/img alt="Imagem da capa" class="recordcover" src="""/>
Dissertação
Uso de árvore de decisão para avaliação da segurança estática em tempo real de sistemas elétricos de potência
The techniques used to Static Security Assessment in power systems depend on the implementation of a large number of cases of load flow for various topologies and system operating conditions. In real-time operation environments, this practice is difficult to implement, especially in large systems wh...
Autor principal: | RODRIGUES, Benedito das Graças Duarte |
---|---|
Grau: | Dissertação |
Idioma: | por |
Publicado em: |
Universidade Federal do Pará
2015
|
Assuntos: | |
Acesso em linha: |
http://repositorio.ufpa.br/jspui/handle/2011/6280 |
Resumo: |
---|
The techniques used to Static Security Assessment in power systems depend on the implementation of a large number of cases of load flow for various topologies and system operating conditions. In real-time operation environments, this practice is difficult to implement, especially in large systems where the execution of all cases of load flow needed, requires high time and computational effort even for the current resources available. Data Mining techniques such as decision tree have been used in recent years and have achieved good results in the applications of static and dynamic security assessment of electrical power systems.
This work presents a methodology for static security assessment in real-time of electrical power systems using the decision tree, where off-line load flow simulations, performed by software ANAREDE (CEPEL), has been generated an extensive labeled database related to the state of the system for various operating conditions. This database was used for induction of decision trees, providing a model for fast and accurate prediction that classifies the state of the system (secure or insecure) for real time application. This methodology reduces the use of computers in the on-line environment, since the processing of the decision tree requires only checking some if-then logical instructions of a limited number of numerical tests in the binary nodes for the attribute value definition that satisfies the rules, because these tests are performed in a same number of hierarchical levels of the decision tree, which is usually reduced. With this simple computational processing, the task of the static security evaluating will be able to be performed in a fraction of the time required to perform by faster traditional methods.
To validate the methodology, a case study based on a real power system was performed, where for every contingency classified as insecure a corrective control action was executed from the decision tree information on the critical attribute that affects the security. The results showed the methodology is an important tool for static security assessment in real time for use in a center's operation system. |