Fragmento Libro Machine Learning and Its Applications
Fragmento Libro Machine Learning and Its Applications
1
rt I. The Kernel Regression Tree approach is able to provide security classification
results and emulation of the numerical security index fm;• in a coherent way and
with good accuracy. Besides, KRTs provide simple interpretable security rules that
can be adopted by operators in the control rooms to help them in operating the
system.
I. Decision Trees (DT) provide classification structures of comparable performance
but with a simpler structure, which makes easier any interpretation of the
phenomena and of the influence of the relevant parameters. KRTs however have
the advantage of producing simultaneously a classification structure and giving the
degree of robustness of the system.
The paper by Matos et al. [12] tackles the same problem as the previous paper with
a different technique. lt reports on the application of fuzzy reasoning to the fast
assessment of the dynamic security of isolated power systems with high wind power
penetration. The inference method is a Takagi-Sugeno type system with a small
number of rules, optimized for each specific leaming set by a standard method
included in the MATLAB Fuzzy Logic Toolbox. The methodology is demonstrated in
a contingency study in the network of Crete that showed interesting results in the test
set. The paper discusses sorne implementation issues and possible future
developments of the approach, now in a preliminary phase.
Two approaches have been used regarding the classification problem: direct
classification of the operating state, or inference of the value of sorne index or
important variable, then used for classification. Sorne of the techniques can work with
either philosophy. In the present case, frequency is considered as the most important
variable, and both Ím;. and df/dt..., values constitute usual security indices that lead
straightforward to decision rules based on thresholds to their values. In this paper,
both approaches are used and results are compared.
Most of the paper is devoted to the analysis of the example and results. Results of
the application of fuzzy inference systems to dynamic security assessment are very
promising, even when a general purpose package is used to design the system.
However, more extensive tests are certainly needed, with different learning sets and
contingency situations, in order to draw more definite conclusions. Future
development of this work includes the use of different types of fuzzy inference
systems (first-order Takagi-Sugeno, different logical operators, etc.), new training
algorithms and new training philosophies, namely for the direct classification
procedures, with minimization of the classification error instead of the RMSE.
A Genetic Algorithm (GA) solution to the Economic Dispatch (ED) problem is
presented in the paper by Saramourtsis et al. [15]. Economic dispatch analysis
schedules the outputs of the online generating units so as to meet the system load at
mínimum cost. Improvements in scheduling the unit outputs can lead to significant
cost savings. Traditional dispatch algorithms (i.e. lambda iteration) are based on the
concept of equal incremental cost: the total production cost of a set of generators is
minimized when ali the units operate at the same incremental cost. When considering
transmission losses, the unit incremental costs are modified to account for incremental
transmission losses. Traditional algorithms however, require that the unit cost curves
($/h vs MW) be convex functions. Hence, they cannot handle non-monotonically
increasing incremental cost curves.
Solution to the economic dispatch problem with non-convex unit cost functions
can be achieved using dynamic programming (DP). Unlike the traditional solution,
the DP solution imposes no restrictions on the generating unit characteristics.
However, it suffers from the dimensionality problem: as the number of generators to
be dispatched increases and higher solution accuracy is needed, the storage
requirements and the execution time increases dramatically.
The GA solution proposed in this paper is integrated in CARE and applied to Crete
with very satisfactory results. A binary genetic algorithm was implemented in arder to
achieve the operating cost minimization. The algorithm's aim is to maximize the GA
objective function (which is the inverse of the operating cost) while satisfying the
constraint relations that are set by the generators' operating limits, as well as by the
power demand. GA solutions do not impose any convexity restrictions on the
generators' cost functions making them ideal for use with generator units non-convex
cost functions. Test cases with different numbers of online generators showed that the
proposed GA gives comparable results with the well-known o...iteration method that
was used as benchmark. In addition the encoding strategy, the penalty policy for
constraints violation and the importance of special operators that were designed
specifically for the economic dispatch problem are analyzed.
The paper by Gavoyiannis et al. [8] addresses the problem of computing the
probability density functions (pdfs) of power flows as approximated by a weighted
sum of a finite number of Gaussian kernels. The parameters and weights of these
, '
kernels are iteratively estimated from the actual power flow input samples using the
EM (Expectation-Maximization) algorithm implemented by a suitable Neural
Network. In this way, probabilistic load flows can be calculated avoiding assumptions
about the input data regarding their pdfs and correlation among them. The proposed
method, still at its infancy, presents interesting prospects for planning applications.
3 Conclusions
In the Workshop a wide variety of ML techniques for solving timely problems in the
areas of Generation, Transmission and Distribution of modern Electric Energy
Systems have been proposed. In particular, applications of Artificial Neural
Networks, Kernel Regression and Decision Trees, Fuzzy Systems and Genetic
Algorithms have been proposed or applied to security assessment, control, economic
dispatch, power flows calculations, forecasting, restoration, plant monitoring,
transformer manufacturing, faulted transmission line problems, and inductive
inference problems. In ali cases, the application of ML techniques has proven their
efficiency to tackle difficult power system operation, planning and manufacturing
issues. These applications, by no means exhaustive, are indicative of a booming
activity in Power System applied research, as shown by the impressive number of
related publications in the literature. In conclusion, ML techniques coupled with
mature analytical techniques promise to provide significant support to power systems
in the new era.
References
1. "CARE: Advanced Control Advice for power systems with large scale integration of
Renewable Energy sources", contract JOR3-CT96-0119, Proceedings of CARE
Workshop, Heraklion 16-17 July 1999 and Final Project Report, September 1999.
2. Chedid and Najar, "Automatic Finite-Element Mesh Generation Using Artificial Neural
Networks - Part I: Prediction of Mesh Density," IEEE Trans. on Magnetics, pp. 5173-
5178, Vol. 32, n. 5, Sep. 1996.
• 3.
4.
IGRE TF38-06-06, "Artificial Neural Networks for Power Systems: A Literature Survey•·,
Engineering Intelligent Systems, Vol. l, No. 3, pp. 133-158, Dec. 1993.
I.G. Damousis, P.D. Dokopoulos: A Genetic Fuzzy Model for Wind Speed Prediction and
Power Generation in Wind Parks. In [22].
5. T.E. Dy Liacco, "Control of power systems via the multi-level concept", PhD Thesis, Case
Western Reserve University, 1968.
6. M. El-Sharkawi, D. Niebur (editors). "Artificial Neural Networks with Applications to
Power Systems", IEEE PES, 96 TP 112-0.
7. N. Fountas, N. Hatziargyriou: Artificial Intelligence Approaches to the Problem of Power
System Restoration. In [22].
8. A.E. Gavoyiannis, N. Vlassis, N.O. Hatziargyriou: Probabilistic Neural Networks for
Power Flow Analysis. In [22].
9. P. Georgilakis, N. Hatziargyriou: Machine Learning Applications in the Transformer
Manufacturing Industry. In [22].
10. D. Kalles, A. Stathaki, R.E. King: Intelligent Monitoring and Maintenance of Power
Plants. In [22].
11. G. Kariniotakis, G.S. Stavrakakis, E.F. Nogaret, "Wind Power Forecasting using advanced
neural network models", IEEE Trans. on Energy Conversion, 96 SM 552-0 EC, pp. 762-
767, Vol. 11, No. 4, Dec. 1996.
12. M. Matos, J.A. Pecas Lopes, M.H. Vasconcelos: Dynarnic Security Assessment by Fuzzy
Inference. In [22].
13. C.K. Pang, F.S. Prabhakara, A.H. El-Abiad, A.J. Koivo, Security evaluation in power
systems using pattern recognition, IEEE Trans. 011 PAS 93, no. 3, 1974.
14. A.O. Papalexopoulos, S. hao, T-M. Peng, "An Implementation of a Neural Network based
Load Forecasting Model for the EMS", IEEE Trans. on Power Syst., pp. 1956-1962, Vol.
9, Nr. 4, Nov. 1994.
15. A. Saramourtsis, J. Damousis, A. Bakirtzis, P. Dokopoulos: Genetic Algorithm Solution to
the Econornic Dispatch Problem - Application to the Electrical Power Grid of Crete
Island. In [22].
16. K.J. Satsios, 1.G. Damousis, O.P. Lambridis, P.S. Dokopoulos: An Innovative Genetic
Fuzzy System for the Prediction of an Inductive Interference Problem. In [22].
17. G.B. Sheble, K. Brittig, "Refined Genetic Algorithm - Econornic Dispatch Example", 94
WM 199-0, pp. 117-124, IEEE Trans. on Power Systems, Vol. 10, No. 1, Febr. 1995.
18. D.J. Sobajic, R. Shen, B. Widrow: Supplementary Neural Controls for Improved Transient
Behavior of Power Systems. In [22).
19. D. Triantafyllidis: Mesh Density Prediction for Open Boundary Faulted Power
Transrnission Line Problems Using Artificial Neural Networks. In [22).
20. M.H. Vasconcelos, J.A. Pecas Lopes: Pruning Kernel Regression Trees for Security
Assessment of the Crete Network. In [22].
21. L. Wehenkel, "Automatic Learning Techniques in Power Systems", Kluwer Acadernic
Pub!., 1998.
22. Proceedings of the Workshop on Machine Learning Applications to Power Systems,
Advanced Course on Artificial Intelligence (ACAI '99), Chania, Greece, 1999
(http://www.iit.demokritos.gr/skel/eetn/acai99/Workshops.htm).