1980
DOI: 10.1109/tpas.1980.319633
|View full text |Cite
|
Sign up to set email alerts
|

A Software Design for a Computer Based Impedance Relay for Transmission Line Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

1981
1981
1996
1996

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Because the data window in Eqs. (3) and (4) requires one fundamental frequency cycle, it is called the one-cycle Fourier algorithm. From the above equations, it can be clearly seen that implementation of the algorithm requires a complicated weighting process; in other words, numerous multiply operations are needed to carry out the two correlation functions, sin (Jig) and cos (Jig), as the algorithm is implemented by software programming.…”
Section: Linear Modulated Fourier Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Because the data window in Eqs. (3) and (4) requires one fundamental frequency cycle, it is called the one-cycle Fourier algorithm. From the above equations, it can be clearly seen that implementation of the algorithm requires a complicated weighting process; in other words, numerous multiply operations are needed to carry out the two correlation functions, sin (Jig) and cos (Jig), as the algorithm is implemented by software programming.…”
Section: Linear Modulated Fourier Algorithmmentioning
confidence: 99%
“…Its application not only covers many protective relays, such as for the distance relay [3,6,8,9,11,12], differential relay [10] and^overcurrent relay [2], but also other fields, e.g., for reactive power measurement [7]. For implementing the Fourier algorithm, the software correlation technique is generally adopted, but its arithmatic operation increases the calculation burden of a processor.…”
mentioning
confidence: 99%