{"title":"Security assessment using neural computing","authors":"B.H. Chowdhury, B. Wilamowski","doi":"10.1109/ANN.1991.213497","DOIUrl":null,"url":null,"abstract":"The advantage of fast computation capability of an artificial neural network (ANN) is used to introduce an iterative scheme for security assessment of power systems. Two related approaches are shown which demonstratedly work satisfactorily. The idea of feedback in a single-layer feedforward neural network is experimented yielding higher accuracy. The ANN is trained by using a set of data obtained from off-line analysis of the power network. After training, an approximate solution for a given condition may be found almost immediately. The approximate solution obtained is judged adequate for assessing the security of the power system. A case study is also presented for demonstrating the applicability of the approach.<<ETX>>","PeriodicalId":119713,"journal":{"name":"Proceedings of the First International Forum on Applications of Neural Networks to Power Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the First International Forum on Applications of Neural Networks to Power Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANN.1991.213497","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
The advantage of fast computation capability of an artificial neural network (ANN) is used to introduce an iterative scheme for security assessment of power systems. Two related approaches are shown which demonstratedly work satisfactorily. The idea of feedback in a single-layer feedforward neural network is experimented yielding higher accuracy. The ANN is trained by using a set of data obtained from off-line analysis of the power network. After training, an approximate solution for a given condition may be found almost immediately. The approximate solution obtained is judged adequate for assessing the security of the power system. A case study is also presented for demonstrating the applicability of the approach.<>