A. B. R. Kumar, A. Ipakchi, Vladimir Brandwajn, M. El-Sharkawi, Gerald W. Cauley
{"title":"大型电力系统动态安全评估的神经网络:需求概述","authors":"A. B. R. Kumar, A. Ipakchi, Vladimir Brandwajn, M. El-Sharkawi, Gerald W. Cauley","doi":"10.1109/ANN.1991.213499","DOIUrl":null,"url":null,"abstract":"The computational requirements associated with dynamic security assessment (DSA) by conventional methods are two or three orders of magnitude more than the requirements for static security assessment. Therefore comprehensive on-line DSA is infeasible in present power system control centers. The exploitation of novel techniques to solve the problems of DSA is essential for on-line implementation. The authors set forth the requirements of DSA for a large-scale power system, followed by a description of the capabilities and limitations of neural network methods in meeting these requirements.<<ETX>>","PeriodicalId":119713,"journal":{"name":"Proceedings of the First International Forum on Applications of Neural Networks to Power Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"31","resultStr":"{\"title\":\"Neural networks for dynamic security assessment of large-scale power systems: requirements overview\",\"authors\":\"A. B. R. Kumar, A. Ipakchi, Vladimir Brandwajn, M. El-Sharkawi, Gerald W. Cauley\",\"doi\":\"10.1109/ANN.1991.213499\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The computational requirements associated with dynamic security assessment (DSA) by conventional methods are two or three orders of magnitude more than the requirements for static security assessment. Therefore comprehensive on-line DSA is infeasible in present power system control centers. The exploitation of novel techniques to solve the problems of DSA is essential for on-line implementation. The authors set forth the requirements of DSA for a large-scale power system, followed by a description of the capabilities and limitations of neural network methods in meeting these requirements.<<ETX>>\",\"PeriodicalId\":119713,\"journal\":{\"name\":\"Proceedings of the First International Forum on Applications of Neural Networks to Power Systems\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1991-07-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"31\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the First International Forum on Applications of Neural Networks to Power Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ANN.1991.213499\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the First International Forum on Applications of Neural Networks to Power Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANN.1991.213499","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Neural networks for dynamic security assessment of large-scale power systems: requirements overview
The computational requirements associated with dynamic security assessment (DSA) by conventional methods are two or three orders of magnitude more than the requirements for static security assessment. Therefore comprehensive on-line DSA is infeasible in present power system control centers. The exploitation of novel techniques to solve the problems of DSA is essential for on-line implementation. The authors set forth the requirements of DSA for a large-scale power system, followed by a description of the capabilities and limitations of neural network methods in meeting these requirements.<>