Differential Protection of Three Phase Power Transformer Using Wavelet Packet Transform
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 11
Abstract
This paper shows the use of a new & innovatory wavelet packet transform (WPT) based method to sensitize the transients resulting from inrush current, CT saturation and fault currents in electric power transformers. This method will efficiently help in the development of differential protective relay to automatically detect and discriminate internal incipient faults from inrush currents, CT saturation condition in electric power transformers. This method can provide very accurate information in each level of the WPT to predict any failures and misrecognition of inrush currents ahead of time so that necessary actions can be taken to prevent outages and reduce down times. It prevents false tripping of differential relay due to inrush curren
Authors and Affiliations
Jitendra Singh Chandra
A DESCRIPTIVE REVIEW OF DIFFERENT PENETRATION TESTING TOOLS AND METHODS
The penetration testing is to authenticate a recently discovered and approachable applications and networks, structure that are vulnerable to a certainty harm ,expose to danger and security risk which could reveal...
EFFECTS OF WRITE-PAIR-SHARE TEACHING APPROACH ON THE ALGEBRAIC EXPRESSIONS PERFORMANCE OF ENGINEERING AND COMPUTER SCIENCE STUDENTS
The main objective of this study was to determine the effects of write-pair-share teaching approach on the algebraic expressions performance of engineering and computer science students. Using the pretest-posttest...
Comparison of Digital Audio Watermarking U
This paper introduces an algorithm of digital watermarking based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). According to the Characters of hum Coefficients are divided into an arbitr...
STUDY OF POTENTIAL THREATS IN ONLINE BANKING TRANSACTIONS CARRIED BY TWO MAJOR INTERNATIONAL CARRIERS VERI-SIGN & VISA
security is concern when wealth & assets are managed in worldwide network. Any transaction between two computers or its network is never one hundred percent safe (Nestek, 1998). In present system of world-wide-web 1...
Wireless Architectures And Network
In this paper is simply to define and understand Wirel in this field today One of the most frequently asked questions put to a wireless broadband service provider by their subscribers is, "what about security?". It is...