Protection of power system equipments was traditionally done by using electromagnetic relay, static relays, and
numerical relays. At present the microprocessor based relays are replacing the old Electromagnetic relays
because of their high level accuracy and fast operation. RET670(Transformer protection relay ), an IED
(INTELLIGENT ELECTRONIC DEVICE) provides fast and selective protection, monitoring, and control of all
types of transformer. The configured IED is tested under different fault conditions simulated by using mobile test
kit to ensure IED’s reliable operation on site. With preconfigured algorithms, the IED will automatically
reconfigure the network in case of a fault, and a service restoration is carried out within milliseconds by giving
trip signal to the corresponding Circuit breakers. On receiving the trip signal the circuit breaker operates
providing quicker isolation of transformers under the fault condition. This enables to have a complete and an
adequate protection to the specified power transformer.
This paper mainly focuses on using wireless technology effectively for security. The system is SMS-based and uses wireless technology to revolutionize the standards of living. It uses a GSM Modem to send an SMS to the home owner in case of an intrusion. The project is realized by interfacing an infrared trans-receiver with an ATMEGA16 microcontroller and a GSM Module. As the system uses GSM technology, it provides ubiquitous access to the system for security.
DESIGN AND DEVELOPMENT OF A LOW-COST MICROCONTROLLER BASED SINGLE PHASE WATER...ijistjournal
A microcontroller based advanced technique was designed and developed to protect the house hold appliances, such as water-pump from fluctuation of line voltage. This device was tested with upper and lower cutoff voltages set at ±10% of the normal supply voltage (220V, AC) and with an over-load current up to 10A. The current sensor’s output was monitored by the PIC12F675 microcontroller and used analog to digital protocol. A ‘C’ language program was developed to control the function of microcontroller, using PCWH compiler.
This paper mainly focuses on using wireless technology effectively for security. The system is SMS-based and uses wireless technology to revolutionize the standards of living. It uses a GSM Modem to send an SMS to the home owner in case of an intrusion. The project is realized by interfacing an infrared trans-receiver with an ATMEGA16 microcontroller and a GSM Module. As the system uses GSM technology, it provides ubiquitous access to the system for security.
DESIGN AND DEVELOPMENT OF A LOW-COST MICROCONTROLLER BASED SINGLE PHASE WATER...ijistjournal
A microcontroller based advanced technique was designed and developed to protect the house hold appliances, such as water-pump from fluctuation of line voltage. This device was tested with upper and lower cutoff voltages set at ±10% of the normal supply voltage (220V, AC) and with an over-load current up to 10A. The current sensor’s output was monitored by the PIC12F675 microcontroller and used analog to digital protocol. A ‘C’ language program was developed to control the function of microcontroller, using PCWH compiler.
A remote monitoring system for a three phase 10-kva switchable distribution t...eSAT Journals
Abstract A Remote Monitoring System plays an important role in many applications. This paper proposes an innovative design about the development of remote monitoring system for a three-phase 10-kVA Switchable Distribution transformer with the help of a PIC microcontroller and Zigbee-based Wireless device. The PIC microcontroller from microchip helps in controlling the switching devices and monitoring the current, voltage and temperature of the transformer. The Zigbee-based wireless device is used as long range wireless communication between the modules. The information is transmitted point by point using Zigbee transmitter and receiver and is sent to the server module to check the state of the transformer. It has a data rate speed of 250 Kbps with minimum power consumption and has a transmission distances range from 10 to 100m. The data transmission rate is higher than other wireless systems. This is user friendly and can be achieved at low cost. This handles the transfer of parameters such as voltage, current and temperature as digital data from current transducers, voltage transformers and from temperature sensors to the server module through wireless communication. This system helps in reading sensor, controlling switches, monitoring and data protection. Key Words: Switchable Transformer, PIC Microcontroller and Zigbee
A remote monitoring system for a three phase 10-kva switchable distribution t...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Process monitoring, controlling and load management system in an induction motoreSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Development of Distributed Mains Monitoring and Switching System for Indus Co...iosrjce
Indus Complex at Raja Ramanna Centre for Advanced Technology (RRCAT) has two synchrotron
radiation sources, Indus-1 and Indus-2. Microtron is injector to both the machines which sends electron pulses
to the Booster. A new, microcontroller based, distributed mains monitoring and switching system is developed
for Indus complex. It facilitates remote monitoring and switching of AC power switches to various subsystems. It
includes interfacing with power switches/Miniature Circuit Breakers (MCBs) of Indus machine subsystems. This
work involves development of hardware, firmware for microcontroller, implementation of communication
protocol; LabVIEW based server and client application. The developed system allows remote monitoring and
switching of MCBs from main control room.
Nowadays every system is automated in order to face new challenges. In the present days, Automated systems have less manual operations, flexibility, reliability and accurate. Due to this demand, every field prefers automated control systems. Especially in the field of electronics automated systems are giving good performance in industries and on roads. The mechanical arrangement is arranged to the robot as a robotic car using solar energy. This project handles with two operations. One hand Autonomous, based on sensor application robotic car moves itself by avoiding an obstacle and to move in its paths. It explains the method of interfacing solar panel, relay circuit board, IR sensor to the car and how to send the command to the microcontroller to drive the car autonomously. On the other hand, it controls using BLUETOOTH modem, in order to control the robotic car using BLUETOOTH, the user has to send the predefined messages to the modem. When the modem receives these predefined messages, it intimates the same to the microcontroller. The microcontroller upon receiving the information from the modem acts in accordance with the message, making it a highly automated application.
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULEEng.Manfred Kibona
This paper presents a project-based final year project course on completion of Bachelor degree in Telecommunication engineering. The goal of this project was to provide engineering students a hands-on experience involving actual engineering design on communication circuits, printed circuit board (PCB) design, layout, fabrication, assembly, and testing.
The scope of the project was been projected in develop a RF remote control system that will be capable for controlling various electrical appliances in the vicinity of 100 meters. The control signals has to traverse wirelessly by means of modulation with radio frequency carrier signal ranging from frequency band of 385MHz to 480MHz.
FPGA based synchronous multi-channel PWM generator for humanoid robot IJECEIAES
In this paper, synchronous multi-channel pulse width modulation (PWM) generator for driving servo motors of humanoid robot was proposed. In an application, the humanoid robot requires smooth and beautiful movement, therefore the PWM signal for each servo motor must be synchronized. Since microcontroller (slave) has no enough channels to generate synchronous PWMs for 32 servo motors, field programmable gate array (FPGA) was used as slave for the humanoid robot. The FPGA was controlled by microcontroller (master) using serial communication. Simulation results show the system can perform serial communication, synchronize, and convert data well. The system can also generate PWM simultaneously with accurate duty cycle and fix period of 20ms.
This is an extensive slideshow explaining intellectual property, the tech transfer process, and the help that the Office of Technology Licensing at the University of Florida can give UF researchers when they have a discovery.
Ruparel Realty Kandivali is developed by Ruparel Realty. Ruparel Kandivali Project is Located in Kandivali West Mumbai. which has 2 and 3 bhk.
http://www.ruparelrealtykandivali.in/
A remote monitoring system for a three phase 10-kva switchable distribution t...eSAT Journals
Abstract A Remote Monitoring System plays an important role in many applications. This paper proposes an innovative design about the development of remote monitoring system for a three-phase 10-kVA Switchable Distribution transformer with the help of a PIC microcontroller and Zigbee-based Wireless device. The PIC microcontroller from microchip helps in controlling the switching devices and monitoring the current, voltage and temperature of the transformer. The Zigbee-based wireless device is used as long range wireless communication between the modules. The information is transmitted point by point using Zigbee transmitter and receiver and is sent to the server module to check the state of the transformer. It has a data rate speed of 250 Kbps with minimum power consumption and has a transmission distances range from 10 to 100m. The data transmission rate is higher than other wireless systems. This is user friendly and can be achieved at low cost. This handles the transfer of parameters such as voltage, current and temperature as digital data from current transducers, voltage transformers and from temperature sensors to the server module through wireless communication. This system helps in reading sensor, controlling switches, monitoring and data protection. Key Words: Switchable Transformer, PIC Microcontroller and Zigbee
A remote monitoring system for a three phase 10-kva switchable distribution t...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Process monitoring, controlling and load management system in an induction motoreSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Development of Distributed Mains Monitoring and Switching System for Indus Co...iosrjce
Indus Complex at Raja Ramanna Centre for Advanced Technology (RRCAT) has two synchrotron
radiation sources, Indus-1 and Indus-2. Microtron is injector to both the machines which sends electron pulses
to the Booster. A new, microcontroller based, distributed mains monitoring and switching system is developed
for Indus complex. It facilitates remote monitoring and switching of AC power switches to various subsystems. It
includes interfacing with power switches/Miniature Circuit Breakers (MCBs) of Indus machine subsystems. This
work involves development of hardware, firmware for microcontroller, implementation of communication
protocol; LabVIEW based server and client application. The developed system allows remote monitoring and
switching of MCBs from main control room.
Nowadays every system is automated in order to face new challenges. In the present days, Automated systems have less manual operations, flexibility, reliability and accurate. Due to this demand, every field prefers automated control systems. Especially in the field of electronics automated systems are giving good performance in industries and on roads. The mechanical arrangement is arranged to the robot as a robotic car using solar energy. This project handles with two operations. One hand Autonomous, based on sensor application robotic car moves itself by avoiding an obstacle and to move in its paths. It explains the method of interfacing solar panel, relay circuit board, IR sensor to the car and how to send the command to the microcontroller to drive the car autonomously. On the other hand, it controls using BLUETOOTH modem, in order to control the robotic car using BLUETOOTH, the user has to send the predefined messages to the modem. When the modem receives these predefined messages, it intimates the same to the microcontroller. The microcontroller upon receiving the information from the modem acts in accordance with the message, making it a highly automated application.
WIRELESS HOME AUTOMATION USING PIC MICROCONTROLLER BASED ON RF-MODULEEng.Manfred Kibona
This paper presents a project-based final year project course on completion of Bachelor degree in Telecommunication engineering. The goal of this project was to provide engineering students a hands-on experience involving actual engineering design on communication circuits, printed circuit board (PCB) design, layout, fabrication, assembly, and testing.
The scope of the project was been projected in develop a RF remote control system that will be capable for controlling various electrical appliances in the vicinity of 100 meters. The control signals has to traverse wirelessly by means of modulation with radio frequency carrier signal ranging from frequency band of 385MHz to 480MHz.
FPGA based synchronous multi-channel PWM generator for humanoid robot IJECEIAES
In this paper, synchronous multi-channel pulse width modulation (PWM) generator for driving servo motors of humanoid robot was proposed. In an application, the humanoid robot requires smooth and beautiful movement, therefore the PWM signal for each servo motor must be synchronized. Since microcontroller (slave) has no enough channels to generate synchronous PWMs for 32 servo motors, field programmable gate array (FPGA) was used as slave for the humanoid robot. The FPGA was controlled by microcontroller (master) using serial communication. Simulation results show the system can perform serial communication, synchronize, and convert data well. The system can also generate PWM simultaneously with accurate duty cycle and fix period of 20ms.
This is an extensive slideshow explaining intellectual property, the tech transfer process, and the help that the Office of Technology Licensing at the University of Florida can give UF researchers when they have a discovery.
Ruparel Realty Kandivali is developed by Ruparel Realty. Ruparel Kandivali Project is Located in Kandivali West Mumbai. which has 2 and 3 bhk.
http://www.ruparelrealtykandivali.in/
La infraestructura y la problemática de la regulación frente a la formación d...D134G0
Presentación dictada por la Comisionada Adriana Labardini Inzunza en el Foro Ciudades Digitales y del Conocimiento de la Ciuidad de México. El Foro fue organizado por la el Consejo Económico y Social de la Ciudad de México.
Latest news of AAP party only at Yuvaspeak, Yuvaspeak is an informational blog for youngsters, who are interested all types of latest news & updates all around India.
http://www.yuvaspeak.com/category/politics-world-politics-india-bjp-congress-aap/aap/
Epic research weekly derivatives market report on 9 february 2015Epic Research Limited
Epic Research Weekly Derivatives Market Report On 9 February 2015
Try your fortune in the derivative segment with the Derivatives Market Tips by Epic Research Private Limited, a leading financial advisory in India. Our weekly report is based on the analysis done by the research team having years of expertise in Derivative segments like future and options.
Smart Local Backup Protection for Smart SubstationIJECEIAES
This paper presents a novel smart local backup protection SLBP used for the support and backup of the protective relays in a smart substation. The proposed SLBP is based on the IEC61850 standards and the concept consists of the acquisition of Generic Object Oriented Substation Event GOOSE used for tripping and interlocks exchange between Intelligent Equipment Devices IEDs and the reading of the Sampled Value SV existing in the process bus coming from Mergin Units MU or Non-Conventional Instrument Transformers NCIT. Several logical schemes to protect different zones of the substation are presented and how can be integrated using data in the substation automation system. The SLBP was developed using an open source library and free operating system. Moreover, a low cost prototype is presented in order to evaluate the efficiency and the operation of the SLBP under diverse scenarios of the proposed logical protective schemes such us breaker failure and overcurrent protection.
The SIPROTEC Compact 7SJ80 relays can be used for line/feeder protection of high and medium voltage networks with grounded, low-resistance grounded, isolated or a compensated neutral point. The relays have all the required functions to be applied as a backup relay to a transformer differential relay.
The 7SR23 DAD is a numeric high impedance circulating current relay has four current inputs, it is used as a unit protection to detect phase and earth faults.
The relay can be applied to busbars, connections, transformers, reactors and motors.
Design of wireless sensor network for building management systemsTSriyaSharma
The primary objective of such this project is to achieve an optimal level of control of occupant comfort while minimizing energy use. Monitoring temperature, pressure, humidity occupancy, and flow rates are key functions of modern building control systems.
The SIPROTEC Compact 7SJ81 provides 4 low-power current transformer inputs and optionally 3 low-power voltage transformer inputs. With the same low-power current transformer (LPCT) a wide range of primary rated line currents can be covered. Objects with rated currents in the range from 20 A to 2500 A can be protected when using low-power current transformers.
Modelling and Implementation of Microprocessor Based Numerical Relay for Prot...Kashif Mehmood
This paper includes the design and implementation of Numerical Relay that can protect the equipment against over-voltage, over-current and under voltage. Although, every power system is subjected to faults and these faults can severe damage to the power system. Therefore, it is necessary
to observe and resolve in time to avoid a large damage such as blackouts. For this purpose, there
should be some sensing devices, which give signals to the circuit breakers for preventing of power
system damages. The multipurpose relays have much importance role in power system for sensing
and measuring the amplitude of faults. Numerical relay provides settings of over-current, overvoltage and under voltage values. Simulations have been carried out using Proteus software along
with tested on hardware with Arduino Uno Microcontroller that proves the working and operation of
numerical relay.
The important aspect of our project revolves around the concept of monitoring the machines utilized in the textile industry. It is aimed at continuously examining the components and machineries in the industry. This project have the ability to establish communication link between various machineries in industries and the controlling system. It also helps in sequential power ON and power OFF of the machineries depending on the outputs received from the controlling unit. The project enables automatic manipulation of the machineries. The controlling system monitors various parameters of the machineries and evaluates its performance and updates the required changes. The machineries will be linked via RF transmitter and receiver. This enables communication link between the controlling device and the connected recipient devices. For maintenance purposes both automatic and manual methods of manipulation are provided. Either of them can be chosen depending upon the purpose. When automatic mode is turned on the machines can be controlled only by the server.
Similar to Implementation of Transformer Protection by Intelligent Electronic Device for Different Faults (20)
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Implementation of Transformer Protection by Intelligent Electronic Device for Different Faults
1. Y V Aruna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1( Part 4), January 2015, pp.45-50
www.ijera.com 45 | P a g e
Implementation of Transformer Protection by Intelligent
Electronic Device for Different Faults
Y V Aruna, Beena S
(Assistant Professors, Department of EEE, Cambridge Institute of Technology, Bangalore-36)
ABSTRACT
Protection of power system equipments was traditionally done by using electromagnetic relay, static relays, and
numerical relays. At present the microprocessor based relays are replacing the old Electromagnetic relays
because of their high level accuracy and fast operation. RET670(Transformer protection relay ), an IED
(INTELLIGENT ELECTRONIC DEVICE) provides fast and selective protection, monitoring, and control of all
types of transformer. The configured IED is tested under different fault conditions simulated by using mobile test
kit to ensure IED’s reliable operation on site. With preconfigured algorithms, the IED will automatically
reconfigure the network in case of a fault, and a service restoration is carried out within milliseconds by giving
trip signal to the corresponding Circuit breakers. On receiving the trip signal the circuit breaker operates
providing quicker isolation of transformers under the fault condition. This enables to have a complete and an
adequate protection to the specified power transformer.
Keywords – Transformer protection, IED, RET670
I. INTRODUCTION
An Intelligent Electronic Device (IED) is a
term used in the electric power industry to describe
microprocessor-based controllers of power system
equipment, such as circuit breakers and transformers.
1. RET670 Introduction
RET670 provides fast and selective protection,
monitoring and control for two- and three-winding
transformers, autotransformers, generator-
transformer units, phase shifting transformers, special
railway transformers and shunt reactors. The
transformer IED is designed to operate correctly over
a wide frequency range in order to accommodate
power system frequency variations during
disturbances and generator start-up and shut-down as
in Fig.1
A very fast differential protection function with
settable CT ratio matching and vector group
compensation makes this IED the ideal solution even
for the most demanding applications. Since RET670
has very low requirements on the main CTs, no
interposing CTs are required. It is suitable for
differential applications with multi-breaker
arrangements with up to six restraint CT inputs. The
differential protection function is provided with 2nd
harmonic and wave-block restraint features to avoid
tripping for magnetizing inrush current, and 5th
harmonic restraint to avoid tripping for over
excitation. The differential function offers a high
sensitivity for low-level internal faults. The unique
and innovative sensitive differential protection
feature of the RET670 provides the best possible
coverage for winding internal turn-to-turn faults,
based on the theory of symmetrical components.
Fig.1: Internal Conventions of the directionality in
the IED.
Tripping from pressure relief/Buchholz and
temperature devices can be done through the
transformer IED where pulsing, lock-out contact
output and so on, is performed. The binary inputs are
heavily stabilized against disturbance to prevent
incorrect operations at for example dc system
capacitive discharges or DC earth faults. The
transformer IED can also be provided with a full
control and interlocking functionality including
Synchrocheck function to allow integration of the
main and/or a local back-up control. Out of Step
function is available to separate power system
sections close to electrical centre at occurring out of
step.
RET670 can be used in applications with the IEC
61850-9-2LE process bus with up to two Merging
Units (MU) as in fig1.1. Each MU has eight analogue
channels, normally four current and four voltages.
Conventional and Merging Unit channels can be
mixed freely in your application.
RESEARCH ARTICLE OPEN ACCESS
2. Y V Aruna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1( Part 4), January 2015, pp.45-50
www.ijera.com 46 | P a g e
1.1RET 670 hardware
Fig.1.1 Rear side view of RET670
1.1.1 Available functions of RET670
Differential protection, Distance protection,
Current protection, Voltage protection, Frequency
protection, Multipurpose protection, Control, Logic,
Metering, Monitoring, Station communication etc are
the functions carried out by RET670.
II. Block diagram
The block diagram in fig.2 shows the
implementation of RET670 in transformer protection
Fig.2. Block Diagram of Implementation of RET670
in transformer protection.
PCM600 is a connectivity package which
provides the means for system products and tools to
connect and interact with the IED in an efficient way
as well as data to allow efficient engineering of
system products. RET670 supports IEC 61850
standard. Configuration of RET670 is done by using
signal matrix tool of PCM600, generating a .pcmi
file. After establishing communication with RET670
the .pcmi file is uploaded to RET670 and then the
parameter setting is done as per the required
transformer protection scheme.
The CT’s and VT’s will provide the necessary
actuating signals to RET670 under the fault
condition. Operation of RET670 gives the trip signal
to the physical trip coils. When once the IED is
configured for different protection schemes the fault
voltage is applied by simulating the fault condition
through Mobile test kit.)
2.1. Protection and Control Manager (PCM 600)
with Connectivity Package for Relay.
PCM600 is used to do complete engineering and
configuration activities needed for the IEDs. Product
type and version specific engineering data needed by
PCM600 for protection, control and communication
engineering of a particular IED is given in an IED
connectivity package. A PC with PCM600 can be
connected to any 670 series IED within a station
using the Ethernet connection. The connection allows
to reading and writing all configuration data needed
for proper operation from or to the IED. The IEDs
have communication interfaces for protocols and
media used for station communication. IED
IEC-61850 station communication files can export
from PCM600 to station engineering tools for
engineering of station communication between bay
IEDs and station IEDs.
2.1.1 Tasks of PCM600 in IED engineering
process
IED engineering management ,Communication
engineering, Disturbance record management
Service management are the tasks of PCM600 in IED
engineering process.
2.1.2 Available Protection
The following are the few among the various
protections which is provided to the above mentioned
transformer by an IED, RET670.
i. Two winding differential protection.
ii. High impedance differential protection
(REF).
iii. Over current and Earth fault protection.
iv. Over excitation protection.
v. Transformer troubles.
III. TWO WINDING DIFFERENTIAL
PROTECTION
The task of the power transformer differential
protection is to determine whether a fault is within
the protected zone, or outside the protected zone. The
protected zone is delimited by the position of current
transformers , and in principle can include more
objects than just transformer. If the fault is found to
be internal, the faulty power transformer must be
quickly disconnected. Thus the IED will always
internally measure the currents on all sides of the
power transformer with the same reference direction
towards the power transformer windings.
3.1 Configuration
The functions Transformer differential
protection, two-winding (T2WPDIF) is provided with
internal CT ratio matching and vector group
compensation and when required zero sequence
current elimination is also made internally in the
software. T2WPDIF is the functional block of two
winding differential protection.
3. Y V Aruna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1( Part 4), January 2015, pp.45-50
www.ijera.com 47 | P a g e
Fig 3.1 : Two winding differential protection
functional block
The configuration of the particular functional
block
is as shown in fig.3.1.
1 - T2WPDIF Analog inputs from SMAI.
2 - T2WPDIF output signals to SMBO.
3- Outputs which gives the magnitude of
fundamental frequency differential currents.
4 - OR logic functional blocks which gives the
indication for the presence of 2nd and/or 5th
harmonics.
5 - Output indicating the presence of harmonics.
Analog inputs from SMAI
AI_HV_1MS = Current reading from the HV side
CT obtained from SMAI.
AI_LV_1MS = Current reading from the LV side CT
obtained from SMAI.
Output signals to SMBO
DIFF_TRIP _ General differential trip signal.
DIFF_RESTRAIN_TRIP = Trip signal under
restrained condition.
DIFF_UNRESTRAIN_TRIP = Trip signal under
unrestrained condition.
These trip signals are given to the trip logic and in-
turn goes to SMBO block.
3.2 Parameter setting
This is done in PCM600 by using Parameter
Setting Tool (PST) as in table 3.2The specified
settings for the parameters of the physical IED for
communication channels, CT and VT conversion
values of the transformer modules, presentation
parameters for local HMI, settings for protection and
control functions, number of setting groups etc., are
provided by using PST.
Table 3.2:Parameter Settings of Two winding
differential protection
3.3 Transformer Differential Protection Details
Description Setting
Trans.Rating 75MVA
Trans.Vector Group YY0
HV side full load current (pri) 197A
HV side full load current (sec) 0.985A
LV side full load current (pri) 1972A
LV side full load current (sec) 0.986A
Diff. Pickup Id>(restraint) 30% of full load
current
Diff. Pickup Id>(restraint) 30% of full load
current
Diff. Pickup Id>(Unrestraint) 10 Times of full
load current
Slope Section 2 40%
Slope Section 3 80%
2nd Harmonic Blocking 15%
4. Y V Aruna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1( Part 4), January 2015, pp.45-50
www.ijera.com 48 | P a g e
3.4 Testing procedure
When once the complete configuration of an IED
is done it is tested for its operation and reliability by
using mobile test kit (Doable, Omicron).
Differential protection test is classified based on
the parameters which are to be checked. They are,
i. Pick up test
ii. Stability test
iii. Slope test
3.4.1. PICK UP TEST
Pick up test is done to verify the pick-up value of
the relay on both HV and LV side of the
transformeras in fig 3.4.1 & 3.4.1.1.
For a 75MVA, 220kV/22kV power transformer,
HV tripping value = 0.985A
We have Idmin = 0.3
Therefore, HV pick up = 0.985 * 0.3 = 0.295A
Similarly,
LV tripping value = 0.984A
We have Idmin = 0.3
Therefore, LV pick up = 0.984 * 0.3 = 0.295A
This value of current is injected to the relay for
each one of the phases and also for all the three phase
by using Doble or omicron test kit and is checked for
its reliability. Pick up value of current is been
injected to the R phase of HV as in table3.4.1.2 & for
LV side as in table 3.4.1.3. As soon as the injected
current exceeds 295mA the relay gets tripped.
Table 3.4.1Testing procedure for 1- Phase
Table 3.4.1.1 Testing procedure for 3- Phase
3.4.1.2 PICK UP TEST MEASURED IN 1Φ
INJECTION
Phase INJECTE
D
CURREN
T(HV
SIDE)
OPERATIN
G
TIME(MS)
DIFFERENTIA
L CURRENT
BIAS
CURR
ENT
R-PH 0.295 26.3 59 59.09
Y-PH 0.296 29.3 59 59.18
B-PH 0.295 27.2 59 59.99
TABLE 3.4.1.2 PICKUP TEST TABULATION ON HV
SIDE
Phase INJECTED
CURRENT
(LV SIDE)
OPERATIN
G
TIME(MS)
DIFFERENTIA
L CURRENT
BIAS
CURR
ENT
R-PH 0.294 26.1 59 59.29
Y-PH 0.293 29.8 59 59.37
B-PH 0.295 27.1 59 59.93
TABLE 3.4.1.3 PICKUP TEST TABULATION ON LV
SIDE
3.4.2. STABILITY TEST
This test is done to check the stability of the
relay. The transformer under consideration is a Y-Y
connected transformer with 0 degree phase shift. An
equal current of magnitude 1A is been injected to
both HV and LV (when both HV and LV has CTs of
same ratio) or current of magnitude equal to the pick-
up value of HV and LV respectively is been injected.
The phase angle of any one of the phases of either
HV or LV is changed. When once the current goes
out of phase the relay is tripped. This is indicated by
indication LED as in the Figure 3.4.2. 75MVA,
220kV/22kV power transformer has different CT
ratios of HV and LV is different. Hence, the actuating
value of 0.295A is been injected for R phase of HV
and LV. Since the phase angles are balanced the relay
is under stable state.When once the phase angle of
either HV or LV is changed the currents become out
of phase issuing a trip.
TABLE 3.4.2 TESTING PROCEDURE FOR STABILITY
TEST
5. Y V Aruna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1( Part 4), January 2015, pp.45-50
www.ijera.com 49 | P a g e
3.4.2.1 STABILITY TEST RESULTS
Phase INJECTED
CURRENT(HV
SIDE)
INJECTED
CURRENT(HV
SIDE)
STABI
LITY
CURR
ENT
PHASE
(DEG)
CURR
ENT
PHASE
(DEG)
R-PH 1A 00
1A 1800
OK
Y-PH 1A 2400
1A 600
OK
B-PH 1A 1200
1A 3000
OK
Table 3.2.2.1 Stability Test Tabulation
3.4.3. SLOPE TEST
The operate restrain characteristic has three
regions. One is non operating region in which the
relay won’t operate. Operating region in which the
relay operates but conditionally. The unrestrained
region in which the relay is operated unconditionally.
This operation of the relay is verified by conducting
slope test as in fig3.4.3.
3.4.3 Fault currents with DC offset during an
external fault Slope = (ΔIoperate/ ΔIrestrain) *100
3.4.3.1 SLOPE TEST(HV&LV) RESULTS FOR
SLOPE-1
Current injected as below:
Current injected at HV side and LV side 2 times
of full load current and LV side current is reduced.
Table 3.4.3.1 Slope-1 Test Results
3.4.3.2 CALCULATION:
3.4.3.3 SLOPE TEST(HV&LV) RESULTS
FOR SLOPE-2
Current injected as below:
Current injected at HV side and LV side 2 times of
full load current and LV side current is reduced.
Table 3.4.3.3 Slope-2 Test Results
3.4.3.4 CALCULATION:
IV. APPLICATIONS
The protection and control IEDs have many
functions included. They included self supervision
with internal event list function block provides good
supervision of the IED. The fault signals make it
easier to analyze and locate a fault.
Both hardware and software supervision is
included and it is also possible to indicate possible
faults through a hardware contact on the power
supply module and/ or through the software
6. Y V Aruna Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 1( Part 4), January 2015, pp.45-50
www.ijera.com 50 | P a g e
communication. Internal events are generated by the
built-in supervisory functions. The supervisory
functions supervise the status of the various modules
in the IED and, in case of failure, a corresponding
event is generated. Similarly, when the failure is
corrected, a corresponding event is generated.
V. CONCLUSION
The Protection Scheme with a particular rating of
the transformer has been designed. For that rating of
the transformer the CT ratio on primary and
secondary sides are calculated and by using that ratio
HV and LV tripping values are calculated. Now by
using PCM600 Connectivity Package the
configuration is done.
In PCM600 there are different functional blocks
by using those functional blocks the configuration for
different faults is done according to the scheme .The
harmonic effect and stable operation regions are also
taken into consideration. once the configuration is
done it is tested using doble or omicron and
parameter setting are done. The test involves pickup
test, slope test, stability test etc..the protection for
different faults have been done. Hence by doing this,
the protection system has become more reliable and
efficient. The transformer is protected against
different faults by Intelligent electronic device.
References
[1] Å. Carlson, “Power Transformer Design
Fundamentals”, ABB Transformers,
Ludvika 2000-08-25.
[2] A. R. van C. Warrington, Protective Relays:
Their Theory and Practice, Volume One and
Two, London: Chapman and Hall, 1962 &
1969.
[3] ABB Document 1MRK 504 086-UEN,
"Technical reference manual, Transformer
Protection IED RET 670", Product version:
1.1, ABB Power Technologies AB,
Västerås, Sweden, Issued: March 2007
[4] J.A.B. Elston, Methods and Apparatus for
Differential Current Measurement in a
three-phase power system, U.S. Patent
6,507,184; 2003-01-14.
Journal Papers:
[1] A.G. Phadke, J.S. Thorp “A New Computer-
Based Flux-Restrained Current-Differential
Relay for Power Transformer Protection”,
IEEE Transactions on Power Apparatus and
Systems Volume PAS-102, Issue 11, pp.
3624-3629, Nov. 1983.
[2] K. Tian, P. Liu “Improved Operation of
Differential Protection of Power
Transformers for Internal Faults Based on
Negative Sequence Power”, IEEE
Proceedings of EMPD’98 Conference, Vol.
2, pp. 422-425, March 1998.
Books:
[1] ABB Book, “Transformer Handbook”1LAC
000 010 ABB Power Technologies
Management Ltd. Transformers
Switzerland.
[2] Transformer Book, Tampere University of
Technology, (http://www.e-leeh.org/transfor
mer/)