Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/286697732
CITATIONS READS
6 18
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Modjtaba Rouhani on 03 February 2016.
Abstract: Deregulation of power system in recent years has changed static security
assessment to the major concerns for which fast and accurate evaluation methodology is
needed. Contingencies related to voltage violations and power line overloading have been
responsible for power system collapse. This paper presents an enhanced radial basis
function neural network (RBFNN) approach for on-line ranking of the contingencies
expected to cause steady state bus voltage and power flow violations. Hidden layer units
(neurons) have been selected with the growing and pruning algorithm which has the
superiority of being able to choose optimal units center and width (radius). A feature
preference technique-based class separability index and correlation coefficient has been
employed to identify the relevant inputs for the neural network. The advantages of this
method are simplicity of algorithm and high accuracy in classification. The effectiveness of
the proposed approach has been demonstrated on IEEE 14-bus power system.
Iranian Journal of Electrical & Electronic Engineering, Vol. 7, No. 4, Dec. 2011 273
in terms of accuracy, speed and distribution of high-risk Voltage and line flow ranking
cases has been presented for security evaluation of a ..
large-scale power system. However, SVM learning
algorithms suffer from exceeding time and memory Supervised learning of
requirements, if the training pattern set is very large. IV RBFNN
SVM based binary classification for static and transient
security evaluation is proposed in [22] and levels of
power system security are just classified in two classes Calculation center and width
III
of secure and insecure. Also, literatures have reported
the use of decision trees [23] for design of classifier. Total ....
In this paper, an enhanced Radial Basis Function patterns
II Training set data normalized
Neural Network based on Growing and Pruning
algorithm (GPRBFNN), which automatically selects the
P1 P2 Pm V1 V2 Vj Q1 Q2 Qm
optimal units (neurons) and distributions, has been
I Input feature selection
presented. The proposed method ranks the
contingencies expected to cause steady state line power Large number
of inputs P P2 Pn V1 V2 Vk Q1 Q2 Qn
and bus voltage violations. Results of the contingency 1
rankings by the proposed method are compared with Fig. 1 Conceptual diagram of a supervised learning model for
those obtained by the classical performance index voltage and power line contingency ranking.
method (Newton Raphson). Different status for system
security levels, such as secure, correctively secure, alert, T
correctable emergency and non-correctable emergency where, Cj cj1 ,cj2 ,,c jm is the field centers matrix
have been considered and the proposed neural network and j is the radius in the function.
has been used to classify the power system security.
Moreover, an approach based on the class separability
index and correlation coefficient [24] is used to select 3 Proposed Algorithm of Enhanced Radial Basis
the relevant features for the GPRBFNN. The Function Neural Network
performance of the presented method has been In the traditional RBFNN, if the number of neurons
demonstrated on IEEE 14-bus system and found to be in hidden layer is too small, the generalized output
fitting for online ranking of contingencies. vectors may be in low accuracy. Conversely, too large a
number may cause over-fitting of the input data, as well
2 Methodology as upsetting the global generalization performance. A
The comprehensive block diagram of the proposed problem significantly found in RBFNN design,
method is presented in Fig. 1. A large number of load however, is selecting the appropriate number and
patterns are generated haphazardly in a wide range of positions of the radial basis functions in the hidden layer
load variation at each bus and for different contingency space. If the number of RBFN neurons is not selected
cases. The input features are preferred using the feature properly, the network may give out poor global
selection method to reduce the dimensionality of the generalization capability, slow training speed, and large
input and the size of the neural network (block I). The memory space request. Still, a second problem, from a
selected input is normalized (block II). Proposed classification point of view, is the boundary patterns
algorithm has been utilized to determine the number of where clusters of each class contain data from other
nodes in the hidden layer and cluster position (block classes. In the proposed algorithm, the boundary region
III). The input data are straightly fed to these hidden separates various classes and the patterns of each class
units and the weights between the hidden layer and the lie in their corresponding clusters.
output layer are adjusted using supervised learning The incremental training algorithm is outlined as
(block IV) so that the outputs of the RBFNN provide follows:
accurate values of the voltage and power flow ranking a) Suppose the classes A and B follow m and n
in each of the selected critical contingencies. patterns respectively.
RBFNN is used for solving problems such as pattern b) Calculate the distance between m patterns in
classification and nonlinear functional approximation class A and n patterns in class B:
[25]. The form of the radial basis function, O j (x) , is a 1 b1 a1 b n
strictly positive and symmetric with a unique maximum Pi (2)
at the center. The most commonly used form is the a m b1 a m b n
Gaussian function according to:
|| x C || 2 c) Find the minimum distance from pattern ai to
Q j ( x) exp (1)
j
274 Iranian Journal of Electrical & Electronic Engineering, Vol. 7, No. 4, Dec. 2011
Dis(aa 1 , B) min( a 1 b1 , , a 1 b n preesented algoriithm, Steps (bb) to (d) seek the optimum m
cennter and radius:
(3)
a i A & b j B R a Max i M
Min i norm 2 (aa i , b j1,2,...,n ) (7)
Dis(aa m , B) min( a m b1 , , a m b n
i
wh
here, R a and a i are the seelected radii and
i
a center sett
d) Determmine the maxximum distancce from (4); thhen, forr class A. Stepps (e) to (g) coontrast the paattern selectedd
considder R a j and a j as the radiu
us and centerr for as the centre with
w other paatterns of claass A and iff
the firrst neuron andd cluster of claass A: disstances are smmaller than thhe selected rad dius, they aree
R a j maax(Dis(a1 , B), , Dis(a m , B))) plaaced in one clluster and thee algorithm iss repeated forr
(4)
thee remainder of patterns in class A whicch are outsidee
e) Calcullate the distannce between patterns of cllass thee cluster [Figg. 2(a) and FFig. 2(c)]. Therefore,
T thee
A withh each other: prooposed algoritthm is repeateed until all pattterns of classs
a 1 a1 a1 a m A sit
s in their opttimum clusterrs [Fig. 2(b) and
a Fig. 2(d)]..
Finnally, by perfforming the pproposed alg gorithm, threee
Qi (5)
opttimum clusters can be foound for each h of the twoo
a m a1 a m a m
claasses of Fig. 2.
f) Sort thhe distance froom other patteerns in class A
A: The construction of GPR RBFNN, in itts most basicc
forrm, involves three
t layers wwith entirely different
d roless
a j a 1 , a j a 2 , , a j a m (6)
as shown in Fig g. 3. The firstt layer is an input
i layer off
g) Remove the patteerns of class A for smaaller whhich each nodee correspondss to an attribu ute of an inputt
distannces than R a j and
a label it ass the first clusster. patttern. The second layer iss a hidden layer and thee
trannsformation from
f the inpuut layer to thee hidden layerr
For thhe remainderr of the patterns of classs A is nonlinear, whereas
w it iis constructed using thee
whichh have larger distances than R a j , contiinue prooposed algoritthm. The thirrd layer givess the networkk
the prrocess until all patterns in class A are outtput vector wh hich is a lineaar combination of the basiss
eliminnated. funnction outputs. Thus, for the GPRBFN NN having l--
h) Repeaat the algorithm
m for the n paatterns of classs B. neu urons, the reelationship bbetween an n-dimensional
n l
Y y1 , y 22 ,, yn
T
Fig. 2 graphically illustrates
i the procedure of outtput vector and
a an m--
clustering sttages for ann artificial data
d set. In the
(a)) (b)
(c) (d)
Javan et al: F
Fast Voltage and
a Power Fllow Contingenncies Ranking
g 275
lacck of discrimiination in whiich the perforrmance indexx
forr a case with w many ssmall violations can bee
com mparable in value
v to the iindex for a case
c with onee
hug ge violation, is known ass masking efffect. Maskingg
efffect, to some extent, can bee avoided by using higherr
ordder performance indices. However, to t avoid thee
misranking, prop per selection oof weights forr performancee
inddices is requireed. Some of thhe efforts in reducing thesee
t works of [26-27]. To overcome
efffects include the o thee
maasking, one caan try to raisee the exponen nt used in thee
pen nalty function
ns.
4.1
4 Voltage and a Power Linne Performance Indices
The voltagee performancce index is selected too
m lack due to out-of limits bus voltagess
quaantify system
and
d measures th he severity off contingencies. There aree
sev
veral types off performancee indices in literature
l [28]]
butt following voltage perfo formance index has beenn
acq
quired in this paper:
p
M
LV
W f
PII V i i (12)
Fig. 3 Structurre of GPRBF neeural network. i 1 M Vlim
Vi Vi , Vi Vimax
max
276 Iranian
I Journnal of Electrical & Electron
nic Engineerinng, Vol. 7, No. 4, Dec. 2011
works well with linearly separable classes, but not well
4.2 Security Index established on non-linearly separable classes [31].
In order to quantify the concept of secure and A usual procedure includes exploiting the crisp
insecure operating states, five severity levels have been secure-insecure classification provided by class
determined. The four critical levels are correctively separability index ( F ) and correlation coefficient [24] is
secure, alert, correctable emergency and non-correctable used to select appropriate training feature for the
emergency and are represented by the hypotheses {H1, GPRBFN. F is defined by expression according to:
H2, H3, H4}, and one non-critical level is shown by mi(S) mi(I)
{H0}. In this way, term of {H4} represents which all Fi (S) (15)
loads supplied but operating limits are violated. These i i(I)
cannot be corrected without loss of load. For ranking the where, m i(S) and m i( I ) are the mean values of variable
severity of contingencies, single line and generator
i in the secure and insecure classes, respectively, i
(S)
outages corresponding to each load pattern are also
simulated by full AC load flow to calculate the voltage and i(I) are the corresponding standard deviations.
and power line performance index. Based on the Variables with greater F have more discriminating
calculated performance index, the voltage and power power, and are chosen as relevant attributes. Correlation
flow security status can be determined, according to coefficient between the variables with greater F is
Table 1. calculated using the expression below:
Table 1 Security levels for classification of line overloads and out-of limits bus voltages.
Security level Line flow (%) PIMW Voltage Deviation (%) PIV
Secure (H0) <100 <0.25 <10 <0.04
Correctively Secure (H1) 100-120 0.25-0.51 10-20 0.04-0.79
Alert (H2) 120-150 0.51-1.26 20-30 0.79-4.00
Correctable Emergency (H3) 150-180 1.26-2.62 30-40 4.00-12.60
Non-correctable Emergency (H4) >180 >2.62 >40 >12.60
Javan et al: Fast Voltage and Power Flow Contingencies Ranking 277
Load Variation Class I: <0.25 Class II: 0.25-0.51 Class III: 0.51-1.26
(60% to 140% base case)
Fig. 4 Methodology for the for data generation contingency analysis using neural network.
2) Mean of Square Error (MSE): the same for different load scenarios such as the line
1 N outage between bus 1 and bus 2. In addition, it can be
MSE = NNOk DOk
2
(19) seen that GPRBFNN method has a considerable
N k =1
performance than classical RBFNN. As it can be
3) Classification Accuracy (CA): observed from Table 3, the outage of L1 is most severe
No. of samples classified correctly
CA(%) = 100 (20) in all of these cases. The bold outages indicate the
Total No. of samples in data set misclassified contingencies.
7.1 IEEE 14-Bus System Table 2 Class separability index F for IEEE 14-bus system.
IEEE 14-bus is the test system which contains 2 Feature No. Variables Separability Index F
generators, 14 buses, 20 lines and 3 condensers. This 1 V9 0.74
2 Phase14 0.33
power system is shown in Fig. 5.
3 Qload13 0.99
Input features are selected by a statistical method
4 Qload11 0.80
based on class separability index and correlation 5 Qsc8 0.65
coefficient technique. Separability factor of every 6 Pline7-9 0.60
variable of the power system was calculated as per (15) 7 Pline6-13 0.34
and (16), respectively. In Table 2, 12 features were 8 Qline4-9 0.36
selected, having high separability factor and low 9 Qline5-6 0.37
correlation coefficient among them. 10 Qline6-3 0.68
A total of 800 (contingencies) load flow cases are 11 Qline7-8 0.62
selected for the load scenarios using different lines and 12 Qline12-13 0.36
generation outages to compute the voltage performance
indices and determine the security levels as pointed out
in Table 1. After training, the optimum size of the
GPRBFNN was found to be (12-284-5) which each of
the security status of secure, correctively secure, alert,
correctable emergency and non-correctable emergency
has 42, 105, 94, 40 and 3 neurons (clusters) in the
hidden layer, respectively. GPRBFNN was tested using
different sets of load flow cases that were not used
during the training process. For testing, 80 load flow
cases are selected using different transmission lines and
generator outages.
It can be observed from Table 3 that the column
corresponding to the voltage contingency ranking
obtained by GPRBFNN for different loading conditions
is almost same as that obtained by the Newton Raphson
Fig. 5 IEEE 14-bus test system.
(NR). The ranking order of similar contingencies is not
278 Iranian Journal of Electrical & Electronic Engineering, Vol. 7, No. 4, Dec. 2011
Table 3 IEEE 14-bus system-Voltage ranking at different loading conditions.
Loading Line/Gen Contingency Ranking
No PIV
P (MW) Q (MW) From/To Load Flow (NR) RBFNN GPRBFNN
1 360.48 50 1-2 5.72 H3 H0 H3
2 412.87 60 2-3 0.43 H1 H1 H1
3 26861 80 9-14 0.89 H2 H4 H2
4 423.37 55 G8 0.11 H1 H1 H0
5 353.32 73 1-2 14.65 H4 H2 H4
6 306.65 40 G1 0.53 H1 H1 H1
7 310.60 62 6-11 0.92 H2 H2 H2
8 299.34 85 10-11 0.51 H1 H0 H1
9 378.33 63 5-6 0.80 H2 H0 H2
10 324.39 78 G6 0.31 H1 H1 H1
Table 4 IEEE 14-bus system-PIMW ranking of generator and power line outages at 120% loading.
Ranking of contingencies according to severities (line & generator outages)
Loading Methods Secure Correctively Alert Correctable emergency non-Correctable
(%) secure emergency
G8 L14 G3,G6,L19 G2,L13,L9,L15,L11,L5,L20,L8 L1,L3,L10,L2,L4,L7
Load Flow
L17,L6,L12,L16,L18
120 L3, L5 G8 G3,G6,L19 G2,L13,L9,L15,L11,L14 L1,L2, L7
RBFNN
L8 L4,L10,L18 L17,L6,L12,L16,L20
G8 L14 G3,L15,G6,L19 G2,L13,L9,L11,L5,L20,L8,L17 L1,L3,L10,L2,L4,L7
GPRBFNN L6 ,L12,L16,L18
Javan et al: Fast Voltage and Power Flow Contingencies Ranking 279
Table 5 IEEE-14 bus system- obtained results of voltage and power flow ranking performance at different loading conditions.
Voltage Performance Index Ranking Power Flow Performance Index Ranking
Train Set Test Set Train Set Test Set
No. Neuron 431 284 431 284 512 215 512 215
MAPE (%) 2.93 1.07 12.03 3.77 2.10 0.69 9.98 1.150
Time (s) 40.60 9.8 1.03 0.52 33.13 9.8 1.14 0.65
Radial basis function neural network based on [5] Scott B. and Alsac O., Fast decoupled load
Growing and Pruning algorithm has been proposed to flow, IEEE Trans on PAS, Vol. PAS-93, pp.
evaluate static security of IEEE 14-bus power system. 859-869, May 1974.
The proposed neural network approach to contingency [6] Mori H., Tanaka H. and Kanno J., A
analysis consists of training the ranking module for Preconditioned Fast Decoupled Power Flow
different contingencies corresponding to voltage method for contingency screening, IEEE Trans.
violated buses and power flow (MW) violated lines. The on Power System, Vol. 11, pp. 357-362, Feb.
ranking module provides accurate levels of performance 1996.
indices (PIV, PIMW) for unknown load patterns, which [7] Brandwajn V. and Lauby M. L., Complete
are compared with Newton Raphson method. In the bounding method for AC contingency screening,
presented algorithm, optimum centers and IEEE Trans. on Power System, Vol. 4, No. 1, pp.
corresponding radii are obtained. So, the training of 724-729, May 1989.
RBFN based on Growing and Pruning algorithm [8] Tsang I., Kocsor A. and Kwok J., Large-scale
requires less computation time and the testing accuracy maximum margin discriminate analysis using
of RBFN has been made higher by applying it. Test core vector machines, IEEE Trans. Neural
results reveal that the proposed network involve less Network, Vol. 19, pp. 610-624, 2008.
time and is suitable for online static assessment under [9] Kim H. and Singh C., Power System
uncertain loading conditions and is expected to perform Probabilistic Security Assessment using Bayes
similarly on even larger systems and handle even Classifier, Electric Power Systems Research,
greater number of contingencies than reported here. Vol. 74, No. 1, pp. 157-165, 2005.
[10] Ramos G., Sanchez J. L., Torres A. and Rios M.
References A., Power Systems Security Evaluation Using
[1] Shahidehpour M., Tinney W. F. and Fu Y., Petri Nets, IEEE Trans on Power Delivery, Vol.
Impact of security on power systems operation, 25, No. 1, pp. 316-322, 2010.
Proc. IEEE, Vol. 93, No. 11, pp. 2013-2025, Nov. [11] Diao R., Vittal V. and Logic N., Design of a
2005. Real-Time Security Assessment Tool for
[2] Mahadev P. M. and Christie R. D., Envisioning Situational Awareness Enhancement in Modern
Power System Data: Vulnerability and Severity Power Systems, IEEE Trans. on Power System,
Representations for Static Security Assessment, Vol. 25, No. 2, pp. 957-965, 2010.
IEEE Trans on Power Systems, Vol. 9, No. 4, pp. [12] Aghamohammadi M. R., Static Security
1915-1920, Nov. 1994. Constrained Generation Scheduling Using
[3] Ejebe G. C. and Wollenberg B. F., Automatic Sensitivity Characteristics of Neural Network,
contingency selection, IEEE Trans. Power Iranian Journal of Electrical & Electronic
Apparatus Syst, Vol. PAS-98, pp. 97-109, Jan. Engineering (IJEEE), Vol. 4, No. 3, pp. 104-114,
1979. 2008.
[4] Jadid S. and Jalilzadeh S., Effective transient [13] Aghamohammadi M. R., Hashemi S. S. and
stability assessment based on composite indices, Ghazizadeh M. S., Improving Voltage Stability
Iranian Journal of Electrical & Electronic Margin Using Voltage Profile and Sensitivity
Engineering (IJEEE), Vol. 1, No. 2, pp. 74-80, Analysis by Neural Network, Iranian Journal of
2005. Electrical & Electronic Engineering (IJEEE),
Vol. 7, No. 1, pp. 33-41, 2011.
280 Iranian Journal of Electrical & Electronic Engineering, Vol. 7, No. 4, Dec. 2011
[14] Morisoon K., Wangg L., Kundur P., Lin X., G Gao [25
5] Broomheaad D. S. andd Lowe D., Multivariable
e
W., HHe C., Xue F., Xu J., Xu T. and Xue Y., functionall interpolationn and adaptiv ve networks,,
Criticcal requiremments for su uccessful onl nline Complex Syst.,
S Vol. 2, NNo. 1, pp. 321
1-355, 1988.
securitty assessmentt, presented at a the IEEE P PES [26
6] Halpin T. F., Fischl R. and Fink R.,, Analysis off
PSC& &E Conf., pp. 30-39,
3 New York,
Y Oct. 10--13, contingency selection algorithms, IEEE Trans.
2004. on Power Apparatus annd Systems, Vol. V PAS-103,,
[15] Avila--Rosales R., Sadjadpour A., A Gibescu M., No. 5, pp. 938-945, Maay 1984.
Morisoon K., Ham madani H. and Wang L., [27
7] Schafer K.K F. and V Verstege J. F.,F Adaptivee
ERCO OTs implem mentation of online dynam amic proceduree for maskingg effect com mpensation inn
securitty assessmennt, presented d at the Paanel contingency selection aalgorithm, IE EEE Trans. onn
Session of the IEEEE PES, 2003. Power System, Vol. 5,, No. 2, pp. 539-546,
5 Mayy
[16] Wang Y. H., Chann K. W. and Pong T. Y. G., 1990.
Dynaamic voltage security con nstrained optim mal 8] Wood A. J. and W
[28 Wollenberg B. F., Powerr
coordiinated voltagge control using u enhannced Generatioon Operation aand Control, 2nd Ed, Johnn
particlle swarm optimization, IET Genner. Wiley & Sons,
S pp. 15-664, 1996.
Transm m. Distrib, Vool. 5, No. 2, pp.
p 239-248, F Feb. [29
9] Nojun Kw wak N. and Chong-Ho Choi C. H.,,
2011. Input feature
f selec
ection for classificationn
[17] Samanntaray S. R., Kamwa I.. and Joos G., problems, IEEE Tranns. Neural Neetworks, Vol..
Ensem mble decisionn trees for phaasor measurem ment 13, No. 1, pp. 143-159,, Jan. 2002.
unit-baased wide-areea security asssessment in the 0] Jensen C. A., El-Sharkaawi M. A. and
[30 d Marks R. J.,,
operations time frrame, IET Gener. Trannsm. Power sy ystem security ty assessment using neurall
Distribb, Vol. 4, No.
N 12, pp. 1334-1348,
1 D
Dec. networks: feature selection using u fisherr
2010. discriminaation, IEEE Trans. on PowerP System,,
[18] Alessaandri A., Grillo S., Massuccco S., Silvestroo F. Vol. 16, No.
N 4, pp. 757--763, 2001.
and VVimercati G., ANN Appllication For O On- [31
1] Sa Da Co osta J. M. G G. and Munro N., Patternn
Line Power Systtem Security y Assessmen ent, Recognition in Pow wer System m Security,,
Internaational Confference on Power Systeems Internatio
onal Journal of Electrica al Power &
(PMAP PS 2006), pp.1-6, 2006. Energy Syystems, Vol. 6, No. 1, pp p. 31-36, Jan..
[19] Shang J., Zhang J.,, Zhao W. an nd Liu J., AN
ANN 1984.
Based Dynamic Vooltage Security y Assessmentt for [32
2] Milano F.,
F Matlab power sytem m simulationn
a Prractical Pow wer, Intern national Pow wer package, http://www w.power.uwateerloo.ca/~fmill
Engineeering Conferrence (IPEC 2007), pp. 7794- ano/psat. htm.
h
798, D
Dec. 2007.
[20] Moulinn L. S., Alvess Da Silva A. P., El-Sharkaawi,
M. A. and Marks R. R J., Support vector machiines
for trransient stabiility analysiss of large-sccale Dawoodd Seyed Javan n was born inn
power systems, IE EEE Trans. on n Power Systtem, Mashhadd, Iran, in 1984. He receivedd
Vol. 19, No. 2, pp. 818-825,
8 2004
4. the B. Sc. degrees in electricall
[21] Moham mmadi M. and Ghareh hpetian G. B., engineerring from the Azad
A Universityy
of Mashhhad. He is currrently pursuingg
Appliication of corre vector machines for on-lline the M.SSc. degree in thhe Departmentt
voltage security assessment using g a decision-trree- of Electtrical Engineerring, Ferdowsii
based feature selecction algorith hm, IET Genner. Universiity of Mashh had, Mashhad,,
Transm m. Distrib., Vol.
V 3, No. 8, pp. 701-7712, Iran. HHis research interests aree
2009. power
p system
m security asssessment, loaad and pricee
[22] Kalyanni S. and Shannti Swarup K.., Power Systtem forecasting
f in electricity maarkets, neural networks andd
Securiity Assessmennt using Binaary SVM Baased genetic
g algorith
hms.
Patternn Recognitionn, Internatio onal Journall of
Electriical Powerr and Ennergy Systeems
Engineeering, Vol. 2,
2 No. 3, pp.18 89-195, 2009.
Habib RRajabi Mashha adi was born inn
[23] Saeh II. S. and Khaiiruddin A., D Decision Tree for Mashhadd, Iran, in 1967. He receivedd
Static Security Asssessment and d Classificatioon, the B.SSc. and M.Sc. degrees withh
Internaational Confference on Future
F Compuuter honor frrom the Ferdowsi Universityy
and Coommunicationn (ICFCC), pp p. 681-684, 20009. of Masshhad, both in electricall
[24] Matos M. A., Hatziargyriou N. D. D and Pecasloopes engineerring, and the Ph.D. degreee
J. A., Multicontinngency stead dy state secuurity from thee Department off Electrical andd
evaluaation using fuzzy
f clusteriing techniquees, Computeer Engineerin ng of Tehrann
IEEE T Trans. Powerr Syst., Vol. 15
5, No. 1, pp. 1177- Universiity, Tehran, Iraan, under jointt
cooperation
c of
o Aachen U University off Technology,,
183, F
Feb. 2000.
Javan et al: F
Fast Voltage and
a Power Fllow Contingenncies Ranking
g 281
Germany, inn 2002. He is asa Associate Proofessor of electrrical
engineeringg at Ferdowsii University of Mashhad. His
research intterests are poweer system operaation and plannning,
power systeem economics, and biological computation.
Modjtaba Rou
M uhani receivedd the
B
B.S. and M.S.M degrees in
e
electrical en
ngineering ffrom
F
Ferdowsi univeersity of Mashhad,
M
Mashad, Iran, in
i 1990 and 19993,
r
respectively, an
nd the Ph.D. deggree
i electrical engineering ffrom
in
A
Amir Kabir university of
T
Technology, Tehran,
T Iran, in
2
2001. He is cu urrently with A Azad
I
Islamic univ
versity, Gonaabad
branch, Gonnabad, Iran, whhere he is an assistant Professoor in
control enngineering, eleectrical engineering departm ment,
engineeringg faculty. Hiss research intterests are neeural
networks, computationaal intelligencee and nonlinnear
adaptive coontrol.
282 Iranian
I Journnal of Electrical & Electron
nic Engineerinng, Vol. 7, No. 4, Dec. 2011