Abstract: This paper presents a new approach to perform on-line dynamic security assessment and monitoring of electric power systems exploiting a statistical hybrid learning technique – the Kernel Regression Trees. This technique, besides producing fast security classification, can still quantify, in real-time, the security degree of the system, by emulating continuos security indices that translate the power system dynamic behavior. Moreover it can provide interpretable security structures. The feasibility of this approach was demonstrated in the dynamic security assessment of isolated systems with large amounts of wind power production, like in the Crete island electric network (Greece). Comparative results regarding performances of Decis...
An overview of the general decision tree approach to power system security assessment is presented. ...
In this paper, we present a flexible software environment that facilitates the use of machine learni...
What follows is a summary of some of the authorsf work on two types of security problems. In this wo...
This paper presents the capabilities provided by Kernel Regression Trees - a hybrid non-parametricre...
This paper presents a new hybrid automatic learning approach, which combines artificial neural netwo...
This paper describes the application of advanced inductive inference and statistical methods to on-l...
The integration of renewable energy sources increases the operational uncertainty of electric power ...
This paper proposes a decision tree (DT)-based systematic approach for cooperative online power syst...
This paper describes the security assessment functions of an advanced control system for secure oper...
This paper addresses the on going work of the application of Machine Learning on Static Security Ass...
The last years blackouts have indicated that the operation and control of power systems may need to ...
Recently large-scale wind farms are integrated quite commonly into power systems. The stochastic ope...
The thesis concerns the development of tools and methods for on-line dynamic security assessment (DS...
Power systems transport an increasing amount of electricity, and in the future, involve more distrib...
Research Doctorate - Doctor of Philosophy (PhD)Security is a basic yet essential requirement for ope...
An overview of the general decision tree approach to power system security assessment is presented. ...
In this paper, we present a flexible software environment that facilitates the use of machine learni...
What follows is a summary of some of the authorsf work on two types of security problems. In this wo...
This paper presents the capabilities provided by Kernel Regression Trees - a hybrid non-parametricre...
This paper presents a new hybrid automatic learning approach, which combines artificial neural netwo...
This paper describes the application of advanced inductive inference and statistical methods to on-l...
The integration of renewable energy sources increases the operational uncertainty of electric power ...
This paper proposes a decision tree (DT)-based systematic approach for cooperative online power syst...
This paper describes the security assessment functions of an advanced control system for secure oper...
This paper addresses the on going work of the application of Machine Learning on Static Security Ass...
The last years blackouts have indicated that the operation and control of power systems may need to ...
Recently large-scale wind farms are integrated quite commonly into power systems. The stochastic ope...
The thesis concerns the development of tools and methods for on-line dynamic security assessment (DS...
Power systems transport an increasing amount of electricity, and in the future, involve more distrib...
Research Doctorate - Doctor of Philosophy (PhD)Security is a basic yet essential requirement for ope...
An overview of the general decision tree approach to power system security assessment is presented. ...
In this paper, we present a flexible software environment that facilitates the use of machine learni...
What follows is a summary of some of the authorsf work on two types of security problems. In this wo...