Information Technology Reference
In-Depth Information
Unger, E. A., Harn, L., and Kumar, V. (1990). Entropy as a measure of database information. In
Proceedings of the Sixth Annual in Computer Security Applications Conference (pp. 80 - 87),
December 3 - 7, 1990, Tucson, AZ. doi: 10.1109/CSAC.1990.143755 .
Wan, H., McCalley, J. D., & Vittal, V. (2000). Risk based voltage security assessment. IEEE
Transactions Power Systems, 15(4), 1247 - 1254.
WECC. (2003, April). NERC/WECC planning strandards. Available at, http://www.wecc.biz/
documents/library/procedures/planning/WECC-NERC_Planning%20Standards_4-10-03.pdf .
Wehenkel, L. (1997). Machine learning approaches to power-system security assessment. IEEE
Expert, IEEE Intelligent Systems and Their Applications, 12(5), 60
72.
Wehenkel, L. (1998). Automatic learning techniques in power systems. Berlin: Kluwer Academic
Publishers.
Wehenkel, L., Glavic, M., Geurts, P., & Ernst, D. (2006). Automatic learning of sequential
decision strategies for dynamic security assessment and control. In IEEE Power Engineering
Society General Meeting, Montreal, Que. doi: 10.1109/PES.2006.1708874 .
Witten, I. H., & Frank, E. (2000). Data mining: Practical machine learning tools and techniques
with Java implementations. San Fransisco, CA: Morgan Kaufmann Publishers.
Wyss, W. G., & Jorgensen, K. H. (1998). A user ' s guide to LHS: Sandia ' s latin hypercube
sampling software. Sandia National Laboratories Report SAND98-0210, Albuquerque, NM.
Xiao, F., & McCalley, J. D. (2007). Risk-based security and economy tradeoff analysis for real-
time operation. IEEE Transactions Power Systems, 22(4), 2287 - 2288.
Yu, X., & Singh, C. (2004). Expected power loss calculation including protection failures using
importance sampling and SOM. In IEEE Power Engineering Society General Meeting (pp
206
-
10, 2004. doi: 10.1109/PES.2004.1372787 .
Zhou, G., & McCalley, J. D.
211), June 6
-
-
(1999). Composite security boundary visualization.
IEEE
731.
Zhou, Q., Davidson, J., & Fouad, A. A. (1994). Application of artificial neural networks in power
system security and vulnerability assessment.
Transactions Power Systems, 14(2), 725
-
IEEE Transactions Power Systems, 9(1),
525
532.
-
Search WWH ::




Custom Search