Wide area protection systems aim to address vulnerabilities in modern power systems. Conventional protection systems provide local views but no overall system view, and actions are uncoordinated. Wide area protection systems fill this gap by analyzing real-time measurements across wide areas to recommend control strategies. They can help increase transmission capacity and reliability by taking action to prevent contingencies from causing instability. This paper surveys applications of synchrophasor-based wide area protection, including existing systems, case studies of disturbances, and technologies enabling wide area protection implementations.
In this paper prepared a systems to that amount the units of the fitness about structural elements within Reinforced Concrete (RC), at total times, partially atop the perfect coverage concerning sensors is provided. As a result, the records about the distances within the sensor’s near nodes and its sensing areas are the only want because concerning every sensor into the recent algorithms. Furthermore, based totally completely regarding the simulations, great improvement performs stay seen along the lifespan regarding a variety concerning existing lifespan maximization algorithms, anybody is a cease end result related to the newly proposed algorithm. The promoted sensor mark hard-ware trigger the PZT sensor and collect the responses acquires beyond the structural element. It moreover send collected information to an information middle because of similarly science yet analysis within an energy efficient manner using low power wireless verbal exchange technology. The brought ingress in conformity with and the evaluation atop the accrued information operate lie remotely executed by means of using a net interface. Performance effects showcase therefore a good deal the fractures great enough within consequence including purpose structural problems be able continue to be efficiently detected together with the promoter rule
This document discusses wide area monitoring systems (WAMS) and their components. WAMS use phasor measurement units (PMU) synchronized by GPS to measure voltage and currents across large areas of the power grid. A phasor data concentrator (PDC) collects PMU data and performs monitoring, alarming, event triggering, and quality checks. WAMS allow real-time monitoring of grid dynamics to detect and prevent instability issues, providing benefits over traditional SCADA systems with slower sampling. The document reviews several WAMS implementations at utilities in countries like Finland, Switzerland, Croatia, Austria, and Thailand.
Phasor measurement unit and it's application pptKhurshid Parwez
The effective operation of power systems in the present and the future depends to a large extent on how well the emerging challenges are met today. Power systems continue to be stressed as they are operated in many instances at or near their full capacities. In order to keep power systems operating in secure and economic conditions, it is necessary to further improve power system protection and control system. Phasor measurement unit (PMUs), introduced into power system as a useful tool for monitoring the performance of power system, has been proved its value in the extensive applications of electric power system. In response, a research program that is specifically aimed at using PMU to improve the power system protection and control. To ensure that the proposed research program is responsive to particular industry needs in this area, and participants of the workshop identified two major research areas in which technological and institutional solutions are needed: 1) PMU implementation, 2) PMU applications. It’s recommends research, design, and development (RD&D) projects in this report. The objective of these projects is to improve the reliability of local and wide transmission grid by enabling and enhancing the system protection and control schemes by using PMU measurement data, reduce the economic burden of utilizes to implement PMUs.
Cluster Computing Environment for On - line Static Security Assessment of lar...IDES Editor
The increased size of modern power systems
demand faster and accurate means for the security assessment,
so that the decisions for reliable and secure operation planning
could be drawn in a systematic manner. Large computational
overhead is the major impediment in preventing the power
system security assessment (PSSA) from on-line use. To
mitigate this problem, this paper proposes, a cluster computing
based architecture for power system static security assessment,
utilizing the tools in the open source domain. A variant of the
master/slave pattern is used for deploying the cluster of
workstations (COW), which act as the computational engine
for the on-line PSSA. The security assessment is performed
utilizing the developed composite security index that can
accurately differentiate the secure and non-secure cases and
has been defined as a function of bus voltage and line flow
limit violations. Due to the inherent parallel structure of
security assessment algorithm and to exploit the potential of
distributed computing, domain decomposition is employed for
parallelizing the sequential algorithm. Extensive
experimentations were carried out on IEEE 57 bus and IEEE
145-bus 50 machine standard test systems for demonstrating
the validity of the proposed architecture.
Voltage Stability Assessment using Phasor Measurement Units in Power Network ...Satyendra Singh
This paper presents the assessment methodology for
voltage stability using Phasor Measurement Unit (PMU) with
complete system observability. For full power system
observability, the PMU placement is considered with and without
conventional power flow as well as injection measurement such
that minimum number of PMU’s is used. Data obtained by
PMU’s are used for voltage stability assessment with the help of
L-Index. As the PMU gives real time voltage and current phasors
and L-index is dependent on voltage and admittance values, thus
the L-index so obtained can be used as real time voltage stability
indicator. The case study has been carried out on IEEE-14 bus
system.
Synchrophasor Applications Facilitating Interactions between Transmission and...Luigi Vanfretti
Distribution grid dynamics will become increasingly complex due to the transition from passive to active networks arising from the increase of renewable energy sources at medium and voltage level. A successful transition requires to increase the observability and awareness of the interactions between Transmission and Distribution (T&D) grids, particularly to guarantee adequate operational security.
This presentation explores how different technical means can facilitate interactions between TSOs and DSOs with the utilization of GPS-time-synchronized phasor measurements (aka Phasor Measurement Units (PMUs)) with millisecond resolution. If made available in actual T&D networks, such high-sampled data across operational boundaries allows an opportunity to extract information related to different time-scales.
As part of the work carried out in the EU-funded FP7 IDE4L project (http://ide4l.eu/), a specific use case, containing PMU-based monitoring functions, has been defined to support the architecture design of future distribution grid automation systems. As a result, the architecture can accommodate for key dynamic information extraction and exchange between DSO and TSO.
This presentation presents the use case and focuses on the technical aspects related to the development and implementation of the PMU-based monitoring functionalities that can provide means to facilitate technical co-operation between transmission and distribution operations.
PMUs provide time-synchronized measurements of voltage and current phasors at high sampling rates to improve situational awareness over traditional SCADA. However, there are several challenges to widespread PMU adoption including a lack of standards resulting in diverse utility requirements, high upfront investment costs, and difficulties in optimally placing PMUs and visualizing large volumes of data. Computational challenges also exist for applications like oscillation monitoring and online stability assessment that require processing PMU measurements.
The Schneider Electric MetConsole® Low Level Wind Shear Alert System (LLWAS) – a module of the company’s MetConsole Aviation Weather Suite – provides the reliable and timely information and alerting to the gust fronts, downbursts or microbursts induced by thunderstorms. It helps minimize disruptions, caused by these wind shear conditions, to aircraft flying below 1,000 feet while approaching and departing airports.
The document proposes a "SMART DAM" project that uses sensors, IoT devices, cloud computing and artificial intelligence to automate dam monitoring and operations. The system would allow dam authorities to remotely monitor water levels, weather data and control flood gates. It would also provide data to researchers and notify local communities of flood risks through siren alarms. The proposed architecture involves sensors transmitting data to a Raspberry Pi, cloud storage and an intelligent decision support system using neural networks to automate gate operations.
An investigation on the application and challenges for wide area monitoring a...journalBEEI
This document discusses wide area monitoring and control (WAMC) in smart grids using phasor measurement units (PMUs). It outlines several applications of PMU-based WAMC including voltage stability monitoring, oscillation monitoring, and fault detection/location. It also discusses challenges of implementing WAMC including data handling of large PMU data streams and communication delays over different network infrastructures that can impact system control performance. Overall, the document provides an overview of the potential applications and technical challenges of deploying PMU-based WAMC in modern power systems.
The document discusses energy conservation techniques in wireless sensor networks. It begins with an introduction to wireless sensor networks and identifies power consumption as a major challenge. It then outlines the typical architecture of a wireless sensor node and examines the power breakdown across different components. The document proceeds to discuss basic approaches to energy conservation, including duty cycling, data-driven, and mobility-based techniques. It also mentions future work in integrating different approaches into a single solution and addresses questions.
Power system transmission issues and effectsAnand Azad
This document discusses power system transmission issues and effects. It covers 5 topics: 1) reliability requirements to maintain supply-demand balance and synchronous operation, 2) system planning criteria like the N-1 standard, 3) power transmission technologies like AC and DC, 4) system studies to evaluate steady-state operation and dynamic behavior, and 5) possible transmission system improvements like adding lines, fast fault clearing equipment, and advanced transmission technologies.
Design of an Advanced Phasor Data Concentrator for Monitoring of Distributed ...Reza Pourramezan
Published in IEEE Transactions on Industrial Informatics
2017
Authors: Reza Pourramezan, Younes Seyedi, Houshang Karimi, Guchuan Zhu, and Michel Mont-Briant
DOI: 10.1109/TII.2017.2697438
International Journal of Engineering Research and DevelopmentIJERD Editor
This document summarizes the performance evaluation of a modern numerical protective relay (NPR) using a microcontroller for overcurrent protection. It describes the design and implementation of an overcurrent relay using a microcontroller-based system-on-chip approach. The relay is tested according to IEEE standards and shown to operate within acceptable time limits. Test results demonstrate that the microcontroller-based design provides adequate reliability and security for overcurrent protection while improving performance compared to conventional designs.
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET Journal
The document discusses the Real-Time, Fault Tolerant and Energy-Efficient (REFER) protocol for wireless sensor and actuator networks (WSANs). It proposes embedding Kautz graphs into the physical topology of a WSAN to enable real-time communication and connecting the graphs using a distributed hash table for scalability. The REFER protocol also includes an efficient fault-tolerant routing mechanism that allows nodes to quickly identify alternate paths upon failures based on node IDs rather than retransmissions. Simulation results show REFER outperforms existing WSAN approaches in terms of real-time performance, energy-efficiency, fault-tolerance and scalability.
The document discusses a laboratory model built and tested for a wide area protection strategy. The results were used to develop a study unit for a power system protection course for industrial education students. The model uses modules to create an extensive backup protection system. It calculates voltage-current correlation factors at both ends of transmission lines to identify which line is faulted based on the multiplication of the factors. In cases of normal operation, the correlation factors have opposite signs and the multiplication factor is negative, indicating normal operation.
Supervisory control and data acquisition (SCADA) systems are crucial for ensuring power grids supply electricity safely and reliably when combined with larger energy management systems (EMS) or distribution management systems (DMS). SCADA/EMS and SCADA/DMS systems are necessary for controlling power grids, integrating renewables, and providing universal access. World Bank support is important for establishing these systems in developing countries' power networks to ensure sustainable long-term growth.
This paper presents a novel optimization technique using genetic algorithms to develop an optimized emergency defence plan for power systems. The technique determines the optimal combination of generator tripping, load shedding, and islanding to regain system stability following severe contingencies. It was applied to the Libyan power system using time-domain simulations to evaluate solutions. Results showed the optimized defence plan required less load shedding than the existing Libyan plan and improved system response during a 2003 blackout event.
This document presents a proposed self-healing control algorithm to improve the reliability of a smart grid distribution system. It begins with an introduction that outlines how smart grid solutions can help utilities quickly identify faults, shorten outage times, and restore power faster. The document then reviews literature on various approaches to self-healing control and identifies gaps in existing research. Specifically, it is proposed to develop a self-healing control algorithm using modern control theory and artificial intelligence to address voltage instability from supply-demand imbalances introduced by renewable energy sources and electric vehicles. An experiment is outlined to test the algorithm on a proposed smart grid distribution system model incorporating solar power, energy storage, and electric vehicles.
International Journal of Engineering (IJE) Volume (3) Issue (1)CSCJournals
This document discusses the implementation of artificial intelligence techniques for steady state security assessment in deregulated power system markets. It proposes using neural networks, decision trees, and adaptive neuro-fuzzy inference systems to analyze power transactions between generators and customers in deregulated systems. Data from load flow analysis is used to train and test the AI models. The techniques are tested on various standard power system test cases. The results show that neural networks provide more accurate and faster assessments compared to decision trees and neuro-fuzzy systems, but the latter two may be easier to implement for practical applications. The new methods could help improve security in planning and operating deregulated power system markets.
An integrated framework_for_smart_microgrids_modeling_monitoring_control_comm...Premkumar K
The document proposes an integrated framework for modeling, monitoring, controlling, communicating, and verifying smart microgrids using service-oriented architectures. It discusses technical challenges in microgrid operation including dual grid-connected and islanding modes. The framework is intended to address issues like optimal generation scheduling, security assessment, demand management by enabling information exchange and integration with existing energy management systems. It aims to provide a platform, language, and vendor-independent solution.
FUZZY LOGIC APPROACH FOR FAULT DIAGNOSIS OF THREE PHASE TRANSMISSION LINEJournal For Research
This document summarizes a journal article that proposes using fuzzy logic to diagnose faults on three-phase transmission lines. It begins with an abstract of the journal article, which describes using fuzzy logic as an intelligent technique to quickly and accurately identify the type of fault that occurs on a transmission system. It then provides background on transmission line faults, fault types, and challenges with transmission line protection. The document outlines the proposed fuzzy logic approach, including defining fault types as fuzzy sets and developing if-then rules to relate transmission line voltages and currents to faults. Simulation results are presented showing the fuzzy logic approach can identify different fault types based on the current responses. The conclusion is that the proposed fuzzy logic method allows for fast and reliable fault detection on transmission
This document discusses issues related to smart grid resilience and proposed enhancements. It begins with an introduction to smart grids and the concept of resilience. Major issues discussed include cyber threats like false data injection attacks and denial-of-service attacks, as well as natural disasters. Several enhancement techniques are then proposed, such as using energy storage systems, distributed energy resources, microgrids, and blockchain technology. The document focuses on cybersecurity issues in more depth, outlining various false data injection attacks and their potential impacts. It also discusses denial-of-service attacks and proposes detection and mitigation methods. Overall, the document analyzes resilience challenges in smart grids and presents technical solutions aimed at improving system reliability and recovery capabilities.
PROTECTION COORDINATION OF DISTRIBUTION SYSTEMS EQUIPPED WITH DISTRIBUTED GEN...ELELIJ
This document discusses protection coordination challenges for distribution systems with distributed generation (DG). It presents an approach to overcome miscoordination between protective devices caused by DG. The key points are:
1) Adding DG impacts fault currents and power flows, potentially causing protective devices like reclosers and fuses to miscoordinate.
2) The proposed approach activates directional protection in reclosers and updates settings for relays, reclosers, and fuse sizes. This allows proper coordination without extra costs or equipment.
3) A real 11kV distribution feeder is simulated using ETAP software to validate the approach and ensure protection coordination can be achieved after DG integration with suitable device settings.
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKSJournal For Research
Congestion in WSN is a current research area. There are so many studies to avoid, detect and control congestion in WSN. This paper discussing about current studies going in this field.
Protection Scheme in Generation NetworkIRJET Journal
This document discusses protection schemes for generation networks. It covers several topics related to protection schemes including adaptive protection strategies, reliability aspects, self-healing mechanisms, cybersecurity challenges and solutions, and advanced relay technologies and innovations. The document aims to comprehensively explore how smart grid concepts can transform protection relay technology and addresses aspects like data management, protection strategies, fault detection optimization techniques, and network reconfiguration.
A REVIEW OF SELF HEALING SMART GRIDS USING THE MULTIAGENT SYSTEMijiert bestjournal
This document reviews techniques for self-healing smart grids using multi-agent systems. It summarizes three papers that propose different multi-agent based approaches: 1) A distribution automation solution using substation, load, and restoration agents; 2) A cooperative agent architecture with bus, distributed generator, zone, and global agents; 3) An overload relief strategy using wide area measurements and a unified power flow controller. The techniques aim to automate fault detection, location, and restoration to improve grid reliability through self-healing capabilities.
The document discusses fault management in wireless sensor networks. It proposes a failure detection scheme for event-driven wireless sensor networks using the MANNA management architecture. The scheme aims to provide self-configuration, self-diagnosis, and self-healing capabilities to detect failures without incurring high overhead costs. The performance of the management solution is evaluated through simulations of a temperature monitoring application in event-driven wireless sensor networks under different failure scenarios.
This document discusses security issues with SCADA (Supervisory Control and Data Acquisition) systems. SCADA systems are used to control critical infrastructure like water treatment plants, oil pipelines, and nuclear power plants. However, SCADA systems often use outdated protocols and hardware with no security protections. They are vulnerable to attacks that could disrupt important systems or endanger public safety. The document outlines several past attacks on SCADA systems and control failures that highlight the security risks if these systems are not properly protected from cyber threats.
This document discusses security issues with SCADA (Supervisory Control and Data Acquisition) systems. SCADA systems are used to control critical infrastructure like water treatment plants, oil and gas pipelines, electrical grids, and nuclear power plants. However, SCADA systems often have weak security protections due to using outdated protocols and hardware that cannot be easily upgraded. This makes SCADA networks vulnerable to attacks that could disrupt important systems and endanger public safety. The document outlines several past attacks on SCADA networks and control systems that demonstrate these risks. Improving SCADA security will require collaboration between different fields like control systems engineering and cybersecurity.
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...Eswar Publications
This document summarizes and reviews various checkpointing and rollback recovery algorithms that have been proposed to provide fault tolerance in mobile ad hoc networks (MANETs). It begins with background information on MANETs and checkpointing. Checkpointing techniques take snapshots of process states and store them to allow recovery from failures without restarting from the beginning. The document then describes different types of checkpointing, including uncoordinated, coordinated, communication-induced, and hybrid approaches. Several specific algorithms for MANETs checkpointing are then analyzed, including flooding-based, concurrent checkpointing, cluster-based, and mobility-aware approaches. The document concludes by stating that checkpointing presents challenges for MANETs due to their dynamic topology and limited
A Comparative Review on Reliability and Fault Tolerance Enhancement Protocols...IRJET Journal
This document provides a comparative review of reliability and fault tolerance enhancement protocols in wireless sensor networks. It first discusses key challenges for wireless sensor networks related to node failures in harsh environments. It then summarizes several existing fault detection and recovery techniques. The document compares protocols like E2SRT, GARUDA, RCRT, and ZARB that aim to improve reliability. It highlights issues around achieving fault tolerance and concludes that no single approach can provide a fully reliable solution, requiring a hybrid method using the best features of different protocols.
Autonomous sensor nodes for Structural Health Monitoring of bridgesIRJET Journal
This document discusses using autonomous sensor nodes and wireless sensor networks for structural health monitoring of bridges. It aims to detect damage in structures early through continuous monitoring. Sensor nodes containing microcontrollers, temperature, vibration and pressure sensors would be attached to bridges and transmit data wirelessly. This would make inspections more efficient and improve safety by identifying issues early. The document reviews related work using similar wireless sensor network systems for structural monitoring. It discusses the need for such monitoring in India given the increasing construction of large buildings and infrastructure. The objectives are outlined as detecting, locating, identifying and quantifying any damage. Hardware and software components are listed including ESP32 microcontrollers and sensors to measure temperature, vibration and pressure.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
Encontro anual da comunidade Splunk, onde discutimos todas as novidades apresentadas na conferência anual da Spunk, a .conf24 realizada em junho deste ano em Las Vegas.
Neste vídeo, trago os pontos chave do encontro, como:
- AI Assistant para uso junto com a SPL
- SPL2 para uso em Data Pipelines
- Ingest Processor
- Enterprise Security 8.0 (Maior atualização deste seu release)
- Federated Analytics
- Integração com Cisco XDR e Cisto Talos
- E muito mais.
Deixo ainda, alguns links com relatórios e conteúdo interessantes que podem ajudar no esclarecimento dos produtos e funções.
https://www.splunk.com/en_us/campaigns/the-hidden-costs-of-downtime.html
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-leading-observability-practice.pdf
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-modern-security-program.pdf
Nosso grupo oficial da Splunk:
https://usergroups.splunk.com/sao-paulo-splunk-user-group/
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
Response & Safe AI at Summer School of AI at IIITHIIIT Hyderabad
Talk covering Guardrails , Jailbreak, What is an alignment problem? RLHF, EU AI Act, Machine & Graph unlearning, Bias, Inconsistency, Probing, Interpretability, Bias
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
CONVEGNO DA IRETI 18 giugno 2024 | PASQUALE Donato
Technical paper 6_2
1. WIDE AREA PROTECTION:
BENEFITS, SCHEMES & EXAMPLES
To read the full paper, please contact
dar@dar-engineering.com
TECHNICAL PAPER
*This paper was presented at GCC CIGRE 2011, Kuwait
Modern power systems are almost typical with regards to
reduced redundancy and operating close to, or even at, their
security limits. Today the power system is more vulnerable to a
blackout more than ever before. Wide-area disturbances and
large-scale outages could occur by the system deteriorating into
a terminal state, starting from a single or multiple outages and
cascading into an avalanche of outages. Conventional protection
and control systems are the only means of counteracting such
disturbances, and/or mitigating their effects. The main
disadvantage of the present conventional method of system
monitoring and control is the inappropriate system dynamic
view, i.e. no operator has the full view picture of what’s
happening in the network. Also blackouts, wide-area
disturbances, etc., may develop in such short times, quicker than
the time the operator would take analyzing and deciding which
action to take and acting it.
The local actions are uncoordinated in nature, like that in
decentralized protection devices, or even in load shedding
schemes that might operate in conjunction with generator
rejection schemes. Hidden failures in protection relays and mal-
operations of protective schemes also play a major role in the
deterioration of situations.
The above conclusions were realized after studying any of the
previously occurred wide-area disturbances or major blackouts.
Hence the need of the introduction of smart, wide-area-
perspective schemes which rely on state-of-the-art, recently
developed communication and computer infrastructures.
While local protection relays and devices operate through short
times, these actions are certainly uncoordinated. Coordinated
actions will be taken through SCADA/EMS systems by operators,
however in prolonged times, which might make the situations
too late to rescue. Wide Area Protection (WAP) systems provide
a very promising future in the face of wide-area disturbances and
blackouts, as they fill in the gap between local, fast protection
actions and wide-area, slow control-centers actions.
Phasor measurement technologies now allow accurate
comparison of measurements over widely separated locations as
well as potential real-time measurement based control actions.
Hence WAP systems could be employed to fulfill the two main
objectives of increasing transmission capability as well as
increasing system reliability, by performing a real-time, look-
ahead analysis giving some recommendation of possible updated
control strategies and actions, especially in the events of
contingencies. The WAP system shall know what actions to take
based on the present system condition in the case that a certain
contingency occurring, or would take an action saving the
system progressing into an unstable state.
This paper presents a literature survey on the topics concerned
with the applications of synchrophasor-based Wide Area
Protection systems. Firstly, a brief preview of the current
existing conventional protection, control and SCADA/EMS
systems is presented. Through a survey, several cases of wide-
area disturbances are presented while emphasizing the potential
of implementing the new WAP systems as appropriate solutions
and preventive measures against the wide-area disturbances and
blackouts. Definitions of WAP and the current directions for
implementing the WAP systems are presented, through different
architectures, already demonstrated through previous literature,
in addition presenting the possible practical ways of
implementation in the current modern grid. A quick look at the
aiding technologies that allow the implementation of such WAP
systems will be taken, including data processing, data collection
and communications. A summary of examples of the WAP
systems, either practical, or novel-based will also be previewed
in this paper, as an effort from the authors through the surveyed
literature.
Authors: A. Y. Abdelaziz & Walid El-Khattam, The Electrical Power and Machines Department, Faculty of Engineering, Ain Shams University, Cairo, Egypt &
Mohammed Yahya, DAR Engineering