The present disclosure relates generally to relay protection and more particularly to systems, methods, and devices for mitigating erroneous relay operation caused by power spikes.
Switching of high-voltage electric apparatus (such as circuit breakers) can generate high-frequency voltage and/or current excursions, also called “spikes” or “bursts”. These excursions can penetrate through instrument transformers and the corresponding secondary wiring to protective device inputs, distorting the relay input signals. While many protective devices filter higher frequencies, the distorted relay input signals caused by power excursions cannot be entirely eliminated. As such, the power excursions can penetrate through the relay filters as one or multiple power spikes superimposed on the measured signal. As a result, distorted relay input signals can cause erroneous operation of the protective device. This phenomenon can especially be a problem for fast-operating protective devices, such as differential relays.
In general, in one aspect, the disclosure relates to a method for detecting a likely fault for a protective device. The method can include receiving an input signal, and detecting a power spike of the input signal. The method can also include, upon detecting the power spike, disabling a trip mechanism, disabling a complementary trip mechanism of a complementary protective device, and starting a time period. The method can further include, during a remainder of the time period, determining, using the complementary protective device, whether the power spike originated between the sensing device and the complementary sensing device, and determining whether the input signal exceeds the threshold value.
In another aspect, the disclosure can generally relate to a protection device. The protection device can include memory for storing instructions, and a hardware processor communicably coupled to the memory, where the hardware processor executes the instructions stored in the memory. The protection device can also include a trip mechanism that sends a trip signal to a breaker. The protection device can also include a correlation filter that detects a power spike in an input signal, and a timer that measures a time period. The protection device can further include a protection engine communicably coupled to the timer, a first sensing device, a second sensing device, the trip mechanism, the correlation filter, and the hardware processor. The protection engine can receive the input signal generated by the first sensing device. The protection engine can also, upon detection of the power spike, disable the trip mechanism, disable a complimentary trip mechanism of a complementary protective device, and instruct the timer to start measuring the time period. The protection engine can further, during a remainder of the time period, determine, using the complementary protective device, whether the power spike originated between the sensing device and the complementary sensing device, and determine whether the input signal exceeds the threshold value. The protection engine can enable and activate the trip mechanism and the complementary trip mechanism when the input signal exceeds the threshold value during the remainder of the time period.
In another aspect, the disclosure can generally relate to a protective device system. The protective device system can include at least one electrical component, and a first sensing device coupled to a first conductor, where the first sensing device generates an input signal based on power flowing through the first conductor. The protective device system can also include a protective device communicably coupled to the first sensing device and the second sensing device. The protective device can include memory for storing instructions, and a hardware processor communicably coupled to the memory, where the hardware processor executes the instructions stored in the memory. The protective device can also include a trip mechanism that sends a trip signal to the at least one electrical component. The protective device can also include a correlation filter that detects a power spike in the input signal, and a timer that measures a time period. The protective device can further include a protection engine communicably coupled to the timer, the first sensing device, and the hardware processor. The protection engine can receive the input signal generated by the first sensing device. The protection engine can also, upon detection of the power spike, disable the trip mechanism, disable a complementary trip mechanism of a complementary protective device, and instruct the timer to start measuring the time period. The protection engine can further, during a remainder of the time period, determine, using the complementary protective device, whether the power spike originated between the sensing device and the complementary sensing device, and determine whether the input signal exceeds the threshold value.
These and other aspects, objects, features, and embodiments will be apparent from the following description and the appended claims.
The drawings illustrate only example embodiments and are therefore not to be considered limiting in scope, as the example embodiments may admit to other equally effective embodiments. The elements and features shown in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the example embodiments. Additionally, certain dimensions or positionings may be exaggerated to help visually convey such principles. In the drawings, reference numerals designate like or corresponding, but not necessarily identical, elements.
Example embodiments of likely fault detection will now be described in detail with reference to the accompanying figures. Like, but not necessarily the same or identical, elements in the various figures are denoted by like reference numerals for consistency. In the following detailed description of the example embodiments, numerous specific details are set forth in order to provide a more thorough understanding of the disclosure herein. However, it will be apparent to one of ordinary skill in the art that the example embodiments herein may be practiced without these specific details. In other instances, well-known features have not been described in detail to avoid unnecessarily complicating the description. Further, certain descriptions (e.g., top, bottom, side, end, interior, inside, inner, outer) are merely intended to help clarify aspects of the invention and are not meant to limit embodiments described herein.
In general, example embodiments provide systems, methods, and devices for likely fault detection. Specifically, example embodiments provide for protective devices that determine whether a power spike is a lone excursion or the start of a fault before actuating. In such a case, the protective device strikes a balance between not actuating (generating a trip signal) when the input signal includes a mere, isolated power spike and not delaying actuation overly long when a legitimate fault is present in the circuit. As used herein, a power spike can also be called a power excursion. A fault can include one or more power spikes, which would occur at the beginning of a fault.
Example protective devices discussed herein can be used with and/or monitor one or more of a number of voltages and/or currents, which can also be described as various levels of power. For example, a protective device can monitor power devices that are electrically coupled to 345 kV alternating current (AC), where such power is operating power. As another example, the protective device can operate on 24 V direct current (DC), where such power is control power.
As used herein, the term “high-power” is used to describe higher amounts of power. Higher amounts of power, in terms of current, can be any current at or above approximately 100 Amperes (A), but can be less than 100 A in certain instances, as in a steady-state operating condition. High amounts of power can also be a voltage and/or current that is greater than a lower amount of power. In addition, the term “low-power” can be used to describe lower amounts of power. Low power can also be called control power and/or control current. Lower amounts of power, in terms of voltage, can be any voltage at or below 120 VAC.
In certain example embodiments, the protective device, the power device protected by the protective device, and/or a system that includes the example protective device is subject to meeting certain standards and/or requirements. For example, the Institute of Electrical and Electronics Engineers (IEEE) sets standards as to wiring and protection of high power electrical systems. Use of example embodiments described herein meet (and/or allow a corresponding device to meet) such standards when required.
The power source 110 is shown being electrically coupled to a breaker 120 using a high-power conductor 160. The power source 110 can provide electricity that is in AC format. The power source 110 can be physically separate from the other components of the system 100 and/or combined with another component of the system 100. The high-power conductor 160 can include one or more voltage conductors and a neutral conductor. In certain example embodiments, instead of generating power, the power source 110 can consume power, as a motor, capacitor, a transformer, or inductor. The passive load 130 can be any generating and/or consuming source of power.
In certain example embodiments, one or more conductors 160 is used to electrically couple the power source 110, the breakers 120, the passive load 130, the sensing devices 140, and/or any other components of the system 100. Each high-power conductor 160 described herein can carry voltage, current, or a combination thereof. In addition, each high-power conductor 160 described herein can be wire, cable, or other medium that can carry a voltage and/or current therethrough. The high-power conductor 160 can be made of an electrically conductive material (e.g., copper, aluminum) and can have one or more electrically non-conductive materials (e.g., rubber, nylon, plastic) wrapped around the electrically conductive material. The electrically conductive material of the conductor can be one of a number of sizes suitable to allow the high-power conductor 160 to carry the voltage and/or current required for the system 100. The amount of power (e.g., voltage, current) delivered, using the conductors 160, by the power source 110 to the breakers 120, the sensing devices 140, and the passive load 130 can be any amount suitable to operate the electrical devices electrically coupled to each other in the system 100.
The breakers 120, 121 are electrically coupled to the power source 110, the passive load 130, and each other using one or more high-power conductors 160. The breakers 120, 121 can be a manually and/or automatically operated electrical switch designed to protect an electrical circuit (e.g., the power source 110, the passive load 130) from damage caused by overload or short circuit. The breakers 120, 121 are also electrically coupled to one or more protective devices 150, 151 using conductor 170. A function of the breakers 120, 121 is to receive a trip signal from a protective device 150, 151 and, in response to the trip signal, operate (open) to interrupt continuity and immediately discontinue electrical flow. Each breaker 120, 121 can have an open position (used to discontinue electrical flow) and a closed position (used to allow electrical flow). The breaker 120, 121 can be any device that operates to change state during operations.
In certain example embodiments, when a breaker 120, 121 operates (changes state from open position to a closed position or changes state from a closed position to an open position), the switching operation of the breaker 120, 121 generates high-frequency voltage and/or current excursions, which can also be called bursts or spikes. As another example, a lighting strike can cause high-frequency voltage and/or current excursions. These spikes can penetrate through one or more sensing devices 140, 141 and carry on to the corresponding protective device 150, 151. In such a case, the spikes are superimposed with the input signal, distorting the input signal measured by the protective device 150, 151. The breakers 120, 121 shown can be the same (e.g., have the same size, voltage rating, current rating) or different from each other.
In certain example embodiments, the breakers 120, 121 are physically located in the proximity of one or more sensing devices 140. When a circuit breaker 120, 121 operates, the circuit breaker 120, 121 can generate one or more spikes, which can penetrate inside one or more protective devices 150, 151 through the corresponding sensing devices 140, 141. Operation of other nearby switching apparatus within the system 100 can also generate spike disturbances that are delivered to a protective device 150, 151 through the corresponding sensing device 140, 141.
In certain example embodiments, the sensing device 140, 141 is any device that generates (harvests) a representation of a current flowing through a conductor 160. When such a current flows through a conductor 160, the current can be called a line current. The example sensing device 140, 141 can be coupled (e.g., magnetically) to at least one conductor 160 and the corresponding protective device 150, 151. For example, the sensing device 140 can be electromagnetically coupled to a conductor 160, and electrically coupled to (capable of sending and receiving signals with respect to) the protective device 150 using conductor 170. In such a case, the sensing device 140 can clamp around and/or encircle the conductor 160.
The sensing device 140, 141 can have one or more leads 170 that carry the power harvested by the sensing device 140, 141 to the corresponding protective device 150, 151. The leads 170 (also called conductor 170) can be a form of conductor, as described above. For example, conductor 170 can be a fiber optic cable. The representation of the operating parameter (e.g., current) can be an electrical signal (e.g., analog signal, digital signal), an electro-mechanical signal, and/or any other suitable signal. The representation of the operating parameter can be a fractional amount of (proportionately smaller than) the operating parameter. The difference between the operating parameter and the representation of the operating parameter can be defined by a ratio. In one example embodiment, the representation of the operating parameter is sent by the sensing device 140, 141 to the corresponding protective device 150, 151. The representation of the operating parameter can be called an input signal. The input signal can be raw (unfiltered).
In certain example embodiments, the sensing device 140, 141 includes a primary winding and a secondary winding. The primary winding and the secondary winding typically have a known ratio (e.g., 10000:1). As a result, in such a case, the secondary winding, to which the leads 170 are electrically coupled, generates a representation of the operating parameter that is 10,000 times less than the operating parameter. The sensing device 140, 141 can also be capable of harvesting power from one or more conductors 160 in the form of one or more voltage conductors, a neutral conductor, some other conductor, or any combination thereof. Alternatively, or in addition, a different sensing device 140, 141 can be used for each conductor (e.g., each phase in an AC circuit) that make up the conductor 160.
The sensing device 140, 141 can include one or more Rogowski coils. Generally, Rogowski coils are designed with two wire loops connected in electrically opposite directions. This cancels electromagnetic fields coming from outside the coil loop. One or both loops can consist of wound wire. If only one loop is constructed as a winding, then the second wire loop can be constructed by returning the wire through or near this winding. If both loops are constructed as windings, then they must be wound in opposite directions. Two windings can be laid on top of each other or next to each other. There are different Rogowski coil designs such as split-core or non-split-core style. A Rogowski coil can be rigid or flexible. Rogowski coils are wound over a non-magnetic core, usually having toroidal shape. This core may be made of plastic, epoxy, and/or other insulating material. The coil then may be formed around a conductor 160, where the current in the conductor 160 is measured. The voltage that is induced in the Rogowski coil is proportional to the rate of change of current in the conductor 160. This rate of change of current can be called the first time derivative of the current, or di/dt, or change in current per change in time. Thus, the output of the Rogowski coil can be used to represent di/dt where “i” is the current in the conductor 160 being measured. Also, the output of a Rogowski coil can be connected to an electronic integrator circuit to provide a signal that is proportional to the sensed current.
Rogowski coils can provide low inductance and excellent response to fast-changing currents since they have air cores rather than an iron core. Without an iron core to saturate, a Rogowski coil can be highly linear even in high current applications. Furthermore, having reduced saturation concerns, a sensing device 140, 141 and associated protective device 150, 151 using a Rogowski coil can employ a single slope response with increased sensitivity. Also, the geometry of a Rogowski coil may provide a sensing device 140, 141 that is significantly immune to electromagnetic interference. In certain example embodiments, the effect of a spike can be more pronounced when using a Rogowski coil in the sensing device 140, 141 because the Rogowski coil is frequency-dependent, which means that the Rogowski coil can amplify higher frequencies with a linear relationship between the coil output signal and frequency.
The power harvested by the sensing device 140, 141 from the conductor 160 and the resulting input signal delivered to the corresponding protective device 150, 151 can generate the power required to operate one or more components (e.g., the hardware processor) of the protective device 150, 151. In addition, or in the alternative, one or more components of the protective device 150, 151 can be powered from a separate auxiliary power source (not shown), which can include but is not limited to 120VAC service and/or a battery. Part of the protective device 150, 151 in
Details of the components of the protective devices 150, 151 are described below with respect to
Generally, when a protective device 150, 151 generates and sends a trip signal, one or more devices (e.g., breaker 120, 121) in the system 100 are electrically isolated. In addition, each protective device 150, 151 can be electrically and/or communicably coupled to each other using the conductor 170. In such a case, the protective devices 150, 151 can send signals measured by their respective sensing devices 140, 141 to each other to determine if a fault condition exists. For example, protective device 150 can receive the signal measured by sensing device 141 and sent by protective device 151 to compare such signal with the signal measured by sensing device 140 to determine if the differential current (in this case, the input signal for protective device 150) exceeds a differential current threshold level.
Each protective device 150, 151 can monitor one or more of a number of different electrical conditions, also called a fault or fault condition. One such electrical condition is an overcurrent condition. In one example embodiment, an overcurrent condition is where one or more conductors 160 transmitting power carries a current that is too high (i.e., has too many amperes) relative to a threshold current. For example, if a threshold current is 120 Amperes (A) and the current flowing through a conductor 160 is 220 A, then an overcurrent condition exists. An overcurrent condition can also be caused by one or more of a number of other conditions, including but not limited to excessive power demand by a load, internal dielectric degradation, and/or an internal short circuit in an electrical connector.
In certain example embodiments, a user 190 is communicably coupled to one or more of the protective devices 150, 151. A user 190 can be any person that interacts with the system 100 that includes a protective device 150, 151. Examples of a user 190 can include, but are not limited to, an electric distribution company, an electric transmission company, a public utility, a control room operator, a load management system, an engineer, an electrician, an instrumentation and controls technician, a mechanic, an operator, a consultant, a contractor, and a manufacturer's representative.
A user 190 can communicate with a protective device 150, 151 using a physical interaction (e.g., touching a touch pad on the protective device 150) and/or using a user system (not shown). In cases where a user 190 uses a user system to communicate with a protective device 150, 151, the user system can use wired and/or wireless technology. The user system is described more fully below with respect to
In certain example embodiments, the housing 202 is a type of enclosure houses one or more of the components of the protective device 150. The housing 202 can have a movable portion that allows a user to access the one or more components of the protective device 150 located inside the housing 202. The housing 202 can be made of one or more of a number of suitable materials, including but not limited to plastic, metal, glass, and rubber. The housing 202 can be mounted in one or more locations when connected to the system 100. For example, the housing 202 can be mounted in or near a compartment that houses the corresponding breaker 120. As another example, the housing 202 can be mounted in or near a central relay station.
In certain example embodiments, the power supply 224 is operatively coupled to the hardware processor 220 and any other components of the protective device 150. The power supply 224 can be one or more sources of energy (e.g., electricity) used to provide power and/or control to the hardware processor 220 and/or any other component of the protective device 150. The power supply 224 typically provides electricity that is in AC format and/or DC format. The power supply 224 can be physically separate from the other components of the protective device 150 and/or internal within the housing 202 of the protective device 150.
The amount of power delivered by the power supply 224 to the hardware processor 220 can be any amount suitable to operate the hardware processor 224. In certain example embodiments, the power delivered by the power supply 224 is transformed, rectified, inverted, and/or otherwise manipulated, at the power supply 224, so that the hardware processor 220 and/or other various components of the protective device 150 receive a proper voltage and/or current level to operate properly. In certain example embodiments, the signal received from a sensing device 140, 141 acts as the power supply 224 by providing power to the hardware processor 220 and/or other components of the protective device 150.
In certain example embodiments, the power supply 224 can be a battery. The battery can provide power to the hardware processor 220 and/or other components of the protective device 150 on a constant basis or as backup power when a different power supply 224 fails. The battery and/or power supply 224 can be disposed inside of the housing 202, affixed to the housing 202, or placed in a location remote from the housing 202. The power supply 224 and/or the battery can be electrically coupled to the hardware processor 220 and/or other components of the protective device 150 using a wired and/or wireless technology.
The hardware processor 220 receives power from the power source 224 and is communicably coupled, at least, to the timer 212, the application interface 226, the memory 222, and the protection engine 206. In general, the protection engine 206, using one or more instructions executed on the hardware processor 220 and using software stored in the memory 222, determines whether a power spike exists, whether a fault exists, where the fault exists, and, as appropriate, sends a trip signal to a breaker 120, 121. If a trip signal is sent to a breaker 120, 121, the protection engine 206 can also use the application interface 226 and the conductors 170 to inform the user 190 that the trip signal was sent.
The example hardware processor 220 within the housing 202 of the protective device 150 is configured to execute software in accordance with one or more example embodiments. Specifically, the hardware processor 220 is configured to execute the instructions used to operate the protection engine 206 and/or any other components within the protective device 150. The example hardware processor 220 is an integrated circuit, a central processing unit, a multi-core processing chip, a multi-chip module including multiple multi-core processing chips, or other hardware processor. The hardware processor 220 can be known by other names, including but not limited to a computer processor, a microcontroller, a microprocessor, and a multi-core processor.
In one or more example embodiments, the hardware processor 220 is configured to execute software instructions stored in the memory 222 of the protective device 150. The example memory 222 can include one or more cache memories, main memory, and/or any other suitable type of memory. In certain example embodiments, the memory 222 is discretely located within the housing 202 relative to the hardware processor 220. In certain configurations, the memory 222 can also be integrated with the hardware processor 220. The hardware processor 220 can be integrated into one or more mixed signal integrated circuits. In such a case, the profile and/or cost of the hardware processor 220 can be reduced.
In certain example embodiments, the protection engine 206 of the protective device 150 coordinates the digital filter 208, the correlation filter 210, the timer 212, and the trip mechanism 214. Specifically, the protection engine 206 sends data (e.g., signals, instructions) to the digital filter 208, the correlation filter 210, the timer 212, and the trip mechanism 214. Similarly, the protection engine 206 receives data (e.g., input signal, time) from the digital filter 208, the correlation filter 210, the timer 212, and the trip mechanism 214. More specifically, the protection engine 206 receives, using the application interface 226, one or more input signals (e.g., current) from the sensing devices 140, 141. The protection engine 206 can continually read the input signals or sample the input signals. When the protection engine 206 samples the input signals, the sampling rate can be based on one or more of a number of factors, including but not limited to a default sampling rate, a sampling rate defined by the user 190, a sampling rate stored in the storage repository 230, some other factor, or any combination thereof. An example of a sampling rate is 16 samples per cycle. The sampling rate can be random or substantially constant. In certain example embodiments, the sampling rate is the same for all types (raw signals, filtered signals, etc.) of input signals used herein.
Upon receiving the input signals (either unfiltered or filtered by an analog filter) (herein called simply a “signal”) from one or more sensing devices 140, 141, the protection engine 206 retains a copy of the input signal for processing according to example embodiments and also sends a copy of the input signal to a filter. This latter copy, after going through an existing digital filter 208, becomes a filtered signal and is processed by the protection engine 206 according to method presently known in the art for such a protective device. As for the copy of the unfiltered input signal that is retained by the protection engine 206 for processing according to example embodiments, the protection engine 206 sends the unfiltered input signal to the correlation filter 210 with instructions on how the correlation filter 210 is to compare the signals. The correlation filter 210 can use one or more of a number of comparison algorithms, which may be stored in the storage repository 230. In such a case, the protection engine 206 can retrieve the appropriate comparison algorithm(s) from the storage repository 230 and send the appropriate comparison algorithm(s) to the correlation filter 210 along with the signals to be compared.
An example of a comparison algorithm is applying a time adjustment (e.g., 0.005 seconds) to one signal and subsequently performing simple subtraction of the signals. Another example of a comparison algorithm is multiplying one of the signals by a multiple (e.g., two, one halt), then subtracting the signals, and then taking the absolute value of the difference. Yet another example of a comparison algorithm is comparing each signal to one or more threshold values, where the threshold values can be among the thresholds 242 stored in the storage repository 230. Still another comparison algorithm determines how often a sample is taken from the stream of unfiltered input signals.
The correlation filter 210 can receive multiple signals from the protection engine 206, where each signal is generated by a different sensing device 140, 141. In such a case, the correlation filter 210 uses the appropriate comparison algorithm to compare one or both input signals. In certain example embodiments, the correlation filter 210 uses a type (e.g., discrete) of Fourier transform to filter the signals and determine whether an input signal that exceeds a threshold value is a power spike. As another example, the correlation filter 210 conducts a point-on-wave comparison of samples of two digitized waveform data streams. The two digitized waveform data streams can be, for example, the unfiltered input signals and corresponding samples of the filtered signals, as with the filter algorithm using a Fourier transform. In such a case, both data streams are sampled at the same rate (e.g., at least 16 samples per cycle), and the resulting data is used to determine if a power spike exists. For example, a power spike would exist if, using the algorithm described above, a significant difference existed between the magnitude of the two signals such that the difference exceeded a threshold value. The protection engine 206 can determine, based on the algorithms used by the correlation filter 210, which threshold values are needed, retrieves those threshold values from the thresholds 242 in the storage repository 230, and sends the threshold values to the correlation filter 210.
Once the correlation filter 210 has run its algorithm(s), the correlation filter 210 notifies the protection engine 206 whether a power spike is detected. In certain example embodiments, when the protection engine 206 is notified by the correlation filter 210 that a power spike is detected, the protection engine 206 sends an instruction (signal) to the timer 212 to start measuring a time period. In certain example embodiments, the timer 212 tracks clock time and/or tracks one or more time periods, such as the time period and an inherent delay time. The example timer 212 is able to track one or more time periods concurrently. The timer 212 can be part of the hardware processor 220. The timer 212 can track time periods based on an instruction received from the protection engine 206, based on an instruction received from the user 190, based on an instruction programmed in the software for the protective device 150, 151, based on some other condition, or from any combination thereof.
The time period can be any length of time. For example, the time period can be approximately 0.01 seconds. A time period can be measured in seconds and/or in one or more other measurements. For example, for a circuit with AC power, the time period can be two cycles. The duration of each time period (e.g., the time period) can be stored in the timer 212 and/or in the storage repository 230. The duration of each time period can be set by default, by a user 190, by software instructions, by the protection engine 206, and/or by any other suitable means. In certain example embodiments, the time period is no more than 3 cycles. When a time period has ended (expired, lapsed), the timer 212 sends a signal to the protection engine 206 to notify the protection engine 206 that such a time period has ended.
In addition, if the protection engine 206 is notified that a power spike is detected, the protection engine 206 can disable the trip mechanism 214 of the protective device 150. In certain example embodiments, the trip mechanism 214 generates a trip signal that is sent to one or more breakers 120, 121. Such a trip signal, when received by a breaker 120, 121, forces the breaker to open immediately. When a breaker 120, 121 is opened, the portion of the system 100 fed by the breaker 120, 121 becomes electrically isolated. If the trip mechanism 214 is disabled, the trip mechanism 214 cannot generate a trip signal, even if the logic of the protection engine 206 that is processing the filtered input signal (filtered by the digital filter 208) determines that a fault exists. By contrast, if the trip mechanism 214 is enabled, the trip mechanism 214 is able to generate a trip signal when the logic of the protection engine 206 that is processing the filtered input signal (filtered by the digital filter 208) determines that a fault exists.
Optionally, in certain example embodiments, the trip mechanism 214 can also generate an information notification for a user 190, indicating that a trip signal was sent to a breaker 120, 121. In such a case, when the protection engine 206 disables the tip mechanism 214 based on the detection of a power spike by the correlation filter 210, the trip mechanism 214 cannot send such an information notification to the user 190.
Further, if the protection engine 206 is notified by the correlation filter 210 that a power spike is detected, the protection engine 206 can disable a complementary trip mechanism 214 of a complementary protective device 151. The complementary trip mechanism 214 of the complementary protective device 151 can be substantially similar to the trip mechanism 214 of the protective device 150 described above. The complementary protective device 151 can be the same or different than the protective device 150. In either case, the protective devices 150, 151 are configured to communicate with each other using the conductors 170. There can be one complementary protective device 151 or multiple complementary protective devices.
In certain example embodiments, the protection engine 206 disables the trip mechanism of the protective device 150, disables the complementary trip mechanism 214 of the complementary protective device 151, and instructs the timer 212 to start measuring the time period at substantially the same time. Specifically, the protection engine 206 disables the trip mechanism of the protective device 150, disables the complementary trip mechanism 214 of the complementary protective device 151, and instructs the timer 212 to start measuring the time period substantially simultaneously when protection engine 206 determines that the filtered input signal exceeds a threshold value.
In certain example embodiments, the protection engine 206 determines, after being notified by the correlation filter 210 that a power spike is detected and during the time period measured by the timer 212, whether a fault exists. Specifically, when the correlation filter 210 detects a power spike in the input signal, the protection engine 206 determines whether the input signal exceeds a threshold value. The protection engine 206 can follow one or more protocols to make such a determination. For example, the protection engine 206 can compare the unfiltered signal to one or more threshold values, which are retrieved from the thresholds 242 stored in the storage repository 230. As another example, a fault can only be deemed to exist by the protection engine 206 if a certain minimum number (e.g., three, four, five) of consecutive samples of the input signal exceed a threshold amount.
In certain example embodiments, the protection engine 206 determines, if the protection engine 206 determines that a fault exists, whether the fault originated between the sensing device 140 and the sensing device 141 (which can be described more generically herein as being between the protective device 150 and the complementary protective device 151). The protective device 150 can use the complementary protective device 151 to determine whether the fault originated between the protective device 150 and the complementary protective device 151.
For example, the protection engine 206 can compare the signal generated by the sensing device 140 with the signal generated by the sensing device 141 (adjusted for time delay, if necessary) and determine wither such signals are substantially in phase or substantially out of phase. The fault originates in a region between the sensing device 140 and the complementary sensing device 141 when the polarity of the signal generated by the sensing device 140 has a polarity substantially similar to the polarity of the signal generated by the sensing device 141. Alternatively, the fault originates outside the region between the sensing device 140 and the complementary sensing device 141 when the signal generated by the sensing device 140 has a polarity substantially opposite to the polarity of the signal generated by the sensing device 141. Graphical examples of in-phase and out-of-phase polarities of the signals are described below with respect to
In certain example embodiments, during the remainder of the time period measured by the timer 212, the protection engine 206 compares the input signal with the threshold values to determine whether the input signal exceeds a threshold value. If the protection engine 206 determines that the input signal does not exceed a threshold value during the remainder of the time period, then the input signal is within a normal range, and the initial excursion (power spike) detected in the input signal by the correlation filter 210 (causing the timer 212 to start measuring the time period) was merely an isolated power spike. In such a case, once the time period has expired, the protection engine 206 enables the trip mechanism 214 of the protective device 150 (and, in some cases, the trip mechanism 214 of the complementary protective device 151). Because the protection engine 206 determines that a fault does not exist and that the power spike was isolated, the trip mechanism 214 of the protective device 150 (and, in some cases, the trip mechanism 214 of the complementary protective device 151) are enabled but do not generate a trip signal.
On the other hand, if the protection engine 206 determines that the input signal exceeds a threshold value during the remainder of the time period, then the input signal is part of a fault condition. In such a case, if the protection engine 206 determines that the fault originates in a region between the sensing device 140 and the complementary sensing device 141, then the trip mechanism 214 of the protective device 150 (and, in some cases, the trip mechanism 214 of the complementary protective device 151) is enabled by the protection engine 206. With the trip mechanism 214 of the protective device 150 and the complementary protective device 151 enabled, the trip mechanism 214 can generate a trip signal upon the protection engine 206 detecting the fault.
On the other hand, if the protection engine 206 determines that the fault originates outside the region between the sensing device 140 and the complementary sensing device 141, then the trip mechanism 214 of the protective device 150 (and, in some cases, the tip mechanism 214 of the complementary protective device 151) remain disabled for the remainder of the time period.
If the time period, as measured by the timer 212, ends without the protection engine 206 detecting a fault that originates in a region between the sensing device 140 and the complementary sensing device 141, then the protection engine 206 enables the trip mechanism 214 of the protective device 150 and the trip mechanism 214 of the complementary protective device 151.
Continuing with
In one or more embodiments of the invention, the information received by the application interface 226 includes, but is not limited to, relay settings and thresholds 242. The information sent by the application interface 226 can include, but is not limited to, a notification that a trip signal has been sent to a breaker 120, 121. The information sent by the application interface 226 specifies, but is not limited to, a user 190, a field location, a data source, a Uniform Resource Identifier (URI) (e.g., a Uniform Resource Locator (URL), a web address, etc.), data identified by and/or requested by the protection engine 206, some other software or source of information, or any suitable combination thereof.
In one or more embodiments of the invention, the information (i.e., data) transferred among the application interface 226, the user 190 corresponds to metadata associated with such information. In this case, the metadata describes the data specified (i.e., the metadata provides context for the specified data). In one or more embodiments of the invention, the protective device 150 supports various data formats provided by the user 190.
Continuing with
The storage repository 230 can be a persistent storage device (or set of devices) that stores software and data used to assist the protection engine 206 in determining a threshold to compare against an input signal received from a sensing device 140. In one or more example embodiments, the storage repository 230 stores the thresholds 242. Examples of a storage repository 230 include, but are not limited to, a database (or a number of databases), a file system, a hard drive, some other form of data storage, or any suitable combination thereof. The storage repository 230 is located on multiple physical machines, each storing all or a portion of the thresholds 242 according to some example embodiments. Each storage unit or device is physically located in the same or different geographic location.
The storage repository 230 is operatively connected to the protection engine 206 and the correlation filter 210. In one or more example embodiments, the correlation filter 210 detects a power spike. After the power spike is detected, the protection engine 206 includes functionality to receive an input signal (or, more simply, a signal) from a sensing device 140, 141, determine that the input signal exceeds a corresponding threshold value (indicating a fault), and (after determining that the fault originates in a region between the sensing devices 140, 141) enable the trip mechanism 214. More specifically, the protection engine 206 sends information to and/or receives information from the storage repository 230 in order to determine whether to disable the trip mechanism 214 based on the occurrence of a power spike.
The functions of the protection engine 206 can be performed on a single computing device or on multiple computing devices. Further, the functions of the protection engine 206 can be performed on the same computing device that performs the functions (e.g., digital filtering, fault detection using a filtered signal) of a protective device currently known in the art. When the functions of the protection engine 206 are performed on multiple computing devices, a number of configurations and/or frameworks are used in certain example embodiments. The configurations and/or software frameworks are designed to work with multiple data nodes and large quantities of data. One or more calculations performed by one or more components of the protection engine 206 are performed on multiple machines operating in parallel, where the results from each machine are combined to generate a result to the one or more calculations.
Each component of the protective device 150 described herein (e.g., the protection engine 206, the correlation filter 210, and the trip mechanism 214) uses one or more algorithms to perform one or more calculations. Each algorithm is designed to receive specific types of data and generate one or more specific results using such data. A specific result is a number, a range of numbers, a rating, and/or some other suitable output according to some example embodiments. Each algorithm is fixed, variable, self-adjusting, or otherwise changed. Each algorithm uses one or more pieces of data from one or more areas of data (e.g., thresholds 242).
In one or more embodiments of the invention, the protection engine 206 of the protective device 150 coordinates the correlation filter 210, the timer 212, the trip mechanism 214, and the storage repository 230. Specifically, the protection engine 206 coordinates the transfer of information between the application interface 226, the storage repository 230, and the other components of the protective device 150 according to certain example embodiments.
In the graph 301 in
The differential current 330 of
The power spike 430 lasts approximately one half of one cycle until a time corresponding to point 432. After the time corresponding to point 432, the raw signal 418 has an amplified shape associated with a fault condition 440. The amplified shape of the fault condition 440 is symmetrical and cyclic, similar to the normal shape of the steady-state condition 420. However, the magnitude of the fault condition 440 is greater than the amplitude of the steady-state condition 420 such that the apexes of the fault condition 440 exceed the positive threshold value 410 at the positive portions of the fault condition 440 and exceed the negative threshold value 412 at the negative portions of the fault condition 440.
In certain example embodiments, a power spike 430 can exist as a precursor to a fault condition 440 or in the absence of a fault condition 440 (as during a normal breaker operation). If the power spike 430 exists as a precursor to a fault condition 440, the input signal for the subsequent time after the power spike 430 (e.g., after point 432 in
In addition, a person of ordinary skill in the art will appreciate that additional steps, omitted in
Referring now to
The input signal can be a single signal or multiple signals. The input signal is received by the protection engine 206 of the protective device 150. In certain example embodiments, one or more components of the protective device 150, 151 are used to process the signal sent by the sensing device 140, 141 to generate the input signal. As an example, the correlation filter 210 can receive multiple signals (e.g., raw, unfiltered signals, analog-filtered signals) and generate the input signal by taking the difference between the multiple signals. Alternatively, the protection engine 206 can receive one or more input signals from one or more sensing devices 140, 141, with or without processing of the input signals. The input signal can be originated by a measuring device 140, 141 and received by a protective device 150, 151.
In step 706, a determination is made as to whether a power spike is detected. In certain example embodiments, the correlation filter 210 identifies that a high-frequency spike has been received from the sensing device 140, 141. The correlation filter 210 can detect the onset of a power spike and differentiate the power spike from a fault by using one or more of a number of correlation factors. Thus, the correlation filter 210 can prevent false operation caused by a spike.
In certain example embodiments, the correlation filter 210 detects a power spike based on whether the input signal exceeds a threshold value. The threshold value can be among the thresholds 242 stored in the storage repository 230. The threshold value can be retrieved by the protection engine 206. In certain example embodiments, the correlation filter 210 compares the input signal and the threshold value and determines whether the input signal exceeds the threshold value for a power spike. The threshold value can be a range of values. The threshold value can be a positive value, a negative value, or an absolute value. As an example, the threshold value is exceeded (and a power spike may be declared) if the input signal is greater than the absolute value of the threshold value.
If the input signal exceeds a threshold value, then the correlation filter 210 determines whether this portion of the input signal is a power spike. The threshold value can be some multiple (e.g., ten, fifteen) times greater than an average of the input signal prior to the time period. If a power spike in the input signal is detected, then the process proceeds to steps 710, 712, and 716 at substantially the same time. If a power spike in the input signal is not detected (e.g., if there is a fault current without a power spike), then the process proceeds to step 708.
In step 708, a determination is made as to whether the input signal continues to be received. The input signal can be the same or a different input signal compared to that received in step 702 above. In certain example embodiments, the input signal is a continuous signal. The input signal can be generated by one or more sensing devices 140, 141 and received by one or more protective devices 150, 151. The one or more protective devices 150, 151 can determine whether the input signal continues to be received. If the input signal continues to be received, then the process reverts to step 706. In such a case, the process forms a continuous loop between steps 706 and 708 until the input signal is no longer received or until a power spike from the input signal is detected. If the input signal is no longer received, then the method 700 ends at the END step.
In step 710, the time period is started. The time period is started and measured by the timer 212. In certain example embodiments, the protection engine 206 sends a command to the timer 212 to start measuring the time period. The time period can be set and/or adjusted by default, by a user 190, by some other component, and/or by the protection engine 206 according to software instructions. The time period can be any period of time that allows the protection engine 206 to analyze the input signal to determine whether a fault condition truly exists and, if so, where the fault condition originates. For example, the time period can be approximately 1 to 1½ cycles.
In step 712, the trip mechanism 214 of the protective device 150 is disabled. In certain example embodiments, disabling the trip mechanism 214 of the protective device 150 prevents the trip mechanism 214 from sending a signal to open a breaker 120, 121. The protection engine 206 of the protective device 150 can disable the trip mechanism 214 of the protective device 150. In step 716, the complementary trip mechanism 214 of the complementary protective device 151 (at times also called the trip mechanism 214 of the complementary protective device 151) is disabled. In certain example embodiments, disabling the trip mechanism 214 of the complementary protective device 151 prevents the trip mechanism 214 from sending a signal to open a breaker 120, 121. The protection engine 206 of the protective device 150 can disable the complementary trip mechanism of the complementary protective device 151. Alternatively, the protection engine 206 of the protective device 150 sends a signal to the protection engine 206 of the complementary protective device 151, and the protection engine 206 of the complementary protective device 151 disables the trip mechanism 214 of the complementary protective device 151.
In step 718, a determination is made as to whether the time period has ended. In certain example embodiments, the timer 212 measures the time period and sends a notification to the protection engine 206 that the time period has ended. If the time period has not ended, the process proceeds to step 724. If the time period has ended, then the process proceeds to step 722.
In step 722, the trip mechanism 214 of the protective device 150 and the trip mechanism 214 (or complementary trip mechanism 214) of the complementary protective device 151 is enabled. In certain example embodiments, enabling the trip mechanism 214 of the protective device 150 and/or the complementary protective device 151 allows the trip mechanism 214 to send a trip signal to open a breaker 120, 121 if a fault is detected. Both trip mechanisms 214 can be enabled by the protection engine 206 of the protective device 151. Alternatively, the trip mechanism 214 of the protective device 150 can be enabled by the protection engine 206 of the protective device 150, where the complementary trip mechanism 214 of the complementary protective device 151 can be enabled by the protection engine 206 of the complementary protective device 151 after the protection engine 206 of the complementary protective device 151 receives an enabling signal from the protection engine 206 of the protective device 150.
In any case, because the fault does not originate in the region between the protective device 150 and the complementary protective device 151, or because there is no fault detected by the protection engine 206 during the remainder of the time period after the power spike is detected, the trip mechanisms 214 do not generate and send a trip signal once the trip mechanisms 214 are enabled. After the completion of step 722, the process reverts to step 708. In such a case, subsequent power spikes can cause the method 700 to repeat one or more times. On each occasion that the method 700 repeats, some distinguishing term (e.g., subsequent) can be used to differentiate each time that the method 700 is used to detect a likely fault for a protective device 150, 151.
In step 724, the input signal (unfiltered) is compared with the threshold value during the remainder of the time period. In certain example embodiments, the protection engine 206 compares the input signal with the threshold value during the remainder of the time period. The threshold values can be the same threshold values or different threshold values described above with respect to step 706. In certain example embodiments, the input signal of this step 724 is a raw (unfiltered) signal. In such a case, different but corresponding threshold values can be used in this step 724 relative to the threshold values of step 706. In certain example embodiments, the input signal is the result of a correlation filter (a filter algorithm used by the filter 212), which is a point-on-wave comparison of samples of raw, unfiltered signals and corresponding samples of the filtered signals (as from step 704). In such a case, both data streams are sampled at the same rate.
In step 726, a determination is made as to whether the input signal exceeds a threshold value. In other words, a determination is made as to whether a fault exists. The threshold value can be the same or a different threshold value described above with respect to step 706. The threshold value can be among the thresholds 242 stored in the storage repository 230. The threshold value can be retrieved by the protection engine 206. In certain example embodiments, the protection engine 206 compares the input signal and the threshold value and determines whether the input signal exceeds the threshold value. The threshold value can be a range of values. The threshold value can be a positive value, a negative value, or an absolute value. As an example, the threshold value is exceeded if the input signal is greater than the absolute value of the threshold value. If the input signal exceeds a threshold value, then the protection engine 206 determines whether this portion of the input signal is a power spike.
If the threshold value is a minimum threshold value, then the threshold value is exceeded if the input signal is less than the minimum threshold value. The threshold value can be some multiple (e.g., ten, fifteen) times greater than an average of the input signal prior to the time period. In addition, a certain minimum number of consecutive samples of the input signal may be required to exceed the threshold amount in order for the protection engine 206 to determine that the input signal exceeds the threshold amount (that a fault exists) for purposes of this step 726. For example, if only two consecutive samples are determined to exceed the threshold amount, the protection engine 206 can determine that the input signal does not exceed the threshold value because a minimum of three consecutive samples are required to exceed the threshold value. If the input signal exceeds the threshold value, then the process proceeds to step 727. If the input signal does not exceed the threshold value, the process reverts to step 718.
In step 727, a determination is made as to whether a fault originated in a region between the sensing devices 140, 141 (or, more generically, between the protective devices 150, 151). The fault can be coincidental with the power spike detected in step 706. The determination as to whether the fault originates in a region between the sensing devices 140, 141 is made by the protection engine 206. The protection engine 206 can use the protective device 150 and/or the complementary protective device 151 to determine whether the fault originates in a region between the sensing devices 140, 141. The determination can be made by comparing the polarity of one signal with the polarity of another signal.
For example, the protection engine 206 can compare a polarity of the input signal generated by the sensing device 140 and received by the protective device 150 with a polarity of a complementary input signal generated by the sensing device 141 and received by the complementary protective device 151. In such a case, the fault originates in a region between the sensing device 140 and the complementary sensing device 141 when the polarity of the two input signals is substantially the same (are in phase). Alternatively, the fault originates outside the region between the sensing device 140 and the complementary sensing device 141 when the polarity of the two input signals is substantially the opposite (are out of phase). If the fault originates in the region between the sensing devices 140, 141, then the process proceeds to step 728. If the fault originates outside the region between the sensing devices 140, 141, then the process reverts to step 718.
In step 728, the trip mechanism 214 of the protective device 150 and the trip mechanism 214 (or complementary trip mechanism 214) of the complementary protective device 151 is enabled. This step 728 is substantially similar to step 722 described above. However, in this case, because a fault is detected, and because the fault originates in the region between the sensing device 140 and the complementary sensing device 141, the trip mechanism 214, once enabled by the protection engine 206, is likely to send a trip signal to open a breaker 120, 121. After step 728 is complete, the method 700 ends at the END step.
Computing device 800 includes one or more processors or processing units 802, one or more memory/storage components 804, one or more input/output (I/O) devices 806, and a bus 808 that allows the various components and devices to communicate with one another. Bus 808 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. Bus 808 can include wired and/or wireless buses.
Memory/storage component 804 represents one or more computer storage media. Memory/storage component 804 may include volatile media (such as random access memory (RAM)) and/or nonvolatile media (such as read only memory (ROM), flash memory, optical disks, magnetic disks, and so forth). Memory/storage component 804 can include fixed media (e.g., RAM, ROM, a fixed hard drive, etc.) as well as removable media (e.g., a Flash memory drive, a removable hard drive, an optical disk, and so forth).
One or more I/O devices 806 allow a customer, utility, or other user to enter commands and information to computing device 800, and also allow information to be presented to the customer, utility, or other user and/or other components or devices. Examples of input devices include, but are not limited to, a keyboard, a cursor control device (e.g., a mouse), a microphone, and a scanner. Examples of output devices include, but are not limited to, a display device (e.g., a monitor or projector), speakers, a printer, and a network card.
Various techniques may be described herein in the general context of software or program modules. Generally, software includes routines, programs, objects, components, data structures, and so forth that perform particular tasks or implement particular abstract data types. An implementation of these modules and techniques may be stored on or transmitted across some form of computer readable media. Computer readable media may be any available non-transitory medium or non-transitory media that can be accessed by a computing device. By way of example, and not limitation, computer readable media may comprise “computer storage media”.
“Computer storage media” and “computer readable medium” include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Computer storage media include, but are not limited to, computer recordable media such as RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer.
The computer device 800 may be connected to a network (not shown) (e.g., a local area network (LAN), a wide area network (WAN) such as the Internet, or any other similar type of network) via a network interface connection (not shown). Those skilled in the art will appreciate that many different types of computer systems exist (e.g., desktop computer, a laptop computer, a personal media device, a mobile device, such as a cell phone or personal digital assistant, or any other computing system capable of executing computer readable instructions), and the aforementioned input and output means may take other forms, now known or later developed. Generally speaking, the computer system 800 includes at least the minimal processing, input, and/or output means necessary to practice one or more embodiments.
Further, those skilled in the art will appreciate that one or more elements of the aforementioned computer device 800 may be located at a remote location and connected to the other elements over a network. Further, one or more example embodiments may be implemented on a distributed system having a plurality of nodes, where each portion of the implementation (e.g., protection engine 206, hardware processor 220) may be located on a different node within the distributed system. In one or more embodiments, the node corresponds to a computer system. Alternatively, the node may correspond to a processor with associated physical memory. The node may alternatively correspond to a processor with shared memory and/or resources.
The following description (in conjunction with
Consider the following example, shown in
Consider another example, shown in
At time 1045, when the time period expires, the protection engine 206 determines that there is no fault likely condition (because the feature is disabled or otherwise not available), and the trip mechanism 214 is again enabled. The three differential elements 1033-1035 are all picked up during the time period at time 1040. However, since the trip mechanism 214 of the protection device 150 is deactivated during time 1040, the trip 1037 is not initiated until time 1042, which substantially coincides with time 1045 when the timer period ends and the trip mechanism 214 of the protection device 150 is again enabled 1036. Shortly thereafter, at time 1043, the trip mechanism 214 of the complementary protective device 151 is activated 1038. In this case, the trip mechanism 214 of the complementary protective device 151 can be activated by the protection engine 206 of the complementary protective device 151, which received an activation signal from the protection engine 206 of the protective device 150.
In this case, line 1060 and line 1062 shows spikes detected on the A phase and B phase, respectively, at time 1070. Shortly thereafter, at time 1071, line 1068 shows that the trip mechanism 214 of the protective device 150 goes from enabled to disabled. However, because the fault-likely function is disabled or otherwise unavailable, the detection of the spikes triggers a longer delay than would exist if the example fault-likely function is enabled. Because no further spikes are detected in any of the phases (no change to lines 1061, 1063, or 1065) during the time period, when the time period expires at time 1072, line 1068 shows that the trip mechanism 214 of the protective device 150 goes from disabled to enabled. Thus, because a power spike was detected but there was no fault-likely condition detected using example embodiments described herein, the activation of the trip mechanism 214 of the protective device 150 is delayed an additional 22 ms (for a total of 44 ms).
Consider another example, shown in
At time 1145, before the time period expires, the protection engine 206 determines that there is a fault likely condition, and the trip mechanism 214 is again enabled at time 1145. The protection engine 206 may have determined that there is a fault likely condition because, for example, the power spike originated within the region between the sensing device 140 and the complementary sensing device 141 and the unfiltered input signal exceeds a threshold value during the time period. The three differential elements 1133-1135 are all picked up at time 1140, after the trip mechanism 214 of the protective device 150 is again enabled at time 1145. As a result, the trip mechanism 214 of the protection device 150 is activated during time 1142, which is shortly after the fault at time 1150. Shortly thereafter, at time 1143, the trip mechanism 214 of the complementary protective device 151 is activated, as shown by line 1038. In this case, the trip mechanism 214 of the complementary protective device 151 can be activated by the protection engine 206 of the complementary protective device 151, which received an activation signal from the protection engine 206 of the protective device 150.
In this case, line 1160, line 1162, and line 1164 each show spikes detected on the A phase, B phase, and C phase, respectively, at approximately time 1170. Shortly thereafter, at time 1171, line 1168 shows that the trip mechanism 214 of the protective device 150 goes from enabled to disabled. Shortly thereafter, at approximately time 1173, the protection engine 206 determines that there is a likely fault on the A phase, B phase, and C phase, as shown by the steps in line 1161, line 1162, and line 1163, respectively. Since the fault likely condition exists before the time period expires, the protection engine 206 enables the trip mechanism 214 of the protective device 150 at time 1172, as shown by line 1168. Thus, because a power spike was detected and there is a fault-likely condition detected using example embodiments described herein, the activation of the trip mechanism 214 of the protective device 150 occurs immediately when the fault is detected at time 1150, which results in the default delay of 22 ms.
In
Example embodiments provide for detecting a likely fault for a protective device. Specifically, example embodiments provide for, when a power spike is detected in an input signal, disabling a trip mechanism of a protective device for a minimal amount of time. During this minimal amount of time, example embodiments determine whether a fault condition exists and, if so, where the fault condition originates. If a fault condition exists and originates in a certain region, then example embodiments enable the trip mechanism. Example embodiments allow such a determination to occur without delaying so long as to jeopardize assets within a system when a legitimate fault condition exists.
Example embodiments allow for a reduction in down time by reducing the occurrences of a trip mechanism sending a trip signal to a breaker in response to mere power spikes caused by normal operating conditions (e.g., operating a breaker) and/or extraneous events (e.g., lighting strike) that are commonly interpreted by protective devices as requiring actuation of a trip mechanism. Thus, example embodiments save in lost opportunity costs, as well as unnecessary maintenance and operations costs.
Although embodiments described herein are made with reference to example embodiments, it should be appreciated by those skilled in the art that various modifications are well within the scope and spirit of this disclosure. Those skilled in the art will appreciate that the example embodiments described herein are not limited to any specifically discussed application and that the embodiments described herein are illustrative and not restrictive. From the description of the example embodiments, equivalents of the elements shown therein will suggest themselves to those skilled in the art, and ways of constructing other embodiments using the present disclosure will suggest themselves to practitioners of the art. Therefore, the scope of the example embodiments is not limited herein.