Research on Realization of Over-Current Protection Based on Multi-Agent Strategy

Article Preview

Abstract:

Targeting at the improvement and optimization of the deficiencies of traditional over-current protection, multi-agent strategy is applied in relay protection to improve the fast response of the backup protection. While confirming the feasibility of the above-mentioned strategy, PLC and field bus techniques are adopted to realize information interaction and liaison among multiple agents and host computer in the environment, converting the original passive time-limit mechanism to active strategic collaboration. And the thesis materializes the effective application of the microcomputer-based, multi-agent-based protection in specific projects.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3009-3012

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Giovanini, R., Coury, D.V., Hopkinson, K.M. and Thorp, J.S. Improving local and backup protection using wide area agents. Eighth IEE International Conference on Developments in Power System Protection. (2004).

DOI: 10.1049/cp:20040228

Google Scholar

[2] Jinai Zhang, Qianjin Liu. The application of a multi-agent technology in relaying protection. International Conference on Power System Technology. (2006).

DOI: 10.1109/icpst.2006.321466

Google Scholar

[3] Ding Wei, Benteng He, Huifang Wang, Mengxiao Chen, Xu Wei. Overview of wide-area relaying protection system [J]. Power System Protection and Control. 2012 (40) 145-155.

Google Scholar

[4] Uthitsunthorn Dusit, Kulworawanichpong Thanatchai. Adaptive over-current relay coordination based on multi-agent system: A case study on transmission line outage. Asia-Pacific Power and Energy Engineering Conference. (2012).

DOI: 10.1109/appeec.2012.6307622

Google Scholar

[5] Tsaur, Woei-Jiunn, Yeh, Lo-Yao. A novel mobile agent authentication scheme for multi-host environments using self-certified pairing-based public key cryptosystem [J]. International Journal of Innovative Computing, Information and Control. 2011 (7) 2389-2404.

Google Scholar