Open access

Inconsistent Decision System: Rough Set Data Mining Strategy to Extract Decision Algorithm of a Numerical Distance Relay - Tutorial

Written By

Mohammad Lutfi Othman and Ishak Aris

Submitted: 10 November 2011 Published: 12 September 2012

DOI: 10.5772/50460

From the Edited Volume

Advances in Data Mining Knowledge Discovery and Applications

Edited by Adem Karahoca

Chapter metrics overview

2,043 Chapter Downloads

View Full Metrics

1. Introduction

Modern numerical protective relays being intelligent electronic devices (IED) are inevitably vulnerable to false tripping or failure of operation for faults in the power system [1]. With regular and rigorous analyses the performance reliability of the digital protective relays can be ascertained, their availability maximized and subsequently their misoperation risks minimized [2]. The precise relay operation analyses would normally be assessing the relay characteristics, evaluating the relay performance and identifying the relay-power system interactions so as to ensure that the protective relays operate in correspond to their predetermined settings [3,4].

Protection engineers would in practice resort to computing technologies for automating the analysis process when the gravity of event data exploration, manipulation and inferencing incapacitate human manageability. The voluminous amount of data to be processed has prompted the need to use intelligent data mining, an essential constituent in the Knowledge Discovery in Databases (KDD) process [5]. This has motivated the adoption of rough set theory to data mine the protective relay event report so as to discover its decision algorithm.

Advertisement

2. Problem statement and objective

The following two pertinent problems are the attributing factors in driving this paper into studying the protective relay operation analysis:

  • Inconsistencies in the device’s event report particularly found when upon power system fault inception, a protective relay detects and invokes a common combination of tripping conditions in time succession but having two distinct tripping decisions (classifications). These distinct decisions are one, that upon relay pick-up, trip signal has not been asserted immediately after and the other is when a subsequent trip signal is asserted, after a preset time delay as set by the protection engineer.

  • Non-linear nature of relay operation that makes it very difficult to select a group of effective attributes to fully represent relay tripping behavior.

In the grueling manual analysis of relay event report [1,6], the selected attributes hardly provide adequate knowledge in accurately mapping the interclass boundary in the relay decision system due to inconsistency. This characterizes the interclass boundary to be usually “rough”. Based on the selected attributes, some relay events close to the boundary are unclassifiable – trip or nontrip. The small overlaps between different relay events make the protective relay operation analysis to be actually a rough classification problem. Thus, rough set theory has been appropriately chosen to resolve this conflict [7].

Advertisement

3. Rough set data mining in dealing with inconsistent numerical distance relay decision system to extract decision algorithm – The fundamental concept

Using rough set theory approach, relay decision rule extraction is naturally a byproduct of the data reduction process involved and easily understood. Rule extraction technique is inherent to the machine learning process of rough set theory. Thus, the inherent capability of rough set theory to discover fundamental patterns in relay data has essentially mooted this study. Using an approximation concept, rough set theory is able to remove data redundancies and consequently generate decision rules. In contrast to crisp sets, a rough set has boundary line cases – events that cannot be certainly classified either as members of the set or of its complement. Rough set theory is an alternative intelligent data analysis tool that can be employed to handle vagueness and inconsistencies [8].

An information system (IS) also alternatively known as knowledge representation system (KRS) is a tabulated data set, the rows of which are labeled by objects (events) of interest, columns labeled by attributes, and the entries are attribute values [8]. This data layout fits very well the protective relay event report that is characterized by its attributes of relay multifunctional elements versus sequence of time-stamped events [7].

In the protective relay event report, the IS manifestation is more appropriately referred as relay decision table or decision system (DS) as Huang et. al. [9] put it that decision table is characterized by disjoint sets of condition attributes (CQ) and decision (action) attributes (DQ). In this regard Q = CD and CD = Ø. This DS is a 4-tuple structure formulated as DS = (U, Q, V, f), the elements of which are as follows [8,10,11]:

  • U, i.e. the universe denoted as U = {t1, t2, t3, …, tm}, is a finite set of relay events (tis).

  • Q = CD is a non-empty finite union set of condition and decision attributes,

    1. condition attributes (ciC) indicate the internally various multifunctional protective elements and analog measurands,

    2. decision attribute (diD) indicates the trip output of the relay, such that q: UVq for every qQ.

  • V = UqQ Vq, where Vq is a set of values (domain) of the attribute q.

  • f: U×QV called information function is a total function such that f(t,q) ∈ Vq for every tU, qQ. Any pair (q,v) is called descriptor in DS, where qQ and vVq,.

3.1. Relay decision system indiscernibility relation

If a set of attributes PQ = CD and f(tx,q) = f(ty,q) where tx, tyU, then for every qP, tx and ty are indiscernible (indistinguishable) by the set of attributes P in DS. Thus, every PQ brings forth a binary relation on U called P-indiscernibility relation (or equivalence relation) which is denoted by IND(P). This suggests that there will be sets of relay events that are indiscernible based on any selected subset of attributes P. UIND(P) denotes the family of all equivalence classes of relation IND(P). IND(P) and UIND(P) can be formulated as

IND(P) = {(tx,ty)U2|qP,q(tx) =q(ty)},E1
U|IND(P) ={qP|U|IND({q})},E2

where,

AB= {XY|XA,YB,XYØ}.E3

UIND(P) is also interchangeably referred as P-basic knowledge or P-elementary sets in DS. P-elementary set including relay event t is denoted as [t]IND(P). The first step in classification with rough sets is the construction of elementary sets [11]. A description of P-elementary set XUIND(P) in terms of values of attributes from P is denoted as DesP(X), i.e.

DesP(X) = {(q,v):f(t,q) =v,tX,qP}E4

3.2. Relay decision system set approximation

In the context of protective relay operations, consider TU as an arbitrary target set of relay events described (classified) by a particular trip assertion status that is needed to be represented by equivalence classes originating from attribute subset PQ. P could be a selected condition attribute set PC or all condition attributes C reflecting relay multifunctional protective elements while T could be the set of relay events indiscernible with respect to the decision attribute D = Trip having a domain value ‘b’ for pole-B tripping, for example [7].

The idea of the rough set revolves around the concept of approximation [11]. Thus, by introducing a pair of sets, called the lower and upper approximations of the target set T using only the information contained within P, the target set T can be approximated.

Formally, with a given relay decision system DS, each target subset TU having equivalence relation IND(P) is related to two subsets of T as follows.

P-lower approximation of T expressed as,

P_T={XU|IND(P):XT},E5

is defined as the union of all elementary sets in [t]IND(P) which are contained in T. For any relay event ti of the lower approximation of T with respect to the set of attributes P (i.e., tiP¯T), it positively certain belongs to T.

P-upper approximation of T expressed as,

P¯T={XU|IND(P):XTØ},E6

is defined as the union of elementary sets in [t]IND(P) which have a non-empty intersection with T. For any relay event ti of the upper approximation of T with respect to the set of attributes P (i.e., tiP¯T), it may possibly belong to T.

P-boundary of set T expressed as,

BNP(T) =P¯TP_TE7

is the difference between P¯T and P¯T. The set of elements ti which cannot be certainly classified as belonging to T using the set of attributes P [12].

The following three regions shall be derived from the lower- and upper-approximations as illustrated in Figure 1 [7,10,13].

  • POSP(T) = P¯T, described as P-positive region of T, is the set of relay events which can be classified with certainty in the approximated set T.

  • NEGP(T) = U - P¯T, described as P-negative region of T, is the set of relay events which cannot be classified without ambiguity in the approximated set T (or classified as belonging to the complement of T).

  • BNP(T) = P¯T - P¯T, described as P-boundary region of T, is the set of relay events in which none can be classified with certainty into T nor its complement P¯ as far as the attributes P are concerned. The set T is crisp if there are no boundary sets, i.e. BNP(T) = Ø (empty set), which otherwise it is rough.

3.3. Approximation accuracy and quality

αP(T), the accuracy of the rough set representation of a target set of relay events T, is formulated as [10]

αP(T) = |P_T||P¯T|=card(P_T)card(P¯T) .E8

Figure 1.

Definition of approximation in rough set theory in the context of protective relay

It provides a measure of how accurate the rough set is in approximating the target set of relay events T by comparing the number of events which can be positively placed in P with the number of events that can be possibly be placed in P. Noticeably 0 ≤ αP(T) ≤ 1. (Note: card (cardinality) of a set is the number of events contained in the set [11]).

Clearly, equal upper and lower approximations, i.e. empty boundary region and that αP(T) = 1, would mean the target set T is said to be definable in U since it is perfectly approximated. Regardless of the size of the upper approximation, zero accuracy would mean the lower approximation is empty.

In general, the set T can be defined in U according to one of the following four concepts of definability [14,15]:

  • Roughly definable T in U given P¯T ≠ Ø and P¯TU (Ø denotes empty set)

  • Externally undefinable T in U given P¯T ≠ Ø and P¯T = U

  • Internally undefinable T in U given P¯T = Ø and P¯T ≠ U

  • Totally undefinable T in U given P¯T = Ø and P¯T = U

The quality of approximation of a target set T is expressed as

γP(T) = |P_T|U = card(P_T)card(U),E9

i.e. the ratio of P-correctly approximated events to all events in the system.

3.4. The concept of reduct and core in reduction of protective relay attributes

Dependencies between attributes are primarily important in the protective relay data analysis using rough sets approach. The set of attributes RQ depends on the set of attributes PQ in IS if and only if IND(P) ⊆ IND(R). This dependency is denoted as PR.

This so-called attribute reduction is so performed that the reduced set of attributes provides the same approximation quality as the original set of attributes. If a particular set of attributes is dependent, it is interesting to find reducts (all possible minimal subsets of attributes) that lead to the same number of elementary sets as in the case of the whole set of attributes and also to find core (the set of all indispensable attributes) [11]. By adopting the fundamental concepts of core and reduct, rough set theory minimizes the subsets of attributes in the relay database but still fully characterizes the inherent knowledge of relay operation behavior.

Reduct is essentially a sufficient set of features of a DS, which discerns (differentiates) all events discernible by the original DS. Reduct is a subset of attributes REDP (where PQ) such that:

  • The reduced attribute set RED induces the same equivalence classes as those induced by full attribute set P. This is denoted as [t]IND(RED) = [t]IND(P).

  • Attribute set RED is minimal in the sense that [t]IND(RED-A) ≠ [t]IND(P) for any attribute ARED. This suggests that no attribute can be dispensed from set RED without modifying the equivalence classes [t]IND(P) [16].

Core is defined as the set of attributes found to be in common in all reducts. Core is a subset of attributes CORERED (where REDP and PQ) such that:

  • It consists of attributes which cannot be removed from the DS without causing collapse of the equivalence class structure. Formally, [t]IND(RED‐CORE) ≠ [t]IND(P) where the above ARED in this case is ACORE.

A discernibility matrix with a symmetrical dimension n × n is constructed to compute reducts and core. n denotes the number of elementary sets and each of the matrix’s elements dij is defined as the set of all attributes which discern elementary sets [t]IND(Pi) and [t]IND(Pj) [17].

3.5. Decision rules interpreted from protective relay event report

Relay DS analysis is considered as a supervised learning problem (classification) [13]. A DS determines a logical implication called decision rule when the conditions specified by condition attributes in each row of DS correlate what decisions (trip assertions) are to take effect [18]. Thus, in this study the logical implication is designated as relay decision rule. A complete set of relay decision rules can be derived from the relay decision table DS. Events in DS, i.e. {t1, t2, t3, …, tm} = U, identify as labels of relay decision rules.

Formally, let

  • UIND(C) be condition classes in relay DS (a family of all C-elementary sets), denoted by Xi (i = 1, …, k),

  • UIND(D) be decision classes in relay DS (a family of all D-elementary sets), denoted by Yj (j = 1, …, n).

Then, DesC(Xi) ⇒ DesD(Yj) is called relay CD-decision rule. For simplicity, CD. (As aforementioned, DesP(X) = {(q,v) : f(x,q) = v, xX, qP} which denotes a description of P-elementary set XUIND(P) in terms of values of attributes from P).

The relay CD-decision rules are logical statements read as ‘if C…then…D’. These rule correlate descriptions of condition attributes CQ (for internal multifunctional protective elements, voltages, currents and impedance measurements) to classes of decision attribute DQ (i.e. type of trip assertions).

The set of decision rules for each decision class Yj (j = 1,…, n) is denoted by:

{rij} = {DesC(Xi)DesD(Yj):XiYjØ,i= 1,, k}E10

Decision algorithm in DS is used to mean the set of decision rules for all decision classes, i.e. CD-algorithm [10,18]. In the context of protective relay operation characteristics, a decision algorithm is a collection of relay CD-decision rules, thus referred to as relay CD-decision algorithm in this study.

Rules having the same conditions but different decisions are inconsistent (nondeterministic, conflicting); otherwise they are consistent (certain, deterministic, nonconflicting) [17]. When some conditions are satisfied, deterministic DS uniquely describes the decisions (actions) to be made. In a non-deterministic DS, decisions are not uniquely determined by the conditions [9]. Formally, it is defined that:

  • Relay rule {rij} is deterministic in DS if and only if XiYj, and

  • Relay rule {rij} is nondeterministic in DS, otherwise.

The degree of consistency (or degree of dependency) between the set of attributes C and D of a relay CD-decision algorithm is denoted as Ck D and can be formally defined as:

CkD | k =γ(C, D)=|POSCD||U|E11

(i.e. conceptually similar to the quality of approximation or classification) [10]. In other words, D depends on C in a degree of dependency k (0 ≤ k ≤ 1). All the values of attributes from D depend totally on (i.e. uniquely determined by) the values of attributes from C if k = 1, i.e. C1 D or simply CD. D depends partially in a degree k on C if k < 1 [17].

It may happen that the set D depends on subset C′ called relative reduct and not on the entire set C. C’ is a relative reduct called D-reduct of C if C′ ⊆ C is a minimal subset of C and γ(C, D) = γ(C′, D) is valid (i.e. similar in dependency). REDD(C) is used to mean the family of all D-reducts of C [18]. Putting it simply, the minimal subsets of condition attributes that discern all decision equivalence classes of the relation UIND(D) discernable by the entire set of attributes are called D-reducts [11]. The following notations are, thus, valid:

  • If POSC(D) = POS(C-{ci})(D), an attribute ciC is D-dispensable in C. ci is D-superfluous if it exerts no influence on the lower approximation of D. Otherwise the attribute ci is D-indispensable in C.

  • If C is D-independent, then all attributes ciC are D-indispensable in C and called the D-core of C which is denoted as CORED(C).

  • The following property is also true for DS system as previously defined,

    CORED(C) = REDD(C)E12

    The previous definitions are valid if D = C [18].

  • Using a slightly modified discernibility matrix called D-discernibility matrix of C, relative reducts can be computed. The set of all condition attributes which discern events ti and tj that do not belong to the same equivalence class of the relation UIND(D) defines the element of D-discernibility matrix of C. The set of all single elements of the D-discernibility matrix of C is the D-core of C [10,11]. Rather than the ordinary reduct of C, D-reduct of C is very much the essence of this paper’s study that aspires to derive the relay CD-decision rules (i.e. CD).

Advertisement

4. Discovering decision algorithm of numerical distance protective relay

In order to fairly understand the indiscernibility relation and rules discovery from distance protective relay decision system DS, the following tutorial is presented.

4.1. Protective relay decision table

Table 1 illustrates an example of a decision system DS = (U, Q, V, f) excerpted from an event report of a protective distance relay. The decision table is a presentation of information function f: U×QV. C = {ag, bg, cg, Z1pu, Z2pu, Z3pu, Z4pu, Z1trp, Z2trp, Z3trp, Z4trp} is the set of condition attributes representing the internal multifunctional protective elements. D = Trip is the decision attribute which, essentially, denotes the tripping signal asserted by the relay in response to a particular fault in the power system. The time codes are the events that are analyzed for equivalence relation on the basis of selected subset of attributes P, such that PQ. The finite set of the attribute time’s code forms the universe of interest U = {t1, t2, t3, t4, t5, t6, t7, t8, t9, t10, t11, t12, t13, t14, t15, t16, t17, t18, t19, t20, t21}.

time(U)agbgcgZ1puZ2puZ3puZ4puZ1trpZ2trpZ3trpZ4trpTrip
seccodezonezonezonelogiclogiclogiclogiclogiclogiclogiclogicpole
0.4982t1000000000000
0.4994t2000000000000
0.5006t3000000000000
0.5018t4010011000000
0.5030t5020011000000
0.5054t6020011000000
0.5066t7020011000000
0.5498t801011101000b
0.5510t901011101000b
0.5522t1001011101000b
0.5534t1100011100000b
0.5546t1200011100000b
0.5558t1300011100000b
0.5966t1400011100000b
0.5978t1500011100000b
0.5990t1600000100000b
0.6002t1700000000000b
0.6014t1800000000000b
0.6026t1900000000000b
0.7347t20000000000000
0.7359t21000000000000

Table 1.

Excerpt of an event report as a decision table DS of a protective distance relay (only ground distance is considered for illustration)

The attribute names are described as follows:

  • ag, bg, and cg are A-G, B-G, and C-G fault detections.

  • Z1pu, Z2pu, Z3pu, and Z4pu are zone 1, 2, 3, and 4 ground distance starts (pick-ups).

  • Z1trp, Z2trp, Z3trp, and Z4trp are zone 1, 2, 3, and 4 ground distance trip signals.

The sets of values (domains) of the particular attributes are as follows:

  • Vag, Vbg, Vcg, = {1, 2, 3, 4}.

  • VZ1pu, VZ2pu, VZ3pu, VZ4pu, VZ1trp, VZ2trp, VZ3trp, VZ4trp = {0, 1}.

  • VTrip = {a, b, c, 0}, corresponding to tripping signals of phase A, B, C or none.

4.2. Protective relay decision table analysis

From Table 1, the two elementary sets with respect to the decision attribute D = {Trip} can be deduced as shown in Table 2.

U│DTrip
{t1, t2, t3, t4, t5, t6, t7, t20, t21} = D10
{t8, t9, t10, t11, t12, t13, t14, t15, t16, t17, t18, t19} = D2b

Table 2.

Equivalence classes with respect to decision attribute D = {Trip}

Six equivalence classes (elementary sets) can be deduced as shown in Table 3 when the full set of attributes C = {ag, bg, cg, Z1pu, Z2pu, Z3pu, Z4pu, Z1trp, Z2trp, Z3trp, Z4trp} is considered.

U│CagbgcgZ1puZ2puZ3puZ4puZ1trpZ2trpZ3trpZ4trp
{t1, t2, t3, t17, t18, t19, t20, t21}00000000000
{t4}01001100000
{t5, t6, t7}02001100000
{t8, t9, t10}01011101000
{t11, t12, t13, t14, t15}00011100000
{t16}00000100000

Table 3.

Equivalence classes with respect to condition attributes C = {ag, bg, cg, Z1pu, Z2pu, Z3pu, Z4pu, Z1trp, Z2trp, Z3trp, Z4trp}

Within the first equivalence class, {t1, t2, t3, t17, t18, t19, t20, t21}, the eight events are indiscernible among each other based on the available attributes. In the third and the fourth equivalence classes, {t5, t6, t7} and {t8, t9, t10}, the three events within them, based on the available attributes, cannot be distinguished from one another. Similarly, the five events within the fifth equivalence class are also indiscernible from one another. The remaining two events are each discernible (different) from all other events. [t]IND(C) or simply [t]C can denote these equivalence classes of the C-indiscernibility relation as aforementioned. Each row in Table 3 describes an individual elementary set, whereas the entire Table 3 describes the DS being studied. UC means that elementary sets of the universe U in the space C are being considered.

The calculations of the C-lower and C-upper approximations and accuracy of classification of D,

C_D1= {t4}{t5,t6,t7} = {t4,t5,t6,t7}E13
C_D2={t8, t9, t10}{t11, t12, t13, t14, t15}{t16}= {t8, t9, t10, t11, t12, t13, t14, t15,t16}E14
 C¯D1={t1, t2, t3, t17, t18, t19, t20, t21}{t4}{t5, t6, t7}={t1, t2, t3,t4, t5, t6, t7,t17, t18, t19, t20, t21}E15
C¯D2={t1, t2, t3, t17, t18, t19, t20, t21}{t8, t9, t10}{t11, t12, t13, t14, t15}{t16}={t1, t2, t3,t8, t9, t10, t11, t12, t13, t14, t15,t16, t17, t18, t19, t20, t21}E16
αC(D1) =|C_D1C¯D1|=card(C_D1)card(C¯D1)= 412=0.33E17
αC(D2)=|C_D2C¯D2|=card(C_D2)card(C¯D2)= 917=0.53E18

With classification accuracies of 0.33 and 0.53, the respective elementary sets D1 and D2 are roughly definable (vaguely classified) in the DS. This is rather expected. The decision attribute D = {Trip} may remain in a certain domain value for a certain time-sequence of relay events after a particular relay trip trigger according to the protection engineer’s preset time duration of signal assertion [7]. This may prevail even though the condition attributes have changed during this duration. This explains the inconsistency found in the CD-algorithm.

The accuracy and quality of overall classification D are:

αC(D) =i=12card(C_Di)i=12card(C¯Di)=4 + 912 + 17=0.45E19
γC(D)=i=12card(C_Di)card(U)=4 + 99 + 12=0.62E20

i.e. the overall classification with respect to C is rough.

D-reducts and D-core of C can be discovered from the D-discernibility matrix of C by discerning relay events from different equivalence classes in the relation UIND(D) with respect to the condition attributes C. The D-discernibility matrix that is formed is illustrated in Table 4. It would suffice to consider only the lower diagonal part because of the matrix’s symmericalness [11]. Note that even though relay events appearing in the same class in the D-space (for example t1, t2, t3, t4, t5, t6, t7, t20, t21 ) are discernible in C-space, they are not discerned between each other with respect to the attributes C. Empty set (Ø) indicates indiscernibility between relay events.

Ut1t2t3t4t5t6t7t8t9t10t11t12t13t14t15t16t17t18t19t20t21
t1Ø
t2ØØ
t3ØØØ
t4ØØØØ
t5ØØØØØ
t6ØØØØØØ
t7ØØØØØØØ
t8{bg, Z1pu, Z2pu, Z3pu, Z1trp}{bg, Z1pu, Z2pu, Z3pu, Z1trp}{bg, Z1pu, Z2pu, Z3pu, Z1trp}{Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}Ø
t9{bg, Z1pu, Z2pu, Z3pu, Z1trp}{bg, Z1pu, Z2pu, Z3pu, Z1trp}{bg, Z1pu, Z2pu, Z3pu, Z1trp}{Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}ØØ
t10{bg, Z1pu, Z2pu, Z3pu, Z1trp}{bg, Z1pu, Z2pu, Z3pu, Z1trp}{bg, Z1pu, Z2pu, Z3pu, Z1trp}{Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}ØØØ
t11{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}ØØØØ
t12{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}ØØØØØ
t13{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}ØØØØØØ
t14{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}ØØØØØØØ
t15{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}ØØØØØØØØ
t16{Z3pu}{Z3pu}{Z3pu}{bg, Z2pu}{bg, Z2pu}{bg, Z2pu}{bg, Z2pu}ØØØØØØØØØ
t17ØØØ{bg, Z2pu, Z3pu}{bg, Z2pu, Z3pu}{bg, Z2pu, Z3pu}{bg, Z2pu, Z3pu}ØØØØØØØØØØ
t18ØØØ{bg, Z2pu, Z3pu}{bg, Z2pu, Z3pu}{bg, Z2pu, Z3pu}{bg, Z2pu, Z3pu}ØØØØØØØØØØØ
t19ØØØ{bg, Z2pu, Z3pu}{bg, Z2pu, Z3pu}{bg, Z2pu, Z3pu}{bg, Z2pu, Z3pu}ØØØØØØØØØØØØ
t20ØØØØØØØ{bg, Z1pu, Z2pu, Z3pu, Z1trp}{bg, Z1pu, Z2pu, Z3pu, Z1trp}{bg, Z1pu, Z2pu, Z3pu, Z1trp}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z3pu}ØØØØ
t21ØØØØØØØ{bg, Z1pu, Z2pu, Z3pu, Z1trp}{bg, Z1pu, Z2pu, Z3pu, Z1trp}{bg, Z1pu, Z2pu, Z3pu, Z1trp}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z1pu, Z2pu, Z3pu}{Z3pu}ØØØØØ

Table 4.

D-discernibility matrix of C

The discovery of the desired reduct(s) is possible via the formulation of the so-called discernibility function f(P) that calculates according to Boolean function operation in which each attribute acts as a Boolean variable [11]. Using the technique introduced by Pawlak [17], a Boolean discernibility function is deduced right off the discernibility matrix in Table 4, i.e.:

fC(D )

=(bg+Z1pu+Z2pu+Z3pu+Z1trp) (Z1pu+Z2pu+Z3pu) (Z3pu) × (Z1pu+Z1trp) (bg+Z1trp) (bg+Z2pu) (bg+Z2pu+Z3pu) × (bg+Z1pu+Z1trp) (bg+Z1pu) (bg+Z2pu) (bg+Z2pu+Z3pu) × (bg+Z1pu+Z2pu+Z3pu+Z1trp) × (Z1pu+Z2pu+Z3pu) × Z3pu

= Z3pu × (Z1pu+Z1trp) (bg+Z1pu) (bg+Z2pu) × (bg+Z1pu) (bg+Z2pu) × (bg+Z1pu+Z2pu+Z3pu+Z1trp) × (Z1pu+Z2pu+Z3pu) × Z3pu → The final Conjunctive Normal Form (CNF)

=Z3pu (Z1pu+Z1trp) (bg+Z1pu) (bg+Z2pu)

=(Z1pu Z3pu + Z3pu Z1trp) (bg+Z1pu) (bg+Z2pu)

=(bg (Z1pu Z3pu + Z3pu Z1trp) + Z1pu(Z1pu Z3pu + Z3pu Z1trp)) (bg+Z2pu)

=((bg Z1pu Z3pu + bg Z3pu Z1trp) + (Z1pu Z3pu) + (Z1pu Z3pu Z1trp)) (bg+Z2pu)

=bg ((bg Z1pu Z3pu + bg Z3pu Z1trp) + (Z1pu Z3pu) + (Z1pu Z3pu Z1trp)) + Z2pu ((bg Z1pu Z3pu + bg Z3pu Z1trp) + (Z1pu Z3pu) + (Z1pu Z3pu Z1trp))

=(bg Z1pu Z3pu) + (bg Z3pu Z1trp) + (bg Z1pu Z3pu) + (bg Z1pu Z3pu Z1trp) + (bg Z1pu Z2pu Z3pu) + (bg Z2pu Z3pu Z1trp) + (Z1pu Z2pu Z3pu) + (Z1pu Z2pu Z3pu Z1trp)

→ The final Disjunctive Normal Form (DNF) of fC(D)

Absorption law and eventual expression multiplication are implemented to solve the Boolean expression of fC(D) [19].

Normalization in its final normal form, the last Boolean expression fC(D) is recognized as Disjunctive Normal Form (DNF). DNF is analogous to Sum Of Product (SOP) boolean algebra in digital electronics logic. fC(D) in DNF form is an alternative representation of the DS in which all its constituents are the D-reducts of C (i.e. REDD(C)) [11,17]. Either one of the set of reducts can be used to represent exactly the same data classification as that depicted by the entire set of attributes C. The following REDD(C) of the above final fC(D) reveals that either one of the D-reducts of C can be used alternatively to represent exactly the same equivalence relation UIND(D) of the DS as that represented by the whole set of attributes C, i.e.,

REDD(C) = {bg,Z1pu,Z3pu}, {bg,Z3pu,Z1trp}, {bg,Z1pu,Z3pu}, {bg,Z1pu,Z3pu,Z1trp}, {bg,Z1pu,Z2pu,Z3pu}, {bg,Z2pu,Z3pu,Z1trp}, {Z1pu,Z2pu,Z3pu}, {Z1pu,Z2pu,Z3pu,Z1trp}E21

The D-core of C can be figured out by either:

  • Identifying all the single attribute entries in the D-discernibility matrix of C [11], which from Table 4, attribute Z3pu is the only single attribute entry and thus CORED(C) = ∩REDD(C) = Z3p, or

  • Taking intersection of all D-reducts of C, i.e. CORED(C) = ∩REDD(C) = Z3pu

Hence, Z3pu is the most characteristic attribute that is indispensible in DS without reducing the approximation quality of equivalence relation UC with respect to D.

CORED(C) = Z3pu does not seem to signify any significance in the behavior of the relay under analysis. Had the reduct analysis been worked out based only on the whole condition attributes C (as per the equivalence relation in Table 3, where decision attribute D is excluded such as in the case of IS instead of DS), the core of C (i.e. the core of the equivalence relation UC with respect to C) would have been,

COREU|C(C) = {bg}E22

This implies the protective relay has been subjected to B-G fault. In reality this fault occurred in distance zone 1 operation characteristic and was picked up by the zone 1 distance element. However, the D-core of C discovers the indispensability of the condition attribute Z3pu as being the core when the decision attribute D is considered for the DS analysis. Actually, this attribute is entirely insignificant based on the understanding of the manner the distance relay functions. This is simply because of the concurrent nature of the distance relay quadrilateral operation characteristic whereby zone 1 element is encapsulated in zone 2 element and subsequently zone 2 element is encapsulated in zone 3 element. Zone 4 element is on its own separate entity not encapsulated in any zone elements [7]. Thus, by merely considering the exertion of the zone 1 element in case of fault and correspondingly disregarding zones 2, 3 and 4 operation is principally correct. Figure 2 illustrates that a fault occurring in zone 1 is also concurrently shown as present in zones 2 and 3 as well.

To simplify and make the analysis process more sense, an attribute priority of the distance relay operation has to be formulated so that the relay DS can be modified as shown Table 5.

Figure 2.

Distance protective relay operation characteristic with impedance measurement

Cases of concurrenceCondition Attributes, ciC
Z1puZ2puZ3puZ4puZ1trpZ2trpZ3trpZ4trpMost significant attribute
Case 1++++Z1pu
Case 1´+++*Z2pu
Case 2++*Z2pu
Case 2´++*Z3pu
Case 3+*Z3pu
Case 4+*Z4pu

Table 5.

Condition attribute priority of the distance relay operation

The absence of relay trip assertion signal in attributes Z2trp, Z3trp, and Z4trp which is represented by the attribute value “0” further justifies the necessity of disregarding attributes Z2pu, Z3pu, and Z4pu for fault in zone 1. This is because, for example, the assertion of attribute Z1pu (value of “1”) must always be accompanied by the assertion (after and for a preset time duration, i.e. sequence of consecutive events) of the corresponding attribute Z1trp in order to be taken into consideration in the analysis. However, in the above example, it is highly likely that attribute Z2trp will assert (after and for a preset number of events) in lieu of the attribute Z1trp as shown in Table 5 if the relay failed to operate in asserting the attribute Z1trp when the attribute Z1pu is asserted.

Taking into account the proposition, the DS system in Table 1 is then modified prior to reanalysis using rough set as shown in Table 6.

Time (U)agbgcgZ1puZ4puZ1trpZ2trpZ3trpZ4trpTrip
t10000000000
t20000000000
t30000000000
t40100000000
t50200000000
t60200000000
t70200000000
t8010101000b
t9010101000b
t10010101000b
t11000100000b
t12000100000b
t13000100000b
t14000100000b
t15000100000b
t16000000000b
t17000000000b
t18000000000b
t19000000000b
t200000000000
t210000000000

Table 6.

Modified decision table DS to reflect protective relay operation behavior

From Table 6, the elementary sets with respect to the decision attribute D = {Trip} are still the same as shown in Table 2.

However, the elementary sets with respect to the shrunk condition = {ag, bg, cg, Z1pu, Z4pu, Z1trp, Z2trp, Z3trp, Z4trp} as shown in Table 7 are slightly different from those found with the whole attributes C considered (Table 3).

U│CagbgcgZ1puZ4puZ1trpZ2trpZ3trpZ4trp
{t1, t2, t3, t16, t17, t18, t19, t20, t21}000000000
{t4}010000000
{t5, t6, t7}020000000
{t8, t9, t10}010101000
{t11, t12, t13, t14, t15}000100000

Table 7.

Equivalence classes with respect to modified condition attributes C = {ag, bg, cg, Z1pu, Z4pu, Z1trp, Z2trp, Z3trp, Z4trp}

The new D-discernibility matrix of C as in Table 8 will result in new D-reducts and D-core of C when events are discerned with respect to the modified condition attributes C between different equivalence classes in the relation UIND(D). As before, similar consideration is taken in discerning events appearing only in different classes in D-space.

Ut1t2t3t4t5t6t7t8t9t10t11t12t13t14t15t16t17t18t19t20t21
t1Ø
t2ØØ
t3ØØØ
t4ØØØØ
t5ØØØØØ
t6ØØØØØØ
t7ØØØØØØØ
t8{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}Ø
t9{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}ØØ
t10{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}ØØØ
t11{Z1pu}{Z1pu}{Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}ØØØØ
t12{Z1pu}{Z1pu}{Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}ØØØØØ
t13{Z1pu}{Z1pu}{Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}ØØØØØØ
t14{Z1pu}{Z1pu}{Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}ØØØØØØØ
t15Z1pu}Z1pu}Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}{bg, Z1pu}ØØØØØØØØ
t16ØØØ{bg}{bg}{bg}{bg}ØØØØØØØØØ
t17ØØØ{bg}{bg}{bg}{bg}ØØØØØØØØØØ
t18ØØØ{bg}{bg}{bg}{bg}ØØØØØØØØØØØ
t19ØØØ{bg}{bg}{bg}{bg}ØØØØØØØØØØØØ
t20ØØØØØØØ{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{Z1pu}{Z1pu}{Z1pu}{Z1pu}{Z1pu}ØØØØØ
t21ØØØØØØØ{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{bg, Z1pu, Z1trp}{Z1pu}{Z1pu}{Z1pu}{Z1pu}{Z1pu}ØØØØØØ

Table 8.

D-discernibility matrix of modified C

The Boolean discernibility function is formulated from the discernibility matrix as follows:

fC(D)

=(bg+Z1pu+Z1trp) (Z1pu) × (Z1pu+Z1trp) (bg+Z1pu) (bg) × (bg+Z1pu+Z1trp) (bg+Z1pu) (bg) × (bg+Z1pu+ Z1trp) × Z1pu

=(Z1pu) × (Z1pu+Z1trp) (bg) × (bg) × (bg+Z1pu+Z1trp) × Z1pu

=(Z1pu) (bg) → The final Disjunctive Normal Form (DNF) of fC(D)

There is only one D-reduct of C, REDD(C) = {bg, Z1pu}. As shown in Table 9, it can alternatively be used to represent exactly similar equivalence relation UIND(D) of the down scaled DS as that represented by the whole set of attributes C. The D-core of C is the set of all single entries of the D-discernibility matrix, (or CORED(C) = ∩REDD(C)), i.e. {bg, Z1pu}. In this case, the D-core of C is similar to D-reduct of C.

As previously discussed, the possibility of the core inferring the power system state the relay has been subjected to is really prominently singled out now by the new CORED(C) = {bg, Z1pu}. Due the very characteristic of indispensability of core, it is undoubtedly identified that a A-G fault has occurred and consequently the relay’s Z1 ground distance element has picked up to get rid of it. This eventually translates into the trip decision having patterns such as that presented by the attribute Trip shown all along.

Time (U)bgZ1puTrip
t1000
t2000
t3000
t4100
t5200
t6200
t7200
t811b
t911b
t1011b
t1101b
t1201b
t1301b
t1401b
t1501b
t1600b
t1700b
t1800b
t1900b
t20000
t21000

Table 9.

Equivalent decision table with respect to REDD(C) = {bg, Z1pu}

4.3. Protective relay decision algorithm discovery

As aforementioned, a relay decision algorithm in DS called CD-decision algorithm manifests as a CD-decision table. It comprises a finite set of relay CD-decision rules or instructions. The event report of a protective distance relay in the form of a DS is a manifestation of relay decision algorithm. In protection system, protection engineers relate relay decision algorithm as relay operation logic. It is envisaged that with rough set theory, the relay operation logic knowledge can be discovered. Later it can be transformed into a knowledge base of a decision support system for determining anticipated relay behavior out of a new test DS [7].

Checking whether or not all the relay operation logics (decision rules) are true would enable us to check whether or not a relay decision algorithm is consistent. As aforementioned, consistency is measured by the degree of dependency k (or alternatively, dependency is measured by the degree of consistency) [10]. Thus, it is well understood that with the degree of consistency given in Equation (10),

k =card POS(C,D)card (CDdecision algorithm)E23

a relay CD-decision algorithm has a degree k, i.e. the degree of dependency between condition attributes C = {ag, bg, cg, Z1pu, Z4pu, Z1trp, Z2trp, Z3trp, Z4trp} and decision attributes D = {Trip}.

The relay CD-decision rules (C → D) are:

rule 1:ag0 bg0 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Trip0

rule 2:ag0 bg0 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Trip0

rule 3:ag0 bg0 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Trip0

rule 4:ag0 bg1 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Trip0

rule 5:ag0 bg2 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Trip0

rule 6:ag0 bg2 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Trip0

rule 7:ag0 bg2 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Trip0

rule 8:ag0 bg1 cg0 Z1pu1 Z4pu0 Z1trp1 Z2trp0 Z3trp0 Z4trp0Tripb

rule 9:ag0 bg1 cg0 Z1pu1 Z4pu0 Z1trp1 Z2trp0 Z3trp0 Z4trp0Tripb

rule 10:ag0 bg1 cg0 Z1pu1 Z4pu0 Z1trp1 Z2trp0 Z3trp0 Z4trp0Tripb

rule 11:ag0 bg0 cg0 Z1pu1 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Tripb

rule 12:ag0 bg0 cg0 Z1pu1 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Tripb

rule 13:ag0 bg0 cg0 Z1pu1 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Tripb

rule 14:ag0 bg0 cg0 Z1pu1 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Tripb

rule 15:ag0 bg0 cg0 Z1pu1 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Tripb

rule 16:ag0 bg0 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Tripb

rule 17:ag0 bg0 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Tripb

rule 18:ag0 bg0 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Tripb

rule 19:ag0 bg0 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Tripb

rule 20:ag0 bg0 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Trip0

rule 21:ag0 bg0 cg0 Z1pu0 Z4pu0 Z1trp0 Z2trp0 Z3trp0 Z4trp0Trip0

The two sets of relay decision rules, i.e. rules 1, 2, 3 and rules 16, 17, 18, 19, altogether totaling 7 rules, are inconsistent (false). The positive region of the CD-decision algorithm consists of only consistent decision rules 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 20 and 21 (i.e. card POS(C,D) = 14) and, hence, the degree of dependency is k = 14/21= 0.67. Since there are decision rules in the algorithm that are consistent only by the degree of 0.67 (i.e. false), the relay CD-decision algorithm is said to be inconsistent. The decision classes are not all uniquely discernible by conditions of all decision rules in the CD-decision algorithm. In other words, there are at least two decision rules having the same conditions but different implications in the decision. This phenomenon is certainly anticipated especially as shown by rules 16, 17, 18, and 19 whereby the decision attribute Trip remains in the value “b” reflecting the actual distance relay operation behavior. Technically speaking, irrespective of the presence or otherwise of the fault (assertion via attribute “bg”) and zone 1 element pick-up (assertion via attribute “Z1pu”), the relay trip signal remains asserted for a certain preset duration of time [7].

4.4. Protective relay decision algorithm simplification

Algorithm reduction results in simplification of the CD-decision algorithm. This is done by investigating whether all condition attributes are necessary to make decisions. Therefore, reducing CD-decision algorithm is essentially closely related to the previous discussion on reducing DS.

The subset of condition attributes C′ ⊆ C is called a reduct of C in the CD-decision algorithm if the CD-decision algorithm is independent and consistent, i.e. POS(C′,D) = POS(C,D). Therefore, the following terms are valid:

  • CD-decision algorithm is reduct of CD-decision algorithm.

  • The set of all reducts of CD-decision algorithm is called RED(C,D)

  • The set of all indispensible condition attributes in the CD-decision algorithm is called the core of the of the CD-decision algorithm and, similarly like before, takes on the expression, CORE(C,D) = ∩RED(C,D). (In principle it is similar to the expression CORED(C) = ∩REDD(C)).

The modified DS in Table 6 had found its only reduct of condition attributes, RED(C,D) = REDD(C) = {bg, Z1pu}, in the relay CD-decision algorithm. The core had a similar set as that of the reduct, i.e. CORE(C,D) = ∩RED(C,D) = {bg, Z1pu}. The resulting equivalent DS with respect to RED(C,D) = {bg, Z1pu} in Table 9 produces a rather simplified version of relay CD-decision algorithm, i.e.,

rule 1:bg0 Z1pu0Trip0

rule 2:bg0 Z1pu0Trip0

rule 3:bg0 Z1pu0Trip0

rule 4:bg1 Z1pu0Trip0

rule 5:bg2 Z1pu0Trip0

rule 6:bg2 Z1pu0Trip0

rule 7:bg2 Z1pu0Trip0

rule 8:bg1 Z1pu1Tripb

rule 9:bg1 Z1pu1Tripb

rule 10:bg1 Z1pu1Tripb

rule 11:bg0 Z1pu1Tripb

rule 12:bg0 Z1pu1Tripb

rule 13:bg0 Z1pu1Tripb

rule 14:bg0 Z1pu1Tripb

rule 15:bg0 Z1pu1Tripb

rule 16:bg0 Z1pu0Tripb

rule 17:bg0 Z1pu0Tripb

rule 18:bg0 Z1pu0Tripb

rule 19:bg0 Z1pu0Tripb

rule 20:bg0 Z1pu0Trip0

rule 21:bg0 Z1pu0Trip0

Each relay CD-decision rule designation corresponds to the row label in the DS; for example, rule 9 corresponding to row label t9.

The relay CD-decision algorithm can be cut down by removing duplicate relay CD-decision rules,

rule 1′ (1, 2, 3, 20, 21):bg0 Z1pu0Trip0

rule 2′ (4):bg1 Z1pu0Trip0

rule 3′ (5, 6, 7):bg2 Z1pu0Trip0

rule 4′ (8, 9, 10):bg1 Z1pu1Tripb

rule 5′ (11, 12, 13, 14, 15):bg0 Z1pu1Tripb

rule 6′ (16, 17, 18, 19):bg0 Z1pu0Tripb

From the apparently inconsistent rules 1′ and 6′, i.e. similar conditions but dissimilar decisions, the simplified relay CD-decision algorithm reveals pronouncedly its inconsistent nature. This inconsistency may not be desirable in some information system analysis. However, in as far as protective relay operation is concerned, it is interesting to know, among others:

  • the time delay between relay pick-up and relay trip signal assertion – traced by identifying the translated time sequence (DS row label) from rule 4 (t4) to rule 8 (t8),

  • the lapsed time of the relay assertion in instructing the circuit breaker to open its contacts – traced by identifying the translated time sequence from rule 8 (t8) to rule 15 (t15) and eventually to rule 19(t19), and

  • the affected pole(s) – determined from the decision attribute Trip value.

Decision rules 2′, 3′, 4′, and 5′ are the consistent ones that constitute the positive region of the CD-decision algorithm.

The core CORE(C,D) = {bg, Z1pu} can be justified why it is so. By dropping the attributes bg or Z1pu, one step at a time, their indispensability can be seen and whether the positive region that consists of the consistent rules changes can be checked. Different positive region is obtained by removing attribute bg:

rule 1′ (1, 2, 3, 20, 21):Z1pu0Trip0

rule 2′ (4):Z1pu0Trip0

rule 3′ (5, 6, 7):Z1pu0Trip0

rule 4′ (8, 9, 10):Z1pu1Tripb

rule 5′ (11, 12, 13, 14, 15):Z1pu1Tripb

rule 6′ (16, 17, 18, 19):Z1pu0Tripb

Likewise, the positive region can be changed as well by removing attribute Z1pu:

rule 1′ (1, 2, 3, 20, 21):bg0Trip0

rule 2′ (4):bg1Trip0

rule 3′ (5, 6, 7):bg2Trip0

rule 4′ (8, 9, 10):bg1Tripb

rule 5′ (11, 12, 13, 14, 15):bg0Tripb

rule 6′ (16, 17, 18, 19):bg0Tripb

Thus, when one by one the said condition attributes is removed, the changes incurred in the positive region of the relay CD-decision algorithm concur with the core attributes’ indispensability. Thus, the core having both attributes {bg, Z1pu} is correct.

4.5. Protective relay decision algorithm minimization

It is subsequently desirable to further minimize the decision rules in the relay CD-decision algorithm after the above simplification via reduction of the set of condition attributes. This is achieved by removal of any possibly superfluous decision rules which essentially involves reducing the superfluous values of attributes. In other words, the unnecessary conditions have to be separately removed leaving only the core attribute in each decision rule of the algorithm [10].

The tabulated version of the above simplified relay CD-decision algorithm is shown in Table 10.

UbgZ1puTrip
1′ (1, 2, 3, 20, 21)000
2′ (4)100
3′ (5, 6, 7)200
4′ (8, 9, 10)11a
5′ (11, 12, 13, 14, 15)01a
6′ (16,17,18,19)00a

Table 10.

DS of simplified CD-decision algorithm

In Table 11 the condition attribute of each decision rule in Table 10 is removed one by one. In each removal the resultant rule is cross checked with other rules to find whether they are in conflict (inconsistent). This cross reference with other rules is to figure out whether the remaining condition attribute’s value is the same but implication on the decision attribute is different. This process discovers the core attribute(s) that when eliminated causes the corresponding decision rule, or in general the CD-decision algorithm, inconsistent and consequently invalid (albeit not necessarily in the relay analysis perspective).

In summary, Table 12 contains cores of each decision rule. The condition attribute having eliminated value can be said as having no effect whatsoever on the CD-decision algorithm and may be termed as “don’t care”. It can be assigned with a value or otherwise. Combining duplicate rules and demarcating separate decision classes, Table 13 is obtained.

For decision attribute Trip = 0, one minimal set of decision rules is obtained from

bg0 Z1pu0 → Trip0

bg1 Z1pu0 → Trip0

bg2 → Trip0

i.e.

bg0 Z1pu0 ∨ bg1 Z1pu0 ∨ bg2 → Trip0

For decision attribute Trip = a, one minimal set of decision rules is obtained from

Z1pu1 → Tripb

bg0 Z1pu0 → Tripb

i.e.

Z1pu1 ∨ bg0 Z1pu0 → Tripb

The combined form of the minimal CD-decision algorithm is

bg0 Z1pu0 ∨ bg1 Z1pu0 ∨ bg2 → Trip0

or,

Z1pu0 (bg0 ∨ bg1) ∨ bg2 → Trip0

and

bg0 Z1pu0 ∨ Z1pu1 → Tripb

The final form of CD-decision algorithm can now be easily interpreted as follows:

  • The decision rule Z1pu0 (bg0 ∨ bg1) ∨ bg2 → Trip0 is interpreted as,

    IF Z1pu = 0 AND either bg = 0 OR bg = 1 OR IF bg = 2, THEN Trip = 0.

    The non-trip assertion (Trip = 0) is imminent with either one of the following situations:

    1. when no fault occurs (bg = 0) and no relay pick-up (Z1pu = 0), or

    2. when a A-G fault occurs in zone 1(bg = 1) and no relay pick-up (Z1pu = 0), or

    3. when a A-G fault occurs in zone 2 (bg = 2)

  • The decision rule bg0 Z1pu0 ∨ Z1pu1 → Tripb is interpreted as,

    IF Z1pu = 0 AND bg = 0 OR IF Z1pu = 1, THEN Trip = b.

    The trip assertion (Trip = b) is imminent with either one of the following situations:

    1. when there is no more fault indication (bg = 0) and relay pick-up element has reset (Z1pu = 0), or

    2. when relay pick-up element remains asserted (Z1pu = 1)

    Item i. indicates the fact that trip assertion Trip = b is still present in the face of the fault and relay pick-up resets (i.e. bg = 0 and Z1pu = 0) suggests that the preset time duration of the trip assertion is taking place.

CD-decision algorithmRemoved
attribute
Resultant
rule to
check
At least one other rule in conflictCore attribute
bgZ1pu
rule 1′ (1, 2, 3, 20, 21): bg0 Z1pu0 Trip0{Z1pu0 Trip0rule 6′: Z1pu0 Tripb} bg, Z1pu
bg0Trip0rule 5′: bg0Tripb
rule 2′ (4): bg1 Z1pu0Trip0{Z1pu0 Trip0rule 6′: Z1pu0Tripb} bg, Z1pu
bg1 Trip0rule 4′: bg1Tripb
rule 3′ (5, 6, 7): bg2 Z1pu0 Trip0{Z1pu0 Trip0rule 6′: Z1pu0 Tripb} bg
bg2 Trip0none
rule 4′ (8, 9, 10): bg1 Z1pu1 Tripa{Z1pu1 Tripbnone} Z1pu
bg1 Tripbrule 2′: bg1Trip0
rule 5′ (11, 12, 13, 14, 15): bg0 Z1pu1 Tripb{Z1pu1 Tripbnone} Z1pu
bg0 Tripbrule 1′: bg0 Trip0
rule 6′ (16, 17, 18, 19): bg0 Z1pu0 Tripb{Z1pu0 Tripbrule 1′: Z1pu0Trip0} bg, Z1pu
bg0 Tripbrule 1′: bg0Trip0

Table 11.

Eliminating unnecessary condition attribute in decision rules

UbgZ1puTrip
1′000
2′100
3′2-0
4′-1b
5′-1b
6′00b

Table 12.

Cores of decision rules

UbgZ1puTrip
1′000
2′100
3′2-0
4′′ (4′,5′)-1b
6′00b

Table 13.

Cores of decision rules

Advertisement

5. Conclusion

Rough set theory has been proven to be an essentially useful mathematical tool in intelligent data mining analysis of inconsistent and vague protective relay data pattern as evident in the rough classification involved in the assertion of the trip decision attribute. The adoption of rough set theory is managed under supervised learning.

A single D-reduct of C (i.e. REDD(C) = {bg, Z1pu}) has been discovered after formulating the attribute priority of the distance relay operation to trim the DS. REDD(C) can alternatively be used to represent exactly the same equivalence relation U│IND(D) represented by the whole set of attributes C. Relying on the reduced number of condition attributes represented by REDD(C), relay analysis that can be achieved at ease.

The D-core of C (i.e. CORED(C) = {bg, Z1pu}), determined as the set of all single entries of the D-discernibility matrix, provides us with a novel technique in inferring the power system state where the relay has been subjected to. The core, because of its indispensability nature, draws our attention undoubtedly to the fact that an B-G fault has occurred and consequently the relay’s Z1 ground distance element has picked up to eliminate it. This eventually translates into the trip decision having patterns such as that presented by the attribute Trip.

The degree of dependency k < 1 of the relay CD-decision algorithm justifies our anticipation of rough classification in the distance relay data. This is evidently shown in some of the rules that have the decision attribute Trip remain asserted with the value “b” for a certain preset duration of time. This is irrespective of the presence or absence of the fault via the assertion of attribute “bg” and zone 1 element pick-up via the assertion of attribute “Z1pu”).

The RED(C,D) = {bg, Z1pu} provides us with the discovery of the relay CD-decision algorithm in a simple form. By eliminating any possible superfluous decision rules, isolating condition attributes, one value at a time, further minimization of the algorithm can be performed.

Advertisement

Acknowledgement

This work was supported by the Ministry of Higher Education Malaysia under the 2011 Fundamental Research Grant Scheme with the project code FRGS/1/11/TK/UPM/03/4 and project file code 1057FR.

References

  1. 1. Bakar A H A2001Disturbance Analysis in TNB Transmission System. Developments in Power System Protection Conference. IEE Publication 479479339442
  2. 2. KummJ. J.WeberM. S.SchweitzerE. O.HouD.1994Philosophies For Testing Protective Relays. 48th Annual Georgia Tech Protective Relaying Conference, Atlanta, Georgia.
  3. 3. KezunovicM.2001Section II: Equipment characteristics. IEEE Tutorial on Automated Fault Analysis. Texas A&M University, College Station, USA, July, 59
  4. 4. KezunovicM.2001Section III: Scope of Analysis. IEEE Tutorial on Automated Fault Analysis. Texas A&M University, College Station, USA, July, 1013
  5. 5. Shapiro G P1997Data Mining and Knowledge Discovery: The Third Generation, Foundations of Intelligent Systems. Berlin / Heidelberg: Springer. 13254849
  6. 6. KimG. C.MohdZin. A. A.ShukriZ.2005COMTRADE-Based Fault Information System for TNB Substations. IEEE Proc. Region 10 TENCON, Melbourne, Australia. 16
  7. 7. OthmanM. L.ArisI.AbdullahS. M.AliM. L.OthmanM. R.2009Discovering Decision Algorithm from a Distance Relay Event Report. European j. scientific research, 313056
  8. 8. PawlakZ.2002Rough Set and Intelligent Data Analysis. Int. j. information sciences. 147112
  9. 9. HuangC. L.LiT. S.PengT. K.2005A Hybrid Approach Of Rough Set Theory And Genetic Algorithm For Fault Diagnosis. Int. j. advanced manufacturing technology, Springer-Verlag London, 27(1-2): 119 EOF127 EOF
  10. 10. PawlakZ.1991Rough Sets- Theoretical Aspects of Reasoning about Data. Dordrecht/Boston/London: Kluwer Academic Publishers.
  11. 11. WalczakB.MassartD. L.1999Rough Sets Theory: Tutorial”, Chemometrics and intelligent laboratory systems. 471116
  12. 12. PawlakZ.1995Rough Set Approach To Knowledge-Based Decision Support. 14th European j. operational research, Jerusalem, Israel, 4857
  13. 13. HorC. L.CrossleyP. A.2006Substation Event Analysis Using Information from Intelligent Electronic Devices. Int. j. electrical power and energy systems, 286374386
  14. 14. PawlakZ.WongS. K. M.ZiarkoW.1988Rough Sets: Probalistic versus Deterministic Approach. Int. j. man-machine studies. 298195
  15. 15. KomorowskiJ.PawlakZ.PolkowskiL.SkowronA.1999Rough Fuzzy Hybridization-A New Trend in Decision Making. In: Pal S K, Skowron A, editors. Rough Sets: A Tutorial. New York: Springer.
  16. 16. ZiarkoW.ShanN.1995Discovering Attribute Relationships, Dependencies And Rules By Using Rough Sets. Proceedings of the 28th Annual Hawaii International Conference on System Sciences (HICSS ‘95), 293299
  17. 17. PawlakZ.2003Rough Sets. Technical paper, Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Gliwice, and University of Information Technology and Management, Warsaw, Poland. 151
  18. 18. PawlakZ.2004Some Issues on Rough Sets. In: Peters J F et al., editors. Transactions on Rough Sets I LNCS 3100. Verlag, Berlin, Heidelberg: Springer. 158
  19. 19. SkowronA.RauszerC.1992The Discernibility Matrices and Functions in Information System. In: Slowinski R, editors. Intelligent Decision Support: Handbook of Applications and Advances of the Rough Sets Theory. Series D: System Theory, Knowledge Engineering and Problem Solving. Dordrecht: Kluwer Academic Publishers. 11, 331362

Written By

Mohammad Lutfi Othman and Ishak Aris

Submitted: 10 November 2011 Published: 12 September 2012