Sei sulla pagina 1di 8

This article has been accepted for inclusion in a future issue of this journal.

Content is final as presented, with the exception of pagination.

IEEE SYSTEMS JOURNAL 1

Event-Triggered Vulnerable Relay Identification and


Supervision to Prevent Zone-3 Mal-Operations
Manas Kumar Jena and Bijaya Ketan Panigrahi , Senior Member, IEEE

Abstract—Most of the recently occurred cascaded outages are RM of the healthy relays of the system. Thus, in the planning
resulted due to zone-3 mal-operations of distance relays. This pa- level, it is essential to monitor the effect of N − 1 contingency
per introduces some new sensitivity factors to identify and monitor
[5] on the change in RM of the healthy relays. N − 1 indicates
vulnerable relays functioning in the power transmission network.
This information will help in enhancing the back-up protection op- one credible contingency event, such as line outage or generator
eration of the power transmission system. To accomplish this task, outage [5].
indices such as line-outage-induced relay margin shift factor and The concept of RM is demonstrated in [4], where the RM is
generation-outage-induced relay margin shift factor are defined. used to access dynamic security of the power system. RM is
An offline analysis of the power system is made to calculate the derived as a function of bus voltage in [6]. Bai and Ajjarapu
above two factors. This information helps in ranking the relays
of the power system in terms of their vulnerability. Once the vul- [7] have suggested a new technique for transmission system
nerable relays are identified, their zone-3 operation is supervised vulnerability assessment based on identifying critical relays. In
by a new wide area information-based event detection logic. IEEE [8], a multiagent system-based technique is proposed to identify
9-bus and IEEE 39-bus test systems are used to validate the pro- vulnerable relays. In [9], an event understanding framework is
posed scheme. The test results indicate that the proposed scheme suggested to enhance situational awareness. A zone-3 modifica-
can enhance the back-up protection operation of transmission net-
work, which is very much essential to mitigate blackouts. tion scheme that can avoid undesirable line outages is reported
in [10]. Several relay ranking schemes have been proposed to
Index Terms—Back-up protection, blackouts, cascaded fail- identify vulnerable relays in a network. The effect of change in
ures, distance relay, phasor measurement unit (PMU), relay mal-
operation, vulnerable relay.
network topology on distance relay is analyzed in [11]. In [12],
the relays are ranked based on Lyapunov stability criterion re-
lated to the severity of power swing. RM concept has been used
I. INTRODUCTION in [4] to measure the closeness of a relay from issuing a trip sig-
NHANCING security of back-up protection operation is nal. A new approach is reported in [13], to locate all the electrical
E one of the major need of today’s smart power system [1]–
[8]. It will certainly help in alleviating cascaded tripping leading
centers following an unstable swing. In [14], authors have used
branch loss sensitivity measure presented in [15] to propose a
to blackouts [2]–[4]. Undesired relay operations have been con- relay ranking index (RRI). The performance of various power
sidered as one of the main culprits behind propagation of most swing detection algorithms for the relays on the series compen-
of the blackouts. The point to be noticed here is that “not all sated lines are compared in [16]. The existing literatures either
relay mal-operations lead to cascaded outages.” There are some focus on finding vulnerable relay or on zone-3 supervision. The
vulnerable relays operating in the power system whose mal- suggested scheme is a comprehensive one where in the offline
operation leads to cascaded disturbance propagation. Thus, iden- process, vulnerable relays are identified and in real time, only
tification and real-time supervision of such vulnerable relays is those relays are supervised to prevent relay mal-operation.
very much essential. Furthermore, relay vulnerability is depen- The main contribution of this research paper is to introduce
dent on one or more contingency occurring in the power trans- two sensitivity factors that quantify the effect of (N − 1) con-
mission system. This leads to the fact that there is need of some tingency on the RM. Following tripping of any transmission
new sensitivity factors that will quantify the relay vulnerability line or any generator, the RM of other healthy relays gets af-
based on one or more contingency. Relay margin (RM) of a re- fected. In this research paper, the following two factors are
lay is defined as the difference between the apparent impedance introduced:
and operation impedance (zone-3 characteristics [5]) at a spe- 1) line-outage-induced relay margin shift factor (LRMSF);
cific load angle. Contingencies such as line outage, generation 2) generation-outage-induced relay margin shift factor
outage, and relay mal-operation in some place lead to change in (GRMSF).
These factors will help the system operator to rank all the
relays of the power system in decreasing order of their vulnera-
Manuscript received May 6, 2018; revised December 8, 2018 and April 13,
2019; accepted May 23, 2019. (Corresponding author: Manas Kumar Jena.)
bility corresponding to each of the contingency (line outage or
M. K. Jena is with General Electric (GE-Power), HTC, Hyderabad 500081, generator outage). An offline analysis is made to calculate these
India (e-mail: kumarmanas88@gmail.com). factors for the power system under study. Each factor results in
B. K. Panigrahi is with the Indian Institute of Technology Delhi, New Delhi
110016, India (e-mail: bkpanigrahi@ee.iitd.ac.in).
a matrix that relates the effect of each contingency to the RM.
Digital Object Identifier 10.1109/JSYST.2019.2919567 The matrices are named as LRMSF matrix and GRMSF matrix.

1937-9234 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

2 IEEE SYSTEMS JOURNAL

Fig. 2. Characteristics of a simple mho relay.


Fig. 1. Sample power transmission system.
For the system shown in Fig. 1, RM can be expressed as
follows:
After getting the vulnerable relay ranking corresponding to
each contingency, the relays whose zone-3 operations need RM = Zapp − Zop (1)
 2  2
supervision by a new algorithm are decided. In this paper, the
relays having high cumulative LRMSF and GRMSF are treated V̄m2 − V̄m V̄n cosθmn + V̄m V̄n sinθmn
S̄mn = . (2)
as “highly vulnerable (HV).” Once the HV relays are identified, zmn
their zone-3 operation is supervised by a wide area information- From Fig. 2, it can be seen that
based event detection (ED) algorithm. The ED algorithm is ϕmn = θl − Δθ (3)
developed using a lately proposed signal decomposition tech-
where  
nique named as “variational mode decomposition (VMD)” [17],   
V̄m  V̄n  sinθmn
[18]. The intrinsic mode functions (IMFs) obtained through Δθ = tan−1  2      (4)
VMD are used as input to a data-mining model known as V̄m − V̄m V̄n cosθmn
“random forest (RF).” In recent times, data-mining approach
V̄m2 Zl V̄m
has been suggested to solve various power system problems Zapp = =  2  2
S̄mn
[18]–[21]. The RF model helps in identifying contingencies V̄m − V̄n cosθmn + V̄n sinθmn
such as generator tripping, line tripping, and transmission (5)
system faults, occurring in the system. If a fault situation is
identified by both the ED model and any of the HV relays of (RM)mn = Zapp − Zop (6)
the transmission system, then only final trip signal is sent to  
Z̄l V̄m Z̄ri V̄m − V̄n cosθmn
the corresponding circuit breaker (CB). However, if ED model =  2  2 . (7)
does not identify any faulty situation and zone-3 of any HV V̄m − V̄n cosθmn + V̄n sinθmn
relay predicts a fault in the system, then the situation is treated
The apparent impedance seen by the distance relay can be
as a case of zone-3 mal-operation. This helps in improving
expressed as [4]
the security feature of the protection scheme. Thus, the two  2  2
important contributions of this paper are as follows. V̄m  (Pmn + jQmn ) V̄m  S̄mn
Zapp = =   (8)
1) Introduction of two sensitivity factors to identify vulner- 2 2
Pmn + Qmn S̄mn 2
able relays. and
2) Introduction of a new ED logic that supervises vulnerable
distance relays. Zop = Zl cosΔθ (9)
The rest of the manuscript is organized as follows. The formu- where
lation of sensitivity factors is detailed in Section II. The method- Zapp apparent impedance seen at bus m;
ology of the suggested scheme and ED algorithm is presented V̄mp voltage phasor at bus m;
in Sections III and IV, respectively. A discussion section is kept S̄mn complex power flow;
in Section V. Finally, the conclusion of this research paper is Pmn active power flow;
provided in Section VI. Qmn reactive power flow;
V̄mp voltage phasor at bus m = V̄m ∠θm ;
II. FORMULATION OF RM SENSITIVITY FACTORS V̄np voltage phasor at bus n = V̄n ∠θn .
The RM of a distance relay is defined as the distance between
apparent impedance (Zapp ) and operation impedance (Zop ) cor- It can be inferred from Fig. 3 that the radius of the circle
responding to a particular load angle. As shown in Fig. 1, the corresponding to the trajectory of the apparent impedance de-
apparent impedance sensed by the distance relay located at bus pends on the complex power flow through the transmission line.
m depends on the complex power flow in the line along with Larger complex power flow through the line leads to smaller
magnitude and the power factor of the load impedance. The RM radius of the apparent impedance trajectory (O1 , O2 ). It is also
for a typical mho relay is shown in Fig. 2. evident that the trajectory moves in the direction of T1 as the
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

JENA AND PANIGRAHI: EVENT-TRIGGERED VULNERABLE RELAY IDENTIFICATION AND SUPERVISION 3

following two sensitivity factors are introduced in the proposed


scheme.
1) Line outage induced relay margin shift factor
ΔRM
LRMSF = (10)
fk0
where
ΔRM = change in RM following line outage
= RMinitial − RMfinal
ΔRM is + ve, apparent impedance is close to zone − 3;
Fig. 3. Effect of change in complex power and the power factor on trajectory
of apparent impedance. ΔRM is − ve, apparent impedance is away from zone − 3;
and fk0 = original power flow on line k

2) Generation outage induced relay margin shift factor


ΔRM
GRMSF = (11)
ΔPi
where ΔPi is the change in generation at bus i.
The above two factors can provide sufficient information re-
garding the critical transmission line, critical generator, and crit-
ical relay of a power system. In this paper, critical line is such
line whose outage results in maximum change in RM (positive
value) of any relay operating in the power system. Similarly,
critical generator is that generator whose outage causes maxi-
mum change in RM (positive value) of any relay operating in
Fig. 4. Effect of change in active and reactive power flow on trajectory of the power system. The most vulnerable relay is the one whose
apparent impedance.
RM gives maximum deviation (positive) in response to any one
of the contingencies of the power system. The proposed sensi-
tivity factors result in two matrices named as LRMSF matrix
power factor decreases. Thus, it is concluded that both decrease
and GRMSF matrix. LRMSF matrix is stored in such a way
in power factor and increase in complex power flow decrease the
that each row corresponds to one line in the power network, and
RM. A similar inference is also made in [3]. It is also evident
each column corresponds to each relay of the transmission sys-
that incidents such as generator outage and line outage (planned
tem. Similarly, GRMSF matrix is stored in such a way that each
or mal-operation) lead to redistribution of power flows through
row corresponds to one generator of the power system, and each
transmission lines. These power flow redistribution may lead
column corresponds to each relay of the transmission system.
to substantial change in RM of distance relays operating in the
Both the LRMSF matrix and GRMSF matrix can be obtained
power system.
in the offline process. This will help in ranking all the relays in
The effect of increase in active and reactive power flow on
decreasing order of their vulnerability. Once the vulnerable re-
the RM can be observed from Fig. 4 [3]. The trajectory of the
lays are identified, their operation can be supervised in real time.
apparent impedance (denoted as P) moves in the T2 direction as
With this background, the idea behind the proposed supervisory
the reactive power flow increases. Similarly, the trajectory of the
back-up protection scheme is explained in the following section.
apparent impedance (denoted as O) moves in the T1 direction as
the active power flow increases. Therefore, an increase in active
or reactive power flow will certainly decrease the RM. III. PROPOSED SCHEME
The following points are to be noticed. In this section, an ED algorithm is suggested that supervises
1) Change in active or reactive power flow affects the RM. the zone-3 operation of HV relays. Fig. 5 shows the flowchart of
2) Change in load power factor will also affect the RM. the proposed scheme. As shown in the figure, the HV relays of
3) RM can be positive or negative or zero. A positive RM a transmission system are initially identified using the LRMSF
indicates that the apparent impedance is away from the and GRMSF factors. Phasor measurement units (PMUs) are as-
trip boundary of distance relay. A negative RM indicates sumed to be installed on buses corresponding to the HV relays.
a faulty situation, where the apparent impedance is within The identification of HV relays greatly reduces the requirement
the zones of distance relay. A zero RM indicates that the of PMUs.
apparent impedance is on the trip boundary of distance The positive sequence voltage (f ) information obtained from
relay. PMUs is processed through VMD tool to extract IMFs present
Any line outage or generator outage may lead to change in in the signal. Generally, the first three IMFs capture sufficient
power flow in the line or change in load power factor. Thus, the information regarding modes present in the input signal.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

4 IEEE SYSTEMS JOURNAL

Fig. 6. SLD of WSCC 9-bus system.

TABLE I
GRMSF AND LRMSF OBTAINED FOR WSCC 9-BUS SYSTEM

Fig. 5. Conceptual flow diagram of the proposed scheme.

In case of VMD, the following constrained variational prob-


lem is solved [17]:


2 

j


min
∂t δ (t) + ∗ vm (t) e −jωm t

{vm },{ωm }
πt

m 2

Subjected to vm = f (12)
m
where f is the original signal (positive sequence voltage mag-
nitude), vm is the mth mode, and ωm is the center frequency
around which vm is mostly constant.
In order to solve (12), a quadratic penalty and Lagrangian as dynamic security assessment, development of catastrophic
multiplier is introduced in [17]. The augmented Lagrangian is predictors. [18]–[23]. Thus, the zone-3 operations of HV relays
set by using are logically connected through “AND” operator with the “ED”


2

algorithm. That means both the logics must agree that there is
L (vm , ωm , λ) = α
∂t δ (t) + j ∗ vm (t) e−jωm t
a remote end fault happening in the system before sending the

πt

m 2 final trip signal to the CB. Zone-3 of limited number of relays




  is needed to be supervised by the ED logic. This is the main


2
+
f − vm
+ λ, f − vm (13) advantage of the suggested technique.
2
where α is a balancing parameter. Parameter α is chosen as 250. The proposed scheme has been evaluated on the 9-bus Western
To solve the variational problem in (13), alternate direction System Coordinating Council (WSCC) system and IEEE 39-bus
method of multiplier (ADMM) approach is suggested in [17]. system simulated in PSCAD/EMTDC software. The system data
Thus, each mode is represented as are presented in [24] and [25], respectively.

fˆ (ω) − i=m v̂m (ω) + λ̂ (ω) /2) A. WSCC 9-Bus System
v m = . (14)
1 + 2α(ω − ωm )2 The single line diagram (SLD) for WSCC 9-bus system is
Contingencies such as generator tripping, line tripping, shown in Fig. 6. It consists of three generators [24]. LRMSF
and transmission line faults provide various spectral modes. and GRMSF are calculated for the 9-bus system and the list of
These modes help in differentiating a fault event from other HV relays for this system is listed in Table I. It is found that
disturbances. In this paper, entropy (E) and standard deviation RM of relays protecting line 7–8 and line 7–5 is mostly affected
(S.D.) corresponding to first “3” IMFs of the PMU data are se- due to line outage or generator outage. These relays are marked
lected. These signals are used as input features for the predictor as “RED” in Fig. 6. Thus, it is decided to supervise zone-3
model. In the proposed scheme, RF is chosen as a predictor operation of these relays only. It is to be noticed that forward
because of its high prediction accuracy. In recent times, RF has zone-3 is utilized to provide back-up protection to downstream
been successfully used in many power system applications, such lines. The timer of the zone-3 is set at 75 cycles [18].
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

JENA AND PANIGRAHI: EVENT-TRIGGERED VULNERABLE RELAY IDENTIFICATION AND SUPERVISION 5

Fig. 7. SLD of IEEE 39-bus test system.


Fig. 8. Three modes observed at bus-25 following G-9 outage.

TABLE II
GRMSF AND LRMSF OBTAINED FOR IEEE 39-BUS SYSTEM

B. IEEE 39-Bus System Fig. 9. Three modes observed at bus-25 following line 26–28 outage.
The IEEE 39-bus system considered for the validation of the
proposed scheme is shown in Fig. 7 [25]. The dynamic data
of the system are referred from [25]. The IEEE 39-bus system As discussed earlier, different power system events leave dif-
constitutes 46 numbers of transmission lines. Thus, GRMSF ferent spectral modes in the voltage or frequency signal of the
and LRMSF of 92 relays are calculated for IEEE 39-bus system. power system. The statistical properties of these modes assist in
GRMSF and LRMSF of the 10 most HV relays are listed in Table distinguishing different power system contingencies. In order to
II. It is observed that RM of relays such as 14–15, 15–14, 16– show this, three events such as generator outage (G9 of Fig. 7),
15, 1–2, 2–1, 6–5, 5–6, 25–26, 21–22, 22–21 are mostly affected line outage (line 26–28), and line faults (three phase bolted fault
following generator tripping or line tripping in the system. These at 50% of line 26–28) are simulated in IEEE 39-bus system.
relays are marked as “RED” in the SLD of the IEEE 39-bus Positive sequence voltage magnitude signal at bus-25 (one of
system (see Fig. 7). the HV relay) is passed through VMD and the modes extracted
are shown through Figs. 8–10. It is observed from Fig. 10 that
the amplitude of mode-2 and mode-3 is more in case of fault
IV. EVENT DETECTION
event compared to other two scenarios (looking at the y-axis
The main objective of ED algorithm is to correctly identify of each reconstructed mode).The primary reason behind this is
fault situation and to assist the HV relays in making a reliable that faults induce high-frequency transients that are captured
back-up protection decision. To achieve the same, a recently by the PMUs. Subsequent decomposition of PMU signal using
developed VMD technique is used, which helps in extracting VMD tool helps in identifying fault events. Thus, in the proposed
various modes present in the PMU signal. These modes help scheme E and S.D. [27] corresponding to first “3” IMFs of the
in distinguishing fault situations from other power system dis- voltage signal are considered input features to the RF model.
turbances. Advantage of VMD based preprocessing over other The training of the RF model is accomplished by simulating
existing schemes is detailed in [17], [18], and [28]. different contingencies in the power system with variations in
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

6 IEEE SYSTEMS JOURNAL

Fig. 10. Three modes observed at bus-25 following three phase fault on line
26–28.

Fig. 12. Error convergence for IEEE 39-bus system.

TABLE III
PERFORMANCE DURING STRESSED CONDITIONS IN WSCC SYSTEM

Fig. 11. Error convergence for WSCC 9-bus system.

different parameters. In this research paper, the following types


of disturbances are simulated:
1) generator outage;
2) line outage; V. RESULTS AND DISCUSSION
3) line to ground fault, line to line fault, line to line to ground The suggested scheme intends to locate the vulnerable relays
fault, three phase fault (with variations in fault location operating in the power system in the off-line process. Once the
from 10% of line to 90%, fault resistance variation from vulnerable relays are identified, their zone-3 operation is super-
0.01 to 100 Ω, variations in fault inception angle). vised by the ED logic. We noticed that the suggested scheme
The target output is divided into two classes. Any disturbance performs securely during power swing and load encroachment
apart from fault situation is kept in class-0. The fault cases are conditions. The simulation results are detailed as follows.
kept in class-1. Rattle software package [23] is used for RF
modeling. Total 1214 and 10 120 disturbances are simulated
for WSCC 9-bus and IEEE 39-bus system, respectively. 70% A. Enhancing Security During Stressed Power
System Conditions
of the total data set are used for training purpose. Rest 30% of
data are used for testing. The error convergence for out of bag The performance of the suggested algorithm is tested for var-
(OOB, which is 30% of unseen test data set) cases of both the ious stressed conditions. Stressed conditions often cause zone-3
test systems are shown in Figs. 11 and 12, respectively. It is mal-operations. Thus, it is essential to observe the combined
observed that in case of the WSCC 9-bus system, the OOB er- effect of the suggested ED logic and existing zone-3 relays
ror is stabilized after around 20 trees. Whereas in case of IEEE in stressed conditions. The performance of both zone-3 relays
39-bus system, the OOB error stabilizes after 90 trees. It is in- and the proposed ED logic is detailed in Tables III and IV. In
ferred from the above result that with the addition of additional case of the WSCC 9-bus system, three cases each from stable
trees to the forest marginal changes in the error is possible. It swing, load encroachment, generator outage, and line outage
is also observed from the plots that the OOB misclassification are simulated. All total 12 stressed situations are created, and
error is higher for the fault cases than the other power system it is observed that zone-3 mal-operations take place for nine
disturbances. It happened because of the large variations in fault cases (all HV relays). Two test cases where stable power swing
parameters adapted in this paper. caused zone-3 mal-operation of relay 7–8 are shown in Fig. 13(a)
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

JENA AND PANIGRAHI: EVENT-TRIGGERED VULNERABLE RELAY IDENTIFICATION AND SUPERVISION 7

TABLE IV
PERFORMANCE DURING STRESSED CONDITIONS IN THE 39-BUS SYSTEM

Fig. 14. Real-time test bed to test efficacy of ED logic.

this case as a fault condition. However, no mal-operation is ob-


served in case of proposed ED logic. As both the zone-3 relay
and ED logic are connected through logical “AND” operator,
thus both the logics must provide digital “1” as output in order
to send the final trip signal to the CB. This prevents undesired
tripping of lines during stressed conditions. The effectiveness of
the proposed scheme has been verified by comparing it to the
conventional blinder based schemes. The blinder settings de-
scribed in [29] are used for the comparison. The inner blinder
is kept outside the protection zone-3 characteristics. The outer
blinder settings are considered to keep 5% security margin resis-
tively away from the possible maximum load, and 20% margin
reactively away from the maximum reach of the distance relay
(mho type). As observed from Fig. 13(a) and (b), the apparent
impedance crosses both outer and inner blinder because of sta-
ble swing conditions. However, the blinder-based schemes miss-
classify the stable swing condition as unstable swing (incorrect
operation). Similarly, in case of IEEE 39-bus system, 80 stressed
situations are simulated out of which zone-3 of HV relays mal-
operated in 58 cases. However, no mal-operation is observed in
case of proposed ED logic. Thus, the proposed scheme reliably
supervises operations of HV zone-3 relays.

B. Testing Using Real-Time Digital Simulator


Fig. 13. (a) Zone-3 mal-operation at relay 7–8 due to power swing condition Fig. 14 shows configuration of the real-time test bed for
(contingency-1). (b) Zone-3 mal-operation at relay 7–8 due to power swing evaluation of proposed ED logic. The test bed is implemented
condition (contingency-2).
using Opal-RT simulator [30]. The RT-LAB software module
allows employing virtual PMUs within the power system model
and (b). The contingency-1 [see Fig. 13(a)] is created by simu- and directly sends PMU streams via C37.118.2011 protocols to
lating a three-phase fault at 30% of line 7–5 of the WSCC 9-bus phasor data concentrator (PDC). We tested the efficacy of ED
system and clearing the fault by opening the CBs at both ends of logic for fault conditions by simulating the IEEE 9-bus system
line 7–5 after 0.1 s of fault inception. Similarly, the contingency- on one Opal-RT simulator and the ED logic on another Opal-RT
2 [see Fig. 13(b)] is simulated by incepting a three-phase fault simulator. Virtual PMUs are used to send the C37.118.2011
at 10% of line 9–6 and clearing the fault by opening the CBs compliant positive sequence phasors to the virtual PDC. The
at both ends of line 9–6 after 0.15 s of fault inception. These virtual PDC processes the data and sends the trip signal back to
events create power swing on line 7–8. As shown in the figure, the simulator where power system is modeled. More than 100
the apparent impedance seen by relay at bus-7 protecting line 7– cases are verified on this real-time platform. One test case is
8 stays within the zone-3 characteristics for a time period which detailed here. A three-phase bolted fault is incepted at 50% of
is more than the timer setting (75 cycles [29]) of the correspond- line 7–8 of the WSCC 9-bus system as shown in Fig. 14. It is
ing zone-3 relay. Thus, the relay provides trip signal predicting observed that following fault inception the ED logic provides
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

8 IEEE SYSTEMS JOURNAL

the trip signal to the corresponding circuit breaker and as soon [9] C. Basu et al., “Understanding events for wide-area situational aware-
as the fault is removed, the trip signal is withdrawn. This shows ness,” in Proc. IEEE Power Energy Soc. Innov. Smart Grid Technol. Conf.,
Washington, DC, USA, 2014, pp. 1–5.
the dependability of the suggested ED logic. [10] V. Nikolaidis, “Emergency zone 3 modification as a local response-driven
protection measure against system collapse,” IEEE Trans. Power Del.,
C. Real-Time Vulnerable Relay Identification vol. 31, no. 5, pp. 2114–2122, Oct. 2016.
[11] M. Tasdighi and M. Kezunovic, “Impact analysis of network topology
The suggested indices can be derived in real time using PMU change on transmission distance relay settings,” in Proc. IEEE Power En-
ergy Soc. Gen. Meeting, Denver, CO, USA, 2015, pp. 1–5.
information. The modern day distance relays such as SEL-421 [12] C. Singh and I. A. Hiskens, “Direct assessment of protection operation and
are well equipped with synchrophasor capability. Thus, the iden- nonviable transients,” IEEE Trans. Power Syst., vol. 16, no. 3, pp. 427–434,
tification of vulnerable relays can be done in real time. This will Aug. 2001.
[13] S. A. Soman, T. B. Nguyen, M. A. Pai, and R. Vaidyanathan, “Analy-
help in updating relay vulnerability ranking following change sis of angle stability problems: A transmission protection systems per-
in system topology. Recently, new findings are detailed in [31], spective,” IEEE Trans. Power Del., vol. 19, no. 3, pp. 1024–1033,
which show compliance of the PMU/C jointly developed by Jul. 2004.
[14] K. Seethalekshmi, S. N. Singh, and S. C. Srivastava, “A classification
Hydro-Quebec and Vizimax for wide-area control applications. approach using support vector machines to prevent distance relay malop-
This PMU is having a high data frame rate, such as 240 sam- eration under power swing and voltage instability,” IEEE Trans. Power
ples/s, which can be useful in capturing the dynamic behavior Del., vol. 27, no. 3, pp. 1124–1133, Jul. 2012.
[15] V. Ajarappu, Computational Techniques for Voltage Stability Assessment
of the system. and Control. New York, NY, USA: Springer-Verlag, 2007.
[16] A. Esmaeilian et al., “Evaluation and performance comparison of power
VI. CONCLUSION swing detection algorithms in presence of series compensation on trans-
mission lines,” in Proc. 10th Int. Conf. Environ. Elect. Eng., May 8–11,
A new supervisory control-based back-up protection scheme 2011, pp. 1–4.
[17] K. Dragomiretskiy and D. Zosso, “Variational mode decomposition,” IEEE
is proposed. The scheme initially defines two new sensitivity Trans. Signal Proc., vol. 62, no. 3, pp. 531–544, Feb. 2014.
factors termed as LRMSF and GRMSF. These factors help in [18] M. K. Jena, S. R. Samantaray and B. K. Panigrahi, “A new adaptive
identifying the HV relays of a power system. Further, positive dependability-security approach to enhance wide area back-up protec-
tion of transmission system,” in IEEE Trans. Smart Grid, vol. 9, no. 6,
sequence voltage information of the buses corresponding to the pp. 6378–6386, Nov. 2018.
HV relays are utilized to develop an ED algorithm. The E and [19] M. K. Jena and S. R. Samantaray, “Data-mining-based intelligent differ-
S.D. of first three modes obtained through VMD are used as input ential relaying for transmission lines including UPFC and wind farms,”
IEEE Trans. Neural Netw. Learn. Syst., vol. 27, no. 1, pp. 8–17,
features for the data-mining model. RF is used to distinguish Jan. 2016.
fault situations from other disturbances. The scheme is validated [20] I. Kamwa, S. Samantaray, and G. Joos, “On the accuracy versus trans-
on WSCC 9-bus and IEEE 39-bus test systems. The results show parency trade-off of data-mining models for fast-response PMU-based
catastrophe predictors,” in Proc. IEEE Power Energy Soc. Gen. Meeting,
that RF as a classifier provides excellent classification accuracy. 2013, pp. 1–10.
We showed that the ED logic could provide reliable supervision [21] I. Kamwa, S. R. Samantaray, and G. Joos, “Catastrophe predictors from en-
to zone-3 operation of existing HV relays. The proposed scheme semble decision-tree learning of wide-area severity indices,” IEEE Trans.
Smart Grid, vol. 1, no. 2, pp. 144–158, Sep. 2010.
can enhance the security aspect of zone-3 protection, which is
[22] H. Suprême, A. Heniche-Oussédik, I. Kamwa, and L. A. Dessaint, “A
vital to prevent blackouts in transmission system. novel approach for instability detection based on wide-area measurements
and new predictors,” in Proc. IEEE Can. Conf. Elect. Comput. Eng., 2016,
pp. 1–6.
REFERENCES
[23] Accessed: Aug. 20, 2016. [Online]. Available: http://rattle.togaware.com/
[1] G. Andersson et al., “Causes of the 2003 major grid blackouts in North [24] P. M. Anderson and A. A. Fouad, Power System Control and Stability, 2nd
America and Europe, and recommended means to improve system dy- ed. New York, NY, USA: Wiley, 2002.
namic performance,” IEEE Trans. Power Syst., vol. 20, no. 4, pp. 1922– [25] M. A. Pai, Energy Function Analysis for Power System Stability. Norwell,
1928, Nov. 2005. MA, USA: Kluwer, 1989.
[2] Accessed: Aug. 20, 2016. [Online]. Available: http://powermin.nic. [26] C. Grigg et al., “The IEEE reliability test system-1996. A report prepared
in/upload/pdf/GRID ENQ REP 16812.pdf by the Reliability Test System Task Force of the Application of Proba-
[3] C.-H. Kim, J.-Y. Heo, and R. K. Aggarwal, “An enhanced zone 3 algorithm bility Methods Subcommittee,” IEEE Trans. Power Syst., vol. 14, no. 3,
of a distance relay using transient components and state diagram,” IEEE pp. 1010–1020, Aug. 1999.
Trans. Power Del., vol. 20, no. 1, pp. 39–46, Jan. 2005. [27] B. Biswal, M. Biswal, S. Mishra, and R. Jalaja, “Automatic classification
[4] F. Dobraca, M. A. Pai, and P. W. Sauer, “Relay margins as a tool for of power quality events using balanced neural tree,” IEEE Trans. Ind.
dynamical security analysis,” Int. J. Elect. Power Energy Syst., vol. 12, Electron., vol. 61, no. 1, pp. 521–530, Jan. 2014.
pp. 226–234, Oct. 1990. [28] M. K. Jena, S. R. Samantaray, and B. K. Panigrahi, “Variational mode de-
[5] 2009. [Online]. Available: http://www.nerc.com/files/Reliability_Standards composition based power system disturbance assessment to enhance wide
_Complete_Set_2009May20.pdf area situational awareness (WASA) and postmortem analysis (PMA),”
[6] P. Henneaux, P. E. Labeau, and J. C. Maun, “Blackout probabilistic risk IET Gener., Transmiss., Distrib., vol. pp, no. 99, pp. 1–12, 2017, doi:
assessment and thermal effects: Impacts of changes in generation,” IEEE 10.1049/iet-gtd.2016.1827.
Trans. Power Syst., vol. 28, no. 4, pp. 4722–4731, Nov. 2013. [29] D. Kang and R. Gokaraju, “A new method for blocking third-zone distance
[7] H. Bai and V. Ajjarapu, “Transmission system vulnerability assessment relays during stable power swings,” IEEE Trans. Power Del., vol. 31, no. 4,
based on practical identification of critical relays and contingencies,” in pp. 1836–1843, Aug. 2016.
Proc. IEEE Power Energy Soc. Gen. Meeting—Convers. Del. Elect. Energy [30] OPAL-RT Technologies Inc. [Online]. Available: http://www.opal-rt.
21st Century, Pittsburgh, PA, USA, 2008, pp. 1–8. com/product/artemis
[8] R. Baldick et al., “Initial review of methods for cascading failure analysis [31] I. Kamwa, L. Geoffroy, S. R. Samantaray, and A. Jain, “Synchrophasors
in electric power transmission systems IEEE PES CAMS task force on un- data analytics framework for power grid control and dynamic stability
derstanding, prediction, mitigation, and restoration of cascading failures,” monitoring,” IET Eng. Technol. Ref., pp. 1–22, 2016.
in Proc. IEEE Power Energy Soc. Gen. Meeting—Convers. Del. Elect.
Energy 21st Century, Pittsburgh, PA, USA, 2008, pp. 1–8.

Potrebbero piacerti anche