Skip to main content
Top
Published in: Cluster Computing 3/2019

13-10-2017

Simulation and real time analysis of network protection tripping strategy based on behavior trees

Authors: Xiong Haijun, Zhang Qi

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The collaboration of multi intelligent electronic devices (IEDs) in a protection system can improve the both selectivity and real-time performance of the system. To verify the feasibility and real-time performance of a network trip strategy based on multi protection IEDs, a modeling and real time analysis method of the protection system based on behavior trees is proposed. The model of protection IED and circuit breaker in the network trip strategy is presented; the model of the delay behavior of the wide area network with normal topology is further more presented; using a network tripping strategy as example, the theory completion time of every behavior in the system has been calculated. The validity of our method was verified via three examples; this method can also complete the real-time analysis of isolated faulty components in a protection system under circumstances of line fault, circuit breaker failure, and protection component refuse movement.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Ross, K.J., Hopkinson, K.M., Pachter, M.: Using a distributed agent-based communication enabled special protection system to enhance smart grid security [J]. IEEE Trans. Smart Grid 4(2), 1216–1224 (2013)CrossRef Ross, K.J., Hopkinson, K.M., Pachter, M.: Using a distributed agent-based communication enabled special protection system to enhance smart grid security [J]. IEEE Trans. Smart Grid 4(2), 1216–1224 (2013)CrossRef
3.
go back to reference Fang, X., Misra, S., Xue, G., et al.: Smart grid- The new and improved power grid: a survey [J]. IEEE Commun. Surv. Tutor. 14(4), 944–980 (2012)CrossRef Fang, X., Misra, S., Xue, G., et al.: Smart grid- The new and improved power grid: a survey [J]. IEEE Commun. Surv. Tutor. 14(4), 944–980 (2012)CrossRef
4.
go back to reference Pipattanasomporn, M., Feroze, H., Rahman, S.: Multi-agent systems in a distributed smart grid: design and implementation[A]. In: Proceedings of the Power Systems Conference and Exposition, IEEE, pp. 1–8 (2009) Pipattanasomporn, M., Feroze, H., Rahman, S.: Multi-agent systems in a distributed smart grid: design and implementation[A]. In: Proceedings of the Power Systems Conference and Exposition, IEEE, pp. 1–8 (2009)
5.
go back to reference Karnouskos, S., De Holanda, T. N.: Simulation of a smart grid city with software agents[A]. In: Proceedings of the Third UKSim European Symposium on Computer Modeling and Simulation, IEEE, pp. 424–429 (2009) Karnouskos, S., De Holanda, T. N.: Simulation of a smart grid city with software agents[A]. In: Proceedings of the Third UKSim European Symposium on Computer Modeling and Simulation, IEEE, pp. 424–429 (2009)
6.
go back to reference YIN, Xiang-gen, WANG, Yang, ZHANG, Zhe: Zone-division and tripping strategy for limited wide area protection adapting to smart grid [J]. Proceed. CSEE 30(7), 1–7 (2010) YIN, Xiang-gen, WANG, Yang, ZHANG, Zhe: Zone-division and tripping strategy for limited wide area protection adapting to smart grid [J]. Proceed. CSEE 30(7), 1–7 (2010)
7.
go back to reference Zhu, Y., Song, S., Wang, D.: Multiagents-based wide area protection with best-effort adaptive strategy [J]. Int. J. Elec. Power Energy Syst. 31(2), 94–99 (2009)CrossRef Zhu, Y., Song, S., Wang, D.: Multiagents-based wide area protection with best-effort adaptive strategy [J]. Int. J. Elec. Power Energy Syst. 31(2), 94–99 (2009)CrossRef
8.
go back to reference ZHANG, Jie, LU, De-hong: Analysis on application of automata theory in IEC 61850 [J]. Power Syst. Technol. 28(18), 34–38 (2004) ZHANG, Jie, LU, De-hong: Analysis on application of automata theory in IEC 61850 [J]. Power Syst. Technol. 28(18), 34–38 (2004)
9.
go back to reference Lotfifard, S., Kezunovic, M., Mousavi, M.J.: Voltage sag data utilization for distribution fault location [J]. IEEE Trans. Power Deliv. 26(2), 1239–1246 (2011)CrossRef Lotfifard, S., Kezunovic, M., Mousavi, M.J.: Voltage sag data utilization for distribution fault location [J]. IEEE Trans. Power Deliv. 26(2), 1239–1246 (2011)CrossRef
10.
go back to reference Chen, J., Patton, R.J.: Robust Model-based Fault Diagnosis for Dynamic Systems [M]. Springer, Berlin (2012) Chen, J., Patton, R.J.: Robust Model-based Fault Diagnosis for Dynamic Systems [M]. Springer, Berlin (2012)
11.
go back to reference Khorramdel, B., Marzooghi, H., Samet, H., et al.: Fault locating in large distribution systems by empirical mode decomposition and core vector regression[J]. Int. J. Elect. Power. Energy Syst. 58(6), 215–225 (2014)CrossRef Khorramdel, B., Marzooghi, H., Samet, H., et al.: Fault locating in large distribution systems by empirical mode decomposition and core vector regression[J]. Int. J. Elect. Power. Energy Syst. 58(6), 215–225 (2014)CrossRef
12.
go back to reference Huang, F., Wang, X., Dong, X., Xueyuan, W.: A simulation for smart distribution grid communication system[J]. Autom. Elec. Power Syst. 37(11), 81–86 (2013) Huang, F., Wang, X., Dong, X., Xueyuan, W.: A simulation for smart distribution grid communication system[J]. Autom. Elec. Power Syst. 37(11), 81–86 (2013)
13.
go back to reference Ding, L., Wang, X., Tong, X.: IEC 61850 sampled value transmission simulation based on EPOCHS [J]. Autom. Elec. Power Syst. 32(20), 67–72 (2008) Ding, L., Wang, X., Tong, X.: IEC 61850 sampled value transmission simulation based on EPOCHS [J]. Autom. Elec. Power Syst. 32(20), 67–72 (2008)
14.
go back to reference Chen, G., Zhang, Z., Yin, X., Wang, F.: Wide area backup protection communication mode and its performance evaluation [J]. Proc. CSEE 34(1), 186–196 (2014) Chen, G., Zhang, Z., Yin, X., Wang, F.: Wide area backup protection communication mode and its performance evaluation [J]. Proc. CSEE 34(1), 186–196 (2014)
15.
go back to reference Tong, X., Wang, X.R., Hopkinson, K., Tang, J.: Simulation modeling and implements of wide-area backup protection multi-agent system [J]. Proc. CSEE 28(19), 111–117 (2008) Tong, X., Wang, X.R., Hopkinson, K., Tang, J.: Simulation modeling and implements of wide-area backup protection multi-agent system [J]. Proc. CSEE 28(19), 111–117 (2008)
16.
go back to reference Dromey, R. G.: From requirements to design: Formalizing the key steps [A]. In: Proceedings of the First International Conference on Software Engineering and Formal Methods, IEEE, pp. 2–11 (2003) Dromey, R. G.: From requirements to design: Formalizing the key steps [A]. In: Proceedings of the First International Conference on Software Engineering and Formal Methods, IEEE, pp. 2–11 (2003)
17.
go back to reference Milosevic, Z., Dromey, R. G.: On expressing and monitoring behaviour in contracts [A]. In: Proceedings of the Enterprise Distributed Object Computing Conference, EDOC’02[C], IEEE, pp. 3–14 (2002) Milosevic, Z., Dromey, R. G.: On expressing and monitoring behaviour in contracts [A]. In: Proceedings of the Enterprise Distributed Object Computing Conference, EDOC’02[C], IEEE, pp. 3–14 (2002)
18.
go back to reference Smith, C., Winter, K., Hayes, I., et al. An environment for building a system out of its requirements[A]. In: Proceedings of the 19th IEEE international conference on Automated software engineering[C], IEEE Computer Society, pp. 398–399 (2004) Smith, C., Winter, K., Hayes, I., et al. An environment for building a system out of its requirements[A]. In: Proceedings of the 19th IEEE international conference on Automated software engineering[C], IEEE Computer Society, pp. 398–399 (2004)
19.
go back to reference Dromey, R.G.: Genetic Design: Amplifying Our Ability to Deal with Requirements Complexity [M]. Springer, Berlin (2005) Dromey, R.G.: Genetic Design: Amplifying Our Ability to Deal with Requirements Complexity [M]. Springer, Berlin (2005)
20.
go back to reference Wen, L., Dromey, R. G.: From requirements change to design change: A formal path[A]. In: Proceedings of the Second International Conference on Software Engineering and Formal Methods, IEEE, pp. 104–113 (2004) Wen, L., Dromey, R. G.: From requirements change to design change: A formal path[A]. In: Proceedings of the Second International Conference on Software Engineering and Formal Methods, IEEE, pp. 104–113 (2004)
21.
go back to reference Winter, K., Hayes, I. J., Colvin, R.: Integrating requirements: the Behavior Tree philosophy [A]. In: Proceedings of the IEEE International Conference on Software Engineering and Formal Methods[C], IEEE, pp. 41–50 (2010) Winter, K., Hayes, I. J., Colvin, R.: Integrating requirements: the Behavior Tree philosophy [A]. In: Proceedings of the IEEE International Conference on Software Engineering and Formal Methods[C], IEEE, pp. 41–50 (2010)
22.
go back to reference Winter, K., Colvin, R., Dromey, R. G.: Dynamic Relational Behaviour for Large-Scale Systems [A]. In: Proceedings of the Software Engineering Conference, 2009[C], Australian, IEEE, pp. 173–182 (2009) Winter, K., Colvin, R., Dromey, R. G.: Dynamic Relational Behaviour for Large-Scale Systems [A]. In: Proceedings of the Software Engineering Conference, 2009[C], Australian, IEEE, pp. 173–182 (2009)
23.
go back to reference Lim, C.U., Baumgarten, R., Colton, S.: Evolving Behaviour Trees for the Commercial Game DEFCON[M]. Springer, Berlin (2010)CrossRef Lim, C.U., Baumgarten, R., Colton, S.: Evolving Behaviour Trees for the Commercial Game DEFCON[M]. Springer, Berlin (2010)CrossRef
24.
go back to reference Perez, D., Nicolau, M., O’Neill, M., et al.: Evolving Behaviour Trees for the Mario ai Competition Using Grammatical Evolution [M]. Springer, Berlin (2011)CrossRef Perez, D., Nicolau, M., O’Neill, M., et al.: Evolving Behaviour Trees for the Mario ai Competition Using Grammatical Evolution [M]. Springer, Berlin (2011)CrossRef
25.
go back to reference Yatapanage, N., Winter, K., Zafar, S.: Slicing Behavior Tree Models for Verification [M]. Springer, Berlin (2010) Yatapanage, N., Winter, K., Zafar, S.: Slicing Behavior Tree Models for Verification [M]. Springer, Berlin (2010)
26.
go back to reference Lindsay, P.A., Yatapanage, N., Winter, K.: Cut set analysis using behavior trees and model checking[J]. For. Aspects Comput. 24(2), 249–266 (2012)CrossRef Lindsay, P.A., Yatapanage, N., Winter, K.: Cut set analysis using behavior trees and model checking[J]. For. Aspects Comput. 24(2), 249–266 (2012)CrossRef
27.
go back to reference Haijun, X.I., Yongli, Z.H., Zhang, F.: Formal specification and verification of IEC61850 IED interoperabilitybased on behaviourtree[J]. Autom. Elect. Power Syst. 37(24), 66–71 (2013) Haijun, X.I., Yongli, Z.H., Zhang, F.: Formal specification and verification of IEC61850 IED interoperabilitybased on behaviourtree[J]. Autom. Elect. Power Syst. 37(24), 66–71 (2013)
28.
go back to reference Xiong, H.-J., Wang, X.-H., Zhu, Y., Zhang, C.-M.: IEC61850 A specification and verification method of real-time interoperability for IEC61850 IED [J]. Autom. Elect. Power Syst. 38(19), 90–95 (2014) Xiong, H.-J., Wang, X.-H., Zhu, Y., Zhang, C.-M.: IEC61850 A specification and verification method of real-time interoperability for IEC61850 IED [J]. Autom. Elect. Power Syst. 38(19), 90–95 (2014)
29.
go back to reference Chen, G.Y., Yin, X., Zhang, K.: Communication modeling for wide-area relay protection based on IEC61850[J]. TELKOMNIKA Indones. J. Elect. Eng. 10(7), 1673–1684 (2012) Chen, G.Y., Yin, X., Zhang, K.: Communication modeling for wide-area relay protection based on IEC61850[J]. TELKOMNIKA Indones. J. Elect. Eng. 10(7), 1673–1684 (2012)
Metadata
Title
Simulation and real time analysis of network protection tripping strategy based on behavior trees
Authors
Xiong Haijun
Zhang Qi
Publication date
13-10-2017
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1207-7

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner