Beruflich Dokumente
Kultur Dokumente
Research Article
Abstract: Undesired trip operation of zone 3 units of distance relays in power transmission network, during static and dynamic
load encroachment can lead to cascading failures and even catastrophic power system blackouts. Stressed conditions such as
power flow redistribution and power swing can cause maloperation of the third zone of distance relays. Fast and dependable
detection of the symmetrical faults, occurring during these conditions poses an additional challenge. One of the effective
methods to avoid the zone 3 contribution in cascading failure propagation is the detection and monitoring of vulnerable relays
which are exposed to maloperation in power system stressed conditions. In this study, a new relay ranking index is proposed for
real-time identifying the zone 3 of distance relays, most vulnerable to incorrect operation due to load encroachment. A novel
synchrophasor data-based monitoring index is also presented for supervision of critical distance relays operation. This index is
extracted based on positive-sequence fault component phasors of the current and voltage signals obtained by modern PMUs or
GPS based digital relays which have been reconfigured for this application. The proposed monitoring scheme is able to quickly
distinguish the fault from load encroachment condition. The performance of the proposed supervisory scheme is evaluated and
approved on a nine-bus WSCC system.
IET Gener. Transm. Distrib., 2017, Vol. 11 Iss. 8, pp. 1878-1888 1878
© The Institution of Engineering and Technology 2017
are usually based on a power flow calculation extracted either V̄ i V̄ i vi∠δi
based on off line condition of power system or based on system Z̄ seen, i = = = ⋅ Z̄ (1)
I¯i (V̄ i − V̄ j)/Z̄ i j vi∠δi − v j∠δ j i j
information derived from state estimator. The identified vulnerable
relays in offline mode are usually blocked to prevent their
contribution in the propagation of cascading events. This approach where V̄ i, V̄ j, I¯i are the voltage and current phasors measured at
can unnecessarily decrease the dependability of the protection buses i and j, respectively. vi and δi are the voltage magnitude and
system. its phase angle at bus i, respectively, and Z̄ i j is the transmission line
In this study, to avoid the maloperation of zone 3 units of impedance between buses i and j. If impedance trajectory enters the
distance relays, a new scheme for real-time detection and zone 3 and the staying time reaches from setting threshold, the
monitoring of most vulnerable relays in each operating point is relay issues the trip signal. Therefore, the required condition to
presented. A novel vulnerability index, which is extracted based on operate the zone 3 can be defined as
synchrophasor measurements, is presented to rank the zone 3 of
critical distance relays. Distance relays which are identified as Z set, Z3, i Z set, Z3, i
vulnerable, will be monitored in real time to avoid their Z seen, i − ≤ (2)
maloperation under load encroachment condition. A new 2 2
monitoring index (MI) extracted based on positive-sequence fault
component phasors of voltage and current signals, is proposed to where Z set, Z3, i is the setting impedance of zone 3 relay i. Equation
monitor the zone 3 operation of vulnerable relays in stressed (2) represents the circular characteristic of zone 3 mho relay whose
situations. The implementation of the proposed technique requires centre and radius are identified by Z set, Z3, i /2. The distance between
a synchrophasor measurement device (SMD) which can be created the seen impedance trajectory and zone 3 operation boundary is
by reconfiguration of the modern PMUs or GPS-based digital defined as relay margin. The RM using (2) can be yielded as (see
relays to calculate and deliver the fault component phasors of the (3)) From (3), it can be observed that RM is dependent to the bus
current and voltage signals in appropriate rate. Synchrophasor- voltage phase angle and its magnitude, so that their variations can
based real-time vulnerability detection of critical relays by cause the impedance trajectory to enter the zone 3 characteristics.
introducing two novel ranking index and MI, are the main So, phenomena such as overload and power swing can be an
contribution of this study. The simulation results confirm that the important reason in maloperation of relay distance backup zones.
supervision of third zone distance protection using the proposed MI
can successfully discriminate the symmetrical faults from other 2.2 Operation margin trajectory sensitivity
stressed situations and improve the dependability and security of
distance protection scheme. As the relay operation margin is a function of bus voltage, with the
voltage variation during system contingencies the RM trajectory
2 Vulnerability index for identification of critical will be changed. The sensitivity analysis of the RM to the variation
of power system parameters such as bus voltages can be utilised to
zone 3 distance relays quantify the vulnerability of zone 3 distance relays with respect to
Vulnerability assessment is applied as a criterion to determine the the system various disturbances. For the relay located at bus i a
degree of exposure to the hazards and susceptibility of an element redefined RM based on bus voltage has been presented in [14],
or a system at the risk of outage, maloperation or interruption of which is expressed as follows:
service [17]. It is used as a measure for the detection of system's
weakness points which have a major contribution in the occurrence V i2 V i2 − V iV jcos(δi − δ j)
of cascading events. Vulnerability assessment can be used as an Mi = − (4)
Z set, Z3, i Z̄ i j
effective approach for preventing of cascading outages by early
detection of the vulnerable relays which may be incorrectly
operated in stressed conditions. The goal of distance relays The sensitivity of operation margin of the relay i protecting the line
vulnerability assessment is to identify the most critical relays i–j can be obtained as
exposing the maloperation in any operation point to control and
monitor their operation to avoid their contribution in cascading ∂Mi 2 ∂Mi 2 ∂Mi 2 ∂Mi 2
IET Gener. Transm. Distrib., 2017, Vol. 11 Iss. 8, pp. 1878-1888 1879
© The Institution of Engineering and Technology 2017
2.3 Vulnerable relay index fault cases based on fault component equivalent network modelled
by a line with distributed parameters.
A novel VRI to identify the vulnerable zone 3 of distance relays is
extracted based on RM defined in (3) and margin sensitivity
presented in (5) and defined as follows: 3.1 Extraction procedure of fault component phasor
When a power system is exposed to a disturbance, the network
RMi variables such as voltage and current are changed due to the
VRIi = (9)
ΔMi(V i, j, θi, j) disturbance occurrence. The changes created in these variables are
called superimposed components (or fault component when the
VRI is obtained for each relay and applied to identify the critical disturbance is a short-circuit fault) which are obtained by the
zone 3 distance relays exposing the maloperation during load difference between the post-disturbance and pre-disturbance values
encroachment situation in each operating point. The contingency of any network variable [21]. According to the superposition
screening and analysis can also be performed by VRI. It is theorem, a superimposed component equivalent network can be
important to notice that VRI should be calculated in per unit (pu). obtained by eliminating the all pre-disturbance voltage sources and
The relay, which has small RM and high ΔM results in small VRI replacing all network components and loads by their equivalent
and it is exposed the vulnerability. impedances such as network depicted in Fig. 1b [22, 23]. The
corresponding procedure for extracting the positive-sequence fault
component phasors is as follows [24]:
2.4 Threshold selection
To identify the vulnerable relays which are required to be 1. In digital format, the fault superimposed component of the
monitored in stressed conditions, a suitable absolute threshold sampled voltage and current signals can be obtained by
should be selected for VRI. According to the NERC subtracting the existing sample from its corresponding sample
recommendations for relay loadability setting under extreme in the previous cycle. Moreover, to reduce the dynamically
condition, an operational condition by assuming a 0.85 pu voltage load variations effects and power swing on the yield fault
and a power factor angle of 30° or 45° are considered for the component quantity, an extra term represented in the brackets
theoretical maximum loading situation [12, 18, 19]. The theoretical is also computed in the calculation process as follows:
maximum power transfer occurs when the voltage angle between
sending and receiving bus of transmission line is 90° (i.e., ΔY[n] = Y[n] − Y[n − 2N] −
Y[n − 2N] − Y[n − 4N] (11)
δi − δ j = 90∘). On the other hands, according to the IESO System
Operations Manual 7.4 which determines the required standards
where Y[n] and ΔY[n] are the present sample and the fault
and criteria for secure and reliable operation of the IESO-
Controlled Grid of Ontario, following fault clearance or the outage component sample of voltage or current signal Y, respectively.
of an equipment without a fault, the RM on all backup distance N is the number of signal samples captured per power–
relays should be at least 20% [20]. Considering the above- frequency cycle and n is the sample number (n = 0, 1, 2, …,
mentioned criteria to evaluate the distance relay, some conservative etc.). Equation (11) obtains the fault superimposed quantities,
assumptions are made for obtaining an absolute threshold for the just up to two cycles after the fault occurrence with acceptable
proposed VRI in (9) as follows: accuracy. It means that two cycles after the fault inception, the
Y[n − 2N] will be the sample corresponding to Y[n] captured
• δi − δ j is set at 90° (δi − δ j = 90∘). just at fault inception time. However, it is possible to change
the integer numbers of 2 and 4 to the higher values to extract
• Voltage at each bus is set at 0.85 pu (V i = V j = 0.85 pu). the fault component accurately up to more cycles after the fault
• The minimum allowable RM is determined as 20% (i.e., occurrence.
RMi = 0.2 × Z set, Z3, i). 2. Extracting the phasor samples of fault component digital
• The zone 3 setting is assumed to be 2.4 times the impedance of signals (steady-state quantity of fault component) using the full
line i − j [6] (Z set, Z3, i = 2.4 × Z̄ i j). cycle discrete Fourier transform (DFT) algorithm as
N−1 N−1
2 2π
Considering the above-assumption and replacing them in (3) and ΔȲ =
N ∑ ΔY n ⋅ cos
N
n − j ∑ ΔY n
(5)–(8), the following threshold is extracted as a criterion to n=1 k=1
(12)
identify the vulnerable relays at each operating point: 2π
⋅ sin n
N
RMi 0.2 × 2.4 × Z̄ i j(pu)
VRITH − i = = = 0.3373
ΔMi(V i, j, θi, j) (1/ Z̄ i j(pu) ) × 1.423 where ΔȲ is the estimated phasor sample (fundamental-
(10)
2 frequency quantity) of fault component voltage or current
× Z̄ i j(pu) which is obtained during the present data window with the
length of one cycle.
3. The positive-sequence quantities of the extracted fault
As seen, the proposed threshold for identifying the vulnerable component phasors can be obtained as
relays are dependent on the per unit positive-sequence impedance
of the line which is protected by them. The relay whose VRI is less 1 ∘ ∘
than VRITH − i, is identified as vulnerable and it should be ΔȲ 1 = ⋅ ΔȲ a + e j120 ΔȲ b + e j240 ΔȲ c (13)
3
monitored to avoid its likely maloperation under the stressed
condition. To increase the sensitivity in identifying the vulnerable where ΔȲ a, ΔȲ b and ΔȲ c are the phasors quantities of fault
relays, the selected threshold can be set to a high value to choose
component voltage or current yield for phases a, b and c in step
the more relays to be monitored.
2.
3 MI formulation and analysis The aforementioned positive-sequence fault component phasor can
A supervisory control scheme for monitoring the performance of be obtained by a SMD included a programmable microprocessor
the identified vulnerable relays exposing the maloperation due to such as modern PMUs or GPS-equipped digital relays which are
impedance entrance to zone 3, is proposed based on a novel MI. gradually developing across the world. The components of the
The performance of the MI is analysed for internal and external SMD are presented in the following subsection to clarify the
1880 IET Gener. Transm. Distrib., 2017, Vol. 11 Iss. 8, pp. 1878-1888
© The Institution of Engineering and Technology 2017
3.3 MI definition and performance analysis
In this section, a novel MI extracted based on positive-sequence
fault component phasors of voltage and current is introduced and
its interesting performance in internal and external faults is
demonstrated during symmetrical faults. The fault component
voltage and current phasors obtained in each bus of transmission
line are applied to compute the superimposed quantity of complex
power injected into the line which is named fault component
complex power (FCCP). Let ΔŪ m, ΔŪ n be the positive-sequence
fault component voltage phasors obtained at the buses M and N,
respectively, and let ΔI¯m, ΔI¯n be the positive-sequence fault
component current phasors obtained at the buses M and N,
respectively. The proposed MI is defined as
where
IET Gener. Transm. Distrib., 2017, Vol. 11 Iss. 8, pp. 1878-1888 1881
© The Institution of Engineering and Technology 2017
considering that ΔŪ m = − Z mΔI¯m, by rewriting (24) and (25), the
fault component voltage and current phasors at bus N can be
obtained as
1
ΔI¯n = sinh(γl)( − Z mΔI¯m) + cosh(γl)( − ΔI¯m) (29)
ZC
= (cosh(γl)Z m + Z Csinh(γl))
(30)
∗
Zm
sinh(γl) + cosh(γl) ( ΔI¯m )
2
⋅
ZC
1
ΔI¯n = sinh(γl)ΔŪ m + cosh(γl)( − ΔI¯m) (25) As demonstrated in (34), in external faults, the phase angle of
ZC MImn is very close to 0°. Comparison between (34) and (21)
reveals that the proposed MI can be effectively used to discriminate
where ZC, γ and l are the characteristic impedance, propagation the external faults from internal faults. It is worth to notice, that the
constant and line length, respectively. ZC and γ are given by phase angle of FCCP in forward and backward faults is different
(see ∠ΔS̄n). Hence, it can be realised that FCCP has a directional
z feature in diagnosing the fault direction. It is also important to
ZC = (26)
y notice that during the load encroachment condition, the flowing
current through transmission line is abruptly changed and increased
γ = zy (27) such that it can lead to undesired impedance trajectories entrance
into zone 3 characteristic of distance relay. According to the
where z, y are the per unit length values of line positive-sequence superposition theorem, in a network with multiple sources, each
series impedance and shunt admittance, respectively. Now, source and its effect can be analysed independently. Under this
1882 IET Gener. Transm. Distrib., 2017, Vol. 11 Iss. 8, pp. 1878-1888
© The Institution of Engineering and Technology 2017
(see (36)) where θ is the security margin angle which can be set as
30∘ < θ < 60∘. Considering the real condition of the power system,
the suitable setting of θ can be selected. In this study, θ is selected
60°. To make a decision by the MI-based supervisory scheme, the
phase angle of MI should be laid in the defined threshold range in
(35) for five consecutive samples. The proposed supervisory
scheme for monitoring of the vulnerable relays comprises the
following steps:
IET Gener. Transm. Distrib., 2017, Vol. 11 Iss. 8, pp. 1878-1888 1883
© The Institution of Engineering and Technology 2017
Table 1 Ranking results of zone 3 distance relays of WSCC system using VRI
Base load condition Increasing the load at bus 8 by 100%
Relay no RMi ΔMi VRIi Ranking Relay no VRIi Ranking
R87 0.2036 12.8618 0.0158 1 R87 0.0033 1
R78 0.2109 10.5013 0.0201 2 R78 0.0035 2
R46 0.2788 10.2661 0.0272 3 R89 0.0045 3
R57 0.3831 12.5937 0.0304 4 R98 0.0048 4
R89 0.3869 12.5064 0.0310 5 R54 0.0078 5
R75 0.3310 10.4614 0.0317 6 R64 0.0085 6
R45 0.3271 10.2805 0.0318 7 R45 0.0115 7
R64 0.4208 12.8400 0.0327 8 R46 0.0120 8
R98 0.3523 10.6398 0.0331 9 R75 0.0246 9
R54 0.4750 12.8169 0.0371 10 R96 0.0260 10
R96 0.4904 10.6067 0.0462 11 R57 0.0290 11
R69 0.6852 12.5707 0.0545 12 R69 0.0434 12
5 Simulation studies and evaluation 5.2 Performance of MI under symmetrical internal and
external faults
To validate the effectiveness of the proposed monitoring scheme, it
has been evaluated on the 9-bus WSCC system (see Fig. 5) The proposed MI is capable to discriminate between internal fault
simulated in PSCAD/EMTDC software. The system data are and external one. The effects of fault location, fault resistance, fault
presented in [6, 7]. Transmission line lengths are all considered to inception instant and fault type are all investigated on the
be 300 km and lines have been modelled with distributed performance of the MI. The obtained results are given in Table 2.
parameters. Two mho distance relays are assumed to be located at All faults occur at t = 1 s. The value of the MI is obtained
both ends of each line. Zone 3 reach is set to cover the whole according to fifth consecutive sample placed between the
length of the adjacent line. The voltage and current signals are first thresholds presented by (35). As mentioned in Section 5.1, the zone
passed from an anti-aliasing filter and thereafter a one-cycle DFT 3 of relay R78 is identified vulnerable. As regards the R78 protects
is applied to estimate the phasor quantities with sampling rate of 20 the lines 7-8 and 8-9, the MI of these lines are applied to make
samples/cycle. The performance of the proposed algorithm is supervisory decision on the operation of R78. The obtained results
evaluated under various fault and power system conditions as demonstrate the credible operation of the proposed MI in reliable
follows. The SMDs arrangement with PDC and SMPC are shown distinguishing the internal and external faults and their directions in
in Fig. 5. half a cycle. Moreover, despite the distance relay, the proposed MI
is not affected by the value of fault resistance. The purpose of the
5.1 Identification of vulnerable relays based on VRI in steady MI is just to distinguish the symmetrical faults from other events;
state however, as shown in Table 2, the proficiency of the MI is also
realised in asymmetrical faults. Assuming a three-phase fault is
Based on the introduced VRI in Section 2, the zone 3 of distance occurred on line 8-9 at t = 1 s, the voltages and currents of the relay
relays denoted in Fig. 5 are ranked in Table 1 for two operating R89 at bus 8 are shown in Figs. 6a and b, respectively. Fig. 6c
conditions, one is the base load condition and other is the increased shows the phase angle variations of FCCP78, FCCP87 and MI 7-8
load condition at bus 8.In Fig. 5, the positive-sequence impedances during the fault and Fig. 6d depicts the same for line 8-9. It can be
and the lengths of all transmission lines have been assumed to be realised that during a fault in line 8-9, the ≮FCCP78, ≮FCCP89
similar. So, the VRITH–i of all distance relays will be same. The and ≮FCCP98 reflect the phase angle close to −90° confirming the
operation margin of the relays (RM) and margin sensitivity (ΔMi) occurrence of a forward fault. As regards the fault is located behind
defined in (3) and (5) are also presented for base load condition in the R87, the phase angle of FCCP87 is almost reached to +90°. The
per unit values (Sbase 100 MVA, Vbase 400 kV). Considering (10), MI also shows an acceptable response. The presented results in
the threshold value of 0.005 is set for identifying the vulnerable Table 2 reveal the effectiveness of the MI in various fault location
relays. The distance relays based on their VRI values have been and fault inception instant. The bold results in Table 2 indicate the
ranked in descending order in Table 1. As seen, in the base load fault detection by MI of line exposed to fault.
condition, the VRI of all distance relays is bigger than VRITH–i and
it means that none of the relays need to be monitored in this 5.3 Performance of MI during load encroachment
operating point. Another case by increasing the load of bus 8 to Load encroachment phenomenon is resulted due to undesired
twice its steady-state value is analysed. From the results presented impedance trajectories entrance into zone 3 characteristic of
in Table 1, it can be seen that the VRIs of R87, R78, R89 and R98 distance relay in heavy loading condition which is created due to
are less than VRITH–i and they are identified as vulnerable. The power flow redistribution caused by outage of some transmission
relay ranking results in Table 1 demonstrate that the relay, which lines. Considering the NERC emergency loading condition [27], in
has small operation margin due to power flow dispatch instructions order to create the heavy load condition, the load of bus 8 is
and loading condition along with large sensitivity to system increased which leads to increase the flow through the lines 7-8
condition variation is identified as vulnerable relay. For example, and 8-9 and results in the load encroachment into zone 3 region of
in the base load condition, the relay R87 is determined as the first vulnerable relay R78. This event acts similar to an external fault
rank critical relay which has small RM and large ΔMi. It is worth occurring at bus 8. Therefore, it is expected that <FCCP78 and
to notice that the proposed VRI provides incorporation between <FCCP98 will reach close to −90°and the <FCCP87 and <FCCP89
RM and ΔMi to realistically rank the vulnerable relay. For will reach close to +90°. The trajectory of apparent impedance seen
demonstration of the proposed MI performance, the relay R78 is by relay R78 during such condition is depicted in Fig. 7a. As
considered as one of the possible vulnerable relays located in line shown in this figure, the impedance trajectory has encroached into
7-8 to be analysed in different system condition such as fault zone 3 characteristics of relay R78 which may result in
events and load encroachments conditions. unnecessary outage of line 8-9. The response of the proposed MI in
lines 7-8 and 8-9 and their associated ≮FCCP during this situation
are shown in Figs. 7b–d. From Fig. 7d, it is observed that the phase
angle values of MI in both lines 7-8 and 8-9 are reached close to 0°
1884 IET Gener. Transm. Distrib., 2017, Vol. 11 Iss. 8, pp. 1878-1888
© The Institution of Engineering and Technology 2017
Fig. 6 Simulation results for three-phase fault at line 8-9
(a) Three-phase voltages at the location of relay R89, (b) Three-phase currents at the location of relay R89, (c) FCCP78, FCCP87and MI 7-8, (d) FCCP89, FCCP98 and MI 8-9
which confirm the non-fault condition. Thus, the proposed situation created in the case of an external fault which remains at
supervisory scheme of vulnerable zone 3 by MI can effectively near the bus 7 in line 7-5, the values of ∠FCCP in buses 7–9 will
support the reliable operation of these relays in such a stressed be shown in Figs. 9c and d. The response of the MI for lines 7-8
condition. and 8-9 is depicted in Figs. 9c and d. As shown, the phase angle
represented by MI 7-8 and MI 8-9 confirm the non-fault condition
5.4 Performance of MI for the three-phase faults during the and avoids relay undesired operation.
load encroachment
Another important challenge involved in distance relays is their 6 Conclusion
inability in discriminating between three-phase fault and load Zone 3 unit of a distance relay has difficulty to discriminate a
encroachment events which are occurred simultaneously. To three-phase fault from other stressed conditions. Maloperation of
evaluate the performance of the proposed MI, a three-phase fault the zone 3 of distance relay during static and dynamic load
during load encroachment condition as in Section 5.3, is simulated encroachment has been reported as one of the most important
in line 7-8. Corresponding results are represented in Fig. 8. reasons in triggering the cascading outages worldwide. In this
Impedance trajectory variations in this situation are depicted in paper, a novel real-time monitoring scheme has been proposed
Fig. 8a. From Fig. 8d, it is observed that initially due to load based on synchrophasor measurements for providing a reliable
encroachment the MI of line 7-8 (MI 7-8) represents the phase supervisory control over the vulnerable zone 3 of distance relays.
angle close to 0° confirming the non-fault situation. However, The critical distance relays are first identified and ranked by
when a three-phase fault occurs in line 7-8 at t = 1.04 s, the value extracting the synchrophasor-based vulnerability index in each
of the MI phase angle is immediately changed to −180° operating condition. This new index is composed of relay operation
demonstrating the validity of the proposed index in diagnosing the margin and as well as margin sensitivity toward the voltage
symmetrical fault occurred during load encroachment condition. magnitude variation and its angular difference. Thereafter, a new
Moreover, it is important to notice that the corresponding MI in MI is introduced using fault component phasor quantities to
line 8-9 during fault occurrence still remains at its previous value. support the reliable operation of identified vulnerable relays to
avoid their likely maloperation under load encroachment condition.
5.5 Performance of MI during power swing The simulation results affirm the efficiency and capability of the
proposed index in reliable and fast distinguishing the fault situation
To validate the performance of the proposed index during the from load encroachment events. The introduced MI is also not
power swing, a three-phase fault is created at line 7-5 near to bus 7 affected by fault resistance, fault type, fault location and fault
at 1 s and is removed after 0.6 s by opening the both end breakers. inception angle. In addition, the proposed method can also be used
This causes an unstable power swing into the system. The voltage in wide area backup protection schemes.
and current signals at the location of relay R78 are shown in
Fig. 9a. As shown in Fig. 9b, the seen impedance of vulnerable
relay R78 enters the zone 3 and crosses it periodically during
power swing. As regards the power swing will result in continuous
change of current flowing the lines 7-8 and 8-9, the superimposed
current will continue to exist in same direction in sending and
receiving ends of transmission lines. Therefore, similar to the
IET Gener. Transm. Distrib., 2017, Vol. 11 Iss. 8, pp. 1878-1888 1885
© The Institution of Engineering and Technology 2017
Table 2 Effects of fault location, fault resistance, fault inception instant and fault type on MI
Fault ∠FCCP78 = ∠ΔS̄78, deg . ∠FCCP87 = ∠ΔS̄87, deg . MI7-8 ∠FCCP89 = ∠ΔS̄89, deg . ∠FCCP98 = ∠ΔS̄98, deg . MI8-9
detection
instant, s
Effect of fault location (ABC fault)
Fault location
0.25 line 7-8 1.008 −95 −105 −200 +90 −83 +7
0.5 line 7-8 1.008 −93 −104 −197 +85 −87 −2
0.75 line 7-8 1.008 −92 −103 −195 +86 −86 0
0.25 line 8-9 1.008 −86 +87 +1 −101 −89 −190
0.5 line 8-9 1.008 −85 +83 −2 −107 −91 −198
0.75 line 8-9 1.008 −84 +88 +4 −107 −92 −199
Effect of fault inception instant (ABC fault in 0.5 line 7-8)
Fault
inception
instant, s
1.002 1.01 −94 −107 −201 +89 −80 +9
1.008 1.016 −91 −103 −194 +86 −90 −4
1.015 1.023 −97 −100 −197 +83 −90 −7
1.02 1.028 −90 −108 −198 +88 −84 +4
Effect of fault resistance (ABC fault in 0.5 line 7-8)
Fault
resistance, Ω
0 1.008 −90 −105 −195 +88 −82 +6
10 1.008 −89 −108 −197 +89 −84 +4
50 1.008 −87 −111 −198 +90 −81 +9
100 1.008 −83 −109 −192 +90 −83 +7
500 1.008 −80 −110 −190 +95 −80 +15
Effect of fault type in 0.5 line 7-8
Fault type
AG 1.008 −76 −110 −186 +94 −80 +14
ABG 1.008 −80 −114 −194 +95 −84 +11
AB 1.008 −82 −98 −180 +81 −79 +2
ABC 1.008 −90 −108 −198 +85 −87 −2
1886 IET Gener. Transm. Distrib., 2017, Vol. 11 Iss. 8, pp. 1878-1888
© The Institution of Engineering and Technology 2017
Fig. 7 Simulation results during load encroachment
(a) Impedance trajectory seen by relay R78, (b) ≮FCCP78, ≮FCCP87, (c) ≮FCCP89, ≮FCCP98, (d) MI of lines 7-8 and 8-9
Fig. 8 Simulation results for three-phase fault at line 7-8 during load encroachment
(a) Impedance trajectory seen by relay R78, (b) ≮FCCP78, ≮FCCP87, (c) ≮FCCP89, ≮FCCP98, (d) MI of lines 7-8 and 8-9
IET Gener. Transm. Distrib., 2017, Vol. 11 Iss. 8, pp. 1878-1888 1887
© The Institution of Engineering and Technology 2017
Fig. 9 Simulation results during unstable power swing
(a) Voltage and current signals at location of relay R78, (b) Impedance trajectory seen by relay R78, (c) ≮FCCP78, ≮FCCP87 and MI of line 7-8, (d)≮FCCP89, ≮FCCP98 and MI
of line 8-9
7 References power swing and voltage instability’, IEEE Trans. Power Deliv., 2012, 27,
(3), pp. 1124–1133
[1] Phadke, A.G., Thorp, J.S.: ‘Expose hidden failures to prevent cascading [14] Li, S.H., Yorino, N., Zoka, Y.: ‘Operation margin analysis of zone 3
outages’, IEEE Comput. Appl. Power, 1996, 9, (3), pp. 20–23 impedance relay based on sensitivities to power injection’, IET Genr. Transm.
[2] Tan, J.C., Crossley, P.A., McLaren, P.G., et al.: ‘Application of a wide area Distrib., 2007, 1, (2), pp. 312–317
backup protection expert system to prevent cascading outages’, IEEE Trans. [15] Bai, H., Ajjarapu, V.: ‘Transmission system vulnerability assessment based on
Power Deliv., 2002, 17, (2), pp. 375–380 practical identification of critical relays and contingencies’. In Power and
[3] Powergrid: ‘Report of the enquiry committee on grid disturbance in northern Energy Society General Meeting-Conversion and Delivery of Electrical
region on 30 July 2012 and in Northern, Eastern and North-Eastern Region on Energy in the 21st Century, Pittsburgh, PA, USA, July 2008, pp. 1–8
31 July 2012’. Tech Rep. GRID_ENQ_REP_16_8_12, New Delhi, India, [16] Jin, M., Sidhu, T.S.: ‘Adaptive load encroachment prevention scheme for
2012 distance protection’, Electr. Power Syst. Res., 2008, 78, (10), pp. 1693–1700
[4] Eissa, M.M., Masoud, M.E., Elanwar, M.M.M.A.: ‘A novel back up wide area [17] Kröger, W., Zio, E.: ‘Vulnerable systems’ (Springer Science & Business
protection technique for power transmission grids using phasor measurement Media, 2011)
unit’, IEEE Trans. Power Deliv., 2010, 25, (1), pp. 270–278 [18] NERC: ‘Planning committee report-methods to increase line relay
[5] He, Z., Zhang, Z., Chen, W., et al.: ‘Wide-area backup protection algorithm loadability’. 7 June 2006. Available at www.NERC.com
based on fault component voltage distribution’, IEEE Trans. Power Deliv., [19] NERC: ‘Relay loadability exceptions: determination and application of
2011, 26, (4), pp. 2752–2760 practical relaying loadability ratings’. August 2005. Available at http://
[6] Nayak, P.K., Pradhan, A.K., Bajpai, P.: ‘Wide-area measurement-based www.nerc.com/~filez/spctf.html
backup protection for power network with series compensation’, IEEE Trans. [20] IMP_POL_0002, P.U.B.L.I.C.: ‘Market Manual 7.4: IESO-controlled grid
Power Deliv., 2014, 29, (4), pp. 1970–1977 operating policies’. 14 September 2016, Issue 34. Available at http://
[7] Jena, M.K., Samantaray, S.R., Panigrahi, B.K.: ‘A new wide-area backup www.ieso.ca/Documents/systemOps/so_GridOpPolicies.pdf
protection scheme for series-compensated transmission system’, IEEE Trans. [21] Johns, A.T., Salman, S.K.: ‘Digital protection for power systems’ (Peregrinus,
Power Deliv., August 2015, to be published London, UK, 1995)
[8] Suonan, J., Liu, K., Song, G.: ‘A novel UHV/EHV transmission-line pilot [22] Saadat, H.: ‘Power system analysis’ (McGraw-Hill, 1999)
protection based on fault component integrated impedance’, IEEE Trans. [23] Bolandi, T.G., Seyedi, H., Hashemi, S.M.: ‘Protection of transmission lines
Power Deliv., 2011, 26, (1), pp. 127–134 using fault component integrated power’, IET Genr. Transm. Distrib., 2014, 8,
[9] Ghanizadeh Bolandi, T., Seyedi, H., Hashemi, S.M., et al.: ‘Impedance- (12), pp. 2163–2172
differential protection: a new approach to transmission-line pilot protection’, [24] Gao, H., Crossley, P.A.: ‘Design and evaluation of a directional algorithm for
IEEE Trans. Power Deliv., 2015, 30, (6), pp. 2510–2518 transmission-line protection based on positive sequence fault components’,
[10] Zare, J., Aminifar, F., Sanaye-Pasand, M.: ‘Synchrophasor-based wide-area Proc. IET Gener. Transm. Distrib., 2006, 153, (6), pp. 711–718
backup protection scheme with data requirement analysis’, IEEE Trans. [25] Phadke, A.G., Thorp, J.S.: ‘Synchronized phasor measurements and their
Power Deliv., 2015, 30, (3), pp. 1410–1419 applications’ (Springer Science and Business Media, New York, 2008)
[11] Kundu, P., Pradhan, A.K.: ‘Synchrophasor-assisted zone 3 operation’, IEEE [26] Häger, U., Rehtanz, C., Voropai, N. (EDs.): ‘Monitoring, control and
Trans. Power Deliv., 2014, 29, (2), pp. 660–667 protection of interconnected power systems’ (Springer, 2014)
[12] Nayak, P.K., Pradhan, A.K., Bajpai, P.: ‘Secured zone 3 protection during [27] NERC, NERC recommendations to August 14, 2003 blackout-prevent and
stressed condition’, IEEE Trans. Power Deliv., 2015, 30, (1), pp. 89–96 mitigate the impacts of future cascading blackouts, 2003. Available at
[13] Seethalekshmi, K., Singh, S.N., Srivastava, S.C.: ‘A classification approach www.NERC.com
using support vector machines to prevent distance relay maloperation under
1888 IET Gener. Transm. Distrib., 2017, Vol. 11 Iss. 8, pp. 1878-1888
© The Institution of Engineering and Technology 2017