- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Recently Accepted Articles ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents

International Journal of Distributed Sensor Networks

Volume 2012 (2012), Article ID 932683, 17 pages

http://dx.doi.org/10.1155/2012/932683

## Wireless Multiple Access and Analog Oscillation Analysis in Microgrids: A Prony Approach

Department of Electrical Engineering and Computer Science, The University of Tennessee, Knoxville, TN 37996, USA

Received 7 February 2012; Accepted 13 August 2012

Academic Editor: Mooi Choo Chuah

Copyright © 2012 Shuping Gong and Husheng Li. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

A key challenge in smart grid is to monitor the system modal characteristics of disturbance over a microgrid for system stability and diagnosis. The measurements at different phasor measurement units (PMUs) need to be reported to a processing center. Therefore, a multiple access scheme for wireless transmission is necessary to collect the measurements from PMUs. An analog oscillation analysis is carried out without demodulating the received signal. Both schemes of time-division multiple access (TDMA) and code-division multiple access (CDMA) are discussed. In both schemes, the Prony-based algorithms using the received signal to estimate the system modal characteristics, including the eigenvalues of the linear system and the amplitudes of different response modes, are proposed and analyzed. Two countermeasures, max-min ratio measure (MMRM) and variance measure (VM), are also proposed to prevent possible attacks of false reports. Numerical simulation results demonstrate the effectiveness of Prony-based algorithms and the two countermeasures.

#### 1. Introduction

In recent years, smart grid has attracted many studies in the community of power system, communications, and networking. According to the * Energy Independence and Security Act of 2007* (EISA), smart grid is defined as follows: * “A modernization of the Nation's electricity transmission and distribution system to maintain a reliable and secure electricity infrastructure that can meet future demand growth”* [1]. An important component in smart grid is the microgrid [2, 3], which is a subsystem containing multiple distributed energy generators (DEGs, such as microturbines, solar panels, or wind turbines) and multiple loads. A microgrid can work either together or independently with the power grid. In normal situations, the microgird is connected to the power grid and transfers energy either to or from the major power grid according to its own energy generation and consumption. When the power grid is unstable, for example, in a large area blackout, the microgird can be disconnected from the power grid and work in an island mode. At this time, its own DEGs will support the power load within the microgrid. Such a microgrid has been implemented in many testbeds, for example, the Electric Reliability Technology Solutions (CERTS) Microgrid supported by the US Department of Energy.

One problem impacting the reliability of power system is power system oscillations. Power system oscillations, caused by either network change or disturbance, appear as modes which are complex exponentially modulated sinusoids. Insufficiently damped modes may incur uncontrolled separation of the power system into islands, consequently resulting in blackouts. Therefore, for the reliability of a power system, it is important to estimate the power system state, detect and identify oscillation modes accurately and as early as possible. Oscillation exists not only in large power grids but also in microgrids. It may be even more severe in a microgrid than in a large power grid. However, the research of oscillations is very limited in microgrids. Therefore, it is important to study power system oscillation in microgrids for achieving a better reliability.

Currently, mode identification of power system oscillation is well studied in power grid. With the deployment of Phasor Measurement Unit (PMU), power oscillation detection and identification have been widely implemented in Wide-Area Monitor System (WAMS) [4, 5]. Typically, the system modal characteristics are estimated from the measurement of several synchronized PMUs. After taking the reports from the PMUs, a processing center will analyze the data and estimate the system modal characteristics, for example, the eigenvalues of the transfer function, as well as the amplitude of different components with different dampening ratios. If instability is detected, the system can take certain actions to stabilize the power grid.

An important aspect of microgrid is the communication infrastructure for monitoring the oscillation due to the requirement of real-time processing and high reliability. In such a communication infrastructure, the observations at PMUs are sent to a processor. One standard related to the communications of PMUs is IEEE C37.118 [6]. However the communication protocol defined in IEEE C37.118 only specifies a few message types with few options and allows the usage of any possible communication approaches for the PMUs to report to the processing center, for example, wireless communications or optical fibers. In traditional microgrids, wired communications are employed. For example, an RS-485 (digital computer based) link or an ethernet is used in the Oak Ridge National Lab (ORNL) microgrid system [7]. An alternative approach for the communication for DEG control is to use wireless communication systems due to its fast deployment. For wireless communication systems, the multiple access as shown in Figure 1 is a key challenge to the system monitoring since there exist several wireless PMUs reporting their observations. Since the data traffic is intensive, it is improper to use random access schemes like carrier sense multiple access (CSMA), which might incur too many collisions. Depending on whether collisions are allowed or not, we can consider orthogonal or nonorthogonal multiple access schemes. (i)Orthogonal: for simplicity, we consider only the time-division multiple access (TDMA) scheme. The corresponding system estimation is straightforward. The challenge is how to deal with the time offset of reports from different PMUs due to the TDMA.(ii)Nonorthogonal: we consider the code-division multiple access (CDMA), which allows collisions. One traditional approach is to first recover the original reports from the mixed received signal. However, this may not be the most efficient approach. We will study the approach of estimating the system state directly from the received signal.

In this paper, we will study both approaches. The power system will be modeled as a linear system with the assumption of small signal perturbations. The system modal characteristics will be estimated using Prony's algorithm [8, 9], which will be made compatible with the TDMA and CDMA schemes. The Cramer-Rao-bound (CRB) covariance matrix for both TDMA- and CDMA-based Prony methods will be derived. Both TDMA and CDMA approaches will be compared using numerical simulations. The conclusions will provide insights for the design of communication infrastructure in microgrids and advance the signal processing techniques in the system modal characteristics estimation of microgrids. Moreover, we consider the case in which there exists an attacker and discuss how to detect the attack when attacking happens. We propose two variance-based countermeasures to identify the attack.

The remainder of this paper is organized as follows. Related work for modal identification of power system oscillation will be provided in Section 2. The system model will be introduced in Section 3. The multiple access schemes of TDMA and CDMA will be discussed in Section 4. The CRB covariance matrices for both TDMA- and CDMA-based Prony methods are derived in Section 5. The countermeasures for possible attacks are proposed in Section 6. Then, we will show the numerical simulation results in Section 7. Finally, the conclusion will be drawn in Section 8.

#### 2. Related Work

Parametric modal identifications are widely used in power systems. One main method is based on eigenvalue analysis. However, the disadvantage of eigenvalue analysis is that it requires the knowledge of the system matrix. The difficulty of monitoring the whole state space system matrix prevents it from online tracking of power oscillation modes. In contrast, low-order linear estimations are suitable for online tracking of power oscillation modes. The advantage of these methods is that they do not require the linearization of the system and the associated large-scale system matrix. The low-order linear estimation methods include Steiglitz-McBride Algorithm (SMA) [10], Eigensystem Realization Algorithm (ERS) [11], and Prony method [12]. SMA uses an iterative procedure to adjust the coefficients of a transfer function; ERA is based on singular value decomposition of the Hankel matrix associated with the impulse response of the system; the Prony method is based on a linear prediction model, which estimates parameters to fit a finite number of samples of a signal. In [13] the performances of these three algorithms are well compared. Numerical results show that Prony method has more accurate outputs for various inputs. Therefore, in this paper we focus on the Prony method for the mode identification of power system oscillation in microgrids.

The Prony method has been widely applied in power systems for mode identifications [12, 14–20]. Currently the online Prony analysis has been deployed for operation in many places, for example, Jiangsu in China [4] and the Western Electricity Coordinate Council [5]. The first application of Prony method for power system oscillation is [12, 14] which used field measurement data. The Prony method proposed in [12, 14] is based on the least square error criterion and processes each signal independently. However, Prony method is sensitive to noise. The Prony analysis of individual signals may have conflicting frequencies and damping coefficients. References [8, 21] have extended the Prony method to analyze multiple signals simultaneously in order to improve the accuracy. In our paper, we also combine multiple signals to improve the accuracy of Prony analysis. The contribution of our paper is that the system state is directly estimated from the received signal without recovering the original information bits, which is coined analog oscillation analysis. References [22, 23] derived the CRB covariance matrix of Prony method with single and multiple signals, respectively. [24, 25] derived the covariance matrix for singular-value-decomposition- (SVD-) and total-least-square (TLS) based Prony method, respectively. In our paper, the CRB covariance matrices for TDMA- and CDMA-based Prony methods are derived.

#### 3. System Model

We model the power grid as a linear system, whose dynamics are given by [9] where is an -dimensional system state vector, is an observation vector for PMUs, is a scalar control signal, and is the noise added to the observation. Each dimension of the observation is sensed by a PMU and sent to a processing center via the communication infrastructure. Note that power system is usually highly nonlinear. However, the linear model in (1) approximately holds for the small-signal case; that is, the perturbation to the signal is small.

Consider the th output , , and the input . The corresponding transfer function is given by where is the th eigenvalue of matrix , which represents an oscillation mode, and is the amplitude of the th oscillation mode.

The observation at PMU is then given by

Suppose that each PMU samples the continuous-time observation with time step . Then, the samples at PMU are given by
where . Note that the eigenvalues and the amplitudes are unknown; the task of system modal characteristics monitoring is to * estimate the eigenvalues and amplitudes from the observations *.

We suppose that the communication system for the monitoring system has a bandwidth . The time is divided into time chips; each has a time interval approximately equaling . We suppose that each PMU can transmit one observation during one time chip. For simplicity, we ignore the quantization error. At the th time chip, the received signal at the processing center in the base band is given by where is the channel amplitude gain, which is assumed to be time-invariant, is the signal transmitted by PMU at time chip , and is noise, the variance of which is .

#### 4. Multiple Access Schemes

In this section, we discuss two types of multiple access schemes, namely, the TDMA and CDMA. We assume that the reports from different PMUs are honest. Usually, the observations at the PMUs have a very high signal-to-noise ratio (SNR). We also assume that the communication channel quality is very good and has a high SNR. Therefore, we ignore the noise in the discussion in this section. The impact of noise will be evaluated in the numerical simulations where the algorithms with the assumption of no noise will be applied in the noisy case.

##### 4.1. TDMA

In TDMA, we simply let the PMUs report their measurements in a fixed order. We can set ; that is, one sample per time chips. In the time chip scheduled for PMU , it transmits the newest measurement in this time chip. In other time chips, PMU does not transmit. Therefore, the transmit symbol at time chip , in the general form (5), is given by

Upon receiving time chips of reports, the received signal at the processing center can be written as where the observation matrix is given by and the matrix is given by where , for all , and the amplitude matrix is given by

We can consider the whole quantity of as the unknown. Once we obtain and from the observations, we can easily obtain , thus removing the effect of time offset.

To solve the equation for the unknowns and , we adopt the Prony's method [8, 9]. Here, we provide a brief introduction to the Prony's method, which will be modified for the CDMA scheme. The quantities are necessarily the roots of an -order polynomial with coefficients (unknown to the processing center), which is given by Then multiplying vectors in the form of on the left side of (7), we have Then, the Prony's method includes the following four steps. (1)The coefficient vector is estimated by solving the previous overdetermined least square problem based on the assumption that is larger than . Note that there are very well-known solutions to the least square problem [26]. Many solutions are applied to the Prony method to reduce the impact of noise [4, 24, 25]. (2)Solving the polynomial equation (11) for . Note that (11) is a th order polynomial equation after the coefficient vector is estimated in the above step. (3)Calculating eigenvalues from ; that is: (4)Solving (7) for the amplitudes . (5)Order the eigenvalues based on estimated to get the main eigenvalues. A widely used criterion to search for the optimal subset of eigenvalues that best represent the system is the Akaike information criterion (AIC) [27].

##### 4.2. CDMA

In the CDMA scheme, collisions among the PMUs are allowed. We define a symbol period as time chips during which each PMU transmits one observation. During the th symbol period, PMU transmits the -vector over the time chips. The sequences are called signature waveforms, which are known to the PMUs and the processing center in advance. Note that we fix the signature waveform for all symbol periods, which facilitates the future processing. Then, the received signal, a -vector, during the th symbol period is given by where and

Upon receiving symbol periods and putting the received signal together, the received signal is given by where and . According to (4), we have where and has the same definition as in (9) except . Combining the previously mentioned definitions and expressions, we have

One approach is to use a CDMA demodulator to compute first and then apply the Prony's method for the decomposed signal from each PMU, as illustrated in Figure 2(a).

However, by observing the similarity between (7) and (19), we can propose a new algorithm as shown in Figure 2(b) to apply the Prony's method again as follows. (1)Consider term in (19) as matrix in (7). Apply the first step in the Prony's method in Section 4.1 to obtain the coefficients .(2)Obtain by solving the polynomial equation in (11).(3)Then, we use (19) to compute the amplitude components in . To that end, we apply the equation, which holds for any matrices , , and with suitable sizes: where the operator vec means stacking the columns of a matrix to obtain a vector and is the Kronecker produce [28]. Then, we have Finally, the amplitudes in matrix are obtained by solving the above linear equations.

#### 5. Cramer-Rao-Bound Covariance Matrix for Multiple Access Scheme

In this section we derive the CRB covariance matrix for estimating and in TDMA- and CDMA-based Prony method. CRB is a fundamental lower bound to the variance of any unbiased parameter estimator. The derived CRB can not only help estimate the impact of noise on the estimation of and but also help evaluate the accuracies of TDMA- and CDMA-based Prony methods while considering the impact of noise.

##### 5.1. TDMA

In TDMA systems, the received signal from the th PMU can also be written as where

Then, the likelihood and log-likelihood of data from all PMUs are given by where

In order to calculate the CRB covariance matrix, the following parameters are defined. The real and imaginary parts of are denoted by and , respectively. The real and imaginary parts of are denoted by and , respectively:

Then the Fisher information matrix can be calculated by taking partial derivatives of (25) with respect to which is shown in (28), where

The proof of (28) can be found in Appendix A.

Then the CRB Covariance matrix is calculated by taking the inverse of the Fisher information matrix shown in (31), where The corresponding proof can be found in Appendix A.

##### 5.2. CDMA

In CDMA systems, the received signal from all PMUs for time slots , , can also be written as where

Then the likelihood and log-likelihood of data from all PMUs are given by and where

Then the Fisher information matrix can be calculated by taking partial derivatives of (36) with respect to which is shown in (38), where

The corresponding proof can be found in Appendix B.

Then the CRB covariance matrix is calculated by taking the inverse of Fisher information matrix shown in (41), where The proof is the same as that for (31).

#### 6. Countermeasure for Attacks

In the previous procedure of system modal characteristics estimation, we implicitly assume that all PMUs are honest and report their observations faithfully. However, in practice, a PMU could be compromised by a malicious party. It is also possible that the sensor at the PMU malfunctions and gives wrong readings. The false report could result in a significant error in system estimation or could even incur power system instability as a result of the system taking an incorrect control action due to the wrong state estimation. In this section, we study the countermeasure for detecting possible attacks.

##### 6.1. Attack Model

Attacks are defined as all events which generate data including false or faked mode characteristics. We notice that the amplitudes have no redundancies in the received signal since it is completely determined by the reports from PMU . Therefore, it is impossible to detect the attack on the amplitudes unless we introduce more redundancies, which is beyond the scope of this paper. Therefore, we focus on only the attack on the eigenvalues, which is more important than the amplitudes since the eigenvalues directly determine the stability of the system. Meanwhile, we assume that all the PMUs share the same set of eigenvalues, thus resulting in the redundancy and facilitating the detection of attacks. In addition, we assume that attackers work independently; that is, there is no collaborative attack. In other words, the false or faked eigenvalues generated by attacks are different from each other. For simplicity, in this paper we consider the case with one attacker.

##### 6.2. Attack Detection

The procedure of detecting the attack and attacker is shown in Figure 3. As shown in the procedure of the Prony analysis in Section 4, the normal PMU and compromised PMU share the same set of estimated eigenvalues . The difference between normal PMU and compromised PMU is the estimated amplitudes . For instance, suppose that PMU and PMU are PMUs without attack and with attack, respectively. is one of the eigenvalues of normal PMU ; however, it is not the eigenvalue of compromised PMU . Then, the corresponding estimated for attacked PMU may be small with a high probability. In other words, the estimated of normal PMU is greatly larger than that of the attacked PMU with a high probability. For paths without attack, although and of PMU and for eigenvalue are different, the difference between and may not be very large. Based on this observation, we propose two countermeasures to detect the attack, namely, max-min ratio measure (MMRM) and variance measure (VM).

###### 6.2.1. MMRM Approach

MMRM is based on the ratio of maximum and minimum absolute amplitudes of in row corresponding to eigenvalue ; that is: where is the number of eigenvalues which will be calculated in the measure and is the estimated coefficient of th mode for PMU . Note that we assume that the estimated eigenvalues are already sorted based on the AIC criteria. Figure 4 demonstrates the MMRM of normal data and attacked data for TDMA when SNR is equal to 30 dB. For both attacked data and normal data, there are three PMUs. The first two PMUs are normal, and the third PMU is attacked. The detailed expression of signals will be provided in Section 7.2. As shown in the Figure 4, MMRM for attacked data is significantly larger than that of normal data, and there is a gap between MMRM for attacked data and normal data. Therefore, MMRM can be used as a measure to detect the possible attack.

###### 6.2.2. VM Approach

VM is based on the variance of each row of : where is the th row of and is the variance of . Figure 5 illustrates the VMs of attacked data and normal data for TDMA when the SNR is equal to 30 dB. The signals are the same as those for MMRM. As shown in Figure 5 there is a gap between the VMs for normal data and attacked data. Therefore, VM can also be used as a measure to detect the attack.

##### 6.3. Attacker Detection

Once the processing center finds that an attack has been launched, the next job is to detect the attacker from the received signal. One simple approach is to separate the observations from different PMUs and then use the Prony method to analyze the observation of each PMU separately and estimate eigenvalues of each PMU. Then, it is easy to detect the attacker as the estimated eigenvalues of attacked PMU are different from those of normal PMUs. Note that this detection procedure needs to execute the Prony's method for every PMU which is very time consuming. Another possible solution is to use MMRM or VM based cluster analysis to classify the signals into different clusters. Considering the fact that in most cases the MMRM or VM among normal data is smaller than that between normal data and attacked data, the MMRM or VM based cluster analysis method puts the attacked data in the cluster that does not include normal data. Therefore, when there is only one attacked PMU, the signal in the cluster with only one element is identified as the attacked data. There are many papers (including those we have surveyed [29–31]) that discuss the cluster analysis. Due to the limited length of the paper, the detailed procedure for cluster analysis is not provided.

#### 7. Numerical Simulations

In this section, the simulation results of proposed Prony analysis for TDMA and CDMA are provided. Then, the results of proposed MMRM and VM for attack detection for TDMA are shown.

##### 7.1. Performance of Prony Analysis for TDMA and CDMA

In the simulation, we assume that there are two PMUs. The signals are given by

The sampling interval is s, the total number of samples for each PMU is , and the spreading matrix . Figures 6 and 7 demonstrate the mode distribution of TDMA and CDMA, respectively, when the SNR is equal to 20 dB. There are three modes for both PMUs: , , . For convenience, these three modes are labeled as modes 1, 2, 3, respectively. As shown in the figures, for both PMU 1 and 2, the estimated modes for TDMA and CDMA are closer to the real modes than that of single PMU.

In order to further compare the performance of Prony analysis for TDMA, CDMA, and single PMU, the mean square error (MSE) of Prony analysis is illustrated in Figure 8. Here, MSE is defined as the average square error between the estimated modes and the real modes. As shown in the figure, the performance of both TDMA and CDMA is better than that of either PMU 1 or 2. Therefore, the Prony analysis for TDMA and CDMA has performance gain from multiple signals and has more capability to combat the noise, compared with Prony analysis for single PMU.

##### 7.2. Countermeasure for Attacks

As the performance of MMRM or VM of CDMA is similar with the result for TDMA, only simulation results for TDMA are provided in this part. Besides signals and , another correct signal and an attacked signal are added in the simulation. has the same eigenvalues as signal and . has different eigenvalues:

Figure 9 shows the performance of MMRM with different when the SNR is 20 dB. When , the detection probability increases rapidly to 1 when false alarm probability is 0.05. The performance degrades gradually as increases. Figure 10 compares the performance of different SNRs when . When the SNR is equal to 25 dB, the performance is very good. The detection probability is almost 1 with different false alarm probabilities. When the SNR is equal to 20 dB, the detection probability rises quickly to 1 when the false alarm probability is larger than 0.05.

Figure 11 shows the performance of VM with different when the SNR is 20 dB. As illustrated in the figure, except for , the performance of other is good; the detection probability is almost 1 when the false alarm probability is greater than 0.1. Figure 12 compares the performance of different SNRs for . As shown in the figure, when SNR is equal to 25 dB, the performance is very good. The detection probability is very close to 1 with a low false alarm probability. When the SNR is equal to 20 dB, the detection probability is near 0.9 when false alarm probability is 0.1.

#### 8. Conclusions

In this paper, TDMA and CDMA are proposed to transmit measurements of different PMUs to a processing center. In both schemes, the Prony algorithms using the received signal to estimate the system state, including the eigenvalues of the linear system and the amplitudes of different response modes, are proposed and analyzed. The simulation results have demonstrated that the performance of Prony analysis for TDMA and CDMA is better than that for single PMU. In addition, two countermeasures, MMRM and VM, are proposed to detect possible attacks of false reports. Numerical simulations have verified the effectiveness of MMRM and VM based attack detection.

#### Appendices

#### A. Derivation of CRB Covariance Matrix for TDMA

The derivative of in (25) with respect to is given by

The derivatives of in (25) with respect to and are given by

The derivatives of in (25) with respect to and are given by

Then, the derivatives of with respect to and can be calculated, which are given by

For the simplification of the expression for Fisher information matrix , we assume

In order to obtain the final expression for , we also need to use the following property equations which are proved in [22]:

Then, the elements of can be obtained via This concludes the proof of (28).

For the proof of (31), we need to use the following lemma which was proven in [22, 23].

Lemma 1. * Assuming that one is given a block matrix with the following form:
**
where is a block matrix and and are the real and imaginary parts of , then the inverse of is equal to
**
where , and and are the real and imaginary parts of . *

Based on Lemma 1 and the property of partitioned matrix, the inverse of can be directly calculated and (31) is proved.

#### B. Derivation of CRB Covariance Matrix for CDMA

The derivative of in (36) with respect to is given by

The derivatives of in (36) with respect to , , and are given by

Then, the derivative of with respect to , , , and can be obtained: where

In order to attain the final expression for , besides using (A.8), (A.9), and (A.10), we also need to use the orthogonal property of ; that is: where is an identity matrix.

Then, the elements of can be obtained: This proves (38).

#### Acknowledgment

This work was supported by the National Science Foundation under grants ECCS-0901425, CNS-1116826 and UTORNL Science Alliance JDRD Award.

#### References

- ISO New England Inc,
*Overview of the Smart Grid: Policies, Initiatives and Needs*, ISO New England Inc, 2009. - P. Piagi and R. H. Lasseter, “Autonomous control of microgrids,” in
*Proceedings of the IEEE Power Engineering Society General Meeting (PES '6)*, June 2006. View at Scopus - N. Hatziargyriou, H. Asano, R. Iravani, and C. Marnay, “Microgrids,”
*IEEE Power and Energy Magazine*, vol. 5, no. 4, pp. 78–94, 2007. View at Publisher · View at Google Scholar · View at Scopus - J. Xiao, X. Xie, Y. Han, and J. Wu, “Dynamic tracking of low-frequency oscillations with improved prony method in wide-area measurement system,” in
*Proceedings of the IEEE Power Engineering Society General Meeting*, pp. 1104–1109, June 2004. View at Scopus - CIGREWorking Group,
*Wide Area Monitoring and Control for Transmission Capability Enhancement*, vol. C4.601, CIGRE Publication, 2007. - IEEE Power Engineering Society, IEEE Standard for Synchrophasors for Power Systems, IEEE Std. C37.118TM-2005 (Revision of IEEE Std. 1344TM-1995).
- J. D. Kueck, R. H. Staunton, S. D. Labinov, and B. J. Kirby, “Microgrid energy management system,”
*Technical Report*ORNL/TM-2002/242, Oak Ridge National Lab, 2002. - D. J. Trudnowski, J. M. Johnson, and J. F. Hauer, “Making prony analysis more accurate using multiple signals,”
*IEEE Transactions on Power Systems*, vol. 14, no. 1, pp. 226–231, 1999. View at Scopus - G. Liu, J. Quintero, and V. Venkatasubramanian, “Oscillation monitoring system based on wide area synchrophasors in power systems,” in
*Proceedings of the IREP Symposium- Bulk Power System Dynamics and Control*, Charleston, SC, USA, August 2007. View at Publisher · View at Google Scholar · View at Scopus - K. Steiglitz and L. E. McBride, “A technique for the identification of linear systems,”
*IEEE Transactions on Automatic Control*, vol. 10, pp. 461–464, 1965. - J. N. Juang and R. S. Pappa, “An eigensystem realization algorithm for modal parameter identification and model reduction,”
*Journal of Guidance, Control, and Dynamics*, vol. 8, no. 5, pp. 620–627, 1985. View at Scopus - J. F. Hauer, C. J. Demeure, and L. L. Scharf, “Initial results in Prony analysis of power system response signals,”
*IEEE Transactions on Power Systems*, vol. 5, no. 1, pp. 80–89, 1990. View at Publisher · View at Google Scholar · View at Scopus - J. J. Sanchez-Gasca, “Performance comparison of three identification methods for the analysis of electromechanical oscillations,”
*IEEE Transactions on Power Systems*, vol. 14, no. 3, pp. 995–1002, 1999. View at Scopus - J. F. Hauer, “The use of Prony analysis to determine modal content and equivalent models for measured power system response,” in
*Proceddings of the IEEE Symposium of Eigenanalysis and Frequency Domain Methods for System Dynamic Performance*, 1989. - J. F. Hauer, “BPA experience in the measurement of power system dynamics,” in
*Proceedings of IEEE Symposium on Inter-Area Oscillation in Power Systems*, 1994. - D. J. Trudnowski, M. K. Donnelly, and J. F. Hauer, “Estimating damping effectiveness of BPA’s Thyristor controlled series capacitor by applying time and frequency domain methods to measured response,” in
*Proceedings of IEEE/PES Summer Power Meeting*, Denver, Colo, USA, July 1996. - D. J. Trudnowski and J. E. Dagle, “Effects of generator and staticload nonlinearities on electromechanical oscillations,” in
*Proceedings of the IEEE/PES Summer Power Meeting*, July 1996. - D. J. Trudnowski, J. R. Smith, T. A. Short, and D. A. Pierre, “An application of Prony methods in PSS design for multimachine systems,”
*IEEE Transactions on Power Systems*, vol. 6, no. 2, pp. 118–126, 1991. View at Scopus - M. K. Donnelly, J. R. Smith, R. M. Johnson, J. F. Hauer, R. W. Brush, and R. Adapa, “Control of a dynamic brake to reduce turbine-generator shaft transient torques,”
*IEEE Transactions on Power Systems*, vol. 8, no. 1, pp. 67–73, 1993. View at Publisher · View at Google Scholar · View at Scopus - J. H. Hong and J. K. Park, “A time-domain approach to transmission network equivalents via prony analysis for electromagnetic transients analysis,”
*IEEE Transactions on Power Systems*, vol. 10, no. 4, pp. 1789–1797, 1995. View at Publisher · View at Google Scholar · View at Scopus - D. J. Trudnowski, J. M. Johnson, and J. F. Hauer, “SIMO system identification from measured ringdowns,” in
*Proceedings of the American Control Conference*, Philadelphia, Pa, USA, June 1998. - P. Stoica and A. Nehorai, “MUSIC, maximum likelihood, and Cramer-Rao bound,”
*IEEE Transactions on Acoustics, Speech, and Signal Processing*, vol. 37, no. 5, pp. 720–741, 1989. View at Publisher · View at Google Scholar · View at Scopus - W. M. Steedly and R. L. Moses, “The Cramer-Rao bound for pole and amplitude coefficient estimates of damped exponential signals in noise,”
*IEEE Transactions on Signal Processing*, vol. 41, no. 3, pp. 1305–1318, 1993. View at Publisher · View at Google Scholar · View at Scopus - W. M. Steedly, C. H. J. Ying, and R. L. Moses, “Statistical analysis of SVD-based Prony techniques,” in
*Proceedings of the 25th Asilomar Conference on Signals, Systems & Computers*, pp. 232–236, November 1991. View at Scopus - W. M. Steedly, C. H. J. Ying, and R. L. Moses, “Statistical analysis of TLS-based prony techniques,”
*Automatica*, vol. 30, no. 1, pp. 115–129, 1994. View at Publisher · View at Google Scholar · View at Scopus - J. G. Proakis, C. M. Rader, F. Ling, C. L. Nikias, M. Moonen, and I. K. Proudler,
*Algorithms for Statistical Signal Processing*, Prentice Hall, Upper Saddle River, NJ, USA, 2002. - D. J. Trudnowski, “Order reduction of large-scale linear oscillatory system models,”
*IEEE Transactions on Power Systems*, vol. 9, no. 1, pp. 451–458, 1994. View at Publisher · View at Google Scholar · View at Scopus - R. A. Horn and C. R. Johnson,
*Matrix Analysis*, Cambridge Univeristy Press, Cambridge, UK, 1990. - A. K. Jain, M. N. Murty, and P. J. Flynn, “Data clustering: a review,”
*ACM Computing Surveys*, vol. 31, no. 3, pp. 264–323, 1999. View at Scopus - P. Berkhin, “Survey of clustering data mining techniques,” Tech. Rep., Accrue Software, 2002.
- R. Xu and D. Wunsch, “Survey of clustering algorithms,”
*IEEE Transactions on Neural Networks*, vol. 16, no. 3, pp. 645–678, 2005. View at Publisher · View at Google Scholar · View at Scopus