Tags
Language
Tags
August 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Introduction to Power System Protection

    Posted By: readerXXI
    Introduction to Power System Protection

    Introduction to Power System Protection
    by Hedaya Mahmood Alasooly
    English | 2022 | ASIN: B0B1D2XVFC | 242 Pages | ePUB | 3.82 MB

    Power system protection systems have three basic components: Instrument transformers, Relays, Circuit breakers

    The function of the CT is to reproduce in its secondary winding a current I’ that is proportional to the primary current I. The CT converts primary currents in the kiloamp range to secondary currents in the 0–5 ampere range for convenience of measurement.

    The function of the relay is to discriminate between normal operation and fault conditions. The OC relay in Figure 2 has an operating coil, which is connected to the CT secondary winding, and a set of contacts. When I’ exceeds a specified ‘‘pickup’’ value, the operating coil causes the normally open contacts to close. When the relay contacts close, the trip coil of the circuit breaker is energized, which then causes the circuit breaker to open.

    System-protection components have the following design criteria:

    Reliability: Operate dependably when fault conditions occur, even after remaining idle for months or years. Failure to do so may result in costly damages.
    Selectivity: Avoid unnecessary, false trips.
    Speed: Operate rapidly to minimize fault duration and equipment damage. Any intentional time delays should be precise.
    Economy: Provide maximum protection at minimum cost.
    Simplicity: Minimize protection equipment and circuitry.

    Since it is impossible to satisfy all these criteria simultaneously, compromises must be made in system protection.