transient stability respectively. By testing this tree model on the
tingencies. created DBs, it can be observed that very high prediction accu-
It is important to note that larger regression tree models can racy is achieved as shown in Table II. In CT_VS, 19 PMU mea-
yield higher accuracy for the created DBs, but they may not per- surements are used for online application and in CT_TS there
form well on the changed OCs due to the over-fitting problem. are three PMU measurements selected. As an example, a nomo-
In addition, their complexity is much higher than smaller trees gram determined by the top system attributes in CT_VS is drawn
(more than 100 terminal nodes). A compromise between com- in Fig. 6 to assess voltage stability online.
plexity and accuracy is made here to obtain the final DT models.
IV. ROBUSTNESS TEST AND ENHANCEMENT
B. VS and TS Assessment Robustness serves as another very important measure to
Due to the fact that the assessment result of a stability sim- judge the goodness of fit of a predictive model for real-time
ulation case is either secure or insecure, classification trees are application. In the previous section, the offline trained decision
trained for this objective. The list of 181 contingencies trees exhibit excellent prediction ability for the offline created
( , 3 or 4) is used to evaluate voltage stability and transient databases. However, in terms of statistical analysis, the proce-
stability in the SRP area. Thus, a total number of dure to form the test sets may be biased because all the cases
simulations are conducted in VSAT and TSAT separately in the test sets and learning sets come from the same number
to assess the two objectives for the whole day. The provided dy- of OCs generated. This section is therefore designed to test the
namic data file containing all the available generators, exciters, robustness of offline trained DT models using OCs not used for
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
DIAO et al.: DESIGN OF A REAL-TIME SECURITY ASSESSMENT TOOL 963
DT training. An approach to improve the DT performance on the simulation results on the 288 OCs. Its performance is shown
the totally unforeseen cases is also tested. in Table IV. The overall prediction accuracy is 98.26%.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
964 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 25, NO. 2, MAY 2010
TABLE V
DT PERFORMANCE COMPARISON ON THE 288 CHANGED OCS
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.
DIAO et al.: DESIGN OF A REAL-TIME SECURITY ASSESSMENT TOOL 965
properly trained decision trees perform very well to assess dif- [8] S. Rovnyak, C. Taylor, and Y. Sheng, “Decision trees using apparent re-
ferent security issues in a near real time manner. The offline sistance to detect impending loss of synchronism,” IEEE Trans. Power
Del., vol. 15, no. 4, pp. 1157–1162, Oct. 2000.
trained DTs select critical system attributes as good system se- [9] R. Diao, V. Vittal, K. Sun, S. Kolluri, S. Mandal, and F. Galvan,
curity indicators and help to build online nomograms for situa- “Decision tree assisted controlled separation for preventing cascading
tional awareness enhancement. Robustness of the offline trained events,” in Proc. IEEE/PES Power Systems Conf. Expo., Seattle, WA,
Mar. 2009.
DTs is also tested on new OCs around the basic OCs. It is proved [10] N. Senroy, G. T. Heydt, and V. Vittal, “Decision tree assisted controlled
that “ -fold cross validation” is a good measure to attenuate islanding,” IEEE Trans. Power Syst., vol. 21, no. 4, pp. 1790–1797,
the over-fitting problem and train DT models for online applica- Nov. 2006.
[11] K. Sun, S. Likhate, V. Vittal, V. Kolluri, and S. Mandal, “An online
tion. Finally, decision trees are also used to visualize the security dynamic security assessment scheme using phasor measurements and
boundary for a particular contingency that may cause voltage decision trees,” IEEE Trans. Power Syst., vol. 22, no. 4, pp. 1935–1943,
instability. The boundary can be used as an effective guide to Nov. 2007.
design preventive controls to ensure system security. [12] R. Diao, K. Sun, V. Vittal, R. O’Keefe, M. R. N. Bhatt, D. Stradford,
and S. Sarawgi, “Decision tree based online voltage security assess-
In this effort, a static analysis approach in VSAT is used to ment using PMU measurements,” IEEE Trans. Power Syst., vol. 24,
evaluate voltage stability. In future work, time domain simula- no. 2, pp. 832–839, May 2009.
tions can be used as an alternative in order to obtain a more re- [13] I. H. Witten and E. Frank, Data Mining-Practical Machine Learning
Tools and Techniques. San Francisco, CA: Elsevier, 2005.
liable and comprehensive assessment result. More realistic load [14] L. Breiman, J. Friedman, R. A. Olshen, and C. J. Stone, Classification
models, especially for the motors, should be considered. The and Regression Trees. Belmont, CA: Wadsworth, 1984.
PMU location selection in this paper comes from the actual lo- [15] Salford Systems, CART. [Online]. Available: http://www.salford-sys-
tems.com/cart.php.
cations of 33 PMUs in the SRP system. With the current se- [16] CART for Windows V5.0—User’s Guide. San Diego, CA: Salford
lection, the test results have shown quite high prediction accu- Systems.
racy. Whether the signals from these PMUs are sufficient to sup- [17] DSATools Dynamic Security Assessment Software. [Online]. Avail-
able: http://www.dsatools.com/.
port this online scheme at future OCs (e.g., in several months [18] P. M. Anderson and A. A. Fouad, Power System Control and Stability,
or several years) requires further investigation. If more PMUs Second ed. Piscataway, NJ: IEEE/Wiley, 2003.
are needed, the topic of minimal PMU set and optimal PMU [19] C. W. Taylor, Power System Voltage Stability. New York: McGraw-
Hill, 1994.
location becomes another important aspect to be addressed in [20] T. V. Cutsem and C. Vournas, Voltage Stability of Electric Power Sys-
order to reduce investment while ensuring DT accuracy and ro- tems. Norwell, MA: Kluwer, 1998.
bustness. The idea of tuning generator active power outputs for [21] A. J. Wood and B. F. Wollenberg, Power Generation, Operation and
preventive controls needs to be extended to allow multi-contin- Control. New York: Wiley, 1996.
gency conditions. If the security boundary is highly nonlinear,
piece-wise linearization of DTs will be used to approximate the
nonlinear surface. Meanwhile, additional constraints like mini-
Ruisheng Diao (S’08) received the B.S. and M.S. degrees in the Department of
mizing the rescheduling cost and the generator rescheduling ca- Electrical Engineering of Zhejiang University, Hangzhou, China, in 2004 and
pacity need to be considered to find the optimal preventive con- 2006, respectively, and the Ph.D. degree in the Department of Electrical Engi-
trol strategy. neering of Arizona State University, Tempe, in 2009.
He is currently with Pacific Northwest National Laboratory (PNNL), Rich-
REFERENCES land, WA, as a Power System Research Engineer. His research interests include
power system stability and control, online security assessment, integration of
[1] Final Report on the August 14th Blackout in the United States and renewable energy, and power system dynamic behavior.
Canada: Causes and Recommendations, U.S.—Canada Power System
Outage Task Force. [Online]. Available: https://reports.energy.gov/.
[2] L. A. Wehenkel, Automatic Learning Techniques in Power Systems.
Norwell, MA: Kluwer, 1998.
[3] L. Wehenkel, T. V. Cutsem, and M. Ribbens-Pavella, “An artificial in- Vijay Vittal (S’78–F’97) received the B.E. degree in electrical engineering from
telligence framework for on-line transient stability assessment of power the B.M.S. College of Engineering, Bangalore, India, in 1977, the M.Tech. de-
systems,” IEEE Trans. Power Syst., vol. 4, no. 2, pp. 789–800, May gree from the Indian Institute of Technology, Kanpur, India, in 1979, and the
1989. Ph.D. degree from Iowa State University, Ames, in 1982.
[4] L. Wehenkel and M. Pavella, “Decision trees and transient stability of Dr. Vittal is a member of the National Academy of Engineering.
electric power systems,” Automatica, vol. 27, no. 1, pp. 115–134, Jan.
1991.
[5] S. Rovnyak, S. Kretsinger, J. Thorp, and D. Brown, “Decision trees for
real-time transient stability prediction,” IEEE Trans. Power Syst., vol. Naim Logic (S’00–M’05–SM’09) received the B.Sc. degree from the Univer-
9, no. 3, pp. 1417–1426, Aug. 1994. sity of Sarajevo, Sarajevo, Bosnia and Herzegovina, the M.Sc. degree from the
[6] T. Cutsem, L. Wehenkel, M. Pavella, B. Heilbronn, and M. Goubin, University of Zagreb, Zagreb,, Croatia, and the Ph.D. degree from Arizona State
“Decision tree approaches to voltage security assessment,” Proc. Inst. University, Tempe.
Elect. Eng., vol. 140, no. 3, pp. 189–198, May 1993. Dr. Logic is currently with the Power System Operations Department–Com-
[7] R. F. Nuqui, A. G. Phadke, R. Schulz, and N. Bhatt, “Fast on-line puter Applications Group of Salt River Project (SRP), Phoenix, AZ. His research
voltage security monitoring using synchronized phasor measurements interests are in the area of power system state estimation, application of synchro-
and decision trees,” in Proc. IEEE Power Eng. Soc. Winter Meeting, nized phasor measurements, and power system reliability.
Jan. 2001, vol. 3, pp. 1347–1352. Dr. Logic is also a registered Professional Engineer in the State of Arizona.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY MADRAS. Downloaded on March 27,2023 at 05:00:42 UTC from IEEE Xplore. Restrictions apply.