Скачать презентацию
Идет загрузка презентации. Пожалуйста, подождите
Презентация была опубликована 9 лет назад пользователемДмитрий Жолобов
1 The Concept of Settings Calculation for Modern Protection Andrei Podshivalin, Research Centre BRESLER , Dublin, Ireland
2 Requirements to settings D D, X, R,, α, β ? ? New 1. New types of characteristics extension 2. Tripping area extension
3 Need for new techniques not fitsettings do not fit new devices –different set of parameters –different tripping principle higher dependability requirements automated settings calculation
4 Goals of the research Update existing engineering guidelines Develop techniques for new devices Abstract teaching techniques Setting the «implicit» protection algorithms Informational approach
5 Given: –A protection device –A power network element – object Goal: determine the settings vector M set Example Measurement: Z ac = U ac /I ac Settings vector: M set = [Z set ; φ m.s ] φ m.s. Z set line angle jX ac R ac Settings calcaulation technique
6 Object space definition Conditions for G α and G β formation –Operation in α-conditions –No operation in β-conditions –Influence of starting elements Example δ xfxf RfRf GαGα xfxf RfRf EEe -jδ δ GβGβ xfxf RfRf
7 Simulation model Basic factors: –features of the power object conditions –power system conditions –informational basis of the protection Example Protected zone Out-of-zone xfxf RfRf EEe -jδ
8 Mapping boundary determination Application of the education theory –boundary conditions Triangulation method –numerical description of the boundary surface δ xfxf RfRf GαGα GβGβ xfxf RfRf SαSα Example jX ac R ac SβSβ δ Proper area of α-conditions S αα = S α \ S β
9 Settings vector determination Choose criterion and limiting conditions Apply optimization for V S or V G Example 1 – φ m.s is equal to line angle (traditional approach) 2 – Maximum extent for short-circuit faults (R f = 0) 1 2 jX ac R ac
10 Sensitivity analysis Object characteristicsObject characteristics method AnalysisAnalysis of the results Example RfRf xfxf 1 2 Object characteristics 1 2 jX ac R ac 3 3
11 Application of the methods Distance protection –polygonal –multi-dimensional Differential protection –restraint for outer faults IdId IrIr
12 Conclusions The general approach leads to better automation Higher performance of microprocessor protection is reached The analysis tool is suggested
Еще похожие презентации в нашем архиве:
© 2024 MyShared Inc.
All rights reserved.