{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T17:18:36Z","timestamp":1648660716372},"reference-count":8,"publisher":"Elsevier BV","issue":"1-3","license":[{"start":{"date-parts":[[1998,12,1]],"date-time":"1998-12-01T00:00:00Z","timestamp":912470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[1998,12]]},"DOI":"10.1016\/s0925-2312(98)00077-0","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T22:55:54Z","timestamp":1027637754000},"page":"85-96","source":"Crossref","is-referenced-by-count":1,"title":["Power system security boundary visualization using neural networks"],"prefix":"10.1016","volume":"23","author":[{"given":"James D.","family":"McCalley","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guozhong","family":"Zhou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vincent Van","family":"Acker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/S0925-2312(98)00077-0_BIB1","unstructured":"G.C. Ejebe, C. Jing, J.G. Waight, V. Vittal, G. Pieper, F. Jamshidian, D. Sobajic, P. Hirsch, On-line dynamic security assessment: transient energy based screening and monitoring for stability limits, 1997 IEEE PES Summer Meeting, Berlin, Germany, 20\u201324 July 1997."},{"key":"10.1016\/S0925-2312(98)00077-0_BIB2","unstructured":"R. Farmer, Present day power system stability analysis methods in the Western United States, Proc. Int. Symp. on Power System Stability, Ames, IA, May 1985, pp. 39\u201344."},{"key":"10.1016\/S0925-2312(98)00077-0_BIB3","unstructured":"J. Kanetkar, S. Ranade, Compact representation of power system security \u2013 a review, Proc. North American Power Symp., Reno, Nevada, October 1992, pp. 312\u2013321."},{"issue":"1","key":"10.1016\/S0925-2312(98)00077-0_BIB4","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/0378-7796(95)00955-H","article-title":"Rapid transmission capacity margin determination for dynamic security assessment using artificial neural networks","volume":"34","author":"McCalley","year":"1995","journal-title":"Elect. Power Systems Res."},{"issue":"2","key":"10.1016\/S0925-2312(98)00077-0_BIB5","doi-asserted-by":"crossref","first-page":"940","DOI":"10.1109\/59.589783","article-title":"Security boundary visualization for systems operation","volume":"12","author":"McCalley","year":"1997","journal-title":"IEEE Trans. Power Systems"},{"key":"10.1016\/S0925-2312(98)00077-0_BIB6","unstructured":"P. Shanahan, S. Naumann, Evaluation of simultaneous transfer capabilities, Proc. American Power Conf. Chicago, IL, April 1995, pp. 1463\u20131468."},{"key":"10.1016\/S0925-2312(98)00077-0_BIB7","unstructured":"V. Van Acker, S. Wang, J.D. McCalley, G. Zhou, M. Mitchell, Data generation using automated security assessment for neural network training, Proc. 29th North American Power Symp., Laramie, WY, October 1997, pp. 142\u2013148."},{"key":"10.1016\/S0925-2312(98)00077-0_BIB8","unstructured":"G. Zhou, J.D. McCalley, Composite security boundary visualization, IEEE Trans. Power Systems (1998), accepted."}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231298000770?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231298000770?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T16:59:30Z","timestamp":1555606770000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231298000770"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,12]]},"references-count":8,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[1998,12]]}},"alternative-id":["S0925231298000770"],"URL":"https:\/\/doi.org\/10.1016\/s0925-2312(98)00077-0","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[1998,12]]}}}