With the fast development of information technology, communication technology and computer technology, the smart substation has been developed rapidly. The signal collecting facilities in the smart substation are mainly consisted of electronic instrument transformers and merging units. However, because the production technology is not very mature, the use of electronic instrument transformers brings some problems. The abnormal data is one of the most serious problems. It is the data which is usually much larger than the actual value. There are many accident reports due to abnormal data. How to decrease the influence of abnormal data is a very important research direction as discussed in  .  and  give some methods on how to detect the abnormal data, but the influence of abnormal data is lacked. After deeply studying the abnormal data properties and smart substation’s characters, this paper defines five parameters to describe the abnormal data’s influence. The influence on Fourier Algorithm and relay protection are then studied.
2. Abnormal Data’s Characters and Influence
2.1. Abnormal Data’s Characters
The influence of the abnormal data (Figure 1 and Figure 2) can be described by five parameters: uniformity degree, phase, error value, alternative degree and duration time. Limited by the thesis’ length, the analysis process is omitted. The conclusion is as following.
1) Uniformity degree describes the difference of the gap between two adjacent abnormal data. The higher the uniformity degree is, the more the abnormal data influences the relay protection system.
2) Phase describes the phase of the abnormal data, also its position. If the abnormal data occurs in the peak value of the signal, it has the maximum influence; if it occurs in the zero crossing point, it has the minimum influence. In other positions, the influence is in the middle.
3) Error value describes the difference between the abnormal value and the normal value. The bigger the error value is, the bigger the influence is.
4) Alternative degree is defined as the angle difference of a pair of adjacent abnormal data whose values are in different sign. The bigger the alternative degree is, the smaller the influence is.
Figure 1. Abnormal data with high uniformity degree (left) and low uniformity (right).
Figure 2. Abnormal data with high alternativity degree (left) and low alternativity (right).
5) Duration time describes how long time the abnormal data lasts. The longer the duration time, the bigger the influence is.
2.2. The Influence of Abnormal Data to Fourier Algorithm
Fourier algorithm is widely used in the relay protection, for it has the advantage of high speed, simple to realize, highly reliable and it can separate the different frequency components. The abnormal data has much influence on Fourier Algorithm.
Imagine that for the sinuous signal, there are N sampling points in each period and the amplitude of the sinuous signal equals to A. The distance of the abnormal data to the peak value is equal to M as shown in Figure 3.
is the ith sampling value of the sinuous signal, the abnormal data occurs in the nth point and its value equals to.
The expression of the original fundamental wave amplitude is,
Figure 3. Abnormal data position.
The expression of fundamental wave amplitude with abnormal data is,
Suppose, then we have,
According to Fourier Algorithm, , so
So the error of signal amplitude with abnormal data is,
From Equation (6), we can see that when s becomes bigger and M becomes smaller, the error of the signal amplitude becomes bigger. It is reasonable to conclude that the bigger the error value of the abnormal data, the closer the abnormal point close to the peak, the more an abnormal data influences the result calculated by Fourier Algorithm.
3. The Influence of Abnormal Data to Relay Protection
3.1. The Influence of Abnormal Data to Distance Protection
In order to test the influence of abnormal data to distance protection, a simulation model is established as shown in Figure 4.
In the simulation model, the length of L1 is 20 km, the length of L2 is 15 km. The current on L1 varies from 40 A to 50 A, the current on L3 varies from 35 A to 40 A. The minimum branching factor of protection on L1 equals to 1.7.
According to the distance protection theory, the setting value of protection is calculated by Equation (7) and Equation (8).
Figure 4. Model for distance protection.
Z1 is the unit length positive sequence impedance.
is the safety factor, here we put
is the safety factor, here we put
is the minimum branching factor.
In the simulation, there are 40 sampled values in each period. The amplitude of the abnormal data varies from two times the original value to five times the original value. The occurrence possibility of abnormal data on voltage signal is 0.1. The simulation result is shown in Table 1.
The theoretical boundary of protection I is 16 km. We can find that when the fault position is very close to S1, protection I can always start normally. But when the fault position is far from S1 especially close to the boundary of protection I (15 km to S1), protection II may start instead of protection I. This is because when the fault is close to S1, the calculated impedance is very small. Though the abnormal data may enlarge the calculated impedance (abnormal data on the voltage signal), it still falls in the area of protection I. But when the fault occurs close to the boundary of protection I, the calculated impedance may fall into the area of protection II with the influence of abnormal data. This extends the fault’s influence.
3.2. The Influence of Abnormal Data to Over current Protection
In order to test the influence of abnormal data to over current protection, a simulation model is established as shown in Figure 5.
The length of Line 1 equals to 20 Km. The phase-to-phase rms voltage of S1 is 35 kv; the phase-to-phase rms voltage of S2 is 10 kv. The rated active power of Load 1 is 20 kw and its inductive power factor equals to 0.8; the rated active power of Load 2 is 15 kw and its inductive power factor equals to 0.6. I and II are two busbars of the system. Protection A is installed very close to I and protection B is installed very close to II.
According to the theory of over current protection, the setting values of instantaneous over current protection and time delay instantaneous over current protection are calculated by Equation (10) and Equation (11).
Table 1. Simulation result of distance protection.
Figure 5. Model for distance protection.
is the safety factor of instantaneous over current protection, here we put.
is the safety factor of time delay instantaneous over current protection, here we put.
is the minimum current when there is a fault on busbar II.
and are the setting values of instantaneous over current protection in Line 1 and Line 2. is the setting value of time relay protection in Line 1.
In the simulation, there are 40 sampled values in each period. The amplitude of the ab-normal data varies from two times the original value to five times the original value. The occurrence possibility of abnormal data on current signal is 0.1. The simulation result is shown in Table 2.
The theoretical instantaneous over current protection’s boundary is 6.8 km. We can see from the simulation result that the over current protection has the possibilities of starting without fault on the line. It is because the calculated current amplitude is enlarged with the abnormal data. This is a big threat to the safety operation of power system. We also find that in some conditions (in the last two lines) the instantaneous over current protection starts instead of time delay instantaneous over current protection. But this doesn’t have much influence on the power system safety.
The abnormal data is a very big threat to the safety of power system. It can enlarge the amplitude calculated by Fourier Algorithm and influence the normal
Table 2. Simulation result of over current protection of Line 1.
operation of relay protection system, extend the fault’s influence. The research on new method to detect the abnormal data and avoid its influence is an urgent task for researchers.