This document summarizes the performance evaluation of a modern numerical protective relay (NPR) using a microcontroller for overcurrent protection. It describes the design and implementation of an overcurrent relay using a microcontroller-based system-on-chip approach. The relay is tested according to IEEE standards and shown to operate within acceptable time limits. Test results demonstrate that the microcontroller-based design provides adequate reliability and security for overcurrent protection while improving performance compared to conventional designs.
Wide area protection-and_emergency_control (1)Alaa Eladl
This document discusses wide-area protection and emergency control in power systems. It describes how major disturbances can stress power systems beyond their planned operating limits due to unpredictable events. It explores using advanced wide-area monitoring and control systems based on communication and synchronization technologies to automatically detect and respond to disturbances across large regions in order to minimize their impacts. Such systems have potential to provide faster, more coordinated responses than traditional local protection schemes or human operators. The document outlines different types of power system disturbances and remedial measures needed to maintain stability.
This document summarizes a review of sensor nodes in basic wireless sensor networks, with an emphasis on selecting an appropriate processor. It discusses key factors in sensor network design like fault tolerance, scalability, and power consumption. Sensor nodes typically consist of sensing, processing, transceiver, and power units. Processors must have low power usage, fast wake-up times, clock scaling abilities, and memory architectures suited for interrupts. Common microcontrollers and microprocessors are evaluated based on these criteria to determine the best fit for sensor network applications.
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...IJNSA Journal
Next generation network will consist of different types of wireless networks like WSN, Wi-Fi, WiMAX, UMTS, LTE and etc. Wireless Sensor Network (WSN) finds unique and special application as compared to the said networks because sensors are deployed in a very secret, awkward and hostile environment like battle field etc. Various wireless sensor nodes are interconnected and form a Wireless Sensor Network. Sensor nodes once deployed in a region, can’t be repaired thus the power system deployed in the nodes becomes a major key issue i.e. how long its battery life can be utilised. Another major issue of WSN is to have a more secured network which is a function of hash keys. Increase usage of hash key means enhanced security but at the cost of power and area. Sensor systems must utilize the minimal possible energy while operating over secured and wide range of operating scenarios. In this paper, we have proposed a novel ID matching mechanism that uses a Bloom filter to realize wake-up wireless communication. Paper uses hash function for uniquely recognizing particular sensor- node- cluster among all clusters. Paper also shows the effect of number of hash functions on performance of wireless sensor node. The design and implementation of a wireless wake-up receiver module simulation reveals
that proposed model consume 724nW dynamic power and with bloom filter, the proposed model consumes dynamic power 85% less than the consumption cited in “Takiguchi” model[1]. Dynamic power is further reduced by 10% when parallel processing is implemented. Finally paper provides a novel approach to save the dynamic power and subsequently increases the battery life of wireless sensor node and network as a whole.
Evaluating the Arc-Flash Protection Benefits of IEC 61850 CommunicationSchneider Electric
The goal of arc-flash protection is to minimize the damaging effects of released energy, which requires very fast and reliable communication among protection system components. In addition to discussing communication requirements and options for sensors, current transformers, relays, circuit breakers, and upper level control systems, this paper introduces and evaluates the benefits and drawbacks of new IEC 61850-based communication options.
Wireless sensor networks consist of distributed autonomous devices that cooperatively monitor environmental conditions. They were originally developed for military surveillance but are now used in many civilian applications like environmental monitoring and healthcare. Each sensor node contains sensors, microcontrollers, memory, transceivers and power sources. They self-organize and route data to base stations. Key challenges are limited energy, processing and memory. Applications include habitat monitoring, object tracking, fire detection and traffic monitoring.
Defense In Depth Of Electrical Systems Preliminary Findings And Recommendat...John Bickel
This document summarizes preliminary findings and recommendations from the OECD Nuclear Energy Agency's DIDELSYS working group regarding defense in depth of nuclear power plant electrical systems. The working group was formed in 2008 to evaluate how electrical systems cope with plant and grid transients. Key recommendations include improving robustness of electrical systems to withstand a wider range of voltage surges, enhancing procedures for dealing with degraded electrical systems, and improving capabilities for both coping at the plant level and recovering offsite grid support following electrical problems.
Wide area protection-research_in_the_smart_gridAlaa Eladl
This document discusses wide-area protection research in the context of the smart grid. It describes how technologies enabled by the smart grid like synchronized phasor measurement, improved communication networks, and standard protocols allow for the development of wide-area protection systems. These systems provide monitoring, control, and backup protection across large geographical areas. The document outlines some key technologies that wide-area protection relies on like wide-area measurement systems and communication networks. It also discusses trends like adaptive protection schemes that utilize system-wide information in real-time and agent-based control architectures.
Implementation of Enhanced New Stable Election Protocol- ENHSEP in NS2 PlatformIRJET Journal
This document discusses the implementation of an Enhanced New Stable Election Protocol (ENHSEP) in the NS2 platform. It begins by discussing existing routing protocols like LEACH and SEP that have disadvantages like uneven energy consumption and network lifetime. It then proposes ENHSEP as a new hierarchical routing protocol that aims to be more energy efficient. The document outlines the design and methodology of ENHSEP, which involves calculating node characteristics, clustering nodes based on distance, and selecting cluster heads based on remaining energy. Simulation results from NS2 comparing ENHSEP to LEACH and NHSEP show that ENHSEP has better performance in terms of throughput, energy consumption, and packet delivery ratio.
This document describes a system to detect cable faults using IoT. The system uses an Arduino microcontroller connected to a resistor network laid across underground cables. When a fault occurs, it creates a short circuit between two cable lines. This generates a specific voltage based on the resistor combination. The Arduino senses this voltage and determines the distance to the fault location. It displays the fault data on an LCD screen and transfers it over a network to a web page. The goal is to easily detect exact fault locations to simplify cable repair work compared to existing methods that require digging up entire cable lines.
IOT BASED POWER GRID MONITORING & CONTROL SYSTEMvivatechijri
Energy generation corporations provide electricity to any or all the households via intermediate controlled power transmission hubs referred to as Electricity Grid. Generally issues arise thanks to failure of the electricity grid resulting in black out of a complete space that was obtaining provide from that individual grid. This project aims to resolve this downside victimization IOT because the means that of communication and conjointly coping with numerous alternative problems that a wise system will traumatize to avoid needless losses to the Energy producers.
The wireless sensor node can only be equipped with a
limited power source. In some application scenarios,
replenishment of power resources might be impossible. Sensor
node lifetime, therefore, shows a strong dependence on battery
lifetime. Hence, power conservation and power management take
on additional importance. The main task of a sensor node in a
sensor field is to detect events, perform quick local data
processing, and then transmit the data. Power consumption can
hence be divided into three domains: sensing, communication,
and data processing. One of the most commonly used Power
management techniques is to allow a node to follow sleep-wake
up-sample-compute-communicate cycle. Based on the amount of
the battery availability, by adopting the proper information
dissemenitation schemes, the network life time can be extended.
This process relies on hardware support for implementing sleep
states, permits the power consumption of a node to be reduced by
many orders of magnitude.
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...ijmnct
Wireless Sensor Networks are consist of small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, one of the most important issues that need to be enhanced in order to improve the life span of the network is energy efficiency. to overcome this demerit many research have been done. The clustering is the one of the representative approaches. In this paper, we introduce a dynamic clustering algorithm using Fuzzy Logic and genetic algorithm. In fact, using fuzzy system design and system optimization by genetic algorithm is presented approach to select the best cluster head in sensor networks. Using random data set has been addressed to evaluate of fuzzy-genetic system presented in this paper and finally, MSE rate or mean error of sending the messages using proposed fuzzy system in comparison with LEACH method is calculated in select the cluster head. The results of evaluations is representative of a reduction the MSE metric in proposed method in comparison with LEACH method for select the cluster head. Reduce of MSE directly is effective on energy consumption and lifetime of wireless sensor network and can cause the reduce energy consumption and increase network lifetime.
1. A wireless sensor network consists of hundreds of thousands of sensor nodes that communicate wirelessly. Each node contains sensors, computing devices, radio transceivers, and power components.
2. The nodes self-organize into a network infrastructure using multi-hop communication. They measure environmental conditions like temperature and transmit the data back to a base station.
3. The main challenges for wireless sensor networks include limited resources of each node, fault tolerance, long network lifetime, scalability, and adaptability to changing conditions and tasks. Energy-efficient communication protocols and in-network processing are required to address these challenges.
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...ijmnct
Wireless Sensor Networks are consist of small battery powered devices with limited energy resources.Once
deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy
source is not feasible. Hence, one of the most important issues that need to be enhanced in order to
improve the life span of the network is energy efficiency. to overcome this demerit many research have
been done. The clustering is the one of the representative approaches. In this paper, we introduce a
dynamic clustering algorithm using Fuzzy Logic and genetic algorithm. In fact, using fuzzy system design
and system optimization by genetic algorithm is presented approach to select the best cluster head in
sensor networks. Using random data set has been addressed to evaluate of fuzzy-genetic system presented
in this paper and finally, MSE rate or mean error of sending the messages using proposed fuzzy system in
comparison with LEACH method is calculated in select the cluster head. The results of evaluations is
representative of a reduction the MSE metric in proposed method in comparison with LEACH method for
select the cluster head. Reduce of MSE directly is effective on energy consumption and lifetime of wireless
sensor network and can cause the reduce energy consumption and increase network lifetime.
This document discusses a proposed cost-based energy efficient routing algorithm for wireless body area networks (WBANs). WBANs use wireless sensor nodes placed on or inside the body to monitor vital health signals. The proposed algorithm aims to maximize network lifetime by selecting optimal forwarding nodes based on a cost function that considers residual energy and distance to the sink node. Simulation results show the proposed algorithm performs better than traditional routing methods by achieving a longer stability period with more uniform energy consumption across nodes.
The document discusses the architecture of wireless sensor networks (WSNs). It describes the key characteristics of WSNs, such as low cost, energy efficiency, limited computational power, short-range wireless communications, distributed sensing and processing, dynamic network topology, and self-organization capabilities. The objectives of WSN architecture design are then outlined, including identifying application requirements and relevant technological trends, optimizing design for resource-constrained sensor nodes, and performing qualitative and quantitative analysis. Finally, the document presents the typical architecture of a sensor node, including sensing, processing, communication, and power units. It also briefly discusses the layered communication architecture used in WSNs.
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
IRJET - Transmission Line Fault Classification using DWTIRJET Journal
1) The document discusses using discrete wavelet transform (DWT) to classify faults on transmission lines based on voltage and current signals.
2) A simulation is conducted using PSCAD software to test DWT fault classification on different fault types (A-G, B-G, A-B, etc.).
3) The results show that DWT can effectively detect and classify faults by analyzing the energy of approximation coefficients from current signals and comparing them to an adaptive threshold.
Recent Trends InDigital Differential Protection of Power Transformerijiert bestjournal
Digital protection has several advantages over conventional protection scheme. For protecting
costliest and vital equipment such as transformer, digital schemes have been proposed by several authors in recent
past. This paper throws light on all such efforts and it will help researchers to focus on integrated efforts to protect
transformer in a better and efficient way. Artificial intelligence along with signature and pattern recognition
techniques give much more useful information about happenings in and outside of transformer. Efforts are put by
all concerned with fast, accurate, flexible, reliable and easy to understand scheme of protection. With the advent of
soft computing methods condition monitoring with protection has become on line objective. Keeping all these
state of art techniques of protection, this paper will be a useful resource. Discrimination of several faults external
and internal needs digital signal processing and feature extraction as well. Many algorithms are proposed as
summarized in paper.
The International Journal of Engineering and Science (The IJES)theijes
This summary provides an overview of optimal overcurrent relay coordination techniques:
1) Overcurrent relays are widely used in power system protection to detect faults like overloads and short circuits. When fault current exceeds the relay's pickup setting, it will operate and send a trip signal to open the circuit breaker.
2) Coordination of primary and backup relays is important so that relays closest to faults operate quickly while allowing time for downstream relays. Coordination time intervals must be considered.
3) The paper reviews past works on optimal coordination of overcurrent relays using computational intelligence techniques like artificial intelligence and nature-inspired algorithms. It aims to identify gaps in current research on this topic.
A transient current based micro grid connected power system protection scheme...IJECEIAES
Micro-grids comprise Distributed Energy Resources (DER’s) with low voltage distribution networks having controllable loads those can operate with different voltage levels are connected to the micro-grid and operated in grid mode or islanding mode in a coordinated way of control. DER’s provides clear environment-economical benefits for society and consumer utilities. But their development poses great technical challenges mainly protection of main and micro grid. Protection scheme must have to respond to both the main grid and micro-grid faults. If the fault is occurs on main grid, the response must isolate the DER’s from the main grid rapidly to protect the system loads. If the fault ocuurs within the micro-grid, the protection scheme must coordinate and isolates the least priority possible part of the grid to eliminate the fault. In order to deal with the bidirectional energy flow due to large numbers of micro sources new protection schemes are required. The system is simulated using MATLAB Wavelet Tool box and Wavelet based Multi-resolution Analysis is considered. Wavelet based Multi-resolution Analysis is used for detection, discrimination and location of faults on transmission network. This paper is discussed a transient current based micro-grid connected power system protection scheme using Wavelet Approach described on wavelet detailed-coefficients of Mother Biorthogonal 1.5 wavelet. The proposed algorithm is tested in micro-grid connected power systems environment and proved for the detection, discrimination and location of faults which is almost independent of fault impedance, fault inception angle (FIA) and fault distance of feeder line.
Backpropagation Neural Network Modeling for Fault Location in Transmission Li...ijeei-iaes
In this topic research was provided about the backpropagation neural network to detect fault location in transmission line 150 kV between substation to substation. The distance relay is one of the good protective device and safety devices that often used on transmission line 150 kV. The disturbances in power system are used distance relay protection equipment in the transmission line. However, it needs more increasing large load and network systems are increasing complex. The protection system use the digital control, in order to avoid the error calculation of the distance relay impedance settings and spent time will be more efficient. Then backpropagation neural network is a computational model that uses the training process that can be used to solve the problem of work limitations of distance protection relays. The backpropagation neural network does not have limitations cause of the impedance range setting. If the output gives the wrong result, so the correct of the weights can be minimized and also the response of galat, the backpropagation neural network is expected to be closer to the correct value. In the end, backpropagation neural network modeling is expected to detect the fault location and identify operational output current circuit breaker was tripped it. The tests are performance with interconnected system 150 kV of Riau Region.
The document discusses the design of a microcontroller-based system for parameter measurement and protection of electrical transformers using power line communication. It aims to monitor transformer parameters like voltage, current, temperature and protect against overcurrent and overvoltage faults. The system uses current and voltage sensors connected to a microcontroller to measure parameters. If a fault is detected, the microcontroller sends a trip signal to a relay to disconnect the transformer. It is intended to provide improved reliability compared to traditional electromechanical protection techniques.
Microcontroller based transformer protectioAminu Bugaje
This document provides an introduction and background to a project on designing a microcontroller-based transformer protection system. It discusses how transformers are critical components in power systems that require protection against faults like short circuits, overcurrent and overvoltage. The document then reviews previous work on transformer protection and outlines the objectives of this project, which are to design current and voltage sensing circuits, develop a microcontroller algorithm for overload, overvoltage and undervoltage protection, and test the system's performance. The chapter concludes by outlining the scope and limitations of the project, which involves both hardware and software design to develop a protection system that can monitor transformer parameters and trip circuit breakers or relays during faults.
This document summarizes a student capstone project that involved developing a protective device coordination for a wastewater treatment plant's power system using modeling software. Key aspects of the project included:
1) Creating a one-line diagram of the plant's electrical system without any protective devices.
2) Simulating faults at different points in the system and observing the sequence and timing of protective device operations.
3) Verifying coordination between devices by ensuring operation times differed by 23-25 cycles.
4) Repeating simulations with the plant running on emergency generators to coordinate devices under that scenario.
IRJET- PLC Based Intelligent Control of SubstationIRJET Journal
This document describes a PLC-based intelligent control system for a substation. The system uses a PLC to continuously monitor voltage and current values in the substation. If the values exceed rated limits, the PLC will signal the contactor to trip the circuit breaker, protecting the equipment from faults. The system includes current and potential transformers to step voltages down before sending signals to the PLC for monitoring. This automated monitoring and protection system provides faster response times than previous electromechanical systems, improving safety and reliability.
This document discusses power system protection settings. It begins by introducing the functions of protective relays and the information needed to calculate settings, such as line parameters, transformer parameters, fault studies results, and CT and VT ratios. It then describes the protection settings process and functional elements of protective relays. The document discusses the operating characteristics of overcurrent, directional, and distance protection elements. It explains concepts like current grading, time grading, and directional elements as they relate to achieving selectivity in protection schemes. Finally, it provides more details on distance protection principles and operating characteristics.
This document presents a proposed self-healing control algorithm to improve the reliability of a smart grid distribution system. It begins with an introduction that outlines how smart grid solutions can help utilities quickly identify faults, shorten outage times, and restore power faster. The document then reviews literature on various approaches to self-healing control and identifies gaps in existing research. Specifically, it is proposed to develop a self-healing control algorithm using modern control theory and artificial intelligence to address voltage instability from supply-demand imbalances introduced by renewable energy sources and electric vehicles. An experiment is outlined to test the algorithm on a proposed smart grid distribution system model incorporating solar power, energy storage, and electric vehicles.
This document discusses overvoltage protection for data concentrators used in smart grid applications. It describes the different network levels in smart grids - core, distribution and access networks. For the access network, which provides last mile connectivity between hardware and smart meters, technologies used include power line communication and various wireless standards. Outdoor data concentrator hardware is susceptible to lightning strikes and surges. The document then discusses lightning protection zones and the electrical parameters for surge protection devices used to protect communications ports and power inputs for such outdoor hardware from transient overvoltages.
protectionsettings-120425102109-phpapp01.pptThien Phan Bản
The document discusses power system protection settings. It describes the functions of protective relays and equipment protection, and the information required to calculate protection settings. The protection settings process involves calculating settings, checking them, and implementing them. Protective relays use functional elements like protection, control, and timing elements. Distance, overcurrent, and directional protection elements are described.
protectionsettings-120425102109-phpapp01.pptThien Phan Bản
The document discusses power system protection settings. It describes the functions of protective relays and equipment protection, and the information required to calculate protection settings. The protection settings process involves calculating settings, checking them, and implementing them. Protective relays use functional elements, and have operating characteristics like overcurrent, directional, and distance protection. Settings must coordinate protection across the system.
Neural computing is now one of the most promising technologies in all fields of engineering,
resulting in the development of a number of Artificial Neural Networks (ANN). Double circuit transmission lines
are being employed in the distribution of power to consumers and have become more widespread than single
transmission line, as they increase the electric power transmission capacity and the reliability of an electrical
system. Losses along transmission lines occur due to faults. Possible faults on the transmission line were
predicted using Artificial Neutral Network. In this work, the simulation of fault on a 132kV double circuit
transmission lines using MATLAB was undertaken. Parameters considered during the simulation were the input
of the network which is the fault current value at each fault location while the output of the network is the fault
location. The efficiency of the neural network was tested and verified. This approach provided satisfactory
results with accuracy of 95% or higher.
(a)What do you mean by smart substation, smart feeders & Transmission system?
(b)What is need of smart substation, smart feeders & Transmission system?
(c) What are various merits and benefits of smart substation, smart feeders & Transmission system?
(d) Various technologies to make adjusting system into smart substation, smart distribution & Transmission system?
Smart Local Backup Protection for Smart SubstationIJECEIAES
This paper presents a novel smart local backup protection SLBP used for the support and backup of the protective relays in a smart substation. The proposed SLBP is based on the IEC61850 standards and the concept consists of the acquisition of Generic Object Oriented Substation Event GOOSE used for tripping and interlocks exchange between Intelligent Equipment Devices IEDs and the reading of the Sampled Value SV existing in the process bus coming from Mergin Units MU or Non-Conventional Instrument Transformers NCIT. Several logical schemes to protect different zones of the substation are presented and how can be integrated using data in the substation automation system. The SLBP was developed using an open source library and free operating system. Moreover, a low cost prototype is presented in order to evaluate the efficiency and the operation of the SLBP under diverse scenarios of the proposed logical protective schemes such us breaker failure and overcurrent protection.
This document discusses how wide area monitoring systems (WAMS) can improve power system protection. WAMS consist of phasor measurement units and phasor data concentrators that provide time-synchronized measurements across a wide area. This allows monitoring of dynamic system states. The document outlines several ways WAMS can enhance protection schemes, including adaptive relay settings, improved backup protection supervision, intelligent underfrequency load shedding adapted to conditions, and adaptive out-of-step relaying to prevent system separation. The goals are to avoid inappropriate relay operations, manage wide area disturbances, and ensure an appropriate balance of security and dependability in protection schemes.
Fuzzy Logic-Based Fault Classification for Transmission Line AnalysisIRJET Journal
This document discusses a study that uses fuzzy logic to classify faults on electric power transmission lines. It begins with an abstract that outlines using fuzzy logic for fault classification. It then provides background on transmission lines, faults, and the need for accurate fault analysis. The document describes fuzzy logic and how it is well-suited for applications with uncertainty. It details using fuzzy logic to classify four types of faults - single phase to ground, two-phase, two-phase to ground, and three-phase - by analyzing voltage and current measurements. Simulation results demonstrate the fuzzy logic approach can accurately identify different fault types on a transmission line model.
Similar to International Journal of Engineering Research and Development (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
Quality Patents: Patents That Stand the Test of TimeAurora Consulting
Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality.
Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality.
Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality.
Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank?
** Episode Overview **
In this first episode of our quality series, Kristen Hansen and the panel discuss:
⦿ What do we mean when we say patent quality?
⦿ Why is patent quality important?
⦿ How to balance quality and budget
⦿ The importance of searching, continuations, and draftsperson domain expertise
⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications
https://www.aurorapatents.com/patently-strategic-podcast.html
YOUR RELIABLE WEB DESIGN & DEVELOPMENT TEAM — FOR LASTING SUCCESS
WPRiders is a web development company specialized in WordPress and WooCommerce websites and plugins for customers around the world. The company is headquartered in Bucharest, Romania, but our team members are located all over the world. Our customers are primarily from the US and Western Europe, but we have clients from Australia, Canada and other areas as well.
Some facts about WPRiders and why we are one of the best firms around:
More than 700 five-star reviews! You can check them here.
1500 WordPress projects delivered.
We respond 80% faster than other firms! Data provided by Freshdesk.
We’ve been in business since 2015.
We are located in 7 countries and have 22 team members.
With so many projects delivered, our team knows what works and what doesn’t when it comes to WordPress and WooCommerce.
Our team members are:
- highly experienced developers (employees & contractors with 5 -10+ years of experience),
- great designers with an eye for UX/UI with 10+ years of experience
- project managers with development background who speak both tech and non-tech
- QA specialists
- Conversion Rate Optimisation - CRO experts
They are all working together to provide you with the best possible service. We are passionate about WordPress, and we love creating custom solutions that help our clients achieve their goals.
At WPRiders, we are committed to building long-term relationships with our clients. We believe in accountability, in doing the right thing, as well as in transparency and open communication. You can read more about WPRiders on the About us page.
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Bert Blevins
Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
Support en anglais diffusé lors de l'événement 100% IA organisé dans les locaux parisiens d'Iguane Solutions, le mardi 2 juillet 2024 :
- Présentation de notre plateforme IA plug and play : ses fonctionnalités avancées, telles que son interface utilisateur intuitive, son copilot puissant et des outils de monitoring performants.
- REX client : Cyril Janssens, CTO d’ easybourse, partage son expérience d’utilisation de notre plateforme IA plug & play.
Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.
Best Programming Language for Civil EngineersAwais Yaseen
The integration of programming into civil engineering is transforming the industry. We can design complex infrastructure projects and analyse large datasets. Imagine revolutionizing the way we build our cities and infrastructure, all by the power of coding. Programming skills are no longer just a bonus—they’re a game changer in this era.
Technology is revolutionizing civil engineering by integrating advanced tools and techniques. Programming allows for the automation of repetitive tasks, enhancing the accuracy of designs, simulations, and analyses. With the advent of artificial intelligence and machine learning, engineers can now predict structural behaviors under various conditions, optimize material usage, and improve project planning.
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Chris Swan
Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge.
You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter.
The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.
Cookies program to display the information though cookie creation
International Journal of Engineering Research and Development
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 3 (March 2014), PP.11-17
11
Performance Evaluation of a Modern NPR for Over Current
Protection with the Application of Microcontroller
Technology in Power System
R.Gunasekari1
, Dr.D.Mary2
, Dr.P.C.Kishoreraja3
1
Research Scholar, Dept. of Electrical and Electronics Engineering, Saveetha University, Chennai
2
Prof. & Head, Dept. of Control and Instrumentation Engineering,
Government College of Technology, Coimbatore
3
Prof. & Head, Dept. of Electronics and Communication Engineering,
Saveetha School of Engineering, Saveetha University, Chennai
Abstract:- Numerical Protective Relays (NPRs) are the result of the application of microcontroller technology
in relay industry. NPRs have the ability to communicate with its peers, are economical and are easy to operate,
adjust and repair. Over-current protection is a key part of the power system. Over-current relays are extensively
used in power system protection. The relay operates when actuating current exceeds a specified limit. These
relays have their application with wide range of power system components viz. sub-transmission and
distribution network, generators, transformers etc. Design for implementation of an over-current relay as a
System On Programmable Chip (SOPC) is presented. Microcontroller (µc) is used for the System On Chip
(SOC) application to achieve a SOPC for the proposed design. The µc-based SOPC approach is faster and
economical as compared to conventional SOC devices. The design is suitable for distribution or sub-
transmission networks and can behave as extreme inverse or very inverse type of time over-current relay. The
proposed relay follows standard inverse-time characteristics according to IEEE standard. Performance
evaluation of the designed relay has been checked. The results from tests performed are also included.
Keywords:- Power System Protection, Numerical Protective Relaying (NPR), Over-current Numerical Relay
Protection, Microcontroller
I. INTRODUCTION
The reliability and security electrical supply is an important factor in modern society. However, the
increasing complexity of power systems makes it difficult for protection operation to achieve these objectives.
Nevertheless, numerical relays embedded with digital signal processor (DSP) are able to improve the protection
operation significantly. The relays are capable of performing complex processing faster and with higher
accuracy since the processing using DSP are optimized for real-time signal processing. In this paper, an over-
current relay is built and investigated using DSP. The over-current protection is chosen since it is used as a
major protection in the distribution systems. The over-current relay is modeled in MATLAB/Simulink before it
is implemented on the DSP. Comparison results between simulation and hardware execution based on two
implementation methods are presented. The performance evaluation of the relay in terms of operation time,
memory capacity usage, execution time and transient analysis is investigated [1].
Protective relays are used to detect any abnormalities in a power system and isolate the faulty part of
the system in the shortest time. Protective relays are designed to maintain high degree of service continuity and
limit equipment damage in the power systems. Severe disruption to the normal routine of modern society such
as power outages is likely to increase the emphasis on reliability and security of supply electrical energy to
consumers [2]. The expanding of power systems such as intense increase of transmission line capacity and
increase of grids looping degree will increase the complexity of power system. This will cause the protection
operation to become more difficult. The protective relays encounter several problems as revealed in [3]. The
present protection technique used is unable to ensure selectivity and speedily operation for the faults appearing
on the entire protected line. Numerical protective relays are able to improve the performance of the protection
operation considerably. Numerical relay are embedded with microcontroller as the computational hardware.
2. Performance Evaluation of a Modern NPR for Over Current Protection with…
12
II. NUMERICAL RELAY PROTECTION
A. Importance of Numerical Relay Protection
Modern civilization makes use of large amounts of energy to generate goods and services. From the
industrial plants, the providers of public services to the ordinary man, all of them need energy to satisfy and
create the well being of modern society. The purpose of electric power systems is to provide energy for human
use in a secure, reliable and economic manner. Electric power systems are made up of facilities and equipment
that generate, transmit and distribute electrical energy. Electric power systems are one of the largest and more
complex systems man has ever built.
The importance of the services that power systems offer and the high amount of investments that
represent the facilities and equipments, make the normal and constant operation of power systems critical and
strategic for every society. Faults and failures normally occur in power systems. Due to the great amounts of
energy involved, faults represent a threat to the operation and security of power systems if the faults are not
promptly corrected. Power systems need an auxiliary system that must take corrective actions on the occurrence
of a fault. This auxiliary system is known as protection system. The Protection systems are operated through
protective devices like protective relays etc.
NPR systems are sets of equipments, schemes and policies dedicated to detect faults in the protected
elements of the power systems, to disconnect the faulted element and to reestablish the service, if it was the
case. Because power systems operate in different operating states, different fault scenarios may occur. Protective
relay systems must provide different schemes and equipments to detect and to react to each and every one of
these fault scenarios, from the most simple of them to the most complex and compelling.
B. Classification of NPRs Based on Technology
NPRs can be broadly classified into the following categories depending on the technology used for their
construction and operation.
Electromagnetic NPRs
Static NPRs
Microcontroller-based NPRs
C. Microcontroller - Based NPRs
Microcontroller-based NPRs are the latest development in this area. With the development in VLSI
Technology, sophisticated and fast microcontrollers are coming up. Their applications to the problems of
numerical protective relaying schemes are of current interests to power engineers. The inherit advantages of
microcontroller-based NPRs over static NPRs with or a very limited range of applications, are attractive,
flexibility due to their programmable approach. Microcontroller-based NPRs can provide protection at low cost
and compete with conventional relays. The present downward trend in the cost of large-scale integrated circuit
will encourage wide applications of microcontroller-based applications of microcontroller-based NPRs for the
protection modern complex power network in the power system.
III. NPR FOR OVER CURRENT PROTECTION
A. An Introduction to Numerical Protective Over Current Relay
A numerical protective relay which operates when the current in any circuit exceeds a certain
predetermined value is a numerical over current protective relay. The value of the predetermined current above
which the numerical over current protective relay operates is known as its pick-up value Ipu. Numerical over
current protective relays offer the cheapest and simplest form of protection. Numerical over current relay
protection is widely used for the protection of distribution lines, motors, power equipment, industrial systems
etc. It incorporates numerical over current protective relays for the protection of an element of the power
system. The measured value of the current is compared with the pick-up value to decide whether there is a fault
or not. If there is a fault in any element of the power system, the relay sends a trip command to circuit breaker
for isolating the faulty element.
B. Overview of NPR for Over Current Protection
A protection which incorporates numerical over current protective relays for the protection of an
element of the power system is known as a numerical over current relay protection. Numerical over current
relay protection is a straightforward application of the numerical relay. A numerical over current protective
relay acquires sequential samples of the current in numeric (digital) data from through the Data Acquisition
3. Performance Evaluation of a Modern NPR for Over Current Protection with…
13
ystem (DAS), and processes the data numerically using a numerical relaying algorithm to extract the
fundamental frequency component of the current and make trip decision. In order to make the trip decision, the
relay compares the fundamental frequency component of the fault current (I) with the pick-up value (Ipu) setting
and computes the plug setting multiplier (PSM), given by (I / Ipu) at which the relay has to operate. If the
fundamental frequency component of the fault current exceeds the pick-up value (ie., PSM > 1), the relay issues
a trip signal to the circuit breaker. The time delay required for the operation of the relay depends on the type of
over current characteristic to be realized. In case of instantaneous over current relay there is no intentional relay.
For definite time over current relay, the trip signal is issued after a predetermined time delay. In orders to obtain
inverse time characteristics, the relay either computed the operating time corresponding to the fault current or
selects the same from look-up table. For correct operation of the protection system, the design should take into
account the following points:
Continuous operation should not depend on one circuit only. Ensure that maintenance can be carried
out without total de-energization of the plant.
Make sure you can live with what happens when back-up protection operates. If not then the design of
the electrical distribution system is not correct.
Microprocessor multifunction relays from different manufacturers often have very different
characteristics. Review all features when selecting a relay.
Make use of other relays when present to enhance back-up protection. Adding extra components will
often decrease reliability due to the difficulty of correctly designing and maintaining more complicated
systems.
Choose the maximum earth fault current carefully as it has an impact on both earth-fault and unit
protection.
When intertripping is performed, the relay should send the trip order directly to the other breaker and
not through the related relay. This is more reliable for clearing faults. The one exception is for
intertripping in the case of automatic transfer to prevent disastrous closing to a faulted bus.
C. Block Schematic Diagram of proposed NPR for Over Current Protection
Fig.1: Block Schematic Diagram of proposed NPR for Over Current Protection
The block diagram of a NPR for over current protection is shown in fig.1. An over current numerical
protective relay is the simplest form of numerical protective relay which operates when the current in any circuit
exceeds a certain predetermined value, ie. pick-up value. It is extensively used for the protection of distribution
lines, industrial motors and equipment. Using a multiplexer, the microcontroller can sense the fault currents of a
number of circuits. If the fault current in any circuit exceeds the pick-up value, the microcontroller sends a
tripping signal to the circuit breaker of the faulty circuit breaker of the faulty circuit. As the microcontroller
4. Performance Evaluation of a Modern NPR for Over Current Protection with…
14
accepts signals in voltage form the current signal derived from the current transformer is converted into a
proportional voltage signal using a current to voltage converter. The ac voltage proportional to the load current
is converted into dc using a precision rectifier. Thus, the microcontroller accepts dc voltage proportional to load
current.
IV. NPR ALGORITHM FOR OVER CURRENT PROTECTION
The numerical relaying algorithm first reads all the settings such as the type of characteristics to be
implemented, the Ipu, the time multiplier setting in case of inverse time over current relay or the time delay in
case of DTOC relay. In the case of a definite time over current relay, the microcontroller sends the tripping
signal to the circuit breaker after a predetermined time delay if the fault current exceeds the pick-up value. In
case of instantaneous over current relay there is no intentional time delay. In order to obtain inverse-time
characteristics, the operating times for different values of currents are noted for a particular characteristic.
These values are stored in the memory in tabular form. The microcontroller first determines the
magnitude of the fault current and then selects the corresponding time of operation from the look-up table. A
delay subroutine is started and the trip signal is sent after the desired delay. Using the same program, any
characteristic such as IDMT, very inverse or extremely inverse can be realized by simply changing the data of
the look-up table according to the desired characteristic to be realized. The microcontroller continuously
measures the current and moves in a loop and if the measured current exceeds .
The pick-up value, it compares the measured value of the current with the digital values of current give
in the look-up table in order to select the corresponding count for a time delay. Then it goes in delay subroutine
and sends a trip signal to the circuit breaker after the predetermined time delay. The flowchart is shown in Fig.2.
Table.1: Look – up Table
Table.2: Operation Time of the NPR for over-current protection execution on µc
Digital
Values of
Current
Count for
Delay in
Register B
Delay Time
in Sec
0C (COUNT) - -
7FH 03H 0.19
7AH 05H 0.32
6DH 09H 0.57
66H 00BH 0.70
60H 00DH 0.83
5AH 010H 1.00
53H 016H 1.40
4DH 01EH 1.90
46H 02DH 2.90
40H 050H 5.10
3AH 07DH 8.00
33H 0DBH 14.00
Amplitude
Input current
(A)
According to
IEC
standard
Execution on
µc
Written ASM
code
170 - -
210 - -
213 329.9419 324.6737
227 19.2614 19.34454
500 0.9948 0.994825
5. Performance Evaluation of a Modern NPR for Over Current Protection with…
15
Yes
No
Yes
No
Send signal to Multiplexer to switch
on S1 to get ldc
Start
Initialize I/O Ports
Send start of conversion signal to
ADC
Read ldc
Is current more than
pick-up?
Yes
ls CB closed
ls conversion
over?
No
Select delay time
Jump
Delay
Send trip signal
Fig.2: Flow Chart of NPR Algorithm for Over Current Protection
6. Performance Evaluation of a Modern NPR for Over Current Protection with…
16
V. CONCLUSION
This paper describes the performance evaluation of modern NPR using the application of
microcontroller technology for over current protection. Results clearly indicate that the operation time obtained
for implementation method is similar to IEC standard. For transient analysis, the relay is proficient in detecting
transient input. The µc based over current relay using implementation method is proven to provide adequate
reliability and security with improved performance. The objectives of this research are:
To design and fabricate over current protection relay using PIC microcontroller which can operate on
the permissible conditions by setting the over current value.
To test unwanted conditions (over current) and when such conditions arise to isolate the fault condition
in the shortest time possible.
To investigate IDMT curve characteristic. In future, the method selected to implement the over current
relay will depend on the preference of memory usage or execution time of the protection algorithm.
REFERENCES
[1]. Yin Lee Goh, Agileswari K. Ramasamy, Farrukh Hafiz Nagi, Aidil Azwin Zainul Abidin, Evaluation
of DSP based Numerical Relay for over-current Protection, International Journal of Systems
Applications, Engineering & Development Issue 3, Volume 5, 2011.
[2]. Network Protection & Automation Guide, Areva T&D, 1995.
[3]. A. Iagar, G. N. Popa, C. M. Dinis, and G. Moraru, “Study about numerical relay SEL-387 for over
current and differential protections of 110/20 kV transformers,” in Proc. of the 13th WSEAS
International Conference on Systems, Greece, 2009, pp. 265–270.
[4]. E. Price, “The next step in the evolution of protection and control implementation,” in Annual
Conference for Protective Relay Engineers, 2010, pp. 1–16.
[5]. M. Khederzadeh, “Back-up protection of distance relay second zone by directional over current relays
with combined curves,” in IEEE Power Engineering Society General Meeting, 2006.
[6]. H. A. Darwish, and M. Fikri, “Practical considerations for recursive DFT implementation in numerical
relays,” IEEE Trans. on Power Delivery, vol. 22, pp. 42–49, January 2007.
[7]. P. P. Bedekar, S. R. Bhide, and V. S. Kale, “Optimum time coordination of over current relays in
distribution system using Big-M (Penalty) method,” WSEAS Trans. on Power Systems, 4(11), pp.
341–350, November 2009.
[8]. D. N. Vishwakarma, and Z. Moravej, “ANN based directional over current relay,” IEEE/PES
Transmission and Distribution Conf. and Exposition,” vol. 1, 28 October–2 November 2001, pp. 29–
64.
[9]. W. Al-Hasawi, and M. Gilany, “Proposed techniques for identifying open and short circuit sections in
distribution networks,” WSEAS Trans. on Power Systems, 4(12), pp. 372- 381, December 2009.
[10]. J. C. Tan, P. G. McLaren, R. P. Jayasinghe, and P. L. Wilson, “Software model for inverse time over
current relays incorporating IEC and IEEE standard curves,” in Canadian Conf. on Electrical and
Computer Engineering, vol. 1, 12–15 May 2002, pp. 37–41.
[11]. R. Lin, “Development of protective relaying equipment in substations,” Proc. of the 2006
IASME/WSEAS International Conference on Energy & Environmental Systems, Chalkida, Greece,
May 8-10, 2006, pp. 373–378.
[12]. F. Wang, and M. H. J. Bollen, Classification of component switching transients in the viewpoint of
protective relays,” Electric Power Systems Research, 64(3), pp. 197–207, March 2003.
[13]. F. Muzi, “A filtering procedure based on least squares and Kalman algorithm for parameter estimate in
distance protection.” International Journal of Circuits, Systems and Signal Processing, 1(1), pp. 16–
21,2007.
[14]. TMS320x281x DSP Analog-to-Digital Converter (ADC) Reference Guide, Texas Instruments, 2005.
[15]. D. Campos, E. Moreno, and D. Torres, “Test and evaluation time inverse over-current protection
algorithm using SIMULINK,” Proc. Of the 7th WSEAS Int. Conf. on Signal Processing, Istanbul,
Turkey, 2008, pp.
[16]. Computer representation of over current relay characteristics, IEEE Power Engineering Review, vol. 9,
pp. 50–51, July 1989.
[17]. N. X. Tung, G. Fujita, M. A. S.Masoum and S. M. Islam, “Impact of harmonics on tripping time and
coordination of over current relay,” in 7th WSEAS Int. Conf. on Electric Power Systems, High
Voltages, Electric Machines, Venice, Italy, November 2007, pp. 46–52.
[18]. Jarm-Long Chung, Ying Lu, Wen- hiow Kao and Chih-Ju Chou, “Study of solving the coordination
curve intersection of inverse-time over current relays in subtransmission systems,” IEEE Trans. on
Power Delivery, vol. 23, no. 4, pp. 1780–1788, 2008.
7. Performance Evaluation of a Modern NPR for Over Current Protection with…
17
[19]. A. A. Zainul Abidin, A. Ramasamy, I. Z. Abidin, and F. H. Nagi, “Over current time delay
determination using gain scheduled PID controllers,” 3rd International Conference on Energy and
Environment, 2009, pp. 89– 93.
[20]. N. Mikulandra, and M. Stojkov, “New challenges for protection system,” Proceedings of the 4th
IASME/WSEAS International Conference on Energy & Environment, February 2009, pp. 269–272.
[21]. Yin Lee Goh, Agileswari K. Ramasamy, Farrukh Hafiz Nagi, Aidil Azwin Zainul Abidin, “Evaluation
of DSP based Numerical Relay for Over current Protection”, International journal of systems
applications, engineering & development Issue 3, volume 5, 2011.
[22]. Md. Aminur Rahman, Kazi Main Uddin Ahmed, Md. Rayhanus Sakib, “Modeling Of A Novel Fuzzy
Based Over current Relay Using Simulink”, International Journal of Scientific & Technology Research,
ISSN 2277-8616, Volume 1, Issue 4, May 2012.
[23]. Bruno Osorno, “Analysis of Microprocessor Based Protective Relay’s (MBPR) Differential Equation
Algorithms”, Journal Of Computing, Volume 2, Issue 6, June 2010, ISSN 2151-9617.
[24]. Avinash Panwar ,Ashish Khandelwal, “Modern numerical relay for power system protection”,
IJNPME, ISSN: 2250 0839, Volume 2 Issue 1 2012.
[25]. Dominik Pieniazek, P.E.,“Over Current Protection & Coordination for Industrial Applications”, IEEE
Houston Chapter-Continuing Education on Demand on 2009-2010.
[26]. Murty Yalla, Mark Adamiak, A. postolov, J. Beatty, S. Borlase, J. Bright, J. Burger, S. Dickson, G.
Gresco, W. Hartman, J. Hohn, D. Holstein, A. Kazemi, G. Michael, C. Sufana, J. Tengdin, M.
Thompson, and E. Udren, “Application of Peer-to-Peer Communication for Protective Relaying”,
IEEE transactions on power delivery, vol. 17, no. 2, April 2002.
[27]. Wei-Jen Lee, Jyh-Cherng Gu, Ren-Jun Li, and Ponpranod Didsayabutra, “A Physical Laboratory for
Protective Relay Education”, IEEE transactions on education, vol. 45, no. 2, May 2002.
[28]. Vladimir Gurevich, “Microprocessor Protection Devices: the Present and the Future”, Serbian Journal
of Electrical Engineering, Vol. 5, No. 2, November 2008, 325-339.
[29]. V.I. Gurevich, “Stability of microprocessor relay protection and automation systems against intentional
destructive electromagnetic impacts: part 2”, ISSN 2074-272X. 2011. No.6.
[30]. Bogdan Kasztenny and Normann Fischer, “Advanced Protection, Automation, and Control Functions”,
Schweitzer Engineering Laboratories, Inc.
[31]. J. Lewis Blackburn & Thomas J. Domin, “Protective Relaying Principles and Applications”, CRC
Press, Taylor & Francis Group, London, New York.
[32]. “Redundancy Considerations for Protective Relaying Systems”, IEEE PSRC, WG I 19.