Power System Stability Scanning and Security Assessment Using Machine Learning
Power System Stability Scanning and Security Assessment Using Machine Learning
D OCTORAL T HESIS
Author: Supervisor:
Ruidong L IU Dr. Gregor Verbič
in the
November 8, 2018
iii
Declaration of Authorship
I, Ruidong L IU, declare that this thesis titled, “Power system stability scan-
ning and security assessment using machine learning” and the work pre-
sented in it are my own. I confirm that:
• This work was done wholly or mainly while in candidature for a re-
search degree at this University.
• Where any part of this thesis has previously been submitted for a de-
gree or any other qualification at this University or any other institu-
tion, this has been clearly stated.
• Where I have quoted from the work of others, the source is always
given. With the exception of such quotations, this thesis is entirely my
own work.
• Where the thesis is based on work done by myself jointly with others,
I have made clear exactly what was done by others and what I have
contributed myself.
Signed:
Date:
v
Abstract
Engineering & Information Technologies
Electrical & Information Engineering
Doctor of Philosophy
is used during IS training process; (iii) last, from stability decision-making al-
gorithm aspect, an Extreme Learning Machine (ELM) 1 -based ensemble with
a new decision making rule based on weighted outputs of ELMs is proposed
to achieve 100% predictive accuracy.
The core of a TSA is called classifier which is able to give out straight
away transient stability of a power system once an operating condition is
fed. A key feature of a classifier is its generalization ability, which refers
to the ability of the classifier to give reliable and accurate predictions using
previously unseen operating conditions. The generalization ability depends
on the classifier’s structure, the learning algorithm used, the training set size
and its quality [9]. In supervised learning, a training set consists of a group of
operating conditions and the corresponding stability labels (security indexes
in DSA). The labels are normally obtained using computationally expensive
time-domain simulations.
To accommodate fast changing future grids’ operation conditions, DSA
classifier must be updated regularly to ensure its robustness, which requires
generating new training samples and retraining. Clearly, evaluating a large
amount of operating conditions in order to cover a wide range of diverse
operating conditions in a training set quickly becomes computationally pro-
hibitive. Reducing the number of samples in the training set is also not an
option as this would reduce the classifier’s generalization ability [9].
As presented in the fifth chapter, an alternative is to use semi-supervised
learning [10], which uses both labeled and unlabeled operating conditions. In
this dissertation, the last contribution is a new DSA framework based on a
combination of semi-supervised learning and data editing. To improve the
generalization ability of a classifier, a large number of unlabeled operating
conditions are used, which can be computed efficiently by power flow study.
As a result, the proposed DSA framework requires significantly less labeled
operating conditions to achieve a high generalization ability which satisfies
future grids’ operation needs.
1
The ELM used in [5, 6, 7] is essentially a randomized neural network with omission of
bias, first proposed in [8].
ix
Acknowledgements
I would like to express my deepest thanks to my supervisor, Dr. Gregor Ver-
bič, for his tremendous academic guidance and encouragement throughout
this research work. Thanks also go to Dr. Jin Ma for his help on publications
and valuable academic suggestions.
I am also grateful to Professor David Hill for his guidance and support
during my candidature in the Centre for Future Energy Networks. Special
thanks go to the members of the Centre and Dr. Archie Chapman for their
valuable suggestions and comments.
Finally, I wish to express my utmost gratitude to my parents, my dear
wife and our kids for their care, support and love.. . .
xi
Publications
R. Liu, G. Verbič and J. Ma, "A machine learning approach for fast future
grid small-signal stability scanning," 2016 IEEE International Conference on
Power System Technology (POWERCON), Wollongong, NSW, 2016, pp. 1-6.
R. Liu, G. Verbič and Y. Xu, "A new reliability-driven intelligent system for
power system dynamic security assessment," 2017 Australasian Universities
Power Engineering Conference (AUPEC), Melbourne, VIC, 2017, pp. 1-6.
R. Liu, G. Verbič, J. Ma and D. J. Hill, "Fast Stability Scanning for Future Grid
Scenario Analysis," in IEEE Transactions on Power Systems, vol. 33, no. 1,
pp. 514-524, Jan. 2018.
R. Liu, G. Verbič and J. Ma, "A New Dynamic Security Assessment Frame-
work Based on Semi-supervised Learning and Data Editing," Submitted to
journal of Electric Power Systems Research, May 2018.
Contents
Abstract vi
Acknowledgements ix
Publications xi
1 Introduction 1
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 History of Electricity . . . . . . . . . . . . . . . . . . . . 1
1.1.2 Electricity Networks Around the World . . . . . . . . . 1
1.1.3 Electricity in Our Life . . . . . . . . . . . . . . . . . . . 2
1.1.4 Reliable Electricity Supply . . . . . . . . . . . . . . . . . 2
1.2 Security Assessment in Planning and Operation. . . . . . . . . 3
1.2.1 Concepts of Security Assessment . . . . . . . . . . . . . 3
1.2.2 Existing Techniques and Methods . . . . . . . . . . . . 5
1.2.2.1 Time-domain Simulation . . . . . . . . . . . . 5
1.2.2.2 Deterministic Techniques . . . . . . . . . . . . 6
1.2.2.3 Probabilistic Techniques . . . . . . . . . . . . 10
1.2.2.4 Intelligent System Techniques . . . . . . . . . 11
1.3 Challenges in Future Grids Planing and Operation . . . . . . . 16
1.4 Recent Studies on Modeling of Future Grids . . . . . . . . . . 17
1.5 Focus of the Presented Work . . . . . . . . . . . . . . . . . . . . 19
1.6 Structure of the Thesis . . . . . . . . . . . . . . . . . . . . . . . 20
1.7 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
6 Conclusion 105
6.1 Conclusion of the Presented Works . . . . . . . . . . . . . . . . 105
6.2 Suggestion for Future Work . . . . . . . . . . . . . . . . . . . . 106
Bibliography 109
xvii
List of Figures
5.5 Bus voltage phase angle variance for the conventional and the
renewable scenario. . . . . . . . . . . . . . . . . . . . . . . . . . 101
5.6 Comparison of the classification results for the conventional
and the renewable scenarios. . . . . . . . . . . . . . . . . . . . 102
5.7 Comparison of the number of noisy samples per iteration in
tri-training with and without data editing. . . . . . . . . . . . . 103
5.8 Compare prediction results of supervised, semi-supervised and
semi-supervised with active learning algorithms. . . . . . . . . 104
xix
List of Tables
List of Abbreviations
Chapter 1
Introduction
1.1 Background
not directly connected or synchronized to each other, but there are HVDC in-
terconnections connect all the regional networks. This immense North Amer-
ican network of power lines, generation facilities, and related communica-
tions systems is often referred to as "the world’s largest machine" and supply
electricity continuously to one of the world’s most developed regions.
The interconnected network of Continental Europe is the largest synchronous
electricity network in the world. the network is run by 43 electricity trans-
mission system operators; supplies over 500 million customers in 36 coun-
tries, including most of the European Union. In 2016, 1136 GW of production
capacity was connected to the grid in which 506 GW is contributed by re-
newable generation including hydro [11]. As the largest developing country,
China’s power industry is characterized by fast growth and an enormous
installed base. In 2014, it had the largest installed electricity generation ca-
pacity in the world with 1505 GW and generated 5583 TWh [12, 13]. China
also has the largest thermal power capacity, the largest hydropower capacity,
the largest wind power capacity and the largest solar capacity in the world.
Despite an expected rapid increase in installed capacity scheduled in 2014 for
both wind and solar, and expected increase to 60 GW in nuclear by 2020, coal
will still account between 65% and 75% of capacity in 2020 [14].
During a power blackout, traffic lights go off, creating chaos on the af-
fected roads. Airports and railways cannot be properly operated. Commu-
nication system covering almost every corner of our societies are no longer
functioning. People cannot find out what is happening around since many
are relying on heavily internet to gain information. Factories and offices are
shut down. One can imagine the vast impact of a large scale blackout on our
life and the economy. The power outage during USA California’s capacity
crisis in 2000 affected 1.5 million people, had effects on California’s GDP (it
was cut by 0.7-1.5%) and are thought to have cost around $40 billion [15]. Ac-
cording to the Royal Academy of Engineers, the cost of an electricity shortfall
in the UK would run into billions of pounds. In South Africa, power shortage
has had devastating economic consequences too. Table 1.1 lists some notable
wide-scale power outages around the world [16].
to verify that no equipment ratings and voltage constraints are violated; dy-
namic security analysis involves examining different categories of system
stability performances such as angle stability, voltage stability and frequency
stability. Stability of a power system refers to the continuance of intact oper-
ation following a disturbance and is thus the most important integral com-
ponent of system security assessment. Security assessment of power systems
is crucial for both systems planning and systems operation.
Voltage stability assessment in power system also uses Decision Tree Tech-
nique [23] and Artificial Intelligence techniques like Fuzzy networks [24] and
Artificial Neural Networks [25].
Computational efficiency (speed) is the key element for online stability
monitoring. This can be achieved through increasing the power of computa-
tional devices or by using different stability indices to reduce computational
complexity.
Damping Analysis
Small-disturbance (or small-signal) rotor angle stability is concerned with
the ability of the power system to maintain synchronism under small distur-
bances. The disturbances are considered to be sufficiently small that lineari-
sation of system equations is permissible for purposes of analysis [17].
Conventionally time domain simulation and eigenvalue analysis of lin-
earised system models are widely used to evaluate the small signal stability
of power systems[26]. These methods have been used for decades. Other
than the numerical simulation and eigenvalues analysis approach, there are
small signal stability region method [27], non-linear analysis method [28] and
probabilistic approach [29]. The eigenvalue method is based on Lyapunov’s
first method, and includes QR methods [30] and partial eigenvalue method
[31].
Although the traditional eigenvalue analysis of the state matrix A which
is derived from linearisation around an operating point of the differential al-
gebraic equations had been widely performed on power systems since the
1960’s, application of bifurcation theory to power system stability analysis
was started in the 1990’s [32]. From the point of view of bifurcation theory,
local bifurcations and hence system stability are studied through the determi-
nation of a series of system eigenvalues associated with the gradual evolution
of certain system parameters (e.g., demand changes) [33]. Local bifurcations
having a significant effect on the stability of the system and most studied in
the literature are the saddle-node (one of the eigenvalues becomes zero) and
the Hopf bifurcations (a pair of complex eigenvalues cross the imaginary axes
of the complex plane).
Probabilistic analysis method has also been studied which is discussed
later in this proposal.
Frequency Stability Analysis
Frequency stability refers to the ability of a power system to maintain
steady frequency following a severe system upset resulting in a significant
1.2. Security Assessment in Planning and Operation. 9
imbalance between generation and load [17]. Frequency stability issue is not
involved in this research work.
Transient Stability Analysis
Large-disturbance rotor angle stability or transient stability, as it is com-
monly referred to, is concerned with the ability of the power system to main-
tain synchronism when subjected to a severe disturbance, such as a short
circuit on a transmission line. [17].
Transient stability analysis conducted by power system planning and op-
eration engineers to evaluate the response of the system to various severe
disturbances. It has been in practice to investigate transient stability by nu-
merical simulation in utility planning. But the numerical integration method
requires intensive and time-consuming computational effort and tradition-
ally precluded from online security analysis. This necessitated the devel-
opment of fast simulation and direct methods of transient stability analysis
which is mostly based on Lyapunov second method [26].
Direct methods was likely first proposed by Magnusson [34] in the late
1940’s, and pursued in the 1950’s by Aylett [35], and in the 1960’s by El-Abiad
and Nagappan [36]. In contrast to the time-domain approach, direct methods
determine system stability directly based on energy functions. These meth-
ods determine whether or not the system will remain stable once the fault
is cleared by comparing the system energy (when the fault is cleared) to a
critical energy value.
Although direct stability methods have been in use since 1960’s, methods
featuring energy functions have been the more preferred ones. However,
direct methods must overcome several challenges (modeling, function and
reliability) and limitations (scenario, condition and accuracy) before they can
become a widely accepted practical tool [37].
In [38], the authors offered a systematic procedure of constructing energy
functions for both network-reduction and network-preserving power system
models. An advanced method, called the BCU method, of computing the
controlling unstable equilibrium point is presented along with its theoret-
ical foundation. Numerical solution algorithms capable of supporting on-
line applications of direct methods are provided. Practical demonstrations
of using direct methods and the BCU method for online transient stability
assessments on two power systems are described. Another important direct
method called Extended Equal Area Criterion is widely used in commercial
power system study software [39].
10 Chapter 1. Introduction
Other than the above mentioned techniques, intelligent systems are also
used in power system security assessment to overcome disadvantages of the
conventional techniques, such as time-domain simulation method. Time-
domain simulation is an accurate, flexible, and reliable security assessment
method. However, since the early ’90s, the power industry has drastically
changed. Open power markets, renewable energy, and the current shift to-
wards Smart-Grids significantly complicate the planning and operating sys-
tems. In power systems operation, conventional practice based on offline
studies is inadequate and costly.
In power systems operation, as summarized in [44], reasons to shift from
offline to on-line security assessment are as follows:
Many works have been published using IS for on-line power system se-
curity assessment.
In [46], the authors provided a broad overview of online power system
security analysis, with the intent of identifying areas needing additional re-
search and development. Major components which are involved in the secu-
rity analysis are identified, including data preparation (measurements, filter-
ing, state estimation), online load flow study, contingency selection and secu-
rity evaluation. Within the paper, data estimation and contingency analysis
are discussed in detail, also optimization of preventive and corrective actions
are covered. The procedure and approaches to carry out dynamic stability as-
sessment is provided. The study indicated that artificial intelligence or expert
systems have proven to be appropriate solutions to other power system op-
erations problems and speculated that these technologies will play a major
role in dynamic stability assessment. The paper also briefly discussed pat-
tern recognition methods and probabilistic methods likelihood application
in dynamic security assessment in the areas of contingency screening and in
quantifying the probability of the next state of the system. The study gives
clear scope related to online security assessment, the key issues need to be
tackled and procedures traditionally been used.
In [44], the authors provided an overview of possibility and advantages
of application of IS in online stability assessment. The key factors involved in
implementation and a typical structure of an intelligent stability assessment
system is proposed. The procedure starts from data preparation, selection
of input and output, significant features and learning algorithm are also dis-
cussed. Considering high uncertainty of parameters involved in future grids
14 Chapter 1. Introduction
system topology and the loading conditions. It is shown that the classifier
can be trained using a small set of data when the terms of the TEF are used
as input features.
In [51], online power system TSA problem is mapped as a two-class clas-
sification problem - offline training and online application - and a novel data
mining algorithm using the Core Vector Machine (CVM) is proposed to solve
the problem based on PMU big data. Compared with other Support Vector
Machines, the proposed CVM based assessment algorithm has higher preci-
sion and the least time consumption and space complexity.
Authors in [5, 6, 7] used the ELM algorithm for pre-fault and post-fault
online TSA.
DSA application of the ELM algorithm proposed in [5] has shown to have
faster learning speed compared to other ISs. In the paper, a new transient
stability assessment model using the increasingly prevalent extreme learn-
ing machine theory is developed. It has significantly improved the learning
speed and can enable effective on-line updating. The proposed model is com-
pared with some state-of-the-art methods in terms of computation time and
prediction accuracy. The simulation results show that the proposed model
possesses significant superior computation speed and competitively high ac-
curacy.
A TSA model using an ELM-based ensemble in [6] is proposed by au-
thors. The model is developed for real-time dynamic security assessment
of power systems. The IS structures a series of extreme learning machines
and generalizes the randomness of single ELMs during the training. The
proposed model learns and works very fast and can estimate the credibility
of its DSA results, allowing an accurate and reliable pre-fault DSA mecha-
nism: credible results can be directly adopted while incredible results are de-
cided by alternative tools such as time-domain simulation. This makes the IS
promising for practical application since the potential unreliable results can
be eliminated for use. Case studies considering classification and prediction
are, respectively, conducted on an IEEE 50-machine system and a dynamic
equivalent system of a real-world large power grid.
In study of post-fault TSA, authors in [7] used an ELM-based ensemble
and proposed a new decision-making rule. The case study demonstrated
feasibility of the ELM application for post-fault TSA, which requires faster
learning speed than pre-fault TSA applications. This paper develops a novel
IS to balance the post-fault TSA response speed and accuracy requirements.
A set of classifiers are sequentially organised, each is an ensemble of extreme
16 Chapter 1. Introduction
A few published future grid models analysed by the authors [52, 53, 54,
55], the conclusion is that those models all have pros and cons as explained
in the next a few paragraphs.
The first model proposed in [52] - Australian Energy Market Operator
(AEMO)’s 100 percent renewables study, four scenarios are considered dis-
tinguished by the development of renewable generation technologies and
the demand projection. The focuses are again on economic analysis and bal-
ance. In [53] is called Future Zero-carbon Electrical Grid of Australia (ZCA)
in 2020. In this model renewable generation, fixed distributed storage and
mobile storage (Electric Vehicles) are considered. However the study focused
only on economic aspects and selection of the wind and solar sites with the
highest probability of wind speed and solar radiation. Moreover the study
didn’t cover the grid performance, stability and security assessment.
In [54], the authors produced simulations of scenarios with 100 per cent
RE considering a copper plate model for the National Electricity Market (NEM).
This model study ignored the core of the future grid – network, but only
concentrated on generation–demand balance. In [55], the researchers tried to
determine the least cost mix of wind, solar, geothermal, gas and hydro gen-
erations for California in 2050. The generation mix includes dis-patchable
hydro, pumped hydro, natural gas, geothermal, and centralized solar ther-
mal with storage. The research conclusion is based on balancing and hourly-
time domain simulations. Again stability is not considered. Regarding the
role played by the storage in future grid, the authors of reference [56, 57, 58]
have tried different ways to evaluate the cost, performance of the grid with
different scale of storage systems are embedded.
From the above studies, the researchers mostly focused on to evaluate the
feasibility of RES generation to balance the future projected demand. The
overall performances of the grid were not addressed. Most of the studies
are based on a final stage of the evolution of the grid, thus the performances
of the grid during transition are not studied. However it’s obvious that the
transition from the classical to so called future grid will take at least decades
depending on policy, economical condition and technical development. An-
other major concern is that all of the above studies have used conventional
load models and neglected DR. In the long-term it can be expected that DR
will play a major role alongside storage and so affect the result of power sys-
tem studies significantly [37].
1.5. Focus of the Presented Work 19
1.7 Methodology
Conventional time-domain simulation method is used in the CSIRO fu-
ture grid project security assessment work. A large amount of scenarios need
to be assessed and which leads to heavy computational burden. To overcome
the issue, the first research target is to develop a framework for fast scanning
of future grids security, thus to have an overview of a future grid security
performance from the planning point of view. A novel ML based security
scanning tool for future grids planning is proposed. Further, future grids op-
eration conditions are more diverse than existing networks and which jeop-
ardizes reliability and accuracy of conventional IS based DSA tools. The sec-
ond research target is to propose novel ML based DSA tools for future grids
on-line security assessment. The methodologies are adopted to carry out the
research work are provided:
There are different ways to define the types of machine learning algo-
rithms but commonly the algorithms can be divided into categories accord-
ing to their purpose. The main categories are unsupervised Learning, super-
vised learning, semi-supervised Learning and reinforcement Learning.
• In the previous two algorithms, either there are no labels for all the
observation in the data set or labels are present for all the observa-
tions. Semi-supervised learning falls in between these two. Supervised
learning algorithms require large number of training samples which are
normally from time-domain simulation. For future grids on-line secu-
rity assessment, the requirement of time-domain simulation for train-
ing samples can be relaxed by semi-supervised learning algorithm. A
novel DSA model using semi-supervised learning algorithm will be
discussed. Data editing method will be used to overcome the disad-
vantage of the semi-supervised algorithm.
Chapter 2
2.1 Introduction
In the CSIRO project, I was involved in the study scenarios design and
was responsible for transient stability study from modeling, simulation, re-
sults analysis to paper writing. In this chapter, future grid study scenario
design and transient stability study conducted in the CSIRO project is pre-
sented. Different power system planning scenarios are discussed and tran-
sient stability performance of the scenarios are compared. Conventional time-
domain simulation method is used in the transient stability study.
The study work carried out in the second part showed very high compu-
tational burden of the conventional time-domain method which leads to the
research focus of this dissertation on machine learning methods application
in future grids security assessment.
the role of modelling and analysis related to balancing and stability for FG
scenarios remains of central importance.
In [61], authors explore the potential for a 100% renewable electricity gen-
eration system with substantially increased levels of wind penetration, fossil-
fuelled electricity production was removed from an historic 3-year data set,
and replaced by modelled electricity production from wind, geothermal and
additional peaking options for the New Zealand power system. Genera-
tion mixes comprising 53–60% hydro, 22–25% wind, 12–14% geothermal, 1%
biomass and 0–12% additional peaking generation were found to be feasible
on an energy and power basis, whilst maintaining net hydro storage. Ap-
plication of the approach applied in this research to countries with different
energy resource mixes is discussed, and options for further research are out-
lined.
In 2011, the Australian Government announced its Clean Energy Future
Plan. As one initiative under that plan, AEMO conducted a study [52] which
explores two future scenarios featuring a National Electricity Market fueled
entirely by renewable resources. This study considers two scenarios with
differing views about how quickly renewable technologies will develop over
time. Accordingly, power systems with differing configurations are also con-
sidered to emerge in each scenario. As pointed out in the report, the findings
are tightly linked to the underlying assumptions and the constraints within
which the study was carried out. Any changes to the inputs, assumptions
and underlying sensitivities would result in considerably different outcomes.
The study in [62] examines the challenges of integrating significant vol-
umes of wind power generation onto the power system of Ireland. The report
provide the first significant modeling of power system behavior at unprece-
dented instantaneous penetrations of wind. According to the authors, the
findings are a key element towards meeting Ireland’s ambitious 2020 renew-
able energy targets.
The market model used in this study is based on a recent work pre-
sented in [67] which uses a modified Unit Commitment (UC) problem
that includes the aggregated impact of prosumers (a generic demand
model which represents the aggregated effect of price-responsive users
equipped with rooftop PV-battery systems).
• In the next step of the future grid security assessment, load flow study
2.3. Future Grids Security Assessment Framework 31
is carried out using the dispatch results from the market model. Pow-
erflow and Short-Circut Analysis Tool (PSAT) of Dynamic Security As-
sessment Software (DSATools) are used for this purpose. The outputs
of the load flow will be used as initial conditions for power system se-
curity assessment.
• In the third step, using the steady state conditions as results of the load
flow study, power system security performance can be assessed to as-
sure that the future grid can be operated securely.
• Small signal stability (SSS): Damping ratio of the least stable rotor angle
mode in the system is calculated in DIgSILENT for each hour of the
simulated year using eigenvalue analysis method (QR method [26]).
• Transient stability: The Extended Equal Area Criteria (EEAC [68]) and
time-domain simulation in Transient Security Assessment Tool (TSAT)
were employed for TS assessment of the future grid, and TS index (TSI)
was calculated for each hour of the simulated year.
The study in [69] proposes the least cost mix of diverse RES technolo-
gies (including WF, hydro, biogas, utility PV and concentrated solar thermal
power plant with thermal storage) for an Australian FG. However, in that
research, the balancing studies are simplified through relieving some techni-
cal constraints including the grid model, ramp rate and minimum up/down
time of the generators, etc. Those constraints can change the dispatch results,
the energy share of different resources, and even the least-cost mix of diverse
RES technologies for the future of the NEM. Further, a simplified balancing
study without considering network and stability constraints can not guaran-
tee the feasibility of an operation scenario.
The proposed scenario and sensitivity based analysis is an approach which
aims to overcome the limitations of those highly simplified approaches. that
can address the structural balancing and stability issues and enlighten the
path that should be followed in the future in terms of generation and net-
work expansion, market design and the operation of FGs.
In our study, we obtained electricity demand, wind and solar traces from
AEMO’s National Transmission Network Development Plan (NTNDP) in
2040 [66]. The modified 14 generator model of the NEM, representing 100%
renewable generation portfolio is shown in Fig. 2.1. In this Figure, the Areas
1 to 5 represent Snowy Hydro (SH), New South Wales (NSW), Victoria (VIC),
Queensland (QLD) and South Australia (SA), respectively. We matched the
14-generator model with the 16 zones of the AEMO’s NTNDP [66] to extract
the corresponding wind, solar and demand traces for the market model.
In order to implement the suggested generation portfolio in [69] (which
is based on demand and weather data in 2010), first, we scaled up the capac-
ity of each generation technology based on the demand energy/peak power
growth in each region of the NEM in 2040. Second, since the 14-generator
model was originally developed based on the Australian grid in 2010, we
had to reinforce the transmission system to ensure the system balancing. In
the following sections, the features for sensitivity study are described.
• Prosumers sensitivities
Due to the emerging situation in Australia, where rooftop PV pene-
tration is increasing significantly, we considered scenarios cases where
prosumers equipped with rooftop PV play a significant role in re-shaping
the future demand. Further, the rooftop PV owners are increasingly
discouraged to export power back into the grid due to very low Feed
in Tariffs (FiTs) and increasing grid electricity costs. Therefore, it is
expected that most rooftop PV owners will install small-scale Battery
System (BS) to utilize Integrated PV-battery systems (IPBS) in order to
maximize their self-consumption. It appears likely that such a change
will occur globally, as also acknowledged in [72]. With this prospect,
we considered four different rooftop PV-battery uptake sensitivities as
follows:
100% -100
90% -80
80% -60
70% -40
60% -20
50% 0
40% 20
30% 40
20% 60
10% 80
100
N lPh z
l
l
N Ph h
hP Bz
Ph h
Pz z
hP hBl
h
N Ph l
N lPz h
D l
z
N mD l
N zPm Bz
l
N hD l
Bz
hB
hB
Sh hB
B
B
zP hB
B
B
Sh zB
zP zB
B
Sz mB
sS hB
S hB
zP m
Sz Dm
Sz Dh
w Dz
z
S Dz
N zDz
sS m
hD
sS D
N PhD
D
sS D
N PzD
D
sS D
sS mD
N hD
N Pz
N zPz
m
P
l
z
l
z
P
sS
S
sS
S
sS
w
w
w
w
w
w
N
w
w
N
100
NsShPhDhBl
NsSlPhDhBl 90
NsShPzDzBz
NsSlPzDzBz
80
NsSzPhDhBh
NsSzPhDhBl
NsSzPmDmBh 70
NsSzPmDmBl
NsSzPzDzBz
60
NwShPhDhBl
NwSlPhDhBl
NwShPzDzBz 50
NwSlPzDzBz
NwSzPhDhBh
40
NwSzPhDhBl
NwSzPmDmBh
NwSzPmDmBl 30
NwSzPzDzBz
Bus01
Bus10
Bus20
Bus30
Bus40
Bus50
Bus60
Bus70
Bus79
10 and bus 11 are the most vulnerable buses in the weak network scenar-
ios, however this is not observed in strong network scenarios. In all scenar-
ios, bus 41 seems to be the most vulnerable one and especially for scenarios
NwSzPhDhBl, NsSzPzDzBz, NsSlPzDzBz and NsShPzDzBz.
In general, we can observe that network strength plays a big role in the
system transient stability performance. Demand response also helps to sta-
bilize the system. However, how utility level storage and residential battery
capacity affect the transient stability is not quite clear and need further study.
Chapter 3
3.1 Introduction
This chapter is based on my POWERCON paper [85] and the first journal
paper [86] focusing on fast scanning of small signal and voltage stability in-
dices for long term planning study. Clustering is core of the task and it is an
unsupervised machine learning method.
Unsupervised learning is a type of machine learning algorithm used to
draw inferences from data sets consisting of input data without labeled re-
sponses. The goal for unsupervised learning is to model the underlying
structure or distribution in the data in order to learn more about the data. In
the power system security assessment area, the data sets are operating con-
ditions and contingencies, the responses are referred to the system security
levels under the given operating conditions and contingencies.
3.2 Background
Power systems are undergoing a major transformation driven by the in-
creasing uptake of renewable energy sources, DC power transmission, and
the decentralization of electric power supply underpinned by the informa-
tion and communication technologies and demand-side technologies, like
rooftop PV, energy storage, home energy management systems, and electric
vehicles. How future grids will look like, however, is still uncertain as the
evolution depends not only on technological development but also on the
regulatory environment.
Chapter 3. Un-supervised machine Learning Method for Fast Stability
42
Scanning
3.5.1 Clustering
Clustering is the task of grouping a set of objects into clusters based on
their similarity [115]. A cluster is described by its internal homogeneity and
the external separation, i.e., patterns in the same cluster should be similar to
each other while patterns in different clusters should not [115]. When cluster-
ing a large amount of data, their similarity is usually expressed as a distance.
After clustering, all elements within a particular cluster can be represented
by the center of this cluster or a cluster centroid. In power systems, cluster-
ing is a popular ML algorithm used for dimensionality reduction. It has been
used in load forecasting [3], to accelerate the convergence of the Monte Carlo
simulations in transfer capability analysis [109], and to study the influence of
power flows on the damping of critical oscillatory modes [116].
1 X
cj = x, (1)
Nj x∈C
j
d(·) is the Euclidean distance defined in (2). To search for the best solution in a
multi-dimensional space, the particles “fly” through the space with different
speeds and directions. In the searching process, the fitness (4) of each particle
is evaluated and stored. The historical best position of each particle pbest and
the global best position gbest among all the particles are used to adjust the
flying speed and the direction of the particles.
The velocity of each particle is updated according to:
where c1 and c2 are constants, rand1 ∈ [0, 1] and rand2 ∈ [0, 1] are randomly
generated numbers, and w is the inertia factor defined as:
wmax − wmin
w = wmax − niter · . (6)
Niter
In [118, 119], the authors have demonstrated that the combination of PSO
and k-means clustering can improve the clustering performance or, to some
extent, overcome the weaknesses of the k-means algorithm. We build on that
by proposing an improved self-adaptive PSO-k-means clustering algorithm,
discussed in more detail in Section IV.B.
d1 (ri , qj )
d(ri , qj ) = Pk (8)
l=1 d1 (ri , qj )
angles at all buses in the system, active and reactive demands, and active and
reactive powers of all generators in the system. Without the loss of general-
ity, however, A can also include derived variables, such as transmission line
flows.
The framework proposed in this study bears similarities and differences
with online DSA. They both involve knowledge base generation and feature
selection. The first difference is in the offline simulation. As a supervised
learning method, DSA requires a big knowledge base to achieve high accu-
racy mapping, which requires a lot of offline simulation. Fast scanning, on
the other hand, is an unsupervised learning method, so the offline simulation
is only needed for the feature selection and to generate the operating condi-
tions for the stability analysis, which has a much lower computational bur-
den. The second difference is in the application. DSA is an operational tool,
which requires fast mapping of current or imminent operating conditions
and a very high accuracy since the mapping result is the basis for preventive
or emergency control. Fast scanning, on the other hand, is a planning tool
that aims to scan a lot of scenarios across long horizons to provide planners
with the stability level of the system under study.
var(r(ai ))
w̃i = C · wi · (10)
log (2 · rank(ai ))
where C is a tunable parameter, and w̃i and wi are adjusted and original
feature weights, respectively.
In order to find the dominant features, the size of the training set is pro-
gressively increased by randomly picking the operating points from the time-
series analysis until the resulted feature ranks and weights converge. Com-
pared to conventional DSA where the size of the training set for feature se-
lection is fixed, our approach avoids unnecessary computation thus reducing
the computational burden, and also prevents overfitting.
Fig. 3.4 shows the convergence process. Observe that a sufficient accu-
racy is achieved after 300 iterations. Note that the stability index need to
be calculated using conventional methods for all operating points used for
feature selection.
3.7.2 Clustering
Self-adaptive PSO-k-means weighted clustering is used to find typical
generation-load patterns. Clustering reduces the number of data points from
8760 operating points resulting from the time-series analysis to 555 and 421
clusters, for SSS and VS, respectively, which represents a dimensionality re-
duction of 95.2% and 93.7%, respectively.
In order to show statistically the advantage of the proposed PSO k-means
algorithm over the conventional k-means, we ran the k-means and the PSO-
k-means using 100 random initial seeds.
Fig. 3.2 compares the best, the average and the worst SMSE of the clus-
tering results of the conventional k-means and the proposed self-adaptive
PSO-k-means. Observe that the k-means algorithm starts from a randomly
assigned cluster centroid that is normally far away from the global optimum.
Therefore, the SMSE of the k-means is much larger than the PSO-k-means
3.7. Simulation Results 59
0.16
0.15
1 5 10 15 20
Clustering iteration
F IGURE 3.2: Comparison of the clustering results: conventional
k-means vs. the proposed self-adaptive PSO-k-
means.
SMSE in the first a few iterations. The PSO-k-means, on the other hand, starts
with a much smaller SMSE, and has a better performance overall. The results
also show that the performance of the proposed method is much more stable
with a consistently better performance than the conventional k-means.
(a)
Damping ratio 0.14
0.12
0.1
k-means algorithm(Best)
80 PSO-k-means algorithm(Worst)
60
40
20
0
0 5 10 15 20
Percentage of damping ratio error
(a)
0.2 Sync11-P PV02-P WF04-Q Syc08-Q
WF04-P PV01-Q PV02-Q
Feature weights
0.1
0.05
0
50 150 250 300 350 400
Number of instances used for feature selection
(b)
0.5
WF06-P HVDC3S-Q WF02-Q
0.4 WF05-P WF02-P Inter-P2
Feature weights
WF06-Q WF05-Q
Inter-P3 WF03-P
0.3
0.2
0.1
0
50 150 200 250 350
Number of instances used for feature selection
F IGURE 3.4: Convergence of feature selection: (a) SSS, (b) VS.
(a)
12000
Load margin (MW)
10000
8000
Fast scanning result
Time series scanning result
6000
7201 7300 7400 7500 7600 7700
Hours in the year 2030
(b)
200
k-means algorithm(Best)
operation point number
PSO-k-means algorithm(Worst)
150
100
50
0
0 5 10 15 20
Percentage of load margin error
F IGURE 3.5: VSA loading margin fast scanning results: (a) time
series, (b) error distribution using PSO-k-means
and k-means.
in NEM of the same time slot is compared with the damping ratio. It can
be observed that the minimum damping ratio does not coincide with the lo-
cal maximum load level, nor the maximum load level in the year 2030, the
observation of the worst case point shifting is in accordance with [101].
35
0.14
0.12
0.11 25
0.1
0.09 20
Similarly, we plotted the loading margin and the total system demand for
a period of 500 hours in Fig. 3.7. Observe that there is little correlation be-
tween high/low demand level and the low/high loading margin, which jus-
tifies the time series approach compared to a conventional approach where
only a small number of the most critical conditions is analyzed.
14 35
Demand active power(GW)
Loading margin (GW)
12 30
10
25
8
20
6 Loading margin
Demand active power
15
7201 7300 7400 7500 7600 7700
Hours in the year 2030
F IGURE 3.7: VSA: Loading margin vs. demand.
Chapter 3. Un-supervised machine Learning Method for Fast Stability
64
Scanning
3.8 Conclusion
Unlike the conventional power system planning that aims to find the op-
timal transmission and/or generation expansion plan, the future grid analy-
sis considers scenarios that are not mere extrapolations of the existing grid.
Next, to capture the intra-seasonal variation in the RES output, we need to
use time series analysis as opposed to picking a small number of the most
critical operating condition, as it is done conventionally. The challenge of fu-
ture grid stability analysis is the sheer number of operating conditions that
need to be analyzed. In this chapter, we have proposed a novel framework
for fast stability scanning of future grids scenarios. The framework is based
on a feature selection algorithm that makes it possible to perform cluster-
ing using both feature ranks and weights. To reduce the number of clusters,
we proposed an improved self-adaptive PSO-k-means clustering technique
that determines the optimal cluster number. The case study demonstrated
the suitability of the proposed framework. Considering the level of detail
required for future grid analysis, an acceptable accuracy is achieved with a
more than a ten-fold speed-up. However, in power system operation su-
pervised machine learning method can achieve higher accuracy for online
stability assessment which is presented in the next chapter.
65
Chapter 4
4.1 Introduction
This chapter is based on my AUPEC paper [125] which focused on solv-
ing reliability of dynamic transient stability assessment due to power system
topology change. Classification using an trained intelligent system ensemble
is core of the task and it is an supervised machine learning method.
Supervised learning can be regarded as of function approximation, where
basically an intelligent system is trained based on input data sets and asso-
ciated responses, and in the end of the process establish function that best
describes the input data sets. In the power system security assessment area,
the data sets are operating conditions and contingencies, the responses are
referred to the system security levels under the given operating conditions
and contingencies.
4.2 Background
Dynamic security assessment provides power system operators with se-
curity information of power systems for current or imminent operating con-
ditions considering various system topologies and contingencies. The se-
curity information is basis for preventive or emergency control to prevent
systems0 insecurity. Transient stability assessment is one of the most impor-
tant tasks in DSA.
Unlike energy function-based methods or time-domain simulation, Intel-
ligent systems trained via machine learning using a large number of training
instances can map operating conditions to power systems’ security status,
which provides a much faster, versatile and easier to implement alternative
66 Chapter 4. Supervised machine Learning Method for TSA
to achieve DSA. In the past 10 years, TSA using IS has attracted a lot of in-
terest. Recent studies [48, 49, 5, 104, 126] demonstrated effectiveness of IS
application in DSA.
might be unreliable due to power system topology change in some cases. In-
deed, network topology change greatly increases diversity of power system
operating conditions and requires IS has better differentiability.
β̂ = H † T, (3)
For power systems DSA application with many candidate features, the
wrapper type methods are not feasible in terms of computation burden. The
time complexity of heuristic feature selection methods are O(N 2 ); where N
is candidate feature number. In this study, we propose a combined filter-
wrapper algorithm using the RRelief-F method to find out top weighted fea-
tures out of all candidate features first, then use the SFFS to locate an optimal
subset for each ELM in an IS ensemble. Due to randomness of individual
ELM’s parameters, the feature subsets for ELMs are different. Algorithm of
the proposed method is in Algorithm 5.
from [131]. Generators proportionally supply loads based on the base case
ratio. Taking into account of uncertainties in power system, around each
basic loading, 20 more loading randomly generated within ±20% of the basic
loading. The random loading variance is satisfied by distributing random
increments to the generators. Thus in total we generated 160 generation-load
patterns. We then conducted power flow study by applying the generation-
load patterns to the 11 topologies and recorded 1760 operating conditions.
Next step is to perform time-domain simulation for each OC and record
stability status(stable or unstable) when the system is subject to contingen-
cies. The contingencies include transient three phase short circuit events on
all 39 buses; fault duration is randomly generated for a specific contingency
and between 100ms to 200ms. An operating condition and corresponding
stability status form one sample in the SDB. In total, the stability database
includes 1760*39 = 68640 instances. Instances resulted from the 11 topologies
are stored in different SDBs.
In reality, for most contingencies and OCs, a power system is normally
stable. Therefore, the number of stable OCs in a stability database is nor-
mally much bigger than the number of unstable OCs. To handle the class
imbalance issues with the original SDB, re-sampling method presented in
[132] is adopted.
transient stability assessment and use the first category variables as candi-
date features. More specifically, we included bus variables, generator rotor
angles, active and reactive powers, load active and reactive powers. Con-
ventionally these variables are considered as topology independent variables
which are expected to better reflect topology change and give accurate clas-
sification result when evaluate OCs of a range of topologies [5, 104, 126, 49].
0.05
0.04
Feature weights
0.03
0.02
0.01
-0.01
-0.02
25 50 75 100 125 150 183
Rank of candidate features
F IGURE 4.1: Ranked weights of candidate features as result of
the RRelief-F feature selection.
Fig. 4.1 gives results of the RRelief-F as a filter type feature selection
method. Feature weight is a gauge of correlating level between individual
feature and stability status of the test system. The figure shows that majority
of the candidate features have a little or negative correlation with the system
stability status compared to the top 50 features.
We then use the top ranked 50 features as candidate features for the SFFS
algorithm which aims to find 30 optimal feature subsets for ELMs in the en-
semble as their inputs. Using 50 features instead of 183 features, the SFFS
forward-backward searching process time complexity reduced from O(1832 )
to O(502 ) which is more than 10 times reduction. We evaluate one ELM clas-
sifier using different feature sets resulted in the SFFS feature subset selection
76 Chapter 4. Supervised machine Learning Method for TSA
95
Classification accuracy (%)
94
93
92
91
90
5 10 15 20 25 28
SFFS iteration
F IGURE 4.2: Classification accuracy improvement during the
SFFS process.
process. Fig. 4.2 shows classification accuracy improves when feature set is
refined in the SFFS process.
100
Average classification accuracy ( % )
99
98
97
96
95
Predictor trained by single topology instances
Predictor trained by combined topologies instances
94
10 20 30 39
Fault location
F IGURE 4.3: Classification accuracy affected by topology
change.
Next, the TSA is trained and tested by using mixed samples of all topolo-
gies for each contingency. The bottom curve in Fig. 4.3 indicates that clas-
sification accuracy compared to the single topology case decreases by 1% to
3% for most of the contingencies. The result shows that TSA performance
deteriorated due to topology change. In other words, if network topology
changes, the TSA classification performance is not reliable despite topology
independent features are used.
randomly picked features, feature subset for each ELM have shown a bet-
ter differentiability in the previous section. Compared to previous case, the
optimal feature subsets help to improve classification accuracy by 1% in Fig.
4.4.
To further improve TSA performance and take advantage of ensemble
learning, we then use the boosting technique, which enhances learning on
misclassified samples in training process. Fig. 4.4 shows classification accu-
racy of the ELMs ensemble increases to over 99% for all contingencies, which
is even better than the single topology case without boosting learning.
100
99
Classification accuracy ( % )
98
97
96
94
10 20 30 39
Fault location
F IGURE 4.4: Classification accuracy improved by SFFS and
boosting learning.
classification results of these OCs are depicted in Fig. 4.5. All these results
are well within a boundary between [−0.15, +0.15].
0.2
0.15
Classification results
0.1
0.05
-0.05
-0.1
-0.15
-0.2
1 10 20 30 40 47
Misclassified operating points for all bus contingencies
F IGURE 4.5: Prediction results of all misclassified OCs for faults
on the buses.
on the buses in the chapter due to space limit, results for contingencies on
the lines are similar.
4.7 Conclusion
In this study, for intelligent system based transient stability assessment,
simulation results show that using system topology independent features
as IS inputs in some cases is unreliable when system is subjected to topol-
ogy change. In order to overcome classification unreliability due to topology
change, we first proposed a hybrid filter-wrapper feature selection method,
which helped to improve TSA classification performance when the test sys-
tem is evaluated with multiple topologies. Furthermore, simulation results
show that the boosting learning method in conjunction with the rule for clas-
sification we proposed based on weighted weak classifiers’ output can signif-
icantly improve TSA reliability and helped to reduce time-domain simulation
for achieving 100% classification accuracy.
4.7. Conclusion 81
Chapter 5
5.1 Introduction
This chapter is based on the second journal paper [134] which focused on
reducing labeled samples required for intelligent system training and main-
tain high accuracy of transient stability classification at the same time. Clas-
sification using an trained intelligent system ensemble is core of the task and
semi-supervised machine learning method is used.
In machine learning, in between unsupervised learning and supervised
learning is the semi-supervised learning algorithm. In many practical situa-
tions, the cost to get responses for given data sets or labeling is quite high,
since it is often time consuming to do that. So, in the absence of responses in
the majority of the data sets but present in few, semi-supervised algorithms
are the best candidates for the model building. In the power system security
assessment area, the data sets are operating conditions and contingencies, the
responses are referred to the system security levels under the given operating
conditions and contingencies.
5.2 Background
Historically, power system security assessment was based on offline time-
domain simulations. With an increasing penetration of large-scale renew-
ables, however, such as wind and solar generation, as well as distributed
energy sources, such as rooftop PV, battery storage and flexible loads, power
systems are becoming less predictable. Using conventional offline security
assessment to achieve the same level of accuracy and reliability would sig-
nificantly increase the computational burden due to an increased number of
84 Chapter 5. Semi-supervised machine Learning Method for TSA
Cf2
nd
O +O ln N , (1)
n N
where n is the number of neural network nodes, and d is the input dimension
of the neural network, N is the number of training observations, and Cf2 is
the first absolute moment of the Fourier magnitude distribution of f . O(·)
describes the limiting behavior of a function in term of its arguments. Simi-
larly, the bound on the generalization error for a radial basis function neural
network is [137]:
r !
1 nd ln (nN ) − ln δ
O +O , (2)
n n
5.4.3 Tri-training
One of the most popular semi-supervised learning algorithms is co-training
[138], which trains two classifiers separately on two independent sets of at-
tributes of the training set. The issue with co-training is that it requires time
consuming cross validation [133]. To overcome that, [139] proposed a new
semi-supervised learning algorithm called tri-training, using three classifiers
instead of two. After the three classifiers are trained using a small set of la-
beled samples, a large number of unlabeled samples is evaluated by the three
classifiers. An unlabeled sample can be added to the training set used to train
one classifier only if the other two classifiers agree on its classification. Unlike
in co-training, the labeling confidence doesn’t need to be explicitly measured.
The issue is that one classifier may get a sample with a wrong label if the
other two classifiers both give wrong classification results. Samples with a
wrong label are called noise, with the noise rate of a training database defined
as the ratio of the number of noisy samples to the total number of samples.
According to [140], even in the worse case, if a sequence of m labeled samples
is drawn, classification noise rate increase due to wrongly labeled samples
can be compensated if the amount of samples m satisfies:
2 2N
m≥ ln , (3)
ε (1 − 2η)2
2 δ
where ε is the hypothesis’s (in our case the classifier) worst-case classification
error rate, η < 0.5 is an upper bound on the noise rate, N is the number
of hypotheses, and δ is the hypothesis’ confidence limit. A hypothesis Hi
that minimizes the disagreement with the sequence will have the Probably
Approximately Correct learning (PAC learning) property [140]:
Pr [d(Hi , H ∗ ) ≥ ε] ≤ δ, (4)
where probability Pr [d(·)] is taken over all evaluation runs of the symmetric
difference between the two hypothesis sets Hi and H ∗ (the ground-truth). In
other words, (4) tells us that the probability of hypothesis Hi being within
from H ∗ is at least 1 − δ.
Based on the PAC learning theory [140] and the co-training algorithm
proposed in [138], we summarize the tri-training criteria derivation process
proposed in [139]. Let c = 2µln(2N/δ). Further, introducing µ to make the
5.4. Review of Pertinent Machine Learning Techniques 89
c
m= . (5)
ε2 (1 − 2η)2
c
v= = m(1 − 2η)2 . (6)
ε2
It follows from (6) that the larger the sample set m and the smaller the sample
noise rate η, the larger the v and the lower the classification error ε.
In the t-th iteration of the tri-training, sample noise rate η (t) is defined as:
where L denotes the initial labeled sample set with size |L|, ηL is the labeled
sample set noise, L(t) denotes the pseudo labeled sample set, and e(t) denotes
the upper bound of the classification error rate in the t-th iteration. Substi-
tuting (7) into (6) for the t-th and the (t − 1)-th iterations gives:
!2
ηL |L| + e(t) L(t)
u(t) = L ∪ L(t) 1−2 (8)
|L ∪ L(t) |
and !2
ηL |L| + e(t−1) L(t−1)
u(t−1) = L ∪ L(t−1) 1−2 . (9)
|L ∪ L(t−1) |
In order to have a decreasing classification error rate e(t) < e(t−1) , u(t) >
u(t−1) needs to be satisfied.
In (8) and (9) we made a few assumptions. First, ηL is very small since in
a labeled sample set there is very little noise. Second, L(t) is always bigger
than L(t−1) . This can be guaranteed by choosing an increasing number of
unlabeled samples in iterations. The last assumption is that e(t) ≥ 0 and
e(t−1) < 0.5. Therefore, if e(t) L(t) < e(t−1) L(t−1) then u(t) > u(t−1) .
To determine if an unlabeled sample could be labeled for a classifier we
require:
e(t) L(t−1)
0 < (t−1) < < 1. (10)
e |L(t) |
When L(t) is much bigger than L(t−1) then e(t) L(t) may be larger than
e(t−1) L(t−1) . To avoid the situation from happening, a sub-sampling step
90 Chapter 5. Semi-supervised machine Learning Method for TSA
is used to reduce L(t) by using only a subset of L(t) and therefore ensure
e(t) L(t) < e(t−1) L(t−1) . The size of L(t) after the sub-sampling is given as:
& '
e(t−1) L(t−1)
L(t) = −1 . (11)
e(t)
where wd are feature weights, and n denotes the dimensionality of the feature
vector.
5.5. A New Dynamic Security Assessment Framework 91
IS training
Data Semi-supervised
Updating
Editing Learning Algorithm
IS parameters
Online application
Trained Online
Real-time
Security
Measurements
Assessment IS
and decision trees [49, 50, 108, 6, 51]. They generally exhibit good perfor-
mance, however they tend to suffer from an excessive training time and a
complex parameters tuning. A comparison of different classifiers is given
in [5], showing that ELM have a superior computational performance and
a competitively high accuracy. This can be attributed to the random assign-
ment of weights and biases in the hidden layer, which obviates parameter
tuning using gradient descent and hence increases the learning speed. ELM
have been successfully applied in several DSA applications [5, 6, 7]. In the
case study we use an ELM-based neural network as a classifier for TSA.
Three classifiers (h1 , h2 and h3 ) are trained using the initial labeled train-
ing set using a conventional supervised learning algorithm (ELM in our case).
Diversity of these classifiers is vital to any co-training based on semi-supervised
learning. In the tri-training algorithm, the diversity is obtained by using dif-
ferent training sets for the three classifiers using bootstrap sampling [143].
94 Chapter 5. Semi-supervised machine Learning Method for TSA
where x ∈ L and L is the original labeled training set; c(x) is the true label
of x obtained by simulation; | · | is cardinality of a set; the numerator is the
number of samples on which hj and hk give the same but wrong classification
result; the denominator is the number of all samples on which hj and hk give
the same classification result.
For each classifier, if the update flag Updatei is set, then the classifier is
retrained by the learning algorithm Learn() with the initial labeled training
set L and the pseudo labeled training set Li . Unlike the standard tri-training
algorithm, in this framework, newly labeled samples are added during the
data editing process to L and pseudo labeled samples Li are produced in the
data depuration algorithm.
model the generation profile of the four wind farms. To increase the num-
ber of operating points, the 168 operating conditions representing one week
are interpolated from hourly to a three-minute resolution, which gives 3360
points. To mimic load uncertainty, the three-minute load levels are modified
by ±20% around the base case. To further increase the diversity of operat-
ing conditions, we assume ten network topologies given in Table 4.1, which
yields 33600 operating points for both the conventional and the renewable
scenario. A market simulation is then used to create dispatch levels for the
conventional generation (wind farms are assumed to have dispatch priority).
Given that the optimal power flow used in market dispatch doesn’t always
converge, the number of operating conditions for time domain simulations is
reduced to 29698 and 30917 for the conventional and the renewable scenario,
respectively. In time-domain simulations, we assume random faults (three-
phase to ground short circuits), varying both the fault location (transmission
line or bus) and the fault duration (between 100 ms to 200 ms). For trans-
mission line faults, the line is disconnected after the fault has been cleared.
98 Chapter 5. Semi-supervised machine Learning Method for TSA
For each time-domain simulation, the transient stability status (stable or un-
stable) is recorded and later used in the classification. In the case study, a
subset of the labeled operating conditions is assigned to a labeled training
set L. Also, a subset of the operating conditions (not in L) without labels is
assigned to an unlabeled training set U.
0.06
Feature weights
0.05
0.04
0.03
0.02
0.01
0
10 20 30 40 50 60 70 80 90 100
Feature ranks
F IGURE 5.3: Top 100 features as a result of feature selection.
The results of feature selection using RRelief-F are shown in Fig. 5.3 for
both the conventional and the renewable scenario. Observe that, compared
to the top-ranked features, the majority of features have little correlation with
the stability status as evidenced by the lower respective feature weights. To
increase the diversity of the three classifiers in the tri-training algorithm, we
randomly select 30 out of 50 top ranked features for each classifier as inputs
to the ELM-based classifiers in the proposed DSA.
0.99
0.98
Classification accuracy
0.97
0.96
0.95
0.94
0.93
0.92
8
37
46
64
92
38
83
29
75
9
92
82
36
14
12
15
21
30
46
61
77
92
10
12
15
Number of labeled samples used in training
F IGURE 5.4: Classification accuracy vs the training set size.
90
Conventional generation scenario
Variance of bus voltage phase angle
80
Renewable generation scenario
70
60
50
40
30
20
10
0
17 19 20 23 24 25 26 27 28 29 33 34 36 37 38
Bus IDs
F IGURE 5.5: Bus voltage phase angle variance for the conven-
tional and the renewable scenario.
0.992
Conventional generation scenario
Renewable generation scenario
0.99
Classification accuracy
0.988
0.986
0.984
0.982
0.98
2
4
9
82
36
91
45
00
30
46
61
77
92
10
12
13
15
17
Number of labeled samples used in training
F IGURE 5.6: Comparison of the classification results for the
conventional and the renewable scenarios.
500
Without data editing
Number of noisy samples introduced
With data editing
400
300
200
100
0
1 2 3 4 5 6
Training iteration
F IGURE 5.7: Comparison of the number of noisy samples per
iteration in tri-training with and without data edit-
ing.
TSA and new TSA tool without data editing as in Section 5.6. The results
are shown in Fig. 5.8. Observe how semi-supervised learning with data
editing consistently outperforms the conventional TSA classifier. Especially
for when the number of labeled samples is small, semi-supervised learning
greatly increases classification performance of the new TSA model by using
unlabeled samples.
5.8 Conclusion
In the case studies of this chapter, we first demonstrate how labeled train-
ing set size impacts on performance of the neural network-based TSA and
penetration of renewable generation increase diversity of power system op-
erating condition. The result is that more labeled training samples are re-
quired to achieve higher classification performance for conventional DSA
tools. We then compared the classification performance of the conventional
TSA tool and our new TSA tool based on semi-supervised learning. Results
104 Chapter 5. Semi-supervised machine Learning Method for TSA
1
Supervised training results
0.995 Tri-training results (semi-supervised)
Tri-training + data editing results
Classification accuracy
0.99
0.985
0.98
0.975
0.97
0.965
0.96
09
27
00
00
00
00
15
17
21
35
65
95
Number of labeled samples used in training
F IGURE 5.8: Compare prediction results of supervised, semi-
supervised and semi-supervised with active learn-
ing algorithms.
show the new TSA requires much less labeled training samples to achieve
same performance compared to the conventional TSA. Finally, we demon-
strate the data editing algorithm can help to reduce the noise introduced in
the semi-supervised learning process and hence lead to a better classification
result. The new framework greatly reduces online simulation for the training
set preparation and improves the classification performance of DSA. The new
framework provides an alternative when timely DSA updating is required.
We used an ELM-based neural network ensemble and tri-training algorithm
in the case study, however, the idea of the semi-supervised learning-based
DSA is also suitable for other machine learning approaches and different type
of semi-supervised algorithms can be used.
105
Chapter 6
Conclusion
• Due to time limit, small network models are used in this study. How-
ever, a bigger network model may be used to verify the performance of
the proposed security assessment tools.
109
Bibliography
[1] Miao He, Junshan Zhang, and Vijay Vittal. “Robust Online Dynamic
Security Assessment Using Adaptive Ensemble Decision-Tree Learn-
ing”. In: IEEE Transactions on Power Systems 28.4 (Nov. 2013), pp. 4089–
4098.
[2] Ran Li et al. “Development of Low Voltage Network Templates; Part
I: Substation Clustering and Classification”. In: IEEE Transactions on
Power Systems 30.6 (Nov. 2015), pp. 3036–3044.
[3] Minas C Alexiadis, Grigoris K Papagiannis, and Ioannis P Panapakidis.
“Enhancing the clustering process in the category model load profil-
ing”. In: IET Generation, Transmission & Distribution 9.7 (Apr. 2015),
pp. 655–665.
[4] Sudipta Dutta and Thomas J. Overbye. “Feature Extraction and Visu-
alization of Power System Transient Stability Results”. In: IEEE Trans-
actions on Power Systems 29.2 (Mar. 2014), pp. 966–973. ISSN: 0885-8950.
DOI : 10.1109/TPWRS.2013.2283276.
[9] V.N. Vapnik. “An overview of statistical learning theory”. In: IEEE
Transactions on Neural Networks 10.5 (1999), pp. 988–999. ISSN: 10459227.
DOI : 10.1109/72.788640.
[28] Yousin Tang and A. P. S. Meliopoulos. “Power system small signal sta-
bility analysis with FACTS elements”. In: IEEE Transactions on Power
Delivery 12.3 (July 1997), pp. 1352–1361. ISSN: 0885-8977. DOI: 10 .
1109/61.637014.
[29] S. Q. Bu et al. “Probabilistic Analysis of Small-Signal Stability of Large-
Scale Power Systems as Affected by Penetration of Wind Generation”.
In: IEEE Transactions on Power Systems 27.2 (May 2012), pp. 762–770.
ISSN: 0885-8950. DOI : 10.1109/TPWRS.2011.2170183.
[48] Kai Sun et al. “An Online Dynamic Security Assessment Scheme Us-
ing Phasor Measurements and Decision Trees”. In: IEEE Transactions
on Power Systems 22.4 (Nov. 2007), pp. 1935–1943. ISSN: 0885-8950. DOI:
10.1109/TPWRS.2007.908476.
[49] Ruisheng Diao, Vijay Vittal, and Naim Logic. “Design of a Real-Time
Security Assessment Tool for Situational Awareness Enhancement in
Modern Power Systems”. In: IEEE Transactions on Power Systems 25.2
(May 2010), pp. 957–965. ISSN: 0885-8950. DOI: 10 . 1109 / TPWRS .
2009.2035507.
[50] Janath Geeganage et al. “Application of Energy-Based Power System
Features for Dynamic Security Assessment”. In: IEEE Transactions on
Power Systems 30.4 (July 2015), pp. 1957–1965.
[51] Bo Wang et al. “Power System Transient Stability Assessment Based
on Big Data and the Core Vector Machine”. In: IEEE Transactions on
Smart Grid (2016), pp. 1–1. ISSN: 1949-3053. DOI: 10 . 1109 / TSG .
2016.2549063.
[52] Australian Energy Market Operator Limited. 100 per cent renewable
study - modelling outcomes | Department of the Environment and Energy.
Tech. rep. AEMO, 2013, pp. 1–111.
[53] Matthew Wright and Patrick Hearps. Zero carbon Australia stationary
energy plan. Tech. rep. University of Melbourne, 2010.
[54] Ben Elliston, Mark Diesendorf, and Iain MacGill. “Simulations of sce-
narios with 100% renewable electricity in the Australian National Elec-
tricity Market”. In: Energy Policy 45 (2012), pp. 606–613.
[55] Elaine K. Hart and Mark Z. Jacobson. “A Monte Carlo approach to
generator portfolio planning and carbon emissions assessments of sys-
tems with large penetrations of variable renewables”. In: Renewable
Energy 36.8 (Aug. 2011), pp. 2278–2286. ISSN: 0960-1481. DOI: 10 .
1016/J.RENENE.2011.01.015.
[56] A Schwarzenegger. “Research Evaluation of Wind GENERATION, So-
lar Generation, AND Storage Impact on the California Grid”. In: (2010).
114 BIBLIOGRAPHY
[77] Ahmed Khallaayoun et al. “PV and CSP integration study experience
in a Mediterranean partner country”. In: IET Renewable Power Genera-
tion 10.1 (Jan. 2016), pp. 42–49. ISSN: 1752-1416. DOI: 10.1049/iet-
rpg.2015.0142.
[78] Md Ayaz Chowdhury et al. “Transient stability of power system inte-
grated with doubly fed induction generator wind farms”. In: IET Re-
newable Power Generation 9.2 (Mar. 2015), pp. 184–194. ISSN: 1752-1416.
DOI : 10.1049/iet-rpg.2014.0035.
116 BIBLIOGRAPHY
[79] Libao Shi et al. “Effects of wind generation intermittency and volatil-
ity on power system transient stability”. In: IET Renewable Power Gen-
eration 8.5 (July 2014), pp. 509–521. ISSN: 1752-1416. DOI: 10.1049/
iet-rpg.2013.0028.
[80] K.R. Padiyar and S. Krishna. “Online Detection of Loss of Synchro-
nism Using Energy Function Criterion”. In: IEEE Transactions on Power
Delivery 21.1 (Jan. 2006), pp. 46–55. ISSN: 0885-8977. DOI: 10.1109/
TPWRD.2005.848652.
[81] Kai Sun, Stephen T. Lee, and Pei Zhang. “An Adaptive Power System
Equivalent for Real-Time Estimation of Stability Margin Using Phase-
Plane Trajectories”. In: IEEE Transactions on Power Systems 26.2 (May
2011), pp. 915–923. ISSN: 0885-8950. DOI: 10.1109/TPWRS.2010.
2055900.
[82] Kai Sun and Stephen T. Lee. “Power system security pattern recogni-
tion based on phase space visualization”. In: 2008 Third International
Conference on Electric Utility Deregulation and Restructuring and Power
Technologies. IEEE, Apr. 2008, pp. 964–969. ISBN: 978-7-900714-13-8.
DOI : 10.1109/DRPT.2008.4523546.
[83] Liancheng Wang and A.A. Girgis. “A new method for power system
transient instability detection”. In: IEEE Transactions on Power Delivery
12.3 (July 1997), pp. 1082–1089. ISSN: 08858977. DOI: 10.1109/61.
636874.
[84] D.Z. Fang et al. “Transient stability assessment using projection for-
mulations”. In: IET Generation, Transmission & Distribution 3.6 (June
2009), pp. 596–603. ISSN: 1751-8687. DOI: 10.1049/iet-gtd.2008.
0583.
[85] R. Liu, G. Verbič, and J. Ma. “A machine learning approach for fast fu-
ture grid small-signal stability scanning”. In: 2016 IEEE International
Conference on Power System Technology (POWERCON). Sept. 2016, pp. 1–
6. DOI: 10.1109/POWERCON.2016.7753894.
[86] R. Liu et al. “Fast Stability Scanning for Future Grid Scenario Analy-
sis”. In: IEEE Transactions on Power Systems 33.1 (Jan. 2018), pp. 514–
524. ISSN: 0885-8950. DOI: 10.1109/TPWRS.2017.2694048.
[87] Hesamoddin Marzooghi et al. “Generic Demand Modelling Consid-
ering the Impact of Prosumers for Future Grid Scenario Studies”. In:
(2016).
BIBLIOGRAPHY 117
[88] Liam Fahey and Robert M. Randall. Learning From the Future. Wiley,
1998.
[89] John Foster et al. Delivering a competitive Australian power system Part 2:
The challenges, the scenarios. Tech. rep. School of Economics, University
of Queensland, Australia, 2013.
[90] G. Sanchis. e-Highway2050: Europe’s future secure and sustainable elec-
tricity infrastructure. Project results. Tech. rep. 2015.
[91] “Renewable Electricity Futures for the United States”. In: IEEE Trans-
actions on Sustainable Energy 5.2 (Apr. 2014), pp. 372–378.
[92] Jaquelin Cochran, Trieu Mai, and Morgan Bazilian. “Meta-analysis of
high penetration renewable energy scenarios”. In: Renewable and Sus-
tainable Energy Reviews 29 (2014), pp. 246–253.
[93] Ben Elliston, Jenny Riesz, and Iain MacGill. “What cost for more re-
newables? The incremental cost of renewable generation – An Aus-
tralian National Electricity Market case study”. In: Renewable Energy
95 (2016), pp. 127 –139.
[94] Ben Elliston, Iain MacGill, and Mark Diesendorf. “Least cost 100%
renewable electricity scenarios in the Australian National Electricity
Market”. In: Energy Policy 59 (2013), pp. 270–282.
[95] Cory Budischak et al. “Cost-minimized combinations of wind power,
solar power and electrochemical storage, powering the grid up to
99.9% of the time”. In: Journal of Power Sources 225 (2013), pp. 60–74.
[96] J Bebic. “Power System Planning: Emerging Practices Suitable for Eval-
uating the Impact of High-Penetration Photovoltaics”. In: (2008).
[97] Jaime Quintero et al. “The impact of increased penetration of con-
verter control-based generators on power system modes of oscilla-
tion”. In: IEEE Transactions on Power Systems 29.5 (2014), pp. 2248–
2256.
[98] T. Knuppel et al. “Small-signal stability of wind power system with
full-load converter interfaced wind turbines”. In: IET Renewable Power
Generation 6.2 (2012), p. 79.
[99] M. Klein, G.J. Rogers, and P. Kundur. “A fundamental study of inter-
area oscillations in power systems”. In: IEEE Transactions on Power Sys-
tems 6.3 (1991), pp. 914–921.
118 BIBLIOGRAPHY
[100] NW Miller et al. Western Wind and Solar Integration Study Phase 3A:
Low Levels of Synchronous Generation. Tech. rep. NREL, 2015.
[101] E. Vittal, M. O’Malley, and A. Keane. “A Steady-State Voltage Stability
Analysis of Power Systems With High Penetrations of Wind”. In: IEEE
Transactions on Power Systems 25.1 (Feb. 2010), pp. 433–442.
[102] Debbie Q Zhou, U D Annakkage, and Athula D Rajapakse. “Online
Monitoring of Voltage Stability Margin Using an Artificial Neural Net-
work”. In: IEEE Transactions on Power Systems 25.3 (Aug. 2010), pp. 1566–
1574.
[103] H.A. Shayanfar, H. Razmi, and M. Teshnehlab. “Neural network based
on a genetic algorithm for power system loading margin estimation”.
In: IET Generation, Transmission & Distribution 6.11 (Nov. 2012), pp. 1153–
1163.
[104] Yan Xu et al. “An Intelligent Dynamic Security Assessment Frame-
work for Power Systems With Wind Power”. In: IEEE Transactions on
Industrial Informatics 8.4 (Nov. 2012), pp. 995–1003.
[105] Nima Amjady and Seyed Farough Majedi. “Transient Stability Predic-
tion by a Hybrid Intelligent System”. In: IEEE Transactions on Power
Systems 22.3 (Aug. 2007), pp. 1275–1283.
[106] F. Aboytes and R. Ramirez. “Transient stability assessment in longitu-
dinal power systems using artificial neural networks”. In: IEEE Trans-
actions on Power Systems 11.4 (1996), pp. 2003–2010.
[107] M. Mohammadi and G.B. Gharehpetian. “Application of core vector
machines for on-line voltage security assessment using a decision-
tree-based feature selection algorithm”. In: IET Generation, Transmis-
sion & Distribution 3.8 (Aug. 2009), pp. 701–712.
[108] T. Jain, L. Srivastava, and S.N. Singh. “Fast voltage contingency screen-
ing using radial basis function neural network”. In: IEEE Transactions
on Power Systems 18.4 (Nov. 2003), pp. 1359–1366.
[109] M Ramezani, C Singh, and M.-R. Haghifam. “Role of Clustering in
the Probabilistic Evaluation of TTC in Power Systems Including Wind
Power Generation”. In: IEEE Transactions on Power Systems 24.2 (May
2009), pp. 849–858.
BIBLIOGRAPHY 119
[121] C.A. Jensen, M.A. El-Sharkawi, and R.J. Marks. “Power system secu-
rity assessment using neural networks: feature selection using Fisher
discrimination”. In: IEEE Transactions on Power Systems 16.4 (2001),
pp. 757–763.
[122] K.R. Niazi, C.M. Arora, and S.L. Surana. “Power system security eval-
uation using ANN: feature selection using divergence”. In: Proceed-
ings of the International Joint Conference on Neural Networks, 2003. Vol. 3.
IEEE, 2003, pp. 2094–2099.
[123] K. Kira. “A Practical Approach to Feature Selection”. In: Proceedings of
International Conference on Machine Learning (1992).
[124] Z-S Lu and Z-R Hou. “Particle Swarm Optimization with Adaptive
Mutation”. In: Acta electronica sinica 32.3 (2004), pp. 416–420.
[125] R. Liu, G. Verbič, and Y. Xu. “A new reliability-driven intelligent sys-
tem for power system dynamic security assessment”. In: 2017 Aus-
tralasian Universities Power Engineering Conference (AUPEC). Nov. 2017,
pp. 1–6. DOI: 10.1109/AUPEC.2017.8282442.
[126] Miao He, Vijay Vittal, and Junshan Zhang. “Online dynamic secu-
rity assessment with missing pmu measurements: A data mining ap-
proach”. In: IEEE Transactions on Power Systems 28.2 (May 2013), pp. 1969–
1977.
[127] Guang-Bin Huang, Qin-Yu Zhu, and Chee-Kheong Siew. “Extreme
learning machine: Theory and applications”. In: Neurocomputing 70.1
(2006), pp. 489–501. ISSN: 09252312. DOI: 10 . 1016 / j . neucom .
2005.12.126.
[128] P. Pudil, J. Novovičová, and J. Kittler. “Floating search methods in
feature selection”. In: Pattern Recognition Letters 15.11 (1994), pp. 1119–
1125. ISSN: 01678655. DOI: 10.1016/0167-8655(94)90127-9.
[129] Thomas G. Dietterich. “Machine-Learning Research”. In: AI Magazine
18.4 (1997), p. 97. ISSN: 0738-4602. DOI: 10.1609/AIMAG.V18I4.
1324.
[130] Robert E. Schapire. “The strength of weak learnability”. In: Machine
Learning 5.2 (June 1990), pp. 197–227. ISSN: 0885-6125. DOI: 10.1007/
BF00116037.
[131] A Pai. Energy function analysis for power system stability. Springer Sci-
ence & Business Media, 2012.
BIBLIOGRAPHY 121
[143] A.M. Zoubir and B. Boashash. “The bootstrap and its application in
signal processing”. In: IEEE Signal Processing Magazine 15.1 (1998),
pp. 56–76. ISSN: 10535888. DOI: 10.1109/79.647043.
[144] SB Yusof, GJ Rogers, and RTH Alden. “Slow coherency based network
partitioning including load buses”. In: IEEE Transactions on Power (1993).