Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Introduction to Distribution Automation Systems
1.1Historical Background
1.2Distribution System Topology and Structure
1.3Distribution Automation (DA) and Control
2.2Complex Power Concepts
2.2.1Power Equations Element Element Element
2.2.2Single-Phase Power Formulations
2.2.3Balanced Three-Phase Power Formulations
2.3Balanced Voltage to Neutral-Connected System
2.3.1Wye- or Y-Connected System
2.5Per-Unit System
2.6Calculation of Power Losses
2.7Voltage Regulation Techniques
2.7.2Tap-Changing Method for Voltage Regulation
2.7.3Voltage-Regulating Transformers
2.7.4Phase Shifter or Regulating Transformer
2.8Voltage-Sag Analysis and Calculation
2.9Equipment Modeling
2.9.1Power Transformers
2.9.2Distribution Transformers and Operating Fundamentals
2.9.3Autotransformer Model
2.9.4Cogenerator Model
2.9.5Synchronous Generator Model
2.9.6Inverter-Connected Generator in Photovoltaic Systems
2.9.7Synchronous Generator Model
2.10Components Modeling
2.10.1Line Model in Distribution Systems
2.10.2Shunt Capacitor Model
2.10.3Switch Model
2.10.4Load Models 3: Bus-Impedance Network Method
2.16Illustrative Examples
2.16.2Transformer Short Circuit during an Open-Circuit Test
2.16.3Unbalanced Set of Voltages
2.16.4Newton-Raphson Method
2.16.5Polar Formulation of Load-Flow Equations
2.16.6Gauss-Seidel Method
Distribution System Protection and Control
3.1.1Introduction to Symmetrical Components
3.1.2Sequence Networks Used in Fault Analysis
3.2Single Line-to-Ground Fault
3.3Double Line-to-Ground Fault on Phase B and C
3.4Three-Phase Fault Analysis
3.5Line-to-Ground and Line-to-Line Faults
3.5.1Single Line-to-Ground Fault
3.5.2Line-to-Line Fault
3.6Protection Systems
3.6.2Instrument Transformers for Saturation in CT
3.7Protective Relay Technology
3.7.1Digital Relaying
3.7.2Electromechanical Relay Technology
3.7.3Induction Disc Relays 2, Radial System Protection
3.8System Protection in General
3.9.1Line Protection with Impedance Distance Relays Overcurrent Relays Relay
3.9.2Mho Relays
3.9.3Ohm Relays
3.9.4Generator, Buses, and Transformer Protection Protection with Differential Relays Protection with Differential Relays
3.10Illustrative Examples
3.10.1Example 1
3.10.2Example 2
3.10.3Example 3
3.10.4Example 4, Three-Phase Fault
3.10.5Example 5, Single-Line-to-Ground (SLG) Fault
4.2Reliability Evaluation
4.2.1Inputs Required for Historical Assessment
4.4Reliability Indices
4.5Methods of Reliability Analysis
4.5.1Analytical Methods
4.5.2State Space Diagrams A, Series Components B, Parallel Systems C, Series and Parallel System
4.6Failure Modes and Effects Analysis (FMEA) Method
4.7Event-Tree Analysis Method
4.8Fault-Tree Analysis Method
4.9Unavailability of Power Calculations from the Cut Set
4.9.1Fault Tree Based on Minimal Cut Set
Minimum cut set:
4.9.2Nonminimal Cut Set in Complete Unavailability
4.10Simulation Techniques for Reliability Analysis
4.11.1Monte Carlo Simulation Method Monte Carlo Method Monte Carlo Simulation Statement: Monte Carlo Simulation
4.12Evaluation of Distribution Reliability Analysis Method
4.13Reliability Database Design
4.13.1DISREL Information on DISREL Features Capabilities of DISREL
4.14Maintenance and Reliability
4.14.1Repair-to-Failure Process
4.14.2Repair Failure: Repair Process
4.14.3Failure-to-Repair Process
4.14.4Combined Reliability
4.15Maintenance of Distribution Systems
4.15.1Preventive Maintenance
4.15.2Corrective Maintenance
4.16Reliability-Centered Maintenance
4.17Security and Reliability-Centered Maintenance
4.18.1Overhead Lines
4.18.2Circuit Breakers
4.18.4Substation Equipment
4.19Illustrative Examples
4.19.1Example 1
4.19.2Example 2
4.19.3Example 3
4.19.4Example 4
Distribution Automation and Control Functions
5.2Demand-Side Management
5.2.2Conceptual Overview of Methodology for DSM Studies
5.3Voltage/VAr Control
5.3.1Methods of Voltage/VAr in Distribution Automation
5.3.2Evaluation of Methods Used for Voltage/VAr Control
5.3.3Modeling of Voltage/VAr Control Options
5.3.4Formulation of Voltage/VAr
5.3.5System Operating Constraints
5.4Fault Detection (Distribution Automation Function) Sequence Component Technique Ratio Technique Relationship Technique Technique Technique
5.4.2Modeling of Faults/Classification
5.5Trouble Calls
5.6Restoration Functions
5.6.1Evaluation of Methods
5.6.2Optimization Formulation
5.6.3Optimization Constraints
5.7Reconfiguration of Distribution Systems
5.7.1Methods Used for Reconfiguration
5.7.2Formulation of Modeling of Reconfiguration of Load Balancing 1 of Load Balancing 2 of Minimizing Voltage Deviation for Single-Loop Voltage Minimization
5.8Power Quality
5.8.2New Approaches of Power Quality
5.9Optimization Techniques
5.9.3Classical Solution
5.9.4Linear Programming
5.9.5Mixed-Integer Programming
5.9.6Interior-Point Linear Programming
5.9.7Sequential Quadratic Programming
5.10Illustrative Examples
5.10.1Example 1
Intelligent Systems in Distribution Automation
6.2Distribution Automation Function
6.3Artificial Intelligence Methods
6.3.1Expert System Techniques
6.3.2Artificial Neural Networks of Connection Weights
6.3.3Fuzzy Logic Sets and Systems Systems, Complexity, and Ambiguity
6.3.4Genetic Algorithms (GA)
6.4Intelligent Systems in Distribution Automation
6.4.1DSM and AI
6.5Voltage/VAr Control
6.6Network Reconfiguration via AI
6.7.1Use of AI Techniques for Fault Analysis
Renewable Energy Options and Technology
7.2Distributed Generation
7.3Working Definition and Classification of Renewable Energy
7.4Renewable Energy Options Systems Characteristics
7.4.2Wind Turbine Systems of Tower Height on Wind Power Control Technologies
7.4.4Small and Micro Hydropower
7.5Other Nonrenewable Energy Sources
7.5.1Fuel Cell of Fuel Cells Calculation
7.5.2Ocean Energy
7.5.3Geothermal Heat Pumps
7.5.4Microturbine and Sterling Engine Engine
7.6Distributed Generation Concepts and Benefits
7.6.1Categories of DG
7.6.2Criteria for DG Concepts
7.6.3DG Benefits
7.7Illustrative Examples
7.7.1Example 1
7.7.2Example 2
7.7.3Example 3
7.7.4Example 4
7.7.5Example 5
7.7.6Example 6
Distribution Management Systems
8.1Introduction to EMS
8.1.1DMS and EMS
8.2Functions of EMS
8.3SCADA (Supervisory Control and Data Acquisition) Function
8.5.6Distribution System Analysis (DSA)
8.5.7Load Management System (LMS)
8.5.8Geographic Information System (GIS)
8.5.9Customer Information System (CIS)
8.6Automatic Meter Reading (AMR)
8.6.1Advanced Billing
8.6.2Special Features and Benefits of AMR
8.6.3Advancement in AMR Technology
8.6.4Advances in Billing Technology
8.7Cost-Benefit Analysis (CBA) in Distribution Systems
8.7.1Cost-Benefit Analysis Methodology
8.7.2Function/Payback Correlation
9.1.1What is Telecommunication?
9.2Telecommunication in Principle
9.3Data Communication in Power System Distribution Network
9.4Signal Representation
9.4.1Communication Technology for Signal Description
9.5Types of Telecommunication Media
9.5.1Copper Circuit
9.5.2Twisted Pair
9.5.3Coaxial Cable
9.5.4Fiber Optics
9.5.6Cellular Transmission
9.6Communication Modulation Techniques
9.6.1Amplitude Modulation (AM)
9.6.2Frequency Modulation (FM) Modulation (PM) Modulation Modulation
9.6.3Modulation Indices
9.6.4Digital Modulation Communications Electronic Devices (IEDs)
9.7Communication Networking
9.7.1Local Area Network of Transmission in LAN Topologies
9.7.2Metropolitan Area Network (MAN)
9.7.3Wide Area Network (WAN) of WAN Connection
9.9Communication Standards Overview
9.9.1Standards Bodies
9.9.2Suite of Standards
9.9.3Interconnection Standards and Regulations
9.10OSI Model
9.10.1Description of OSI Model Layers or Lower Layers Layers or Upper Layers
9.10.2Message Handling
9.11Distribution Network Protocol (DNP3)
9.11.1DNP3 Protocol Three-Layer Structure Description
9.12Utility Communication Architecture (UCA)
9.12.1Overview and Application
9.13Power-Line Carrier Communication
9.13.2PLC Architecture Traps Units
9.13.3Broadband over Power Lines (BPL)
9.13.5Current Trends and Applications
9.14Security in Telecommunications and Information Technology
9.14.1Vulnerabilities, Threats, and Risks
9.14.2Security Architecture Elements in ITU-T X.805
9.14.3Privacy and Data Confidentiality
9.14.5Data Integrity
9.14.7Other Dimensions Defined in X.805
9.14.8Security Framework Requirements
9.14.9Information Security Goals
9.15Illustrative Examples
9.15.1Example 1
10.3Demand Response
10.4Communication Advances
10.6Standards and Institutional Barriers
10.7Pricing and Billing
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 83|Likes:
Published by raymon6666

More info:

Published by: raymon6666 on Apr 08, 2013
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 8 to 58 are not shown in this preview.
You're Reading a Free Preview
Pages 73 to 281 are not shown in this preview.
You're Reading a Free Preview
Pages 289 to 314 are not shown in this preview.
You're Reading a Free Preview
Pages 322 to 380 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->