Data-Driven Small-Signal and N-1 Security Assessment Considering Missing Data

Majid Mostafanezhad, Mohammad Mohammadi, Shahabodin Afrasiabi, Mousa Afrasiabi, Jamshid Aghaei, C. Y. Chung

Research output: Journal article publicationJournal articleAcademic researchpeer-review

5 Citations (Scopus)

Abstract

This article proposes a modulated data-driven method to assess the small-signal and N - 1 security status in large power systems. To do so, a three-module data-driven framework is designed, including: i) auto-encoder embedded feature selection to reduce the measurement dataset dimension and enhance the computational efficiency; ii) modified generative adversarial networks to improve the robustness against incomplete data and partial observability, which preserves the interpretability of the data measured by phasor measurement units (PMUs) using a reformulated loss function and a new noise generation process; and iii) a convolutional neural network (CNN) as a strong classifier for the assessment of the small-signal and N - 1 security status. The proposed method is implemented on a 162-bus NESTA benchmark system. The results show the performance of the designed network for different cases and in comparison with several state-of-the-art methods in terms of accuracy, reliability, and computational burden. 

Original languageEnglish
Article number10192092
Pages (from-to)1-11
Number of pages11
JournalIEEE Transactions on Power Systems
DOIs
Publication statusPublished - Jul 2023

Keywords

  • Auto-encoder embedded feature selection
  • convolutional neural network
  • Convolutional neural networks
  • Feature extraction
  • Generative adversarial networks
  • incomplete data/partial observability
  • N-1 security assessment
  • Phasor measurement units
  • Power system security
  • Power systems
  • Security
  • small-signal security assessment

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Data-Driven Small-Signal and N-1 Security Assessment Considering Missing Data'. Together they form a unique fingerprint.

Cite this