The Concept of Settings Calculation for Modern Protection Andrei Podshivalin, Research Centre BRESLER , Dublin, Ireland
Requirements to settings D D, X, R,, α, β ? ? New 1. New types of characteristics extension 2. Tripping area extension
Need for new techniques not fitsettings do not fit new devices –different set of parameters –different tripping principle dependabilityhigher dependability requirements automated settings calculation
Goals of the research Update existing engineering guidelines Develop techniques for new devices AbstractAbstract teaching techniques implicitSetting the «implicit» protection algorithms Informational approach:
Given: device –A protection device object –A power network element – object Goal: determine the settings vector M set Example Measurement: Z ac = U ac /I ac Settings vector: M set = [Z set ; φ m.s ] φ m.s Z set line angle jX ac R ac Settings calculation technique 6 Steps
Object space definition ConditionsConditions for G α and G β formation –Operation in α-conditions –No operation in β-conditions starting –Influence of starting elements Example δ xfxf RfRf GαGα xfxf RfRf EEe -jδ δ GβGβ xfxf RfRf Step 1
Simulation model and modes Basic factors: object –features of the power object conditions –power system conditions basis –informational basis of the protection Example Protected zone Out-of-zone xfxf RfRf EEe -jδ Step 2
Setting area determination Application of the education theory –boundary conditions Triangulation method –numerical description of the boundary surface δ xfxf RfRf GαGα GβGβ xfxf RfRf SαSα Example jX ac R ac SβSβ δ Proper area of α-conditions S αα = S α \ S β Step 3
Settings vector determination Choose criterion and limiting conditions Apply optimization for V S or V G Example 1 – φ m.s is equal to line angle (traditional approach) 2 – maximum extent for short-circuit faults (R f = 0) 1 2 jX ac R ac Step 4 Criteria:
1 2 jX ac R ac Sensitivity analysis Object characteristicsObject characteristics method AnalysisAnalysis of the results RfRf xfxf 1 2 Object characteristics 3 3 Example Step 5
Application of the methods Engineering guidelines: Distance protection –polygonal –multi –multi-dimensional Differential protection –restraint for external faults IdId IdId IrIr IrIr Step 6
Conclusions EngineeringguidelinesEngineering guidelines have been developed Higher performance of microprocessor protection is reached The general approach leads to better automation The analysis tool is suggested