Maintaining the reach of protective devices in distribution system with penetration of distributed generation

Van Tu Dao*, S. Chaitusaney

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Protection schemes of distribution system are designed conventionally for radial feeder structure with one source supplying. The presence of distributed generation as the second source causes the protection schemes to be confused in operations. This paper evaluates the reach of protective relays after distributed generation has been installed into the system. All types of faults are analyzed with the consideration of system grounding methods and connection transformer which connects distributed generation to power system. Then, an approach is proposed to maintain the protected areas of protective devices.

Original languageEnglish
Title of host publicationECTI-CON 2011 - 8th Electrical Engineering/ Electronics, Computer, Telecommunications and Information Technology (ECTI) Association of Thailand - Conference 2011
Pages696-699
Number of pages4
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event8th Electrical Engineering/ Electronics, Computer, Telecommunications and Information Technology (ECTI) Association of Thailand - Conference 2011, ECTI-CON 2011 - Khon Kaen, Thailand
Duration: 2011 May 172011 May 19

Other

Other8th Electrical Engineering/ Electronics, Computer, Telecommunications and Information Technology (ECTI) Association of Thailand - Conference 2011, ECTI-CON 2011
Country/TerritoryThailand
CityKhon Kaen
Period11/5/1711/5/19

Keywords

  • Distributed generation
  • fault current
  • protection system
  • reduced reaching
  • system grounding

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Maintaining the reach of protective devices in distribution system with penetration of distributed generation'. Together they form a unique fingerprint.

Cite this