Analysis of fault using microcomputer protection by symmetrical component method
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 5)Publication Date: 2012-09-27
Authors : Ashish Choubey; Latika Pande;
Page : 90-95
Keywords : Data Mining; Concept Lattice; Attribute Reduction; Close-degree; fault component; current and voltage.;
Abstract
To enhance power supply reliability for the user terminals in the case of the distribution system to avoid interference by the fault again, rapidly complete the automatic identification, positioning, automatic fault isolation, network reconfiguration until the resumption of supply of non-fault section, a microprocessor-based relay protection device has developed. As the fault component theory is widely used in microcomputer protection, and fault component exists in the network of fault component, it is necessary to build up the fault component network when short circuit fault emerging and to draw the current and voltage component phasor diagram at fault point. In order to understand microcomputer protection based on the symmetrical component principle, we obtained the sequence current and sequence voltage according to the concept of symmetrical component. Distribution line directly to user-oriented power supply, the reliability of its operation determines the quality and level of electricity supply. In recent decades, because of the general power of the tireless efforts of scientists and technicians, relay protection technology and equipment application level has been greatly improved, but the current domestic production of computer hardware, protection devices are still outdated systems. Software development has maintenance difficulties and short survival time. With the factory automation system interface functions weak points, the network communication cannot meet the actual requirements. Protection principle configuration and device manufacturing process to be improved and so on.
Other Latest Articles
- Biorthogonal Wavelet Transform Digital Image Watermarking
- Performance Evaluation of Cross Layer QoS scheduling for Long Term Evolution Network
- Comparison and Analysis of an efficient Image Compression Technique Based on Discrete 2-D wavelet transforms with Arithmetic Coding
- Location Privacy Using User Anonymity and Dummy Locations
- A Review of Content Based Image Classification using Machine Learning Approach
Last modified: 2014-11-25 18:15:03