The need for feature selection and dimension reduction is felt as a fundamental step in security assessment of large power systems in which the number of features representing the state of power grids dramatically increases. These large amounts of attributes are not proper to be used for computational intelligence (CI) techniques as inputs, because it may lead to a time consuming procedure with insufficient results and they are not suitable for on-line purposes and updates.This paper proposes a combined method for an online voltage security assessment in which the dimension of the token data from phasor measurement units (PMUs) is reduced by principal component analysis (PCA). Then, the features with different stability indices are put into several categories and feature selection is done by correlation analysis in each category. These selected features are then given to decision trees (DTs) for classification and security assessment of power systems.The method is applied to 39-bus test system and a part of Iran power grid. It is seen from the results that the DTs with reduced data have simpler splitting rules, better performance in saving time, reasonable DT error and they are more suitable for constant updates. 相似文献
Traffic sign recognition and lane detection play an important role in traffic flow planning, avoiding traffic accidents, and alleviating traffic chaos. At present, the traffic intelligent recognition rate still needs to be improved. In view of this, based on the neural network algorithm, this study constructs an intelligent transportation system based on neural network algorithm, and combines machine vision technology to carry out intelligent monitoring and intelligent diagnosis of traffic system. In addition, this study discusses in detail the core of the monitoring system: multi-target tracking algorithm, and introduces the complete implementation process and details of the system, and highlights the implementation and tracking effect of the multi-target tracker. Finally, this study uses case identification to analyze the effectiveness of the algorithm proposed by this paper. The research results show that the proposed method has certain practical effects and can be used as a reference for subsequent system construction.