<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Energy Res.</journal-id>
<journal-title>Frontiers in Energy Research</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Energy Res.</abbrev-journal-title>
<issn pub-type="epub">2296-598X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1479478</article-id>
<article-id pub-id-type="doi">10.3389/fenrg.2024.1479478</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Energy Research</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Transient voltage stability assessment and margin calculation based on disturbance signal energy feature learning</article-title>
<alt-title alt-title-type="left-running-head">Chen et al.</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fenrg.2024.1479478">10.3389/fenrg.2024.1479478</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Chen</surname>
<given-names>Yan</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/funding-acquisition/"/>
<role content-type="https://credit.niso.org/contributor-roles/software/"/>
<role content-type="https://credit.niso.org/contributor-roles/supervision/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Huang</surname>
<given-names>Zirui</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/validation/"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Du</surname>
<given-names>Zhaobin</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2417400/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/funding-acquisition/"/>
<role content-type="https://credit.niso.org/contributor-roles/supervision/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zhong</surname>
<given-names>Guoduan</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Gao</surname>
<given-names>Jiawei</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zhen</surname>
<given-names>Hongyue</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/software/"/>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>State Key Laboratory of HVDC</institution>, <institution>CSG Electric Power Research Institute</institution>, <institution>China Southern Power Grid</institution>, <addr-line>Guangzhou</addr-line>, <country>China</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>School of Electric Power Engineering</institution>, <institution>South China University of Technology</institution>, <addr-line>Guangzhou</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1078022/overview">Yunhe Hou</ext-link>, The University of Hong Kong, Hong Kong SAR, China</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1823558/overview">Haoming Liu</ext-link>, Hohai University, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1945063/overview">Yanxun Guo</ext-link>, Zhengzhou University, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1275774/overview">Yixin Liu</ext-link>, Tianjin University, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Zhaobin Du, <email>epduzb@scut.edu.cn</email>
</corresp>
</author-notes>
<pub-date pub-type="epub">
<day>02</day>
<month>10</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2024</year>
</pub-date>
<volume>12</volume>
<elocation-id>1479478</elocation-id>
<history>
<date date-type="received">
<day>12</day>
<month>08</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>23</day>
<month>09</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2024 Chen, Huang, Du, Zhong, Gao and Zhen.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Chen, Huang, Du, Zhong, Gao and Zhen</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>With the increasing variation of the network topology and the high complexity of the processing measurement data, the transient voltage stability assessment of the new power system is facing significant challenges in low accuracy and high time costs. To address the shortcomings of the existing method and apply it to online assessment, this paper proposes an assessment method based on feature learning for disturbance signal energy (DSE) from bus voltages. Firstly, the relationship between DSE and system transient voltage stability is established, and the calculation of DSE from bus voltage time series is detailed. Subsequently, a transient voltage stability assessment method based on the ID3 Decision Tree algorithm and DSE is proposed. Finally, by employing the Support Vector Machine (SVM) to construct the optimal boundary in the feature space formed by the key buses, the transient voltage stability margin (TVSM) for specific scenarios is proposed. Simulation results on the IEEE 39-bus system demonstrate that the proposed method can rapidly and accurately assess the transient voltage stability of the system and calculate the stability margin, providing intuitive and interpretable results with high engineering application value.</p>
</abstract>
<kwd-group>
<kwd>transient voltage stability assessment</kwd>
<kwd>wide area measurement system (WAMS)</kwd>
<kwd>disturbance signal energy</kwd>
<kwd>ID3 decision tree algorithm</kwd>
<kwd>information gain</kwd>
<kwd>support vector machine</kwd>
</kwd-group>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Smart Grids</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>The extensive integration of renewable energy and the widespread application of power electronic equipment in power systems, along with the increase in grid scale and complexity (<xref ref-type="bibr" rid="B10">Gao et al., 2023</xref>), has resulted in significant changes to voltage regulation characteristics and reactive power distribution in power grids. This renders the system more susceptible to voltage instability in the event of disturbances. For instance, in January 2023, Pakistan encountered prolonged oscillations and grid splitting as a consequence of substantial wind power generation (<xref ref-type="bibr" rid="B32">Tu et al., 2023</xref>). Furthermore, in new power systems, the grid&#x2019;s topology is highly variable, with frequent maintenance procedures contributing to the complexity of transient voltage stability assessment (<xref ref-type="bibr" rid="B5">Chi and Chen, 2023</xref>). Therefore, it is essential to conduct comprehensive research and assessment of transient voltage stability in new power systems to guarantee the safe and reliable operation of the grid.</p>
<p>Early studies on transient voltage stability mainly relied on physical modeling, with time-domain simulation being widely used due to its high adaptability and reliability (<xref ref-type="bibr" rid="B17">La Scala. et al., 1998</xref>). However, this method suffers from low computational efficiency and lacks explicit stability criteria (<xref ref-type="bibr" rid="B2">Barab &#xe1; si and Albert, 1999</xref>). To address these shortcomings, <xref ref-type="bibr" rid="B3">Bergen and Hill (1981)</xref> introduced the structure-preserving energy function method to the power system, and its effectiveness was validated through numerical simulations. A group of researchers began to apply the energy function method for transient voltage stability assessment later. For instance, <xref ref-type="bibr" rid="B6">Chiang (1989)</xref>, <xref ref-type="bibr" rid="B25">Overbye et al. (1992a)</xref>, <xref ref-type="bibr" rid="B26">Overbye et al. (1992b)</xref> have proposed frameworks for studying the relationship between voltage stability and energy function. Since then, the energy function method has become a rigorous approach to studying power system stability. Power flow analysis is also crucial in transient voltage stability studies. <xref ref-type="bibr" rid="B16">Kwatny et al. (1986)</xref> examined its role in stability loss and voltage collapse bifurcations, while <xref ref-type="bibr" rid="B13">Indulkar et al. (1989)</xref> used it to determine voltage stability limits in AC transmission systems. Furthermore, methods based on physical modeling, such as bifurcation theory (<xref ref-type="bibr" rid="B8">Dobson and Chiang, 1989</xref>) and trajectory eigenvalue analysis (<xref ref-type="bibr" rid="B27">Pan et al., 2008</xref>; <xref ref-type="bibr" rid="B29">Tan et al., 2012</xref>), have also been applied. In recent years, with the increasing deployment of various power electronic equipment, challenges have been raised in power system modeling, leading to difficulties in ensuring the accuracy of transient stability analysis based on physical modeling methods (<xref ref-type="bibr" rid="B36">Zhang et al., 2023</xref>).</p>
<p>With advances in computer hardware, artificial intelligence technologies, and the maturation of Wide Area Measurement Systems (WAMS), data-driven methods have gradually been applied to voltage stability analysis (<xref ref-type="bibr" rid="B40">Tan et al., 2023</xref>; <xref ref-type="bibr" rid="B41">Liu et al., 2024</xref>). The application of neural networks in the assessment of transient voltage stability began early (<xref ref-type="bibr" rid="B20">Maeda et al., 1995</xref>). <xref ref-type="bibr" rid="B4">Chen and Xie (2022)</xref> took the time series of primary measurement data of power systems as the input, and TCN network with attention enhancement module and BiLSTM network were used to extract timing features in parallel to judge the transient voltage stability of the system. <xref ref-type="bibr" rid="B14">Jiang et al. (2014)</xref> employed SVM to predict the transient voltage stability condition of the power system, and <xref ref-type="bibr" rid="B22">Niu et al. (2021)</xref> achieved the same target by applying AdaBoost-SVM to construct a transient security ensemble learning prediction model. <xref ref-type="bibr" rid="B9">Gao et al. (2022)</xref> proposed a voltage stability assessment method in new power systems based on the eGBDT algorithm, which achieved spatial dimensionality reduction. A review of the application of the machine learning methods for transient voltage stability assessment was provided by <xref ref-type="bibr" rid="B1">Adhikari et al. (2020)</xref>. However, they fall short of intuitively illustrating the physical relationship between transient voltage stability and the observed data, posing challenges for practical engineering applications.</p>
<p>To enhance the interpretability of assessment results, some academics have integrated traditional physical modeling theories with machine learning and treated voltage time series as the object of feature learning. <xref ref-type="bibr" rid="B38">Zhu et al. (2016)</xref> and <xref ref-type="bibr" rid="B37">Zhu et al. (2020)</xref> assessed transient voltage stability by analyzing time series composed of transient voltages. The relative studies primarily employ the Shapelet method to extract key time-series features from the whole time series. However, the Shapelet methods require substantial computational resources and may suffer the curse of dimensionality when applied to large-scale power grids. In practical engineering, in addition to assessing the transient voltage stability of specific operating scenarios, there is also a significant focus on the stability margin of these scenarios. It is crucial in guiding power system dispatch to ensure safe and stable operation (<xref ref-type="bibr" rid="B33">Wang et al., 2024</xref>). The data-driven studies on transient voltage stability rarely provide methods for calculating the stability margin under their respective assessment models.</p>
<p>To address these issues, this paper proposes a transient voltage stability assessment method based on disturbance signal energy (DSE) and the Decision Tree algorithm. The innovations are as follows.<list list-type="simple">
<list-item>
<p>(1) The concept of DSE is introduced. Based on the DSE, the intensity of voltage fluctuations can be more directly reflected compared to the energy function method.</p>
</list-item>
<list-item>
<p>(2) The ID3 Decision Tree algorithm is applied to construct the transient voltage stability assessment model based on DSE. Compared to the Shapelet-based method, the assessment model proposed in this paper shows the advantages of lower time costs and higher interpretability, while maintaining the same level of accuracy.</p>
</list-item>
<list-item>
<p>(3) The optimal decision boundary of the dichotomous samples is obtained using SVM, upon which the stability margin calculation is built. The resulting stability margin provides a definitive assessment of the transient voltage stability and effective guidance for practical dispatching.</p>
</list-item>
</list>
</p>
<p>The rest of the paper is organized as follows: the concept of transient voltage stability and the definition of DSE are introduced in <xref ref-type="sec" rid="s2">Section 2</xref>. The proposed stability assessment model based on DSE and the Decision Tree algorithm is detailed in <xref ref-type="sec" rid="s3">Section 3</xref>, as well as the margin calculation scheme based on the SVM. A summary of the overall construction process of the model described in <xref ref-type="sec" rid="s3">Section 3</xref> is provided in <xref ref-type="sec" rid="s4">Section 4</xref>. Results of the tests of the proposed algorithm in this paper on the IEEE 39-bus system are shown in <xref ref-type="sec" rid="s5">Section 5</xref>. The conclusion with a summary of the work presented in the paper is provided in <xref ref-type="sec" rid="s6">Section 6</xref>.</p>
</sec>
<sec id="s2">
<title>2 Stability problem and energy variation patterns of transient voltage</title>
<sec id="s2-1">
<title>2.1 Description of transient voltage stability problem</title>
<p>Transient voltage stability refers to the ability of a power system to maintain its voltage level without collapsing and to return to a steady state within a short period after experiencing severe faults or disturbances. Analysis of transient voltage stability typically involves the voltage response and recovery process of the system within a few seconds after the fault occurs (<xref ref-type="bibr" rid="B31">Tang et al., 2002</xref>). For a given power system, it can be described by <xref ref-type="disp-formula" rid="e1">Equation 1</xref>:<disp-formula id="e1">
<mml:math id="m1">
<mml:mrow>
<mml:mfenced open="{" close="" separators="&#x7c;">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>x</mml:mi>
<mml:mo>&#x2d9;</mml:mo>
</mml:mover>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>f</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>g</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>y</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>
</p>
<p>Where: <italic>x</italic> refers to the state variables in the system, such as angular velocity and power angle, <inline-formula id="inf1">
<mml:math id="m2">
<mml:mrow>
<mml:mover accent="true">
<mml:mi>x</mml:mi>
<mml:mo>&#x2d9;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula> represents the derivative of the variable <italic>x</italic> with respect to time. The function <italic>f</italic>(<italic>x</italic>) describes the dynamic behavior of the system. The variable <italic>y</italic> is the algebraic variables in the system, such as bus voltages and currents. The function <italic>g</italic>(<italic>y</italic>) describes the network equations of the system.</p>
<p>For the dynamic process of the system described by <italic>f</italic>(<italic>x</italic>), assume the system operates at a stable equilibrium point <italic>x</italic>
<sub>s</sub>, and the corresponding stable region for the system under a certain operation scenario is <italic>S</italic>(<italic>x</italic>), with the stable region boundary denoted as <inline-formula id="inf2">
<mml:math id="m3">
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. Traditional transient voltage stability analysis methods assess if the system&#x2019;s operating point, after a severe disturbance, remains within the stable region boundary <inline-formula id="inf3">
<mml:math id="m4">
<mml:mrow>
<mml:mo>&#x2202;</mml:mo>
<mml:mi>S</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> to determine whether the system voltage will become unstable (<xref ref-type="bibr" rid="B28">Praprost and Loparo, 1994</xref>). Based on the stable region, the energy function method can be used to approximate the dynamic process of power systems after a fault (<xref ref-type="bibr" rid="B12">Hou et al., 2004</xref>). The energy function method can quickly assess system stability by comparing whether the accumulated energy from the occurrence of the fault to a period after its clearance exceeds the critical energy value corresponding to the stable region boundary. Thus, the problem of determining whether the power system operates within the stable region transforms into the problem of calculating the critical energy of the power system and comparing whether the accumulated energy exceeds the critical energy (<xref ref-type="bibr" rid="B34">Wang et al., 2011</xref>).</p>
</sec>
<sec id="s2-2">
<title>2.2 Disturbance signal energy method</title>
<p>It is mentioned in <xref ref-type="sec" rid="s2-1">Section 2.1</xref> that the energy function method assesses system stability by analyzing the energy accumulation during the transient process. The introduction discusses using artificial intelligence for data-driven analysis to understand power system instability mechanisms. These methods can be combined, employing a simpler yet physically meaningful method of voltage signal energy feature learning to assess the transient voltage stability of a post-fault system.</p>
<p>For the transient voltage stability problem in power systems, analyzing the accumulation of voltage signal energy after disturbances can help judge the likelihood of system instability (<xref ref-type="bibr" rid="B21">Marceau et al., 1996</xref>). The calculation method for voltage signal energy is given in <xref ref-type="disp-formula" rid="e2">Equation 2</xref>:<disp-formula id="e2">
<mml:math id="m5">
<mml:mrow>
<mml:mi>E</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mo>&#x222b;</mml:mo>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:msubsup>
<mml:msup>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="&#x7c;">
<mml:mrow>
<mml:mi>u</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>
</p>
<p>Where: <italic>t</italic>
<sub>0</sub> and <italic>t</italic>
<sub>1</sub> are different time points with <italic>t</italic>
<sub>0</sub>&#x3c;<italic>t</italic>
<sub>1</sub>, and <italic>u</italic>(<italic>t</italic>) is the curve of voltage over time.</p>
<p>Unlike the traditional energy function method, which calculates system energy primarily based on its actual operating state and topology, the signal energy method directly computes energy through the trend of changes in a specific physical quantity at one bus. While the information contained is relatively less compared to the energy function method, it highlights specific features of interest. For example, in the transient voltage stability of a power system, analyzing the system&#x2019;s voltage signal energy allows for stability assessment without the need for extensive computations of the system&#x2019;s overall energy.</p>
<p>Based on <xref ref-type="disp-formula" rid="e2">Equation 2</xref>, the accumulated deviation of the voltage magnitude at a bus from its steady-state value within a short period after a disturbance is defined as the disturbance signal energy (DSE). Considering that in practical calculations, the obtained voltage magnitude data is not an analytical function but a discrete data set, the expression for the voltage DSE is given as <xref ref-type="disp-formula" rid="e3">Equation 3</xref>:<disp-formula id="e3">
<mml:math id="m6">
<mml:mrow>
<mml:mi>E</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mo>&#x222b;</mml:mo>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:msubsup>
<mml:msup>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="&#x7c;">
<mml:mrow>
<mml:mi>u</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>u</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mi>d</mml:mi>
<mml:mi>t</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>T</mml:mi>
</mml:msub>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="&#x7c;">
<mml:mrow>
<mml:mi>u</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>u</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>
</p>
<p>Where: <italic>u</italic> (0) is the steady-state voltage value, <italic>N</italic>
<sub>
<italic>T</italic>
</sub> is the number of measurement points within the considered period of the time series, <italic>&#x394;t</italic> is the time interval between two consecutive measurements (i.e., the step size), and <italic>u</italic> (<italic>t</italic>
<sub>
<italic>i</italic>
</sub>) is the voltage magnitude corresponding to the <italic>i</italic>th measurement point.</p>
<p>The voltage DSE can reflect the severity of voltage oscillations during the transient process when a fault or a disturbance occurs. As shown in <xref ref-type="fig" rid="F1">Figure 1</xref>, typical cases of transient voltage stability, critical stability, and instability in the same system after a line fault are presented. The local magnification provides an intuitive reflection of the voltage DSE accumulation at the same bus in these three typical scenarios. The results demonstrate that in the transient process, as the stability decreases, the generated DSE increases. The DSE generated in the stable cases is significantly less than that in the unstable cases. Therefore, DSE can effectively indicate the transient voltage stability of the system.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Voltage magnitude time series and its DSE accumulation at different transient stability levels: <bold>(A)</bold> Stable, <bold>(B)</bold> Critical Stable, <bold>(C)</bold> Unstable.</p>
</caption>
<graphic xlink:href="fenrg-12-1479478-g001.tif"/>
</fig>
</sec>
</sec>
<sec id="s3">
<title>3 Transient voltage stability assessment and margin calculation based on feature learning of disturbance signal energy</title>
<sec id="s3-1">
<title>3.1 Generation of disturbance signal energy data set</title>
<p>The transient voltage time series data set of a <italic>d</italic>-dimensional power system is denoted as <inline-formula id="inf4">
<mml:math id="m7">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>d</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, where <inline-formula id="inf5">
<mml:math id="m8">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:msup>
<mml:mi mathvariant="double-struck">R</mml:mi>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:mi>d</mml:mi>
<mml:mo>&#xd7;</mml:mo>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>T</mml:mi>
</mml:msub>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, <italic>n</italic> is the number of cases, and <italic>N</italic>
<sub>
<italic>T</italic>
</sub> is the length of the time-series data, i.e., the number of measurement points. To illustrate the generation of the DSE set, take the dimension <italic>i</italic> (1 &#x2264; <italic>i</italic> &#x2264; <italic>d</italic>) of the dataset <italic>S</italic> as an example. The dataset <italic>S</italic>
<sub>
<italic>i</italic>
</sub> in dimension <italic>i</italic> is composed of <italic>n</italic> time series all of length <italic>N</italic>
<sub>
<italic>T</italic>
</sub>, as shown in <xref ref-type="disp-formula" rid="e4">Equation 4</xref>.<disp-formula id="e4">
<mml:math id="m9">
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>U</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>U</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>U</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mi>d</mml:mi>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
<p>Where: <inline-formula id="inf6">
<mml:math id="m10">
<mml:mrow>
<mml:msub>
<mml:mi>U</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>T</mml:mi>
</mml:msub>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, <italic>j</italic> &#x3d; 1, 2 &#x2026; , <italic>n</italic>, and <inline-formula id="inf7">
<mml:math id="m11">
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> represents the value of the voltage at bus <italic>i</italic> for the sample <italic>j</italic> at the first measurement point.</p>
<p>Each time series can be transformed into the DSE generated over a certain period according to <xref ref-type="disp-formula" rid="e3">Equation 3</xref>. After <italic>n</italic> time series have been transformed, we can obtain the DSE set for a single bus <italic>i</italic>, as shown in <xref ref-type="disp-formula" rid="e5">Equation 5</xref>:<disp-formula id="e5">
<mml:math id="m12">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>
</p>
<p>Each element <inline-formula id="inf8">
<mml:math id="m13">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> in <xref ref-type="disp-formula" rid="e5">Equation 5</xref> is a scalar that denotes the DSE generated by the voltage at bus <italic>i</italic> in sample <italic>j</italic> over the given time series. For sample <italic>j</italic>, taking <inline-formula id="inf9">
<mml:math id="m14">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> as the feature attribute of bus <italic>i</italic>, the DSE set <inline-formula id="inf10">
<mml:math id="m15">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> for bus <italic>i</italic> is sorted in ascending order to obtain <inline-formula id="inf11">
<mml:math id="m16">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="&#x7c;">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. Then the average values between each pair of adjacent elements in <inline-formula id="inf12">
<mml:math id="m17">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> are calculated to obtain the candidate set of split thresholds for the DSE at bus <italic>i</italic>, denoted as <inline-formula id="inf13">
<mml:math id="m18">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="&#x7c;">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msubsup>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. The operation of sorting and taking the average value of <inline-formula id="inf14">
<mml:math id="m19">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is speedily to select featured system buses with distinct information for stability judgment.</p>
<p>Similarly, by applying the same process to all dimensions (i.e., all the buses in the power system) in <italic>S</italic>, we can obtain the candidate set of split thresholds for the DSE of multiple buses under a given number of samples, which is used to partition the data set into different subsets, denoted as <inline-formula id="inf15">
<mml:math id="m20">
<mml:mrow>
<mml:msup>
<mml:mi mathvariant="bold-italic">E</mml:mi>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, as shown in <xref ref-type="disp-formula" rid="e6">Equation 6</xref>:<disp-formula id="e6">
<mml:math id="m21">
<mml:mrow>
<mml:msup>
<mml:mi mathvariant="bold-italic">E</mml:mi>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="&#x7c;">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mtd>
<mml:mtd>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mtd>
<mml:mtd>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22f1;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ee;</mml:mo>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mtd>
<mml:mtd>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mtd>
<mml:mtd>
<mml:mo>&#x22ef;</mml:mo>
</mml:mtd>
<mml:mtd>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>
</p>
</sec>
<sec id="s3-2">
<title>3.2 Construction of the transient stability assessment model based on decision tree</title>
<p>The core idea of the decision tree machine learning method is to partition the data set into different subsets through a series of decision rules (<xref ref-type="bibr" rid="B15">Karabadji et al., 2023</xref>). This process is relatively simple and efficient, and the classification model and assessment results are presented in a tree structure, which retains the clear physical significance of the DSE. In this study, different buses in the system under study are defined as different attributes of the corresponding decision tree model. Since the number of buses in each data sample is the same, meaning the number of attributes is consistent across samples, there is no preference for attributes with more or fewer possible values (<xref ref-type="bibr" rid="B19">Li et al., 2020</xref>). Therefore, the ID3 Decision Tree algorithm is here applied to construct the transient voltage stability assessment model, using information gain as the criterion for selecting DSE split thresholds at each node during the learning process.</p>
<p>To facilitate the subsequent explanation of information gain, the definition of information entropy is provided first (<xref ref-type="bibr" rid="B24">Omuya et al., 2021</xref>). Information entropy refers to the level of disorder in a data set. The more homogeneous the categories within the dataset, the lower the information entropy is. Since this study deals with a binary classification problem for stability assessment, where the samples (described in <xref ref-type="disp-formula" rid="e5">Equation 5</xref>) in <italic>E</italic> are either stable or unstable, denoted as <inline-formula id="inf16">
<mml:math id="m22">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf17">
<mml:math id="m23">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> , respectively, with their proportions in <italic>E</italic> being <inline-formula id="inf18">
<mml:math id="m24">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf19">
<mml:math id="m25">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, the degree of disorder in <italic>E</italic> can be expressed as <xref ref-type="disp-formula" rid="e7">Equation 7</xref>:<disp-formula id="e7">
<mml:math id="m26">
<mml:mrow>
<mml:mtext>Ent</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>E</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2212;</mml:mo>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:munderover>
</mml:mstyle>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2061;</mml:mo>
<mml:msub>
<mml:mi>log</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(7)</label>
</disp-formula>
</p>
<p>Where: Ent(<italic>E</italic>) is the information entropy of <italic>E</italic>.</p>
<p>For each bus of the <italic>d</italic>-dimensional power system, a candidate energy split threshold <inline-formula id="inf20">
<mml:math id="m27">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> is randomly selected from <inline-formula id="inf21">
<mml:math id="m28">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> to partition <italic>E</italic> into two subsets, denoted as <inline-formula id="inf22">
<mml:math id="m29">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf23">
<mml:math id="m30">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>g</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> (where each element in <inline-formula id="inf24">
<mml:math id="m31">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of <inline-formula id="inf25">
<mml:math id="m32">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> in the dimension is less than <inline-formula id="inf26">
<mml:math id="m33">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>, and each element in <inline-formula id="inf27">
<mml:math id="m34">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of <inline-formula id="inf28">
<mml:math id="m35">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>g</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> in the dimension <italic>i</italic> is greater than <inline-formula id="inf29">
<mml:math id="m36">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula>).</p>
<p>To calculate the information entropy of the subsets <inline-formula id="inf30">
<mml:math id="m37">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf31">
<mml:math id="m38">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>g</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, the number of stable and unstable samples in <inline-formula id="inf32">
<mml:math id="m39">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf33">
<mml:math id="m40">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>g</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> are counted, respectively. Then, according to <xref ref-type="disp-formula" rid="e8">Equation 8</xref>, the expression for the conditional information entropy after classification is obtained as follows:<disp-formula id="e8">
<mml:math id="m41">
<mml:mrow>
<mml:msub>
<mml:mtext>Ent</mml:mtext>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>E</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mtext>less</mml:mtext>
</mml:msub>
</mml:msub>
<mml:mo>&#xd7;</mml:mo>
<mml:mtext>Ent</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mtext>less</mml:mtext>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mtext>greater</mml:mtext>
</mml:msub>
</mml:msub>
<mml:mo>&#xd7;</mml:mo>
<mml:mtext>Ent</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mtext>greater</mml:mtext>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(8)</label>
</disp-formula>
</p>
<p>Where: <inline-formula id="inf34">
<mml:math id="m42">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mtext>less</mml:mtext>
</mml:msub>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf35">
<mml:math id="m43">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mtext>greater</mml:mtext>
</mml:msub>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> are the proportions of the sample numbers of <inline-formula id="inf36">
<mml:math id="m44">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf37">
<mml:math id="m45">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>g</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> in <italic>E</italic>, respectively.</p>
<p>Thus, the information gain (IG) obtained by partitioning the data set using <inline-formula id="inf38">
<mml:math id="m46">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> is as <xref ref-type="disp-formula" rid="e9">Equation 9</xref>:<disp-formula id="e9">
<mml:math id="m47">
<mml:mrow>
<mml:mtext>IG</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>E</mml:mi>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>Ent</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>E</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mtext>Ent</mml:mtext>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>d</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mi>E</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(9)</label>
</disp-formula>
</p>
<p>Using <xref ref-type="disp-formula" rid="e7">Equations 7</xref>&#x2013;<xref ref-type="disp-formula" rid="e9">9</xref>, the candidate energy split threshold with the maximum IG from the <italic>n-</italic>1 candidate energy split thresholds contained in <inline-formula id="inf39">
<mml:math id="m48">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> is selected as the optimal energy split threshold for bus <italic>i</italic>, set as <inline-formula id="inf40">
<mml:math id="m49">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>max</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> . Similarly, the optimal energy split thresholds for all buses in the system are obtained. By comparing the information gains corresponding to the optimal energy split thresholds of multiple buses, select the bus with the maximum information gain and its energy split threshold as a decision tree node. The <inline-formula id="inf41">
<mml:math id="m50">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> or <inline-formula id="inf42">
<mml:math id="m51">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>g</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> corresponding to <inline-formula id="inf43">
<mml:math id="m52">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>max</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> is further used to find the next decision tree node by updating <xref ref-type="disp-formula" rid="e6">Equations 6</xref>&#x2013;<xref ref-type="disp-formula" rid="e9">9</xref>. The following outlines the specific process for generating the decision tree model based on DSE.</p>
<p>As shown in <xref ref-type="fig" rid="F2">Figure 2</xref>, the decision tree model classifies through multiple layers of if-then rules. After inputting the candidate set of energy split thresholds, <inline-formula id="inf44">
<mml:math id="m53">
<mml:mrow>
<mml:msup>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, into the decision tree, the decision tree model starts from the root node and compares the data of each dimension in the input DSE set. Based on the predetermined rules, the information gain is calculated and the attribute (i.e., the DSE of bus voltage) and the corresponding split threshold with the best classification performance are selected as the root or internal node. This ensures that the binary branches generated from this node maximize the number of similar samples in the corresponding sample subsets while minimizing the number of dissimilar samples, thereby reducing the entropy of the sample subsets as much as possible. This process of recursively optimal partitioning of the data set continues until each sample subset contains only similar samples or the number of samples in a subset reaches a preset threshold, at which point the tree stops growing. Finally, the corresponding label of similar samples or the majority label of dominant samples is stored in the terminal leaf nodes as the classification label. Ultimately, all branches, internal nodes, and leaf nodes from the root node are integrated into a complete decision tree structure.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Schematic diagram of the decision tree model.</p>
</caption>
<graphic xlink:href="fenrg-12-1479478-g002.tif"/>
</fig>
<p>When significant changes occur in the topology of power systems, the DSE set can be rapidly generated, as the generation process of the DSE set involves direct function transformation without a search process as the Shapelet-based method, allowing new thresholds to be quickly learned from the new DSE set. Due to these advantages, the method proposed in this paper demonstrates higher adaptability and practicality in real power grids.</p>
<p>After assessing transient voltage stability using a binary classification decision tree model based on DSE feature learning, the resulting stable or unstable labels prove insufficient for effectively guiding the scheduling, operation, and maintenance processes of the power system. To more intuitively demonstrate the system&#x2019;s stability under a certain scenario, the attributes contained in the nodes of the decision tree model, which correspond to the system buses in this paper, are considered the key buses that have the greatest impact on transient voltage stability in the studied system. These key buses are then used to construct a transient voltage stability margin calculation model.</p>
</sec>
<sec id="s3-3">
<title>3.3 SVM-based transient voltage stability margin calculation</title>
<p>As mentioned above, the fluctuation of bus voltage magnitude after the system is disturbed can be reflected through DSE. In a specific scenario, the disturbance severity of each bus in the system is positively correlated with each other (<xref ref-type="bibr" rid="B11">Hou et al., 2015</xref>), then the DSE generated by the voltage of each bus in the system will show the phenomenon of &#x201c;increasing and decreasing simultaneously&#x201d;, and the larger the DSE generated by the system after a fault, the more likely that the system voltage will undergo transient instability (<xref ref-type="bibr" rid="B23">Odun-Ayo and Crow, 2012</xref>). Therefore, in the feature space <inline-formula id="inf45">
<mml:math id="m54">
<mml:mrow>
<mml:mi mathvariant="double-struck">E</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> composed of the DSE generated by the voltage of the key buses, the sample points corresponding to different scenarios will show an approximate linear distribution, and then SVM can be used to obtain the approximate linear boundary between the stable samples and unstable samples to construct the stability margin calculation model (<xref ref-type="bibr" rid="B30">Tan et al., 2024</xref>).</p>
<p>The essence of SVM is to find the hyperplane in the feature space that maximizes the interval between the dichotomous samples. The sample set <italic>E</italic> is divided into stable sample set, <italic>E</italic>
<sub>.g.,</sub> and unstable sample set <italic>E</italic>
<sub>b</sub> by the classification of the decision tree model, and the two types of samples are assigned the stable labels <italic>y</italic> &#x3d; 1 and <italic>y</italic> &#x3d; &#x2212;1. The hyperplane divided by the linear SVM can be expressed as <xref ref-type="disp-formula" rid="e10">Equation 10</xref>:<disp-formula id="e10">
<mml:math id="m55">
<mml:mrow>
<mml:mi mathvariant="bold-italic">w</mml:mi>
<mml:mi mathvariant="bold-italic">s</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>b</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
<label>(10)</label>
</disp-formula>
</p>
<p>Where: <bold>
<italic>w</italic>
</bold> denotes the coefficients of the hyperplane, <bold>
<italic>s</italic>
</bold> denotes the variables in the feature space, and <italic>b</italic> is the bias term.</p>
<p>In practice, normal samples are often contaminated by a small number of abnormal samples, leading to errors. To solve it, slack variables are introduced, and the optimal values of <bold>
<italic>w</italic>
</bold> and <italic>b</italic> can be obtained by solving the optimization problem in <xref ref-type="disp-formula" rid="e11">Equation 11</xref>:<disp-formula id="e11">
<mml:math id="m56">
<mml:mrow>
<mml:mfenced open="{" close="" separators="&#x7c;">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>min</mml:mi>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:msup>
<mml:mrow>
<mml:mfenced open="&#x2016;" close="&#x2016;" separators="&#x7c;">
<mml:mrow>
<mml:mi mathvariant="bold-italic">w</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>C</mml:mi>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>l</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:msub>
<mml:mi>&#x3be;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>s</mml:mi>
<mml:mo>.</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>.</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mrow>
<mml:mfenced open="{" close="" separators="&#x7c;">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">w</mml:mi>
<mml:mi mathvariant="bold-italic">s</mml:mi>
</mml:mrow>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>b</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3be;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3be;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x22ef;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(11)</label>
</disp-formula>
</p>
<p>Where: <italic>y</italic>
<sub>
<italic>i</italic>
</sub> denotes the stability label of the training sample; <inline-formula id="inf46">
<mml:math id="m57">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3be;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the slack variable; <inline-formula id="inf47">
<mml:math id="m58">
<mml:mrow>
<mml:mi>C</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is the penalty factor, used to control the degree of punishment for misclassification, <italic>l</italic> is the number of variables in the feature space.</p>
<p>After the boundary equation with the maximum distance between two types of samples is obtained using SVM, the transient voltage stability margin (TVSM) of a specific scenario corresponding to the sample can be calculated based on the distance from the sample&#x2019;s DSE to the boundary in the space <inline-formula id="inf48">
<mml:math id="m59">
<mml:mrow>
<mml:mi mathvariant="double-struck">E</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
<p>The ideal situation where the voltage magnitude curve at each bus can immediately and vertically return to a steady state after fault clearance is taken as the baseline for normalizing the stability margin. In this case, the DSE generated at each bus is 0. Thus, the TVSM of the system under a certain scenario is defined as <xref ref-type="disp-formula" rid="e12">Equation 12</xref>:<disp-formula id="e12">
<mml:math id="m60">
<mml:mrow>
<mml:mfenced open="{" close="" separators="&#x7c;">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mtext>TVSM</mml:mtext>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="" separators="&#x7c;">
<mml:mrow>
<mml:mtable columnalign="left">
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mtext>st</mml:mtext>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mtext>Ref</mml:mtext>
</mml:msub>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>g</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mtext>st</mml:mtext>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mtext>Ref</mml:mtext>
</mml:msub>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>b</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mtext>st</mml:mtext>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="|" close="|" separators="&#x7c;">
<mml:mrow>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mo>&#x2022;</mml:mo>
<mml:mi mathvariant="bold-italic">e</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>b</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mfenced open="&#x2016;" close="&#x2016;" separators="&#x7c;">
<mml:mrow>
<mml:mi mathvariant="bold-italic">e</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mtext>Ref</mml:mtext>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>max</mml:mi>
<mml:mrow>
<mml:mfenced open="{" close="}" separators="&#x7c;">
<mml:mrow>
<mml:munder>
<mml:mi>max</mml:mi>
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>g</mml:mi>
</mml:msub>
</mml:mrow>
</mml:munder>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mtext>st</mml:mtext>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mtext>st</mml:mtext>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:math>
<label>(12)</label>
</disp-formula>
</p>
<p>Where: <italic>E</italic>
<sub>
<italic>j</italic>
</sub> refers to the sample <italic>j</italic> in the stable sample set, <italic>E</italic>
<sub>
<italic>.g.</italic>
</sub>, <italic>D</italic>
<sub>st</sub> (<italic>E</italic>
<sub>
<italic>j</italic>
</sub>) refers to the perpendicular distance from sample <italic>j</italic> to the optimal boundary, <bold>
<italic>e</italic>
</bold> is the normal vector of the optimal boundary in the feature space, <italic>b</italic> is the constant term of the hyperplane equation, <italic>D</italic>
<sub>Ref</sub> is the reference distance value, <inline-formula id="inf49">
<mml:math id="m61">
<mml:mrow>
<mml:munder>
<mml:mi>max</mml:mi>
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>g</mml:mi>
</mml:msub>
</mml:mrow>
</mml:munder>
<mml:msub>
<mml:mi>D</mml:mi>
<mml:mtext>st</mml:mtext>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="&#x7c;">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> represents the maximum value among the perpendicular distances from all samples <italic>E</italic>
<sub>
<italic>j</italic>
</sub> in the sample set, <italic>E</italic>
<sub>
<italic>.g.,</italic>
</sub> to the optimal boundary, and <italic>D</italic>
<sub>st</sub> (0) refers to the perpendicular distance from the origin to the optimal boundary. <italic>D</italic>
<sub>Ref</sub> is chosen as the maximum value of <italic>D</italic>
<sub>st</sub> (<italic>E</italic>
<sub>
<italic>.g.,</italic>
</sub>) and <italic>D</italic>
<sub>st</sub> (0) to ensure that the calculated TVSM will not exceed 1.</p>
<p>After the stability margins corresponding to the scenarios of all samples in the sample set are calculated, the transient voltage stability level of the system after fault clearance is categorized into three types: stable, critically stable, and unstable, as shown in <xref ref-type="table" rid="T1">Table 1</xref>. Unlike the commonly used definition that considers samples that reach the limit of stability as critical samples, which is not instructive, in this paper, the stable samples with their TVSM ranked within the bottom 5% are considered as the critical samples (<xref ref-type="bibr" rid="B18">Li et al., 2019</xref>), and the maximum TVSM value among these critical samples is defined as the division <inline-formula id="inf50">
<mml:math id="m62">
<mml:mrow>
<mml:mi>&#x3b7;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. 5% is an empirical value, the value of <inline-formula id="inf51">
<mml:math id="m63">
<mml:mrow>
<mml:mi>&#x3b7;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> can be adjusted according to actual operating requirements. When TVSM &#x3d; 1, the system is in an ideal stable state, where the voltage curve can immediately return to steady-state after fault clearance, without any overshoot or oscillation. When TVSM &#x3d; 0, according to <xref ref-type="disp-formula" rid="e12">Equation 12</xref>, the sample point lies on the optimal boundary, and the system is exactly at the critical point between stability and instability. Considering that engineering design and operation usually adopt a conservative strategy, this paper classifies the samples with TVSM &#x3d; 0 as unstable.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Division of transient voltage stability margin.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">TVSM</th>
<th align="center">System transient voltage stability level</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">
<inline-formula id="inf52">
<mml:math id="m64">
<mml:mrow>
<mml:mi>&#x3b7;</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mtext>TVSM</mml:mtext>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="center">Stable</td>
</tr>
<tr>
<td align="center">
<inline-formula id="inf53">
<mml:math id="m65">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>&#x3c;</mml:mo>
<mml:mtext>TVSM</mml:mtext>
<mml:mo>&#x2264;</mml:mo>
<mml:mi>&#x3b7;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="center">Critically Stable</td>
</tr>
<tr>
<td align="center">
<inline-formula id="inf54">
<mml:math id="m66">
<mml:mrow>
<mml:mtext>TVSM</mml:mtext>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>
</td>
<td align="center">Unstable</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s4">
<title>4 Implementation of the overall scheme</title>
<p>Based on the decision tree model learned from perturbation signal energy characteristics and the transient voltage stability margin calculated by the perpendicular distance between the SVM optimal boundary and sample points, the overall scheme for assessing transient voltage system stability and calculating the margin is shown in <xref ref-type="fig" rid="F3">Figure 3</xref>.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Overall scheme of transient voltage stability assessment and margin calculation.</p>
</caption>
<graphic xlink:href="fenrg-12-1479478-g003.tif"/>
</fig>
<p>The overall scheme is implemented in four stages.<list list-type="simple">
<list-item>
<p>(1) Initial Data Acquisition and Processing: For a given system, considering its various possible operating conditions and fault types, a large number of simulation cases are generated through transient numerical simulations. The voltage time series is transformed into the DSE generated during the given period using <xref ref-type="disp-formula" rid="e3">Equation 3</xref>. The transformation completes the conversion from the time series dataset to the DSE dataset, preparing for subsequent learning.</p>
</list-item>
<list-item>
<p>(2) Construction of Decision Tree Classification Model: Based on the DSE dataset generated in the previous stage, the ID3 Decision Tree algorithm is applied to learn from these data and generate a decision tree classification model for transient voltage stability assessment. Each node in the tree corresponds to the DSE and its splitting threshold for the respective bus, which is considered the key bus of the power system. These key buses form the foundation for subsequent calculations of the TVSM based on SVM.</p>
</list-item>
<list-item>
<p>(3) Construction of the Margin Calculation Model: Based on the key buses obtained in step (2), a <italic>d</italic>-dimensional disturbance signal energy feature space <inline-formula id="inf55">
<mml:math id="m67">
<mml:mrow>
<mml:mi mathvariant="double-struck">E</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is constructed. After classification by the decision tree model, the sample points are labeled as stable and unstable. Using SVM, an approximate optimal linear boundary between the stable and unstable samples is obtained. The distance from each sample point to the optimal boundary is then used to calculate the TVSM of the corresponding scenario.</p>
</list-item>
<list-item>
<p>(4) Online Monitoring, Stability Assessment, and Margin Calculation: When the system undergoes a severe disturbance, the post-fault voltage time series data from the PMU is converted into a DSE dataset. This dataset is used for top-down path searching in a decision tree model. Upon reaching a leaf node, the node&#x2019;s class label provides the assessment result. If the system is judged to be unstable, an alarm signal will be immediately issued to alert the operating personnel to take control measures. If the result shows to be stable, the TVSM under the given fault will be calculated, thereby providing better guidance for personnel in the dispatch.</p>
</list-item>
</list>
</p>
</sec>
<sec id="s5">
<title>5 Case study</title>
<p>To verify the validity and superiority of the proposed method, the New England 10-machine 39-bus system (IEEE 39-bus system) with wind power access is built in DIgSILENT software, as shown in <xref ref-type="fig" rid="F4">Figure 4</xref>. The locations of wind farms integrated into the system and the specific configurations of the wind turbine generators can be found in the Appendix.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Single line diagram of IEEE 39-bus system with wind power farms.</p>
</caption>
<graphic xlink:href="fenrg-12-1479478-g004.tif"/>
</fig>
<p>Both the training and test set in the case study are obtained by transient simulation through DIgSILENT software. To enrich the diversity of the scenarios, the load size and synchronous machine output are adjusted based on the standard operation scenario of the system, and the Monte Carlo method is applied to simulate the stochastic nature of wind power output. The implementation plan is detailed in the Appendix. Meanwhile, considering the N-1 and N-2 principles, 1 or 2 important lines will be randomly disconnected in the case study before setting the faults according to the above schemes.</p>
<p>Under these conditions, the initial data samples are generated by transient numerical simulation, and then the voltage magnitude time series at each bus are extracted as the needed data samples. Taking the fault clearing time as the starting point, given the time window <italic>T</italic> to be 0.8&#xa0;s, the sampling interval <inline-formula id="inf56">
<mml:math id="m68">
<mml:mrow>
<mml:mo>&#x394;</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is set to be 0.01&#xa0;s, the same as the simulation time step. The time window is utilized to extract the time series of the voltage magnitude per unit value at each bus. The length of each time series is <inline-formula id="inf57">
<mml:math id="m69">
<mml:mrow>
<mml:mi>m</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>T</mml:mi>
<mml:mo>/</mml:mo>
<mml:mo>&#x394;</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
<sec id="s5-1">
<title>5.1 Stability assessment model utility verification and performance analysis</title>
<p>In this section, 1,200 data samples are generated through transient numerical simulations. Of these, 800 are randomly selected for offline training of the proposed method to construct the stability assessment model, while the remaining 400 are used to test the model construction efficiency and classification accuracy of the method. From the training samples, a candidate DSE set is generated, and the ID3 Decision Tree is used to train the candidate set for classification, resulting in the decision tree classification model shown in <xref ref-type="fig" rid="F5">Figure 5</xref>. Taking the root node in the figure as an example, <italic>E</italic>
<sub>Bus5</sub> denotes the DSE generated by the voltage at Bus 5 within time <italic>T</italic> after fault clearance, and the attributes of the feature variables on the rest of the nodes are similar to this one. The class labels on the leaf nodes indicate stability judgment results, with &#x2212;1 and 1 representing instability and stability, respectively. A 10-fold cross-validation is used to test the accuracy of the constructed classification model, yielding a cross-validation accuracy of 99%, indicating that the model has excellent classification performance.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Decision tree classification model.</p>
</caption>
<graphic xlink:href="fenrg-12-1479478-g005.tif"/>
</fig>
<p>Considering the particularity of transient voltage stability classification: the costs of misclassifying instability as stability (false negatives) and stability as instability (false positives) are significantly different. The former can easily lead to irreversible voltage collapse or even power outages, resulting in substantial economic losses, while the latter can typically be remedied in time with corrective control measures, leading to much smaller losses. Given the same probability of misclassification, system operators prefer to classify samples as unstable to avoid severe, irreversible consequences. Therefore, in subsequent comparisons of different algorithm performances, both the false negative rate and false positive rate are used as evaluation metrics (<xref ref-type="bibr" rid="B38">Zhu et al., 2016</xref>). When applying data mining methods to transient voltage stability analysis, considering the conservative nature of power system operation, it is important to not only improve classification accuracy (i.e., reduce the total number of false negatives and false positives) but also to minimize the total number or proportion of false negatives (<xref ref-type="bibr" rid="B7">Dai et al., 2015</xref>).</p>
<p>When using the resulting decision tree classification model to assess transient voltage stability online, the WAMS first collects the voltage time series of buses 5, 11, and 7 within time <italic>T</italic> after fault clearance. Then, the DSE generated by these time series compared to their steady-state values is calculated and compared with the splitting thresholds in the model in a top-down sequence until a leaf node is encountered, then the stability discrimination result can be obtained. By employing this approach, the remaining 400 samples that were not used in training are tested to simulate online monitoring and stability assessment, further validating the model&#x2019;s classification performance. The results show an overall accuracy rate (AR) of 99%, with a false positive rate (FPR) of 1% and a false negative rate (FNR) of 0%. It proves that the classification model can be reliably and effectively used for online monitoring.</p>
<p>Under the same conditions of parameters, data samples, and configuration environment, the proposed transient voltage stability assessment model based on DSE feature extraction is compared with the improved algorithm which uses piecewise linear fitting before Shapelet search to avoid inefficient point-by-point sliding search (<xref ref-type="bibr" rid="B35">Ye and Keogh, 2009</xref>), and the stability assessment algorithm based on particle swarm optimization to accelerate Shapelet search (<xref ref-type="bibr" rid="B38">Zhu et al., 2016</xref>). The aforementioned algorithms are hereafter referred to as Algorithm I, B, and C, in sequence. The comparison results are shown in <xref ref-type="table" rid="T2">Table 2</xref>.</p>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Comparison of training time and accuracy of four algorithms.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="center">Algorithm</th>
<th rowspan="2" align="center">Training time (s)</th>
<th colspan="3" align="center">Results of test</th>
</tr>
<tr>
<th align="center">FNR (%)</th>
<th align="center">FPR (%)</th>
<th align="center">AR (%)</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">B</td>
<td align="center">7.743 &#xd7; 10<sup>4</sup>
</td>
<td align="center">0.5</td>
<td align="center">1</td>
<td align="center">98.50</td>
</tr>
<tr>
<td align="center">C</td>
<td align="center">9.563 &#xd7; 10<sup>3</sup>
</td>
<td align="center">0.5</td>
<td align="center">0.75</td>
<td align="center">98.75</td>
</tr>
<tr>
<td align="center">I</td>
<td align="center">2.983 &#xd7; 10<sup>2</sup>
</td>
<td align="center">0.25</td>
<td align="center">0.5</td>
<td align="center">99.5</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Compared with algorithms B and C, Algorithm I significantly reduces the training time to less than 300&#xa0;s. This is because Algorithm I adopts the DSE split threshold which is single-dimensional as the comparison object, while Algorithms B and C first search for the optimal two-dimensional time series and then transform it into a Euclidean distance split threshold for comparison. Algorithm I eliminates the complex optimal subsequence search process, significantly reducing the model training time cost and shows a high degree of flexibility for the rapid updating of the topology and morphology of the power grid.</p>
<p>In terms of accuracy, the proposed algorithm in this paper shows a reduction in both missed detection rates and false alarm rates compared to Algorithms B and C, resulting in an overall improvement in accuracy. By referring to the decision tree classification model shown in <xref ref-type="fig" rid="F5">Figure 5</xref>, the reasons for this improvement are as follows: the DSE of the bus in the stable samples are all less than the energy splitting thresholds of the nodes inside the decision tree, whereas the DSE of unstable samples is all greater than the energy splitting thresholds. It means that the samples have obvious differentiation in the model constructed by Algorithm I. Meanwhile, different types of instability may cause the system&#x2019;s voltage curves to exhibit various patterns, such as gradual decline, damped oscillation, sustained oscillation, and voltage collapse, which lead to significant differences in the voltage curves shortly after fault clearance. Algorithms A, B, and C evaluate stability by comparing the Euclidean distance between the voltage curve trajectories and an optimal Shapelet. As a result, they may confuse stable and unstable curves when faced with different instability types, leading to misjudgment. The proposed method, by comparing disturbance signal energy levels, overcomes the limitations of shapelet-based methods. Thus achieving higher accuracy. This is also why the proposed algorithm outperforms shapelet-based methods in terms of accuracy.</p>
<p>In practical engineering applications, power grid lines are frequently under maintenance. Therefore, the topology and configuration of the power grid during online monitoring often differ from those during offline training. In such cases, stability assessment models need to have strong robustness and generalization capabilities.</p>
<p>To verify that the proposed method maintains robust stability assessment capabilities even when minor changes occur in the power grid topology due to line maintenance, the following example is set to an extreme condition. In the IEEE 39-bus system shown in <xref ref-type="fig" rid="F4">Figure 4</xref>, the system load levels, outputs of synchronous generators and wind farms, and fault locations are randomly set according to the previously described conditions. Without any line maintenance, 200 data samples (denoted as the training set A1) are obtained through transient numerical simulations for offline training. Then, following the N-2 criterion, two lines are randomly taken out of service, and 800 data samples (denoted as the test set A2) are obtained through simulations for testing. Similarly, 200 new data samples under the N-2 criterion are obtained as a new training set (denoted as the training set B1), and 800 data samples without any line maintenance are obtained as a new test set (denoted as the test set B2). After 10 times of random data extraction, the average results obtained from the test are shown in <xref ref-type="table" rid="T3">Table 3</xref>.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Comparison of the performance of the two algorithms in the face of N-2 maintenance and insufficient samples.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Algorithm</th>
<th align="center">Training set</th>
<th align="center">Test set</th>
<th align="center">Training time (s)</th>
<th align="center">FNR (%)</th>
<th align="center">FPR (%)</th>
<th align="center">Accuracy rate (%)</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td rowspan="2" align="center">C</td>
<td align="center">A1</td>
<td align="center">A2</td>
<td rowspan="2" align="center">572</td>
<td align="center">2.25</td>
<td align="center">2</td>
<td align="center">91.75</td>
</tr>
<tr>
<td align="center">B1</td>
<td align="center">B2</td>
<td align="center">2.5</td>
<td align="center">2.25</td>
<td align="center">91.25</td>
</tr>
<tr>
<td rowspan="2" align="center">I</td>
<td align="center">A1</td>
<td align="center">A2</td>
<td rowspan="2" align="center">55</td>
<td align="center">1.25</td>
<td align="center">1.5</td>
<td align="center">94.25</td>
</tr>
<tr>
<td align="center">B1</td>
<td align="center">B2</td>
<td align="center">0.25</td>
<td align="center">0.25</td>
<td align="center">96.50</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>From <xref ref-type="table" rid="T3">Table 3</xref>, it can be observed that the proposed method maintains high accuracy and a low leakage rate even when faced with changes in the power grid&#x2019;s topology and structure due to line maintenance, as well as insufficient fault samples for training new models in practical engineering scenarios, and its accuracy and model training efficiency are higher than that of the Shapelet-based stability assessment algorithm represented by Algorithm C. This is because when facing the same fault, the bus voltage time series will change due to the different topology of the power grid. At the time, the DSE-based feature learning can be well adapted to this change.</p>
<p>Assuming the system remains transiently stable before and after topology changes, Algorithm I converts time series sets into energy sets, with the core as shown in <xref ref-type="disp-formula" rid="e3">Equation 3</xref>. Each value at a sampled time point is subtracted from the steady-state value, and the square of this difference is multiplied by the simulation step size of 0.01&#xa0;s. This difference does not change dramatically due to minor trajectory variations.</p>
<p>To further illustrate the critical role of DSE in identifying the trend toward system instability and the effect of the selection of the time window <italic>T</italic> on the results, 800 samples used for offline training in the example shown in <xref ref-type="fig" rid="F5">Figure 5</xref> are selected. Bus 5, the root node of the decision tree model, is taken as the observation object, and its time series curve of the DSE generated in 0&#x2013;1.4&#xa0;s after fault clearance is shown in <xref ref-type="fig" rid="F6">Figure 6</xref>.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>Time series curve of DSE at Bus 5</p>
</caption>
<graphic xlink:href="fenrg-12-1479478-g006.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="F6">Figure 6</xref>, as time progresses after fault clearance, the time series curves of DSE for stable samples gradually flatten. At the later stage, the voltage curve returns to the steady state and almost no longer generates DSE. On the other hand, the DSE curve of the unstable samples continues to climb after fault clearance because the voltage curve cannot return to the vicinity of the steady-state value, so the difference in the magnitude of the DSE generated by the bus voltages between the stable samples and the unstable samples becomes increasingly evident.</p>
<p>In the above process, the distinction between the two types of samples becomes increasingly clear after 0.8&#xa0;s, which means that the longer the time window <italic>T</italic> after the fault clearance is taken, the more DSE is generated by this time series. The enhanced differentiation between stable and unstable samples results in fewer internal nodes in the constructed decision tree model, which is beneficial to the accuracy of the stability assessment and the subsequent margin calculation. However, the longer the time window <italic>T</italic> taken for analysis, the less time is left for automated engineering systems to react or for human operators to take corrective actions after the assessment model evaluates that the transient voltage stability will become unstable and issues a warning. This is not conducive to operators taking timely control measures to prevent the instability incident from escalating further.</p>
</sec>
<sec id="s5-2">
<title>5.2 Calculation and analysis of transient voltage stability margin</title>
<p>Based on the decision tree classification model obtained in <xref ref-type="sec" rid="s5-1">Section 5.1</xref>, the decision nodes corresponding to the system buses are identified. In this case, three buses are included, and a three-dimensional feature space is constructed based on the DSE corresponding to these buses.</p>
<p>As mentioned in <xref ref-type="sec" rid="s3-3">Section 3.3</xref>, the overall DSE of all buses in the system shows a &#x201c;simultaneously increase or decrease&#x201d; trend after the system suffers a disturbance. This means that in the feature space, the sample points are roughly concentrated along a line. To verify this conclusion, the distribution of the DSE of the sample points in the feature space is shown below. As illustrated in <xref ref-type="fig" rid="F7">Figures 7A&#x2013;C</xref>, the sample points are approximately distributed along a straight line on the three cross-sections of the three-dimensional space, with linear fitting degrees of 0.9583, 0.9870, and 0.9613, respectively. This indicates that the sample points are approximately linearly distributed in the three-dimensional space. At this point, SVM can quickly find the optimal classification boundary to perform subsequent stability margin calculations.</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>Distribution of sample points in the feature space: <bold>(A)</bold> View 1, <bold>(B)</bold> View 2, <bold>(C)</bold> View 3.</p>
</caption>
<graphic xlink:href="fenrg-12-1479478-g007.tif"/>
</fig>
<p>Based on <xref ref-type="sec" rid="s3-3">Section 3.3</xref>, the calculation of the TSVM is performed by the constructed decision boundary. The accuracy of the calculation is heavily dependent on the precision of the decision tree classification model. To verify that the transient voltage stability of the system is well differentiated in the above feature space constructed by the decision tree model, 800 training samples from the first case study in <xref ref-type="sec" rid="s5-1">Section 5.1</xref> are used to train the SVM model. The additional 400 samples are utilized for testing. The optimal decision boundary equation for classifying stable and unstable samples is provided in <xref ref-type="disp-formula" rid="e13">Equation 13</xref>. The SVM model achieves a classification accuracy of 99.25% on the 400 test samples, demonstrating a high level of reliability and accuracy in practical applications. <xref ref-type="fig" rid="F8">Figure 8</xref> presents the distribution of 400 test samples and the optimal decision boundary in the feature space of key buses. In this figure, the cyan plane represents the optimal decision boundary, blue points indicate stable samples and red points denote unstable samples.<disp-formula id="e13">
<mml:math id="m70">
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>8.412</mml:mn>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>B</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>s</mml:mi>
<mml:mn>5</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>8.36</mml:mn>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>B</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>s</mml:mi>
<mml:mn>11</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>7.864</mml:mn>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>B</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>s</mml:mi>
<mml:mn>7</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1.092</mml:mn>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:math>
<label>(13)</label>
</disp-formula>
</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption>
<p>Three-dimensional spatial distribution of the optimal decision boundary and test samples.</p>
</caption>
<graphic xlink:href="fenrg-12-1479478-g008.tif"/>
</fig>
<p>Based on <xref ref-type="disp-formula" rid="e12">Equations 12</xref>, <xref ref-type="disp-formula" rid="e13">13</xref>, the TSVM for 400 data samples is calculated. Using the results presented in <xref ref-type="table" rid="T1">Table 1</xref>, a subset of samples categorized as transiently stable, critically stable, and unstable are chosen for comparative analysis. According to the definition in <xref ref-type="disp-formula" rid="e12">Equation 12</xref>, the critical TSVM value <inline-formula id="inf58">
<mml:math id="m71">
<mml:mrow>
<mml:mi>&#x3b7;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> corresponding to these 400 samples is 0.1652. Based on the resulting <inline-formula id="inf59">
<mml:math id="m72">
<mml:mrow>
<mml:mi>&#x3b7;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>,the response curves of the voltage magnitudes at each bus within 5&#xa0;s following a fault for samples of varying stability levels are illustrated in <xref ref-type="fig" rid="F9">Figure 9</xref>.</p>
<fig id="F9" position="float">
<label>FIGURE 9</label>
<caption>
<p>Voltage magnitude response curves for different stability levels: <bold>(A)</bold> Sample 1, <bold>(B)</bold> Sample 2, <bold>(C)</bold> Sample 3, <bold>(D)</bold> Sample 4.</p>
</caption>
<graphic xlink:href="fenrg-12-1479478-g009.tif"/>
</fig>
<p>Based on <xref ref-type="fig" rid="F9">Figure 9</xref>, as the transient voltage stability margin of the system gradually decreases, the amplitude of the voltage magnitude trajectories at various buses increases after the line fault clearance. Initially, the voltage magnitudes exhibit slight oscillations around their steady-state values and quickly become stable. As the stability margin continues to decrease, the oscillations become more pronounced around the steady-state values. Ultimately, when the system becomes unstable, the voltage magnitudes oscillate violently and then diverge.</p>
<p>Sixty sample parameter settings were randomly selected from <xref ref-type="fig" rid="F8">Figure 8</xref>. The corresponding critical clearing times were obtained through iterative testing in DIgSILENT to validate the accuracy of the calculated stability margins. The results are shown in <xref ref-type="fig" rid="F10">Figure 10</xref>. As seen in <xref ref-type="fig" rid="F10">Figure 10</xref>, when the TSVM values of the samples increase, their critical clearing times generally increase as well. The linear fit between the two has a correlation coefficient of 0.8522.</p>
<fig id="F10" position="float">
<label>FIGURE 10</label>
<caption>
<p>The relationship between the system&#x2019;s TVSM and CCT.</p>
</caption>
<graphic xlink:href="fenrg-12-1479478-g010.tif"/>
</fig>
<p>Based on the results in <xref ref-type="fig" rid="F8">Figures 8</xref>, <xref ref-type="fig" rid="F10">10</xref>, it is validated that the transient stability margin calculated by the method proposed in this paper effectively reflects the transient voltage stability in practical operating scenarios. The method demonstrates sufficient usability within an acceptable range of error and has the potential for application in engineering practice.</p>
</sec>
</sec>
<sec sec-type="conclusion" id="s6">
<title>6 Conclusion</title>
<p>This paper focuses on the transient voltage stability assessment of modern power systems, integrating machine learning with the transient voltage trajectory of buses. A transient voltage stability assessment model based on Decision Tree and disturbance signal energy (DSE) is proposed, as well as a stability margin calculation scheme based on SVM. The main contributions and results of this paper are as follows.<list list-type="simple">
<list-item>
<p>(1) The concept of DSE is introduced. Based on the DSE, the intensity of voltage fluctuations can be more directly reflected compared to the energy function method. The ID3 Decision Tree algorithm is applied to construct the transient voltage stability assessment model based on DSE. Compared to the Shapelet-based method, the assessment model proposed in this paper shows the advantages of lower time costs and higher interpretability, while maintaining the same level of accuracy.</p>
</list-item>
<list-item>
<p>(2) The optimal decision boundary of the dichotomous samples is obtained using SVM, upon which the stability margin calculation is built. The resulting stability margin provides a definitive assessment of the transient voltage stability and effective guidance for practical dispatching.</p>
</list-item>
<list-item>
<p>(3) The effectiveness of the proposed transient voltage stability assessment and margin calculation methods is verified through the tests on the IEEE 39-bus system. The case study results show that the proposed method has the advantages of low time cost, high accuracy, and strong robustness, demonstrating significant potential for online monitoring and assessment of transient voltage stability in new power systems.</p>
</list-item>
</list>
</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s7">
<title>Data availability statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec id="s8">
<title>Author contributions</title>
<p>YC: Writing&#x2013;original draft, Funding acquisition, Software, Supervision. ZH: Writing&#x2013;original draft, Writing&#x2013;review and editing, Conceptualization, Validation. ZD: Writing&#x2013;original draft, Writing&#x2013;review and editing, Funding acquisition, Supervision. GZ: Writing&#x2013;original draft, Writing&#x2013;review and editing, Conceptualization. JG: Writing&#x2013;original draft, Writing&#x2013;review and editing. HZ: Writing&#x2013;original draft, Software.</p>
</sec>
<sec sec-type="funding-information" id="s9">
<title>Funding</title>
<p>The author(s) declare that financial support was received for the research, authorship, and/or publication of this article. This research was supported by the State Key Laboratory of HVDC, Electric Power Research Institute, China Southern Power Grid (SKLHVDC-2022-KF-14).</p>
</sec>
<sec sec-type="COI-statement" id="s10">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s11">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<sec id="s12">
<title>Supplementary material</title>
<p>The Supplementary Material for this article can be found online at: <ext-link ext-link-type="uri" xlink:href="https://www.frontiersin.org/articles/10.3389/fenrg.2024.1479478/full#supplementary-material">https://www.frontiersin.org/articles/10.3389/fenrg.2024.1479478/full&#x23;supplementary-material</ext-link>
</p>
<supplementary-material xlink:href="DataSheet1.DOCX" id="SM1" mimetype="application/DOCX" xmlns:xlink="http://www.w3.org/1999/xlink"/>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Adhikari</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Naetiladdanon</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Sagswang</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Gurung</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2020</year>). &#x201c;<article-title>Comparison of voltage stability assessment using different machine learning algorithms</article-title>,&#x201d; in <conf-name>2020 IEEE 4th Conference on Energy Internet and Energy System Integration (EI2)</conf-name>, <conf-loc>Wuhan, China</conf-loc>, <conf-date>October 30&#x2013;November 1, 2020</conf-date>, <fpage>2023</fpage>&#x2013;<lpage>2026</lpage>. <pub-id pub-id-type="doi">10.1109/EI250167.2020.9346750</pub-id>
</citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Barab &#xe1; si</surname>
<given-names>A. L.</given-names>
</name>
<name>
<surname>Albert</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>1999</year>). <article-title>Emergence of scaling in random networks</article-title>. <source>Science</source> <volume>286</volume> (<issue>5439</issue>), <fpage>509</fpage>&#x2013;<lpage>512</lpage>. <pub-id pub-id-type="doi">10.1126/science.286.5439.509</pub-id>
</citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bergen</surname>
<given-names>A. R.</given-names>
</name>
<name>
<surname>Hill</surname>
<given-names>D. J.</given-names>
</name>
</person-group> (<year>1981</year>). <article-title>A structure preserving model for power system stability analysis</article-title>. <source>IEEE Trans. power apparatus Syst.</source> <volume>1</volume>, <fpage>25</fpage>&#x2013;<lpage>35</lpage>. <pub-id pub-id-type="doi">10.1109/TPAS.1981.316883</pub-id>
</citation>
</ref>
<ref id="B4">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Xie</surname>
<given-names>H.</given-names>
</name>
</person-group> (<year>2022</year>). &#x201c;<article-title>Transient voltage stability assessment based on an improved TCN-BiLSTM framework</article-title>,&#x201d; in <conf-name>2022 IEEE 5th International Electrical and Energy Conference (CIEEC)</conf-name>, <conf-loc>Nanjing, China</conf-loc>, <conf-date>May 27&#x2013;29, 2022</conf-date>, <fpage>4420</fpage>&#x2013;<lpage>4426</lpage>. <pub-id pub-id-type="doi">10.1109/CIEEC54735.2022.9846359</pub-id>
</citation>
</ref>
<ref id="B5">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Chi</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2023</year>). &#x201c;<article-title>Research on new power system network security protection technology</article-title>,&#x201d; in <conf-name>Second International Conference on Energy, Power, and Electrical Technology (ICEPET)</conf-name>, <conf-loc>Kuala Lumpur, Malaysia</conf-loc>, <conf-date>March 10&#x2013;12, 2023</conf-date>, <fpage>259</fpage>. <pub-id pub-id-type="doi">10.1117/12.3005241</pub-id>
</citation>
</ref>
<ref id="B6">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chiang</surname>
<given-names>H. D.</given-names>
</name>
</person-group> (<year>1989</year>). <article-title>Study of the existence of energy functions for power systems with losses</article-title>. <source>IEEE Trans. Circuits Syst.</source> <volume>36</volume> (<issue>11</issue>), <fpage>1423</fpage>&#x2013;<lpage>1429</lpage>. <pub-id pub-id-type="doi">10.1109/31.41298</pub-id>
</citation>
</ref>
<ref id="B7">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Dai</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Min</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2015</year>). &#x201c;<article-title>Multi-support vector machine power system transient stability assessment based on relief algorithm</article-title>,&#x201d; in <conf-name>2015 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC)</conf-name> , <conf-loc>Brisbane, Australia</conf-loc>, <conf-date>November 15&#x2013;18, 2015</conf-date>, <fpage>1</fpage>&#x2013;<lpage>5</lpage>. <pub-id pub-id-type="doi">10.1109/APPEEC.2015.7381006</pub-id>
</citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dobson</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Chiang</surname>
<given-names>H. D.</given-names>
</name>
</person-group> (<year>1989</year>). <article-title>Towards a theory of voltage collapse in electric power systems</article-title>. <source>Syst. and Control Lett.</source> <volume>13</volume> (<issue>3</issue>), <fpage>253</fpage>&#x2013;<lpage>262</lpage>. <pub-id pub-id-type="doi">10.1016/0167-6911(89)90072-8</pub-id>
</citation>
</ref>
<ref id="B9">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gao</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Cai</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Real-time long-term voltage stability assessment based on eGBDT for large-scale power system with high renewables penetration</article-title>. <source>Electr. Power Syst. Res.</source> <volume>214</volume> (<issue>B</issue>), <fpage>108915</fpage>. <pub-id pub-id-type="doi">10.1016/j.epsr.2022.108915</pub-id>
</citation>
</ref>
<ref id="B10">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gao</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>Review on electric power and energy balance analysis of new-generation power system</article-title>. <source>High. Volt. Eng.</source>, <fpage>2683</fpage>&#x2013;<lpage>2696</lpage>. <pub-id pub-id-type="doi">10.13336/j.1003-6520.hve.20221888</pub-id>
</citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hou</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Xie</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Ye</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>K.</given-names>
</name>
<etal/>
</person-group> (<year>2015</year>). <article-title>Quantitative assessment index and method of transient voltage stability</article-title>. <source>Electr. Power Autom. Equip.</source> <volume>35</volume> (<issue>10</issue>), <fpage>151</fpage>&#x2013;<lpage>156</lpage>. <pub-id pub-id-type="doi">10.16081/j.issn.1006-6047.2015.10.023</pub-id>
</citation>
</ref>
<ref id="B12">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hou</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Min</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2004</year>). <article-title>Local approximation of transient stability boundary of the power systems</article-title>. <source>Proc. CSEE</source> <volume>24</volume> (<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>5</lpage>. <pub-id pub-id-type="doi">10.3321/j.issn:0258-8013.2004.01.001</pub-id>
</citation>
</ref>
<ref id="B13">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Indulkar</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Viswanathan</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Venkata</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>1989</year>). <article-title>Maximum power transfer limited by voltage stability in series and shunt compensated schemes for AC transmission systems</article-title>. <source>IEEE Trans. Power Deliv.</source> <volume>4</volume> (<issue>2</issue>), <fpage>1246</fpage>&#x2013;<lpage>1252</lpage>. <pub-id pub-id-type="doi">10.1109/61.25610</pub-id>
</citation>
</ref>
<ref id="B14">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Jiang</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Muljadi</surname>
<given-names>E.</given-names>
</name>
</person-group> (<year>2014</year>). &#x201c;<article-title>Synchro-phasor based auxiliary controller to enhance power system transient voltage stability in a high penetration renewable energy scenario</article-title>,&#x201d; in <source>2014 ieee symposium power electronics and machines for wind and water applications (pemwa)</source>.</citation>
</ref>
<ref id="B15">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Karabadji</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Korba</surname>
<given-names>A. A.</given-names>
</name>
<name>
<surname>Assi</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Seridi</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Aridhi</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Dhifli</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>Accuracy and diversity-aware multi-objective approach for random forest construction</article-title>. <source>Expert Syst. Appl.</source> <volume>225</volume>, <fpage>120138</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2023.120138</pub-id>
</citation>
</ref>
<ref id="B16">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kwatny</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Pasrija</surname>
<given-names>A. K.</given-names>
</name>
<name>
<surname>Bahar</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>1986</year>). <article-title>Static bifurcations in electric power networks: loss of steady-state stability and voltage collapse</article-title>. <source>IEEE Trans. Circuits Syst.</source> <volume>33</volume> (<issue>10</issue>), <fpage>981</fpage>&#x2013;<lpage>991</lpage>. <pub-id pub-id-type="doi">10.1109/TCS.1986.1085856</pub-id>
</citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>La Scala</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Sbrizzai</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Torelli</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Scarpellini</surname>
<given-names>P.</given-names>
</name>
</person-group> (<year>1998</year>). <article-title>A tracking time domain simulator for real-time transient stability analysis</article-title>. <source>IEEE Trans. Power Syst.</source> <volume>13</volume> (<issue>3</issue>), <fpage>992</fpage>&#x2013;<lpage>998</lpage>. <pub-id pub-id-type="doi">10.1109/59.709088</pub-id>
</citation>
</ref>
<ref id="B18">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2019</year>). &#x201c;<article-title>Learning to infer voltage stability margin using transfer learning</article-title>,&#x201d; in <conf-name>2019 IEEE Data Science Workshop (DSW)</conf-name>, <conf-loc>Minneapolis, MN</conf-loc>, <conf-date>June 02&#x2013;05, 2019</conf-date>, <fpage>270</fpage>&#x2013;<lpage>274</lpage>. <pub-id pub-id-type="doi">10.1109/dsw.2019.8755558</pub-id>
</citation>
</ref>
<ref id="B19">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>An</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Random forest algorithm for differential privacy protection</article-title>. <source>Comput. Eng.</source> <volume>46</volume> (<issue>1</issue>), <fpage>93</fpage>&#x2013;<lpage>101</lpage>. <pub-id pub-id-type="doi">10.1109/ICCT.2017.8359960</pub-id>
</citation>
</ref>
<ref id="B41">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>Y. H.</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>S. X.</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2024</year>). <article-title>Transient voltage stability evaluating method for DC receiving-end system based on intelligent enhancement with multiple binary tables</article-title>. <source>Southern Power System Technology</source>, <fpage>1</fpage>&#x2013;<lpage>10</lpage>.</citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Maeda</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Takigawa</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Minato</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Yokoyama</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>1995</year>). <article-title>Assessment of transient voltage stability based on critical operating time of emergency control using neural networks</article-title>. <source>Electr. Eng. Jpn.</source> <volume>115</volume> (<issue>8</issue>), <fpage>33</fpage>&#x2013;<lpage>43</lpage>. <pub-id pub-id-type="doi">10.1002/eej.4391150804</pub-id>
</citation>
</ref>
<ref id="B21">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Marceau</surname>
<given-names>R. J.</given-names>
</name>
<name>
<surname>Sirandi</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Soumare</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Dai Do</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Galiana</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Mailhot</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>1996</year>). <article-title>A review of signal energy analysis for the rapid determination of dynamic security limits</article-title>. <source>Can. J. Electr. Comput. Eng.</source> <volume>21</volume> (<issue>4</issue>), <fpage>125</fpage>&#x2013;<lpage>132</lpage>. <pub-id pub-id-type="doi">10.1109/CJECE.1996.7101990</pub-id>
</citation>
</ref>
<ref id="B22">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Niu</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Huo</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Ke</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Wei</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Ren</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>G.</given-names>
</name>
<etal/>
</person-group> (<year>2021</year>). &#x201c;<article-title>Research on power system transient security prediction based on AdaBoost-SVM</article-title>,&#x201d; in <conf-name>2021 IEEE Sustainable Power and Energy Conference (iSPEC)</conf-name>, <conf-loc>Nanjing, China</conf-loc>, <conf-date>December 23&#x2013;25, 2021</conf-date>, <fpage>3975</fpage>&#x2013;<lpage>3981</lpage>. <pub-id pub-id-type="doi">10.1109/iSPEC53008.2021.9736109</pub-id>
</citation>
</ref>
<ref id="B23">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Odun-Ayo</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Crow</surname>
<given-names>M. L.</given-names>
</name>
</person-group> (<year>2012</year>). <article-title>Structure-preserved power system transient stability using stochastic energy functions</article-title>. <source>IEEE Trans. power Syst.</source> <volume>27</volume> (<issue>3</issue>), <fpage>1450</fpage>&#x2013;<lpage>1458</lpage>. <pub-id pub-id-type="doi">10.1109/TPWRS.2012.2183396</pub-id>
</citation>
</ref>
<ref id="B24">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Omuya</surname>
<given-names>E. O.</given-names>
</name>
<name>
<surname>Okeyo</surname>
<given-names>G. O.</given-names>
</name>
<name>
<surname>Kimwele</surname>
<given-names>M. W.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Feature selection for classification using principal component analysis and information gain</article-title>. <source>Expert Syst. Appl.</source> <volume>174</volume>, <fpage>114765</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2021.114765</pub-id>
</citation>
</ref>
<ref id="B25">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Overbye</surname>
<given-names>T. J.</given-names>
</name>
<name>
<surname>Pai</surname>
<given-names>M. A.</given-names>
</name>
<name>
<surname>Sauer</surname>
<given-names>P. W.</given-names>
</name>
</person-group> (<year>1992</year>). <article-title>A composite framework for synchronous and voltage stability in power systems</article-title>. <source>1992 IEEE Int. Symposium Circuits Syst.</source> <volume>5</volume>, <fpage>2541</fpage>&#x2013;<lpage>2544</lpage>. <pub-id pub-id-type="doi">10.1109/ISCAS.1992.230468</pub-id>
</citation>
</ref>
<ref id="B26">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Overbye</surname>
<given-names>T. J.</given-names>
</name>
<name>
<surname>Pai</surname>
<given-names>M. A.</given-names>
</name>
<name>
<surname>Sauer</surname>
<given-names>P. W.</given-names>
</name>
</person-group> (<year>1992</year>). &#x201c;<article-title>Some aspects of the energy function approach to angle and voltage stability analysis in power systems</article-title>,&#x201d; in <conf-name>Proceedings of the 31st IEEE Conference on Decision and Control</conf-name>, <conf-loc>Tucson, AZ</conf-loc>, <conf-date>December 16&#x2013;18, 1992</conf-date>, <fpage>2941</fpage>&#x2013;<lpage>2946</lpage>. <pub-id pub-id-type="doi">10.1109/CDC.1992.371273</pub-id>
</citation>
</ref>
<ref id="B27">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pan</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Xue</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Chung</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2008</year>). <article-title>Analytical calculation of power system trajectory eigenvalues and its error analys</article-title>. <source>Automation Electr. Power Syst.</source> (<issue>19</issue>), <fpage>10</fpage>&#x2013;<lpage>14</lpage>. <pub-id pub-id-type="doi">10.3321/j.issn:1000-1026.2008.19.003</pub-id>
</citation>
</ref>
<ref id="B28">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Praprost</surname>
<given-names>K. L.</given-names>
</name>
<name>
<surname>Loparo</surname>
<given-names>K. A.</given-names>
</name>
</person-group> (<year>1994</year>). <article-title>An energy function method for determining voltage collapse during a power system transient</article-title>. <source>IEEE Trans. Circuits Syst. I Fundam. Theory Appl.</source> <volume>41</volume> (<issue>10</issue>), <fpage>635</fpage>&#x2013;<lpage>651</lpage>. <pub-id pub-id-type="doi">10.1109/81.329724</pub-id>
</citation>
</ref>
<ref id="B29">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tan</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Ni</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2012</year>). <article-title>A practical criterion for trajectory eigenvalues based transient stability analysis</article-title>. <source>Automation Electr. Power Syst.</source> <volume>36</volume> (<issue>16</issue>), <fpage>14</fpage>&#x2013;<lpage>19</lpage>.</citation>
</ref>
<ref id="B30">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tan</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Du</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2024</year>). <article-title>Distributed feature selection for power system dynamic security region based on grid-partition and fuzzy-rough sets</article-title>. <source>Electronics</source> <volume>13</volume> (<issue>5</issue>), <fpage>815</fpage>. <pub-id pub-id-type="doi">10.3390/electronics13050815</pub-id>
</citation>
</ref>
<ref id="B40">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tang</surname>
<given-names>Y. J.</given-names>
</name>
<name>
<surname>Xiang</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Ma</surname>
<given-names>Y. K.</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>D. P.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>Time series data-driven transient stability assessment for microgrid</article-title>. <source>Southern Power System Technology</source> <volume>17</volume> (<issue>7</issue>), <fpage>125</fpage>&#x2013;<lpage>134</lpage>. <pub-id pub-id-type="doi">10.13648/j.cnki.issn1674-0629.2023.07.014</pub-id>
</citation>
</ref>
<ref id="B31">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Song</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>Xi.</given-names>
</name>
</person-group> (<year>2002</year>). <article-title>Power system full dynamic simulation. III. Long term dynamic models</article-title>. <source>Power Syst. Technol.</source> <volume>26</volume> (<issue>11</issue>), <fpage>20</fpage>&#x2013;<lpage>25</lpage>. <pub-id pub-id-type="doi">10.13335/j.1000-3673.pst.2002.11.006</pub-id>
</citation>
</ref>
<ref id="B32">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Tu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>He</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>An</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Xie</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>W.</given-names>
</name>
<etal/>
</person-group> (<year>2023</year>). &#x201c;<article-title>Analysis and lessons of Pakistan blackout event on january 23, 2023</article-title>,&#x201d; in <conf-name>Proceedings of the Chinese Society for Electrical Engineering</conf-name>, <fpage>5319</fpage>&#x2013;<lpage>5328</lpage>. <pub-id pub-id-type="doi">10.13334/j.0258-8013.pcsee.230745</pub-id>
</citation>
</ref>
<ref id="B33">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Zheng</surname>
<given-names>H.</given-names>
</name>
<etal/>
</person-group> (<year>2024</year>). <article-title>Research on optimization and improvement method of new energy access grid stability based on transient stability margin index</article-title>. <source>J. Phys. Conf. Ser.</source> <volume>2788</volume> (<issue>1</issue>), <fpage>012019</fpage>. <pub-id pub-id-type="doi">10.1088/1742-6596/2788/1/012019</pub-id>
</citation>
</ref>
<ref id="B34">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2011</year>). <article-title>Energy function-based power system transient stability analysis</article-title>. <source>Power Syst. Technol.</source> <volume>35</volume> (<issue>8</issue>), <fpage>114</fpage>&#x2013;<lpage>118</lpage>. <pub-id pub-id-type="doi">10.13335/j.1000-3673.pst.2011.08.025</pub-id>
</citation>
</ref>
<ref id="B35">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Ye</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Keogh</surname>
<given-names>E.</given-names>
</name>
</person-group> (<year>2009</year>). &#x201c;<article-title>Time series shapelets: a new primitive for data mining</article-title>,&#x201d; in <conf-name>15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</conf-name>, <conf-loc>Paris, France</conf-loc>,<conf-date>June 28&#x2013;Jul 01, 2009</conf-date>, <fpage>947</fpage>&#x2013;<lpage>955</lpage>.</citation>
</ref>
<ref id="B36">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2023</year>). &#x201c;<article-title>Research on application scenarios of artificial intelligence in new power system</article-title>,&#x201d; in <conf-name>2023 the 16th International Conference on Computer and Electrical Engineering (ICCEE)</conf-name>, <conf-loc>Xi&#x0027;an, China</conf-loc>, <conf-date>June 23&#x2013;25, 2023</conf-date>, <fpage>012032</fpage>. <pub-id pub-id-type="doi">10.1088/1742-6596/2589/1/012032</pub-id>
</citation>
</ref>
<ref id="B37">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhu</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Luo</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Time series data-driven batch assessment of power system short-term voltage security</article-title>. <source>IEEE Trans. industrial Inf.</source> <volume>16</volume> (<issue>12</issue>), <fpage>7306</fpage>&#x2013;<lpage>7317</lpage>. <pub-id pub-id-type="doi">10.1109/TII.2020.2977456</pub-id>
</citation>
</ref>
<ref id="B38">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhu</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Time series shapelet classification based online short-term voltage stability assessment</article-title>. <source>IEEE Trans Power Syst.</source> <volume>32</volume> (<issue>2</issue>), <fpage>1430</fpage>&#x2013;<lpage>1439</lpage>. <pub-id pub-id-type="doi">10.1109/TPWRS.2015.2413895</pub-id>
</citation>
</ref>
</ref-list>
</back>
</article>