Next Article in Journal
Dynamic Observer Modeling and Minimum-Variance Self-Tuning Control of EDM Interelectrode Gap
Next Article in Special Issue
Stochastic Wind Curtailment Scheduling for Mitigation of Short-Term Variations in a Power System with High Wind Power and Electric Vehicle
Previous Article in Journal
Study on EEMD-Based KICA and Its Application in Fault-Feature Extraction of Rotating Machinery
Previous Article in Special Issue
Effectiveness of Distributed vs. Concentrated Volt/Var Local Control Strategies in Low-Voltage Grids
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Online Static Security Assessment of Power Systems Based on Lasso Algorithm

1
School of Electrical Engineering, Northeast Electric Power University, Jilin 132012, China
2
School of Electrical Engineering, Shandong University, Jinan 250061, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2018, 8(9), 1442; https://doi.org/10.3390/app8091442
Submission received: 27 July 2018 / Revised: 11 August 2018 / Accepted: 21 August 2018 / Published: 23 August 2018

Abstract

:

Featured Application

The proposed approach may find potential applications in fast evaluation of the security level of power systems and identification of the most severe cases from the entire contingency list.

Abstract

As one important means of ensuring secure operation in a power system, the contingency selection and ranking methods need to be more rapid and accurate. A novel method-based least absolute shrinkage and selection operator (Lasso) algorithm is proposed in this paper to apply to online static security assessment (OSSA). The assessment is based on a security index, which is applied to select and screen contingencies. Firstly, the multi-step adaptive Lasso (MSA-Lasso) regression algorithm is introduced based on the regression algorithm, whose predictive performance has an advantage. Then, an OSSA module is proposed to evaluate and select contingencies in different load conditions. In addition, the Lasso algorithm is employed to predict the security index of each power system operation state with the consideration of bus voltages and power flows, according to Newton–Raphson load flow (NRLF) analysis in post-contingency states. Finally, the numerical results of applying the proposed approach to the IEEE 14-bus, 118-bus, and 300-bus test systems demonstrate the accuracy and rapidity of OSSA.

1. Introduction

1.1. Background and Motivation

In power system operations, the security of a system has always been an important issue, which is related to the ability to continue normal operation in post-contingency conditions [1]. Power system security assessment is an effective tool for checking the security of power systems, which aims to determine whether, and to what extent, a power system is reasonably safe from serious interference to its operation [2,3]. Power system security assessment includes static security assessment (SSA) and dynamic security assessment (DSA). Static security assessment is concerned with factors related to the insecurity situation [4,5], such as overload, overvoltage, and so on, via the load flow calculation of the power system in post-contingency conditions. Meanwhile, dynamic security assessment mainly analyzes the transient stability of the power system after the fault of the power system according to the real-time data [6,7,8]. To predict the transient stability status by machine learning algorithms in the post-fault condition, the real-time data are respectively obtained from phasor measurement units (PMUs) in [6] and the simulation results in [7,8]. This article focuses on static security assessment problems, especially for online applications. The power system static security assessment can be divided twofold, into system monitoring and contingency analysis [9]. The system monitoring can provide the operating conditions of the power system to the operators, and the updated information contains bus voltages, currents, power flows, and so on. The contingency analysis is employed to evaluate an outage event in the power system. Once the system is in an insecure operation condition, the corresponding security controls such as preventive or corrective control actions will be started up immediately to ensure the insecure outage event back to the security condition [10,11]. Although two major factors are involved in static security assessment, contingency analysis, which includes contingency screening and ranking, plays a more critical role [9].

1.2. Literature Review

Studies of power system static security assessment have been carried out for a few years [12,13,14] that have focused on contingency screening or ranking. In order to select and screen contingencies in static security assessment, the indices representing voltages deviation and line overloads are employed in [12,13]. While in Krishnan et al. [14], a database generation method is proposed for the critical contingencies that have been screened. Thus, as a commonly used method, the severity of the power system in post-contingency conditions is evaluated by the performance indices, which are computed by the variables of power systems [15]. In Sunitha et al. [16], a single composite security index, which is obtained by Newton–Raphson load flow (NRLF) analysis, is proposed for defining the security, which provides a reference for the proposed method in this paper. The composite security index divides the power system conditions into three categories: the secure state with the index value of ‘0’; the alarm state with the index value between ‘0’ to ‘1’; and the index value greater than ‘1’, which represents an insecure state. The composite security index considers the violations of bus voltages and line flows, and avoids the selecting of index weights [16]. By adopting the security index in the proposal, the time consumed to evaluate severity could be reduced. However, in the research on static security assessment, the literature has an excessive focus on the accuracy and celerity [15,16]. Furthermore, many of these studies ignore the regulation ability of the power system by employing adjustable devices, such as the transformers and reactive power compensation devices in the power system [17,18,19]. In Li et al. [17], Dall’Anese et al. [18] and Li et al. [19], the power system demonstrated improved economic and environmental benefits by optimizing the variables of adjustable devices. Therefore, on the premise of ensuring fast and accurate screen contingencies, the effects of the adjustable devices are considered in this paper.
Due to the large computing scale of NRLF analysis for obtaining the composite security index in the contingency analysis [20], the static security assessment of a power system is a heavy task. What’s more, the online application of static security assessment has a higher requirement for efficiency. Thus, adopting machine learning methods is an accurate and powerful way for contingency analysis [21], whose speed and accuracy are suitable for online applications. There are three typical machine learning methods that can be used for static security assessment. One is the artificial neural network (ANN) algorithm [22,23,24]. In Oliveira et al. [25]. In Sunitha et al. [16], the static security index is predicted by adopting the ANN algorithm for contingency screening and ranking. In Al-Masri et al. [22] and Zhou et al. [23], the ANN algorithm is applied for enhancing the security of power systems. In Varshney et al. [24], an ANN module is employed for static security assessment, considering the voltage and load flow in the power system. Although the ANN algorithm has been employed in the literature, it is inappropriate for large-scale data modules, and the internal mechanism is difficult to understand. Another is the decision tree (DT) algorithm [25,26]. In Oliveira et al. [25], the static security assessment applies machine learning techniques, which are based on decision tree algorithms, to improve the efficiency of contingency screening and ranking. In Saeh et al. [26], a modified decision tree algorithm is employed for static security assessment. Static security problems can be assessed by adopting decision tree algorithms; however, it is possible to over-fit or trap decision tree algorithms into local minimum points [27]. In addition, the support vector machine (SVM) algorithm is another machine learning method for static security assessment [28,29]. In Kalyani et al. [28] and Kalyani et al. [29], considering line overload and voltage deviation indices in the power system, SVM algorithms are employed for evaluating static security. Nevertheless, the SVM algorithm is difficult to implement if the scale of the training sets is too large. Therefore, according to the above analyses, the prediction of the above three algorithms may be affected when static security assessment have requirements for the time-solving and calculation scales.
Studies have shown that the least absolute shrinkage and selection operator (Lasso) algorithm has stronger generalization ability and predictive performance than other machine learning methods [30,31,32,33], such as the three algorithms that have been mentioned. The Lasso algorithm has been successfully utilized in many areas of power systems, such as, the state estimation of a power system in [30], image processing in [31], and telecommunications in [32]. Lasso is also used for the prediction of the transient stability boundary in [33], while a systematic approach for categorizing the model parameters based on Lasso is presented in [34]. Compared to other learning algorithms, Lasso is more accurate and has the ability for the automatic feature selection to yield a low-dimensional solution [33]. As the observation of online static security assessment (OSSA) is essentially a high-dimensional problem, the Lasso algorithm is suitable for OSSA. However, the application of the Lasso algorithm in OSSA is finite. The proposal provides an idea for the utilization of the Lasso algorithm in the area of OSSA.

1.3. Contributions

The purpose of this paper is to develop an OSSA module based on the Lasso algorithm. In order to reduce the computation scale of real-time static security assessment, the proposed method is applied to fast and accurate contingency screening and ranking. The proposal composes the following procedure. (1) The security index PIc is used for evaluating the security of power system operating states, and the conditions can be distinguished into secure, alarmed, and insecure states. (2) The Lasso module is trained by adopting the variables in the power system, the status of all of the lines, and the corresponding security index. (3) Once the Lasso module is trained, the proposal can predict the security index based on the variables from the power system, and the operating state also can be obtained according to the value of PIc.
The main contributions of this paper are as follows. (1) In order to screen and rank the severity of contingencies, an online static security assessment module is presented considering the impacts of adjustable devices, and the operating state also can be identified via the variables of the current operating point; (2) A novel method based on the multi-step adaptive Lasso (MSA-Lasso) regression algorithm is developed for predicting the security index with the consideration of bus voltages and power flows, which is employed to evaluate the operating states; (3) Load conditions varying from 50% to 150% of the base load are considered for adapting to the changeful power system states.

1.4. Organization of This Paper

The remaining parts of this paper are organized as follows: A brief introduction of online security assessment in the power system is given in the following section. Then, the basic principle of the Lasso algorithm is provided in Section 3. Moreover, the Lasso algorithm employed for OSSA is proposed in Section 4. Case studies and results that demonstrate the effectiveness are carried out in Section 5, and finally, Section 6 gives the conclusion.

2. Online Static Security Assessment in Power System

In the modern energy management system (EMS), static security assessment is an important control method [1,2,3]. The assessment can be implemented according to the fault set. The set may contain contingencies with a single line outage, loss of generators, load variations, and so on. Line outages and load variations are considered in this paper. Then, three operating states of power systems—insecurity, alarmed, and security states—can be identified via static security assessment. The operators can take appropriate measures for each state based on the severities of faults.
In conventional practices, security assessment is solved by repeatedly computing the power flow for all of the pre-defined outage conditions. However, the size of the fault set is generally large, and changes with the load conditions of the power system. Static security assessment will consume a large amount of time, and it is difficult to achieve in online application. Hence, the rapid and accuracy of screening and ranking contingencies is a significant issue. For this purpose, the composite security index PIc is employed for evaluation, and the Lasso algorithm is applied instead of a power flow calculation to obtain the security index PIc in the paper.

3. Principles of Multi-Step Adaptive Lasso Regression Algorithm (MSA-Lasso)

The principles of Lasso are briefly introduced in this section. As a regression learning algorithm, Lasso is superior to others [30,31,32,33]. The basic idea of Lasso is to minimize the residual sum of the square, under the condition that the sum of the absolute value of the regression coefficient is less than a constant. Then, some regression coefficients are produced, and they are strictly equal to 0. For a better presentation of the Lasso regression algorithm, the algorithm model is firstly introduced. Then, the regression algorithm is displayed. In addition, the Lasso regression algorithm is compared with the Ridge Regression algorithm. Finally, the MSA-Lasso regression algorithm is discussed.

3.1. Algorithm Model

As a supervised machine learning algorithm, the original training set of this problem is:
T S = [ ( x 1 ( 0 ) , y 1 ( 0 ) ) , , ( x i ( 0 ) , y i ( 0 ) ) , , ( x S ( 0 ) , y S ( 0 ) ) ]
where x i ( 0 ) is the i th original observation vector that is constructed by controlled variables in this paper, y i ( 0 ) is the i th original response, which is the security index in this paper, and S is the size of the training set. Generally, the original observation data x i ( 0 ) needs to be standardized, while y i ( 0 ) needs to be zero-centered; the post-treatment data x i and y i are defined as:
x i = x i ( 0 ) μ x s t d x y i = y i ( 0 ) μ y
where μ x and μ y are respectively the means of x i ( 0 ) and y i ( 0 ) , and s t d x denotes the standard deviation of x i ( 0 ) . After the process, it can be ensured that i = 1 S x i = 0 , i = 1 S x i 2 = 1 , and i = 1 S y i = 0 .
Taking two-dimensional data as an example, the effect after the treatment of centralization and standardization are shown in Figure 1. From the figure, it can be clearly seen that centralization moves the center of the data to the origin point, and standardization ensures that the scale of the data have the same value in each dimension.
The regression algorithm is based on the following simplified linear model [33]:
Y = X σ + ε
where Y is the vector consisting of responses, and Y = [ y 1 , , y i , , y S ] T ; X is the S × D design observation matrix, which is formed by observation of x 1 , , x i , , x S , and the observation x i , which includes D variables, has the corresponding response y i ; σ = [ σ 1 , , σ i , , σ D ] T is the vector of regression coefficients; and ε = [ ε 1 , , ε i , , ε S ] T is the vector of random variables produced by the innovation process. For obtaining regression coefficients σ , the linear model can be solved via the least square (LS) method. The cost function f ( σ ) of the optimization problem is described as:
min f l s ( σ ) = 1 S Y X σ 2 = 1 S i = 1 S ( y i x i σ ) 2
The regression coefficients can be obtained, and the expression of estimates σ ^ is:
σ ^ = ( X T X ) 1 X T Y
If the estimates σ ^ exist, the only condition is that X is a full matrix. However, even though the condition is satisfied, large relevance features of observation data will cause big errors. Therefore, the regression algorithm is proposed to improve the situation.

3.2. Regression Algorithm

A penalty term R ( | σ i | ) is added to the regression algorithm, which is an improvement on the least square method. The cost function f ( σ ) of the regression problem is given by:
min f ( σ ) = 1 S Y X σ   2 + λ i = 1 S R ( | σ i | )
where λ 0 denotes the shrinkage tuning parameter. Equation (6) is equivalent to the following functions:
min f ( σ ) = 1 S Y X σ   2 s . t . i = 1 S R ( | σ i | ) t
where t 0 represents the tuning parameter. If the penalty term adopts L1 norm, that is R(|σi|) = |σi|, the following optimization issue can represent the Lasso regression algorithm, and the cost function is shown as:
min f l a s s o ( σ ) = 1 S Y X σ 2 + λ i = 1 S | σ i |

3.3. Multi-Step Adaptive Lasso Regression Algorithm

In order to solve the regression problem, in the basis of the classic Lasso regression algorithm which is shown as Equation (3), the constant term of estimator σ 0 is joined in the Lasso algorithm model, and it is given by:
Y = σ 0 + X σ + ε
For solving the Lasso model, the following optimization issue needs to be solved:
min f ( σ 0 , σ ) = 1 S i = 1 S l ( y i , x i , σ 0 , σ ) + λ σ
where l ( y i , x i , σ 0 , σ ) represents the function of likelihood contribution for observation x i . Aiming at solving the shortcomings of low efficiency and high complexity in the classic adaptive Lasso regression algorithm, the MSA-Lasso regression algorithm, which is realized by repeatedly using the adaptive Lasso regression algorithm, is introduced as follows.
Firstly, the Gaussian model is employed in this paper for the linear regression issue, and the above optimization issue in Equation (10) can be written as:
min f ( σ 0 , σ ) = 1 2 S i = 1 S ( y i σ 0 x i σ ) 2 + λ σ
Then, cyclic coordinate descent (CCD) is employed for solving the optimization, which is a fast method compared with others under the current research background [35]. The basic criterion of CCD is that each parameter is optimized and circulated until the conditions of the other parameters are fixed, and the coefficient is stable. Thus, the Lasso regression algorithm is implemented multiple times. Then, the current k th estimator σ ˜ k can be computed as:
σ ˜ k = s g n ( 1 S i = 1 S x i k ( y i y ˜ i ) ) ( | 1 S i = 1 S x i k ( y i y ˜ i ) | λ ) s . t . y ˜ i = σ ˜ 0 + l = 1 , j k S x i l σ ˜ l
where σ ˜ 0 and σ ˜ l ( l = 1 , , D ) are the current regression coefficients. Therefore, the model of the MSA-Lasso regression algorithm can be explained.

3.4. Parameters in This Section

In order to a better presentation of the aforementioned symbols, the main parameters in this section are listed in Table 1 as follows.

4. Online Static Security Assessment Method

The proposed OSSA method is introduced in this section, and the method contains the OSSA module and the Lasso module. The OSSA module concerns the power system operating points for screening and ranking contingencies, while the Lasso module is based on the variables of the power system and security index. By predicting the security index of the power system via the Lasso module, the system static security can be assessed online.

4.1. Overall Online Static Security Assessment Method

According to the above analysis, the overall structure of the proposed OSSA method is shown in Figure 2. The operating points are chosen as the inputs of the OSSA module, which is represented by the active power outputs P G and reactive power outputs Q G of the generators, the active loads P D and reactive loads Q D of the load buses, and the voltage amplitudes U and angles δ of the buses. In this paper, the light, normal, and heavy load conditions are considered, and the load condition randomly varies from 50% to 150% of the base load for representing different load conditions. Then, the contingency screening and ranking can be accomplished. In addition, the operating state of the corresponding operating point can be identified.
The MSA-Lasso algorithm is employed in the Lasso module, and the Lasso module is trained by taking controlled variables, which are displayed in Section 3.2 as observations, while the security index PIc is taken as a response introduced in Section 3.3. Based on the Lasso module, the OSSA can run fast and accurately.

4.2. Selection of Observations Considering Adjustable Devices

The MSA-Lasso algorithm is adopted to prediction, and the observations are divided into two parts: one part is the states of all of the lines in the power system comprising running lines, which are represented by 1, and outage lines, which are represented by 0; the other is controlled variables among the variables in an AC power system, and the controlled variables are generated randomly in their ranges.
In order to achieve better regulation and control of the power system, the impacts of the transformer and compensation equipment are taken into account in this paper. Owing to the controlled variables that vary in the process of load flow computation, they are selected as one part of the observations of the MSA-Lasso algorithm. The controlled variables and their ranges are listed as follows:
P G i min P G i P G i max , i = 1 , , N G Q G i min Q G i Q G i max ,   i = 1 , , N G U i min U i U i max , i = 1 , , N a c T i min T i T i max , i = 1 , , N T Q C i min Q C i Q C i max , i = 1 , , N C
where P G i and Q G i are respectively the active and reactive power outputs of generator i, U i is the magnitude of voltage in bus i, T i is the tap of transformer i, Q C i is the switching capacity of reactive power compensation capacitor i, and N G , N a c , N T and N C are respectively the numbers of generators, buses, adjustable transformer taps, and reactive power compensation capacitor banks in the AC power system; the upper and lower limits of each variable are distinguished by the subscripts min and max.

4.3. Selection of Responses Considering Bus Voltages and Power Flows

After NRLF analysis, the corresponding security index PIc is chosen as the response of the MSA-Lasso algorithm. The index can assess the security of the power system under N−1 contingencies [16], and PIc, which considers bus voltages and power flows, is defined as:
P I c = [ i ( q U i max ) 2 n + i ( q U i min ) 2 n + j ( q P j ) 2 n ] 1 2 n s . t .   q U i max = { U i H i max A i max H i max   ,   i f   U i > H i max 0   ,   o t h e r w i s e    q U i min = { H i min U i H i min A i min   ,   i f   U i < H i min 0   ,   o t h e r w i s e    q P j = { | P j | P H j P H j P A j ,   i f   | P j | > P H j ; 0 ,   o t h e r w i s e
where n is the exponent, and n = 2 in this paper; A i max and A i min are respectively the upper and lower alarm limits of U i ; H i max and H i min are respectively the upper and lower security limits of U i ; P A j and P H j are the upper alarm limit and security limit of the j th line active power flow P j . In this equation, q U i max and q U i min are employed for evaluating the voltage limit violations, while q P j can determine the extent of line overloading. In the power flow calculation, there are no limits of power flows; thus, the value of PIc can be very large, and the security index can better evaluate the severity of contingency caused by overloading.
By adopting the security index PIc as the response, the operating states are distinguished into three classes as following:
  • P I c = 0 , the system is in the secure state,
  • 0 < P I c 1 , the system is in the alarmed state,
  • P I c > 1 , the system is in the insecure state.
The contingencies can be identified as one of the three states, and the severity can be sorted by the values of security index PIc, where a higher value of PIc means a more serious contingency.

4.4. Solution Process of Lasso Module

According to the observations and responses of the MSA-Lasso algorithm, the solution procedures of the Lasso module are listed as follows, and the flowchart is as shown in Figure 3.
Step 1: Input the data of the network, particularly the load conditions (i.e., light, normal, heavy load conditions). Input the ranges of controlled variables in Equation 14. In addition, the steps of the discontinuous variables, T and Q C , also need to be provided.
Step 2: Set the iteration number i t e = 1 , and its maximum value i t e max .
Step 3: Calculate the load flow of the power system with randomly controlled variables in the condition that every line has an outage respectively; then, the corresponding response PIc is computed. In this step, the information is recorded, which includes the random controlled variables, the outage line, and the corresponding index PIc.
Step 4: Judge the terminate conditions. If i t e i t e max , the cyclical process comes to an end, and continues to the following steps. Otherwise, come back to Step 3, and increase the iteration number by 1.
Step 5: The Lasso module is trained with conservations and corresponding responses, where each conservation is the set formed by the random controlled variables and the status of lines, and each response is the security index PIc. Moreover, it should be noted that the size of Lasso training set S is same as the maximum iteration number itemax.
Step 6: The security index PIc can be predicted by adopting the Lasso module, with a known set of controlled variables and outage lines in the power system.

4.5. Solution Using Online Static Security Assessment Method

Based on the above overall frame of OSSA and the introduction of the Lasso module, the proposed method is discussed in this section. The online static security assessment method is presented by two parts: the OSSA module and the Lasso module. The application of the proposed method is discussed as follows.
In the OSSA module, the load condition randomly varies from 50% to 150% of the base load; thus, the load condition needs to be identified. According to the values of active loads P D and reactive loads Q D , the power system data are divided into different types for representing different load conditions.
For the determined load condition, the set is randomly generated in the post-contingency condition. The set contains the observations and responses of the Lasso algorithm, and the observations are active power outputs P G , reactive power outputs Q G , voltages U , taps of transformers T , switching capacities of reactive power compensation capacitors Q C , and the status of all of the lines that are represented by “0” and “1”; the responses are corresponding security indices PIc. The number of sets is based on the number of outage lines and types of load conditions. Meanwhile, 20% of the sets are employed as test sets, and the others are applied as training sets. Then, each training set can obtain a Lasso module after training.
Once all of the Lasso modules are trained, the Lasso algorithm can be employed for predicting the security index PIc of a certain load condition with the line outage. According to the value of PIc, the operating state of the power system can be identified, and the contingencies can be sorted and screened.

4.6. Parameters in This Section

In order to obtain a better presentation, the aforementioned symbols, the main parameters in this section are listed in Table 2 as follows.

5. Case Studies

The IEEE 14-bus, 118-bus, and 300-bus systems are analyzed in this section. The programs of all of the algorithms are performed by a desktop computer with 3.40 GHz central processing unit (CPU) basic frequency and 4 GB memory in MATLAB 2013a. The effectiveness of the proposal is verified through the comparison of the actual value and predictive value of the index. Then, the security indicators are sorted for assessing the severities of contingencies.
In the test systems, the outages of every line are considered, except the lines that are the only line connected to the generator. The upper and lower alarm limits are ±5% of the desired bus voltage, and the upper and lower of security limits are ±7%. The alarm limit of line flow is 80% of the security limit. The observations and responses of the Lasso algorithm are listed in Table 3. In the table, L represents the status of all of the lines with “0” or “1”.
Moreover, under normal operating conditions, the ranges of active power output P G and reactive power output Q G are set according to the IEEE standard examples [36], the voltage U ranges from 0.95 p.u. to 1.05 p.u., the transformer tap T ranges from 0.9 p.u. to 1.1 p.u., and the switching capacity Q C ranges from 0 p.u. to 0.5 p.u. The steps of transformer tap T and switching capacity Q C are respectively 0.125 p.u. and 0.01 p.u.

5.1. IEEE 14-Bus System

5.1.1. Case Introduction

The IEEE 14-bus system in the literature [1,17,36] is used as a test case to examine the effectiveness of the proposed approach. This system includes five generators, 11 loads, 20 branches, three adjustable transformers, and one reactive power compensation device (connected to bus 9), as shown in Figure 4.
In the case of the 14-bus system, 19 lines are considered for the N−1 contingencies analysis. The line 7–8 (L 14) is not taken into account, because it is the only line connected to the generator. The load condition randomly varies from 50% to 150% of the base load; 950 sets are generated for the MSA-Lasso algorithm, where 20% of the sets are employed for test sets, and the others are applied as training sets [15]. It should be noted that more sets can be generated if necessary. Once the Lasso model is trained, it can be used for predicting the security indices.

5.1.2. Base Load Condition

Under the condition of N−1 contingencies in the normal load conditions of the IEEE 14-bus system, the values of security index PIc are computed by using the NRLF analysis results and predicted by adopting the MSA-Lasso, ANN, and SVM algorithms. One of the ANN algorithms, the back-propagation (BP) neural network, is employed in this paper, and it is a relatively commonly used ANN algorithm [9]. The parameter settings of each algorithm are listed in Table 4, and the comparison of times for contingency screening and ranking by adopting these methods are listed in Table 5.
It can be obviously seen that the time of the proposed module is faster than the others. So, the proposal is more available for online applications. The tested controlled variables are listed in Table 6, with the considerations of adjustable transformer taps and reactive power compensation capacitor banks.
The detailed comparisons of PIc are listed in Table 7, and the relative errors are listed in Table 8, with each branch exiting from operation. In addition, the ANN and SVM algorithms are employed for contrast, and the results are also listed in the tables.
From the above two tables, it can be seen that the values of PIc obtained by algorithm prediction are basically close to those obtained by direct calculation. Compared with ANN and SVM, the MSA-Lasso algorithm has the advantage for predicting the security indices PIc, because the maximum relative error of MSA-Lasso is the smallest among the three algorithms. For a better presentation, the relative errors are shown in Figure 5.
As shown in Figure 5, the MSA-Lasso algorithm has a narrow error range of initiation in the three algorithms, which means that the MSA-Lasso algorithm is more stable and accurate than the others. Further discussion of the comparisons is based on the boxplot of relative errors, as shown in Figure 6.
In the figure, the red crosses represent the mean of errors, and the red lines are the median (50th percentile) of the errors. From the above figure, it can be seen that although the median of ANN is the best, the mean of MSA-Lasso is closer to zero. Thus, MSA-Lasso has a small deviation in the three algorithms. By comparing the lengths of the boxes that reflect dispersion, it is obvious that MSA-Lasso is the best. Therefore, it can be concluded that the MSA-Lasso algorithm has an advantage in the predictions compared with other algorithms. Then, the security indices are sorted in descending order, and the larger value of PIc means that the contingency is more serious. The sorted results of all of the lines are listed in Table 9, and the digits represent branch numbers.
From the results, it is clear that the ranking of the MSA-Lasso algorithm is the same as that via NRLF. However, the ANN and SVM algorithms have little differences with NRLF. The results show that the MSA-Lasso algorithm is more suitable for the prediction of security indices. The reason why the others have different orders is that the three algorithms are all biased estimation algorithms [33]; the prediction errors may affect the contingency ranking orders when the values of PIc are relatively close. The ranking results with the descending order of index values via the NFLR method are shown in Figure 7.
From the above analysis, the proposal has proven that it is effective on the base load condition of the IEEE 14-bus system, since it can predict the security index within a small error, and all of the lines can be identified in a proper order.

5.1.3. Light and Heavy Load Conditions

For testing the accuracy of the prediction of the MSA-Lasso, ANN, and SVM algorithms in the light and heavy load conditions of the IEEE 14-bus system, 80% and 110% of the base load situations are employed for representing light and heavy conditions, respectively. The tested controlled variables are still applied to the variables in Table 6. The ranking results of each condition, with the descending order of the NRLF method, are shown in Table 10 and Table 11.
With the analysis of the light, normal, and heavy load conditions, it can be seen that the rankings of the security indices are basically the same. In addition, with the aggravating of loads, the insecure states will gradually increase.
From the results in this section, the conclusion can be drawn that the MSA-Lasso algorithm is also suitable for the light and heavy load conditions of the IEEE 14-bus system. With the utilization of MSA-Lasso, the severities of the N−1 contingencies can be ranked, and the contingencies can be screened.

5.2. IEEE 118-Bus System

The IEEE 118-bus system [9,16,20,36], which has 54 generators, 91 loads, 186 branches, nine adjustable transformers, and 12 reactive power compensation devices, is then utilized for examining the effectiveness. A single line diagram of the system is shown in Figure 8.
In the case of the 118-bus system, 179 lines are considered for the N−1 contingencies analysis. In addition, 8950 sets are generated for the MSA-Lasso algorithm.

5.2.1. Base Load Conditions

Under the condition of N−1 contingencies in the normal load conditions of the IEEE 118-bus system, the values of PIc are respectively calculated by employing NRLF analysis and the MSA-Lasso algorithm. Some 30 branches account for more than 15% of all lines, and are randomly selected in two results obtained by the two methods [16], which can represent different operating states of the power system. With descending order of PIc values obtained by NRLF, the outage lines, corresponding PIc, and relative errors are listed in Table 12.
From the above comparison, it can be seen that the results calculated by NRLF and predicted by the MSA-Lasso algorithm have essentially the same ranking. What’s more, the security index value of the MSA-Lasso prediction has little difference with that of direct computation in the same outage line. The different orders appear in the alarm states ( 0 < P I c 1 ), and the values of indices are so close that the errors affect the ranking. The differences in alarm operating states will not affect screening contingencies [16]. Therefore, the MSA-Lasso algorithm is still effective in the IEEE 118-bus system.
The computation time of the proposed OSSA module is then compared with that of NRLF and that from the literature [16] by using a multi-layer feed forward network (MLFFN) and radial basis function network (RBFN). From the Table 13, it is clear that MSA-Lasso is more rapid in the OSSA application.
From the above analysis, the Lasso module is suitable for online application, and the effectiveness of the proposed method for 118-bus systems is verified.

5.2.2. Light and Heavy Load Conditions

For testing the effectiveness of the proposed method in light and heavy load conditions of the IEEE 118-bus system, 80% and 110% of the base load situations are respectively employed. The tested controlled variables are the same as those in Section 5.2.1. The ranking results of each condition in descending order are shown in Table 14.
From the data of Table 12 and the above table in the IEEE 118-bus system, it can be seen that the rankings of the outage lines are basically the same. Moreover, for the same outage line, the heavier loads cause a large security index value, and the conclusion can be drawn that the proposal is suitable for light, normal, and heavy load conditions in the larger scale system.

5.3. IEEE 300-Bus System

For examining the effectiveness of large-scale power systems, the IEEE 300-bus system is applied as an example in this paper, which has 69 generators, 68 loads, 411 branches, 107 adjustable transformers, and 14 reactive power compensation devices [18]; the system is available in [36].
In this case, 342 lines are considered, and 17,100 sets are generated for the MSA-Lasso algorithm.

5.3.1. Base Load Conditions

Under the condition of N−1 contingencies in the IEEE 300-bus system, the values of security index PIc are computed by using two methods, which are respectively calculation by NPLF and prediction via the MSA-Lasso algorithm. The time for contingency screening and ranking by adopting the proposed module is 4.1732 s, while the computation time is 76.8578 s by using NPLF. Obviously, the proposal is available for online application. Some 60 branches accounting for more than 15% of all of the lines are randomly selected, which can represent different operating states of the power system. The results of PIc by adopting two ways, and the relative errors, are listed in Table 15 in the descending order of the NPLF method.
From the above table, it can be seen that the values of PIc obtained by adopting the two methods have similar ranking results, and the contingencies can also be screened. Thus, the conclusion can be drawn that the proposal is also effective for large-scale power systems.

5.3.2. Light and Heavy Load Conditions

For testing the effectiveness of the proposed method in light and heavy load conditions of the IEEE 300-bus system, the conditions of 80% and 110% of base load are respectively applied. The tested controlled variables are the same as those in Section 5.3.1. The ranking results of light and heavy conditions in descending order are shown in Table 16.
From the values of the security indices in Table 16, a similar conclusion can be drawn that the rankings are almost unchanged, and increasing the loads will lead to serious consequences. What’s more, the effectiveness of the proposal in the IEEE 300-bus system is verified.

6. Conclusions

In terms of fast and accurate contingency screening and ranking, an online static security assessment module based on a multi-step adaptive Lasso regression algorithm is proposed in this paper. The proposed approach is examined on the IEEE 14-bus, 118-bus, and 300-bus test systems, and the results indicate that this approach manages to handle this issue with reduced time, and is suitable for online application. The following conclusions can be drawn from the work:
(1)
Based on the online static security assessment module in this paper, the issues, which include operating state identifying and contingency screening and ranking, can be solved quickly and accurately. What’s more, the operating state considers the impacts of transformers and compensation devices, and subsequently realizes better control of power systems.
(2)
Due to the proposed method not needing to calculate a large number of load flow under the conditions of contingencies and the MSA-Lasso algorithm having more accuracy than the other learning algorithm, it is suitable for an online assessment of the static security of power systems.
(3)
Considering the current various operating states of power systems, the proposed method analyzed different load conditions that varied from 50% to 150% of the base load. Through online static security assessment modules in different load conditions, the MSA-Lasso algorithm can assess the static security problems in the normal, light, and heavy load conditions.
Future research will focus on considering parallel computation techniques in machine learning methods [12]. It will be interesting to develop an efficient version to improve the practicality of the presented approach for real-world applications. Moreover, with the increment of renewable energy and energy storage embedded into the power system [37,38,39], the research of static security assessment considering renewable energy and load uncertainty [40] and integrated energy systems [41] is a meaningful topic.

Author Contributions

Conceptualization, Y.L. (Yang Li); Methodology, Y.L. (Yang Li) and Y.L. (Yahui Li); Software, Y.L. (Yahui Li); Validation, Y.L. (Yang Li), Y.L. (Yahui Li) and Y.S.; Formal Analysis, Y.L. (Yang Li) and Y.L. (Yahui Li); Investigation, Y.L. (Yang Li) and Y.L. (Yahui Li); Resources, Y.L. (Yang Li); Data Curation, Y.L. (Yang Li); Writing-Original Draft Preparation, Y.L. (Yahui Li); Writing-Review & Editing, Y.L. (Yang Li); Visualization, Y.L. (Yang Li) and Y.L. (Yahui Li); Supervision, Y.L. (Yang Li) and Y.S.; Project Administration, Y.L. (Yang Li); Funding Acquisition, Y.L. (Yang Li).

Funding

This research was funded by the China Scholarship Council (CSC) grant number 201608220144, and the National Natural Science Foundation of China grant number 51677023.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

OSSAOnline static security assessment
SSAStatic security assessment
DSADynamic security assessment
NRLFNewton–Raphson load flow
LassoLeast absolute shrinkage and selection operator
MSA-LassoMulti-step adaptive least absolute shrinkage and selection operator
ANNArtificial neural network
SVMSupport vector machine
Y The vector consisting of responses
X The input matrix that is formed by observations
S The size of the training set
D The number of controlled variables
λ The shrinkage tuning parameter
P G Active power output of generator
Q G Reactive power output of generator
N G The number of generators
P D Active load of load bus
Q D Reactive load of load bus
U Voltage amplitude of bus
δ Voltage angle of bus
N a c The numbers of buses
T The tap of transformer
N T The numbers of adjustable transformer taps
Q C The switching capacity of reactive power compensation capacitor
N C The numbers of reactive power compensation capacitor banks
P I c The composite security index

References

  1. Le, D.D.; Berizzi, A.; Bovo, C.A. Probabilistic security assessment approach to power systems with integrated wind resources. Renew. Energy 2016, 85, 114–123. [Google Scholar] [CrossRef]
  2. Morison, K.; Wang, L.; Kundur, P. Power system security assessment. IEEE Power Energy Mag. 2004, 2, 30–39. [Google Scholar] [CrossRef]
  3. Jensen, C.A.; El-Sharkawi, M.A.; Marks, R.J. Power system security assessment using neural networks: Feature selection using Fisher discrimination. IEEE Trans. Power Syst. 2001, 4, 757–763. [Google Scholar] [CrossRef]
  4. Jiongcong, C.H.E.N.; Liang, G.; Zexiang, C.A.I.; Chunchao, H.U.; Yan, X.U.; Fengji, L.U.O.; Junhua, Z.H.A.O. Impact analysis of false data injection attacks on power system static security assessment. J. Mod. Power Syst. Clean Energy 2016, 4, 496–505. [Google Scholar] [CrossRef]
  5. Chen, D.; Jiang, H.; Li, Y.; Xu, D. A Two-layered parallel static security assessment for large-scale grids based on GPU. IEEE Trans. Smart Grid 2017, 8, 1396–1405. [Google Scholar] [CrossRef]
  6. Li, Y.; Yang, Z. Application of EOS-ELM with binary Jaya-based feature selection to real-time transient stability assessment using PMU data. IEEE Access 2017, 5, 23092–23101. [Google Scholar] [CrossRef]
  7. Geeganage, J.; Annakkage, U.D.; Weekes, T.; Archer, B.A. Application of energy-based power system features for dynamic security assessment. IEEE Trans. Power Syst. 2015, 30, 1957–1965. [Google Scholar] [CrossRef]
  8. Konstantelos, I.; Jamgotchian, G.; Tindemans, S.H.; Duchesne, P.; Cole, S.; Merckx, C.; Strbac, G.; Panciatici, P. Implementation of a massively parallel dynamic security assessment platform for large-scale grids. IEEE Trans. Smart Grid 2017, 8, 1417–1426. [Google Scholar] [CrossRef]
  9. Javan, D.S.; Mashhadi, H.R.; Rouhani, M.A. Fast static security assessment method based on radial basis function neural networks using enhanced clustering. Int. J. Electr. Power Energy Syst. 2013, 44, 988–996. [Google Scholar] [CrossRef]
  10. Vieira, D.; Nunes, M.; Bezerra, U. Decision tree-based preventive control applications to enhance fault ride through capability of doubly-fed induction generator in power systems. Energies 2018, 11, 1760. [Google Scholar] [CrossRef]
  11. Zhang, W.; Xu, Y.; Dong, Z.; Wong, K.P. Robust security constrained-optimal power flow using multiple microgrids for corrective control of power systems under uncertainty. IEEE Trans. Ind. Inform. 2017, 13, 1704–1713. [Google Scholar] [CrossRef]
  12. Verma, K.; Niazi, K.R. Supervised learning approach to online contingency screening and ranking in power systems. Int. J. Electr. Power Energy Syst. 2012, 38, 97–104. [Google Scholar] [CrossRef]
  13. Varshney, S.; Srivastava, L.; Pandit, M. A parallel computing approach for integrated security assessment of power system. Int. J. Electr. Power Energy Syst. 2016, 78, 591–599. [Google Scholar] [CrossRef]
  14. Krishnan, V.; McCalley, J.D.; Henry, S.; Issad, S. Efficient database generation for decision tree based power system security assessment. IEEE Trans. Power Syst. 2011, 26, 2319–2327. [Google Scholar] [CrossRef]
  15. Sekhar, P.; Mohanty, S. An online power system static security assessment module using multi-layer perceptron and radial basis function network. Int. J. Electr. Power Energy Syst. 2016, 76, 165–173. [Google Scholar] [CrossRef]
  16. Sunitha, R.; Kumar, S.K.; Mathew, A.T. Online static security assessment module using artificial neural networks. IEEE Trans. Power Syst. 2013, 28, 4328–4335. [Google Scholar] [CrossRef]
  17. Li, Y.; Li, G.; Zhao, D.; Chen, C. Two-stage multi-objective OPF for AC/DC grids with VSC-HVDC: Incorporating decisions analysis into optimization process. Energy 2018, 147, 286–296. [Google Scholar] [CrossRef]
  18. Dall’Anese, E.; Simonetto, A. Optimal power flow pursuit. IEEE Trans. Smart Grid 2018, 9, 942–952. [Google Scholar] [CrossRef]
  19. Li, Q.; Vittal, V. Convex hull of the quadratic branch AC power flow equations and its application in radial distribution networks. IEEE Trans. Power Syst. 2018, 33, 839–850. [Google Scholar] [CrossRef]
  20. Yorino, N.; Abdillah, M.; Sasaki, Y.; Zoka, Y. Robust power system security assessment under uncertainties using bi-level optimization. IEEE Trans. Power Syst. 2018, 33, 352–362. [Google Scholar] [CrossRef]
  21. Chen, Y.; Xu, Z.; Østergaard, J. Security assessment for intentional island operation in modern power system. Electr. Power Syst. Res. 2011, 81, 1849–1857. [Google Scholar] [CrossRef]
  22. Al-Masri, A.N.; Ab Kadir, M.Z.A.; Hizam, H.; Mariun, N. Simulation of an adaptive artificial neural network for power system security enhancement including control action. Appl. Soft Comput. 2015, 29, 1–11. [Google Scholar] [CrossRef]
  23. Zhou, Q.; Davidson, J.; Fouad, A.A. Application of artificial neural networks in power system security and vulnerability assessment. IEEE Trans. Power Syst. 1994, 9, 525–532. [Google Scholar] [CrossRef]
  24. Varshney, S.; Srivastava, L.; Pandit, M. ANN based integrated security assessment of power system using parallel computing. Int. J. Electr. Power Energy Syst. 2012, 42, 49–59. [Google Scholar] [CrossRef]
  25. Oliveira, W.D.; Vieira, J.P.; Bezerra, U.H.; Martins, D.A.; Rodrigues, B.D.G. Power system security assessment for multiple contingencies using multiway decision tree. Electr. Power Syst. Res. 2017, 148, 264–272. [Google Scholar] [CrossRef]
  26. Saeh, I.S.; Mustafa, M.W.; Mohammed, Y.S.; Almaktar, M. Static security classification and evaluatio1n classifier design in electric power grid with presence of PV power plants using C-4.5. Renew. Sust. Energy Rev. 2016, 56, 283–290. [Google Scholar] [CrossRef]
  27. Segatori, A.; Marcelloni, F.; Pedrycz, W. On distributed fuzzy decision trees for big data. IEEE Trans. Fuzzy Syst. 2018, 26, 174–192. [Google Scholar] [CrossRef]
  28. Kalyani, S.; Swarup, K.S. Pattern analysis and classification for security evaluation in power networks. Int. J. Electr. Power Energy Syst. 2013, 44, 547–560. [Google Scholar] [CrossRef]
  29. Kalyani, S.; Swarup, K.S. Classification and assessment of power system security using multiclass SVM. IEEE Trans. Syst. Man Cybern. C Appl. Rev. 2011, 41, 753–758. [Google Scholar] [CrossRef]
  30. Majidi, M.; Etezadi-Amoli, M.; Livani, H. Distribution system state estimation using compressive sensing. Int. J. Electr. Power Energy Syst. 2017, 88, 175–186. [Google Scholar] [CrossRef]
  31. Jiang, J.; Ma, J.; Chen, C.; Jiang, X.; Wang, Z. Noise robust face image super-resolution through smooth sparse representation. IEEE Trans. Cybern. 2017, 47, 3991–4002. [Google Scholar] [CrossRef] [PubMed]
  32. Eltayeb, M.E.; Al-Naffouri, T.Y.; Bahrami, H.R. Compressive sensing for feedback reduction in MIMO broadcast channels. IEEE Trans. Commun. 2014, 62, 3209–3222. [Google Scholar] [CrossRef]
  33. Lv, J.; Pawlak, M.; Annakkage, U.D. Prediction of the transient stability boundary using the lasso. IEEE Trans. Power Syst. 2013, 28, 281–288. [Google Scholar] [CrossRef]
  34. Rasouli, M.; Lagoa, C. A nonlinear term selection method for improving synchronous machine parameters estimation. Int. J. Electr. Power Energy Syst. 2017, 85, 77–86. [Google Scholar] [CrossRef]
  35. Gui, J.; Liu, T.; Sun, Z.; Tao, D.; Tan, T. Fast supervised discrete hashing. IEEE Trans. Pattern Anal. Mach. Intell. 2018, 40, 490–496. [Google Scholar] [CrossRef] [PubMed]
  36. Zimmerman, R.D.; Murillo-Sánchez, C.E.; Thomas, R.J. MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 2011, 26, 12–19. [Google Scholar] [CrossRef]
  37. Li, Y.; Feng, B.; Li, G.; Qi, J.; Zhao, D.; Mu, Y. Optimal distributed generation planning in active distribution networks considering integration of energy storage. Appl. Energy 2018, 210, 1073–1081. [Google Scholar] [CrossRef]
  38. Li, Q.; Ayyanar, R.; Vittal, V. Convex optimization for DES planning and operation in radial distribution systems with high penetration of photovoltaic resources. IEEE Trans. Sustain. Energy 2016, 7, 985–995. [Google Scholar] [CrossRef]
  39. Li, Y.; Yang, Z.; Li, G.; Zhao, D.; Tian, W. Optimal scheduling of an isolated microgrid with battery storage considering load and renewable generation uncertainties. IEEE Trans. Ind. Electron. 2018. [Google Scholar] [CrossRef]
  40. Jin, P.; Li, Y.; Li, G.; Chen, Z.; Zhai, X. Optimized hierarchical power oscillations control for distributed generation under unbalanced conditions. Appl. Energy 2017, 194, 343–352. [Google Scholar] [CrossRef]
  41. Li, Y.; Wang, J.; Zhao, D.; Li, G.; Chen, C. A two-stage approach for combined heat and power economic emission dispatch: Combining multi-objective optimization with integrated decision making. Energy 2018, 162, 985–995. [Google Scholar] [CrossRef]
Figure 1. The effect after the treatment of data. (a) Original data; (b) Centralized data; (c) Standardized data.
Figure 1. The effect after the treatment of data. (a) Original data; (b) Centralized data; (c) Standardized data.
Applsci 08 01442 g001
Figure 2. Overall structure of the online static security assessment method.
Figure 2. Overall structure of the online static security assessment method.
Applsci 08 01442 g002
Figure 3. Solution process of the least absolute shrinkage and selection operator (Lasso) module.
Figure 3. Solution process of the least absolute shrinkage and selection operator (Lasso) module.
Applsci 08 01442 g003
Figure 4. Single line diagram of the IEEE 14-bus system.
Figure 4. Single line diagram of the IEEE 14-bus system.
Applsci 08 01442 g004
Figure 5. Security indices of each method in the base load condition of the IEEE 14-bus system.
Figure 5. Security indices of each method in the base load condition of the IEEE 14-bus system.
Applsci 08 01442 g005
Figure 6. Boxplot of relative errors in the base load condition of the IEEE 14-bus system.
Figure 6. Boxplot of relative errors in the base load condition of the IEEE 14-bus system.
Applsci 08 01442 g006
Figure 7. Ranking results of each method in the base load condition of the IEEE 14-bus system.
Figure 7. Ranking results of each method in the base load condition of the IEEE 14-bus system.
Applsci 08 01442 g007
Figure 8. Single line diagram of the IEEE 118-bus system.
Figure 8. Single line diagram of the IEEE 118-bus system.
Applsci 08 01442 g008
Table 1. The main parameters in Section 3.
Table 1. The main parameters in Section 3.
ParameterMeaning
x i ( 0 ) The i th original observation vector
y i ( 0 ) The i th original response
x i The i th post-treatment observation vector
y i The i th post-treatment response
S The size of the training set
D The number of variables
X The S × D design observation matrix formed by observation vectors
Y The response vector consisting of S responses
λ The shrinkage tuning parameter
σ The vector of regression coefficients
Table 2. The main parameters in Section 4.
Table 2. The main parameters in Section 4.
ParameterMeaning
P G Active power outputs of generators
Q G The reactive power outputs of generators
P D Active loads of load buses
Q D Reactive loads of load buses
UVoltage amplitudes of buses
δVoltage angles of buses
T Taps of transformers
Q C Switching capacities of reactive power compensation capacitors
A i Alarm limits of U i
H i Security limits of U i
P A Upper alarm limit of line active power flow
P H Upper security limit of line active power flow
PIcSecurity index
Table 3. Observations and responses of the Lasso algorithm.
Table 3. Observations and responses of the Lasso algorithm.
ParameterObservationResponse
Variable P G Q G U T Q C L PIc
Table 4. Parameter settings of the three algorithms. MSA-Lasso: multi-step adaptive Lasso; ANN: artificial neural network; SVM: support vector machine.
Table 4. Parameter settings of the three algorithms. MSA-Lasso: multi-step adaptive Lasso; ANN: artificial neural network; SVM: support vector machine.
AlgorithmParameterValue
MSA-LassoPenalty parameter1
Number of shrinkage tuning parameters100
ANNHidden layer nodes5
Epochs100
Learning rate0.1
Goal0.001
SVMPenalty parameter1000
Kernel parameter0.01
Table 5. Comparison of computation times of a 14-bus system. NRLF: Newton–Raphson load flow.
Table 5. Comparison of computation times of a 14-bus system. NRLF: Newton–Raphson load flow.
MethodNRLFMSA-LassoANNSVM
Time (s)0.25290.07830.10520.0927
Table 6. Tested controlled variables of the IEEE 14-bus system.
Table 6. Tested controlled variables of the IEEE 14-bus system.
VariableValue (p.u.)VariableValue (p.u.)
P G 1 2.3597 U 5 1.0075
P G 2 0.3753 U 6 1.0076
P G 3 0 U 7 0.9607
P G 4 0 U 8 1.0047
P G 5 0 U 9 0.9510
Q G 1 −0.0165 U 10 0.9528
Q G 2 0.3743 U 11 0.9760
Q G 3 0.0206 U 12 0.9886
Q G 4 0.4733 U 13 0.9805
Q G 5 0.2509 U 14 0.9441
U 1 1.0500 T 1 0.17
U 2 1.0266 T 2 1.075
U 3 0.9689 T 3 1.025
U 4 0.9993 Q C 1 1.025
Table 7. Security index results of each method in the base load condition of the IEEE 14-bus system.
Table 7. Security index results of each method in the base load condition of the IEEE 14-bus system.
Outage LineNRLFMSA-Lasso PredictionANN PredictionSVM Prediction
L 1(1–2)0.64670.64850.64300.6392
L 2(1–5)0.40650.40690.40900.4046
L 3(2–3)0.41840.41710.41880.4163
L 4(2–4)0.47980.48080.48420.4843
L 5(2–5)0.35060.35150.34810.3519
L 6(3–4)0.14700.14720.14690.1475
L 7(4–5)0.78020.78140.77520.7766
L 8(4–7)0.27650.27690.27880.2790
L 9(4–9)0.63340.63290.62820.6393
L 10(5–6)0.15860.15870.15950.1585
L 11(6–11)2.19602.19092.18582.2013
L 12(6–12)0.53270.53330.53640.5329
L 13(6–13)2.55322.54502.53562.5377
L 15(7–9)2.17492.17142.18592.1687
L 16(9–10)0.43270.43130.43100.4304
L 17(9–14)1.04991.04701.05581.0458
L 18(10–11)1.33611.33871.33491.3322
L 19(12–13)0.38160.38200.38450.3818
L 20(13–14)2.44782.44452.43502.4317
Table 8. Relative errors of each method in the base load condition of the IEEE 14-bus system.
Table 8. Relative errors of each method in the base load condition of the IEEE 14-bus system.
Outage lineErrors of MSA-Lasso (%)Errors of ANN (%)Errors of SVM (%)
L 1(1–2)0.2909−0.5716−1.1521
L 2(1–5)0.08570.6023−0.4704
L 3(2–3)−0.31480.1012−0.4888
L 4(2–4)0.20330.89920.9360
L 5(2–5)0.2789−0.70090.3732
L 6(3–4)0.0790−0.06550.3152
L 7(4–5)0.1494−0.6513−0.4715
L 8(4–7)0.15320.83950.9044
L 9(4–9)−0.0933−0.82910.9291
L 10(5–6)0.06410.5136−0.0713
L 11(6–11)−0.2285−0.46080.2441
L 12(6–12)0.11060.67710.0276
L 13(6–13)−0.3212−0.6900−0.6056
L 15(7–9)−0.16300.5034−0.2870
L 16(9–10)−0.3028−0.3842−0.5136
L 17(9–14)−0.27990.5574−0.3959
L 18(10–11)0.1988−0.0852−0.2870
L 19(12–13)0.11360.75020.0576
L 20(13–14)−0.1336−0.5202−0.6567
Table 9. Ranking of security indices in the base load condition of the IEEE 14-bus system.
Table 9. Ranking of security indices in the base load condition of the IEEE 14-bus system.
MethodRanking
NRLFL 13L 20L 11L 15L 18L 17L 7L 1L 9L 12L 4L 16L 3L 2L 19L 5L 8L 10L 6
MSA-LassoL 13L 20L 11L 15L 18L 17L 7L 1L 9L 12L 4L 16L 3L 2L 19L 5L 8L 10L 6
ANNL 13L 20L 15L 11L 18L 17L 7L 1L 9L 12L 4L 16L 3L 2L 19L 5L 8L 10L 6
SVML 13L 20L 11L 15L 18L 17L 7L 9L 1L 12L 4L 16L 3L 2L 19L 5L 8L 10L 6
Table 10. Security index results of each method in the light load condition of the IEEE 14-bus system.
Table 10. Security index results of each method in the light load condition of the IEEE 14-bus system.
Outage LineNRLFMSA-Lasso PredictionANN PredictionSVM Prediction
L 20(13–14)1.95571.95001.96771.9786
L 13(6–13)1.88061.88291.87901.8698
L 11(6–11)1.77811.77391.78801.8013
L 15(7–9)1.56231.56211.57171.5622
L 18(10–11)0.99840.99950.99310.9977
L 17(9–14)0.51780.51620.51460.5190
L 7(4–5)0.38780.38700.38900.3899
L 9(4–9)0.30140.30050.30400.3018
L 12(6–12)0.21110.21180.21110.2102
L 1(1–2)0.15500.15510.15510.1564
L 4(2–4)0.14480.14510.14570.1453
L 16(9–10)0.13350.13340.13250.1330
L 2(1–5)0.09850.09850.09780.0978
L 19(12–13)0.08320.08300.08310.0843
L 3(2–3)0.07480.07500.07530.0749
L 5(2–5)0.04170.04170.04190.0417
L 6(3–4)0000
L 8(4–7)000.00130
L 10(5–6)0000
Table 11. Security index results of each method in the heavy load condition of the IEEE 14-bus system.
Table 11. Security index results of each method in the heavy load condition of the IEEE 14-bus system.
Outage LineNRLFMSA-Lasso LredictionANN PredictionSVM Prediction
L 13(6–13)2.91152.91482.89152.9455
L 20(13–14)2.71382.72062.71422.7071
L 15(7–9)2.51162.50622.50202.4787
L 11(6–11)2.42842.43432.42612.4788
L 18(10–11)1.52781.52761.53971.5399
L 17(9–14)1.32591.32781.31541.3394
L 1(1–2)1.00561.00441.00171.0093
L 7(4–5)0.98900.98880.98450.9860
L 9(4–9)0.81180.81280.80920.8155
L 12(6–12)0.70240.70150.70270.7021
L 4(2–4)0.66490.66580.66240.6723
L 3(2–3)0.61200.61040.61320.6128
L 16(9–10)0.59460.59260.59790.6003
L 2(1–5)0.57270.57330.57200.5710
L 19(12–13)0.53880.53870.54120.5358
L 5(2–5)0.51550.51410.51660.5171
L 8(4–7)0.46150.46220.45850.4624
L 10(5–6)0.38500.38600.38390.3872
L 6(3–4)0.30780.30810.30910.3086
Table 12. Security index results of two methods in the base load condition of the IEEE 118-bus system.
Table 12. Security index results of two methods in the base load condition of the IEEE 118-bus system.
Outage LineNRLFMSA-LassoRelative Error (%)
L 133(85–86)45.398345.51130.2490
L 7(8–9)5.67765.6735−0.0724
L 97(64–65)3.21013.21490.1500
L 60(34–43)2.60392.5991−0.1851
L 121(77–78)1.78911.7866−0.1439
L 104(65–68)1.58201.58410.1347
L 128(77–82)1.39251.39610.2607
L 74(53–54)1.35131.3500−0.0965
L 40(29–31)1.29951.30230.2105
L 147(94–95)1.27481.27570.0679
L 155(94–100)1.13961.1389−0.0633
L 160(100–101)0.87590.87800.2436
L 156(95–96)0.86730.86850.1333
L 68(45–49)0.76810.76990.2366
L 103(66–67)0.61080.6108−0.0029
L 151(80–97)0.53230.5312−0.2069
L 169(105–106)0.44540.4448−0.1327
L 35(28–29)0.38970.39050.2001
L 131(83–85)0.33180.3302−0.4858
L 157(96–97)0.29030.2892−0.3773
L 135(85–88)0.25320.2528−0.1366
L 123(77–80)0.22770.2275−0.0820
L 106(49–69)0.20910.2082−0.4515
L 114(70–74)0.20880.20880.0060
L 108(69–70)0.20870.20910.1831
L 166(103–105)0.20730.2064−0.4133
L 164(100–104)0.20440.2041−0.1624
L 142(89–92)0.19720.1966−0.2829
L 139(89–90)0.18870.18920.2562
L 141(89–92)0.15290.1529−0.0317
Table 13. Comparison of computation times of the 118-bus system. MLFFN: multi-layer feed forward network; RBFN: radial basis function network.
Table 13. Comparison of computation times of the 118-bus system. MLFFN: multi-layer feed forward network; RBFN: radial basis function network.
MethodNRLFMSA-LassoMLFFN [16]RBFN [16]
Time (s)12.2690.8751.4381.172
Table 14. Security index results of light and heavy load conditions of the IEEE 118-bus system.
Table 14. Security index results of light and heavy load conditions of the IEEE 118-bus system.
Outage LineLight Load ConditionHeavy Load Condition
L 133(85–86)44.359845.8894
L 7(8–9)5.67715.6818
L 97(64–65)3.20043.2143
L 60(34–43)1.99222.9717
L 121(77–78)1.72291.9869
L 104(65–68)1.53531.7278
L 128(77–82)1.30431.6184
L 74(53–54)1.29321.5375
L 40(29–31)1.12121.3955
L 147(94–95)1.08631.2815
L 155(94–100)0.97421.1406
L 160(100–101)0.87130.9323
L 156(95–96)0.83600.8709
L 68(45–49)0.75220.0835
L 103(66–67)0.59860.6553
L 151(80–97)0.52150.5474
L 169(105–106)0.43390.5734
L 35(28–29)0.42830.4032
L 131(83–85)0.41860.3385
L 157(96–97)0.28570.3057
L 135(85–88)0.28610.2875
L 123(77–80)0.20690.2736
L 106(49–69)0.20380.2687
L 114(70–74)0.20220.2676
L 108(69–70)0.20120.2682
L 166(103–105)0.20040.2669
L 164(100–104)0.19830.2656
L 142(89–92)0.19280.2335
L 139(89–90)0.16900.1997
L 141(89–92)0.13850.1538
Table 15. Security index results of two methods in the base load condition of the IEEE 300-bus system.
Table 15. Security index results of two methods in the base load condition of the IEEE 300-bus system.
Outage LineNRLFMSA-LassoRelative Error (%)
L 181(119–120)284.1077283.5923−0.1814
L 309(225–191)50.404050.58720.3635
L 114(59–61)19.508319.53640.1436
L 242(162–164)17.215017.2048−0.0592
L 257(178–180)6.74176.74930.1133
L 322(241–237)6.71526.72140.0917
L 246(167–169)3.19953.21300.4206
L 205(133–137)1.28211.28510.2337
L 10(9006–9007)1.16651.16880.1944
L 59(16–42)1.13531.13910.3343
L 249(173–174)1.08341.0789−0.4179
L 210(134–184)1.05491.05560.0670
L 174(115–122)0.85850.86210.4129
L 273(194–664)0.40880.40890.0342
L 207(133–169)0.37090.3695−0.3729
L 308(224–226)0.36780.36810.0611
L 275(196–197)0.18320.1828−0.2299
L 86(38–41)0.17070.1707−0.0462
L 323(240–281)0.14790.1474−0.3416
L 140(81–194)0.14690.1465−0.3172
L 266(190–231)0.13560.13590.2660
L 85(37–90)0.13400.1337−0.2068
L 143(86–87)0.13380.13380.0051
L 9(9005–9055)0.13300.13300.0251
L 142(85–86)0.12760.1270−0.4102
L 274(195–219)0.12400.12440.3311
L 192(136–158)0.12170.1217−0.0293
L 227(143–145)0.12060.12110.4201
L 185(123–124)0.09890.09900.0652
L 159(99–109)0.08810.08840.3287
L 197(128–130)0.08190.0817−0.2183
L 184(122–125)0.07830.0780−0.3255
L 163(103–105)0.07820.0780−0.2962
L 162(102–104)0.07370.0734−0.3757
L 239(157–159)0.07260.0724−0.2540
L 324(242–245)0.06710.06730.3236
L 128(73–79)0.06630.06650.2394
L 54(13–20)0.06540.06560.3786
L 112(57–63)0.06450.0643−0.3573
L 251(173–176)0.06410.0639−0.3667
L 201(130–132)0.06320.06340.4178
L 65(22–23)0.06190.06200.0239
L 314(228–234)0.06140.06160.2539
L 248(172–174)0.06130.0612−0.1593
L 215(137–181)0.06110.0610−0.3247
L 256(178–179)0.06100.0611−0.0074
L 295(214–242)0.06080.0608−0.0681
L 315(229–190)0.06040.06060.3647
L 340(10–11)0.05990.0598−0.2893
L 221(140–145)0.05960.0594−0.2511
L 120(69–79)0.05930.0591−0.2974
L 222(140–146)0.05880.05910.4009
L 14(9012–9002)0.05260.05270.2202
L 335(3–1)0.04770.0476−0.2486
L 48(7–131)0.04660.04670.1484
L 80(37–38)0.03220.0322−0.2373
L 7(9005–9053)0.02890.0288−0.0387
L 21(9007–9071)0.00730.00740.3859
L 34(9003–9036)0.00730.00730.0760
L 118(63–526)0.00520.0052−0.2994
Table 16. Security index results of light and heavy load conditions of the IEEE 300-bus system.
Table 16. Security index results of light and heavy load conditions of the IEEE 300-bus system.
Outage LineLight Load ConditionHeavy Load Condition
L 181(119–120)147.7148341.7919
L 309(225–191)40.287070.5317
L 114(59–61)23.714839.3177
L 242(162–164)13.328435.5648
L 257(178–180)7.219811.5840
L 322(241–237)6.427611.2255
L 246(167–169)1.43349.0839
L 205(133–137)0.92979.9235
L 10(9006–9007)0.92013.7961
L 59(16–42)0.89123.4846
L 249(173–174)0.87633.2126
L 210(134–184)0.79923.0168
L 174(115–122)0.73112.8433
L 273(194–664)0.32522.7788
L 207(133–169)0.37322.5910
L 308(224–226)0.25212.3859
L 275(196–197)0.14362.0399
L 86(38–41)0.14181.9632
L 323(240–281)0.15861.9495
L 140(81–194)0.15131.9282
L 266(190–231)0.11511.9248
L 85(37–90)0.11461.8892
L 143(86–87)0.09451.8849
L 9(9005–9055)0.09441.8741
L 142(85–86)0.08411.7082
L 274(195–219)0.08341.6927
L 192(136–158)0.08341.6454
L 227(143–145)0.08251.6394
L 185(123–124)0.05251.9374
L 159(99–109)0.05241.8280
L 197(128–130)0.05231.7938
L 184(122–125)0.05151.7828
L 163(103–105)0.04181.5820
L 162(102–104)0.04911.5415
L 239(157–159)0.05071.5416
L 324(242–245)0.04761.5606
L 128(73–79)0.04761.5222
L 54(13–20)0.04771.4659
L 112(57–63)0.04671.5399
L 251(173–176)0.04661.5381
L 201(130–132)0.04641.4931
L 65(22–23)0.04641.3600
L 314(228–234)0.04641.2715
L 248(172–174)0.04551.2575
L 215(137–181)0.04921.1494
L 256(178–179)0.04741.1425
L 295(214–242)0.04601.0201
L 315(229–190)0.03881.0044
L 340(10–11)0.02900.9898
L 221(140–145)0.02490.9442
L 120(69–79)0.02430.9717
L 222(140–146)0.01810.9353
L 14(9012–9002)0.01550.8952
L 335(3–1)0.01340.8542
L 48(7–131)0.01250.8440
L 80(37–38)0.01000.0762
L 7(9005–9053)0.00840.0761
L 21(9007–9071)0.00620.0378
L 34(9003–9036)00.0092
L 118(63–526)00.0076

Share and Cite

MDPI and ACS Style

Li, Y.; Li, Y.; Sun, Y. Online Static Security Assessment of Power Systems Based on Lasso Algorithm. Appl. Sci. 2018, 8, 1442. https://doi.org/10.3390/app8091442

AMA Style

Li Y, Li Y, Sun Y. Online Static Security Assessment of Power Systems Based on Lasso Algorithm. Applied Sciences. 2018; 8(9):1442. https://doi.org/10.3390/app8091442

Chicago/Turabian Style

Li, Yahui, Yang Li, and Yuanyuan Sun. 2018. "Online Static Security Assessment of Power Systems Based on Lasso Algorithm" Applied Sciences 8, no. 9: 1442. https://doi.org/10.3390/app8091442

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop