-
1
-
-
0016061868
-
Security evaluation in power systems using pattern recognition
-
May
-
C. Pang, F. Prabhakara, A. El-Abiad, and A. Koivo, "Security evaluation in power systems using pattern recognition, " IEEE Trans. Power App. Syst., vol. PAS-93, no. 3, pp. 969-976, May 1974.
-
(1974)
IEEE Trans. Power App. Syst.
, vol.PAS-93
, Issue.3
, pp. 969-976
-
-
Pang, C.1
Prabhakara, F.2
El-Abiad, A.3
Koivo, A.4
-
2
-
-
0026866356
-
Power system static security assessment using the Kohonen neural network classifier
-
May
-
D. Niebur and A. Germond, "Power system static security assessment using the Kohonen neural network classifier, " IEEE Trans. Power Syst., vol. 7, no. 2, pp. 865-872, May 1992.
-
(1992)
IEEE Trans. Power Syst.
, vol.7
, Issue.2
, pp. 865-872
-
-
Niebur, D.1
Germond, A.2
-
3
-
-
63049105383
-
Static security assessment using artificial neural network
-
I. Saeh and A. Khairuddin, "Static security assessment using artificial neural network, " in Proc. IEEE 2nd Int. Power Energy Conf., 2008, pp. 1172-1178.
-
(2008)
Proc. IEEE 2nd Int. Power Energy Conf.
, pp. 1172-1178
-
-
Saeh, I.1
Khairuddin, A.2
-
4
-
-
0032649511
-
Application of a novel fuzzy neural network to real-time transient stability swings prediction based on synchronized phasor measurements
-
May
-
C. Liu, M. Su, S. Tsay, and Y. Wang, "Application of a novel fuzzy neural network to real-time transient stability swings prediction based on synchronized phasor measurements, " IEEE Trans. Power Syst., vol. 14, no. 2, pp. 685-692, May 1999.
-
(1999)
IEEE Trans. Power Syst.
, vol.14
, Issue.2
, pp. 685-692
-
-
Liu, C.1
Su, M.2
Tsay, S.3
Wang, Y.4
-
5
-
-
61349133540
-
Feature selection for high-dimensional Data: A Pearson Redundancy Based Filter
-
J. Biesiada and W. Duch, "Feature selection for high-dimensional Data: A Pearson Redundancy Based Filter, " Adv. Soft Comput., vol. 45, pp. 242-249, 2008.
-
(2008)
Adv. Soft Comput.
, vol.45
, pp. 242-249
-
-
Biesiada, J.1
Duch, W.2
-
6
-
-
80054875381
-
Parameters selection of SVM for function approximation based on differential evolution
-
Chengdu, China
-
S. Zhou, L. Wu, X. Yuan, and W. Tan, "Parameters selection of SVM for function approximation based on differential evolution, " presented at the Int. Conf. Intell. Syst. Knowl. Eng., Chengdu, China, 2007.
-
(2007)
The Int. Conf. Intell. Syst. Knowl. Eng.
-
-
Zhou, S.1
Wu, L.2
Yuan, X.3
Tan, W.4
-
8
-
-
0030073952
-
Transient security evaluation and preventive control of power systems using PR techniques
-
C. Arora and S. Surana, "Transient security evaluation and preventive control of power systems using PR techniques, " J. Inst. Eng. India Part EL-Electr. Eng. Division, vol. 79, pp. 199-203, 1996.
-
(1996)
J. Inst. Eng. India Part EL-electr. Eng. Division
, vol.79
, pp. 199-203
-
-
Arora, C.1
Surana, S.2
-
9
-
-
0018441411
-
A practical method for the direct analysis of transient stability
-
T. Athay, R. Podmore, and S. Virmani, "A practical method for the direct analysis of transient stability, " IEEE Trans. Power Appl. Syst., vol. PAS-98, no. 2, pp. 573-584, Mar. 1979. (Pubitemid 9433780)
-
(1979)
IEEE Trans Power Appar Syst
, vol.PAS-98
, Issue.2
, pp. 573-584
-
-
Athay, T.1
Podmore, R.2
Virmani, S.3
-
10
-
-
0016125209
-
Patterns in pattern recognition: 1968-1974
-
Nov
-
L. Kanal, "Patterns in pattern recognition: 1968-1974, " IEEE Trans. Inf. Theory, vol. IT-20, no. 6, pp. 697-722, Nov. 1974.
-
(1974)
IEEE Trans. Inf. Theory
, vol.IT-20
, Issue.6
, pp. 697-722
-
-
Kanal, L.1
-
11
-
-
0021208441
-
Pattern recognition in power system security
-
DOI 10.1016/0142-0615(84)90033-4
-
J. Sa Da Costa and N. Munro, "Pattern recognition in power system security, " Int. J. Electr. Power Energy Syst., vol. 6, no. 1, pp. 31-36, 1984. (Pubitemid 14504216)
-
(1984)
International Journal of Electrical Power and Energy System
, vol.6
, Issue.1
, pp. 31-36
-
-
Sa Da Costa, J.M.G.1
Munro, N.2
-
12
-
-
0022559419
-
A pattern recognition and associative memory approach to power system security assessment
-
Jan
-
S. Oh, "A pattern recognition and associative memory approach to power system security assessment, " IEEE Trans. Syst., Man Cybern., vol. SMC-16, no. 1, pp. 62-72, Jan. 1986.
-
(1986)
IEEE Trans. Syst., Man Cybern.
, vol.SMC-16
, Issue.1
, pp. 62-72
-
-
Oh, S.1
-
13
-
-
68949155378
-
Feature subset selection in large dimensionality domains
-
I. Gheyas and L. Smith, "Feature subset selection in large dimensionality domains, " Pattern Recog., vol. 43, no. 1, pp. 5-13, 2010.
-
(2010)
Pattern Recog.
, vol.43
, Issue.1
, pp. 5-13
-
-
Gheyas, I.1
Smith, L.2
-
15
-
-
0036505670
-
A comparison of methods for multiclass support vector machines
-
DOI 10.1109/72.991427, PII S1045922702018052
-
C. Hsu and C. Lin, "A comparison of methods for multiclass support vector machines, " IEEE Trans. Neural Netw., vol. 13, no. 2, pp. 415-425, Mar. 2002. (Pubitemid 34475042)
-
(2002)
IEEE Transactions on Neural Networks
, vol.13
, Issue.2
, pp. 415-425
-
-
Hsu, C.-W.1
Lin, C.-J.2
-
19
-
-
63049131916
-
Comparing least squares support vector machine and probabilistic neural network in transient stability assessment of a large-scale power system
-
N. Wahab, A. Mohamed, and A. Hussain, "Comparing least squares support vector machine and probabilistic neural network in transient stability assessment of a large-scale power system, " in Proc. Power Energy Conf., 2008, pp. 485-489.
-
(2008)
Proc. Power Energy Conf.
, pp. 485-489
-
-
Wahab, N.1
Mohamed, A.2
Hussain, A.3
-
20
-
-
33745903481
-
Extreme learning machine: Theory and applications
-
DOI 10.1016/j.neucom.2005.12.126, PII S0925231206000385
-
G. Huang, Q. Zhu, and C. Siew, "Extreme learning machine: Theory and applications, " Neurocomputing, vol. 70, no. 1-3, pp. 489-501, 2006. (Pubitemid 44615772)
-
(2006)
Neurocomputing
, vol.70
, Issue.1-3
, pp. 489-501
-
-
Huang, G.-B.1
Zhu, Q.-Y.2
Siew, C.-K.3
-
21
-
-
34047174077
-
A fast and accurate online sequential learning algorithm for feedforward networks
-
DOI 10.1109/TNN.2006.880583
-
N. Liang, G. Huang, P. Saratchandran, and N. Sundararajan, "A fast and accurate online sequential learning algorithm for feedforward networks, " IEEE Trans. Neural Netw., vol. 17, no. 6, pp. 1411-1423, Nov. 2006. (Pubitemid 44824256)
-
(2006)
IEEE Transactions on Neural Networks
, vol.17
, Issue.6
, pp. 1411-1423
-
-
Liang, N.-Y.1
Huang, G.-B.2
Saratchandran, P.3
Sundararajan, N.4
-
22
-
-
44649099490
-
Extreme support vector machine classifier
-
New York: Springer-Verlag
-
Q. Liu, Q. He, and Z. Shi, "Extreme support vector machine classifier, " in Proc. 12th Pacific-Asia Conf. Adv. Knowl. Discovery Data Mining. New York: Springer-Verlag, 2008, pp. 222-233.
-
(2008)
Proc. 12th Pacific-Asia Conf. Adv. Knowl. Discovery Data Mining
, pp. 222-233
-
-
Liu, Q.1
He, Q.2
Shi, Z.3
-
23
-
-
3242754048
-
Ann based pattern recognition technique for power system security assessment
-
W. Luan, K. Lo, and Y. Yu, "Ann based pattern recognition technique for power system security assessment, " in Proc. Int. Conf. Electr. Utility Deregulation Restructure Power Technol., 2000, pp. 197-202.
-
(2000)
Proc. Int. Conf. Electr. Utility Deregulation Restructure Power Technol.
, pp. 197-202
-
-
Luan, W.1
Lo, K.2
Yu, Y.3
|