The Concept of Settings Calculation for Modern Protection Andrei Podshivalin, Research Centre BRESLER , Dublin, Ireland
Requirements to settings D D, X, R,, α, β ? ? New 1. New types of characteristics extension 2. Tripping area extension
Need for new techniques not fitsettings do not fit new devices –different set of parameters –different tripping principle higher dependability requirements automated settings calculation
Goals of the research Update existing engineering guidelines Develop techniques for new devices Abstract teaching techniques Setting the «implicit» protection algorithms Informational approach
Given: –A protection device –A power network element – object Goal: determine the settings vector M set Example Measurement: Z ac = U ac /I ac Settings vector: M set = [Z set ; φ m.s ] φ m.s. Z set line angle jX ac R ac Settings calcaulation technique
Object space definition Conditions for G α and G β formation –Operation in α-conditions –No operation in β-conditions –Influence of starting elements Example δ xfxf RfRf GαGα xfxf RfRf EEe -jδ δ GβGβ xfxf RfRf
Simulation model Basic factors: –features of the power object conditions –power system conditions –informational basis of the protection Example Protected zone Out-of-zone xfxf RfRf EEe -jδ
Mapping boundary determination Application of the education theory –boundary conditions Triangulation method –numerical description of the boundary surface δ xfxf RfRf GαGα GβGβ xfxf RfRf SαSα Example jX ac R ac SβSβ δ Proper area of α-conditions S αα = S α \ S β
Settings vector determination Choose criterion and limiting conditions Apply optimization for V S or V G Example 1 – φ m.s is equal to line angle (traditional approach) 2 – Maximum extent for short-circuit faults (R f = 0) 1 2 jX ac R ac
Sensitivity analysis Object characteristicsObject characteristics method AnalysisAnalysis of the results Example RfRf xfxf 1 2 Object characteristics 1 2 jX ac R ac 3 3
Application of the methods Distance protection –polygonal –multi-dimensional Differential protection –restraint for outer faults IdId IrIr
Conclusions The general approach leads to better automation Higher performance of microprocessor protection is reached The analysis tool is suggested