Bassam A. Hemade

Work place: Power and Electrical Machines Dept., Faculty of Industrial Education, Suez University, Suez, Egypt

E-mail: bassam.salama@suezuniv.edu.eg

Website:

Research Interests: Engineering

Biography

Bassam A. Hemade was born in Ismailia, Egypt in 1986. He received the B.Sc. and M.Sc. degrees from Suez Canal University, in 2007 and 2014, respectively. He was employed in different industrial positions from 2007 to 2009 before he is joined to Suez Canal University. Bassam is the supervisor of the Suez University fabrication laboratory. He interested in computerized technical power problems, Real-time embedded systems, and data-driven problems. Bassam has written dozens of codes in MATLAB, Python, LabVIEW, and guides a lot of scientific projects. He is an expert in data collection, wrangling, transformation, and modeling. His research interests include power system operation and monitoring, Phasor Measurement Units applications, artificial intelligence, and its application in power system. His email is bassam.salama@suezuniv.edu.eg.

Author Articles
Conceptual Analysis of Different Clustering Techniques for Static Security Investigation

By Bassam A. Hemade Hamed A. Ibrahim Hossam E. A. Talaat

DOI: https://doi.org/10.5815/ijisa.2019.02.04, Pub. Date: 8 Feb. 2019

Power system contingency studies play a pivotal role in maintaining the security and integrity of modern power system operation. However, the number of possible contingencies is enormous and mostly vague. Therefore, in this paper, two well-known clustering techniques namely K-Means (KM) and Fuzzy C-Means (FCM) are used for contingency screening and ranking. The performance of both algorithms is comparatively investigated using IEEE 118-bus test system. Considering various loading conditions and multiple outages, the IEEE 118-bus contingencies have been generated using fast-decoupled power flow (FDPF). Silhouette analysis and fuzzy partition coefficient techniques have been profitably exploited to offer an insight view of the number of centroids. Moreover, the principal component analysis (PCA) has been used to extract the dominant features and ensure the consistency of passed data with artificial intelligence algorithms’ requirements. Although analysis of comparison results showed excellent compatibility between the two clustering algorithms, the FCM model was found more suitable for power system static security investigation.

[...] Read more.
Other Articles