(0)

Introduction to Power System Protection

E-bog


Power system protection systems have three basic components: Instrument transformers, Relays, Circuit breakers

The function of the CT is to reproduce in its secondary winding a current I' that is proportional to the primary current I. The CT converts primary currents in the kiloamp range to secondary currents in the 0–5 ampere range for convenience of measurement.

The function of the relay is to discriminate between normal operation and fault conditions. The OC relay in Figure 2 has an operating coil, which is connected to the CT secondary winding, and a set of contacts. When |I'| exceeds a specified ''pickup'' value, the operating coil causes the normally open contacts to close. When the relay contacts close, the trip coil of the circuit breaker is energized, which then causes the circuit breaker to open.

System-protection components have the following design criteria:

• Reliability: Operate dependably when fault conditions occur, even after remaining idle for months or years. Failure to do so may result in costly damages.

• Selectivity: Avoid unnecessary, false trips.

• Speed: Operate rapidly to minimize fault duration and equipment damage. Any intentional time delays should be precise.

• Economy: Provide maximum protection at minimum cost.

• Simplicity: Minimize protection equipment and circuitry.

Since it is impossible to satisfy all these criteria simultaneously, compromises must be made in system protection.

The book consists from the following sections:

1. Chapter 1: Power System Faults:

2. Chapter 2: Instrument Transformers.

3. Chapter 3: Overcurrent and Earth Fault Protection Relays.

4. Chapter 4: Radial System Protection.

5. Chapter 5: Zones of Protection.

6. Chapter 6: Differential Relays.

7. Chapter 7: Distance Relays.

8. Chapter 8: Transformer Protection.

9. Chapter 9: Generator Protection.

10. Chapter 10: Busbar Protection.

11. Chapter 11: Circuit Breakers.

12. Chapter 12: Fuses.

13. Chapter 13: References.



  1. Penetration Testing of Computer Networks Using Burpsuite and Various Penetration Testing Tools

    Dr. Hidaia Mahmood Alassouli

    book
  2. تعقيب الكاتبة على سلسله فيديوهات الدكتورة مايا صبحي حول الخيوط الخفيه للماسونية : Author's Comments on Dr. Maya Sobhi's Series of Videos about the Hidden Secrets of Freemasonry

    Dr. Hidaia Mahmood Alassouli

    book
  3. علامات الساعة الصغرى والكبرى : The Minor and Major Signs of Judgment Day

    Dr. Hidaia Mahmood Alassouli

    book
  4. مختارات من مقالات الكاتبه حول قضايا سياسيه وإقتصاديه وإجتماعيه ومؤسساتيه ودينيه (إصدار عام 2022) : Selections from the Author's Articles on Political, Economic, Social, Institutional and Religious Issues, Issued in 2022

    Dr. Hidaia Mahmood Alassouli

    book
  5. Common Windows, Linux and Web Server Systems Hacking Techniques

    Dr. Hidaia Mahmood Alassouli

    book
  6. Wireless and Mobile Hacking and Sniffing Techniques

    Dr. Hidaia Mahmood Alassouli

    book
  7. Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

    Dr. Hidaia Mahmood Alassouli

    book
  8. أبرز أحداث يوم القيامه في ضوء ما جاء بالقرآن الكريم والسنه النبوية الشريفة : The Most Prominent Events on the Day of Judgment and the Resurrection Based on Quran and Sunnah

    Dr. Hidaia Mahmood Alassouli

    book
  9. Fuse Protection against the Regenerative Circuit Internal Commutation Fault

    Dr. Hidaia Mahmood Alassouli

    book
  10. Comparison between Internet Fax Services

    Dr. Hidaia Mahmood Alassouli

    book
  11. Calculation of Critical Distance in Faulted Meshed Power System

    Dr. Hidaia Mahmood Alassouli

    book
  12. Introduction to Power System Protection

    Dr. Hidaia Mahmood Alassouli

    book