A Next Generation Alarm Processing Algorithm Incorporating Recommendations
#1

A Next Generation Alarm Processing Algorithm Incorporating Recommendations and Decisions on Wide Area Control
Abstract

The number of alarms for a typical power systemevent may be overwhelming to power system operators and maydelay the operator from taking appropriate corrective action.Worldwide, a number of alarm processing techniques are used toreduce the number of alarms that the operator ‘sees’, so as tobetter comprehend the situation at hand and make accurate decisionsfaster. This paper proposes an alarm processing algorithmthat goes beyond the prioritization of alarms. The conceptualalgorithm proposed has additional features that offer the operatorrecommendations and decisions for the event that has causedthe alarms, as well as a feature that may execute controls if theevent is non critical. In this sense, the proposal is a bridge fromwide area measurement to wide area control systems.Index Terms— alarm processing, power system control, reactivepower control, sensors, switched capacitors, transformer tapchanging, wide area control systems, wide area measurementsystems.
I. INTRODUCTION
POWER system operators may encounter an overwhelmingnumber of alarms due to system-wide events in their areaof responsibility. These alarms can be a source of confusionfor the operator, especially if the system events that havecaused the alarms require immediate action. For example, atransformer fault can possibly have 150 alarm messages thatare displayed in only two seconds [1]. The need for the developmentof alarm processing and prioritization algorithms hasbeen recognized since the 1960s [2]. This need is even morepressing today due to the increased size and complexity ofpower systems, the interconnections between large geographicalareas, and the deregulation of power systems which intro duces complexity in the control decisions. As an example,under deregulation, transmission circuits may be operated atrelatively high power levels more frequently in order to fullyimplement power marketing. These high levels of powertransfer generally suggest that high speed and accurate operatoractions are imperative. Further, there is a trend of performingwide area control and monitoring activities in a centralizedfashion by having a small number of control centers [3].A number of alarm processors have been developed and arein use today. Some examples include [4] and [5]. Alarm processorssuch as these provide a number of tools including alarmsuppression, alarm prioritization, reduction of alarms on thebasis of area of responsibility, and control recommendationsto the operator. For example, De Souza et al. [6] present amethodology that combines the use of artificial neural networks(ANNs) with fuzzy logic to form alarm processingidentification of faulted components. Inputs to the ANNs arealarm patterns while fuzzy relations are established to form adatabase employed to train the ANNs. Each neuron of theANN is responsible for estimating the degree of membershipof a specific system component into the class of faulted components.Results of an application on an actual system showthat the proposed method allows for good interpretation of theresults, even in the presence of corrupted alarm patterns.Lin, Lin, and Sun [7] present fault detection and alarmprocessing in a loop system using a fault detection system(FDS). The FDS has an adaptive architecture with a probabilisticneural network (PNN). The training of the PNN uses theprimary/backup information of protective devices to create thetraining sets. When the topology changes, the PNN can beretained and estimated effectively. Computer simulations wereconducted to show the effectiveness of the proposed system.The basis of neural network solutions to alarm processingappears to be the recognition of events seen in a training set.In many cases, this approach is satisfactory when the trainingset spans a large range of operating scenarios.


Download full report
http://ieeexplore.ieeeiel5/4275198/42751...er=4275419
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: the od letter case study recommendations, ppts on online index recommendations, incorporating hvdc into ac system, next technology processing speed change, wi5 alarms, secure computing environment recommendations, voice quality recommendations for ip telephony,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,805 01-10-2016, 10:02 AM
Last Post: Guest
  watermarking algorithm seminar class 3 2,690 27-04-2016, 11:17 AM
Last Post: dhanabhagya
  image processing projects ideas project topics 4 5,098 05-01-2016, 02:22 PM
Last Post: seminar report asees
  GENERATION OF PAYSLIP project report helper 2 4,395 04-01-2016, 02:49 PM
Last Post: seminar report asees
  Image Processing - Noise Reduction project topics 3 3,785 26-08-2015, 02:55 PM
Last Post: dhivya srinivasan
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,394 14-07-2015, 02:25 PM
Last Post: seminar report asees
  TEA ENCRYPTION (ALGORITHM) computer science technology 1 2,671 11-11-2014, 10:45 AM
Last Post: Guest
  Visa Processing System full report and asp source code project topics 2 5,557 19-06-2014, 06:54 PM
Last Post: seminar report asees
  Sales Order Processing computer science technology 3 3,145 03-09-2013, 08:37 PM
Last Post: [email protected]
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 4,911 22-07-2013, 09:37 PM
Last Post: Guest

Forum Jump: