2017
DOI: 10.1016/j.epsr.2016.09.024
|View full text |Cite
|
Sign up to set email alerts
|

Preventing transmission distance relays maloperation under unintended bulk DG tripping using SVM-based approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…The transmission networks face different protection challenges due to bulk penetration of the wind power including under/overreach issue of the relays due to change of fault impedance [110]. In response, many protection schemes have been proposed including adaptive logic program based scheme [111], adaptive distance relay setting scheme [112], support vector machine-based scheme [113], data-mining-based intelligent differential relaying [114], and wavelet and Fourier Transform based differential relaying [115]. The level of fault current, in addition to the selection and coordination of protective devices, are the main challenges of the microgrids incorporated with the wind [110].…”
Section: G Protection Challengesmentioning
confidence: 99%
“…The transmission networks face different protection challenges due to bulk penetration of the wind power including under/overreach issue of the relays due to change of fault impedance [110]. In response, many protection schemes have been proposed including adaptive logic program based scheme [111], adaptive distance relay setting scheme [112], support vector machine-based scheme [113], data-mining-based intelligent differential relaying [114], and wavelet and Fourier Transform based differential relaying [115]. The level of fault current, in addition to the selection and coordination of protective devices, are the main challenges of the microgrids incorporated with the wind [110].…”
Section: G Protection Challengesmentioning
confidence: 99%
“…x k+1 =cx k +dv k+1 (9) Here Vk+1 is the current value of velocity, a is the weight factor, b1 and b2 are the learning factor which can be selected as 1 or 2 any random value. Then the r1 and r2 values are random values which is taken between 0 to 1.…”
Section: 𝑚𝑖𝑛 ∑ 𝑊 𝑗 𝑌 𝑗 𝑛 𝑗=1mentioning
confidence: 99%
“…These strategies, however, are extremely dependent on system parameters and cannot be used when the topology of the system changes. Soft computing approaches like neural networks and fuzzy logic [8], [9] have sparked a lot of interest in power system failure analysis because of their capacity to learn and recognize fault events. Neural networks have been used to improve real-time transmission line protection in many areas of power system operation [10 [13].…”
Section: Introductionmentioning
confidence: 99%
“…The normalization of the training set and the prediction set is processed, and the normalized mapping is treated as follows (Meena1, Panwar, Negi, & Jarial, 2012;Tasdighi & Kezunovic, 2017):…”
Section: Data Preprocessingmentioning
confidence: 99%