Power System Security Boundary Enhancement Using Evolutionary-Based Query Learning

Similar documents
Query Learning Based on Boundary Search and Gradient Computation of Trained Multilayer Perceptrons*

On-line Estimation of Power System Security Limits

Stability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps

M. A. ECSharbwI, R. J. Marks, M. E. Aggoune, D. C. Park, M. J. Damborg, L E. Atlas

Intelligent Techniques for Power Systems Vulnerability Assessment. Mohamed A. El-Sharkawi

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization

Using Genetic Algorithms to Improve Pattern Classification Performance

Investigating the Application of Genetic Programming to Function Approximation

Real Time Monitoring of

Binary Differential Evolution Strategies

CART for Online Security Evaluation and Preventive Control of Power Systems

Using CODEQ to Train Feed-forward Neural Networks

Topological Machining Fixture Layout Synthesis Using Genetic Algorithms

Constructively Learning a Near-Minimal Neural Network Architecture

Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus

A PMU-Based Three-Step Controlled Separation with Transient Stability Considerations

Neural Network Weight Selection Using Genetic Algorithms

Hybrid PSO-SA algorithm for training a Neural Network for Classification

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used.

Nonparametric Error Estimation Methods for Evaluating and Validating Artificial Neural Network Prediction Models

Applying Neural Network Architecture for Inverse Kinematics Problem in Robotics

A New Learning Algorithm for Neural Networks with Integer Weights and Quantized Non-linear Activation Functions

Combined Weak Classifiers

Research on Evaluation Method of Product Style Semantics Based on Neural Network

Support Vector Machines

6.034 Quiz 2, Spring 2005

Support Vector Machines

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

Monika Maharishi Dayanand University Rohtak

Review: Final Exam CPSC Artificial Intelligence Michael M. Richter

A Genetic Based Fault Location Algorithm for Transmission Lines

Model learning for robot control: a survey

Genetic Algorithm for Seismic Velocity Picking

Using Local Trajectory Optimizers To Speed Up Global. Christopher G. Atkeson. Department of Brain and Cognitive Sciences and

DETERMINING MAXIMUM/MINIMUM VALUES FOR TWO- DIMENTIONAL MATHMATICLE FUNCTIONS USING RANDOM CREOSSOVER TECHNIQUES

Self-Organizing Maps for cyclic and unbounded graphs

Final Project Report: Learning optimal parameters of Graph-Based Image Segmentation

Multiple Classifier Fusion using k-nearest Localized Templates

CS6220: DATA MINING TECHNIQUES

The k-means Algorithm and Genetic Algorithm

WEIGHTED K NEAREST NEIGHBOR CLASSIFICATION ON FEATURE PROJECTIONS 1

Evolutionary Decision Trees and Software Metrics for Module Defects Identification

Seismic regionalization based on an artificial neural network

Preprocessing of Stream Data using Attribute Selection based on Survival of the Fittest

Learning a Nonlinear Model of a Manufacturing Process Using Multilayer Connectionist Networks

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

More on Learning. Neural Nets Support Vectors Machines Unsupervised Learning (Clustering) K-Means Expectation-Maximization

REAL-CODED GENETIC ALGORITHMS CONSTRAINED OPTIMIZATION. Nedim TUTKUN

Evolving SQL Queries for Data Mining

Efficient Tuning of SVM Hyperparameters Using Radius/Margin Bound and Iterative Algorithms

An Empirical Study of Hoeffding Racing for Model Selection in k-nearest Neighbor Classification

The Binary Genetic Algorithm. Universidad de los Andes-CODENSA

Machine Learning Classifiers and Boosting

A *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-"&"3 -"(' ( +-" " " % '.+ % ' -0(+$,

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding

LINEAR AND NONLINEAR IMAGE RESTORATION METHODS FOR EDDY

Using Genetic Algorithm with Triple Crossover to Solve Travelling Salesman Problem

Predicting Diabetes using Neural Networks and Randomized Optimization

Keyword Extraction by KNN considering Similarity among Features

Network Routing Protocol using Genetic Algorithms

AN EVOLUTIONARY APPROACH TO DISTANCE VECTOR ROUTING

COMPUTATIONAL INTELLIGENCE

Double Sort Algorithm Resulting in Reference Set of the Desired Size

Optimal Brain Damage. Yann Le Cun, John S. Denker and Sara A. Solla. presented by Chaitanya Polumetla

COMPUTATIONAL INTELLIGENCE SEW (INTRODUCTION TO MACHINE LEARNING) SS18. Lecture 6: k-nn Cross-validation Regularization

Genetic Algorithms Variations and Implementation Issues

GENETIC ALGORITHM VERSUS PARTICLE SWARM OPTIMIZATION IN N-QUEEN PROBLEM

Linear Separability. Linear Separability. Capabilities of Threshold Neurons. Capabilities of Threshold Neurons. Capabilities of Threshold Neurons

Classification Lecture Notes cse352. Neural Networks. Professor Anita Wasilewska

Self-Organizing Maps for Analysis of Expandable Polystyrene Batch Process

Neuro-Fuzzy Inverse Forward Models

5 Learning hypothesis classes (16 points)

Bumptrees for Efficient Function, Constraint, and Classification Learning

Multivariate Standard Normal Transformation

Tracking Changing Extrema with Particle Swarm Optimizer

IMPLEMENTATION OF RBF TYPE NETWORKS BY SIGMOIDAL FEEDFORWARD NEURAL NETWORKS

Establishing Virtual Private Network Bandwidth Requirement at the University of Wisconsin Foundation

SOMSN: An Effective Self Organizing Map for Clustering of Social Networks

A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING

Synergy Of Clustering Multiple Back Propagation Networks

MINIMAL EDGE-ORDERED SPANNING TREES USING A SELF-ADAPTING GENETIC ALGORITHM WITH MULTIPLE GENOMIC REPRESENTATIONS

Adaptive Regularization. in Neural Network Filters

A Parallel Genetic Algorithm for Maximum Flow Problem

The Un-normalized Graph p-laplacian based Semi-supervised Learning Method and Speech Recognition Problem

CHAPTER 2 CONVENTIONAL AND NON-CONVENTIONAL TECHNIQUES TO SOLVE ORPD PROBLEM

Travel-Time Sensitivity Kernels in Long-Range Propagation

6.867 Machine Learning

Linear Discriminant Functions: Gradient Descent and Perceptron Convergence

Assignment # 5. Farrukh Jabeen Due Date: November 2, Neural Networks: Backpropation

CS 4510/9010 Applied Machine Learning

Escaping Local Optima: Genetic Algorithm

An Intelligent Clustering Algorithm for High Dimensional and Highly Overlapped Photo-Thermal Infrared Imaging Data

CS 4510/9010 Applied Machine Learning. Neural Nets. Paula Matuszek Fall copyright Paula Matuszek 2016

Influence of Architecture on Software Reliability

A Neuro-Fuzzy Application to Power System

Supplementary Material

Perceptron as a graph

Network Traffic Measurements and Analysis

Truncation Errors. Applied Numerical Methods with MATLAB for Engineers and Scientists, 2nd ed., Steven C. Chapra, McGraw Hill, 2008, Ch. 4.

Liquefaction Analysis in 3D based on Neural Network Algorithm

Transcription:

C.A. Jensen, M.A. El-Sharkawi and R.J. Marks II, "Power Security Boundary Enhancement Using Evolutionary-Based Query Learning", Engineering Intelligent Systems, vol.7, no.9, pp.215-218 (December 1999). Power System Security Boundary Enhancement Using Evolutionary-Based Query Learning Craig A. Jensen Mohamed A. El-Sharkawi Robert J. Marks II Department of Electrical Engineering University of Washington Seattle, WA 98195 Abstract This paper presents a new method for enhancing the accuracy of partially trained multilayer perceptron neural networks in specific operating regions. The technique is an extension of previously published query learning algorithms and uses an evolutionary-based boundary marking algorithm to evenly spread points on a contour of interest - in this case the power system security boundary. These points are then presented to an oracle (i.e. simulator) for validation. Any points that are discovered to have excessive error are then added to the neural network training data and the network is retrained. This technique has advantage over existing training methods because it produces training data in regions that are poorly learned and thus can be used to improve the accuracy of the neural network in these specific regions. An example of the proposed algorithm is applied to the IEEE 17 generator test system. 1. Introduction The modern trend towards deregulation is altering the manner in which electric power systems are operated. In the past, electric utilities were able to justify improvements in system infrastructure based solely on security considerations. In a deregulated environment this is no longer the case. Economic pressure tends to delay construction of new facilities. Therefore, utilities are being forced to operate their systems closer to their security boundaries. This demands the industry to develop better methods of quantifying the real-time security status of their systems. Several researchers have investigated the use of neural networks as a means to predict security status of large electric power systems [1-3]. Neural networks provide a mapping f(x)=s, where f(. ) is the network function, x is a vector of network inputs and S is the corresponding security status of the power system. Neural networks offer several advantages over traditional security assessment methods including faster execution times and the ability to model the entire power system in a compact and efficient form. McCalley et al. proposed the idea of using neural networks as a means of creating nomograms customized to the current operating status of the power system [4]. Nomograms are usually 2-dimensional plots showing the relationship of system control variables to the security of the system. In [4], a multilayer perceptron neural network was trained to learn the security status of a power system given a set of precontingency operating variables. Nomograms were then created by fixing a subset of the network input variables and adjusting the remaining variables to find the set of points X where { z : f ( z, y = S} = ) z = the subset of varied parameters y = thesubset of fixed paramters Repeated application of a simple one-dimensional root finding technique was proposed to generate two-dimensional nomograms. An example of a typical nomogram is shown in Figure 1. Jensen et al. [5] proposed a similar idea using an inversion of a trained neural network to extract information relative to the operation of the system. A gradient based neural network is used for the inversion algorithm to extract power system operating information such as the location of the security boundary to a given operating state. This information is used to either avoid insecurity or to regain security once lost. X 2 S=.4 S=.5 S=.6 Figure 1 Nomogram for two parameters showing three security levels X 1

Both of the above applications are based on searching the functional relationship of a trained neural network. Therefore, the accuracy of the neural network is critical to their performance. It is especially important that the neural network be accurate in operating regions of interest such as near the security boundary. This paper presents a new evolutionary-based query learning algorithm whereby the accuracy of a partially trained neural network can be increased. Moreover, the proposed algorithm is particularly well suited to quantifying and improving performance in specific regions of interest, such as security boundaries. The system is based on a boundary marking technique originally proposed by Reed and Marks [6] which makes use of an evolutionary algorithm to spread points evenly on a contour of interest. These points are then verified via simulations thus quantifying the accuracy of the security boundary. Areas of inaccuracy can then be improved by augmenting the training data base and retraining the neural network. Section 2 of this paper deals with issues involved in training neural networks for power system dynamic security assessment including; data gathering, training and validation. Section 3 introduces the concept of evolutionary algorithms and the proposed query learning technique of this paper. Section 4 describes the application of this technique to the creation of nomograms and the location of critical operating regions using the IEEE 17 generator transient stability test system as a case study. Finally, conclusions are presented in section 5. 2. NN's for DSA Neural networks have demonstrated the ability to approximate complex nonlinear systems when presented with a representative sample of training data. Several researchers have reported remarkable results when applying the multilayer perceptron neural network to the power system security assessment problem [1-3]. Typically, traditional methods such as time domain simulations [7] or energy function methods [8] are used to generate a database of training data. This database includes examples of all power system operating scenarios of interest described by a set of selected power system features as well as their resulting security measure. The neural network then adapts itself to the training database and produces an approximation to the security assessment problem in the form an equation f(x)=s, where f is the neural network function, x is the vector of power system features and S is the resulting security index. Examples of commonly used security indices include energy functions and critical clearing times [7,9]. A key advantage of using neural networks is the ability to extract operating information after training via neural network inversion techniques [1-12]. Neural network inversion is the process of finding an input vector that produces a desired output response for a trained neural network. For example, consider a neural network trained to predict the security S of a power system given a vector of system features x. By clamping the output value S to the marginally secure state, say S=.5, where S=1. is secure and S=. is insecure, and inverting the network, a marginally secure state x' can be found in the input space. This state then describes a region of the power system operating space where insecurity is likely to occur. It should be noted that since the neural network is typically a manyto-one mapping, the inversion is generally not to a unique point, but rather to some contour in the input space. In this paper we used the IEEE 17 generator transient stability test system as a case study. We used the EPRI energy margin software package called DIRECT [13] to create the training database for the neural network. Software was written to automate the data gathering process by repeatedly running the DIRECT software to calculate the system energy margin for a single fault under many different prefault operating states. The database consists of a set of prefault system features, in this case generator settings and system load, and the corresponding system energy margin. The DIRECT software determines the energy margin, which is related to the security of the system, by assigning a positive energy margin to secure states and a negative energy margin to insecure states. The magnitude of the energy margin indicates the degree of stability or instability. A software package called QwikNet [14] to design and test the neural network was used. QwikNet is a remarkable windows based neural network simulation package that allows experimentation with many different network topologies and training algorithms. After training, the neural network function, f(x)=s, can be written to a file in a convenient C programming language format that can easily be incorporated into the inversion software. 3. Evolutionary-Based Query Learning Algorithm Query learning [15-16] is a method that can be used to enhance the performance of partially trained neural networks. Query learning is based on the notion of asking a partially trained network to respond to questions. These questions are also presented to an oracle which always responds with the correct answer. The response of the neural network is then compared to that of the oracle and checked for accuracy. Areas that are poorly learned by the neural network can be thus identified. Training data is then generated in these areas and the network is retrained to improve its performance. The query learning procedure proposed in this paper is an extension of previously proposed methods. The principle difference is that instead of locating and then querying individual points, our algorithm works with a population of solutions, thus offering the ability to query entire areas of interest. This algorithm also seeks to evenly distribute the points across the area. Evenly distributing the points is

important because a global view of the security boundary in multiple dimensions is provided thus allowing the entire boundary to be queried and potentially improved. After the points are spread, they are simulated via the energy margin simulator and their true security index is determined. If all the points are within tolerance the algorithm stops. Otherwise, the points with unacceptably large errors are added to the training database and the neural network is retrained In the evolutionary boundary marking algorithm, all reproduction is asexual, i.e. no mating or crossover takes place. Offspring are produced as perturbations of single parents. This concentrates the search in the area close to the security boundary and speeds convergence. The algorithm seeks to minimize a fitness function, F, of the following form; where, F = f ( x) S + f x S D avg 1 D avg is the neural network function, is the current point, is the security boundary, and average distance to the nearest neighbors The evolutionary algorithm is randomly initialized with N points and then proceeds as follows. 1. The population is sorted based on fitness, F. 2. The M points with the lowest fitness scores are deleted. 3. Replacements are generated for each deleted point: (a) M parents are selected proportional to fitness from the remaining points. (b) New offspring are created as perturbations of the selected parents, x x + n new = parent, where n ~ N(, σ ). (c) Feasibility constraints are enforced on the new offspring via the solution of a standard power flow. 4. Repeat until convergence. By successively deleting points with poor fitness values and replacing them with perturbations of points with high fitness, the population tends to spread evenly across the solution contour. Typical values used in this paper are N=, M=, m=3 and σ =.5. Figure 2 shows histograms of the initial and final population distributions. It can be seen that the final population has converged to the security boundary and is evenly spread across the boundary. These points are then added to the training database and the network is retrained. Several iterations of query learning may be required produce acceptable results. Initial Distance to Boundary Final Distance to Boundary 1 8.1.2.3.4.5.6.7.8.9 1 1.1 1.2 Distance to Boundary 1 8.1.2.3.4.5.6.7.8.9 1 1.1 1.2 Distance to Boundary Initial Distribution Final Distribution 1 7 8 9 Distance to Neighbors 11 1 1 1 1 7 8 9 Distance to Neighbors 11 1 1 1 Figure 2 Histograms of the initial population and final population of the boundary marking algorithm

4. Case Study IEEE 17 Generator System The IEEE 17 generator transient stability test system [17] is used to illustrate the performance of the proposed algorithm. This system consists of 17 generators and 162 buses. The EPRI energy margin software DIRECT is used to determine the energy margin of the system in response to a single three phase fault. Twelve system features are selected to represent the system for neural network training. These include the real and reactive powers of the 5 generators closest to the fault location and the total system real and reactive load level. A training database of 436 samples was created for initial training of the neural network by randomly perturbing generation settings and system load levels and then simulating each case on the energy margin software. The initial RMS neural network testing error was.113 corresponding to a test database that was not used for training. The proposed query learning algorithm was then used to generate additional training samples near the security boundary. These points are simulated on the DIRECT energy margin simulation software and the points with large errors are added to the training data file. The final training database consisted of 1177 training samples and the final RMS test error was reduced to.62. Nomograms were then created from the initial and the enhanced neural networks based on the method proposed in [4]. These nomograms show the relationship between two generator power outputs and the security boundary. The two nomograms are shown in Figure 3 along with the true nomogram which was created by repeatedly querying the simulator. It should be noted that the nomogram of the simulator as shown in Figure 3 required smoothing by fitting a 2 nd order polynomial to the raw data. The smoothing operation is required due to the approximations and assumptions made by the simulation software. The RMS error for the initial nomogram is 48.53 while the enhanced neural network nomogram is 1.11. This experiment proves the viability of the proposed technique in increasing the accuracy of a partially trained neural network near the security boundary. 5. Conclusions This paper presents an enhanced query learning algorithm that effectively locates regions of interest and distributes neural network training data in these regions. The process is used to enhance the accuracy of partially trained neural networks in specific operating regions. The proposed technique is applied to the problem of generating power system operating nomograms from neural networks. Results show a nearly 5 fold improvement in RMS error when applied to the IEEE 17 generator test system. P76 (Mw) 11 1 1 9 6. Acknowledgement This work was supported by The National Science Foundation. 7. References Security Boundary Monogram 9 2 3 4 5 P73 (Mw) Figure 3 Nomogram of P73 vs. P76 Simulator Enhanced NN Initial NN [1] D.J. Sobajic and Y. H. Pao, Artificial Neural-Net Based Dynamic Security Assessment for Electric Power Systems, IEEE Transactions on Power Systems, vol. 4, no. 1, February 1989, pp. 2-228. [2] M. A. El-Sharkawi, R. J. Marks II, M. E. Aggoune, D. C. Park, M. J. Damborg and L. E. Atlas, Dynamic Security Assessment of Power Systems using Back Error Propagation Artificial Neural Networks, Second Symposium on Expert System Application to Power Systems, Seattle, WA, 1989. [3] Y. Mansour, E. Vaahedi, A.Y. Chang, B. R. Corns, J. Tamby and M. A. El-Sharkawi, "Large Scale Dynamic Security Screening and Ranking Using Neural Networks," IEEE Transaction on Power Systems, vol. 12 no. 2, May 1997, pp. 954-9. [4] J. D. McCalley, S. Wang, Q. Zhao, G. Zhou, R. T. Treinen, and A. D. Papalexopoulos, "Security Boundary Visualization For Systems Operation," IEEE Transactions on Power Systems, May 1997, pp. 9-947. [5] C. A. Jensen, R. D. Reed, M. A. El-Sharkawi and R. J. Marks II, "Location of Operating Points on the Dynamic Security Border Using Constrained Neural Network Inversion," International Conference on Intelligent Systems Applications to Power Systems (ISAP '97), Seoul, Korea, July 1997. [6] R. D. Reed and R. J. Marks II, An Evolutionary Algorithm for Function Inversion and Boundary Marking, IEEE International Conference on Evolutionary Computation, Perth, West Australia, December 1995. [7] P. Kundur, Power System Stability and Control, McGraw- Hill, New York, 1993.

[8] A. A. Fouad and V. Vittal, Power System Transient Stability Analysis Using the Transient Energy Function Method, Prentice Hall, 1992. [9] P. M. Anderson and A. A. Fouad, Power System Control and Stability, The Iowa State University Press, Ames, Iowa, 1977. [1] R. J. Williams, "Inverting a Connectionist Network Mapping by Backpropagation of Error", 8 th Annual Conference of the Cognitive Science Society, Lawrence Erlbaum, Hinsdale, NJ, pp. 859-865, 1986. [11] A. Linden and J. Kindermann, "Inversion of Multilayer Nets," Proceedings of the International Joint Conference on Neural Networks, Washington D. C., pp. 425-4, vol. 2, 1989. [12] J. N. Hwang, J. J. Choi, S. Oh, and R. J. Marks II, Classification Boundaries and Gradients of Trained Multilayer Perceptrons, IEEE International Symposium on Circuits and Systems, 199, pp. 3256-3259. [13] EPRI, Analytical Methods for DSA Contingency Selection and Ranking, Users Manual for DIRECT Version 4., EPRI TR-15886, Palo Alto, California, 1993. [14] QwikNet Neural Network Simulation Software, http://www.kagi.com/cjensen, 1997. [15] M. A. El-Sharkawi and S. S. Huang, Query-Based Learning Neural Network Approach to Power System Dynamic Security Assessment, International Symposium on Nonlinear Theory and Its Applications, Waikiki, Hawaii, December 5-1, 1993. [16] J.N. Hwang, J.J. Choi, S. Oh and R. J. Marks II, "Query Based Learning Applied to Partially Trained Multilayer Perceptrons", IEEE Transactions on Neural Networks, Vol. 2, 1991, pp.131-136. [17] IEEE Committee Report, Transient Stability Test Systems for Direct Stability Methods, IEEE Transactions on Power Systems, vol. 7, no. 1, February 1992, pp. 37-44.