1988
DOI: 10.1109/61.193868
|View full text |Cite
|
Sign up to set email alerts
|

Digital protective relaying algorithm sensitivity study and evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

1989
1989
2016
2016

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(4 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…The correct trip probability of relay R 1 can then be derived by multiplying it to the probability in (5) and integrating it over the whole line range as:…”
Section: Evaluation Of the Correct Trip Probabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…The correct trip probability of relay R 1 can then be derived by multiplying it to the probability in (5) and integrating it over the whole line range as:…”
Section: Evaluation Of the Correct Trip Probabilitymentioning
confidence: 99%
“…Three facets of protection, namely, security, dependability and availability, define performance indicators [1], [2]. A reliability index, based on statistical data of relay operations, has been proposed in [3] and [4], while the parameter sensitivity of the protective relaying algorithms has been studied, based on experimental data in [5]. Due to a lack of relay information, however, the proposed reliability index has been evaluated in a combined manner, which cannot be used to pinpoint the causes of malfunctions.…”
Section: Introductionmentioning
confidence: 99%
“…where: is a considered number of post-fault samples, is the ideal (accurate) time response, is a sample number as explained below. The index (3) is computed in the window of samples starting from the th sample [5]. The value of should be selected to reflect the fact that some relaying algorithms use transient monitors to postpone tripping.…”
Section: A Evaluating the Time Responsementioning
confidence: 99%
“…There have been several interesting works on the evaluation of the performance or ability of a protective device [1][2][3][4]. For example, stochastic approaches for the evaluation of the digital protective devices were suggested along with fuzzy logics to measure the performances of the protective devices, all of which are focused not on a system but on a device level.…”
Section: Introductionmentioning
confidence: 99%