Microprocessor and computer based protection scheme

Jun 2 • Notes • 3656 Views • 4 Comments on Microprocessor and computer based protection scheme

Microprocessor and computer based protection scheme

Microprocessor based:

microprocessor and computer based protection scheme

microprocessor and computer based protection scheme

The protection scheme which is microprocessor based has many advantages and is highly efficient.

Some of the advantages are

1)      reliable

2)       flexible

3)      faster than previously used protection schemes

In today’s era with the increasing  complexity of modern power systems more accurate and reliable   protection schemes are required.The microprocessor generally gives better performance at  lower cost and simple  construction because operation of the scheme is based on programming the microprocessor.

significant increase in the value of sensitivity,, functionalism and selection can be obtained for current line when the conventional distant differential security system is changed with the straightforward impedance relay based communication

Power scheme is usually a broadly extended scheme consisting of hundreds of essentials i.e., transformer, communication lines, generator, huge feeder line. Sustainability for providing  high services performance to the customers.

Computer based:

This protection technique which is computer based does not require any coordination process. This technique consists of two phases

1)offline phase It  is based on algorithm based on graph  to determine the break in sets for a predefined fault location. The determined bits per seconds are then grouped according to the no. of healthy components. It consists of scanning all  fault locations within the power system. The algorithm is used for all of them and the bits per second are computed and it is stored as the file name name related to the fault which is cleared.

2) online phase..It  is real time application of computer based relaying. On the detection of fault, the algorithm retrieves the appropriate file related to that fault and transmits the tripping signal to the circuit breaker of the first group of the bits per second.The algorithm stops if the fault is cleared or else it continues.

Every protective system which isolates a faulty element is required to satisfy some basic requirement: Security, Reliability, Selectivity, operates fast.

Security

security the term itself describes its meaning.It is the technique that control who uses or modifies the information stored and being used.

Reliability

The term reliability can be expressed as a probability of failure. Failure is not confined to protective gear but may also be due to breaker defects. Every component and circuit involved in fault clearance must be regarded as source of failure . Failure can be removed by a small calculated risk by  reliable designs backed with  regular and through maintenance. Quality of personnel must not be overlooked when considering reliability for mistakes by personnel are among the most likely causes of the failure. Some features of design and manufacturer which make relays inherently reliable are high contact pressures, dust free enclosures, well braced joints and impregnated coils. precautions in manufacture and assembly reduce liability to failures.

RELATED QUESTIONS-ANSWERS for Microprocessor and computer based protection scheme

1.WHAT ARE ITS ADVANTAGES OVER PREVIOUSLY USED PROTECTION SCHEMES

Some of the advantages are

1)      reliable

2)       flexible

3)      faster than previously used protection schemes

2.WHAT ARE THE TWO TECHNIQUES USED IN COMPUTER BASED PROTECTION SCHEME.

The two techniques are

1)offline phase It is the method which is based on the algorithm which is graph based and it determines the break in sets for the predefined fault location.The bits per second which are determined are then grouped as per the number of the non faulty components.

2) online phase After the detection of the fault the fault is retrieved and the signal to trip the circuit is given to the circuit breaker.

3.WHAT ARE THE BASIC REQUIREMENTS WHICH EVERY PROTECTION SYSTEM MUST FULFILL??

The basic requirements are-

a) Security

b)Reliability

c) Selectivity

d)fast operation

4.WHAT DO YOU UNDERSTAND BY THE CONCEPT SECURITY AND RELIABILITY?

Security is defined as the technique to control and modify the information which are stored and being used without getting affected.

Reliability is the probability of the failure and  each equipments are considered as the source of it.

GATE Syllabus-

1. Gate syllabus for Computer Science and Information technology 2014

2. Gate syllabus for Electrical Engineering 2014

3. Gate syllabus for Electronics and Telecomm 2014

IES Syllabus-

1. IES Syllabus for Electronics and Telecomm

2. IES syllabus for Electrical Engineering

3. IES Syllabus for General Ability

Tell us Your Queries, Suggestions and Feedback

Your email address will not be published.

« »