Professional Documents
Culture Documents
Event-Triggered Vulnerable Relay Identification and Supervision To Prevent Zone-3 Mal-Operations
Event-Triggered Vulnerable Relay Identification and Supervision To Prevent Zone-3 Mal-Operations
Abstract—Most of the recently occurred cascaded outages are RM of the healthy relays of the system. Thus, in the planning
resulted due to zone-3 mal-operations of distance relays. This pa- level, it is essential to monitor the effect of N − 1 contingency
per introduces some new sensitivity factors to identify and monitor
[5] on the change in RM of the healthy relays. N − 1 indicates
vulnerable relays functioning in the power transmission network.
This information will help in enhancing the back-up protection op- one credible contingency event, such as line outage or generator
eration of the power transmission system. To accomplish this task, outage [5].
indices such as line-outage-induced relay margin shift factor and The concept of RM is demonstrated in [4], where the RM is
generation-outage-induced relay margin shift factor are defined. used to access dynamic security of the power system. RM is
An offline analysis of the power system is made to calculate the derived as a function of bus voltage in [6]. Bai and Ajjarapu
above two factors. This information helps in ranking the relays
of the power system in terms of their vulnerability. Once the vul- [7] have suggested a new technique for transmission system
nerable relays are identified, their zone-3 operation is supervised vulnerability assessment based on identifying critical relays. In
by a new wide area information-based event detection logic. IEEE [8], a multiagent system-based technique is proposed to identify
9-bus and IEEE 39-bus test systems are used to validate the pro- vulnerable relays. In [9], an event understanding framework is
posed scheme. The test results indicate that the proposed scheme suggested to enhance situational awareness. A zone-3 modifica-
can enhance the back-up protection operation of transmission net-
work, which is very much essential to mitigate blackouts. tion scheme that can avoid undesirable line outages is reported
in [10]. Several relay ranking schemes have been proposed to
Index Terms—Back-up protection, blackouts, cascaded fail- identify vulnerable relays in a network. The effect of change in
ures, distance relay, phasor measurement unit (PMU), relay mal-
operation, vulnerable relay.
network topology on distance relay is analyzed in [11]. In [12],
the relays are ranked based on Lyapunov stability criterion re-
lated to the severity of power swing. RM concept has been used
I. INTRODUCTION in [4] to measure the closeness of a relay from issuing a trip sig-
NHANCING security of back-up protection operation is nal. A new approach is reported in [13], to locate all the electrical
E one of the major need of today’s smart power system [1]–
[8]. It will certainly help in alleviating cascaded tripping leading
centers following an unstable swing. In [14], authors have used
branch loss sensitivity measure presented in [15] to propose a
to blackouts [2]–[4]. Undesired relay operations have been con- relay ranking index (RRI). The performance of various power
sidered as one of the main culprits behind propagation of most swing detection algorithms for the relays on the series compen-
of the blackouts. The point to be noticed here is that “not all sated lines are compared in [16]. The existing literatures either
relay mal-operations lead to cascaded outages.” There are some focus on finding vulnerable relay or on zone-3 supervision. The
vulnerable relays operating in the power system whose mal- suggested scheme is a comprehensive one where in the offline
operation leads to cascaded disturbance propagation. Thus, iden- process, vulnerable relays are identified and in real time, only
tification and real-time supervision of such vulnerable relays is those relays are supervised to prevent relay mal-operation.
very much essential. Furthermore, relay vulnerability is depen- The main contribution of this research paper is to introduce
dent on one or more contingency occurring in the power trans- two sensitivity factors that quantify the effect of (N − 1) con-
mission system. This leads to the fact that there is need of some tingency on the RM. Following tripping of any transmission
new sensitivity factors that will quantify the relay vulnerability line or any generator, the RM of other healthy relays gets af-
based on one or more contingency. Relay margin (RM) of a re- fected. In this research paper, the following two factors are
lay is defined as the difference between the apparent impedance introduced:
and operation impedance (zone-3 characteristics [5]) at a spe- 1) line-outage-induced relay margin shift factor (LRMSF);
cific load angle. Contingencies such as line outage, generation 2) generation-outage-induced relay margin shift factor
outage, and relay mal-operation in some place lead to change in (GRMSF).
These factors will help the system operator to rank all the
relays of the power system in decreasing order of their vulnera-
Manuscript received May 6, 2018; revised December 8, 2018 and April 13,
2019; accepted May 23, 2019. (Corresponding author: Manas Kumar Jena.)
bility corresponding to each of the contingency (line outage or
M. K. Jena is with General Electric (GE-Power), HTC, Hyderabad 500081, generator outage). An offline analysis is made to calculate these
India (e-mail: kumarmanas88@gmail.com). factors for the power system under study. Each factor results in
B. K. Panigrahi is with the Indian Institute of Technology Delhi, New Delhi
110016, India (e-mail: bkpanigrahi@ee.iitd.ac.in).
a matrix that relates the effect of each contingency to the RM.
Digital Object Identifier 10.1109/JSYST.2019.2919567 The matrices are named as LRMSF matrix and GRMSF matrix.
1937-9234 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
TABLE I
GRMSF AND LRMSF OBTAINED FOR WSCC 9-BUS SYSTEM
min
∂t δ (t) + ∗ vm (t) e −jωm t
{vm },{ωm }
πt
m 2
Subjected to vm = f (12)
m
where f is the original signal (positive sequence voltage mag-
nitude), vm is the mth mode, and ωm is the center frequency
around which vm is mostly constant.
In order to solve (12), a quadratic penalty and Lagrangian as dynamic security assessment, development of catastrophic
multiplier is introduced in [17]. The augmented Lagrangian is predictors. [18]–[23]. Thus, the zone-3 operations of HV relays
set by using are logically connected through “AND” operator with the “ED”
2
algorithm. That means both the logics must agree that there is
L (vm , ωm , λ) = α
∂t δ (t) + j ∗ vm (t) e−jωm t
a remote end fault happening in the system before sending the
πt
TABLE II
GRMSF AND LRMSF OBTAINED FOR IEEE 39-BUS SYSTEM
B. IEEE 39-Bus System Fig. 9. Three modes observed at bus-25 following line 26–28 outage.
The IEEE 39-bus system considered for the validation of the
proposed scheme is shown in Fig. 7 [25]. The dynamic data
of the system are referred from [25]. The IEEE 39-bus system As discussed earlier, different power system events leave dif-
constitutes 46 numbers of transmission lines. Thus, GRMSF ferent spectral modes in the voltage or frequency signal of the
and LRMSF of 92 relays are calculated for IEEE 39-bus system. power system. The statistical properties of these modes assist in
GRMSF and LRMSF of the 10 most HV relays are listed in Table distinguishing different power system contingencies. In order to
II. It is observed that RM of relays such as 14–15, 15–14, 16– show this, three events such as generator outage (G9 of Fig. 7),
15, 1–2, 2–1, 6–5, 5–6, 25–26, 21–22, 22–21 are mostly affected line outage (line 26–28), and line faults (three phase bolted fault
following generator tripping or line tripping in the system. These at 50% of line 26–28) are simulated in IEEE 39-bus system.
relays are marked as “RED” in the SLD of the IEEE 39-bus Positive sequence voltage magnitude signal at bus-25 (one of
system (see Fig. 7). the HV relay) is passed through VMD and the modes extracted
are shown through Figs. 8–10. It is observed from Fig. 10 that
the amplitude of mode-2 and mode-3 is more in case of fault
IV. EVENT DETECTION
event compared to other two scenarios (looking at the y-axis
The main objective of ED algorithm is to correctly identify of each reconstructed mode).The primary reason behind this is
fault situation and to assist the HV relays in making a reliable that faults induce high-frequency transients that are captured
back-up protection decision. To achieve the same, a recently by the PMUs. Subsequent decomposition of PMU signal using
developed VMD technique is used, which helps in extracting VMD tool helps in identifying fault events. Thus, in the proposed
various modes present in the PMU signal. These modes help scheme E and S.D. [27] corresponding to first “3” IMFs of the
in distinguishing fault situations from other power system dis- voltage signal are considered input features to the RF model.
turbances. Advantage of VMD based preprocessing over other The training of the RF model is accomplished by simulating
existing schemes is detailed in [17], [18], and [28]. different contingencies in the power system with variations in
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Fig. 10. Three modes observed at bus-25 following three phase fault on line
26–28.
TABLE III
PERFORMANCE DURING STRESSED CONDITIONS IN WSCC SYSTEM
TABLE IV
PERFORMANCE DURING STRESSED CONDITIONS IN THE 39-BUS SYSTEM
the trip signal to the corresponding circuit breaker and as soon [9] C. Basu et al., “Understanding events for wide-area situational aware-
as the fault is removed, the trip signal is withdrawn. This shows ness,” in Proc. IEEE Power Energy Soc. Innov. Smart Grid Technol. Conf.,
Washington, DC, USA, 2014, pp. 1–5.
the dependability of the suggested ED logic. [10] V. Nikolaidis, “Emergency zone 3 modification as a local response-driven
protection measure against system collapse,” IEEE Trans. Power Del.,
C. Real-Time Vulnerable Relay Identification vol. 31, no. 5, pp. 2114–2122, Oct. 2016.
[11] M. Tasdighi and M. Kezunovic, “Impact analysis of network topology
The suggested indices can be derived in real time using PMU change on transmission distance relay settings,” in Proc. IEEE Power En-
ergy Soc. Gen. Meeting, Denver, CO, USA, 2015, pp. 1–5.
information. The modern day distance relays such as SEL-421 [12] C. Singh and I. A. Hiskens, “Direct assessment of protection operation and
are well equipped with synchrophasor capability. Thus, the iden- nonviable transients,” IEEE Trans. Power Syst., vol. 16, no. 3, pp. 427–434,
tification of vulnerable relays can be done in real time. This will Aug. 2001.
[13] S. A. Soman, T. B. Nguyen, M. A. Pai, and R. Vaidyanathan, “Analy-
help in updating relay vulnerability ranking following change sis of angle stability problems: A transmission protection systems per-
in system topology. Recently, new findings are detailed in [31], spective,” IEEE Trans. Power Del., vol. 19, no. 3, pp. 1024–1033,
which show compliance of the PMU/C jointly developed by Jul. 2004.
[14] K. Seethalekshmi, S. N. Singh, and S. C. Srivastava, “A classification
Hydro-Quebec and Vizimax for wide-area control applications. approach using support vector machines to prevent distance relay malop-
This PMU is having a high data frame rate, such as 240 sam- eration under power swing and voltage instability,” IEEE Trans. Power
ples/s, which can be useful in capturing the dynamic behavior Del., vol. 27, no. 3, pp. 1124–1133, Jul. 2012.
[15] V. Ajarappu, Computational Techniques for Voltage Stability Assessment
of the system. and Control. New York, NY, USA: Springer-Verlag, 2007.
[16] A. Esmaeilian et al., “Evaluation and performance comparison of power
VI. CONCLUSION swing detection algorithms in presence of series compensation on trans-
mission lines,” in Proc. 10th Int. Conf. Environ. Elect. Eng., May 8–11,
A new supervisory control-based back-up protection scheme 2011, pp. 1–4.
[17] K. Dragomiretskiy and D. Zosso, “Variational mode decomposition,” IEEE
is proposed. The scheme initially defines two new sensitivity Trans. Signal Proc., vol. 62, no. 3, pp. 531–544, Feb. 2014.
factors termed as LRMSF and GRMSF. These factors help in [18] M. K. Jena, S. R. Samantaray and B. K. Panigrahi, “A new adaptive
identifying the HV relays of a power system. Further, positive dependability-security approach to enhance wide area back-up protec-
tion of transmission system,” in IEEE Trans. Smart Grid, vol. 9, no. 6,
sequence voltage information of the buses corresponding to the pp. 6378–6386, Nov. 2018.
HV relays are utilized to develop an ED algorithm. The E and [19] M. K. Jena and S. R. Samantaray, “Data-mining-based intelligent differ-
S.D. of first three modes obtained through VMD are used as input ential relaying for transmission lines including UPFC and wind farms,”
IEEE Trans. Neural Netw. Learn. Syst., vol. 27, no. 1, pp. 8–17,
features for the data-mining model. RF is used to distinguish Jan. 2016.
fault situations from other disturbances. The scheme is validated [20] I. Kamwa, S. Samantaray, and G. Joos, “On the accuracy versus trans-
on WSCC 9-bus and IEEE 39-bus test systems. The results show parency trade-off of data-mining models for fast-response PMU-based
catastrophe predictors,” in Proc. IEEE Power Energy Soc. Gen. Meeting,
that RF as a classifier provides excellent classification accuracy. 2013, pp. 1–10.
We showed that the ED logic could provide reliable supervision [21] I. Kamwa, S. R. Samantaray, and G. Joos, “Catastrophe predictors from en-
to zone-3 operation of existing HV relays. The proposed scheme semble decision-tree learning of wide-area severity indices,” IEEE Trans.
Smart Grid, vol. 1, no. 2, pp. 144–158, Sep. 2010.
can enhance the security aspect of zone-3 protection, which is
[22] H. Suprême, A. Heniche-Oussédik, I. Kamwa, and L. A. Dessaint, “A
vital to prevent blackouts in transmission system. novel approach for instability detection based on wide-area measurements
and new predictors,” in Proc. IEEE Can. Conf. Elect. Comput. Eng., 2016,
pp. 1–6.
REFERENCES
[23] Accessed: Aug. 20, 2016. [Online]. Available: http://rattle.togaware.com/
[1] G. Andersson et al., “Causes of the 2003 major grid blackouts in North [24] P. M. Anderson and A. A. Fouad, Power System Control and Stability, 2nd
America and Europe, and recommended means to improve system dy- ed. New York, NY, USA: Wiley, 2002.
namic performance,” IEEE Trans. Power Syst., vol. 20, no. 4, pp. 1922– [25] M. A. Pai, Energy Function Analysis for Power System Stability. Norwell,
1928, Nov. 2005. MA, USA: Kluwer, 1989.
[2] Accessed: Aug. 20, 2016. [Online]. Available: http://powermin.nic. [26] C. Grigg et al., “The IEEE reliability test system-1996. A report prepared
in/upload/pdf/GRID ENQ REP 16812.pdf by the Reliability Test System Task Force of the Application of Proba-
[3] C.-H. Kim, J.-Y. Heo, and R. K. Aggarwal, “An enhanced zone 3 algorithm bility Methods Subcommittee,” IEEE Trans. Power Syst., vol. 14, no. 3,
of a distance relay using transient components and state diagram,” IEEE pp. 1010–1020, Aug. 1999.
Trans. Power Del., vol. 20, no. 1, pp. 39–46, Jan. 2005. [27] B. Biswal, M. Biswal, S. Mishra, and R. Jalaja, “Automatic classification
[4] F. Dobraca, M. A. Pai, and P. W. Sauer, “Relay margins as a tool for of power quality events using balanced neural tree,” IEEE Trans. Ind.
dynamical security analysis,” Int. J. Elect. Power Energy Syst., vol. 12, Electron., vol. 61, no. 1, pp. 521–530, Jan. 2014.
pp. 226–234, Oct. 1990. [28] M. K. Jena, S. R. Samantaray, and B. K. Panigrahi, “Variational mode de-
[5] 2009. [Online]. Available: http://www.nerc.com/files/Reliability_Standards composition based power system disturbance assessment to enhance wide
_Complete_Set_2009May20.pdf area situational awareness (WASA) and postmortem analysis (PMA),”
[6] P. Henneaux, P. E. Labeau, and J. C. Maun, “Blackout probabilistic risk IET Gener., Transmiss., Distrib., vol. pp, no. 99, pp. 1–12, 2017, doi:
assessment and thermal effects: Impacts of changes in generation,” IEEE 10.1049/iet-gtd.2016.1827.
Trans. Power Syst., vol. 28, no. 4, pp. 4722–4731, Nov. 2013. [29] D. Kang and R. Gokaraju, “A new method for blocking third-zone distance
[7] H. Bai and V. Ajjarapu, “Transmission system vulnerability assessment relays during stable power swings,” IEEE Trans. Power Del., vol. 31, no. 4,
based on practical identification of critical relays and contingencies,” in pp. 1836–1843, Aug. 2016.
Proc. IEEE Power Energy Soc. Gen. Meeting—Convers. Del. Elect. Energy [30] OPAL-RT Technologies Inc. [Online]. Available: http://www.opal-rt.
21st Century, Pittsburgh, PA, USA, 2008, pp. 1–8. com/product/artemis
[8] R. Baldick et al., “Initial review of methods for cascading failure analysis [31] I. Kamwa, L. Geoffroy, S. R. Samantaray, and A. Jain, “Synchrophasors
in electric power transmission systems IEEE PES CAMS task force on un- data analytics framework for power grid control and dynamic stability
derstanding, prediction, mitigation, and restoration of cascading failures,” monitoring,” IET Eng. Technol. Ref., pp. 1–22, 2016.
in Proc. IEEE Power Energy Soc. Gen. Meeting—Convers. Del. Elect.
Energy 21st Century, Pittsburgh, PA, USA, 2008, pp. 1–8.