Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (370)

Search Parameters:
Keywords = protection relays

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 10490 KiB  
Article
A Web-Based Distribution Network Geographic Information System with Protective Coordination Functionality
by Jheng-Lun Jiang, Tung-Sheng Zhan and Ming-Tang Tsai
Energies 2025, 18(15), 4127; https://doi.org/10.3390/en18154127 - 4 Aug 2025
Viewed by 24
Abstract
In the modern era of smart grids, integrating advanced Geographic Information Systems (GISs) with protection coordination functionalities is pivotal for enhancing the reliability and efficiency of distribution networks. This paper presents an implementation of a web-based distribution network GIS platform that seamlessly integrates [...] Read more.
In the modern era of smart grids, integrating advanced Geographic Information Systems (GISs) with protection coordination functionalities is pivotal for enhancing the reliability and efficiency of distribution networks. This paper presents an implementation of a web-based distribution network GIS platform that seamlessly integrates distribution system feeder GIS monitoring with the system model file layout, fault current analysis, and coordination simulation functions. The system can provide scalable and accessible solutions for power utilities, ensuring that protective devices operate in a coordinated manner to minimize outage impacts and improve service restoration times. The proposed GIS platform has demonstrated significant improvements in fault management and relay coordination through extensive simulation and field testing. This research advances the capabilities of distribution network management and sets a foundation for future enhancements in smart grid technology. Full article
Show Figures

Figure 1

14 pages, 1771 KiB  
Article
An Adaptive Overcurrent Protection Method for Distribution Networks Based on Dynamic Multi-Objective Optimization Algorithm
by Biao Xu, Fan Ouyang, Yangyang Li, Kun Yu, Fei Ao, Hui Li and Liming Tan
Algorithms 2025, 18(8), 472; https://doi.org/10.3390/a18080472 - 28 Jul 2025
Viewed by 214
Abstract
With the large-scale integration of renewable energy into distribution networks, traditional fixed-setting overcurrent protection strategies struggle to adapt to rapid fluctuations in renewable energy (e.g., wind and photovoltaic) output. Optimizing current settings is crucial for enhancing the stability of modern distribution networks. This [...] Read more.
With the large-scale integration of renewable energy into distribution networks, traditional fixed-setting overcurrent protection strategies struggle to adapt to rapid fluctuations in renewable energy (e.g., wind and photovoltaic) output. Optimizing current settings is crucial for enhancing the stability of modern distribution networks. This paper proposes an adaptive overcurrent protection method based on an improved NSGA-II algorithm. By dynamically detecting renewable power fluctuations and generating adaptive solutions, the method enables the online optimization of protection parameters, effectively reducing misoperation rates, shortening operation times, and significantly improving the reliability and resilience of distribution networks. Using the rate of renewable power variation as the core criterion, renewable power changes are categorized into abrupt and gradual scenarios. Depending on the scenario, either a random solution injection strategy (DNSGA-II-A) or a Gaussian mutation strategy (DNSGA-II-B) is dynamically applied to adjust overcurrent protection settings and time delays, ensuring real-time alignment with grid conditions. Hard constraints such as sensitivity, selectivity, and misoperation rate are embedded to guarantee compliance with relay protection standards. Additionally, the convergence of the Pareto front change rate serves as the termination condition, reducing computational redundancy and avoiding local optima. Simulation tests on a 10 kV distribution network integrated with a wind farm validate the effectiveness of the proposed method. Full article
Show Figures

Figure 1

20 pages, 7276 KiB  
Article
Research on the Heavy Gas Setting Method of Oil-Immersed Transformer Based on Oil Flow Acceleration Characteristics
by Yuangang Sun, Zhixiang Tong, Jian Mao, Junchao Wang, Shixian He, Tengbo Zhang and Shuting Wan
Energies 2025, 18(14), 3859; https://doi.org/10.3390/en18143859 - 20 Jul 2025
Viewed by 213
Abstract
As the key non-electric protection equipment of an oil-immersed transformer, the gas relay plays an important role in ensuring the safe operation of the transformer. To further enhance the sensitivity of gas relays for the heavy gas alarm, this paper takes the BF [...] Read more.
As the key non-electric protection equipment of an oil-immersed transformer, the gas relay plays an important role in ensuring the safe operation of the transformer. To further enhance the sensitivity of gas relays for the heavy gas alarm, this paper takes the BF type double float gas relay as the research object and proposes a new method for heavy gas setting, which is based on the internal oil flow acceleration characteristics of the gas relay. Firstly, the analytical derivation of the force acting on the gas relay baffle is carried out, and through theoretical analysis, the internal mechanism of heavy gas action under transient oil flow excitation is revealed. Then, the numerical simulation and experimental research on the variation of oil flow velocity and acceleration under different fault energies are carried out. The results show that with the increase of fault energy, the oil flow velocity fluctuates up and down during heavy gas action, but the oil flow acceleration shows a linear correlation. The oil flow acceleration can be set as the threshold of heavy gas action, and the severity of the fault can be judged. At the same time, the alarm time of the heavy gas setting method based on the oil flow acceleration characteristics is greatly shortened, which can reflect the internal fault of the transformer in time and significantly improve the sensitivity of the heavy gas alarm. Full article
Show Figures

Figure 1

16 pages, 994 KiB  
Article
Reliability Evaluation of New-Generation Substation Relay Protection Equipment Based on ASFSSA-LSTM-GAN
by Baojiang Tian, Kai Chen, Xingwei Du, Wenyan Duan, Yibo Wang, Jiajia Hu and Hongbo Zou
Processes 2025, 13(7), 2300; https://doi.org/10.3390/pr13072300 - 19 Jul 2025
Viewed by 337
Abstract
In order to improve the reliability evaluation accuracy of a new generation of substation relay protection equipment under small-sample failure rate data, a Generative Adversarial Network (GAN) model based on the Adaptive Spiral Flying Sparrow Search Algorithm (ASFSSA) to optimize the Long Short-Term [...] Read more.
In order to improve the reliability evaluation accuracy of a new generation of substation relay protection equipment under small-sample failure rate data, a Generative Adversarial Network (GAN) model based on the Adaptive Spiral Flying Sparrow Search Algorithm (ASFSSA) to optimize the Long Short-Term Memory (LSTM) network is proposed. Because of the adaptability of LSTM for processing time series, LSTM is embedded into the GAN, and the LSTM optimized by ASFSSA is used as the generator of GAN. The trained model is used to expand the original data samples, and the least squares method is used to estimate the distribution model parameters, to obtain the reliability function of the relay protection equipment, and to predict the operating life of the equipment. The results show that compared with other methods, the correlation coefficient of the expanded data samples is closer to the original data, and the life estimation of the equipment is more accurate. The model can be used as a reference for reliability assessment and acceptance testing of the new generation of substation relay protection equipment. Full article
(This article belongs to the Section Energy Systems)
Show Figures

Figure 1

12 pages, 231 KiB  
Systematic Review
Cybersecurity Issues in Electrical Protection Relays: A Systematic Review
by Giovanni Battista Gaggero, Paola Girdinio and Mario Marchese
Energies 2025, 18(14), 3796; https://doi.org/10.3390/en18143796 - 17 Jul 2025
Viewed by 261
Abstract
The increasing digitalization of power systems has revolutionized the functionality and efficiency of electrical protection relays. These digital relays enhance fault detection, monitoring, and response mechanisms, ensuring the reliability and stability of power networks. However, their connectivity and reliance on communication protocols introduce [...] Read more.
The increasing digitalization of power systems has revolutionized the functionality and efficiency of electrical protection relays. These digital relays enhance fault detection, monitoring, and response mechanisms, ensuring the reliability and stability of power networks. However, their connectivity and reliance on communication protocols introduce significant cybersecurity risks, making them potential targets for malicious attacks. Cyber threats against digital protection relays can lead to severe consequences, including cascading failures, equipment damage, and compromised grid security. This paper presents a comprehensive review of cybersecurity challenges in digital electrical protection relays, focusing on four key areas: (1) a taxonomy of cyber attack models targeting protection relays, (2) the associated risks and their potential impact on power systems, (3) existing mitigation strategies to enhance relay security, and (4) future research directions to strengthen resilience against cyber threats. Full article
Show Figures

Figure 1

19 pages, 4826 KiB  
Article
Design of Protection Strategy for MVDC Distribution Networks Considering Network Reconfiguration
by Nam-Gi Park, Jae-In Lee, Byeong-Soo Go, Seok-Ju Lee, Changhyun Kim and Minh-Chau Dinh
Energies 2025, 18(13), 3292; https://doi.org/10.3390/en18133292 - 24 Jun 2025
Viewed by 367
Abstract
The increasing attention to medium-voltage direct current (MVDC) distribution networks is motivated by the need to efficiently connect renewable energy sources and DC loads. However, fast and reliable protection strategies remain a key challenge due to the rapid rise and high magnitude of [...] Read more.
The increasing attention to medium-voltage direct current (MVDC) distribution networks is motivated by the need to efficiently connect renewable energy sources and DC loads. However, fast and reliable protection strategies remain a key challenge due to the rapid rise and high magnitude of DC fault currents. This paper proposes a protection strategy for MVDC distribution networks considering network reconfiguration. The strategy integrates a fault-detection scheme based on the product of the rate of change in current and voltage (ROCOC × ROCOV) and a fault-identification scheme based on the ratio of the magnitudes of the positive and negative pole voltages. In a radial topology, the sign of ROCOC × ROCOV provides selectivity between internal and external faults. In multi-terminal topologies under network reconfiguration, external faults can present characteristics similar to those of internal faults. To ensure selectivity, communication is introduced between protective relays that share the same protection zone. Thresholds were set without large-scale simulations. The protection strategy was implemented in PSCAD/EMTDC and evaluated in a 37.4 kV MVDC distribution network. The strategy was validated under various fault conditions in radial and multi-terminal MVDC distribution networks, demonstrating fast, sensitive, and selective performance. The proposed strategy can contribute to the stable operation of MVDC distribution networks. Full article
Show Figures

Figure 1

21 pages, 1432 KiB  
Article
Increasing Approval of Novel Recycling Technologies with Education: A Case Study of Multi-Material Plastic
by Jenna R. Holt, Kathy Wang, Dai-Phat Bui, Lance Lobban, Steven Crossley and Adam Feltz
Sustainability 2025, 17(12), 5606; https://doi.org/10.3390/su17125606 - 18 Jun 2025
Viewed by 381
Abstract
Plastic recycling is an important but complicated issue. Some plastics are currently readily recyclable with existing technologies, whereas others are not. However, the general public often does not appreciate the benefits and costs associated with hard-to-recycle (e.g., multi-material) plastics, potentially causing confusion and, [...] Read more.
Plastic recycling is an important but complicated issue. Some plastics are currently readily recyclable with existing technologies, whereas others are not. However, the general public often does not appreciate the benefits and costs associated with hard-to-recycle (e.g., multi-material) plastics, potentially causing confusion and, in some cases, backlash. While some methods of relaying information to the public have been previously studied (e.g., infographics, descriptive labeling), educational videos have not. We created an educational video on the properties and functions of single- and multi-material plastic. Participants who viewed the educational video were more knowledgeable about multi-material plastic recycling and had higher intentions to use and be satisfied with a hypothetical recycling company that intends to begin recycling multi-material plastic. Our data suggest that education interventions have the potential to inform and empower the public while protecting common values. Full article
(This article belongs to the Special Issue Sustainable Materials: Recycled Materials Toward Smart Future)
Show Figures

Figure 1

26 pages, 1854 KiB  
Article
Quantitative State Evaluation Method for Relay Protection Equipment Based on Improved Conformer Optimized by Two-Stage APO
by Yanhong Li, Min Zhang, Shaofan Zhang and Yifan Zhou
Symmetry 2025, 17(6), 951; https://doi.org/10.3390/sym17060951 - 15 Jun 2025
Viewed by 363
Abstract
State evaluation of relay protection equipment constitutes a crucial component in ensuring the stable, secure, and symmetric operation of power systems. Current methodologies predominantly encompass fuzzy-rule-based control systems and data-driven machine learning approaches. The former relies on manual experience for designing fuzzy rules [...] Read more.
State evaluation of relay protection equipment constitutes a crucial component in ensuring the stable, secure, and symmetric operation of power systems. Current methodologies predominantly encompass fuzzy-rule-based control systems and data-driven machine learning approaches. The former relies on manual experience for designing fuzzy rules and membership functions and exhibits limitations in high-dimensional data integration and analysis. The latter predominantly formulates state evaluation as a classification task, which demonstrates its ineffectiveness in identifying equipment at boundary states and faces challenges in model parameter selection. To address these limitations, this paper proposes a quantitative state evaluation method for relay protection equipment based on a two-stage artificial protozoa optimizer (two-stage APO) optimized improved Conformer (two-stage APO-IConf) model. First, we modify the Conformer architecture by replacing pre-layer normalization (Pre-LN) in residual networks with post-batch normalization (post-BN) and introducing dynamic weighting coefficients to adaptively regulate the connection strengths between the first and second feed-forward network layers, thereby enhancing the capability of the model to fit relay protection state evaluation data. Subsequently, an improved APO algorithm with two-stage optimization is developed, integrating good point set initialization and elitism preservation strategies to achieve dynamic equilibrium between global exploration and local exploitation in the Conformer hyperparameter space. Experimental validation using operational data from a substation demonstrates that the proposed model achieves a RMSE of 0.5064 and a MAE of 0.2893, representing error reductions of 33.6% and 35.0% compared to the baseline Conformer, and 9.1% and 15.2% error reductions over the improved Conformer, respectively. This methodology can provide a quantitative state evaluation and guidance for developing maintenance strategies for substations. Full article
(This article belongs to the Special Issue Symmetry/Asymmetry Studies in Modern Power Systems)
Show Figures

Figure 1

23 pages, 3011 KiB  
Article
Comprehensive Diagnostic Assessment of Inverter Failures in a Utility-Scale Solar Power Plant: A Case Study Based on Field and Laboratory Validation
by Karl Kull, Bilal Asad, Muhammad Usman Naseer, Ants Kallaste and Toomas Vaimann
Sensors 2025, 25(12), 3717; https://doi.org/10.3390/s25123717 - 13 Jun 2025
Viewed by 528
Abstract
Recurrent catastrophic inverter failures significantly undermine the reliability and economic viability of utility-scale photovoltaic (PV) power plants. This paper presents a comprehensive investigation of severe inverter destruction incidents at the Kopli Solar Power Plant, Estonia, by integrating controlled laboratory simulations with extensive field [...] Read more.
Recurrent catastrophic inverter failures significantly undermine the reliability and economic viability of utility-scale photovoltaic (PV) power plants. This paper presents a comprehensive investigation of severe inverter destruction incidents at the Kopli Solar Power Plant, Estonia, by integrating controlled laboratory simulations with extensive field monitoring. Initially, detailed laboratory experiments were conducted to replicate critical DC-side short-circuit scenarios, particularly focusing on negative DC input terminal faults. The results consistently showed these faults rapidly escalating into multi-phase short-circuits and sustained ground-fault arcs due to inadequate internal protection mechanisms, semiconductor breakdown, and delayed relay response. Subsequently, extensive field-based waveform analyses of multiple inverter failure events captured identical fault signatures, thereby conclusively validating laboratory-identified failure mechanisms. Critical vulnerabilities were explicitly identified, including insufficient isolation relay responsiveness, inadequate semiconductor transient ratings, and ineffective internal insulation leading to prolonged arc conditions. Based on the validated findings, the paper proposes targeted inverter design enhancements—particularly advanced DC-side protective schemes, rapid fault-isolation mechanisms, and improved internal insulation practices. Additionally, robust operational and monitoring guidelines are recommended for industry-wide adoption to proactively mitigate future inverter failures. The presented integrated methodological framework and actionable recommendations significantly contribute toward enhancing inverter reliability standards and operational stability within grid-connected photovoltaic installations. Full article
Show Figures

Figure 1

24 pages, 5402 KiB  
Review
Grid-Forming Converter Fault Control Strategy and Its Impact on Relay Protection: Challenges and Adaptability Analysis
by Xiaopeng Li, Jiaqi Yao, Wei Chen, Wenyue Zhou, Zhaowei Zhou, Hao Wang, Zhenchao Jiang, Wei Dai and Zhongqing Wang
Energies 2025, 18(11), 2933; https://doi.org/10.3390/en18112933 - 3 Jun 2025
Viewed by 535
Abstract
As the proportion of new energy generation continues to rise, power systems are confronted with novel challenges. Grid-forming converters, which possess voltage source characteristics and can support the grid, typically employ a VSG control strategy during normal operation to emulate the behavior of [...] Read more.
As the proportion of new energy generation continues to rise, power systems are confronted with novel challenges. Grid-forming converters, which possess voltage source characteristics and can support the grid, typically employ a VSG control strategy during normal operation to emulate the behavior of synchronous generators. This approach enhances frequency response and system stability in modern power systems. This review article systematically examines two typical fault control strategies for grid-forming converters: the switching strategy and the virtual impedance strategy. These different control strategies result in distinct fault response characteristics of the converter. Based on the analysis of fault control strategies for grid-forming converters, this study investigates the impact of the converter’s fault response characteristics on overcurrent protection, pilot protection, distance protection, and differential protection and investigates and prospects corresponding countermeasures. Finally, through simulation modeling, the fault response characteristics under different control strategies and their effects on protection are verified and analyzed. Focusing on grid-forming converters, this paper dissects the influence of their fault control strategies on relay protection, providing strong support for the wide application and promotion of grid-forming converters in new types of power systems. Full article
(This article belongs to the Special Issue Renewable Energy System Technologies: 2nd Edition)
Show Figures

Figure 1

18 pages, 4020 KiB  
Article
Protection Algorithm Based on Two-Dimensional Spatial Current Trajectory Image and Deep Learning for Transmission Lines Connecting Photovoltaic Stations
by Panrun Jin, Jianling Liao, Wenqin Song, Xushan Zhao and Yankui Zhang
Appl. Sci. 2025, 15(11), 6066; https://doi.org/10.3390/app15116066 - 28 May 2025
Viewed by 304
Abstract
Fiber differential protection (FDP) is the primary protection scheme in power systems. However, with the increasing proportion of photovoltaic (PV) grids connected in the power system, the controllability and weak power supply characteristics of photovoltaic power stations change the amplitude and phase angle [...] Read more.
Fiber differential protection (FDP) is the primary protection scheme in power systems. However, with the increasing proportion of photovoltaic (PV) grids connected in the power system, the controllability and weak power supply characteristics of photovoltaic power stations change the amplitude and phase angle characteristics of fault currents, which makes the sensitivity of fiber differential protection decline and even increases the risk of failure to operate. In view of this phenomenon, combined with the digital and intelligent development of the new energy power system, this study integrates deep learning with relay protection to propose a protection algorithm based on a two-dimensional spatial current trajectory image and deep learning. In this algorithm, the PV side current and the system side current are, respectively, mapped to the two-dimensional space plane as X- and Y-axes to form the current trajectory image. Under different fault conditions, they have obvious differences. A data-enhanced convolutional neural network (A-CNN) based on cross-overlapping data sets is used to identify trajectory features and locate faults. After performance evaluation, the protection algorithm has the advantages of adapting to new energy access, resisting transition resistance, and robustness to current transformer (CT) saturation, and outliers. Full article
Show Figures

Figure 1

15 pages, 388 KiB  
Article
Anonymous Networking Detection in Cryptocurrency Using Network Fingerprinting and Machine Learning
by Amanul Islam, Nazmus Sakib, Kelei Zhang, Simeon Wuthier and Sang-Yoon Chang
Electronics 2025, 14(11), 2101; https://doi.org/10.3390/electronics14112101 - 22 May 2025
Viewed by 587
Abstract
Cryptocurrency such as Bitcoin supports anonymous routing (Tor and I2P) due to the application requirements of anonymity and censorship resistance. In permissionless and open networking for cryptocurrency, an adversary can spoof to pretend to use Tor or I2P for anonymity and privacy protection, [...] Read more.
Cryptocurrency such as Bitcoin supports anonymous routing (Tor and I2P) due to the application requirements of anonymity and censorship resistance. In permissionless and open networking for cryptocurrency, an adversary can spoof to pretend to use Tor or I2P for anonymity and privacy protection, while, in reality, it is not using anonymous routing and is forwarding its networking directly to the destination peer to reduce networking overheads. Using profile detection based on deterministic features to detect anonymous routing and false claims is vulnerable to spoofing, especially in permissionless cryptocurrency bypassing registration control. We thus designed and built a method of network fingerprinting, using networking behaviors to detect and classify networking types. We built a network sensor to collect data on an active Bitcoin node connected to the Mainnet and applied supervised machine learning to identify whether a peer node was using IP (direct forwarding without the relays for anonymity protection), Tor, or I2P. Our results show that our scheme is effective in accurately detecting networking types and identifying spoofing attempts through supervised machine learning. We tested our scheme using multiple supervised learning models, specifically CatBoost, Random Forest, and HistGradientBoosting. CatBoost and Random Forest performed best and had comparable accuracy performance in effectively detecting false claims, i.e., they classified the networking types and detected fake claims of Tor usage with 93% accuracy and false claims of I2P with 94% accuracy in permissionless Bitcoin. However, CatBoost-based detection was significantly quicker than Random Forest and HistGradientBoosting in real-time testing and detection. Full article
(This article belongs to the Special Issue Cryptography and Computer Security)
Show Figures

Figure 1

22 pages, 3864 KiB  
Article
Raspberry Pi-Based Face Recognition Door Lock System
by Seifeldin Sherif Fathy Ali Elnozahy, Senthill C. Pari and Lee Chu Liang
IoT 2025, 6(2), 31; https://doi.org/10.3390/iot6020031 - 20 May 2025
Viewed by 1888
Abstract
Access control systems protect homes and businesses in the continually evolving security industry. This paper designs and implements a Raspberry Pi-based facial recognition door lock system using artificial intelligence and computer vision for reliability, efficiency, and usability. With the Raspberry Pi as its [...] Read more.
Access control systems protect homes and businesses in the continually evolving security industry. This paper designs and implements a Raspberry Pi-based facial recognition door lock system using artificial intelligence and computer vision for reliability, efficiency, and usability. With the Raspberry Pi as its CPU, the system uses facial recognition for authentication. A camera module for real-time image capturing, a relay module for solenoid lock control, and OpenCV for image processing are essential. The system uses the DeepFace library to detect user emotions and adaptive learning to improve recognition accuracy for approved users. The device also adapts to poor lighting and distances, and it sends real-time remote monitoring messages. Some of the most important things that have been achieved include adaptive facial recognition, ensuring that the system changes as it is used, and integrating real-time notifications and emotion detection without any problems. Face recognition worked well in many settings. Modular architecture facilitated hardware–software integration and scalability for various applications. In conclusion, this study created an intelligent facial recognition door lock system using Raspberry Pi hardware and open-source software libraries. The system addresses traditional access control limits and is practical, scalable, and inexpensive, demonstrating biometric technology’s potential in modern security systems. Full article
Show Figures

Figure 1

18 pages, 5351 KiB  
Article
Fault Analysis and Protection Principle for the Distribution Networks Integrated with PV and BESS
by Jianan He, Lei Li, Jian Niu, Yabo Liang, Haitao Liu, Zhenxin Yang, Chao Li and Zhihui Zheng
Appl. Sci. 2025, 15(10), 5568; https://doi.org/10.3390/app15105568 - 16 May 2025
Viewed by 400
Abstract
With the rapid development of renewable energy technologies, large numbers of photovoltaic (PV) and battery energy storage systems (BESS) have been connected to distribution networks. However, both PV and the BESS are inverter interfaced power sources, which may cause the traditional protection relays [...] Read more.
With the rapid development of renewable energy technologies, large numbers of photovoltaic (PV) and battery energy storage systems (BESS) have been connected to distribution networks. However, both PV and the BESS are inverter interfaced power sources, which may cause the traditional protection relays to mis-operate or mal-operate. Moreover, according to the latest grid connection specifications, PV and BESS are required to absorb negative sequence current during asymmetric faults of distribution networks, indicating that they both must adopt new control strategies during the fault ride through period. In response to the above challenges, this work first studies the fault ride through control strategies of PV and BESS when different phase-to-phase faults occur according to the latest grid connection requirements. Second, it analyzes the negative sequence impedance characteristics of PV and BESS under asymmetric faults and quantitatively calculates its variation range. Third, during symmetric faults, the differences in fault current provided by PV and BESS and those provided by the large power grid are compared. Then, this work proposes a fault direction detection principle for the distribution network with PV and BESS. For asymmetric phase-to-phase faults, this principle detects the fault direction by using the negative sequence power angle; for symmetric faults, it detects the fault direction by using the reactive current and active current. Finally, simulation tests are carried out to verify the operation performance of the proposed principle. Full article
Show Figures

Figure 1

35 pages, 10924 KiB  
Article
Winding Fault Detection in Power Transformers Based on Support Vector Machine and Discrete Wavelet Transform Approach
by Bonginkosi A. Thango
Technologies 2025, 13(5), 200; https://doi.org/10.3390/technologies13050200 - 14 May 2025
Cited by 1 | Viewed by 626
Abstract
Transformer winding faults (TWFs) can lead to insulation breakdown, internal short circuits, and catastrophic transformer failure. Due to their low current magnitude—particularly at early stages such as inter-turn short circuits, axial or radial displacement, or winding looseness—TWFs often induce minimal impedance changes and [...] Read more.
Transformer winding faults (TWFs) can lead to insulation breakdown, internal short circuits, and catastrophic transformer failure. Due to their low current magnitude—particularly at early stages such as inter-turn short circuits, axial or radial displacement, or winding looseness—TWFs often induce minimal impedance changes and generate fault currents that remain within normal operating thresholds. As a result, conventional protection schemes like overcurrent relays, which are tuned for high-magnitude faults, fail to detect such internal anomalies. Moreover, frequency response deviations caused by TWFs often resemble those introduced by routine phenomena such as tap changer operations, load variation, or core saturation, making accurate diagnosis difficult using traditional FRA interpretation techniques. This paper presents a novel diagnostic framework combining Discrete Wavelet Transform (DWT) and Support Vector Machine (SVM) classification to improve the detection of TWFs. The proposed system employs region-based statistical deviation labeling to enhance interpretability across five well-defined frequency bands. It is validated on five real FRA datasets obtained from operating transformers in Gauteng Province, South Africa, covering a range of MVA ratings and configurations, thereby confirming model transferability. The system supports post-processing but is lightweight enough for near real-time diagnostic use, with average execution time under 12 s per case on standard hardware. A custom graphical user interface (GUI), developed in MATLAB R2022a, automates the diagnostic workflow—including region identification, wavelet-based decomposition visualization, and PDF report generation. The complete framework is released as an open-access toolbox for transformer condition monitoring and predictive maintenance. Full article
Show Figures

Figure 1

Back to TopTop