On-Line Generation and Arming of System Protection Schemes

Andreas Søndergaard Pedersen, Mogens Blanke, Jakob Glarbo Møller, Hjörtur Jóhannsson

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    1 Downloads (Pure)


    This paper presents a new method to automatically generate system protection schemes in real-time, where contingencies are filtered using a method providing N– 1 system snapshots. With future power systems consisting largely of renewable distributed generation with time-varying production, highly fluctuating conditions throughout the day will be the result. This makes off-line design of extensive defense plans for power systems infeasible, forming the motivation for the presented method. It relies on the real-time identification of which disturbances that threatens a power systems integrity. The method is based on a recently proposed method of calculating post-contingency Thevenin equivalents, which are used to assess the security of the post-contingency condition. The contingencies that violate the emergency limits are contained by pre-determining event-based remedial actions. The instability mechanisms threatening the system are individually treated, such that appropriate controls are allocated. The procedure is illustrated through a case study using the Nordic32 benchmark system.
    Original languageEnglish
    Title of host publicationProceedings of the 10th Electric Power Quality and Supply Reliability Conference
    Publication date2016
    ISBN (Print)978-1-5090-1564-1
    Publication statusPublished - 2016
    Event10th Electric Power Quality and Supply Reliability Conference - Tallin, Estonia
    Duration: 24 Aug 201626 Aug 2016
    Conference number: 10


    Conference10th Electric Power Quality and Supply Reliability Conference


    • Power System Security
    • Power System Stability
    • Special Protection Schemes


    Dive into the research topics of 'On-Line Generation and Arming of System Protection Schemes'. Together they form a unique fingerprint.

    Cite this