Professional Documents
Culture Documents
Abstract—Today’s more reliable communication technology, what others cannot continue operating reliably, and should be
together with the availability of higher computational power, terminated. In small systems with few interdependent elements
have paved the way for introduction of more advanced this task is rather trivial. However, an increase in the number
automation systems based on distributed intelligence and multi- of system elements or the dimensionality of interdependencies
agent technology. However, abundance of data, while making
these systems more powerful, can at the same time act as their
among them can exponentially complicate matters. It should
biggest vulnerability. In a web of interconnected devices and come as no surprise that this is the situation facing most
components functioning within an automation framework, automation systems today. Identifying how each failure may
potential impact of malfunction in a single device, either through affect each application is a task on the shoulders of the system
internal failure or external damage/intrusion, may lead to operator. Although experienced operators and/or automated
detrimental side-effects spread across the whole underlying failsafe mechanisms exist that can handle individual
system. The potentially large number of devices, along with their
inherent interrelations and interdependencies, may hinder the
applications, a uniform solution that can collectively analyze
ability of human operators to interpret events, identify their scope the aftermath and range of impact of an event does not exist.
of impact and take remedial actions if necessary. Through This calls for a system-wide situational awareness that
utilization of the concepts of graph-theoretic fuzzy cognitive maps provides knowledge of range and severity of the impact of any
(FCM) and expert systems, this paper puts forth a solution that is event on the performance of the system.
able to reveal weak links and vulnerabilities of an automation In this paper, an intelligent scheme is proposed based on
system, should it become exposed to partial internal failure or
external damage. A case study has been performed on the IEEE graph-theoretic fuzzy cognitive maps (FCM) that, in the event
34-bus test distribution system to show the efficiency of the of internal or external failures and degradations in one or more
proposed scheme. elements in the system, is able to identify the weak links and
indicate what applications have been affected by the event
Index Terms—Automation system; event analysis; fuzzy most. The proposed scheme has been designed based on a
cognitive map; monitoring; situational awareness. combination of heuristic rules governing the FCM graph itself
as well as unsupervised learning algorithms. Relying too much
I. INTRODUCTION on expert knowledge for forming the graph makes the FCM
power system has tied in closely with the concept of state sensors, the focal point of some researchers shifted towards
estimation (SE). Using the measurements available from developing methodologies for sensor data fusion, sensor data
across the power system, SE algorithm tries to find the set of interpretation and knowledge extraction, and linking them to
system states (voltages at various nodes) that statistically fits operator situational awareness [50]-[55].
this set of measurements best [10], [11]. In order to complete Although many of the solutions proposed in the literature
the picture of the system operating condition, extensive succeed in providing situational awareness and vigilance for
research was conducted on estimating the topology of the the system operator, some aspects are missing and require
network through identification of topology errors [12]-[14] more research: (a) many of these techniques assist the operator
and modeling zero-impedance branches and circuit breakers in narrowing down and interpreting events, but are unable to
[15], [16]. This led to the introduction of the concept of provide information on the breadth (range of impact) and
generalized state estimation in 1998 [17] that presented a depth (how severely other system components are affected) of
unified solution for state estimation using both network analog the event, (b) event detection and identification is the first step
measurements and system topology data. While the problem of in awareness, but post-event mitigation requires a measure of
state estimation has traditionally been formulated as a “trustworthiness” of the rest of the system, (c) many of the
centralized problem, recently, research has been conducted on methodologies proposed in the literature are application-
developing distributed state estimation solutions suitable for specific, while solutions are needed that are general and
multi-area power systems, for instance in [18]-[21]. scalable, and (d) most approaches for sensor data integration
In conjunction with SE techniques, situational awareness and fusion treat the data points at the same level of
solutions have also been developed making use of alarms and importance, whereas in power systems different data from
signals. As technology advanced, more devices became different devices may have dissimilar importance for the
equipped with alarms that could indicate their statuses. overall performance of the system or underlying application.
However, even the simplest failures could lead to tens to
hundreds of alarms brought to the attention of the system III. FUZZY COGNITIVE MAPS FOR CAUSAL RELATION
operator [22], which echoed the need to convert this raw data ASSESSMENT
to easily-interpretable information for the human operator. The
early approaches for this purpose were in the form of A. Basic Idea
organizing and prioritizing alarm messages [23]. Some authors Political scientist Robert Axelrod introduced cognitive maps
suggested techniques for filtering mechanisms, priority and in the 1970s for representing social scientific knowledge [56].
grouping schemes as well as message routing procedures [24], These were signed directional graphs (digraphs) where a
which was later improved by using Boolean algorithmic and positive link from vertex j to vertex i would indicate that j
rule-based expert system techniques [25], [26]. However, these causally increases i, whereas a negative link would mean that
modified approaches were still difficult to implement for large should j happen, the chances of i happening are reduced (Fig.
systems, and lacked adaptability and flexibility. The trend 1). In this context, the indirect effect of j on i over a path Pk is
therefore took a turn towards more powerful intelligent negative if the number of negative signs (of the edges of Pk) is
techniques such as neural networks [25], [27], fuzzy systems odd, and positive otherwise. The total effect of j on i would
[28]-[31], neuro-fuzzy systems [32], genetic algorithm [33] then be negative if all the indirect effects are negative, positive
and Tabu search [34] among others. if all indirect effects are positive, and indeterminate otherwise
In parallel to these efforts, many researchers have focused [57]. It is safe to assume that in most real-world applications
on developing awareness solutions by improving system beyond a trivial level of complexity, the indeterminate case
observability; for example, by adopting additional wide-area happens more frequently. To solve this problem, Kosko [57]
measurements available from Phasor Measurement Units introduced fuzzy cognitive maps which allowed for more
(PMU) [35], [36], which can then be used for disturbance efficient usage of expert knowledge and logical reasoning in
event detection and analysis [37]-[40]. Also, in an attempt to defining the causalities between different use cases. He
assist the system operators with taking preventive and/or defined the impact of vertices on one another based on the
corrective control actions in response to power system concepts of general fuzzy minimum and maximum operators
contingencies, some researchers have proposed power grid (or the t-norm and t-conorm operators [58]). Later versions of
dynamic security assessment tools through utilization of data FCM used algebraic equations to determine the value of each
mining techniques [41], pattern discovery methods [42] or vertex based on the influence of the interconnected vertices
decision trees [43]. In a different approach, intelligent [59]. This way, the state (value) xi of vertex ei at any point in
waveform analysis techniques have been developed to predict time is defined as (Fig. 1):
n
and diagnose faults at the distribution system [44]. Also,
decision support systems and data visualization tools have
u i (t ) = ∑ w x (t ) ⇒ x (t + 1) = f (u (t )) ,
j =1, ≠i
ij j i i (1)
been proposed to assist system operators with emergency where ui represents the excitation level of vertex i, and f is the
situations [45]-[49]. threshold function defined, common choices being sigmoid or
With the advent and large-scale deployment of advanced hyperbolic tangent.
3
(medium) will be compromised be the data integrity, confidence level, or data quality of the
Noncritical If A fails B can continue operation safely and reliably element. The state can be quantified by transforming a
(low) using the data/services from other vertices
linguistic term set to numeric values. The weights can then be
modified as:
Although not adopted in this paper, it is possible to
∆wij = η ⋅ xi ⋅ ( x j − wij xi ) , (11)
automatically assign criticality levels to different vertices
based on their functionalities within the automated system. For where η is a learning rate parameter heuristically chosen to be
instance, within the context of utility automation systems, one 0.05 in this paper. Equation (11) indicates that the
can group vertices as highly critical action nodes (providing interrelations between elements that vary in the same direction
actuation services, e.g., relays, switch controllers), critical will be reinforced, whereas that of elements moving in
measurement nodes (providing metering services to be used by opposite direction will be weakened. The training data for this
action nodes, e.g., current/voltage meters used by a relay or part can be obtained from expert knowledge, and need not be
breaker), and non-critical measurement nodes (providing detailed. Rather, it can be derived from the basic operational
metering services to be used by non-action nodes), etc. This interdependencies of the system, as the algorithm only works
would avoid the manual derivation of weights as indicated in based on causation, and not its degree. In most connectionist
Table I. learning systems, selecting the right value for the learning rate
parameter is not straightforward and hence often times the
B. Weight Adjustment based on Centrality of Vertices parameter is chosen based on trial and error. Here, the learning
Centrality of a vertex indicates how connected it is to the rate parameter is selected in such a way that the changes in the
rest of the graph. This could be used as a measure of weight values are limited to ±25% of their original values. The
importance, since it shows the number of elements that are overall objective is to avoid drastic changes (and hence
related to this vertex. Centrality C of a vertex is defined based possible instability) in the weight values as a result of a sudden
on the notions of its in-degree and out-degree. For a vertex ei large input.
[65]: For more details, the reader is referred to section V.C.
n n
od (ei ) = ∑ | w ji |, id (ei ) = ∑ | wij | (5)
These weight values will be calculated for all edges, to be then
j =1 j =1 normalized:
C(ei ) = od (ei ) + id (ei ) (6) ∀i, j ∈ {1, K , n} : wij ∈ [ wmin , wmax ]
However, in this paper in order to decouple the human µ ( wmin ) = 0 wij − wmin (12)
⇒ ⇒ wˆ ij =
expert based weight derivation in the previous step (which can µ ( wmax ) = 1 wmax − wmin
be subjective) from weight modification in the current step, the
notion of abstract centrality is defined and used instead. Here, V. CASE STUDY
the importance (centrality) of vertices will be derived based on
abstract in-degree and out-degree as proposed in (7): A. System Description
aod(ei ) = ∑ h( wsi ), aid(ei ) = ∑ h( wis ) The system studied in this paper is a modified version of the
s , s ≠i s , s ≠i
IEEE 34-bus test distribution system [69]. Without the loss of
0 u = 0 (7)
where h(u ) = generality, the system has been expanded by adding fixed and
1 u ≠ 0 switched capacitors, reclosing switches, Distributed
∗
C (ei ) = aod(ei ) + aid(ei ) (8) Generation (DG) units, On-Load Tap Changer (OLTC) with
Line Drop Compensation (LDC), and various metering IEDs
The previously derived weights will therefore be adjusted
across the feeder and the laterals (Fig. 2). Also, without the
based on the abstract centrality C*(ei) of each vertex ei, in such
loss of generality, it is assumed that the system under study is
a way that outgoing edges from vertices with high centralities
equipped with an advanced distribution automation (DA)
will be further strengthened:
system that consists of different functions for Conservation
w*ji = w ji (1 + β ⋅ Ĉ(ei )) (9) Voltage Reduction (CVR), Voltage and Var Control (VVC),
where β is a learning rate parameter (heuristically chosen to be Electric Service Restoration (RES), and DG Dispatch (Fig. 3).
0.50) and Ĉ represents the normalized abstract centrality based As explained before, these functions share data points from
on the min and max values of all abstract centralities: different devices, making them interrelated (albeit to different
∀i ∈ {1, K , n} : C∗ (ei ) ∈ [C min , Cmax ] degrees):
µ (Cmin ) = 0 C∗ (ei ) − Cmin (10) • CVR: This function receives voltages from end-of-lateral
⇒ ⇒ Ĉ(ei ) = meters (V6 and V7 in this example) and based on the
µ (C max ) = 1 Cmax − C min
current through the OLTC I1 and the substation voltage V1
C. Weight Adjustment based on Unsupervised Learning regulates the LDC settings so that no voltage across the
system drops below ANSI low. The function also receives
A simplified Hebbian learning approach will then be used to
the relevant data from VVC.
update the previously adjusted weights. For this purpose, the
state of each element must be defined, which for example can • VVC: This function controls the settings of the tap
5
TABLE II
IMPACT OF CASE STUDIES ON MAJOR DMS APPLICATIONS
DG
Case Study VVC RES Model CVR
Dispatch
V1 not verified 0.29 0.09 0.07 0.11 0.16
R1 questionable 0.48 0.59 1.00 1.00 0.20
T2 low confidence 0.47 0.17 0.14 0.19 0.20
SW1 failed 0.76 0.14 0.05 0.11 0.19
of impact of the failure. It can be seen that the proposed FCM- software indicating the confidence levels of the modules. This
based solution assists the human operator in detecting what combined information can then be utilized by the proposed
functions/components have been affected by the failure and to situational awareness system in order to provide system
what extent. For example, this case study indicates that as a integrity information to the operator. This can be updated on a
result of failure in SW1, operation of VVC cannot be trusted, continuous basis, or as new status information arrives. Figure 6
which in turn causes the information provided at the HMI to conceptually illustrates one possible realization of the
have low confidence or to be questionable. proposed system at a utility control center.
Fig. 5. Final FCM developed for system in Fig. 2. Color-coded vertices are Fig. 6. Conceptual implementation of the proposed system at the utility
associated with case study 2. control center.
B. Performance Overhead
VI. PRACTICAL CONSIDERATIONS
Once the FCM is developed, the computational overhead of
A. Scope and Implementation the proposed system on the DMS platform is minimal. In fact,
one of the advantages of the FCM-based solutions lies in their
The proposed algorithm can be utilized for both system-
inherent computational simplicity (governed by equation (2)),
wide analysis, or a partial (local) study. The only practical
that leads to almost instantaneous response time. The need for
limitation to the scope of the application would be posed by
more elaborate computational effort arises only when a
how broad of an FCM model has been developed for the
structural change occurs in the underlying distribution system
underlying system. Moreover, the proposed scheme can be
(e.g., addition or removal of a device, component or
adopted for analyzing different types of failures (external or
subsystem). Here, steps A–C in section IV need to be repeated
internal). For example, upon availability of the relevant status
in order to modify/update the FCM structure (see section
data, the system can be used to monitor health-related, data-
VI.F). With today’s technological advances in computational
integrity related or cyber-intrusion related failures.
power, no challenges are foreseen as far as CPU or memory
In practice, the proposed system would receive data points
overload are concerned. Moreover, in most cases, addition or
on the health and data quality of the devices out in the field.
removal of a module will only partially affect the FCM and
This can be easily achieved through information models
does not alter the whole configuration. Even then, such
provided in utility automation protocols such as IEC 61850
changes are often infrequent.
and DNP3. Ideally, it could also receive reliability related
Although the proposed solution would depend on the
information/indices associated with various DMS application
8
existence of a communication infrastructure to transmit status relation– the set of vertices were partitioned into blocks, each
and other data from the field devices back to the control room, block containing a section of the original FCM (referred to as
it would not need any mechanism in addition to the sectional FCM). This way, the authors decomposed the
information already polled from the field devices for original FCM (which could be a very large system) into one
monitoring purposes. In fact, most communication protocols quotient FCM and multiple sectional FCMs. Quotient FCM
used in modern automation systems allow for health and will provide global information about the original FCM, but
quality data to be transmitted to the utility on a regular basis or will not contain local information about interactions between
in a report-by-exception (RBE) fashion, for example the IEC all the vertices. That information will be included in the
61850 standard [70]. sectional FCMs. The same concepts proposed here for
developing the FCM can be applied first to the upper layer
C. Use of Expert Knowledge for Initialization
model, and then to the individual lower layer ones.
Initialization of the FCM (deriving the structure and initial
weights) requires access to expert knowledge. This should not F. Adaptability
be viewed as weakening the automated nature of the solution Two scenarios may occur in the system that could call for
because (a) expert knowledge is used in terms of local (1-step adaptation of the FCM: need for change in the FCM structure,
ahead) relationships and impacts between components, which or need for change in the weights of the edges.
is for the most part reliable and non-subjective, and (b) in the 1) Structural Changes to the FCM
lack of comprehensive training data, this would provide a Upon topological changes to the power system (added or
reliable initial structure to be modified at later stages. removed components or control/monitoring devices) it might
Therefore, use of expert knowledge would be limited to be necessary to revisit the structure of the FCM. Removal of
deriving local relationships only, whereas global relationships devices/components could be modeled in an automated way,
and fine-tuning of the weights would be achieved using rules by removing the corresponding entries of vector X and the
of connectionist learning systems. This would lessen the associated rows/columns of matrix W. Addition of new
weight of limited-scope and perhaps subjective expert components (vertices) or relationships (edges) could be
knowledge in favor of mathematically proven learning addressed by manually modifying the FCM structure, and then
approaches. undergoing the training stage in section IV. A new component
Ideally, if a wealth of training data was available covering would introduce a new row and column to W, whereas a new
all possible aspects of interrelations between multiple relationship would change a previously zero entry in W to a
components in an interconnected system, then moving to a non-zero one.
fully-automated solution (independent of expert knowledge) 2) Changes to the FCM Weights
could have been a possibility. But this is not a realistic Upon availability of additional training data from the past
assumption, since in real-life systems it might take many years historical events in the automation system, the unsupervised
before one can collect a reasonable amount of historical data learning stage (section IV.C) can be automatically repeated to
for training purposes. Even then, this data is likely to be far adjust the weights of the edges accordingly.
from comprehensive and inclusive.
VII. CONCLUDING REMARKS
D. Validation
A typical automation system can consist of multitude of
Validation of the FCM output can be done using the
interrelated and interdependent components and modules.
historical data. Like many techniques for training connectionist
Providing situational awareness and assessing the integrity of
learning systems, the available historical training data can be
such a system is not a trivial task. What makes this even more
divided into independent training and testing batches to
challenging is the increasing trend towards incorporating more
evaluate the performance of the developed network.
intelligent sensors and actuators in modern automation
E. Scalability systems. With the goal of platform-independence and
The scalability introduced by the proposed method lies in scalability, a solution was proposed in this paper for situational
the fact that (a) it takes a locally developed solution based on awareness of interconnected automation systems based on the
expert knowledge and turns it into a global system-wide graph-theoretic concept of fuzzy cognitive maps. A
solution, and (b) it allows for incorporating mathematical combination of unsupervised learning and heuristics was
relationships for training the network where expert knowledge proposed to make the solution as little subjective and expert-
may be unavailable or lacking. dependent as possible. A case study was presented based on a
In theory, there is no practical limit for the size of the modified version of the IEEE 34-bus test distribution system
system to be modeled. However, in extreme cases and for a that indicated the efficiency of the proposed method.
better white-box approach, it is possible to develop a
hierarchical FCM where each vertex could in principle REFERENCES
represent another FCM at the lower level. An example was [1] R.W. Pew, “The State of Situation Awareness Measurement: Circa
proposed by Zhang et al. [71] where –based on equivalence 1995,” in Proc. Intl. Conf. on Experimental Analysis and Measurement
of Situation Awareness, Daytona Beach, FL, USA, Nov. 1995, pp. 7-16.
9
[2] M. Ulieru, P. Relf and M. Matson, “ARM – Adaptive Risk Management [26] C.A. Protopepes, K.P. Psaltiras and A.V. Machias, “An Expert System
Platform for Emergency Response Operations,” in Proc. Annual Conf. for Substation Fault Diagnosis and Alarm Processing”, IEEE Trans.
on Industrial Electronics, Paris, France, Nov. 2006, pp. 3709-3714. Power Delivery, vol. 6, no. 2, pp. 648-655, Apr. 1991.
[3] K. Adams, A. Wassell, M.G. Ceruti, E. Castro, S.F. Lehan and J.W. [27] R. Khosla and T. Dillon, “Learning Knowledge and Strategy of a Neuro-
Mitchell, “Emergency- Management Situational Awareness Prototype Expert System Architecture in Alarm Processing”, IEEE Transactions
(EMSAP),” in Proc. IEEE Intl. Multi-Disciplinary Conf. on Cognitive on Power Systems, vol.12, no. 4, pp. 1610-1618, Nov. 1997.
Methods in Situation Awareness and Decision Support, Miami Beach, [28] S.S. Choi, K.S. Kang, H.G. Kim and S.H. Chang, “Development of an
FL, USA, Feb. 2011, pp. 110-114. On-Line Fuzzy Expert System for Integrated Alarm Processing in
[4] F. Maymí, M. Rodríguez-Martínez, Y. Qian and P.C. Manz, “Ancile: Nuclear Power Plants”, IEEE Trans. Nuclear Science, vol. 42, no. 4, pp.
Pervasively Shared Situational Awareness,” IEEE Internet Computing, 1406-1418, Aug. 1995.
pp. 48-50, Jan./Feb. 2008. [29] C.L. Nelson and D.S. Fitzgerald, “Sensor Fusion for Intelligent Alarm
[5] R. Dearden, T. Willeke, F. Hutter, R. Simmons, V. Verma and S. Thrun, Analysis”, IEEE AES Systems Magazine, pp 18-23, Sept. 1997.
“Real-Time Fault Detection and Situational Awareness for Rovers: [30] E.M. Meza, J.S.S. de Souza, M.T. Schilling and M.B.D.C. Filho,
Report on the Mars Technology Program Task,” in Proc. IEEE “Exploring Fuzzy Relations for Alarm Processing and Fault Location in
Aerospace Conference, Mar. 2004, pp. 826-840. Electrical Power Systems”, in Proc. IEEE Power Tech Conference,
[6] T.M. Carrico and B. Chin, “Agent-Based Situational Reasoning for In- Porto, Portugal, Sept. 2001.
theater Distribution,” in Proc. IEEE Military Communications [31] H.J. Cho and J.K. Park, “An Expert System for Fault Section Diagnosis
Conference, Washington, DC, USA, Oct. 2006. of Power Systems Using Fuzzy Relations”, IEEE Transactions on
[7] F. Hinchion, P. Mulgaonkar, D. Wilkins and S. Galuga, “Peer to Peer Power Systems, vol. 12, no. 1, pp. 342-348, Feb. 1997.
Information Management for Tactical Situation Awareness Systems,” in [32] E.M. Meza, J.S.S. de Souza, M.T. Schilling and M.B.D.C. Filho,
Proc. IEEE Military Communications Conf., Oct. 2003, pp. 179-185. “Alarm Processing in Electrical Power Systems Through a Neuro-Fuzzy
[8] B.P. Hallbert, “Situation Awareness and Operator Performance: Results Approach”, IEEE Trans. Power Delivery, vol. 19, no. 2, pp 537-544,
from Simulater-Based Studies,” in Proc. IEEE Annual Human Factors Apr. 2004.
Meeting, Orlando, FL, USA, Jun. 1997. [33] F. Wen, C.S. Chang and D. Srinivasan, “Alarm Processing in Power
[9] M.R. Endsley and E.S. Connors, “Situation Awareness: State of the Systems Using a Genetic Algorithm”, in Proc. Intl. Conf. on
Art,” in Proc. IEEE PES GM, Pittsburgh, PA, USA, Jul. 2008. Evolutionary Computation, Perth, WA, Nov./Dec. 1996.
[10] A. Monticelli, “Electric Power System State Estimation,” Proceedings [34] F.S. Wen and C.S. Chang, “Tabu Search Approach to Alarm Processing
of the IEEE, vol. 88, no. 2, pp. 262-282, Feb. 2000. in Power Systems”, IEE Proceeding – Generation, Transmission and
[11] A. Abur and A.G. Exposito, Power System State Estimation – Theory Distribution, vol. 144, no. 1, pp. 31-38, Jan. 1997.
and Implementation, New York, NY: Marcel Dekker, Inc., 2004. [35] R.B. Bobba, J. Dagle, E. Heine, H. Khurana, W.H. Sanders, P. Sauer
[12] F.F. Wu and W.H.E. Liu, “Detection of Topology Errors by State and T. Yardley, “Enhancing Grid Measurements,” IEEE Power &
Estimation,” IEEE Trans. Power Systems, vol. 4, no 1, pp. 176-183, Energy Magazine, pp. 67-73, Jan./Feb. 2012.
Feb. 1989. [36] S.E. Widergren, Z. Huang and J.E. Dagle, “Electric System-Wide
[13] I.S. Costa and J.A. Leao, “Identification of Topology Errors in Power Measurements: North American Directions,” in Proc. 40th Hawaii Intl.
System State Estimation,” IEEE Trans. Power Systems, vol. 8, no 4, pp. Conf. on System Sciences, Waikoloa, HI, USA, Jan. 2007.
1531-1538, Nov. 1993. [37] G. Zhang, K. Sun, H. Chen, R. Carroll and Y. Liu, “Application of
[14] H. Singh and F.L. Alvarado, “Network Topology Determination Using Synchrophasor Measurements for Improving Operator Situational
Least Absolute Value State Estimation,” IEEE Trans. Power Systems, Awareness,” in Proc. IEEE PES GM, Detroit, MI, USA, Jul. 2011.
vol. 10, no 3, pp. 1159-1165, Aug. 1995. [38] Y. Ye, J. Dong and Y. Liu, “Analysis of Power System Disturbances
[15] A. Monticelli and A. Garcia, “Modeling Zero Impedance Branches in Based on Distribution-Level Phasor Measurements,” in Proc. IEEE PES
Power System State Estimation,” IEEE Trans. Power Systems, vol. 6, no GM, Detroit, MI, USA, Jul. 2011.
4, pp. 1561-1570, Nov. 1991. [39] J. Dong, T. Xia, Y. Zhang, T. Weekes, J.S. Thorp and Y. Liu,
[16] A. Monticelli, “Modeling Circuit Breakers in Weighted Least Squares “Monitoring Power System Disturbances at the Distribution Level,” in
State Estimation,” IEEE Trans. Power Systems, vol. 8, no 3, pp. 1143- Proc. IEEE PES GM, Pittsburgh, PA, USA, Jul. 2008.
1149, Aug. 1993. [40] H. Qi, Y. Liu, F. Li, J. Luo, L. He, K. Tomsovic, L. Tolbert and Q. Cao,
[17] O. Alsac, N. Vempati, B. Stott and A. Monticelli, “Generalized State “Increasing the Resolution of Wide-Area Situational Awareness of the
Estimation,” IEEE Trans. Power Systems, vol. 13, no 3, pp. 1069-1075, Power Grid through Event Unmixing,” in Proc. 44th Hawaii Intl. Conf.
Aug. 1998. on System Sciences, Kauai, HI, USA, Jan. 2011.
[18] Z. Liang and A. Abur, “Multi Area State Estimation Using [41] M. He, J. Zhang and V. Vittal, “A Data Mining Framework for Online
Synchronized Phasor Measurements,” IEEE Trans. Power Systems, vol. Dynamics Security Assessment: Decision Trees, Boosting and
20, no 2, pp. 611-617, May 2005. Complexity Analysis,” in Proc. IEEE Innovative Smart Grid
[19] M.M. Nordman and M. Lehtonen, “Distributed Agent-Based State Technologies, Washington, DC, USA, Jan. 2012.
Estimation for Electrical Distribution Networks,” IEEE Trans. Power [42] Y. Xu, Z.Y. Dong, L. Guan, R. Zhang, K.P. Wong and F. Luo,
Systems, vol. 20, no 2, pp. 652-658, May 2005. “Preventive Dynamic Security Control of Power Systems Based on
[20] Y. Li, X. Zhou and J. Zhou, “A New Algorithm for Distributed Power Pattern Discovery Technique,” IEEE Trans. Power Systems, to Appear.
System State Estimation based on PMUs,” in Proc. Intl. Conf. on Power [43] R. Diao, V. Vittal and N. Logic, “Design of a Real-Time Security
System Technology (PowerCon), Oct. 2006. Assessment Tool for Situational Awareness Enhancement in Modern
[21] A.P. Sakis Meliopoulos, G.J. Cokkinides, F. Galvan, B. Fardanesh and Power Systems,” IEEE Trans. Power Systems, vol. 25, no. 2, pp. 957-
P. Myrda, “Delivering Accurate and Timely Data to All,” IEEE Power 965, May 2010.
and Energy Magazine, vol. 5, no. 3, pp. 74-86, May/Jun. 2007. [44] B.D. Russell and C.L. Benner, “Intelligent Systems for Improved
[22] D. Droucher, “Langage: An Expert System for Alarm Processing”, Reliability and Failure Diagnosis in Distribution Systems,” IEEE Trans.
presented at the 11th Biennial IEEE Workshop on Power Systems Smart Grid, vol. 1, no. 1, pp. 48-56, Jun. 2010.
Control Centers, Montréal, BC, Canada, Sept. 1990. [45] V.K. Pendurthi, N.N. Schulz, S. Doane and A.K. Srivastava, “Cognitive
[23] D.S. Kirschen and B. Woolenberg, “Intelligent Alarm Processing in Engineering Studies of DSS Dealing with Uncertainty in Load for Real-
Power Systems”, Proc. IEEE, vol. 80, no. 5, pp. 663-672, May 1992. Time Adaptive Power System Reconfiguration,” in Proc. IEEE Electric
[24] H. Amelink, A.M. Forte and R.P. Guberman, “Dispatcher Alarm and Ship Technologies Symp., Baltimore, MD, USA, Apr. 2009, pp. 79-85.
Message Processing”, IEEE Trans. Power Systems, vol. PWRS-1, pp. [46] G. Gelston, A. Dalton and L. Tate, “Multi-Organizational Distributed
188-194, Aug. 1986. Decision Making in the Power Grid Industry,” in Proc. IEEE Conf. on
[25] E.H.P. Chan, “Application of Neural Network Computing in Intelligent Cognitive Methods in Situation Awareness and Decision Support, New
Alarm Processing”, in Proc. Power Industry Computer Application Orleans, LA, USA, Mar. 2012, pp. 158-161.
Conference, San Jose, CA, USA, May 1989, pp. 246-251.
10
[47] T.J. Overbye, “Visualization Enhancements for Power System [71] J.Y. Zhang, Z.Q. Liu and S. Zhou, “Quotient FCMs – A Decomposition
Situational Assessment,” in Proc. IEEE PES GM, Pittsburgh, PA, USA, Theory for Fuzzy Cognitive Maps,” IEEE Transactions on Fuzzy
Jul. 2008. Systems, vol. 11, no. 5, pp. 593–604, Oct. 2003.
[48] J. Wang, Y. Hu, A. Johnson, H. Tram and R. Nasri, “System
Requirements of Visualization Platform for Wide Area Situation Salman Mohagheghi (S’99, M’07) received the B.Eng. from University of
Awareness System,” in Proc. IEEE PES GM, Minneapolis, MN, USA, Tehran, Iran, M.Sc. from Sharif University of Technology, Tehran, Iran and
Jul. 2010. PhD from Georgia Institute of Technology, Atlanta, GA, USA all in Electrical
[49] C. Zheng, Y. Dong. O. Gonen and M. Kezunovic, “Data Integration Engineering. Currently, he is an Assistant Professor at the Electrical
Used in New Applications and Control Center Visualization Tools,” in Engineering and Computer Science Department at Colorado School of Mines,
Proc. IEEE PES GM, Minneapolis, MN, USA, Jul. 2010. Golden, CO, USA. Prior to that, he was a Senior R&D Engineer at ABB
[50] R. Laughery, L. Laux, J.M. O’Hara, W.S. Brown, J.C. Higgins, J.J. Corporate Research Center, Raleigh, NC, USA. His research focuses on
Persensky, P.M. Lewis and J. Bongarra, “Decision-Centered Design as situational awareness, distributed energy resources, communication networks
the Basis of Defining the Human Role in Systems,” in Proc. IEEE in power systems, and distribution automation systems.
Human Factors Meeting, Scottsdale, AZ, USA, Dec. 2002.
[51] B.J. Rhodes, “Biologically-Inspired Approaches to Higher-Level
Information Fusion,” in Proc. Intl. Conf. on Information Fusion,
Quebec, Canada, Jul. 2007.
[52] Y. Liang, H.Q. Wang, H.B. Cai and Y.J. He, “A Novel Stochastic
Modeling Method for Network Security Situational Awareness,” in
Proc. IEEE Conf. on Industrial Electronics and Applications,
Singapore, Jun. 2008, pp. 2422-2426.
[53] Y. Sun, G. Chen, D. Li and F. Li, “A Data Fusion Multi-Agent System
or Sensor Network Based on Data Fields,” in Proc. Conf. on
Computational Engineering in System App., Beijing, China, Oct. 2006,
pp. 2132-2136.
[54] S. Natkunanathan, J. Pham, W.J. Kaiser and G. Pottie, “Embedded
Networked Sensors: Signal Search Engine for Signal Classification,” in
Proc. IEEE Conf. on Sensor and Ad Hoc Communications and
Networks, Oct. 2004, pp. 139-144.
[55] D. Shen, G. Chen, L. Haynes and E. Blasch, “Strategies Comparison for
Game Theoretic Cyber Situational Awareness and Impact Assessment,”
in Proc. Intl. Conf. on Information Fusion, Quebec, Canada, Jul. 2007.
[56] R. Axelrod, Structure of Decision: the Cognitive Maps of Political
Elites, Princeton, NJ: Princeton University Press, 1976.
[57] B. Kosko, “Fuzzy Cognitive Maps,” International Journal Man-
Machine Studies, vol. 4, pp. 65-75, 1986.
[58] C.C. Lee, “Fuzzy Logic in Control Systems: Fuzzy Logic Controller,
Part II”, IEEE Transactions on Systems, Man and Cybernetics, vol. 20,
no. 2, pp 419-435, March/April 1990.
[59] C.D. Stylios and P.P. Groumpos, “Modeling Complex Systems using
Fuzzy Cognitive Maps,” IEEE Trans. on Systems, Man and Cybernetics
– Part A: Systems and Humans, vol. 34, no. 1, pp. 155-162, Jan. 2004.
[60] S. Mohagheghi, “A Fuzzy Cognitive Map for Data Integrity Assessment
in a IEC 61850 Based Substation,” in Proc. IEEE PES GM,
Minneapolis, MN, USA, Jul. 2010.
[61] S. Mohagheghi, “A Fuzzy Cognitive Map for Health Assessment of IEC
61850 Based Devices and Functions,” in Proc. Georgia Tech Fault and
Disturbance Analysis Conference, Atlanta, GA, USA, May 2010.
[62] U. Ozesmi and S.L. Ozesmi, “Ecological Model Based on People’s
Knowledge: A Multi-Step Cognitive Mapping Approach,” Ecological
Modeling, vol. 176, no. 1, pp. 43-64, Aug. 2004.
[63] M. Schneider, E. Shnaider, A. Kandel and G. Chew, “Automatic
Construction of FCMs,” Fuzzy Sets and Systems, vol. 93, pp. 161–172,
Jan. 1998.
[64] B. Lazzerini and L. Mkrtchyan, “Analyzing Risk Impact Factors Using
Extended Fuzzy Cognitive Maps,” IEEE Systems Journal, vol. 5, no. 2,
pp. 288–297, Jun. 2011.
[65] D.B. West, Introduction to Graph Theory, Prentice Hall, 2001.
[66] Y. Miao and Z.Q. Liu, “On Causal Inference in Fuzzy Cognitive Maps,”
IEEE Trans. Fuzzy Systems, vol. 8. no. 1, pp. 107–119, Jan. 2000.
[67] E.I. Papageorgiou, “Learning Algorithms for Fuzzy Cognitive Maps – A
Review Study,” IEEE Transactions on Systems, Man and Cybernetics:
Part C, vol. 42, no. 2, pp. 150–163, Mar. 2012.
[68] E. Oja, “Neural Networks, Principal Components and Subspaces,”
International Journal of Neural Systems, vol. 1, no. 1, pp. 61–68, 1989.
[69] IEEE Distribution Planning Working Group, “Radial Distribution Test
Feeders,” IEEE Trans. Power System, vol. 6, no. 3, pp. 975–985, Aug.
1991.
[70] Communication Networks and Systems in Substations, IEC Standard
61850 (parts 1-10), 2003.