(ABSTRACT) This document explores Hidden Failures in protection systems, which have been identified as key contributors in the degradation of Power System wide-area disturbances. The Hidden Failure Modes in which the protection systems may fail to operate correctly and their consequences are identified in a theoretical approach. This theoretical side has its practical counterpart since a number of Hidden Failure Modes are found in real wide-area disturbances. The original definition of Hidden Failure, which is a failure that remains undetected and is uncovered by another system event, is included as well as developments on Hidden Failure sequence of events and a methodology for Hidden Failure identification. This method is based on Protection Element Functionality Defects (PEFD), which are applicable to all the elements included in the protective chain. PEFD are classified in two main groups. Primary and Backup protection schemes applied for Generators, Buses, Transformers and Transmission Lines are analyzed. The abnormal Power System conditions that each Power System element may have are enumerated. A catalogue of the relays or relay systems, in charge of detecting and stopping the continuous presence of the abnormal conditions is developed. Relay families organize this catalogue. The relaying schemes for five Special Protection Systems are described. related to PEFD-B are included in a general fashion. Wide-area disturbances based on NERC reports are analyzed and Hidden Failures are identified employing the developed methodology. The mechanisms in the disturbances are summarized and are applicable to Primary protection, Backup protection and Special Protection Systems. Regions of Vulnerability and Areas of Consequence definitions are included and are identified for a Power System wide-area disturbance. For some protection schemes the term Condition of Vulnerability was developed. Regions of Vulnerability and Areas of Consequence will bring the initial steps towards the problem solution. Further research directions are oriented towards the development of a computer-based tool to track the regions of vulnerability in real time. iv Acknowledgments
[1]
S. A. Nirenberg,et al.
Fast acting load shedding
,
1991
.
[2]
Surachet Tamronglak,et al.
Analysis of power system disturbances due to relay hidden failures
,
1994
.
[3]
D. R. Cowbourne,et al.
The application of system control centre computer assisted special protection systems in Ontario Hydro
,
1989
.
[4]
Arun G. Phadke,et al.
Power System Relaying
,
1992
.
[5]
C. R. Mason,et al.
The Art and Science of Protective Relaying
,
1956
.
[6]
James S. Thorp,et al.
Aspects of power system protection in the post-restructuring era
,
1999,
Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[7]
C. W. Taylor,et al.
Recording and analyzing the July 2 cascading outage [Western USA power system]
,
1997
.
[8]
Arun G. Phadke,et al.
Anatomy of power system blackouts and preventive strategies by rational supervision and control of protection systems
,
1995
.
[9]
P. M. Anderson,et al.
Industry experience with special protection schemes
,
1996
.
[10]
N. V. Kosterev,et al.
Modeling of out-of-step conditions in power systems
,
1996
.
[11]
C. F. Henville,et al.
Summary of "System protection and voltage stability"
,
1995
.
[12]
James D. McCalley,et al.
Reliability of special protection systems
,
1999
.
[13]
J. van Eyssen.
Introducing a new application philosophy for out-of-step protection
,
1997
.