CHAPTER 1 INTRODUCTION


 Arthur Singleton
 1 years ago
 Views:
Transcription
1 1 CHAPTER 1 INTRODUCTION 1.1 GENERAL The vertically integrated power system around the world is undergoing a transformation towards deregulated environment. The objectives of deregulation are aiming to establish a more competitive market in order to achieve lower rates for consumer and higher profit for the suppliers. The other benefits of deregulation are better service, reliable operation and competitive rates. The main participants of the new electricity market are Generating Companies (GENCOS), Power Markets (PM), Power Exchange (PX), Scheduling Coordinators (SC), Transmission Owners (TO), Ancillary Services (AS), Retail Service Providers(R) and Distribution Companies (DISCOS). These participants are coordinated by Independent System Operator (ISO). The function of ISO is to ensure free and nondiscriminatory access to transmission system for all the market participants. In this deregulated system, effective management of transactions, to meet the active power requirements of the consumers can be done through pool and bilateral / multilateral markets. One of the main functions of ISO in a day ahead market is assessment of Available Transfer Capability (ATC) and updating this value in Open Access Same time Information Systems (OASIS). The market participants use ATC for their transaction planning. In a deregulated system, the generation and distribution companies (i.e. market players) carry out transactions (i.e. selling or buying electricity) through a competitive bidding process administered by an agency known as
2 2 power exchange apart from the transactions through bilateral negotiations. Every intended transaction is communicated to the ISO. The transactions are evaluated by ISO on the basis of ATC. ATC, which refers to the capacity and ability of a transmission network to allow for a reliable movement of electric power from the areas of supply to the areas of need, is an issue of concern to both system planners as well as system operators. ATC indicates how much power can be transferred without compromising system security. Accurate identification of this capacity provides vital information for both planning and operation of bulk power market. 1.2 FACTORS INFLUENCING ATC The calculation of ATC is generally based on computer simulations of the operation of the interconnected transmission network under a specific set of assumed operating conditions. The simulations are typically performed offline well before the systems approach the operational state. The factors (ftp.nerc.com/pub/sys/all_updl/pc/atcwg/atc961.pdf) considered in these simulations are i) Projected Customer Demands Base case demand levels should be appropriate to the system conditions and customer demand levels under study and may be representative of peak, offpeak or light demand conditions. ii) Generation dispatch Utility and nonutility generators should be realistically dispatched for the system conditions being simulated. iii) System configuration The base case configuration of the interconnected system should be representative of the conditions being simulated, including any generation and transmission outages that are expected. The activation of any
3 3 operation procedures normally expected to be in effect should also be included in the simulations. iv) Base scheduled transfers The scheduled electric power transfers that should be modeled are those that are generally considered to be representative of the base system conditions being analyzed and which the parties involved agree upon. v) System contingencies A significant number of generation and transmission system contingencies should be screened, consistent with individual electric system, to ensure that the facility outage most restrictive to the transfer being studied is identified and analyzed. The contingencies evaluated may in some instances include multiple contingencies. The conditions on the interconnected network continuously vary in real time. Therefore, the transfer capability of the network will also vary from one instant to the next. For this reason, transfer capability calculations may need to be updated periodically for application in the operation of the network. 1.3 LIMITS TO TRANSFER CAPABILITY The ability of interconnected transmission networks to reliably transfer electric power may be limited by the physical and electrical characteristics (ftp.nerc.com/pub/sys/all_updl/pc/atcwg/atc961.pdf) of the system including any one or more of the following: i) Thermal limits Thermal limits establish the maximum amount of electrical current that a transmission line or electrical facility can conduct over a specified time period
4 4 before it sustains permanent damage by overheating or before it violates public safety requirements. ii) Voltage limits System voltage and changes in voltages must be maintained within the range of acceptable minimum and maximum limits. The minimum voltage limits can establish a maximum amount of electric power that can be transferred without causing damage to the electric system or customer facilities. iii) Stability Limits ATC values must be estimated with Angle stability and voltage stability limits. The methods that are adopted in the literature for the calculation of ATC are presented in Table 1.1 Table 1.1 Methods adopted for calculation of ATC S. No. Method Description 1 Linear approximation DC Power Flow Model, Thermal Limits only 2 Optimal Power Flow (OPF) 3 Continuation Power Flow (CPF) AC Power Flow Model, Thermal Limit + Voltage Limit AC Power Flow Model, Thermal Limit = Voltage Limit (Voltage Collapse) 4 Stability constrained Time Domain Simulations with Dynamic Model The DC power flow method is a gross approximation of the AC power flow method as it considers linear models for network topology. It may not be accurate, where VAR flow and voltage deviations are considerable. CPF method considers a series of power system solutions to be solved and tested for limits. The amount of transfer is gradually increased from the base
5 5 case until the binding limit is encountered. OPF method requires formulation of an optimization problem with constraints arising from the power flow. The results obtained through OPF may vary depending upon the objective function and the constraints. Stability constrained methods require transient studies to be carried for a case with anticipated scenario. 1.4 LITERATURE REVIEW Publications on the topic of deregulation, ATC estimation and enhancement are too numerous, so only important publications have been referred which are directly related with the work presented in this thesis. Literature review carried out is presented under the following topics Literature Review on ATC Estimation Power transaction between a source bus and a sink bus can be committed only when sufficient power transfer capability is available. The ISO has to estimate the ATC between interface and update the same on OASIS at regular time intervals. Therefore, the methods required for computation of ATC must be fast and accurate. A frame work for determining ATC of the interconnected transmission networks for a commercially viable wholesale market has been established by the North American Electrical Reliability council (NERC) as per NERC report (1996) Hamoud (2000) proposed a method which uses a DC power flow model and Linear Programming (LP) algorithm for computing the ATC between any two areas in the transmission system. The simplex method is used. The DC power flow based methods are faster than their AC counterparts but only real power flow in the lines is considered.
6 6 Ejebe et al (2000) proposed a method based on power transfer / outage distribution factors for assessment of ATC. The formulation is based on the linear incremental power flow to account for the line flow thermal loading effects. The calculations for ATC utilize three sets of linear sensitivities such as branch (line) outage distribution factors, power transfer distribution factors and generator outage distribution factors, This method can cater to only the scenarios that are close to the base case from which the factors are derived. Li et al (2002) proposed maximum area concept for the allocation of simultaneous ATC. This concept decides maximum area capability inside the security region by considering the shape of security boundary. Kumar et al (2004) presented the development of a simple and noniterative method to calculate ATC for a transmission system using a new set of distribution factors. Sets of power transfer distribution factors and voltage distribution factors have been obtained using the sensitivity based approach for base case as well as contingency cases, and utilized to check line flow limits and voltage limits during ATC determination. Venkatesh et al (2004) described the assessment of ATC using AC Power Transfer Distribution Factors (ACPTDF) in combined economic emission dispatch environment. ACPTDF are derived using sensitivity based approach for the system intact case and utilized to check the line flow limits during ATC determination. The ATC results obtained are compared with Newton Raphson power flow method. Ou and Singh (2002) presented a Repeated Power Flow (RPF) method to determine ATC. Monte Carlo Simulation method is utilized to take one of the factors in Transmission Reliability Margin (TRM), load uncertainty into account. Capacity Benefit Margin (CBM) calculation is based on single
7 7 area generation reliability evaluation using a probabilistic method. The rules and procedure to allocate CBM into individual areas are proposed. Besides these, Transfer Based Security Constrained Optimal Power Flow (TSCOPF) method is proposed as a replacement of conventional SCOPF method for use in the deregulation environment. Milano et al (2005) proposed a method for the proper inclusion of contingencies and stability constraints through the use of a Voltage Stability Constrained Optimal Power Flow (VSCOPF) for the estimation of ATC. The ATC value is computed based on N1 contingency criterion for an initial optimal operating condition, and then to solve an OPF problem for the worst contingency case. This process is repeated until the changes in the ATC values are below a minimum threshold. The author also proposed another approach which solves a reduced number of OPF problems associated with contingency cases according to a ranking based on a power transfer sensitivity analysis of the transmission lines. Zhang et al (2004) proposed an optimization method for assessment of ATC, by considering dynamic constraints such as transient rotor angle stability constraint in addition to line thermal overload constraint and bus voltage limit constraints. ATC model is formulated as optimization problem with differentialalgebraic equations and solved by applying a NonLinear Programming (NLP) tool. An algorithm based on Control Variable Parameterization (CVP) is implemented to solve the formulated dynamic constrained optimization problem to handle large dynamic optimization problems without solving very large NLPs. Ning et al (2009) proposed an alternate continuation power flow for the estimation of ATC of a AC/DC transmission system
8 8 Rodrigues and DaSilva (2007) described a probabilistic methodology for assessing chronological variations on the ATC caused by the uncertainties associated with hourly load fluctuations and equipment unavailability s. The system states resulting from these uncertainties are generated using Monte Carlo method with sequential simulation. The ATC associated with each sample system state is evaluated through a linear DC Optimal Power Flow. The results demonstrate that uncertainties associated with hourly load transitions and equipment availability cause significant variations on the ATC. Cheng et al (2006) suggested a method for ATC estimation considering the voltage stability constraints. A new ATC determination scheme using Quasi steadystate (QSS) approximation is proposed. The proposed method estimates ATC with dynamic voltage stability constraints accurately and the calculation speed is also less to meet the real time requirements. DongJoon Shin et al (2007) proposed a probabilistic approach to calculate available transfer capability of the interconnected network. The computation of ATC is carried out in three steps. The total transfer capability is calculated using continuation power flow, the transmission reliability margin and capacity benefit margin are evaluated by probabilistic load flow and Monte Carlo simulation. Pandey et al (2010) suggested a Levenberg Marquardt algorithm of neural network (LMANN) based approach for fast and accurate estimation of system ATC. System ATC has been estimated for both varying load condition as well as for single line outage contingency condition by employing distributed computing. Principal component analysis (PCA) has been applied for effective input feature selection. Contingency clusters are
9 9 formed such that each cluster contains almost similar ATC values. For each contingency clusters separate LMANNs has been developed. Rajabi Ghahnavieh et al (2009) proposed a comprehensive approach for allocation of ATC to transmission service requests. The proposed method considers types, tariffs, and priority of requests in a mixedinteger nonlinear optimization which incorporates the allocation rules. The solution to the optimization problem gives the amount of accepted requests and their priority to the system operator while an emergency could result in the curtailment of certain transmission services. Yuan Kang Wu (2007) proposed a novel algorithm for contingency ATC computation and a sensitivity analysis for system uncertainties. It incorporates linear distribution factors and AC load flow sensitivitybased method to calculate ATC efficiently and speedily considering lines outages. Yog Raj Sood (2010) developed an algorithm for assessment of the feasibility of simultaneous bilateral and multilateral transactions. This method also finds out the minimum amount of transacted power to be curtailed if they are not feasible. This analysis will be a great help for the generationsloads pairs to decide whether to withdraw the unfeasible transaction completely or to make it feasible by reducing its size optimally. The proposed algorithm can also be used for determining the transfer capability and hence feasibility of a single bilateral transaction at a time. In addition to above algorithm an efficient, repeated NewtonRaphson power flow based algorithm is also developed to determine transfer capability and hence feasibility for single bilateral transaction. Hamoud et al (2000a) proposed a method for feasibility assessment of simultaneous bilateral transactions. The theory of simultaneous and non
10 10 simultaneous transactions was also discussed. Yog Raj Sood et al (2004) proposed a method for the assessment of feasibility and pricing of transactions. Jain et al (2009) utilized a bifurcation approach to compute oscillatory stability constrained available transfer capability (ATC) in an electricity market having bilateral as well as multilateral transactions. Oscillatory instability in nonlinear systems can be related to Hopf bifurcation. At the Hopf bifurcation, one pair of the critical Eigen values of the system Jacobian reaches imaginary axis. A new optimization formulation, including Hopf bifurcation conditions, has been developed in this paper to obtain the dynamic ATC. Kumar et al (2004a) proposed a method for ATC estimation using bifurcation approach. Lai (2001) presented a detailed study of the basics of restructuring. DaSilva et al (2004) proposed a new methodology to determine the best points in the system to add reinforcements of the transmission network and to add new sellers and buyers, in order to maximize the ATC, without violating a preestablished reliability level. The proposed algorithm uses non sequential Monte Carlo simulation to select system state and Linear Programming with a DC power flow model to analyze and optimize each selected state. Gisin et al (2000) discussed some of the complexities involved in calculating ATC values and performing the sensitivity analysis for the various factors involved, including parallel transfers and generation dispatch patterns. Distribution factors based on DC power flow method are proposed to calculate ATC. Because of the relative ease coupled with the mild computational burden involved in computing these factors they have found
11 11 widespread applications in the industry. However, in view of their limitations, the future of using such methods in the competitive market environment is doubtful. Ejebe et al (1998) proposed Continuation Power Flow (CPF) method for assessment of ATC which uses a full AC power flow solution incorporating the effects of reactive power flows, voltage limits and voltage collapse as well as the traditional line flow thermal loading effects. Since optimization approach with various control measures are not used the ATC obtained will be conservative. David et al (1998) discussed dispatch methodologies for open access transmission systems Min and Abur (2006) presented a method for computation of ATC in a multi area power system using CPF method. This computation takes into account the limits on the line flows, bus voltage magnitude, generator reactive power, voltage stability as well as the effect of line contingencies. The multiarea ATC problem is solved by using a network decomposition approach. Wang et al (1999) proposed a fast computational method to determine the Simultaneous Available Transfer Capability in a power system. The method consists of a fast estimation algorithm and a constrained power flow iteration that is based on fast estimation results. The fast estimation algorithm also includes the modified AC power flow equations, the sensitivity analysis under both normal condition and first line outage condition. The ATC limiting factors considered in the method are line thermal limits, bus voltage limits and generator reactive power limits. When combined with the first line contingency considerations, this method gives the fastest ATC computing. Shaaban et al (2000) proposed a formulation for optimal Power Flow (OPF) to calculate ATC using AC power flow model. The objective is
12 12 to maximize the sum of the sending end generation and receivingend load of specified buses. The constraints are AC power flow equations and system operating limits such as thermal limits of transmission lines, voltage bounds of buses and upper and low limits of generators power. Sequential Quadratic Programming method is used for the optimization process. De Tuglie et al (2000) introduced a new methodology based on nonlinear technique, for assessing dynamic ATC in real time environment. The main objective is to maximize the ATC over the transmission lines belonging to a fixed interface named Critical Interface considering thermal constraints, dynamic constrain such as transient rotor angle stability constraint. The main feature of the approach is to treat the trajectories of the system as unknowns of an optimization problem and confine them in a time varying domain based on static and dynamic requirements. Goh et al (2003) presented an OPF based approach for transfer capability assessment incorporating a security index which determines the system security level of each transfer. Line stability indices are also implemented to quantify how close the system is to the point of static voltage collapse and to identify the critical lines connecting weak buses in a stressed system. Luo et al (2000) proposed a neural network solution methodology for the problem of ATC calculations. Based on the optimal power flow formulation of the problem, the inputs for a neural network are generator status, line status and load status and the output is the transfer capability. The Quickprop algorithm is used to train the neural network. Khairuddin et al (2004) proposed a fuzzy logic approach for determining ATC in a large deregulated power system. The proposed fuzzy method is tested for computing ATC between a number of sourcesink pairs.
13 13 The method is also compared with a fullscale AC power flow based method in terms of accuracy and CPU time for evaluating ATCs considering the same array of transactions, base cases and outages. The CPU time requirement of the proposed method is independent of the system size while the power flow based ATC determination method s CPU time is directly proportional to the size despite exploitation of sparse structure of the system. Berizzi et al (2007) proposed a new methodology to reduce the arbitrariness related to the mid and long term ATC computation using a probabilistic approach. A Monte Carlo method is applied to sample many different reference scenarios in terms of generation patterns to be adopted for the ATC computation. Eventually, the probability density function of the ATC is built. A stochastic calculation of ATC is proposed by Jonathan et al (2007). A stochastic power flow algorithm is used to quantify and evaluate the uncertainties involved in the ATC estimation Othman et al (2005) presented computationally fast and accurate method for evaluating available transfer capability based on curve fitting technique called as the cubicspline interpolation technique. This method traces the curves of voltage magnitude and power flow variations with respect to the increase of real power transfer. Srinu Naik et al (2010) proposed a method for determination of ATC with PTDF using linear methods in presence of TCSC. IEEE 14 bus system was used to test the fasibility of the model. Othman et al (2006) proposed a new technique which uses evolutionary programming to maximize the total amount of generation so as to determine the capacity benefit margin for each area.
14 14 Gnanadass et al (2004) described an ATC estimation method with capacity benefit and transmission reliability margins of practical power systems with combined economic emission dispatch. In this approach NewtonRaphson power flow method and Evolutionary Programming algorithm were combined for ATC calculation. Tae Kyung Hahn et al (2008) described a fuzzy logic approach to parallelizing contingencyconstrained optimal power flow. The fuzzy multi objective problem is formulated for ATC estimation Sung Sukim et al (2008) aimed to determine available transfer capability (ATC) based on the fuzzy set theory for continuation power flow (CPF), thereby capturing uncertainty. Xiong Pan and Guoyu Xu (2005) proposed a model for ATC calculations accorded with tradeoff mechanism in electricity market was set up. The impact of branch outage contingency on the static voltage stability margin is analyzed and contingency ranking is performed through sensitivity indices of branch flows with respect to the loading margin. Tomohiko Ichikawa et al (2009) proposed a method for estimation of ATC from the view point of power system transient stability Literature Review on Support Vector Machine (SVM) Abdala and Saeed (2004) used weighted Knearest neighbor algorithm that exploits the correlation between a missing dimension and available data values from other fields. This algorithm is used to estimate the missing values in clinical laboratory measurements of ICU patients.
15 15 BoLuen Chen et al (2004) applied SVM successfully to load forecasting. Some important conclusion about mid term load fore casting is inferred. Iffat (2009) compared all the computational intelligent machine learning algorithms of data mining. The conventional imputation algorithms are briefed. Nivedita (2004), Micro calcification (MC) detection is an important component of breast cancer diagnosis. However visual analysis of mammograms is a difficult task for radiologists. Computer Aided Diagnosis is used effectively to make a final decision. The author made a comparative study of digital mammography using Neural Networks and Support Vector Machine. Pedro et al (2009) proposed a novel KNN imputation algorithm using a feature weighted distance metric based on mutual information. This method provides a missing data estimation technique for solving the imputed data classification problem. Moulin et al (2004) proposed a pattern recognition approach to transient stability analysis (TSA). This paper used learning based non linear classifier the support vector machine. It is proved that it can be used for solving problem of high dimensionality. Ravikumar et al ((2008) proposed a method for improving power system protection coordination using intelligent knowledge based systems. SVM is used as intelligence tool to identify the faulted line that is emanating and finding the distance from the substation.
16 16 Robert Salat and Stanislaw (2004) presented a new approach to the location of fault in the high voltage power transmission line using SVM and frequency characteristics of the measured terminal voltage and current transient signals of the system Literature Review on Back Propagation Neural Network (BPNN) Vasudevan, et al (2004) Proposed a new multiparameter retrieval algorithm based on a back propagation neural network (BPNN) developed for deriving integrated water vapor and cloud liquid water contents over oceans from brightness temperatures measured by the Multifrequency Scanning Microwave Radiometer launched onboard Indian Remote Sensing satellite IRSP4. YuChuan et al (2008) proposed various virtual metrology algorithms, including backpropagation neural networks (BPNN), simple recurrent neural networks (SRNN), and multiple regression (MR), are evaluated to see whether they can meet the accuracy and realtime requirements of wafertowafer advanced process control or not. The fifth generation TFTLCD chemicalvapor deposition process is used to test and verify the requirements. Hosny et al (2009) proposed a novel dynamic nonlinear model for pulsed corona discharge using back propagation neural networks. The LevenbergMarquardt training algorithm, which is perfectly suitable for fitting functions, is employed. The developed model is based on the voltagecurrent characteristics of an actual hybridseries reactor and takes the practical constrains associated with a real system into account.
17 17 AzimiSadjadi et al (2002) presented a new adaptive underwater target classification system to cope with environmental changes in acoustic backscattered data from targets and nontargets are introduced. The core of the system is the adaptive feature mapping that minimizes the classification error rate of the classifier. The goal is to map the feature vector in such a way that the mapped version remains invariant to the environmental changes. A K nearest neighbor (KNN) system is used as a memory to provide the closest matches of an unknown pattern in the feature space. The classification decision is done by a back propagation neural network (BPNN). Xiaofeng et al (2009) presented a backpropagation neural network (BPNN)aided K*F algorithm and a fuzzy inferencebased KF algorithm in order to overcome the time delay of RDSS positioning provided by a doublestar positioning system in China. Traditional KF causes biased solutions, and indeed, leads to filter instability easily since the time delay of RDSS positioning, in an active mode, is hard to be modeled and sometimes suffers from RDSS outages. Therefore, a fuzzy inference is used to correct the variance matrix of KE measurement noises adaptively; and a trained BPNN corrects the outputs of the Kalman filter. TungHo Lin et al (2009) proposed an advanced keyvariable selection method, the neuralnetworkbased stepwise selection method, which can enhance the conjecture accuracy of the NNbased virtual metrology algorithms. Multiregressionbased step wise selection method is widely applied in dealing with keyvariable selection problems despite the fact that it may not guarantee finding the best model based on its selected variables. GutierrezMartinez et al (2011) proposed a new approach to model stability and security constraints in optimal power flow (OPF) problems based on a neural network (NN) representation of the system security boundary (SB). The novelty of this proposal is that a closed form, differentiable
18 18 function derived from the system's SB is used to represent security constraints in an OPF model Literature Review on Generalized Regression Neural Network (GRNN) Das Merces Machado et al (2009) explained the use of the wavelet transform and computational intelligence techniques to quantify voltage shortduration variation in electric power systems, with respect to time duration and magnitude. The wavelet transform is used to determine the event duration, as well as for obtaining a characteristic curve relating the signal norm as function of the number of cycles for a waveform without disturbance that is used as reference for the calculation of the magnitude of the event. A generalized regression neural network (GRNN) is used to interpolate not stored points of the characteristic curve. Goulermas et al (2007) proposed a novel algorithm for function approximation that extends the standard generalized regression neural network. Instead of a single bandwidth for all the kernels, this paper employed a multiplebandwidth configuration. However, unlike previous works that use clustering of the training data for the reduction of the number of bandwidths, this paper proposed a distinct scheme that manages a dramatic bandwidth reduction while preserving the required model complexity. In this scheme, the algorithm partitions the training patterns to groups, where all patterns within each group share the same bandwidth. Rutkowski (2004) proposed a new class of generalized regression neural networks working in nonstationary environment. The generalized regression neural networks (GRNN) studied in this paper are able to follow changes of the best model, i.e., timevarying regression functions. This paper
19 19 presented an adaptive GRNN tracking timevarying regression functions. The speed of convergence of the GRNN is investigated Kim et al (2004) Silicon carbide (SiC) was etched in a NF 3 /CH 4 inductively coupled plasma. The etch process was modeled by using a neural network called generalized regression neural network (GRNN). For modeling, the process was characterized by a 2 4 full factorial experiment with one center point. To test model appropriateness, additional test data of 16 experiments were conducted. The GRNN prediction performance was optimized by means of a genetic algorithm (GA). Madkour et al (2007) presented an investigation into the comparative performance of an active vibration control (AVC) system using a number of intelligent learning algorithms. Recursive least square (RLS), evolutionary genetic algorithms (GAs), general regression neural network (GRNN), and adaptive neurofuzzy inference system (ANFIS) algorithms are proposed to develop the mechanisms of an AVC system. The controller is designed on the basis of optimal vibration suppression using a plant model. A simulation platform of a flexible beam system in transverse vibration using a finite difference method is considered to demonstrate the capabilities of the AVC system using RLS, GAs, GRNN, and ANFIS. Chaofeng Li Bovik and Xiaojun Wu (2011) developed a noreference image quality assessment (QA) algorithm that deploys a general regression neural network (GRNN). The new algorithm is trained on and successfully assesses image quality, relative to human subjectivity, across a range of distortion types. The features deployed for QA include the mean value of phase congruency image, the entropy of phase congruency image, the entropy of the distorted image, and the gradient of the distorted image. Image quality estimation is accomplished by approximating the functional
20 20 relationship between these features and subjective mean opinion scores using a GRNN Literature Review on ATC Enhancement Ghawghawe and Thakre (2009) proposed a new approach for determination of changes in the reactance of TCSC, required for achieving the desired transfer capability. Also a suitable criterion with a mathematical model for computation of reactance is proposed for selection of a line for the installation of TCSC. Jain et al (2009a) Proposed sensitivity analysis of structure preserving energy margin with respect to the control parameters of FACTS controllers for their optimal placement in the network. Two types of FACTS controllers, viz Static Synchronous Compensator (STATCOM) and Unified Power Flow Controller (UPFC) have been considered. The hybrid approach, combining a structure preserving and a time domain simulation method, has been utilized to compute the dynamic ATC in presence of these controllers and their impact on dynamic ATC has been analyzed. The potential energy, contributed by the STATCOM and the UPFC, has also been included in the structure preserving energy function to include their influence on transient stability. Khaburi et al (2010) proposed a probabilistic modeling based approach to determine the total transfer capability enhancement using FACTS devices Rashidinejad et al (2008) suggested an approach to determine the optimum location and optimum capacity of TCSC in order to improve ATC as well as voltage profile. Real genetic algorithm (RGA) associated with analytical hierarchy process (AHP) and fuzzy sets are implemented as a
21 21 hybrid heuristic technique in this paper to optimize such a complicated problem. Singh et al (2009) proposed a method for dynamic ATC enhancement. This paper proposed a method for optimal placement of FACTS devices for ATC enhancement. Harrinder Sawhney and Jeyasurya (2004) suggested the application of the unified power flow controller (UPFC) to improve the transfer capability of power system. 1.5 OBJECTIVES OF THE THESIS In the restructured power system the feasibility of all the proposed transactions should be evaluated by the ISO. From the literature review it is observed that the conventional methods like RPF, AC OPF and DC OPF estimate the feasibility of the proposed transactions sequentially therefore the computation time taken will be more. So there is a need for a method which can estimate ATC simultaneously. The operation and control of restructured power system is based on real power transactions. But most of the system studies are based on real power loads. So there is a scope to estimate ATC using the transactions. From the literature review it is also observed that the AI techniques that are used to estimate ATC make use of either real power loads or load index and source injection as inputs. Separate AI models are developed to estimate ATC of the outage conditions. So, it is necessary to develop a set of inputs that can be used for estimating the ATC so that the set of inputs will remain the same irrespective of the size of the system. Also the need for using separate AI models for outage condition can be avoided. These issues are
22 22 addressed in this thesis. The motivation and the main objectives of the thesis are as follows: To estimate ATC of a bilateral transaction using SVM and GRNN To estimate ATC using transactions as one of the inputs for AI models. To estimate ATC with load, generation and transaction indices as inputs to AI models. To estimate ATC of multilateral transaction with economic constraint. To determine the degree of series and shunt compensation that is necessary to enhance the ATC to the prescribed level using SVM. 1.6 OUTLINE OF THE THESIS This thesis is organized into eight Chapters. Chapterwise summary of the thesis stating the development reported therein and results obtained from investigations are presented in the sections that follow. Artificial Intelligence (AI) techniques find application for almost all the power system problems. Second Chapter explains the basics of SVM, GRNN, BPNN and Fuzzy logic. These are the techniques used for ATC estimation in the subsequent Chapters. The third Chapter proposes a method for ATC estimation using SVM and GRNN. The real power loads are used as inputs. The method is
23 23 applied on IEEE 24 bus RTS and IEEE 118bus systems. The test results are compared with the RPF results. The fourth Chapter explains the method of ATC estimation using the transactions as one of the inputs. It is observed that, in the restructured power system the operation and control is based on transactions. For this reason transaction is used for ATC estimation. The method is applied on IEEE 24 bus RTS and IEEE 118bus systems. The test results are compared with the RPF results. The fifth Chapter aims at determining the ATC using few indices. The inclusion of outage conditions either by developing a separate AI model or by including the status of lines in the input vector increases the computation time significantly. This chapter proposes the transactions as an index for outage conditions. This chapter aims at defining few operator friendly indices to estimate ATC with lesser number of inputs. The method is applied on IEEE 24 bus RTS and IEEE 118bus systems. The test results are compared with the RPF results. The sixth Chapter describes a method for the ATC estimation of multilateral transactions. This chapter also aims at estimating the economic schedule of generators involved in the multi lateral transactions. An OPF based method is used to obtain the economic generation of generators present in the GENCO. SVM model is developed to obtain the ATC and the economic generation. The approach is applied to IEEE 24 bus RTS and IEEE 118 bus systems. From the results it is seen that the method is effective. The seventh Chapter deals with the enhancement of ATC with series and shunt compensation. The selection of type of compensation is carried out using RPF. The degree of series and shunt compensation required
24 24 to meet the desired ATC is obtained from SVM model. The test results on IEEE 24bus RTS system are presented. In the concluding eighth Chapter the significant contributions of this thesis are presented. The scope for further work in the ATC estimation and enhancement is discussed.
ReDispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus
496 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 ReDispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus Ronghai Wang, Student Member, IEEE, and Robert
More informationGrid Operations  Program 39
Grid Operations  Program 39 Program Description Program Overview In many ways, today's power system must be operated to meet objectives for which it was not explicitly designed. Today's transmission system
More informationImage Compression: An Artificial Neural Network Approach
Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and
More informationAvailable Transfer Capability Definitions and Determination
Available Transfer Capability Definitions and Determination A framework for determining available transfer capabilities of the interconnected transmission networks for a commercially viable electricity
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 1, January ISSN
International Journal of Scientific & Engineering Research, Volume 6, Issue 1, January2015 851 APPLICATION OF ARTIFICIAL NEURAL NETWORKS (ANNs) IN REACTIVE POWER OPTIMIZATION Kamel A. Shoush, Member,
More informationOptimal ProxyLimited Lines for Representing Voltage Constraints in a DC Optimal Powerflow
Optimal ProxyLimited Lines for Representing Voltage Constraints in a DC Optimal Powerflow by Michael Schlindwein A thesis submitted in fulfillment of the requirements for the degree of Master of Science
More informationModule 1 Lecture Notes 2. Optimization Problem and Model Formulation
Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization
More informationPower Flow Method for Loss Allocation in Radial Distribution Networks with DGs
Power Flow Method for Loss Allocation in Radial Distribution Networks with DGs G.Naguraiah 1, K. Jithendra Goud 2 1M.Tech student, Electrical Department, JNTUA College of Engineering, Anantapur, India.
More informationAnalysis of Power System Stability by Using Optimally Located SVC and STATCOM
Master Thesis on Analysis of Power System Stability by Using Optimally Located SVC and STATCOM XR EE ES 2009:010 Thesis Examiner: Thesis Supervisor: Submitted by: Mehrdad Ghandhari Hector Latorre / Jai
More informationSegmentation of Images
Segmentation of Images SEGMENTATION If an image has been preprocessed appropriately to remove noise and artifacts, segmentation is often the key step in interpreting the image. Image segmentation is a
More informationVoltage Stability assessment by SVC Device Via CPF
ICEN 2 International Conference on Electrical Networks. Sidi BelAbbès, September 28 & 29,2 Voltage Stability assessment by SVC Device Via CPF O. L. BEKI *, M.K. FELLAH** and M. F. BENKHOIS *** * ICEPS
More informationA Deterministic Dynamic Programming Approach for Optimization Problem with Quadratic Objective Function and Linear Constraints
A Deterministic Dynamic Programming Approach for Optimization Problem with Quadratic Objective Function and Linear Constraints S. Kavitha, Nirmala P. Ratchagar International Science Index, Mathematical
More informationPowerWorld Tutorial. YenYu Lee The University of Texas at Austin Jan 18, Updated December 26, 2012, by Ross Baldick
PowerWorld Tutorial YenYu Lee The University of Texas at Austin Jan 18, 2010 Updated December 26, 2012, by Ross Baldick 1 Introduction PowerWorld is one of the most popular power system simulation tools.
More informationA NeuroFuzzy Application to Power System
2009 International Conference on Machine Learning and Computing IPCSIT vol.3 (2011) (2011) IACSIT Press, Singapore A NeuroFuzzy Application to Power System Ahmed M. A. Haidar 1, Azah Mohamed 2, Norazila
More information9. Lecture Neural Networks
Soft Control (AT 3, RMA) 9. Lecture Neural Networks Application in Automation Engineering Outline of the lecture 1. Introduction to Soft Control: definition and limitations, basics of "smart" systems 2.
More informationChapter 7 UNSUPERVISED LEARNING TECHNIQUES FOR MAMMOGRAM CLASSIFICATION
UNSUPERVISED LEARNING TECHNIQUES FOR MAMMOGRAM CLASSIFICATION Supervised and unsupervised learning are the two prominent machine learning algorithms used in pattern recognition and classification. In this
More informationTheoretical Concepts of Machine Learning
Theoretical Concepts of Machine Learning Part 2 Institute of Bioinformatics Johannes Kepler University, Linz, Austria Outline 1 Introduction 2 Generalization Error 3 Maximum Likelihood 4 Noise Models 5
More informationFeasibility Study on Load Flow and Short Circuit Project
Feasibility Study on Load Flow and Short Circuit Project 10181301 Prepared by: Transmission Planning Department Cleco Corporation, Inc. 2180 St. Landry Hwy P.O. Box 70 St. Landry, LA 71367 Final November
More informationThe exam is closed book, closed notes except your onepage (twosided) cheat sheet.
CS 189 Spring 2015 Introduction to Machine Learning Final You have 2 hours 50 minutes for the exam. The exam is closed book, closed notes except your onepage (twosided) cheat sheet. No calculators or
More informationPRC Coordination of Protection Systems for Performance During Faults
PRC0271 Coordination of Protection Systems for Performance During Faults A. Introduction 1. Title: Coordination of Protection Systems for Performance During Faults 2. Number: PRC0271 3. Purpose: To
More informationWhat is machine learning?
Machine learning, pattern recognition and statistical data modelling Lecture 12. The last lecture Coryn BailerJones 1 What is machine learning? Data description and interpretation finding simpler relationship
More informationAggregation of Buses for a Network Reduction HyungSeon Oh, Member, IEEE
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 27, NO. 2, MAY 2012 705 Aggregation of Buses a Network Reduction HyungSeon Oh, Member, IEEE Abstract A simple but precise model would improve the computation efficiency
More informationNeural Network Weight Selection Using Genetic Algorithms
Neural Network Weight Selection Using Genetic Algorithms David Montana presented by: Carl Fink, Hongyi Chen, Jack Cheng, Xinglong Li, Bruce Lin, Chongjie Zhang April 12, 2005 1 Neural Networks Neural networks
More informationStability Assessment of Electric Power Systems using Growing Neural Gas and SelfOrganizing Maps
Stability Assessment of Electric Power Systems using Growing Gas and SelfOrganizing Maps Christian Rehtanz, Carsten Leder University of Dortmund, 44221 Dortmund, Germany Abstract. Liberalized competitive
More informationUsing a genetic algorithm for editing knearest neighbor classifiers
Using a genetic algorithm for editing knearest neighbor classifiers R. GilPita 1 and X. Yao 23 1 Teoría de la Señal y Comunicaciones, Universidad de Alcalá, Madrid (SPAIN) 2 Computer Sciences Department,
More informationEvaluation of ModelBased Condition Monitoring Systems in Industrial Application Cases
Evaluation of ModelBased Condition Monitoring Systems in Industrial Application Cases S. Windmann 1, J. Eickmeyer 1, F. Jungbluth 1, J. Badinger 2, and O. Niggemann 1,2 1 Fraunhofer Application Center
More informationLouis Fourrier Fabien Gaie Thomas Rolf
CS 229 Stay Alert! The Ford Challenge Louis Fourrier Fabien Gaie Thomas Rolf Louis Fourrier Fabien Gaie Thomas Rolf 1. Problem description a. Goal Our final project is a recent Kaggle competition submitted
More informationCS570: Introduction to Data Mining
CS570: Introduction to Data Mining Classification Advanced Reading: Chapter 8 & 9 Han, Chapters 4 & 5 Tan Anca DolocMihu, Ph.D. Slides courtesy of Li Xiong, Ph.D., 2011 Han, Kamber & Pei. Data Mining.
More informationIntroduction to Support Vector Machines
Introduction to Support Vector Machines CS 536: Machine Learning Littman (Wu, TA) Administration Slides borrowed from Martin Law (from the web). 1 Outline History of support vector machines (SVM) Two classes,
More informationLecture 7: Decision Trees
Lecture 7: Decision Trees Instructor: Outline 1 Geometric Perspective of Classification 2 Decision Trees Geometric Perspective of Classification Perspective of Classification Algorithmic Geometric Probabilistic...
More informationClassification. Vladimir Curic. Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University
Classification Vladimir Curic Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University Outline An overview on classification Basics of classification How to choose appropriate
More informationIntroduction to Linear Programming. Algorithmic and Geometric Foundations of Optimization
Introduction to Linear Programming Algorithmic and Geometric Foundations of Optimization Optimization and Linear Programming Mathematical programming is a class of methods for solving problems which ask
More informationEMS / DMS. DISTRIBUTION MANAGEMENT SYSTEM Functional Description
EMS / DMS DISTRIBUTION MANAGEMENT SYSTEM Content 1. INTRODUCTION... 4 2. MODES OF INTERACTION WITH THE SCADA SYSTEM... 5 2.1 Simulation Mode... 5 2.2 State Estimation Mode (See functional description
More informationAn Initial Seed Selection Algorithm for Kmeans Clustering of Georeferenced Data to Improve
An Initial Seed Selection Algorithm for Kmeans Clustering of Georeferenced Data to Improve Replicability of Cluster Assignments for Mapping Application Fouad Khan Central European UniversityEnvironmental
More information3 Feature Selection & Feature Extraction
3 Feature Selection & Feature Extraction Overview: 3.1 Introduction 3.2 Feature Extraction 3.3 Feature Selection 3.3.1 MaxDependency, MaxRelevance, MinRedundancy 3.3.2 Relevance Filter 3.3.3 Redundancy
More informationWECC Criterion MOD(11 and 13)WECCCRT1.1
WECC Criterion MOD(11 and 13)WECCCRT1.1 A. Introduction 1. Title: Steady State and Dynamic Data Requirements 2. Number: MOD(11 and 13)WECCCRT1.1 3. Purpose: To establish the consistent data requirements
More informationIntroduction: Model Relationships Network Model Overview Example Commercial Model Overview Component Hierarchy & Definitions Example of Structure
1 2 3 Introduction: Model Relationships Network Model Overview Example Commercial Model Overview Component Hierarchy & Definitions Example of Structure MISO Functions Served by the Network Model by the
More informationA SelfAdaptive Insert Strategy for ContentBased Multidimensional Database Storage
A SelfAdaptive Insert Strategy for ContentBased Multidimensional Database Storage Sebastian Leuoth, Wolfgang Benn Department of Computer Science Chemnitz University of Technology 09107 Chemnitz, Germany
More informationAnomaly Detection on Data Streams with High Dimensional Data Environment
Anomaly Detection on Data Streams with High Dimensional Data Environment Mr. D. Gokul Prasath 1, Dr. R. Sivaraj, M.E, Ph.D., 2 Department of CSE, Velalar College of Engineering & Technology, Erode 1 Assistant
More information* The terms used for grading are:  bad  good
Hybrid NeuroFuzzy Systems or How to Combine German Mechanics with Italian Love by Professor Michael Negnevitsky University of Tasmania Introduction Contents Heterogeneous Hybrid Systems Diagnosis of myocardial
More informationTHE preceding chapters were all devoted to the analysis of images and signals which
Chapter 5 Segmentation of Color, Texture, and Orientation Images THE preceding chapters were all devoted to the analysis of images and signals which take values in IR. It is often necessary, however, to
More informationCHAPTER 3 MAINTENANCE STRATEGY SELECTION USING AHP AND FAHP
31 CHAPTER 3 MAINTENANCE STRATEGY SELECTION USING AHP AND FAHP 3.1 INTRODUCTION Evaluation of maintenance strategies is a complex task. The typical factors that influence the selection of maintenance strategy
More informationCHAPTER 3 SURFACE ROUGHNESS
38 CHAPTER 3 SURFACE ROUGHNESS 3.1 SURFACE ROUGHNESS AND ITS IMPORTANCE The evaluation of surface roughness of machined parts using a direct contact method has limited flexibility in handling the different
More informationCT79 SOFT COMPUTING ALCCSFEB 2014
Q.1 a. Define Union, Intersection and complement operations of Fuzzy sets. For fuzzy sets A and B Figure Fuzzy sets A & B The union of two fuzzy sets A and B is a fuzzy set C, written as C=AUB or C=A OR
More informationA Neural Network for RealTime Signal Processing
248 MalkofT A Neural Network for RealTime Signal Processing Donald B. Malkoff General Electric / Advanced Technology Laboratories Moorestown Corporate Center Building 1452, Route 38 Moorestown, NJ 08057
More informationEfficient Tuning of SVM Hyperparameters Using Radius/Margin Bound and Iterative Algorithms
IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 13, NO. 5, SEPTEMBER 2002 1225 Efficient Tuning of SVM Hyperparameters Using Radius/Margin Bound and Iterative Algorithms S. Sathiya Keerthi Abstract This paper
More informationMarket Splitting Algorithm for Congestion Management in Electricity Spot Market
Proceedings of the 6th WSEAS International Conference on Power Systems, Lisbon, Portugal, September 2224, 2006 338 Market Splitting Algorithm for Congestion Management in Electricity Spot Market Marta
More informationCLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS
CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of
More informationContent based Image Retrievals for Brain Related Diseases
Content based Image Retrievals for Brain Related Diseases T.V. Madhusudhana Rao Department of CSE, T.P.I.S.T., Bobbili, Andhra Pradesh, INDIA S. Pallam Setty Department of CS&SE, Andhra University, Visakhapatnam,
More informationADVANCED IMAGE PROCESSING METHODS FOR ULTRASONIC NDE RESEARCH C. H. Chen, University of Massachusetts Dartmouth, N.
ADVANCED IMAGE PROCESSING METHODS FOR ULTRASONIC NDE RESEARCH C. H. Chen, University of Massachusetts Dartmouth, N. Dartmouth, MA USA Abstract: The significant progress in ultrasonic NDE systems has now
More informationMachine Learning. Unsupervised Learning. Manfred Huber
Machine Learning Unsupervised Learning Manfred Huber 2015 1 Unsupervised Learning In supervised learning the training data provides desired target output for learning In unsupervised learning the training
More informationFace Tracking. Synonyms. Definition. Main Body Text. Amit K. RoyChowdhury and Yilei Xu. Facial Motion Estimation
Face Tracking Amit K. RoyChowdhury and Yilei Xu Department of Electrical Engineering, University of California, Riverside, CA 92521, USA {amitrc,yxu}@ee.ucr.edu Synonyms Facial Motion Estimation Definition
More informationADVANCED ANALYTICS USING SAS ENTERPRISE MINER RENS FEENSTRA
INSIGHTS@SAS: ADVANCED ANALYTICS USING SAS ENTERPRISE MINER RENS FEENSTRA AGENDA 09.00 09.15 Intro 09.15 10.30 Analytics using SAS Enterprise Guide Ellen Lokollo 10.45 12.00 Advanced Analytics using SAS
More informationThe Study of Voltage Profile and Power Quality with SVC in Transmission System at Different Loads
The Study of Voltage Profile and Power Quality with SVC in Transmission System at Different Loads S.RaviKumar, B.Ramoji Rao, D.Ramesh Abstract This paper illustrates the effect of different static load
More informationAnalytical model A structure and process for analyzing a dataset. For example, a decision tree is a model for the classification of a dataset.
Glossary of data mining terms: Accuracy Accuracy is an important factor in assessing the success of data mining. When applied to data, accuracy refers to the rate of correct values in the data. When applied
More informationLMP Step Pattern Detection based on RealTime Data
LMP Step Pattern Detection based on RealTime Data Haoyu Yuan, Fangxing Li, Yanli Wei Department of Electrical Engineering and Computer Science The University of Tennessee, Knoxville Knoxville, TN 37996
More informationPOWER SYSTEM SECURITY CONCEPTS
POWER SYSTEM SECURITY CONCEPTS 1.1 INTRODUCTION The Power System needs to be operationally secure, i.e. with minimal probability of blackout and equipment damage. An important component of power system
More informationA Novel Approach for the Optimal PMU Placement using Binary Integer Programming Technique
A Novel Approach for the Optimal PMU Placement using Binary Integer Programming Technique J. S. Bhonsle 1 & A. S. Junghare 2 1 Department of Electrical Engg., Priyadarshini Institute of Engineering & Technology,
More informationInterconnection and Transmission
Interconnection and Transmission Gary L. Brown, P.E. Director of Energy Development Gary@ZGlobal.biz 9169859461 Kevin Coffee Energy Management Committee Meeting Irvine, California August 26, 2015 Interconnection
More informationChapter 2 Overview of the Design Methodology
Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed
More informationJavad Lavaei. Department of Electrical Engineering Columbia University
Graph Theoretic Algorithm for Nonlinear Power Optimization Problems Javad Lavaei Department of Electrical Engineering Columbia University Joint work with: Ramtin Madani, Ghazal Fazelnia and Abdulrahman
More informationCHAPTER 5 FUZZY LOGIC CONTROL
64 CHAPTER 5 FUZZY LOGIC CONTROL 5.1 Introduction Fuzzy logic is a soft computing tool for embedding structured human knowledge into workable algorithms. The idea of fuzzy logic was introduced by Dr. Lofti
More informationDynamic Clustering of Data with Modified KMeans Algorithm
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Dynamic Clustering of Data with Modified KMeans Algorithm Ahamed Shafeeq
More informationSupervised vs unsupervised clustering
Classification Supervised vs unsupervised clustering Cluster analysis: Classes are not known a priori. Classification: Classes are defined apriori Sometimes called supervised clustering Extract useful
More informationPerformance Assurance in Virtualized Data Centers
Autonomic Provisioning with SelfAdaptive Neural Fuzzy Control for Endtoend Delay Guarantee Palden Lama Xiaobo Zhou Department of Computer Science University of Colorado at Colorado Springs Performance
More informationComparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio
Comparative analysis of data mining methods for predicting credit default probabilities in a retail bank portfolio Adela Ioana Tudor, Adela Bâra, Simona Vasilica Oprea Department of Economic Informatics
More informationGeneration, Transmission, and End User Facilities
Procedures for Interconnection of Generation, Transmission, and End User To the Grand River Dam Authority Transmission System Table of Contents GRDA/SPP Interaction... 3 Standards... 3 Generation... 3
More informationTransient Stability Improvement of Long Transmission Line System by Using SVC
Transient Stability Improvement of Long Transmission Line System by Using SVC Dr.Tarlochan Kaur 1 and Sandeep Kakran 2 1 Associate Professor, EED, PEC University of Technology, Chandigarh, India 2 Assistant
More informationDesign and Performance Improvements for Fault Detection in TightlyCoupled MultiRobot Team Tasks
Design and Performance Improvements for Fault Detection in TightlyCoupled MultiRobot Team Tasks Xingyan Li and Lynne E. Parker Distributed Intelligence Laboratory, Department of Electrical Engineering
More informationHybrid Feature Selection for Modeling Intrusion Detection Systems
Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,
More informationObject and Action Detection from a Single Example
Object and Action Detection from a Single Example Peyman Milanfar* EE Department University of California, Santa Cruz *Joint work with Hae Jong Seo AFOSR Program Review, June 45, 29 Take a look at this:
More informationTarget Tracking in Wireless Sensor Network
International Journal of Information & Computation Technology. ISSN 09742239 Volume 4, Number 6 (2014), pp. 643648 International Research Publications House http://www. irphouse.com Target Tracking in
More informationCS 521 Data Mining Techniques Instructor: Abdullah Mueen
CS 521 Data Mining Techniques Instructor: Abdullah Mueen LECTURE 2: DATA TRANSFORMATION AND DIMENSIONALITY REDUCTION Chapter 3: Data Preprocessing Data Preprocessing: An Overview Data Quality Major Tasks
More information10703 Deep Reinforcement Learning and Control
10703 Deep Reinforcement Learning and Control Russ Salakhutdinov Machine Learning Department rsalakhu@cs.cmu.edu Policy Gradient I Used Materials Disclaimer: Much of the material and slides for this lecture
More informationMLR Institute of Technology
Course Name : Engineering Optimization Course Code : 56021 Class : III Year Branch : Aeronautical Engineering Year : 201415 Course Faculty : Mr Vamsi Krishna Chowduru, Assistant Professor Course Objective
More informationInteractive Treatment Planning in Cancer Radiotherapy
Interactive Treatment Planning in Cancer Radiotherapy Mohammad Shakourifar Giulio Trigila Pooyan Shirvani Ghomi Abraham Abebe Sarah Couzens Laura Noreña Wenling Shang June 29, 212 1 Introduction Intensity
More informationDYNAMIC SITE LAYOUT PLANNING USING MTPE PRINCIPLE FROM PHYSICS
DYNAMIC SITE LAYOUT PLANNING USING MTPE PRINCIPLE FROM PHYSICS Mohsen Andayesh* and Farnaz Sadeghpour Department of Civil Engineering, University of Calgary, Calgary, Canada * Corresponding author (m.andayesh@ucalgary.ca)
More informationMachine Learning Classifiers and Boosting
Machine Learning Classifiers and Boosting Reading Ch 18.618.12, 20.120.3.2 Outline Different types of learning problems Different types of learning algorithms Supervised learning Decision trees Naïve
More informationKEYWORDS Nonparametric optimization, Parametric Optimization, Design of Experiments, Response Surface Modelling, Multidisciplinary Optimization
Session H2.5 OVERVIEW ON OPTIMIZATION METHODS Ioannis Nitsopoulos *, Boris Lauber FEDESIGN GmbH, Germany KEYWORDS Nonparametric optimization, Parametric Optimization, Design of Experiments, Response
More informationRecent Developments in Modelbased Derivativefree Optimization
Recent Developments in Modelbased Derivativefree Optimization Seppo Pulkkinen April 23, 2010 Introduction Problem definition The problem we are considering is a nonlinear optimization problem with constraints:
More informationDRAFT Risks and Mitigations for Losing EMS Functions
DRAFT Risks and Mitigations for Losing EMS Functions 1.0 Executive Summary Energy Management System (EMS) is a system of computeraided tools used by System Operators to monitor, control, and optimize
More informationSensor Tasking and Control
Sensor Tasking and Control Outline TaskDriven Sensing Roles of Sensor Nodes and Utilities InformationBased Sensor Tasking Joint Routing and Information Aggregation Summary Introduction To efficiently
More informationA Feature Selection Method to Handle Imbalanced Data in Text Classification
A Feature Selection Method to Handle Imbalanced Data in Text Classification Fengxiang Chang 1*, Jun Guo 1, Weiran Xu 1, Kejun Yao 2 1 School of Information and Communication Engineering Beijing University
More informationReddit Recommendation System Daniel Poon, Yu Wu, David (Qifan) Zhang CS229, Stanford University December 11 th, 2011
Reddit Recommendation System Daniel Poon, Yu Wu, David (Qifan) Zhang CS229, Stanford University December 11 th, 2011 1. Introduction Reddit is one of the most popular online social news websites with millions
More informationThe various functions of an energy control center can be enumerated as under: 1. Load forecasting 6. Automatic generation control
ENERGY CONTROL CENTERS To generated, Transmission and Distribution system, Number of customers and Total investment. Installed capacity in India exceeds 206 GW with annual energy generated energy exceeding
More informationSparsity Based Regularization
9.520: Statistical Learning Theory and Applications March 8th, 200 Sparsity Based Regularization Lecturer: Lorenzo Rosasco Scribe: Ioannis Gkioulekas Introduction In previous lectures, we saw how regularization
More informationTransmission Management in the Deregulated Environment
Transmission Management in the Deregulated Environment RICHARD D CHRISTIE, MEMBER, IEEE, BRUCE F WOLLENBERG, FELLOW, IEEE, AND IVAR WANGENSTEEN Invited Paper Three very different methods of accomplishing
More informationCASE STUDY : Transient Stability Simulation Package
CASE STUDY : Transient Stability Simulation Package CLIENT NAME : A major T&D solutions provider in the world END CUSTOMER : A public T&D utility in one of the SAARC nations PROJECT TITLE : Customized
More informationResponse to API 1163 and Its Impact on Pipeline Integrity Management
ECNDT 2  Tu.2.7.1 Response to API 3 and Its Impact on Pipeline Integrity Management Munendra S TOMAR, Martin FINGERHUT; RTD Quality Services, USA Abstract. Knowing the accuracy and reliability of ILI
More informationColor based segmentation using clustering techniques
Color based segmentation using clustering techniques 1 Deepali Jain, 2 Shivangi Chaudhary 1 Communication Engineering, 1 Galgotias University, Greater Noida, India Abstract  Segmentation of an image defines
More informationAnalysis and optimization methods of graph based metamodels for data flow simulation
Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 812010 Analysis and optimization methods of graph based metamodels for data flow simulation Jeffrey Harrison
More informationGEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE
GEORGE J. ANDERS, Ph.D., P.Eng., Fellow IEEE George Anders is a president of Anders Consulting. Between 1975 and 2012 he has been employed by Ontario Hydro and its successor companies in Toronto, Canada.
More informationSeminar on African Electrical Interconnection. Module 1. The feasibility of Regional Electricity Cooperation and Integration
Seminar on African Electrical Interconnection Module 1 The feasibility of Regional Electricity Cooperation and Integration Module 1  RECI Feasibility Focuses on: Winning conditions for cooperation and
More informationNumerical Simulation of Dynamic Systems XXIV
Numerical Simulation of Dynamic Systems XXIV Prof. Dr. François E. Cellier Department of Computer Science ETH Zurich May 14, 2013 Introduction Introduction A number of important simulation applications
More informationPower System Security Boundary Enhancement Using EvolutionaryBased Query Learning
C.A. Jensen, M.A. ElSharkawi and R.J. Marks II, "Power Security Boundary Enhancement Using EvolutionaryBased Query Learning", Engineering Intelligent Systems, vol.7, no.9, pp.215218 (December 1999).
More informationAssignment 2. Classification and Regression using Linear Networks, Multilayer Perceptron Networks, and Radial Basis Functions
ENEE 739Q: STATISTICAL AND NEURAL PATTERN RECOGNITION Spring 2002 Assignment 2 Classification and Regression using Linear Networks, Multilayer Perceptron Networks, and Radial Basis Functions Aravind Sundaresan
More informationIntroduction. Chapter 15. Optimization Modeling: Applications. Integer Programming. Manufacturing Example. Three Types of ILP Models
Chapter 5 Optimization Modeling: Applications Integer Programming Introduction When one or more variables in an LP problem must assume an integer value we have an Integer Linear Programming (ILP) problem.
More informationIndustrial and Manufacturing Engineering (IME)
Industrial and Manufacturing Engineering (IME) 1 Industrial and Manufacturing Engineering (IME) IME 111. Introduction to Industrial and Manufacturing Engineering. 3 Credits. Overview of industrial engineering
More informationDeep Reinforcement Learning
Deep Reinforcement Learning 1 Outline 1. Overview of Reinforcement Learning 2. Policy Search 3. Policy Gradient and Gradient Estimators 4. Qprop: Sample Efficient Policy Gradient and an Offpolicy Critic
More informationLeaveOneOut Support Vector Machines
LeaveOneOut Support Vector Machines Jason Weston Department of Computer Science Royal Holloway, University of London, Egham Hill, Egham, Surrey, TW20 OEX, UK. Abstract We present a new learning algorithm
More information