• 제목/요약/키워드: Protection algorithm

검색결과 820건 처리시간 0.03초

IMPROVING REGIONAL OVERPOWER PROTECTION TRIP SET POINT VIA CHANNEL OPTIMIZATION

  • Kastanya, Doddy
    • Nuclear Engineering and Technology
    • /
    • 제44권7호
    • /
    • pp.799-806
    • /
    • 2012
  • In recent years, a new algorithm has been introduced to perform the regional overpower protection (ROP) detector layout optimization for $CANDU^{(R)}$ reactors. This algorithm is called DETPLASA. This algorithm has been shown to successfully come up with a detector layout which meets the target trip set point (TSP) value. Knowing that these ROP detectors are placed in a number of safety channels, one expects that there is an optimal placement of the candidate detectors into these channels. The objective of the present paper is to show that a slight improvement to the TSP value can be realized by optimizing the channelization of these ROP detectors. Depending on the size of the ROP system, based on numerical experiments performed in this study, the range of additional TSP improvement is from 0.16%FP (full power) to 0.56%FP.

ICRP 103 방사선방호 체계 하에서 유효선량 평가를 위한 Two-Dosimeter Algorithm의 적용방안 (Application of the Two-Dosimeter Algorithm for Effective Dose Evaluations based on ICRP Publication 103)

  • 김희근;공태영
    • Journal of Radiation Protection and Research
    • /
    • 제36권3호
    • /
    • pp.154-159
    • /
    • 2011
  • 국내 원전에서는 고 방사선량율 또는 고피폭 예상 방사선작업에 종사자의 가슴과 등에 두 개의 개인선량계를 패용하여 피폭방사선량을 평가하고 있다. 이러한 Two-Dosimeter Algorithm (TDA)으로 현장시험과 심층검토를 통해 NCRP(55:50) TDA를 최적 알고리즘으로 최종적으로 선정하였고, 2006년 이후 원전 종사자의 피폭방사선량 평가 실무에 적용 중에 있다. 한편, 2007년 국제방사선방호위원회(ICRP)는 간행물 ICRP 103을 통해 방사선가중계수 및 조직가중계수와 기준 인체모형팬텀(Reference phantom) 등을 일부 변경한 유효선량 평가방법을 제시하였다. 이에 따라 본 논문에서는 국내원전에서 적용되고 있는 NCRP (55:50) TDA에 대해 ICRP 103 방사선방호 체계 하에서의 계속 적용 타당성을 분석하였다. 그 결과, NCRP (55:50) TDA를 계속 사용하더라도 ICRP 103의 유효선량을 신뢰성 있게 평가할 수 있는 것으로 판단되었다.

신 에너지전원이 연계된 배전계통의 통합 보호기기의 알고리즘 개발에 관한 연구 (A Study on the Algorithm for Multi-Functional Protection Devices in Distribution Systems with New Energy Sources)

  • 윤기갑;강대훈;노대석
    • 한국산학기술학회논문지
    • /
    • 제10권9호
    • /
    • pp.2253-2260
    • /
    • 2009
  • 본 논문에서는 태양광과 풍력, 연료전지 등의 신 에너지전원(또는 분산전원)이 연계된 배전계통에 있어서 발생 가능한 보호협조의 문제점을 해결하기 위한 통합 보호기기의 알고리즘을 제시한다. 신 에너지전원을 배전계통에 연계함으로써 에너지 효율을 높일 수 있으며, 송배전 선로 건설비용의 절감, 전력 손실 감소, 전압 보상 및 전력 공급의 신뢰도 향상과 같은 많은 장점을 얻을 수 있다. 이러한 많은 장점에도 불구하고 신 에너지전원을 배전 계통에 연계하였을 경우, 전압변동, 고조파, 전력 품질 저하, 단락 용량 증대와 같은 많은 문제점도 발생하여, 이러한 문제점을 해결하기 위한 계통연계 장치 및 보호기기의 필요성이 증대하고 있는 실정이다. 즉, 현재의 배전계통 보호 방식은 단방향 조류방식으로 구성되어 있으나 분산전원의 도입으로 보호 기기가 설치되어 있는 계통에 정상상태임에도 불구하고 역방향의 전력조류가 발생될 수 있다. 따라서 본 논문에서는 이에 대한 새로운 배전 보호 알고리즘을 탑재한 보호기기의 알고리즘을 제시한다.

발전기 고장진단을 위한 디지털보호계전 시스템 설계 (A Design on the Digital Protective Relay System for Generator Fault Diagnosis)

  • 이성환;장낙원;이동영
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 제39회 하계학술대회
    • /
    • pp.717-718
    • /
    • 2008
  • We developed the protection program for the generator fault protection system and each module of the digital protective relay H/W for loading the protection program. The protective algorithm for the generator is 51, 51G/N, 46P/N, 47P/N, 50G/N, and 32, and we developed each fault protection program. And we must design high efficiency microprocessor, CT, and PT for realtime measuring, relaying and high accuracy of measurement, also. From now on digital protective relay must be operated with integrated management systems. For this point, we must load various industrial protocol on the digital protective relay. In this research, we developed each protective relay H/W module according to above conditions. And we designed real-time operating system in order that each protective algorithm is operated with realtime processing on the H/W system.

  • PDF

Protection for a Wind Turbine Generator in a Large Wind Farm

  • Zheng, Tai-Ying;Kim, Yeon-Hee;Kang, Yong-Cheol
    • Journal of Electrical Engineering and Technology
    • /
    • 제6권4호
    • /
    • pp.466-473
    • /
    • 2011
  • This paper proposes a protection algorithm for a wind turbine generator (WTG) in a large wind farm. To minimize the outage section, a protection relay for a WTG should operate instantaneously for an internal fault or a connected feeder fault, whereas the relay should not operate for an internal fault of another WTG connected to the same feeder or an adjacent feeder fault. In addition, the relay should operate with a delay for an inter-tie fault or a grid fault. An internal fault of another WTG connected to the same feeder or an adjacent feeder fault, where the relay should not operate, is determined based on the magnitude of the positive sequence current. To differentiate an internal fault or a connected feeder fault from an inter-tie fault or a grid fault, the phase angle of the negative sequence current is used to distinguish a fault type. The magnitude of the positive sequence current is then used to decide either instantaneous operation or delayed operation. The performance of the proposed algorithm is verified under various fault conditions with EMTP-RV generated data. The results indicate that the algorithm can successfully distinguish instantaneous operation, delayed operation, or non-operation depending on fault positions and types.

An Improved Technique for Fault Location Estimation Considering Shunt Capacitance on Transmission Line

  • Kim Hyun-Houng;Jeong Yun-Won;Lee Chan-Joo;Park Jong-Bae;Shin Joong-Rin
    • Journal of Electrical Engineering and Technology
    • /
    • 제1권3호
    • /
    • pp.295-301
    • /
    • 2006
  • This paper presents a new two-terminal numerical algorithm for fault location estimation using the synchronized phasor in time-domain. The proposed algorithm is also based on the synchronized voltage and current phasor measured from the PMUs (Phasor Measurement Units) installed at both ends of the transmission lines. In this paper, the algorithm is given without shunt capacitance and with shunt capacitance using II -model and estimated using DFT (Discrete Fourier Transform) and LES (Least Error Squares Method). The algorithm uses a very short data window and classification for real-time transmission line protection. To verify the validity of the proposed algorithm, the Electro-Magnetic Transient Program (EMTP) and MATLAB are used.

잔류자속에 무관한 보상 알고리즘을 적용한 모선보호용 전류차동 계전방식 (A Percentage Current Differential Relay for Bus Protection Using a Compensation Algorithm Unaffected by a Remanent Flux)

  • 강용철;윤재성;임의재
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 하계학술대회 논문집 A
    • /
    • pp.308-310
    • /
    • 2003
  • This paper proposes a percentage current differential relaying algorithm for bus protection with a compensation algorithm of a CT. The compensating algorithm estimates the core flux at the start of the first saturation based on the value of the third-difference of the secondary current. It calculates the core flux and compensates distorted currents in accordance with the magnetization curve. The test results indicate that the algorithm can discriminate internal faults from external faults when the CT saturates. It can improve not only stability of the relay in the case of an external fault but sensitivity of the relay in the case of an internal fault.

  • PDF

DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE)

  • Jang, Sung-Soon;Kwan, Sung-Woo;Yoo, Ho-Sik;Kim, Jung-Soo;Yoon, Wan-Ki
    • Nuclear Engineering and Technology
    • /
    • 제41권5호
    • /
    • pp.747-752
    • /
    • 2009
  • A vulnerability assessment is essential for the efficient operation of a physical protection system (PPS). Previous assessment codes have used a simple model called an adversary sequence diagram. In this study, the use of a two-dimensional (2D) map of a facility as a model for a PPS is suggested as an alternative approach. The analysis of a 2D model, however, consumes a lot of time. Accordingly, a generalized heuristic algorithm has been applied to address this issue. The proposed assessment method was implemented to a computer code; Systematic Analysis of physical Protection Effectiveness (SAPE). This code was applied to a variety of facilities and evaluated for feasibility by applying it to various facilities. To help upgrade a PPS, a sensitivity analysis of all protection elements along a chosen path is proposed. SAPE will help to accurately and intuitively assess a PPS.

Development of a structure analytic hierarchy approach for the evaluation of the physical protection system effectiveness

  • Zou, Bowen;Wang, Wenlin;Liu, Jian;Yan, Zhenyu;Liu, Gaojun;Wang, Jun;Wei, Guanxiang
    • Nuclear Engineering and Technology
    • /
    • 제52권8호
    • /
    • pp.1661-1668
    • /
    • 2020
  • A physical protection system (PPS) is used for the protection of critical facilities. This paper proposes a structure analytic hierarchy approach (SAHA) for the hierarchical evaluation of the PPS effectiveness in critical infrastructure. SAHA is based on the traditional analysis methods "estimate of adversary sequence interruption, EASI". A community algorithm is used in the building of the SAHA model. SAHA is applied to cluster the associated protection elements for the topological design of complicated PPS with graphical vertexes equivalent to protection elements.

Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model

  • Sun, Yinggang;Zhang, Hongguo;Zhang, Luogang;Ma, Chao;Huang, Hai;Zhan, Dongyang;Qu, Jiaxing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3419-3437
    • /
    • 2022
  • Anonymization technology is an important technology for privacy protection in the process of data release. Usually, before publishing data, the data publisher needs to use anonymization technology to anonymize the original data, and then publish the anonymized data. However, for data publishers who do not have or have less anonymized technical knowledge background, how to configure appropriate parameters for data with different characteristics has become a more difficult problem. In response to this problem, this paper adds a historical configuration scheme resource pool on the basis of the traditional anonymization process, and configuration parameters can be automatically recommended through the historical configuration scheme resource pool. On this basis, a privacy model hybrid recommendation algorithm for user satisfaction is formed. The algorithm includes a forward recommendation process and a reverse recommendation process, which can respectively perform data anonymization processing for users with different anonymization technical knowledge backgrounds. The privacy model hybrid recommendation algorithm for user satisfaction described in this paper is suitable for a wider population, providing a simpler, more efficient and automated solution for data anonymization, reducing data processing time and improving the quality of anonymized data, which enhances data protection capabilities.