Skip to main content

Gene Expression Programming Algorithm for Transient Security Classification

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7677))

Abstract

In this paper, a gene expression programming (GEP) based algorithm is implemented for power system transient security classification. The GEP algorithms as evolutionary algorithms for pattern classification have recently received attention for classification problems because they can perform global searches. The proposed methodology applies the GEP for the first time in transient security assessment and classification problems of power systems. The proposed algorithm is examined using different IEEE standard test systems. Power system three phase short circuit contingency has been used to test the proposed algorithm. The algorithm checks the static security status of the power system then classifies the transient security of the power system as secure or not secure. Performance of the algorithm is compared with other neural network based classification algorithms to show its superiority for transient security classification.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stott, B., Alsac, O., Monticelli, A.J.: Security Analysis and Optimization. Proceedings of the IEEE 75(12), 1623–1644 (1987)

    Article  Google Scholar 

  2. Moshref, A., Provencher, M., Sun, J.: An Intelligent System for Advanced Dynamic Security Assessment. In: Proceedings of the IEEE PowerCon 2002, International Conference on Power System Technology, October 13-17, vol. 1, pp. 220–224 (2002)

    Google Scholar 

  3. Santo, M.D., Vaccaro, A.: A Distributed Architecture for Online Power System Security Analysis. IEEE Trans. on Industrial Electronics 51(6), 1238–1248 (2004)

    Article  Google Scholar 

  4. Pang, C., Prabhakara, F., Al-Abiad, A., Koivo, A.: Security Evaluation in Power Systems Using Pattern Recognition. IEEE Trans. on PAS 93(2), 969–976 (1974)

    Google Scholar 

  5. Sterpu, S., Lu, W., Basenger, Y., Hadjisaid, N.: Power System Security Analysis. In: Proceedings of the IEEE Power Engineering Society General Meeting (2006)

    Google Scholar 

  6. Bizjak, G., Kerin, U., Kerbs, S.R., Lerch, E., Ruhle, O.: Vision 2020 Dynamic Security Assessment in Real time Environment. Proceedings of the IEEE (2008)

    Google Scholar 

  7. Mansour, Y., Vaahedi, E., El-Sharkawi, M.A.: Large Scale Dynamic Security Screening and Ranking using Neural Networks. IEEE Trans. on Power Systems 12(2), 954–958 (1997)

    Article  Google Scholar 

  8. Wardwick, K., Ekwue, A., Aggarwal, A.: Artificial Intelligence Techniques in Power Systems. IEE, London (1997)

    Book  Google Scholar 

  9. Bansal, R.C.: Overview and Literature Survey of Artificial Neural Networks Applications to Power Systems (1992-2004). IE (I) Journal-EL 86, 282–296 (2006)

    Google Scholar 

  10. Khattab, H.M., Abdelaziz, A.Y., Mekhamer, S.F., Badr, M.A.L.: Static Security Assessment using a Probabilistic Neural Network Based Classifier. The Online Journal on Electronics and Electrical Engineering (OJEEE) 3(4), 454–461 (2011)

    Google Scholar 

  11. Kalyani, S., Swarp, K.S.: Transient Security Assessment and Classification using Support Vector Machine. Journal of Electrical Systems (2009)

    Google Scholar 

  12. Abdul Wahab, N.I., Mohamed, A.: Transient Stability Assessment of Power Systems Using Probabilistic Neural Network with Enhanced Feature Selection and Extraction. International Journal on Electrical Engineering and Informatics 1(2), 103–114 (2009)

    Google Scholar 

  13. Kalyani, S., Swarp, K.S.: Study of Neural Network Models for Security Assessment in Power Systems. International Journal of Research and Reviews in Applied Sciences 1(2), 104–117 (2009)

    Google Scholar 

  14. Silveria, M.C., Lutofo, A.D., Minussi, C.R.: Transient Stability Analysis of Electrical Power Systems Using a Neural Network Based on Fuzzy ARTMAP. In: IEEE Bologna Power Tech. Conference, Bologna, Italy, June 23-26 (2003)

    Google Scholar 

  15. Ferreira, C.: Gene Expression Programming: A New Adaptive Algorithm for Solving Problems. Complex Systems 13(2), 87–129 (2001)

    MathSciNet  MATH  Google Scholar 

  16. Abdelaziz, A.Y., Mekhamer, S.F., Badr, M.A.L., Khattab, H.M.: Probabilistic Neural Network Classifier for Static Voltage Security Assessment of Power Systems. Electric Power Components and System 40(2), 147–160 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abdelaziz, A.Y., Mekhamer, S.F., Khattab, H.M., Badr, M.L.A., Panigrahi, B.K. (2012). Gene Expression Programming Algorithm for Transient Security Classification. In: Panigrahi, B.K., Das, S., Suganthan, P.N., Nanda, P.K. (eds) Swarm, Evolutionary, and Memetic Computing. SEMCCO 2012. Lecture Notes in Computer Science, vol 7677. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35380-2_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35380-2_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35379-6

  • Online ISBN: 978-3-642-35380-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics