Smagulova K.K.

Karaganda state technical university

Development of control algorithm of protection devices against leakage currents, using fuzzy logic

smagulovakk@mail.ru

Power

Abstract:

To ensure safe operation of electrical networks with isolated neutral and electrical equipment in the mining industry devices to protect against leakage currents are widely used. The importance of such protective devices demands stringent requirements for their reliability, stability, and the accuracy of the control parameters of the isolated network. In order to improve such devices, we offer a method of fuzzy modeling, one of the most interesting and promising areas of modern high technology. The control algorithm of the protection device, developed using fuzzy logic, allows the protection device to fine-tune its control setpoints according to the changing parameters of the network.

Key words:

fuzzy, logic, leakage, currents, adaptive

1. Introduction

Owing to the complexity of the physical phenomena connected with leakage currents, existing devices  developed to protect against leakage currents are inefficient (Fedorashko, 2004). Existing devices do not carry out automatic fine-tuning of operation setpoints according to tension fluctuations in the controllable network nor according to single-phase and diphasic short circuits, both of which lead to increases in the maximum admissible long current. Further, in underground electrical supply networks, lengths of protected lines periodically change: such uncontrollable changes of parameters lead to decreases in efficiency of leakage current protection devices (Tsapenko & Shkundin, 2006). Ideally, a protection device should possess adaptive properties which allow it to change according to a  network’s characteristics. We have developed an algorithm to control such an adaptive system of protection against leakage currents, using fuzzy logic. In the field of control of technical-systems control, fuzzy logic leads to more effective results than the use of traditional analytical methods. Our control algorithm will provide a protection device with the aforementioned adaptive properties. In the near future we hope to use our control algorithm to build such a device based on the fuzzy controller.

2. DEVELOPMENT OF CONTROL ALGORITHM

In order to develop the algorithm, we created a model of an isolated neutral network, using Matlab 7.01, shown in Figure 1, to measure the proceedings of such a network and obtain necessary data (Smagulova, 2006).

In our model, scheme 3V was used as the sensor for the device to protect against leakage currents. The scheme 3V, consisting of a system of three valves, rectified the operative currents of the network’s circuit (Smagulova, 2007). From oscillograms recorded during experiments, we identified the basic features of single-phase and diphasic short circuits, as well as tension fluctuations in the network.

Using a fuzzy logic method, preliminary analysis was made to determine input variables for the algorithm (Leonenkov, 2005). The input variable «voltage signal», being a product of a fuzzy logic inference, is as a result offered. The given variable denotes the existence and quantity of phases of short circuits.

According to order of procedures of a a fuzzy logic inference, the algorithm of Mamdani makes the fuzzy knowledge base which are a basis of algorithm of control.

To form rules for fuzzy logic inference systems, it is necessary to define preliminary input and target linguistic variables. 

It is evident that for one of the linguistic input variables it is necessary to use the amplitude of tension output from the scheme 3V - «voltage amplitude», and as the second linguistic input variable - «a voltage signal».

 

Ðèñóíîê11

Fig. 1. Model of an isolated neutral network

 

As a linguistic output variable we will use setpoint device operations: g - «setpoint response».

In this case the system will contain 15 rules of fuzzy logic inference, as follows:

Rule_1: If  there is a PB PB and  is NS then g PB;

Rule _2: If  there is a PB and is ZE then g PB;

Rule _3: If  there is a PB and is PS then g PB;

Rule _4: If  there is a PB PS and  is NS then g PS;

Rule _5: If  there is a PB PS and is ZE then g PS;

Rule _6: If  there is a PB PS and is PS then g PB;

Rule _7: If there is ZE and is NS then g ZE;

Rule _8: If  there is ZE and is ZE then g ZE;

Rule _9: If  there is ZE and is PS then g PB;

Rule _10: If  there is NS and is NS then g NS;

Rule _11: If  there is NS and is ZE then g NS;

Rule _12: If  there is NS and is PS then g PB;

Rule _13: If  there is NB and is NS then g NB;

Rule _14: If  there is NB and is ZE then g NB;

Rule _15: If  there is NB and is PS then g PB;

Where NB (negative big) - the greatest negative absolute value;

NS (negative small) - smallest negative absolute value;

ZE (approximately zero) - closest to zero;

PS (positive small) - smallest positive value;

PB (Positive Big) - greatest positive value.

The next step of modeling is fuzzification of input variables, a procedure used to obtain fuzzy meanings (Leonenkov, 2005).

As a term set of the first input variable we will use the term set = {NS, ZE, PS} with the membership function shown in Figure 2. As a term set of the second input variable we will use the term set = {NB, NS, ZE, PS, PB} with the membership function shown in Figure 3. As a term set of the output variable we will use the term set = {NB, NS, ZE, PS, PB} with the membership function shown in Figure 4.

Fig. 2. The membership function «voltage signal»

 

Fig. 3. The membership function «amplitude of the voltage»

 

Fig. 4. The membership function «set-point operation»

 

Using a Mamdani inference algorithm, consider the example, the case when the protection device’s operation setpoint is 10.0 K Om, current amplitude of the voltage output of the scheme 3V is 400V and the voltage signal is 0. In this case, fuzzification of the first input variable (current amplitude) leads to the term NS (having degree of membership 0.52), fuzzification of the second input variable (voltage signal) leads to the term ZE (having degree of membership 1). Thus the conditions correspond to fuzzy conclusion rule number 11. This rule is active and is used in the current process of fuzzy inference.

Aggregation of rule number 11 using fuzzy conjunction operation (1) results in 0.52.

 

      (1)

 

The next step of fuzzy inference is activation of conclusions in the fuzzy rules. Because weighting factor of all rules equals 1, activation of rule number 11 results in one fuzzy set.

Accumulation of the conclusions of fuzzy rules using the disjunction operation to maximize value for rule 11, resulting in a fuzzy set, gives the membership functions depicted in Figure 5.

 

 

Fig. 5. Schedule of membership functions of two sets of fuzzy linguistic variables «set-point operation» after accumulation

 

Defuzzification of linguistic output variables by the centre of area method for the values of membership functions, shown in Figure 5, leads to a control variable which adjusts the operation setpoint to K Om 8.5 (approximate value). Because our second input variable was 0, we know that this value is proportional to fluctuation of tension in the network of 15% lower than the nominal value (by the difference 10-8.5).

3. Conclusion

An algorithm providing automatic adjustment of the operation setpoint of leakage current protection devices, according to 1) tension fluctuations in isolated neutral networks and 2) the existence of single-phase and diphasic short circuits, is thus developed. Application of the given control algorithm in leakage current protection devices will increase the performance of such devices, greatly decreasing the number of unnecessary system shut-downs, while simultaneously better preventing the occurrence of leakage currents.

4. References  

1. Fedorashko, U. (2004). The generalized analysis of the touch currents in an isolated neutral network, according to leakage to the ground. Proceedings of University, No. 1, (2004), pp 58-59, ISSN 1609-1825

2. Leonenkov, A. (2005). Fuzzy modeling using are Matlab and Fuzzytech environments, BHV – St. Petersburg, ISBN 5-94157-087-2, St – Petersburg

3. Smagulova, K. (2007). Development of protection device against leakage currents in a constant current network, Proceedings of the International scientific symposium “Modern problems of multilevel education”, Balakiryov, V. (Ed), pp 74-75, ISBN - 978-5-7890-0438-8, Rostov, 2007, DSTU publishing, Rostov

4. Smagulova, K. (2006). The modeling of leakage control scheme in a constant current network. Automation and Computer Science, No 1-2, (2006), pp 10-13, ISSN 1560-7305

5. Tsapenko, E. & Shkundin, S. (2006). The electric safety in the mining industry. MSMU publishing, ISBN 5-7418-0057-9, Moscow