SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 3 (March 2014), PP.11-17
11
Performance Evaluation of a Modern NPR for Over Current
Protection with the Application of Microcontroller
Technology in Power System
R.Gunasekari1
, Dr.D.Mary2
, Dr.P.C.Kishoreraja3
1
Research Scholar, Dept. of Electrical and Electronics Engineering, Saveetha University, Chennai
2
Prof. & Head, Dept. of Control and Instrumentation Engineering,
Government College of Technology, Coimbatore
3
Prof. & Head, Dept. of Electronics and Communication Engineering,
Saveetha School of Engineering, Saveetha University, Chennai
Abstract:- Numerical Protective Relays (NPRs) are the result of the application of microcontroller technology
in relay industry. NPRs have the ability to communicate with its peers, are economical and are easy to operate,
adjust and repair. Over-current protection is a key part of the power system. Over-current relays are extensively
used in power system protection. The relay operates when actuating current exceeds a specified limit. These
relays have their application with wide range of power system components viz. sub-transmission and
distribution network, generators, transformers etc. Design for implementation of an over-current relay as a
System On Programmable Chip (SOPC) is presented. Microcontroller (µc) is used for the System On Chip
(SOC) application to achieve a SOPC for the proposed design. The µc-based SOPC approach is faster and
economical as compared to conventional SOC devices. The design is suitable for distribution or sub-
transmission networks and can behave as extreme inverse or very inverse type of time over-current relay. The
proposed relay follows standard inverse-time characteristics according to IEEE standard. Performance
evaluation of the designed relay has been checked. The results from tests performed are also included.
Keywords:- Power System Protection, Numerical Protective Relaying (NPR), Over-current Numerical Relay
Protection, Microcontroller
I. INTRODUCTION
The reliability and security electrical supply is an important factor in modern society. However, the
increasing complexity of power systems makes it difficult for protection operation to achieve these objectives.
Nevertheless, numerical relays embedded with digital signal processor (DSP) are able to improve the protection
operation significantly. The relays are capable of performing complex processing faster and with higher
accuracy since the processing using DSP are optimized for real-time signal processing. In this paper, an over-
current relay is built and investigated using DSP. The over-current protection is chosen since it is used as a
major protection in the distribution systems. The over-current relay is modeled in MATLAB/Simulink before it
is implemented on the DSP. Comparison results between simulation and hardware execution based on two
implementation methods are presented. The performance evaluation of the relay in terms of operation time,
memory capacity usage, execution time and transient analysis is investigated [1].
Protective relays are used to detect any abnormalities in a power system and isolate the faulty part of
the system in the shortest time. Protective relays are designed to maintain high degree of service continuity and
limit equipment damage in the power systems. Severe disruption to the normal routine of modern society such
as power outages is likely to increase the emphasis on reliability and security of supply electrical energy to
consumers [2]. The expanding of power systems such as intense increase of transmission line capacity and
increase of grids looping degree will increase the complexity of power system. This will cause the protection
operation to become more difficult. The protective relays encounter several problems as revealed in [3]. The
present protection technique used is unable to ensure selectivity and speedily operation for the faults appearing
on the entire protected line. Numerical protective relays are able to improve the performance of the protection
operation considerably. Numerical relay are embedded with microcontroller as the computational hardware.
Performance Evaluation of a Modern NPR for Over Current Protection with…
12
II. NUMERICAL RELAY PROTECTION
A. Importance of Numerical Relay Protection
Modern civilization makes use of large amounts of energy to generate goods and services. From the
industrial plants, the providers of public services to the ordinary man, all of them need energy to satisfy and
create the well being of modern society. The purpose of electric power systems is to provide energy for human
use in a secure, reliable and economic manner. Electric power systems are made up of facilities and equipment
that generate, transmit and distribute electrical energy. Electric power systems are one of the largest and more
complex systems man has ever built.
The importance of the services that power systems offer and the high amount of investments that
represent the facilities and equipments, make the normal and constant operation of power systems critical and
strategic for every society. Faults and failures normally occur in power systems. Due to the great amounts of
energy involved, faults represent a threat to the operation and security of power systems if the faults are not
promptly corrected. Power systems need an auxiliary system that must take corrective actions on the occurrence
of a fault. This auxiliary system is known as protection system. The Protection systems are operated through
protective devices like protective relays etc.
NPR systems are sets of equipments, schemes and policies dedicated to detect faults in the protected
elements of the power systems, to disconnect the faulted element and to reestablish the service, if it was the
case. Because power systems operate in different operating states, different fault scenarios may occur. Protective
relay systems must provide different schemes and equipments to detect and to react to each and every one of
these fault scenarios, from the most simple of them to the most complex and compelling.
B. Classification of NPRs Based on Technology
NPRs can be broadly classified into the following categories depending on the technology used for their
construction and operation.
 Electromagnetic NPRs
 Static NPRs
 Microcontroller-based NPRs
C. Microcontroller - Based NPRs
Microcontroller-based NPRs are the latest development in this area. With the development in VLSI
Technology, sophisticated and fast microcontrollers are coming up. Their applications to the problems of
numerical protective relaying schemes are of current interests to power engineers. The inherit advantages of
microcontroller-based NPRs over static NPRs with or a very limited range of applications, are attractive,
flexibility due to their programmable approach. Microcontroller-based NPRs can provide protection at low cost
and compete with conventional relays. The present downward trend in the cost of large-scale integrated circuit
will encourage wide applications of microcontroller-based applications of microcontroller-based NPRs for the
protection modern complex power network in the power system.
III. NPR FOR OVER CURRENT PROTECTION
A. An Introduction to Numerical Protective Over Current Relay
A numerical protective relay which operates when the current in any circuit exceeds a certain
predetermined value is a numerical over current protective relay. The value of the predetermined current above
which the numerical over current protective relay operates is known as its pick-up value Ipu. Numerical over
current protective relays offer the cheapest and simplest form of protection. Numerical over current relay
protection is widely used for the protection of distribution lines, motors, power equipment, industrial systems
etc. It incorporates numerical over current protective relays for the protection of an element of the power
system. The measured value of the current is compared with the pick-up value to decide whether there is a fault
or not. If there is a fault in any element of the power system, the relay sends a trip command to circuit breaker
for isolating the faulty element.
B. Overview of NPR for Over Current Protection
A protection which incorporates numerical over current protective relays for the protection of an
element of the power system is known as a numerical over current relay protection. Numerical over current
relay protection is a straightforward application of the numerical relay. A numerical over current protective
relay acquires sequential samples of the current in numeric (digital) data from through the Data Acquisition
Performance Evaluation of a Modern NPR for Over Current Protection with…
13
ystem (DAS), and processes the data numerically using a numerical relaying algorithm to extract the
fundamental frequency component of the current and make trip decision. In order to make the trip decision, the
relay compares the fundamental frequency component of the fault current (I) with the pick-up value (Ipu) setting
and computes the plug setting multiplier (PSM), given by (I / Ipu) at which the relay has to operate. If the
fundamental frequency component of the fault current exceeds the pick-up value (ie., PSM > 1), the relay issues
a trip signal to the circuit breaker. The time delay required for the operation of the relay depends on the type of
over current characteristic to be realized. In case of instantaneous over current relay there is no intentional relay.
For definite time over current relay, the trip signal is issued after a predetermined time delay. In orders to obtain
inverse time characteristics, the relay either computed the operating time corresponding to the fault current or
selects the same from look-up table. For correct operation of the protection system, the design should take into
account the following points:
 Continuous operation should not depend on one circuit only. Ensure that maintenance can be carried
out without total de-energization of the plant.
 Make sure you can live with what happens when back-up protection operates. If not then the design of
the electrical distribution system is not correct.
 Microprocessor multifunction relays from different manufacturers often have very different
characteristics. Review all features when selecting a relay.
 Make use of other relays when present to enhance back-up protection. Adding extra components will
often decrease reliability due to the difficulty of correctly designing and maintaining more complicated
systems.
 Choose the maximum earth fault current carefully as it has an impact on both earth-fault and unit
protection.
 When intertripping is performed, the relay should send the trip order directly to the other breaker and
not through the related relay. This is more reliable for clearing faults. The one exception is for
intertripping in the case of automatic transfer to prevent disastrous closing to a faulted bus.
C. Block Schematic Diagram of proposed NPR for Over Current Protection
Fig.1: Block Schematic Diagram of proposed NPR for Over Current Protection
The block diagram of a NPR for over current protection is shown in fig.1. An over current numerical
protective relay is the simplest form of numerical protective relay which operates when the current in any circuit
exceeds a certain predetermined value, ie. pick-up value. It is extensively used for the protection of distribution
lines, industrial motors and equipment. Using a multiplexer, the microcontroller can sense the fault currents of a
number of circuits. If the fault current in any circuit exceeds the pick-up value, the microcontroller sends a
tripping signal to the circuit breaker of the faulty circuit breaker of the faulty circuit. As the microcontroller
Performance Evaluation of a Modern NPR for Over Current Protection with…
14
accepts signals in voltage form the current signal derived from the current transformer is converted into a
proportional voltage signal using a current to voltage converter. The ac voltage proportional to the load current
is converted into dc using a precision rectifier. Thus, the microcontroller accepts dc voltage proportional to load
current.
IV. NPR ALGORITHM FOR OVER CURRENT PROTECTION
The numerical relaying algorithm first reads all the settings such as the type of characteristics to be
implemented, the Ipu, the time multiplier setting in case of inverse time over current relay or the time delay in
case of DTOC relay. In the case of a definite time over current relay, the microcontroller sends the tripping
signal to the circuit breaker after a predetermined time delay if the fault current exceeds the pick-up value. In
case of instantaneous over current relay there is no intentional time delay. In order to obtain inverse-time
characteristics, the operating times for different values of currents are noted for a particular characteristic.
These values are stored in the memory in tabular form. The microcontroller first determines the
magnitude of the fault current and then selects the corresponding time of operation from the look-up table. A
delay subroutine is started and the trip signal is sent after the desired delay. Using the same program, any
characteristic such as IDMT, very inverse or extremely inverse can be realized by simply changing the data of
the look-up table according to the desired characteristic to be realized. The microcontroller continuously
measures the current and moves in a loop and if the measured current exceeds .
The pick-up value, it compares the measured value of the current with the digital values of current give
in the look-up table in order to select the corresponding count for a time delay. Then it goes in delay subroutine
and sends a trip signal to the circuit breaker after the predetermined time delay. The flowchart is shown in Fig.2.
Table.1: Look – up Table
Table.2: Operation Time of the NPR for over-current protection execution on µc
Digital
Values of
Current
Count for
Delay in
Register B
Delay Time
in Sec
0C (COUNT) - -
7FH 03H 0.19
7AH 05H 0.32
6DH 09H 0.57
66H 00BH 0.70
60H 00DH 0.83
5AH 010H 1.00
53H 016H 1.40
4DH 01EH 1.90
46H 02DH 2.90
40H 050H 5.10
3AH 07DH 8.00
33H 0DBH 14.00
Amplitude
Input current
(A)
According to
IEC
standard
Execution on
µc
Written ASM
code
170 - -
210 - -
213 329.9419 324.6737
227 19.2614 19.34454
500 0.9948 0.994825
Performance Evaluation of a Modern NPR for Over Current Protection with…
15
Yes
No
Yes
No
Send signal to Multiplexer to switch
on S1 to get ldc
Start
Initialize I/O Ports
Send start of conversion signal to
ADC
Read ldc
Is current more than
pick-up?
Yes
ls CB closed
ls conversion
over?
No
Select delay time
Jump
Delay
Send trip signal
Fig.2: Flow Chart of NPR Algorithm for Over Current Protection
Performance Evaluation of a Modern NPR for Over Current Protection with…
16
V. CONCLUSION
This paper describes the performance evaluation of modern NPR using the application of
microcontroller technology for over current protection. Results clearly indicate that the operation time obtained
for implementation method is similar to IEC standard. For transient analysis, the relay is proficient in detecting
transient input. The µc based over current relay using implementation method is proven to provide adequate
reliability and security with improved performance. The objectives of this research are:
 To design and fabricate over current protection relay using PIC microcontroller which can operate on
the permissible conditions by setting the over current value.
 To test unwanted conditions (over current) and when such conditions arise to isolate the fault condition
in the shortest time possible.
 To investigate IDMT curve characteristic. In future, the method selected to implement the over current
relay will depend on the preference of memory usage or execution time of the protection algorithm.
REFERENCES
[1]. Yin Lee Goh, Agileswari K. Ramasamy, Farrukh Hafiz Nagi, Aidil Azwin Zainul Abidin, Evaluation
of DSP based Numerical Relay for over-current Protection, International Journal of Systems
Applications, Engineering & Development Issue 3, Volume 5, 2011.
[2]. Network Protection & Automation Guide, Areva T&D, 1995.
[3]. A. Iagar, G. N. Popa, C. M. Dinis, and G. Moraru, “Study about numerical relay SEL-387 for over
current and differential protections of 110/20 kV transformers,” in Proc. of the 13th WSEAS
International Conference on Systems, Greece, 2009, pp. 265–270.
[4]. E. Price, “The next step in the evolution of protection and control implementation,” in Annual
Conference for Protective Relay Engineers, 2010, pp. 1–16.
[5]. M. Khederzadeh, “Back-up protection of distance relay second zone by directional over current relays
with combined curves,” in IEEE Power Engineering Society General Meeting, 2006.
[6]. H. A. Darwish, and M. Fikri, “Practical considerations for recursive DFT implementation in numerical
relays,” IEEE Trans. on Power Delivery, vol. 22, pp. 42–49, January 2007.
[7]. P. P. Bedekar, S. R. Bhide, and V. S. Kale, “Optimum time coordination of over current relays in
distribution system using Big-M (Penalty) method,” WSEAS Trans. on Power Systems, 4(11), pp.
341–350, November 2009.
[8]. D. N. Vishwakarma, and Z. Moravej, “ANN based directional over current relay,” IEEE/PES
Transmission and Distribution Conf. and Exposition,” vol. 1, 28 October–2 November 2001, pp. 29–
64.
[9]. W. Al-Hasawi, and M. Gilany, “Proposed techniques for identifying open and short circuit sections in
distribution networks,” WSEAS Trans. on Power Systems, 4(12), pp. 372- 381, December 2009.
[10]. J. C. Tan, P. G. McLaren, R. P. Jayasinghe, and P. L. Wilson, “Software model for inverse time over
current relays incorporating IEC and IEEE standard curves,” in Canadian Conf. on Electrical and
Computer Engineering, vol. 1, 12–15 May 2002, pp. 37–41.
[11]. R. Lin, “Development of protective relaying equipment in substations,” Proc. of the 2006
IASME/WSEAS International Conference on Energy & Environmental Systems, Chalkida, Greece,
May 8-10, 2006, pp. 373–378.
[12]. F. Wang, and M. H. J. Bollen, Classification of component switching transients in the viewpoint of
protective relays,” Electric Power Systems Research, 64(3), pp. 197–207, March 2003.
[13]. F. Muzi, “A filtering procedure based on least squares and Kalman algorithm for parameter estimate in
distance protection.” International Journal of Circuits, Systems and Signal Processing, 1(1), pp. 16–
21,2007.
[14]. TMS320x281x DSP Analog-to-Digital Converter (ADC) Reference Guide, Texas Instruments, 2005.
[15]. D. Campos, E. Moreno, and D. Torres, “Test and evaluation time inverse over-current protection
algorithm using SIMULINK,” Proc. Of the 7th WSEAS Int. Conf. on Signal Processing, Istanbul,
Turkey, 2008, pp.
[16]. Computer representation of over current relay characteristics, IEEE Power Engineering Review, vol. 9,
pp. 50–51, July 1989.
[17]. N. X. Tung, G. Fujita, M. A. S.Masoum and S. M. Islam, “Impact of harmonics on tripping time and
coordination of over current relay,” in 7th WSEAS Int. Conf. on Electric Power Systems, High
Voltages, Electric Machines, Venice, Italy, November 2007, pp. 46–52.
[18]. Jarm-Long Chung, Ying Lu, Wen- hiow Kao and Chih-Ju Chou, “Study of solving the coordination
curve intersection of inverse-time over current relays in subtransmission systems,” IEEE Trans. on
Power Delivery, vol. 23, no. 4, pp. 1780–1788, 2008.
Performance Evaluation of a Modern NPR for Over Current Protection with…
17
[19]. A. A. Zainul Abidin, A. Ramasamy, I. Z. Abidin, and F. H. Nagi, “Over current time delay
determination using gain scheduled PID controllers,” 3rd International Conference on Energy and
Environment, 2009, pp. 89– 93.
[20]. N. Mikulandra, and M. Stojkov, “New challenges for protection system,” Proceedings of the 4th
IASME/WSEAS International Conference on Energy & Environment, February 2009, pp. 269–272.
[21]. Yin Lee Goh, Agileswari K. Ramasamy, Farrukh Hafiz Nagi, Aidil Azwin Zainul Abidin, “Evaluation
of DSP based Numerical Relay for Over current Protection”, International journal of systems
applications, engineering & development Issue 3, volume 5, 2011.
[22]. Md. Aminur Rahman, Kazi Main Uddin Ahmed, Md. Rayhanus Sakib, “Modeling Of A Novel Fuzzy
Based Over current Relay Using Simulink”, International Journal of Scientific & Technology Research,
ISSN 2277-8616, Volume 1, Issue 4, May 2012.
[23]. Bruno Osorno, “Analysis of Microprocessor Based Protective Relay’s (MBPR) Differential Equation
Algorithms”, Journal Of Computing, Volume 2, Issue 6, June 2010, ISSN 2151-9617.
[24]. Avinash Panwar ,Ashish Khandelwal, “Modern numerical relay for power system protection”,
IJNPME, ISSN: 2250 0839, Volume 2 Issue 1 2012.
[25]. Dominik Pieniazek, P.E.,“Over Current Protection & Coordination for Industrial Applications”, IEEE
Houston Chapter-Continuing Education on Demand on 2009-2010.
[26]. Murty Yalla, Mark Adamiak, A. postolov, J. Beatty, S. Borlase, J. Bright, J. Burger, S. Dickson, G.
Gresco, W. Hartman, J. Hohn, D. Holstein, A. Kazemi, G. Michael, C. Sufana, J. Tengdin, M.
Thompson, and E. Udren, “Application of Peer-to-Peer Communication for Protective Relaying”,
IEEE transactions on power delivery, vol. 17, no. 2, April 2002.
[27]. Wei-Jen Lee, Jyh-Cherng Gu, Ren-Jun Li, and Ponpranod Didsayabutra, “A Physical Laboratory for
Protective Relay Education”, IEEE transactions on education, vol. 45, no. 2, May 2002.
[28]. Vladimir Gurevich, “Microprocessor Protection Devices: the Present and the Future”, Serbian Journal
of Electrical Engineering, Vol. 5, No. 2, November 2008, 325-339.
[29]. V.I. Gurevich, “Stability of microprocessor relay protection and automation systems against intentional
destructive electromagnetic impacts: part 2”, ISSN 2074-272X. 2011. No.6.
[30]. Bogdan Kasztenny and Normann Fischer, “Advanced Protection, Automation, and Control Functions”,
Schweitzer Engineering Laboratories, Inc.
[31]. J. Lewis Blackburn & Thomas J. Domin, “Protective Relaying Principles and Applications”, CRC
Press, Taylor & Francis Group, London, New York.
[32]. “Redundancy Considerations for Protective Relaying Systems”, IEEE PSRC, WG I 19.

Contenu connexe

Tendances

IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
Wide area protection-and_emergency_control (1)
Wide area protection-and_emergency_control (1)Wide area protection-and_emergency_control (1)
Wide area protection-and_emergency_control (1)Alaa Eladl
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...IJNSA Journal
 
Evaluating the Arc-Flash Protection Benefits of IEC 61850 Communication
Evaluating the Arc-Flash Protection Benefits of IEC 61850 CommunicationEvaluating the Arc-Flash Protection Benefits of IEC 61850 Communication
Evaluating the Arc-Flash Protection Benefits of IEC 61850 CommunicationSchneider Electric
 
A review on wireless sensor networks
A review on wireless sensor networksA review on wireless sensor networks
A review on wireless sensor networksAlexander Decker
 
Defense In Depth Of Electrical Systems Preliminary Findings And Recommendat...
Defense In Depth Of Electrical Systems   Preliminary Findings And Recommendat...Defense In Depth Of Electrical Systems   Preliminary Findings And Recommendat...
Defense In Depth Of Electrical Systems Preliminary Findings And Recommendat...John Bickel
 
Wide area protection-research_in_the_smart_grid
Wide area protection-research_in_the_smart_gridWide area protection-research_in_the_smart_grid
Wide area protection-research_in_the_smart_gridAlaa Eladl
 
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformImplementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformIRJET Journal
 
IRJET- Cable Fault Detection using IoT
IRJET- Cable Fault Detection using IoTIRJET- Cable Fault Detection using IoT
IRJET- Cable Fault Detection using IoTIRJET Journal
 
IOT BASED POWER GRID MONITORING & CONTROL SYSTEM
IOT BASED POWER GRID MONITORING & CONTROL SYSTEMIOT BASED POWER GRID MONITORING & CONTROL SYSTEM
IOT BASED POWER GRID MONITORING & CONTROL SYSTEMvivatechijri
 
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...ijmnct
 
Redundant secure timing sources and timing distribution to digital power prot...
Redundant secure timing sources and timing distribution to digital power prot...Redundant secure timing sources and timing distribution to digital power prot...
Redundant secure timing sources and timing distribution to digital power prot...Power System Operation
 
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...ijmnct
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
IRJET - Transmission Line Fault Classification using DWT
IRJET -  	  Transmission Line Fault Classification using DWTIRJET -  	  Transmission Line Fault Classification using DWT
IRJET - Transmission Line Fault Classification using DWTIRJET Journal
 

Tendances (20)

IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
Wide area protection-and_emergency_control (1)
Wide area protection-and_emergency_control (1)Wide area protection-and_emergency_control (1)
Wide area protection-and_emergency_control (1)
 
E010424043
E010424043E010424043
E010424043
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
 
Evaluating the Arc-Flash Protection Benefits of IEC 61850 Communication
Evaluating the Arc-Flash Protection Benefits of IEC 61850 CommunicationEvaluating the Arc-Flash Protection Benefits of IEC 61850 Communication
Evaluating the Arc-Flash Protection Benefits of IEC 61850 Communication
 
A review on wireless sensor networks
A review on wireless sensor networksA review on wireless sensor networks
A review on wireless sensor networks
 
Defense In Depth Of Electrical Systems Preliminary Findings And Recommendat...
Defense In Depth Of Electrical Systems   Preliminary Findings And Recommendat...Defense In Depth Of Electrical Systems   Preliminary Findings And Recommendat...
Defense In Depth Of Electrical Systems Preliminary Findings And Recommendat...
 
Wide area protection-research_in_the_smart_grid
Wide area protection-research_in_the_smart_gridWide area protection-research_in_the_smart_grid
Wide area protection-research_in_the_smart_grid
 
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformImplementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 Platform
 
IRJET- Cable Fault Detection using IoT
IRJET- Cable Fault Detection using IoTIRJET- Cable Fault Detection using IoT
IRJET- Cable Fault Detection using IoT
 
IOT BASED POWER GRID MONITORING & CONTROL SYSTEM
IOT BASED POWER GRID MONITORING & CONTROL SYSTEMIOT BASED POWER GRID MONITORING & CONTROL SYSTEM
IOT BASED POWER GRID MONITORING & CONTROL SYSTEM
 
ENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSN
ENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSNENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSN
ENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSN
 
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
 
Redundant secure timing sources and timing distribution to digital power prot...
Redundant secure timing sources and timing distribution to digital power prot...Redundant secure timing sources and timing distribution to digital power prot...
Redundant secure timing sources and timing distribution to digital power prot...
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
 
1 ijcse-01179-6
1 ijcse-01179-61 ijcse-01179-6
1 ijcse-01179-6
 
9345.pdf
9345.pdf9345.pdf
9345.pdf
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
IRJET - Transmission Line Fault Classification using DWT
IRJET -  	  Transmission Line Fault Classification using DWTIRJET -  	  Transmission Line Fault Classification using DWT
IRJET - Transmission Line Fault Classification using DWT
 

Similaire à Modern NPR Over Current Protection

Recent Trends InDigital Differential Protection of Power Transformer
Recent Trends InDigital Differential Protection of Power TransformerRecent Trends InDigital Differential Protection of Power Transformer
Recent Trends InDigital Differential Protection of Power Transformerijiert bestjournal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
A transient current based micro grid connected power system protection scheme...
A transient current based micro grid connected power system protection scheme...A transient current based micro grid connected power system protection scheme...
A transient current based micro grid connected power system protection scheme...IJECEIAES
 
Backpropagation Neural Network Modeling for Fault Location in Transmission Li...
Backpropagation Neural Network Modeling for Fault Location in Transmission Li...Backpropagation Neural Network Modeling for Fault Location in Transmission Li...
Backpropagation Neural Network Modeling for Fault Location in Transmission Li...ijeei-iaes
 
Transformer Protection using PLC
Transformer Protection using PLCTransformer Protection using PLC
Transformer Protection using PLCSageer Ali Khan
 
Microcontroller based transformer protectio
Microcontroller based transformer protectioMicrocontroller based transformer protectio
Microcontroller based transformer protectioAminu Bugaje
 
Power system Protection Services in India
Power system Protection Services in IndiaPower system Protection Services in India
Power system Protection Services in IndiaSystem Protection
 
IRJET- PLC Based Intelligent Control of Substation
IRJET- PLC Based Intelligent Control of SubstationIRJET- PLC Based Intelligent Control of Substation
IRJET- PLC Based Intelligent Control of SubstationIRJET Journal
 
Power System Protection
Power System ProtectionPower System Protection
Power System ProtectionRahul Mehra
 
Smart Grid Overvoltage Protection
Smart Grid Overvoltage ProtectionSmart Grid Overvoltage Protection
Smart Grid Overvoltage ProtectionMike Nager
 
protectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.pptprotectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.pptThien Phan Bản
 
protectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.pptprotectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.pptThien Phan Bản
 
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Power System Operation
 
Smart Local Backup Protection for Smart Substation
Smart Local Backup Protection for Smart SubstationSmart Local Backup Protection for Smart Substation
Smart Local Backup Protection for Smart SubstationIJECEIAES
 
WIDE AREA PROTECTION IN POWER SYSTEMS
WIDE AREA PROTECTION IN POWER SYSTEMSWIDE AREA PROTECTION IN POWER SYSTEMS
WIDE AREA PROTECTION IN POWER SYSTEMSmanogna gwen
 

Similaire à Modern NPR Over Current Protection (20)

Recent Trends InDigital Differential Protection of Power Transformer
Recent Trends InDigital Differential Protection of Power TransformerRecent Trends InDigital Differential Protection of Power Transformer
Recent Trends InDigital Differential Protection of Power Transformer
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
A transient current based micro grid connected power system protection scheme...
A transient current based micro grid connected power system protection scheme...A transient current based micro grid connected power system protection scheme...
A transient current based micro grid connected power system protection scheme...
 
Backpropagation Neural Network Modeling for Fault Location in Transmission Li...
Backpropagation Neural Network Modeling for Fault Location in Transmission Li...Backpropagation Neural Network Modeling for Fault Location in Transmission Li...
Backpropagation Neural Network Modeling for Fault Location in Transmission Li...
 
Transformer Protection using PLC
Transformer Protection using PLCTransformer Protection using PLC
Transformer Protection using PLC
 
Microcontroller based transformer protectio
Microcontroller based transformer protectioMicrocontroller based transformer protectio
Microcontroller based transformer protectio
 
Article
ArticleArticle
Article
 
Power system Protection Services in India
Power system Protection Services in IndiaPower system Protection Services in India
Power system Protection Services in India
 
Protective relaying
Protective relayingProtective relaying
Protective relaying
 
IRJET- PLC Based Intelligent Control of Substation
IRJET- PLC Based Intelligent Control of SubstationIRJET- PLC Based Intelligent Control of Substation
IRJET- PLC Based Intelligent Control of Substation
 
Power System Protection
Power System ProtectionPower System Protection
Power System Protection
 
ASHUTOSH BHATT DT19EEJ008 RPC JUNE22.ppt
ASHUTOSH BHATT DT19EEJ008 RPC JUNE22.pptASHUTOSH BHATT DT19EEJ008 RPC JUNE22.ppt
ASHUTOSH BHATT DT19EEJ008 RPC JUNE22.ppt
 
Smart Grid Overvoltage Protection
Smart Grid Overvoltage ProtectionSmart Grid Overvoltage Protection
Smart Grid Overvoltage Protection
 
protectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.pptprotectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.ppt
 
protectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.pptprotectionsettings-120425102109-phpapp01.ppt
protectionsettings-120425102109-phpapp01.ppt
 
Software Based Transmission Line Fault Analysis
Software Based Transmission Line Fault AnalysisSoftware Based Transmission Line Fault Analysis
Software Based Transmission Line Fault Analysis
 
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
 
Smart grid Technology
Smart grid TechnologySmart grid Technology
Smart grid Technology
 
Smart Local Backup Protection for Smart Substation
Smart Local Backup Protection for Smart SubstationSmart Local Backup Protection for Smart Substation
Smart Local Backup Protection for Smart Substation
 
WIDE AREA PROTECTION IN POWER SYSTEMS
WIDE AREA PROTECTION IN POWER SYSTEMSWIDE AREA PROTECTION IN POWER SYSTEMS
WIDE AREA PROTECTION IN POWER SYSTEMS
 

Plus de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Plus de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Modern NPR Over Current Protection

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 3 (March 2014), PP.11-17 11 Performance Evaluation of a Modern NPR for Over Current Protection with the Application of Microcontroller Technology in Power System R.Gunasekari1 , Dr.D.Mary2 , Dr.P.C.Kishoreraja3 1 Research Scholar, Dept. of Electrical and Electronics Engineering, Saveetha University, Chennai 2 Prof. & Head, Dept. of Control and Instrumentation Engineering, Government College of Technology, Coimbatore 3 Prof. & Head, Dept. of Electronics and Communication Engineering, Saveetha School of Engineering, Saveetha University, Chennai Abstract:- Numerical Protective Relays (NPRs) are the result of the application of microcontroller technology in relay industry. NPRs have the ability to communicate with its peers, are economical and are easy to operate, adjust and repair. Over-current protection is a key part of the power system. Over-current relays are extensively used in power system protection. The relay operates when actuating current exceeds a specified limit. These relays have their application with wide range of power system components viz. sub-transmission and distribution network, generators, transformers etc. Design for implementation of an over-current relay as a System On Programmable Chip (SOPC) is presented. Microcontroller (µc) is used for the System On Chip (SOC) application to achieve a SOPC for the proposed design. The µc-based SOPC approach is faster and economical as compared to conventional SOC devices. The design is suitable for distribution or sub- transmission networks and can behave as extreme inverse or very inverse type of time over-current relay. The proposed relay follows standard inverse-time characteristics according to IEEE standard. Performance evaluation of the designed relay has been checked. The results from tests performed are also included. Keywords:- Power System Protection, Numerical Protective Relaying (NPR), Over-current Numerical Relay Protection, Microcontroller I. INTRODUCTION The reliability and security electrical supply is an important factor in modern society. However, the increasing complexity of power systems makes it difficult for protection operation to achieve these objectives. Nevertheless, numerical relays embedded with digital signal processor (DSP) are able to improve the protection operation significantly. The relays are capable of performing complex processing faster and with higher accuracy since the processing using DSP are optimized for real-time signal processing. In this paper, an over- current relay is built and investigated using DSP. The over-current protection is chosen since it is used as a major protection in the distribution systems. The over-current relay is modeled in MATLAB/Simulink before it is implemented on the DSP. Comparison results between simulation and hardware execution based on two implementation methods are presented. The performance evaluation of the relay in terms of operation time, memory capacity usage, execution time and transient analysis is investigated [1]. Protective relays are used to detect any abnormalities in a power system and isolate the faulty part of the system in the shortest time. Protective relays are designed to maintain high degree of service continuity and limit equipment damage in the power systems. Severe disruption to the normal routine of modern society such as power outages is likely to increase the emphasis on reliability and security of supply electrical energy to consumers [2]. The expanding of power systems such as intense increase of transmission line capacity and increase of grids looping degree will increase the complexity of power system. This will cause the protection operation to become more difficult. The protective relays encounter several problems as revealed in [3]. The present protection technique used is unable to ensure selectivity and speedily operation for the faults appearing on the entire protected line. Numerical protective relays are able to improve the performance of the protection operation considerably. Numerical relay are embedded with microcontroller as the computational hardware.
  • 2. Performance Evaluation of a Modern NPR for Over Current Protection with… 12 II. NUMERICAL RELAY PROTECTION A. Importance of Numerical Relay Protection Modern civilization makes use of large amounts of energy to generate goods and services. From the industrial plants, the providers of public services to the ordinary man, all of them need energy to satisfy and create the well being of modern society. The purpose of electric power systems is to provide energy for human use in a secure, reliable and economic manner. Electric power systems are made up of facilities and equipment that generate, transmit and distribute electrical energy. Electric power systems are one of the largest and more complex systems man has ever built. The importance of the services that power systems offer and the high amount of investments that represent the facilities and equipments, make the normal and constant operation of power systems critical and strategic for every society. Faults and failures normally occur in power systems. Due to the great amounts of energy involved, faults represent a threat to the operation and security of power systems if the faults are not promptly corrected. Power systems need an auxiliary system that must take corrective actions on the occurrence of a fault. This auxiliary system is known as protection system. The Protection systems are operated through protective devices like protective relays etc. NPR systems are sets of equipments, schemes and policies dedicated to detect faults in the protected elements of the power systems, to disconnect the faulted element and to reestablish the service, if it was the case. Because power systems operate in different operating states, different fault scenarios may occur. Protective relay systems must provide different schemes and equipments to detect and to react to each and every one of these fault scenarios, from the most simple of them to the most complex and compelling. B. Classification of NPRs Based on Technology NPRs can be broadly classified into the following categories depending on the technology used for their construction and operation.  Electromagnetic NPRs  Static NPRs  Microcontroller-based NPRs C. Microcontroller - Based NPRs Microcontroller-based NPRs are the latest development in this area. With the development in VLSI Technology, sophisticated and fast microcontrollers are coming up. Their applications to the problems of numerical protective relaying schemes are of current interests to power engineers. The inherit advantages of microcontroller-based NPRs over static NPRs with or a very limited range of applications, are attractive, flexibility due to their programmable approach. Microcontroller-based NPRs can provide protection at low cost and compete with conventional relays. The present downward trend in the cost of large-scale integrated circuit will encourage wide applications of microcontroller-based applications of microcontroller-based NPRs for the protection modern complex power network in the power system. III. NPR FOR OVER CURRENT PROTECTION A. An Introduction to Numerical Protective Over Current Relay A numerical protective relay which operates when the current in any circuit exceeds a certain predetermined value is a numerical over current protective relay. The value of the predetermined current above which the numerical over current protective relay operates is known as its pick-up value Ipu. Numerical over current protective relays offer the cheapest and simplest form of protection. Numerical over current relay protection is widely used for the protection of distribution lines, motors, power equipment, industrial systems etc. It incorporates numerical over current protective relays for the protection of an element of the power system. The measured value of the current is compared with the pick-up value to decide whether there is a fault or not. If there is a fault in any element of the power system, the relay sends a trip command to circuit breaker for isolating the faulty element. B. Overview of NPR for Over Current Protection A protection which incorporates numerical over current protective relays for the protection of an element of the power system is known as a numerical over current relay protection. Numerical over current relay protection is a straightforward application of the numerical relay. A numerical over current protective relay acquires sequential samples of the current in numeric (digital) data from through the Data Acquisition
  • 3. Performance Evaluation of a Modern NPR for Over Current Protection with… 13 ystem (DAS), and processes the data numerically using a numerical relaying algorithm to extract the fundamental frequency component of the current and make trip decision. In order to make the trip decision, the relay compares the fundamental frequency component of the fault current (I) with the pick-up value (Ipu) setting and computes the plug setting multiplier (PSM), given by (I / Ipu) at which the relay has to operate. If the fundamental frequency component of the fault current exceeds the pick-up value (ie., PSM > 1), the relay issues a trip signal to the circuit breaker. The time delay required for the operation of the relay depends on the type of over current characteristic to be realized. In case of instantaneous over current relay there is no intentional relay. For definite time over current relay, the trip signal is issued after a predetermined time delay. In orders to obtain inverse time characteristics, the relay either computed the operating time corresponding to the fault current or selects the same from look-up table. For correct operation of the protection system, the design should take into account the following points:  Continuous operation should not depend on one circuit only. Ensure that maintenance can be carried out without total de-energization of the plant.  Make sure you can live with what happens when back-up protection operates. If not then the design of the electrical distribution system is not correct.  Microprocessor multifunction relays from different manufacturers often have very different characteristics. Review all features when selecting a relay.  Make use of other relays when present to enhance back-up protection. Adding extra components will often decrease reliability due to the difficulty of correctly designing and maintaining more complicated systems.  Choose the maximum earth fault current carefully as it has an impact on both earth-fault and unit protection.  When intertripping is performed, the relay should send the trip order directly to the other breaker and not through the related relay. This is more reliable for clearing faults. The one exception is for intertripping in the case of automatic transfer to prevent disastrous closing to a faulted bus. C. Block Schematic Diagram of proposed NPR for Over Current Protection Fig.1: Block Schematic Diagram of proposed NPR for Over Current Protection The block diagram of a NPR for over current protection is shown in fig.1. An over current numerical protective relay is the simplest form of numerical protective relay which operates when the current in any circuit exceeds a certain predetermined value, ie. pick-up value. It is extensively used for the protection of distribution lines, industrial motors and equipment. Using a multiplexer, the microcontroller can sense the fault currents of a number of circuits. If the fault current in any circuit exceeds the pick-up value, the microcontroller sends a tripping signal to the circuit breaker of the faulty circuit breaker of the faulty circuit. As the microcontroller
  • 4. Performance Evaluation of a Modern NPR for Over Current Protection with… 14 accepts signals in voltage form the current signal derived from the current transformer is converted into a proportional voltage signal using a current to voltage converter. The ac voltage proportional to the load current is converted into dc using a precision rectifier. Thus, the microcontroller accepts dc voltage proportional to load current. IV. NPR ALGORITHM FOR OVER CURRENT PROTECTION The numerical relaying algorithm first reads all the settings such as the type of characteristics to be implemented, the Ipu, the time multiplier setting in case of inverse time over current relay or the time delay in case of DTOC relay. In the case of a definite time over current relay, the microcontroller sends the tripping signal to the circuit breaker after a predetermined time delay if the fault current exceeds the pick-up value. In case of instantaneous over current relay there is no intentional time delay. In order to obtain inverse-time characteristics, the operating times for different values of currents are noted for a particular characteristic. These values are stored in the memory in tabular form. The microcontroller first determines the magnitude of the fault current and then selects the corresponding time of operation from the look-up table. A delay subroutine is started and the trip signal is sent after the desired delay. Using the same program, any characteristic such as IDMT, very inverse or extremely inverse can be realized by simply changing the data of the look-up table according to the desired characteristic to be realized. The microcontroller continuously measures the current and moves in a loop and if the measured current exceeds . The pick-up value, it compares the measured value of the current with the digital values of current give in the look-up table in order to select the corresponding count for a time delay. Then it goes in delay subroutine and sends a trip signal to the circuit breaker after the predetermined time delay. The flowchart is shown in Fig.2. Table.1: Look – up Table Table.2: Operation Time of the NPR for over-current protection execution on µc Digital Values of Current Count for Delay in Register B Delay Time in Sec 0C (COUNT) - - 7FH 03H 0.19 7AH 05H 0.32 6DH 09H 0.57 66H 00BH 0.70 60H 00DH 0.83 5AH 010H 1.00 53H 016H 1.40 4DH 01EH 1.90 46H 02DH 2.90 40H 050H 5.10 3AH 07DH 8.00 33H 0DBH 14.00 Amplitude Input current (A) According to IEC standard Execution on µc Written ASM code 170 - - 210 - - 213 329.9419 324.6737 227 19.2614 19.34454 500 0.9948 0.994825
  • 5. Performance Evaluation of a Modern NPR for Over Current Protection with… 15 Yes No Yes No Send signal to Multiplexer to switch on S1 to get ldc Start Initialize I/O Ports Send start of conversion signal to ADC Read ldc Is current more than pick-up? Yes ls CB closed ls conversion over? No Select delay time Jump Delay Send trip signal Fig.2: Flow Chart of NPR Algorithm for Over Current Protection
  • 6. Performance Evaluation of a Modern NPR for Over Current Protection with… 16 V. CONCLUSION This paper describes the performance evaluation of modern NPR using the application of microcontroller technology for over current protection. Results clearly indicate that the operation time obtained for implementation method is similar to IEC standard. For transient analysis, the relay is proficient in detecting transient input. The µc based over current relay using implementation method is proven to provide adequate reliability and security with improved performance. The objectives of this research are:  To design and fabricate over current protection relay using PIC microcontroller which can operate on the permissible conditions by setting the over current value.  To test unwanted conditions (over current) and when such conditions arise to isolate the fault condition in the shortest time possible.  To investigate IDMT curve characteristic. In future, the method selected to implement the over current relay will depend on the preference of memory usage or execution time of the protection algorithm. REFERENCES [1]. Yin Lee Goh, Agileswari K. Ramasamy, Farrukh Hafiz Nagi, Aidil Azwin Zainul Abidin, Evaluation of DSP based Numerical Relay for over-current Protection, International Journal of Systems Applications, Engineering & Development Issue 3, Volume 5, 2011. [2]. Network Protection & Automation Guide, Areva T&D, 1995. [3]. A. Iagar, G. N. Popa, C. M. Dinis, and G. Moraru, “Study about numerical relay SEL-387 for over current and differential protections of 110/20 kV transformers,” in Proc. of the 13th WSEAS International Conference on Systems, Greece, 2009, pp. 265–270. [4]. E. Price, “The next step in the evolution of protection and control implementation,” in Annual Conference for Protective Relay Engineers, 2010, pp. 1–16. [5]. M. Khederzadeh, “Back-up protection of distance relay second zone by directional over current relays with combined curves,” in IEEE Power Engineering Society General Meeting, 2006. [6]. H. A. Darwish, and M. Fikri, “Practical considerations for recursive DFT implementation in numerical relays,” IEEE Trans. on Power Delivery, vol. 22, pp. 42–49, January 2007. [7]. P. P. Bedekar, S. R. Bhide, and V. S. Kale, “Optimum time coordination of over current relays in distribution system using Big-M (Penalty) method,” WSEAS Trans. on Power Systems, 4(11), pp. 341–350, November 2009. [8]. D. N. Vishwakarma, and Z. Moravej, “ANN based directional over current relay,” IEEE/PES Transmission and Distribution Conf. and Exposition,” vol. 1, 28 October–2 November 2001, pp. 29– 64. [9]. W. Al-Hasawi, and M. Gilany, “Proposed techniques for identifying open and short circuit sections in distribution networks,” WSEAS Trans. on Power Systems, 4(12), pp. 372- 381, December 2009. [10]. J. C. Tan, P. G. McLaren, R. P. Jayasinghe, and P. L. Wilson, “Software model for inverse time over current relays incorporating IEC and IEEE standard curves,” in Canadian Conf. on Electrical and Computer Engineering, vol. 1, 12–15 May 2002, pp. 37–41. [11]. R. Lin, “Development of protective relaying equipment in substations,” Proc. of the 2006 IASME/WSEAS International Conference on Energy & Environmental Systems, Chalkida, Greece, May 8-10, 2006, pp. 373–378. [12]. F. Wang, and M. H. J. Bollen, Classification of component switching transients in the viewpoint of protective relays,” Electric Power Systems Research, 64(3), pp. 197–207, March 2003. [13]. F. Muzi, “A filtering procedure based on least squares and Kalman algorithm for parameter estimate in distance protection.” International Journal of Circuits, Systems and Signal Processing, 1(1), pp. 16– 21,2007. [14]. TMS320x281x DSP Analog-to-Digital Converter (ADC) Reference Guide, Texas Instruments, 2005. [15]. D. Campos, E. Moreno, and D. Torres, “Test and evaluation time inverse over-current protection algorithm using SIMULINK,” Proc. Of the 7th WSEAS Int. Conf. on Signal Processing, Istanbul, Turkey, 2008, pp. [16]. Computer representation of over current relay characteristics, IEEE Power Engineering Review, vol. 9, pp. 50–51, July 1989. [17]. N. X. Tung, G. Fujita, M. A. S.Masoum and S. M. Islam, “Impact of harmonics on tripping time and coordination of over current relay,” in 7th WSEAS Int. Conf. on Electric Power Systems, High Voltages, Electric Machines, Venice, Italy, November 2007, pp. 46–52. [18]. Jarm-Long Chung, Ying Lu, Wen- hiow Kao and Chih-Ju Chou, “Study of solving the coordination curve intersection of inverse-time over current relays in subtransmission systems,” IEEE Trans. on Power Delivery, vol. 23, no. 4, pp. 1780–1788, 2008.
  • 7. Performance Evaluation of a Modern NPR for Over Current Protection with… 17 [19]. A. A. Zainul Abidin, A. Ramasamy, I. Z. Abidin, and F. H. Nagi, “Over current time delay determination using gain scheduled PID controllers,” 3rd International Conference on Energy and Environment, 2009, pp. 89– 93. [20]. N. Mikulandra, and M. Stojkov, “New challenges for protection system,” Proceedings of the 4th IASME/WSEAS International Conference on Energy & Environment, February 2009, pp. 269–272. [21]. Yin Lee Goh, Agileswari K. Ramasamy, Farrukh Hafiz Nagi, Aidil Azwin Zainul Abidin, “Evaluation of DSP based Numerical Relay for Over current Protection”, International journal of systems applications, engineering & development Issue 3, volume 5, 2011. [22]. Md. Aminur Rahman, Kazi Main Uddin Ahmed, Md. Rayhanus Sakib, “Modeling Of A Novel Fuzzy Based Over current Relay Using Simulink”, International Journal of Scientific & Technology Research, ISSN 2277-8616, Volume 1, Issue 4, May 2012. [23]. Bruno Osorno, “Analysis of Microprocessor Based Protective Relay’s (MBPR) Differential Equation Algorithms”, Journal Of Computing, Volume 2, Issue 6, June 2010, ISSN 2151-9617. [24]. Avinash Panwar ,Ashish Khandelwal, “Modern numerical relay for power system protection”, IJNPME, ISSN: 2250 0839, Volume 2 Issue 1 2012. [25]. Dominik Pieniazek, P.E.,“Over Current Protection & Coordination for Industrial Applications”, IEEE Houston Chapter-Continuing Education on Demand on 2009-2010. [26]. Murty Yalla, Mark Adamiak, A. postolov, J. Beatty, S. Borlase, J. Bright, J. Burger, S. Dickson, G. Gresco, W. Hartman, J. Hohn, D. Holstein, A. Kazemi, G. Michael, C. Sufana, J. Tengdin, M. Thompson, and E. Udren, “Application of Peer-to-Peer Communication for Protective Relaying”, IEEE transactions on power delivery, vol. 17, no. 2, April 2002. [27]. Wei-Jen Lee, Jyh-Cherng Gu, Ren-Jun Li, and Ponpranod Didsayabutra, “A Physical Laboratory for Protective Relay Education”, IEEE transactions on education, vol. 45, no. 2, May 2002. [28]. Vladimir Gurevich, “Microprocessor Protection Devices: the Present and the Future”, Serbian Journal of Electrical Engineering, Vol. 5, No. 2, November 2008, 325-339. [29]. V.I. Gurevich, “Stability of microprocessor relay protection and automation systems against intentional destructive electromagnetic impacts: part 2”, ISSN 2074-272X. 2011. No.6. [30]. Bogdan Kasztenny and Normann Fischer, “Advanced Protection, Automation, and Control Functions”, Schweitzer Engineering Laboratories, Inc. [31]. J. Lewis Blackburn & Thomas J. Domin, “Protective Relaying Principles and Applications”, CRC Press, Taylor & Francis Group, London, New York. [32]. “Redundancy Considerations for Protective Relaying Systems”, IEEE PSRC, WG I 19.