StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Breaker Failure Detection Algorithms - Research Paper Example

Cite this document
Summary
Name: Instructor's name: Course: Date: Breaker Failure Detection Algorithms Abstract In a power system world, breaker failure protection became a critical element to provide a back up protection for circuit breakers (CBs). Practically, every apparatus is equipped with primary protection to interrupt the current flow whenever a fault occurs…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Breaker Failure Detection Algorithms
Read Text Preview

Extract of sample "Breaker Failure Detection Algorithms"

Download file to see previous pages

The second part addresses issues worth consideration when applying Breaker Failure Protection and lastly, advances towards breaker Failure Protection. Using algorithms significantly enhance the numerical BF protection. Introduction Contingency analysis remains to be one of the great tasks that face protection engineers. The reason to this is due to the fact that a Protection Engineer has to focus on Murphy’s Law and Ohms Law concurrently. The design for PRS plays a key role in detecting any fault that happens on the power system and the possibilities of eruption of any fault in the protection system of the power system.

When the protective relay system is order, the designers of the power system understand it but the condition changes when a failure is detected. Deriving solutions towards this failure is what makes a protection engineer proficient. The protection engineer can only succeed by understanding how operations of the system. The best approach that the engineer can have is to have a proper understanding of each component of the system as well as their interaction and overlaps needed. The need for Breaker Failure Protection To successfully analyze this topic, the differences between fault detection devices and fault interruption devices should be understood.

Any disturbances like faults are detected by protective relays. The protective relays works in either way, interfere with the fault current system or cuts off any connection to the power system. Systems that lack breaker failure detection fail to analyze detection and interruption failures. This is not the case for breaker failure detection. The redundant relay systems play the role of detecting fault in case of failure (IEEE 8). What to consider for Breaker Failure Protection Before considerations necessary for breaker failure detection, aspects of back up protection need to be focused.

The aspects include speed, sensitivity and user friendliness together with maintenance required. Sensitivity The question considered under this aspect is on the reliability of remote relays in detecting faults in the power system. A difficulty arises when analyzing the conditions that lead to system failure. The hindering factor is the load encroachment. The radial system has limitations in the fault current and the circuit load. The source acts as a controlling factor thereby making this system simple.

Complications arise for networked systems. The possibilities of the relays detecting failure past the remote bus is limited because of the in feed. To solve this issue, a remote backup through distance relays with applications in the adjacent zones seems appropriate. This leads to change in the reach setting of the in feed to long ones. Complexities arise when the zone three relays are relied on as a backup protection. When breaker failure protection and a normal back up are applied, the problem is solved (Daume, Jon 20).

Speed Speed of the system in clearing faults that arise due to failure of the primary protection is vital. Over tripping of the system is prevented by the time taken by the relays in overlapping zones. The outcome to this process is for a remote back up to be set up after a reasonable delay. When breaker failure protection is used, tripping of back up circuit breakers is quickened. The set up speed of the system is guided by damage that is likely to be incurred on equipment, quality of power and its impact on its environs and stability. Incase

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Breaker Failure Detection Algorithms Research Paper”, n.d.)
Breaker Failure Detection Algorithms Research Paper. Retrieved from https://studentshare.org/engineering-and-construction/1436119-breaker-failure-detection-algorithms
(Breaker Failure Detection Algorithms Research Paper)
Breaker Failure Detection Algorithms Research Paper. https://studentshare.org/engineering-and-construction/1436119-breaker-failure-detection-algorithms.
“Breaker Failure Detection Algorithms Research Paper”, n.d. https://studentshare.org/engineering-and-construction/1436119-breaker-failure-detection-algorithms.
  • Cited: 0 times

CHECK THESE SAMPLES OF Breaker Failure Detection Algorithms

3D MODELING USING PARTIAL DIFFERENTIAL EQUATIONS

The mathematical modeling of the real world images is mostly dominated by partial differential equations.... he major challenge that has disturbed most players of geometric modeling is the manufacture of representative human facial geometrical images.... hellip; 3D MODELING USING PARTIAL DIFFERENTIAL EQUATIONS (PDEs) TABLE OF CONTENTS TABLE OF CONTENTS 3 ACKNOWLEDGEMENT 4 ABSTRACT 5 Chapter 3 6 Efficient 3D Data Compression through Parameterization of Free-Form Surface Patches 6 3....
41 Pages (10250 words) Essay

Operating Systems Design and Implementation

An Operating System (OS) is an essential part of any computer system.... It acts as a medium of communication between the system and the user working on the system.... The users of a computer system span a wide range.... Users include programmers, creative artists, shoppers, musicians, gamers and many more....
26 Pages (6500 words) Essay

The Technology Used in the Maintenance of Typical Commercial Aircraft

Some of the several technologies used for aircraft maintenance are: The use of neural networks (NNs) to enhance onboard diagnostics and provide real-time damage detection for aircraft reconfiguration has been investigated.... Laboratory testing results have shown that future onboard diagnostics systems can use NNs to detect intermittent failure and false failure indications.... Another technology use for aircraft maintenance, it functionality are Analysis of failure monitoring results, Reporting & Memorisation of failures, Management of tests....
7 Pages (1750 words) Essay

Aging aircraft wiring problems and solutions

Obviously the wire and connector fault detection and prognosis problem is difficult and each agency is doing the best that it can with the resources given (J.... Thus, developing the appropriate theoretical approach, using simulations and data collection for development and eventually leading to requirements definition for all aspects of the wiring fault detection problem seem to be a huge task.... The NTSB (National Transportation Safety Board) later determined the cause of the TWA 800 accident to have been a wiring failure that led to an ignition spark in the fuel tank....
6 Pages (1500 words) Essay

Evolution of security cameras and computer monitoring software

Safety and security have become the most important needs of contemporary world in all spheres ranging from personal homes to offices, public places and every place that has a potential threat of terrorism, illegal activities, or any other form of harm to life and possessions.... hellip; This paper outlines requirement of security surveillance while studying the evolution of security surveillance equipments....
12 Pages (3000 words) Essay

Retail Information Systems

Owing to widespread innovation in the field of Information Technology and globalization of business, industries across all sectors have gone through tremendous transformation, with regard to the various factors in general, and use of technology in particular.... Technology in the… tail industry is used widely at various stages (as depicted in Figure 1) for various purposes such as to enhance the effectiveness of supply chain operations, increase productivity and efficiency of the staff as well as ensure greater consumer satisfaction. Technologies such as Radio Frequency Identification (RFID), Data Interchange (EDI), Electronic Data Interchange (EDI), Point of Sales (POS), mCRM – (mobile CRM), Inter Organizational Information Systems (IOIS), and various other Data Mining (DM) technologies are used across various departments in the retail industry....
14 Pages (3500 words) Essay

Security Incident Event Management

hellip; Most encryption algorithms can be cracked and their information can be exposed if the attacker has the time, desire, and resources to attempt the endeavor.... This report "Security Incident Event Management" discusses best practices, tools, guides, and training that are available to assist insecure network devices....
12 Pages (3000 words) Report

Self-Driving Cars

This research paper declares that self-driving or robotic cars are automated driverless cars that have the capability of fulfilling the main transportation expectations just like traditional cars.... nbsp;These cars can sense their environments using techniques such as lidar, radar, computer vision....
16 Pages (4000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us