{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:47:26Z","timestamp":1770749246063,"version":"3.50.0"},"reference-count":23,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T00:00:00Z","timestamp":1439164800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2015,8,10]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>In this paper, a new method is presented, to assess the security of the power system. In this method, an intelligent hierarchical structure for classifiers is used, which requires fewer calculation efforts in comparison with direct methods. Therefore, it is suitable for real time applications. Also, the correlations among different scenarios of the power system are considered. Therefore, the results are more realistic. The proposed method is implemented on IEEE 39-Bus New England and IEEE 300-Bus networks and the results show the superiority of the proposed method over other ones, to assess the system static security.<\/jats:p>","DOI":"10.3233\/ifs-151566","type":"journal-article","created":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T15:29:14Z","timestamp":1440170954000},"page":"2875-2880","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Intelligent hierarchical structure of classifiers to assess static security of power system"],"prefix":"10.1177","volume":"28","author":[{"given":"M.","family":"Gholami","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran"}]},{"given":"G.B.","family":"Gharehpetian","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran"}]},{"given":"M.","family":"Mohammadi","sequence":"additional","affiliation":[{"name":"Department of Power and Control Engineering, School of Electrical and Computer Engineering, Shiraz University, Shiraz, Fars, Iran"}]}],"member":"179","published-online":{"date-parts":[[2015,8,10]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2010.0201"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2193145"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/MPAE.2006.1597996"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2012.03.025"},{"key":"e_1_3_1_6_2","first-page":"2012","article-title":"A Data Mining Framework for Online Dynamic Security Assessment: Decision Trees, Boosting, and Complexity Analysis","author":"He M","unstructured":"HeMZhangJVittalVA Data Mining Framework for Online Dynamic Security Assessment: Decision Trees, Boosting, and Complexity AnalysisIn Proc of IEEE Innovative Smart Grid Technologies (ISGT)2012","journal-title":"In Proc of IEEE Innovative Smart Grid Technologies (ISGT)"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2009.2035507"},{"key":"e_1_3_1_8_2","first-page":"358","article-title":"Phasor Measurements-Aided Decision Trees forPower System Security Assessment","volume":"1","author":"Li Zh","year":"2009","unstructured":"LiZhWuW2009Phasor Measurements-Aided Decision Trees forPower System Security AssessmentIn Proc OfSecondInternational Conference on Information and Computing Science1358361","journal-title":"In Proc OfSecondInternational Conference on Information and Computing Science"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2009.2016528"},{"issue":"2009","key":"e_1_3_1_10_2","first-page":"1","article-title":"Decision Tree Based Online Voltage Security AssessmentUsing PMU Measurements","volume":"1","author":"Vittal V","unstructured":"VittalVDecision Tree Based Online Voltage Security AssessmentUsing PMU MeasurementsIn Proc of PSERC Conference1200919","journal-title":"In Proc of PSERC Conference"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2009.2037006"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2012.03.016"},{"key":"e_1_3_1_13_2","first-page":"1172","article-title":"Static Security Assessment Using Artificial Neural Network","author":"Saeh IS","year":"2008","unstructured":"SaehISKhairuddinA2008Static Security Assessment Using Artificial Neural NetworkProc of IEEE Second International Power and Energy Conference (PECon)11721178","journal-title":"Proc of IEEE Second International Power and Energy Conference (PECon)"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2011.09.004"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.01.028"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2012.2183899"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1080\/153250001753246844"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2008.2226.2233"},{"key":"e_1_3_1_19_2","unstructured":"Lawrence Berkeley National Laboratory"},{"key":"e_1_3_1_20_2","unstructured":"KunchevaLI2004Combining Pattern Classifiers: Methods and AlgorithmsWiley & Sons Publication"},{"key":"e_1_3_1_21_2","unstructured":"https:\/\/www.ee.washington.edu\/research\/pstca\/pf300\/pg_tca300bus.htm"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1080\/15325008.2011.629332"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2267557"},{"key":"e_1_3_1_24_2","first-page":"1","article-title":"Zonal price analysis of the Italian whole-sale electricity market","author":"Gianfreda A","year":"2009","unstructured":"GianfredaAGrossiL2009Zonal price analysis of the Italian whole-sale electricity marketin Proc 6th Int Conf Eur16","journal-title":"in Proc 6th Int Conf Eur"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IFS-151566","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/IFS-151566","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/IFS-151566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T08:49:28Z","timestamp":1770713368000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/IFS-151566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,10]]},"references-count":23,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,8,10]]}},"alternative-id":["10.3233\/IFS-151566"],"URL":"https:\/\/doi.org\/10.3233\/ifs-151566","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,10]]}}}