2021
DOI: 10.1016/j.epsr.2021.107221
|View full text |Cite
|
Sign up to set email alerts
|

Performance assessment of a line protection implemented with process bus and GOOSE through transient closed loop tests

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 0 publications
0
1
0
Order By: Relevance
“…The findings in [17] show a wireless LAN implementation of the IEC 61850 manufacturing message specification (MMS) protocol to facilitate data exchange among IEDs in a given electrical substation. The authors in [18] explore the implementation of the line differential protection function using IEC 61850 sampled value (SV) and GOOSE communication protocols. In addition, in [19], data acquisition cards and IEC 61850-based real-time simulators for protection relays are compared.…”
Section: Introductionmentioning
confidence: 99%
“…The findings in [17] show a wireless LAN implementation of the IEC 61850 manufacturing message specification (MMS) protocol to facilitate data exchange among IEDs in a given electrical substation. The authors in [18] explore the implementation of the line differential protection function using IEC 61850 sampled value (SV) and GOOSE communication protocols. In addition, in [19], data acquisition cards and IEC 61850-based real-time simulators for protection relays are compared.…”
Section: Introductionmentioning
confidence: 99%
“…The authors of [24] presented a performance tests in a distance protection with a Brazilian simulation tool, comparing conventional and digital relays, but without interoperability.…”
Section: Introductionmentioning
confidence: 99%
“…Estudos presentes na literatura analisam o desempenho da utilização do barramento de processo para esquemas de proteção de sistemas elétricos e avaliam os requisitos para o correto funcionamento de cada esquema de proteção, Yang et al (2011); Kanabar et al (2011); Soares et al (2021); Leite et al (2020); Pereira et al (2021). Isso implica no estudo do protocolo SV para entender o seu comportamento para diferentes esquemas de proteção, analisar impactos da sua utilização, e também para investigar outras possíveis aplicações desse protocolo de comunicação.…”
Section: Introdu ç ãOunclassified