{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:56:07Z","timestamp":1743130567578,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242954"},{"type":"electronic","value":"9783030242961"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24296-1_57","type":"book-chapter","created":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T01:06:36Z","timestamp":1561770396000},"page":"713-730","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security-State Estimation of Electrical Power Systems: A Methodological Proposal"],"prefix":"10.1007","author":[{"given":"Fredy A.","family":"Sanz","sequence":"first","affiliation":[]},{"given":"C. A.","family":"Collazos","sequence":"additional","affiliation":[]},{"given":"Iv\u00e1n","family":"Ruiz","sequence":"additional","affiliation":[]},{"given":"Farid","family":"Mel\u00e9ndez-Pertuz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"unstructured":"Avalos, J.: Analysis and application of optimization techniques to power system security and electricity markets, Ph.D. thesis, University of Waterloo (2008)","key":"57_CR1"},{"unstructured":"Jian-Hua, Z., Guohua, Z., Manyin, D., Jingyan, Y.: Indices system and methods for urban power grid security assessment. In: Proceedings of APPEEC 2009, pp. 1\u20135 (2009)","key":"57_CR2"},{"doi-asserted-by":"publisher","unstructured":"Sunitha, R., Kumar, S.K., Mathew, A.T.: Online static security assessment module using artificial neural networks. IEEE Trans. Power Syst. 28(4), 4328\u20134335 (2013). https:\/\/doi.org\/10.1109\/tpwrs.2013.2267557","key":"57_CR3","DOI":"10.1109\/tpwrs.2013.2267557"},{"doi-asserted-by":"publisher","unstructured":"Zhao, F., Guo, Q., Sun, H., Wang, M., Wang, B.: Power system online security operational trend analysis and simulation results. In: 2013 IEEE Power and Energy Society General Meeting (PES), pp. 1\u201315 (2013). https:\/\/doi.org\/10.1109\/pesmg.2013.6672773","key":"57_CR4","DOI":"10.1109\/pesmg.2013.6672773"},{"doi-asserted-by":"publisher","unstructured":"Sun, H., et al.: Automatic learning of fine operating rules for online power system security control. IEEE Trans. Neural Netw. Learn. Syst. PP(99) (2015). https:\/\/doi.org\/10.1109\/tnnls.2015.2390621","key":"57_CR5","DOI":"10.1109\/tnnls.2015.2390621"},{"doi-asserted-by":"publisher","unstructured":"Wang, J., et al.: Online probabilistic security risk assessment implementation at china southern power grid towards smart control center. In: 2015 Seventh Annual IEEE Green Technologies Conference (GreenTech), pp. 74\u201381. https:\/\/doi.org\/10.1109\/greentech.2015.18","key":"57_CR6","DOI":"10.1109\/greentech.2015.18"},{"issue":"2","key":"57_CR7","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TPWRD.2013.2247426","volume":"28","author":"M Beiraghi","year":"2013","unstructured":"Beiraghi, M., Ranjbar, A.M.: Online voltage security assessment based on wide-area measurements. IEEE Trans. Power Deliv. 28(2), 989\u2013997 (2013). https:\/\/doi.org\/10.1109\/TPWRD.2013.2247426","journal-title":"IEEE Trans. Power Deliv."},{"issue":"4","key":"57_CR8","doi-asserted-by":"publisher","first-page":"1957","DOI":"10.1109\/TPWRS.2014.2353048","volume":"30","author":"J Geeganage","year":"2015","unstructured":"Geeganage, J., Annakkage, U.D., Weekes, T., Archer, B.A.: Application of energy-based power system features for dynamic security assessment. IEEE Trans. Power Syst. 30(4), 1957\u20131965 (2015). https:\/\/doi.org\/10.1109\/TPWRS.2014.2353048","journal-title":"IEEE Trans. Power Syst."},{"unstructured":"Chakrabarti, A., Kothari, D., de Abhinandan, Mukhopadhyay, A.: An Introduction to Reactive Power Control and Voltage Stability in Power Transmission Systems. PHI Learning Private Limited (2010)","key":"57_CR9"},{"doi-asserted-by":"publisher","unstructured":"Chychykina, I., Styczynski, Z.A., Heyde, C.O., Krebs, R.: Power system instability prevention and remedial measures with online dynamic security assessment. In: 2015 IEEE Eindhoven PowerTech, pp. 1\u20135 (2015). https:\/\/doi.org\/10.1109\/ptc.2015.7232303","key":"57_CR10","DOI":"10.1109\/ptc.2015.7232303"},{"doi-asserted-by":"crossref","unstructured":"Perez Londono, S., Rodriguez Garcia, L., Lopez, Y.U.: Effects of doubly fed wind generators on voltage stability of power systems. In: Proceedings of the Sixth IEEE\/PES Transmission and Distribution: Latin America Conference and Exposition (T&D-LA), pp. 1\u20136 (2012)","key":"57_CR11","DOI":"10.1109\/TDC-LA.2012.6319119"},{"key":"57_CR12","volume-title":"Power System Voltage Stability","author":"C Taylor","year":"1993","unstructured":"Taylor, C.: Power System Voltage Stability. McGraw-Hill, New York (1993)"},{"issue":"1","key":"57_CR13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1049\/ip-gtd:20020682","volume":"150","author":"M Haque","year":"2003","unstructured":"Haque, M.: On-line monitoring of maximum permissible loading of a power system within voltage stability limits. IEE Proc. Gener. Transm. Distrib. 150(1), 107\u2013112 (2003)","journal-title":"IEE Proc. Gener. Transm. Distrib."},{"issue":"10","key":"57_CR14","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1016\/j.ijepes.2010.06.005","volume":"32","author":"CY Lee","year":"2010","unstructured":"Lee, C.Y., Tsai, S.-H., Wu, Y.-K.: A new approach to the assessment of steady-state voltage stability margins using the p-q-v curve. Int. J. Electr. Power Energy Syst. 32(10), 1091\u20131098 (2010)","journal-title":"Int. J. Electr. Power Energy Syst."},{"doi-asserted-by":"publisher","unstructured":"Momoh, J.A., Makarov, Y.V., Elfayoumy, M.: Expected angle stability margin. In: 1998 IEEE International Conference on Systems, Man, and Cybernetics, vol. 4, pp. 3753\u20133758 (1998). https:\/\/doi.org\/10.1109\/icsmc.1998.726671","key":"57_CR15","DOI":"10.1109\/icsmc.1998.726671"},{"doi-asserted-by":"publisher","unstructured":"Zhang, H., Liu, Y.: New index for frequency deviation security assessment. In: IPEC, 2010 Conference Proceedings, pp. 1031\u20131034 (2010). https:\/\/doi.org\/10.1109\/ipecon.2010.5696966","key":"57_CR16","DOI":"10.1109\/ipecon.2010.5696966"},{"doi-asserted-by":"publisher","unstructured":"Sevilla, F.R.S., Vanfretti, L.: A small-signal stability index for power system dynamic impact assessment using time-domain simulations. In: 2014 IEEE PES General Meeting | Conference Exposition, pp. 1\u20135 (2014). https:\/\/doi.org\/10.1109\/pesgm.2014.6938842","key":"57_CR17","DOI":"10.1109\/pesgm.2014.6938842"},{"unstructured":"Nguyen, T.B.: Dynamic security assessment of power systems using trajectory sensitivity approach, Ph.D. thesis, University of Illinois at Urbana-Champaign (2002)","key":"57_CR18"},{"unstructured":"Li, W.: Risk Assessment of power systems. In: IEEE Press Series on Power Engineering (2005)","key":"57_CR19"},{"key":"57_CR20","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.epsr.2014.11.026","volume":"121","author":"FA Sanz","year":"2015","unstructured":"Sanz, F.A., Ramirez, J.M., Correa, R.E.: Experimental design for a large power system vulnerability estimation. Electr. Power Syst. Res. 121, 20\u201327 (2015). https:\/\/doi.org\/10.1016\/j.epsr.2014.11.026","journal-title":"Electr. Power Syst. Res."},{"key":"57_CR21","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"4","key":"57_CR22","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.ijepes.2009.09.003","volume":"32","author":"W Gu","year":"2010","unstructured":"Gu, W., Wan, Q.: Linearized voltage stability index for wide-area voltage monitoring and control. Int. J. Electr. Power Energy Syst. 32(4), 333\u2013336 (2010)","journal-title":"Int. J. Electr. Power Energy Syst."},{"unstructured":"Hall, M.A.: Correlation-based feature selection for machine learning, Ph.D. thesis, University of Waikato (1999)","key":"57_CR23"},{"key":"57_CR24","volume-title":"Pattern Recognition and Machine Learning. Information Science and Statistics","author":"CM Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Information Science and Statistics. Springer, New York (2006)"},{"issue":"11","key":"57_CR25","doi-asserted-by":"publisher","first-page":"2570","DOI":"10.1016\/j.clinph.2008.08.013","volume":"119","author":"V Morash","year":"2008","unstructured":"Morash, V., Bai, O., Furlani, S., Lin, P., Hallett, M.: Classifying fEEGg signals preceding right hand, left hand, tongue, and right foot movements and motor imageries. Clin. Neurophysiol. 119(11), 2570\u20132578 (2008). https:\/\/doi.org\/10.1016\/j.clinph.2008.08.013","journal-title":"Clin. Neurophysiol."},{"key":"57_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35488-8","volume-title":"Feature Extraction: Foundations and Applications. Studies in Fuzziness and Soft Computing","author":"I Guyon","year":"2006","unstructured":"Guyon, I., Gunn, S., Nikravesh, M., Zadeh, L.A.: Feature Extraction: Foundations and Applications. Studies in Fuzziness and Soft Computing. Springer, New York (2006). https:\/\/doi.org\/10.1007\/978-3-540-35488-8"},{"issue":"9","key":"57_CR27","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.1109\/5.784232","volume":"87","author":"CA Jensen","year":"1999","unstructured":"Jensen, C.A., et al.: Inversion of feedforward neural networks: algorithms and applications. Proc. IEEE 87(9), 1536\u20131549 (1999). https:\/\/doi.org\/10.1109\/5.784232","journal-title":"Proc. IEEE"},{"unstructured":"Innah, H., Asfani, D.A., Hiyama, T.: Voltage stability assessment based on discrimination principle. In: 2012 22nd Australasian Universities Power Engineering Conference (AUPEC), pp. 1\u20136 (2012)","key":"57_CR28"},{"doi-asserted-by":"publisher","unstructured":"Lakkireddy, J., Rastgoufard, R., Leevongwat, I., Rastgoufard, P.: Steady state voltage stability enhancement using shunt and series facts devices. In: 2015 Clemson University Power Systems Conference (PSC), pp. 1\u20135 (2015). https:\/\/doi.org\/10.1109\/psc.2015.7101706","key":"57_CR29","DOI":"10.1109\/psc.2015.7101706"},{"key":"57_CR30","volume-title":"Power System Stability and Control, EPRI Power System Engineering Series","author":"P Kundur","year":"1994","unstructured":"Kundur, P., Balu, N., Lauby, M.: Power System Stability and Control, EPRI Power System Engineering Series. McGraw-Hill, New York (1994)"},{"unstructured":"Shi, Z., Huang, Y., Zhang, S.: Fisher score based naive Bayesian classifier. In: 2005 International Conference on Neural Networks and Brain, vol. 3, pp. 1616\u20131621 (2005)","key":"57_CR31"},{"doi-asserted-by":"crossref","unstructured":"Singh, B., Sankhwar, J.S., Vyas, O.P.: Optimization of feature selection method for high dimensional data using Fisher score and minimum spanning tree. In: 2014 Annual IEEE India Conference (INDICON), pp. 1\u20136 (2014)","key":"57_CR32","DOI":"10.1109\/INDICON.2014.7030450"},{"key":"57_CR33","first-page":"1205","volume":"5","author":"L Yu","year":"2004","unstructured":"Yu, L., Liu, H.: Efficient feature selection via analysis of relevance and redundancy. J. Mach. Learn. Res. 5, 1205\u20131224 (2004)","journal-title":"J. Mach. Learn. Res."},{"unstructured":"Fayyad, U.M., Irani, K.B.: Multi-interval discretization of continuous-valued attributes for classification learning. In: IJCAI, pp. 1022\u20131029 (1993)","key":"57_CR34"},{"key":"57_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-87479-9_33","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"B Chidlovskii","year":"2008","unstructured":"Chidlovskii, B., Lecerf, L.: Scalable feature selection for multi-class problems. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008. LNCS, vol. 5211, pp. 227\u2013240. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87479-9_33"},{"unstructured":"Fukunaga, K.: Introduction to Statistical Pattern Recognition. Computer Science and Scientific Computing. Elsevier Science (2013)","key":"57_CR36"},{"key":"57_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"VN Vapnik","year":"1995","unstructured":"Vapnik, V.N.: The Nature of Statistical Learning Theory. Springer, New York (1995). https:\/\/doi.org\/10.1007\/978-1-4757-2440-0"},{"doi-asserted-by":"crossref","unstructured":"Scholkopf, B., Smola, A.J.: Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond, Adaptive Computation and Machine Learning. MIT Press, Cambridge (2002)","key":"57_CR38","DOI":"10.7551\/mitpress\/4175.001.0001"},{"key":"57_CR39","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"CJ Burges","year":"1998","unstructured":"Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2, 121\u2013167 (1998)","journal-title":"Data Min. Knowl. Discov."},{"key":"57_CR40","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/0-387-24555-3_5","volume-title":"Statistical Modeling and Analysis for Complex Data Problems","author":"Y Bengio","year":"2005","unstructured":"Bengio, Y., Grandvalet, Y.: Bias in estimating the variance of K-fold cross-validation. In: Duchesne, P., R\u00c9Millard, B. (eds.) Statistical Modeling and Analysis for Complex Data Problems, pp. 75\u201395. Springer, Boston (2005). https:\/\/doi.org\/10.1007\/0-387-24555-3_5"},{"unstructured":"Li, J., et al.: Feature selection: a data perspective. CoRR abs\/1601","key":"57_CR41"},{"unstructured":"Duarte, J., Garcia, J., Jimenez, J., Sanjuan, M.E., Bula, A., Gonzalez, J.: Autoignition control in spark-ignition engines using internal model control structure. J. Energy Resour. Technol. 139(2) (2016). http:\/\/energyresources.asmedigitalcollection.asme.org\/article.aspx?articleid=2532521","key":"57_CR42"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24296-1_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T11:35:24Z","timestamp":1721475324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24296-1_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242954","9783030242961"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24296-1_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}