Font Size: a A A

Study And Comparison Of Wide Area Protection System's Algorithm

Posted on:2016-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhongFull Text:PDF
GTID:2322330503494236Subject:Power system and its automation
Abstract/Summary:PDF Full Text Request
In recent years, more stable accident happens in the world, causing enormous losses, and the operation of modern power grid has the stability and control of the system put forward specific requirements. The introduction of the electric power market mechanism makes the relay protection face more new challenges.New concept of wide-area protection offered to relay protection into a brand-new field. With the help of the computer technology and communication technology development, it shares more information of power system, the fault point quickly and reliably resection.And at the same time, failure analysis and removal effect the safe and stable operation of the system,making the corresponding area protection and control decisions. This paper introduces the basic concept of wide-area protection and thought.This paper will analyze the difference of wide area protection and traditional protection, analysis the difference between wide area differential protection and the traditional differential protection, multi differential protection. The reliability and feasibility of the wide area protection communication is analyzed..Then this article will focus on grid wide-area differential protection based on graph theory is introduced and the wide-area relay protection system based on grid computing, and the horizontal comparison, analyzes the advantages and disadvantages.Wide-area protection as a new kind of protection, there are many areas still stay research, learning and development. Looking forward to in the near future, with computer software support, we hope it can make the operation of the power grid more and more stable.
Keywords/Search Tags:Wide Area Protection, Phase Current Differential Protection, Grid Computing, Division of Protected Areas, Graph Theory, Network Topology
PDF Full Text Request
Related items