{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T13:42:53Z","timestamp":1777902173667,"version":"3.51.4"},"reference-count":38,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2009,7,17]],"date-time":"2009-07-17T00:00:00Z","timestamp":1247788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIMULATION"],"published-print":{"date-parts":[[2010,2]]},"abstract":"<jats:p>In this paper we present a combinatorial scheme based on hidden Markov models (HMM) and wavelet transform (WT) to discriminate between magnetizing inrush currents and internal faults in power transformers. HMMs are powerful tools for transient classification which compute the maximum likelihood probability between training and testing data signals for identification. The WT is employed to extract certain features which reduce the computation burden of HMMs and enhance detection accuracy. The newly extracted feature efficiently discriminates between faults by different trends. The k-means clustering technique is applied to reduce the training procedure time investment. Since the discrimination method is based on the probabilistic characteristics of the signals without application of any deterministic index, more reliable and accurate classification is achieved. This method is independent of the selection thresholds. Based on the proposed algorithm a highspeed relay response (a quarter of a cycle) can be achieved. The suitable performance of this method is demonstrated by simulation of different faults and switching conditions on a power transformer using PSCAD\/EMTDC software.<\/jats:p>","DOI":"10.1177\/0037549709342729","type":"journal-article","created":{"date-parts":[[2009,7,17]],"date-time":"2009-07-17T20:50:29Z","timestamp":1247863829000},"page":"93-107","source":"Crossref","is-referenced-by-count":12,"title":["A Novel Discriminative Approach Based on Hidden Markov Models and Wavelet Transform to Transformer Protection"],"prefix":"10.1177","volume":"86","author":[{"given":"Saeed","family":"Jazebi","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Amirkabir University of Technology, 424 Hafez Avenue, Tehran, Iran"}]},{"given":"Behrooz","family":"Vahidi","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Amirkabir University of Technology, 424 Hafez Avenue, Tehran, Iran,"}]},{"family":"Seyed Hossein Hosseinian","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Amirkabir University of Technology, 424 Hafez Avenue, Tehran, Iran"}]}],"member":"179","published-online":{"date-parts":[[2009,7,17]]},"reference":[{"key":"atypb1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7796(02)00100-1"},{"key":"atypb2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2006.877095"},{"key":"atypb3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2004.12.007"},{"key":"atypb4","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2006.11.013"},{"key":"atypb5","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7796(02)00085-8"},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2003.810979"},{"key":"atypb7","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2004.834891"},{"key":"atypb8","doi-asserted-by":"publisher","DOI":"10.1109\/61.956753"},{"key":"atypb9","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2007.02.014"},{"key":"atypb10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-epa:20070009"},{"key":"atypb11","volume-title":"IEEE Power Engineering Society General Meeting","author":"Jing, M."},{"key":"atypb12","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2005.855443"},{"key":"atypb13","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2003.11.015"},{"key":"atypb14","doi-asserted-by":"publisher","DOI":"10.1109\/61.636909"},{"key":"atypb15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2006.08.001"},{"key":"atypb16","doi-asserted-by":"publisher","DOI":"10.1016\/S0142-0615(01)00065-5"},{"key":"atypb17","first-page":"1868","volume":"3","author":"Guocai, S.","year":"2000","journal-title":"IEEE Power Engineering Society Winter Meeting"},{"key":"atypb18","first-page":"1010","volume":"1","author":"Sayed, E.","year":"2004","journal-title":"Emerging Electric Power Systems"},{"key":"atypb19","doi-asserted-by":"publisher","DOI":"10.1049\/ip-gtd:20030325"},{"key":"atypb20","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd:20060206"},{"key":"atypb21","doi-asserted-by":"publisher","DOI":"10.1007\/s00202-004-0231-9"},{"key":"atypb22","volume-title":"Proceedings of Power and Energy Systems, Baltimore, MD, 1998, proceeding 617","author":"Moravej, Z."},{"key":"atypb23","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7796(00)00099-7"},{"key":"atypb24","first-page":"179","volume":"1","author":"Jazebi, S.","year":"2008","journal-title":"IEEE Proceedings of 11th International Conference on Optimization of Electrical and Electronic Equipment"},{"key":"atypb25","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"atypb26","doi-asserted-by":"publisher","DOI":"10.1109\/61.974212"},{"key":"atypb27","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2004.843399"},{"key":"atypb28","doi-asserted-by":"publisher","DOI":"10.1109\/TDEI.2004.1324361"},{"key":"atypb29","doi-asserted-by":"publisher","DOI":"10.1016\/S0952-1976(99)00011-1"},{"key":"atypb30","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2004.840412"},{"key":"atypb31","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2005.09.013"},{"key":"atypb32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.04.007"},{"key":"atypb33","volume-title":"IEEE International Conference on Automation and Logistics","author":"Suxiang, Q."},{"key":"atypb34","volume-title":"Introduction to PSCAD\/EMTDC V3","author":"Woodford, D.","year":"2000"},{"key":"atypb35","volume-title":"Proceedings 5th Power Systems Computing Conference","author":"Dommel, H.W."},{"key":"atypb36","first-page":"28","volume":"5","author":"Faraoun, K.M.","year":"2006","journal-title":"Computational Intelligence"},{"key":"atypb37","doi-asserted-by":"publisher","DOI":"10.1002\/1099-0542(2000)8:3\/4<141::AID-CAE2>3.0.CO;2-Y"},{"key":"atypb38","volume-title":"Schweitzer Engineering Laboratories Technical papers","author":"Guzm\u00e1n, A."}],"container-title":["SIMULATION"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0037549709342729","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0037549709342729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T11:21:58Z","timestamp":1777634518000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0037549709342729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,17]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,2]]}},"alternative-id":["10.1177\/0037549709342729"],"URL":"https:\/\/doi.org\/10.1177\/0037549709342729","relation":{},"ISSN":["0037-5497","1741-3133"],"issn-type":[{"value":"0037-5497","type":"print"},{"value":"1741-3133","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,17]]}}}