Abstract
The distinctive fault characteristics of battery energy storage stations (BESSs) significantly affect the reliability of conventional protection methods for transmission lines. In this paper, the three-dimensional (3D) data scattergrams are constructed using current data from both sides of the transmission line and their sum. Following a comprehensive analysis of the varying characteristics of 3D data scattergrams under different conditions, a 3D data scattergram image classification based protection method is developed. The depth-wise separable convolution is used to ensure a lightweight convolutional neural network (CNN) structure without compromising performance. In addition, a Bayesian hyperparameter optimization algorithm is used to achieve a hyperparametric search to simplify the training process. Compared with artificial neural networks and CNNs, the depth-wise separable convolution based CNN (DPCNN) achieves a higher recognition accuracy. The 3D data scattergram image classification based protection method using DPCNN can accurately separate internal faults from other disturbances and identify fault phases under different operating states and fault conditions. The proposed protection method also shows first-class tolerability against current transformer (CT) saturation and CT measurement errors.
WITH the accelerated development of renewable energy generation technologies, power systems have undergone profound changes. Large-scale renewable energy sources with strong randomness and volatility are being integrated into power grids, which leads to stability problems such as large power fluctuations and voltage and frequency instabilities [
The BESS, wind turbine, photovoltaic power plant, and modular multi-level converter (MMC) based converter stations are converter-interfaced sources, all of which are integrated into the power grid through power electronic converters, and to a certain extent, they exhibit partially similar fault characteristics. References [
Reference [
Method | Description | Feature |
---|---|---|
Conventional protection methods |
Protection methods for analysis of adapt ability problem [ | These protection methods may suffer from performance degradation and even rejection in the presence of converter-interfaced sources |
Distance protection methods [ |
These protection methods are not phase-segregated and cannot be used as the main protection in transmission networks | |
Differential protection methods applicable to presence of renewable plants [ |
These protection methods are developed in response to the fault features inherent in renewable plants and may incur performance degradation in the presence of BESSs. Also, they are negatively affected by CT saturation | |
Protection methods for lines connecting BESSs or voltage source converter based high-voltage direct current (VSC-HVDC) stations [ |
These protection methods are strongly influenced by the rational selection of thresholds and key parameters, which requires expert knowledge | |
Artificial intelligence based protection methods |
Machine learning based protection methods [ | The accuracy needs improvement and the generalization ability is poor |
Deep learning [ | The structure of network is complex with a large number of parameters and the computation is intensive |
The major contributions of this study are summarized as follows.
1) A theoretical derivation of the trajectory equations of the scattergrams constructed from the currents on both sides is presented. The three-dimensional (3D) data scattergrams are constructed based on the current data, and the differences in the 3D data scattergrams under different fault conditions are analyzed. The depth-wise separable convolution based CNN (DPCNN) is introduced to identify 3D data scattergram images for separating the internal and external faults.
2) The CNN is improved using depth-wise separable (DP) convolution, and the training process is simplified through Bayesian hyperparameter optimization. Compared with artificial neural networks (ANNs) and CNNs, the DPCNN has a higher accuracy rate.
3) The effectiveness of the proposed protection method is assessed using PSCAD and a real-time simulator (RT-Sim) considering various fault conditions, operating states, and non-ideal situations. The results demonstrate that the proposed protection method can be applied to transmission lines connecting a BESS and offers better performance than conventional differential protection methods and cosine-similarity (CS) based pilot protection.
The remainder of this paper is organized as follows. Section II describes how the 3D data scattergrams are constructed in different cases. Section III describes the DPCNN with Bayesian hyperparameter optimization method, and introduces the 3D data scattergram image classification based protection method. Section IV validates the effectiveness of the proposed protection method under different fault conditions, with comparison with other protection methods. Finally, a conclusion is provided in Section V.

Fig. 1 Modified IEEE-39 bus system with a 150 MW BESS. (a) Detailed model. (b) Simplified model.
Similar to the photovoltaic power plant and VSC-HVDC station, the fault current on the BESS side is controlled by a grid-connected converter, which can be expressed as:
(1) |
where is the fundamental frequency of power grid; is the initial angle of fault; and are the control parameters of the current loop; is the damping ratio; is the natural oscillation frequency; is the damped oscillation frequency; =arccos ζ; and are the reference values of the active and reactive fault currents, respectively, which can be obtained by referring to the grid code during a fault; and and are the initial values of active and reactive fault currents, respectively, which are determined by the operating state and control strategy. When the BESS operates in the discharging state, is positive; when the BESS operates in the charging state, is negative. Assuming that the converter operates at a unity power factor prior to the fault, .
From (1), it can be observed that the fault current of BESS contains both steady-state and transient components, and the transient component decays to 0 within a several milliseconds.
The fault current on the grid side can be expressed as:
(2) |
where Ig,ac is the peak of the power frequency current; Ig,dc is the initial value of the decaying DC current; is the initial phase angle; and is the decay time constant.
The phase angle difference between the fault currents on the two sides may vary over a broad range during an internal fault. The phase difference may be obtuse, particularly when the BESS operates in the charging state [

Fig. 2 Phase angle difference between and under different fault resistances and operating conditions.
When an external fault occurs, we have ib≈-ig according to Kirchhoff’s current law and considering that the capacitive current is much less than the fault current of transmission line. This indicates that currents and are nearly the same in amplitude and 180° out of phase. The sum of the currents on both sides .
Condition | Phase angle difference (°) | Sum of ig and ib |
---|---|---|
Internal fault | 0-360 (obtuse in charging state) | isum=ig+ib≠0 |
External fault/ normal condition | 180 | isum=ig+ib≈0 |
To integrate the fault current information, a 3D data scattergram is constructed, where the 3D data are ib, ig, and isum, respectively.
The currents on the BESS and grid sides at each sampling instant are taken as the horizontal and vertical coordinates of the scattergram, respectively. In the following, the dynamic trajectory constructed by (ib, ig) is analyzed.
Under the large fault resistance, the decaying DC component of the fault current on the grid side is negligible. The transient component of the fault current of the converter generally decays to zero in a few milliseconds, which is neglected to facilitate the analysis. In this case, the fault currents on both sides can be expressed as:
(3) |
where Ib and are the amplitude and phase angle of the current on the BESS side, respectively.
To obtain the expression for the trajectory of (ib, ig), the derivation process is as follows [
According to (3), the relationship between ib and ig can be derived as:
(4) |
(5) |
The sum of the squares of (4) and (5) is:
(6) |
From (6), the trajectory of (ib, ig) is an ellipse, and the shape of the ellipse depends on the differences in the amplitude and phase angle between ib and ig.
When or , (7) can be obtained, and the trajectory of (ib, ig) is a straight line.
(7) |
When , (8) can be obtained. The trajectory of (ib, ig) is a standard ellipse with the coordinate axis as the major axis. When , the ellipse becomes a standard circle.
(8) |

Fig. 3 Schematic of current trajectory with various phase angle differences.
The long axis of the ellipse is in the first and third quadrants when the phase angle difference is acute and is in the second and fourth quadrants when the phase angle difference is obtuse. The dashed box in
The increase in the fault resistance results in a corresponding decrease in the current amplitude on both sides. This implies that the maximum bounding rectangle will also shrink. When the fault resistance is large, the current is small, and the details may be difficult to observe and prone to judgment errors. To facilitate the analysis, we unify the size of the scattergram image formed by points (ib, ig) and use adaptive coordinate axes. The values of ib and ig have different ranges and are evenly distributed on the horizontal and vertical axes, respectively, according to their maximum and minimum values. Therefore, the actual image maintains equal lengths along the horizontal and vertical axes, although these lengths may correspond to varying ranges. The points in the scattergram are evenly distributed in the square area. In this case, the range of the current trajectory no longer represents the current amplitude information on both sides. Therefore, the sum of the currents on both sides, i.e., isum, is used as the third dimension of the 3D scattergram, giving a color to each point of the scattergram.

Fig. 4 Formation process of 3D data scattergram under a minor internal fault when BESS operates in charging state. (a) Current waveform. (b) 3D data scattergram for fault phase.
As shown in

Fig. 5 Formation process of 3D data scattergram under a severe internal fault when BESS operates in charging state. (a) Current waveform. (b) 3D data scattergram for fault phase.
When the fault resistance is small, the grid-side fault current clearly contains decaying DC component. The current trajectory generated in this case is somewhat shifted and no longer a standard ellipse, but the overall trajectory is still an elliptical-like arc. As shown in
The 3D data scattergrams under minor and severe internal faults when BESS operates in the charging state are given in Figs.

Fig. 6 3D data scattergram when BESS operates in discharging state. (a) Severe internal fault. (b) Minor internal fault.

Fig. 7 Current waveform and 3D data scattergram under an internal fault with CT saturation. (a) Current waveform. (b) 3D data scattergram.

Fig. 8 3D data scattergram under an external fault. (a) Without CT measurement error. (b) With CT measurement error.

Fig. 9 Current waveform and 3D data scattergram under an external fault with CT saturation. (a) Current waveform. (b) 3D data scattergram.
In summary, the 3D data scattergram constructed from [ib, ig, isum] contains a wealth of information, which can be effectively utilized to separate internal faults with fault phases from external faults. The 3D data scattergram has different characteristics under internal and external faults.
1) Without CT saturation and measurement error, the trajectory of the 3D data scattergram under internal faults is close to an elliptical arc, with most of the points colored in red and blue, and the trajectory of the 3D data scattergram under external faults is a straight line in green.
2) With CT saturation, the 3D data scattergram is distorted, and the distorted part is concentrated on the line . The parts that are not distorted still show differences in shape and color under internal and external faults.
3) With CT measurement error, the color of points in the 3D data scattergram under an external fault shows a gradient transition.
Distinguishing the 3D data scattergram images under internal and external faults is a standard classification problem. CNN is particularly apt for this type of classification problem due to its excellent nonlinear fitting and feature extraction capabilities.
In recent years, to improve the accuracy of image classification, the structure of deep neural networks has become deeper and wider [
To reduce the numbers of parameters and computations without sacrificing accuracy, a CNN architecture based on DP convolution, i.e., DPCNN, is introduced [
The DP convolution consists of two main parts: depth-wise (DW) convolution and point-wise (PW) convolution.

Fig. 10 Structures of convolutions. (a) Standard convolution. (b) DP convolution.
As shown in
The M DW convolutions correspond to the M channels of the feature map, and each DW convolution kernel performs convolution calculations only in the aspect direction. However, a PW convolution kernel performs convolution calculations only in the channel direction.
From
(9) |
When , is close to 1/9 of .
A comparison of the computational costs of the DP convolution (CD) and standard convolution (CC) results in:
(10) |
The computational burden of the DP convolution is substantially reduced and is approximately 1/9 of the standard convolution when .
Most deep learning algorithms have several hyperparameters, and the settings of these hyperparameters affect the performance of algorithms. Hyperparameters are generally manually set to tune the performance of the algorithm. However, the manual tuning is often time-consuming and relies heavily on expertise. Therefore, it is imperative to develop automated algorithms to determine the correct hyperparameters.
The hyperparameter search problem can be transformed into an optimization problem, of which the purpose is to determine the optimal parameters of the model and maximize the recognition accuracy of the validation set. The hyperparametric optimization is a black-box problem, in which only the input and output of the function can be obtained during the optimization process, and the expression and gradient of the optimization objective function cannot be obtained. This feature poses difficulties for hyperparametric optimization.
Bayesian optimization can be used to solve extreme value problems for functions with unknown expressions and is perfectly suited for hyperparameter optimization [
1) A probabilistic regression model is used to approximate black-box objective functions. The mean and variance of the objective function are estimated from the function values of the available observations. The most common probabilistic regression models are the Beta-Bernoulli model, Gaussian processes, and random forests.
2) An acquisition function is used to determine the point next to the sample. Common collection functions include probability improvement, expected improvement, and upper confidence bound functions.
The Bayesian hyperparameter optimization is an iterative process that consists of three main steps.
Step 1: select the next most “promising” acquisition point based on maximizing the acquisition function.
Step 2: obtain the objective function value yt based on the selected evaluation point xt.
Step 3: add the newly obtained point (xt, yt) to the historical observation set and update the probabilistic regression model in preparation for the next iteration.
In this study, the Bayesian hyperparameter optimization is implemented using the scikit-optimize library in Python, which is easy to operate. Random forest is chosen as the probabilistic regression model.
Type | Size of convolution kernel | Number of convolution kernels | Stride | Activation function |
---|---|---|---|---|
Standard convolution | 3×3×3 | 32 | (2, 2) | ReLU6 |
DP convolution 1 |
3×3×1 (DW) 1×1×32 (PW) |
32 (DW) 64 (PW) | (1, 1) | ReLU6 |
DP convolution 2 |
3×3×1 (DW) 1×1×64 (PW) |
64 (DW) 128 (PW) | (2, 2) | ReLU6 |
DP convolution 3 |
3×3×1 (DW) 1×1×128 (PW) |
128 (DW) 128 (PW) | (1, 1) | ReLU6 |
DP convolution 4 |
3×3×1 (DW) 1×1×128 (PW) |
128 (DW) 256 (PW) | (2, 2) | ReLU6 |
DP convolution 5 |
3×3×1 (DW) 1×1×128 (PW) |
256 (DW) 256 (PW) | (1, 1) | ReLU6 |
DP convolution 6 |
3×3×1 (DW) 1×1×256 (PW) |
256 (DW) 512 (PW) | (2, 2) | ReLU6 |
DP convolution (×l) |
3×3×1 (DW) 1×1×512 (PW) |
512 (DW) 512 (PW) | (1, 1) | ReLU6 |
GAP | ||||
FC | 2 | Softmax |
The number of convolution kernels is adjusted by multiplying the existing number of convolution kernels by a factor k, where k is less than 1. In addition, the number of network layers is varied by adding l DP convolution layers. The numbers of convolution kernels and network layers as well as the learning rate and batch size of the DPCNN model are optimized to obtain the optimal parameter values.

Fig. 11 Flowchart of proposed protection method.
Step 1: construct the dataset. One cycle of the three-phase current data on both ends of the transmission line is collected in real time. 3D data scattergram images are generated based on current data [ib, ig, isum], and these scattergram images are included in the dataset. The dataset is constructed considering multiple fault conditions, different operating states of BESS, CT saturations, and CT measurement errors. The dataset is segregated into training, validation, and test sets with a ratio of 8:1:1.
Step 2: construct and train the DPCNN. The DPCNN is constructed according to the structural features outlined in
Step 3: the 3D data scattergram images of the three phases are then fed into the trained DPCNN, and the image classification results are output to determine whether the images belong to the category of internal faults.
The proposed protection method has the natural function of identifying fault phases.
The studied system with a BESS having a capacity of 150 MW, as shown in
The currents on the two ends of transmission line 33-19 are measured to construct 3D data scattergram images to generate a large dataset.
Operating state of BESS | Fault location | Fault type | Fault resistance R (Ω) | Condition | Number of 3D data scattergram images |
---|---|---|---|---|---|
Charging state |
Internal fault: x=10%, 50%, and 90% External fault: bus 33 | AG, ABG | Normal condition | 256×3 | |
AB, ABC | |||||
Internal fault: x=50% External fault: bus 33 | AG, ABG | CT saturation | 128×3 | ||
AB, ABC | |||||
Internal fault: x=50% External fault: bus 33 | AG, ABG | 10% CT measurement error | 128×3 | ||
AB, ABC | |||||
Discharging state |
Internal fault: x=10%, 50%, and 90% External fault: bus 33 | AG, ABG | Normal condition | 256×3 | |
AB, ABC | |||||
Internal fault: x=10%, 50%, and 90% External fault: bus 33 | AG, ABG | CT saturation | 128×3 | ||
AB, ABC |
Under different conditions, a total of 896 simulation experiments are conducted using PSCAD, and 2688 3D data scattergram images are obtained to generate the dataset. The dataset is segregated into training, validation, and test sets with a split ratio of 8:1:1.
The DPCNN is built according to the structural features listed in
Hyperparameter | k | l | Learning rate | Dropout rate |
---|---|---|---|---|
Search space | {0.25, 0.5, 0.75, 1} |
[ | (0.001, 0.1) | |
Result | 1 | 1 | 0.0078 | 0.1 |
In the search space, the learning rate is defined as a continuous variable with values in the range of (0.001, 0.1), and the remaining hyperparameters are defined as discrete variables with values in the ranges listed in
A comparison of the DPCNN and CNN is conducted, with the specific structural features of the CNN presented in
Layer | Convolution layer | Activation function | Padding | Stride | Pooling type | |
---|---|---|---|---|---|---|
Number | Size | |||||
C1 | 32 | 3×3 | ReLU | Same | 1 | |
C2 | 64 | 3×3 | ReLU | Same | 1 | Max |
C3 | 128 | 3×3 | ReLU | Same | 1 | |
C4 | 128 | 3×3 | ReLU | Same | 1 | Max |
C5 | 256 | 3×3 | ReLU | Same | 1 | |
C6 | 256 | 3×3 | ReLU | Same | 1 | Max |
FC1 | 512 | ReLU | ||||
FC2 | 2 | Softmax |
Model | Accuracy (%) | Number ofparameters | ||
---|---|---|---|---|
Train set | Validation set | Test set | ||
DPCNN | 100.00 | 100.00 | 100.00 | 545474 |
CNN | 99.49 | 99.25 | 98.88 | 3224770 |

Fig. 12 Dichotomous confusion matrix. (a) DPCNN. (b) CNN.
To highlight the notable functionality of the DPCNN, it is compared with both a CNN and an artificial neural network (ANN), and the results are shown in
Protection method | Algorithm | Classification accuracy (%) |
---|---|---|
3D data scattergram image classification based protection | ANN | 97.77 |
CNN | 98.88 | |
DPCNN | 100.00 | |
Conventional protection | CDP | 88.10 |

Fig. 13 Comparison of different algorithms. (a) Different fault resistances. (b) Different fault types. (c) Different fault locations.
As observed in
Five conditions from the test set are considered to demonstrate the simulation results of the CDP and the proposed protection method based on 3D data scattergram images, as shown in

Fig. 14 Simulation results of CDP and 3D data scattergram images for fault phase under five conditions. (a) Condition 1. (b) Condition 2. (c) Condition 3. (d) Condition 4. (e) Condition 5.
1) Condition 1: an ABG-type internal fault with and when BESS operates in the charging state.
2) Condition 2: an ABC-type internal fault with and when BESS operates in the charging state.
3) Condition 3: an AG-type internal fault with and when BESS operates in the discharging state.
4) Condition 4: an AB-type external fault with considering CT saturation when BESS operates in the discharging state.
5) Condition 5: an ABG-type external fault with considering CT measurement error when BESS operates in the charging state.
As shown in
The 3D data scattergram highlights and magnifies the differences among the three sets of current data under internal and external faults. As described in Section II-C, the 3D data scattergram integrates information from [ib, ig, isum]. The 3D data scattergrams for internal and external faults differ significantly in the shape of their scatter trajectories and colors. This makes it easier for a DPCNN to identify internal and external faults. To verify the necessity and superiority of constructing 3D data scattergrams, a new dataset is constructed directly using unprocessed vector of [ib, ig, isum].
The machine learning algorithms including K-nearest neighbor (KNN), decision tree, and support vector machine (SVM) are used to train the new dataset, and the comparison results are shown in
Input | Algorithm | Classification accuracy (%) |
---|---|---|
Unprocessed vector of [ib, ig, isum] | KNN | 81.78 |
SVM | 84.39 | |
Decision tree | 84.01 | |
3D data scattergram | DPCNN | 100.00 |
The system, which includes a BESS with a capacity of 150 MW, is built on the RT-Sim based experimental platform to further test the performance of the proposed protection method.

Fig. 15 Experimental platform based on RT-Sim.
To reinforce the superiority of the proposed protection method, it is compared with the CS-based method proposed in [
Operating state of BESS | Fault type | Conditions | Number of experiments | Number of experiments correctly identified | ||
---|---|---|---|---|---|---|
CS-based method | Proposed protection method | |||||
Threshold is -0.9 | Threshold is -0.2 | |||||
Charging state | Internal fault | 5 | 5 | 3 | 5 | |
5 | 5 | 0 | 5 | |||
External fault | Without nonideal conditions | 4 | 4 | 4 | 4 | |
CT saturation | 3 | 0 | 2 | 3 | ||
CT measurement error | 4 | 4 | 4 | 4 | ||
Discharging state | Internal fault | 12 | 12 | 12 | 12 | |
10 | 10 | 10 | 10 | |||
External fault | Without nonideal conditions | 6 | 6 | 6 | 6 | |
CT saturation | 3 | 0 | 2 | 3 | ||
CT measurement error | 5 | 5 | 5 | 5 | ||
Total | 57 | 51 | 48 | 57 |
Based on fault current characteristics of BESS, a 3D data scattergram image classification based protection method using DPCNN is proposed, with the following conclusions.
1) The 3D data scattergram contains almost all the information of fault currents, including the currents on both ends of transmission line and their sum. The 3D data scattergram exhibits markedly different features under internal and external faults. Therefore, it can be employed to ascertain whether faults are internal or external using the CNN-based image classification method.
2) Using DP convolution instead of standard convolution enables the DPCNN to significantly reduce the number of parameters and computational cost without sacrificing accuracy. Compared with ANN and CNN, the DPCNN achieves higher accuracy in classifying internal and external faults.
3) Compared with the CDP, the proposed protection method functions accurately when BESS operates in both the charging and discharging states, regardless of fault conditions such as fault type, resistance, and location. In addition, the proposed protection method can ensure excellent security, even with CT saturation and measurement errors.
References
M. Rouholamini, C. Wang, H. Nehrir et al., “A review of modeling, management, and applications of grid-connected Li-ion battery storage systems,” IEEE Transactions on Smart Grid, vol. 13, no. 6, pp. 4505-4524, Nov. 2022. [Baidu Scholar]
U. Datta, A. Kalam, and J. Shi, “The relevance of large-scale battery energy storage (BES) application in providing primary frequency control with increased wind energy penetration,” Journal of Energy Storage, vol. 23, pp. 9-18, Jun. 2019. [Baidu Scholar]
L. M. S. de Siqueira and W. Peng, “Control strategy to smooth wind power output using battery energy storage system: a review,” Journal of Energy Storage, vol. 35, p. 102252, Mar. 2021. [Baidu Scholar]
Z. Guo, W. Wei, L. Chen et al., “Impact of energy storage on renewable energy utilization: a geometric description,” IEEE Transactions on Sustainable Energy, vol. 12, no. 2, pp. 874-885, Apr. 2021. [Baidu Scholar]
Y. Liang, W. Li, and G. Xu, “Performance problem of current differential protection of lines emanating from photovoltaic power plants,” Sustainability, vol. 12, no. 4, p. 1436, Feb. 2020. [Baidu Scholar]
A. Hooshyar, M. A. Azzouz, and E. F. El-Saadany, “Distance protection of lines emanating from full-scale converter-interfaced renewable energy power plants – part I: problem statement,” IEEE Transactions on Power Delivery, vol. 30, no. 4, pp. 1770-1780, Aug. 2015. [Baidu Scholar]
M. M. Alam, H. Leite, J. Liang et al., “Effects of VSC based HVDC system on distance protection of transmission lines,” International Journal of Electrical Power & Energy Systems, vol. 92, pp. 245-260, Nov. 2017. [Baidu Scholar]
J. Jia, G. Yang, A. H. Nielsen et al., “Impact of VSC control strategies and incorporation of synchronous condensers on distance protection under unbalanced faults,” IEEE Transactions on Industrial Electronics, vol. 66, no. 2, pp. 1108-1118, Feb. 2019. [Baidu Scholar]
K. Jia, J. Chen, Z. Xuan et al., “Active protection for photovoltaic DC-boosting integration system during FRT,” IET Generation, Transmission & Distribution, vol. 13, no. 18, pp. 4081-4088, Sept. 2019. [Baidu Scholar]
C. Chao, X. Zheng, Y. Weng et al., “Adaptive distance protection based on the analytical model of additional impedance for inverter-interfaced renewable power plants during asymmetrical faults,” IEEE Transactions on Power Delivery, vol. 37, no. 5, pp. 3823-3834, Oct. 2022. [Baidu Scholar]
Z. Yang, Q. Zhang, W. Liao et al., “Harmonic injection based distance protection for line with converter-interfaced sources,” IEEE Transactions on Industrial Electronics, vol. 70, no. 2, pp. 1553-1564, Feb. 2023. [Baidu Scholar]
P. Mishra, A. K. Pradhan, and P. Bajpai, “Adaptive distance relaying for distribution lines connecting inverter-interfaced solar PV plant,” IEEE Transactions on Industrial Electronics, vol. 68, no. 3, pp. 2300-2309, Mar. 2021. [Baidu Scholar]
L. Zheng, K. Jia, T. Bi et al., “Cosine similarity based line protection for large-scale wind farms,” IEEE Transactions on Industrial Electronics, vol. 68, no. 7, pp. 5990-5999, Jul. 2021. [Baidu Scholar]
L. Zheng, K. Jia, W. Wu et al., “Cosine similarity based line protection for large scale wind farms part II – the industrial application,” IEEE Transactions on Industrial Electronics, vol. 69, no. 3, pp. 2599-2609, Mar. 2022. [Baidu Scholar]
A. Saber, M. F. Shaaban, and H. H. Zeineldin, “A new differential protection algorithm for transmission lines connected to large-scale wind farms,” International Journal of Electrical Power & Energy Systems, vol. 141, p. 108220, Oct. 2022. [Baidu Scholar]
Z. Yang, W. Liao, H. Wang et al., “Improved euclidean distance based pilot protection for lines with renewable energy sources,” IEEE Transactions on Industrial Informatics, vol. 18, no. 12, pp. 8551-8562, Dec. 2022. [Baidu Scholar]
Y. Liang and C. Pan, “Time-domain differential protection based on operating and restraining trajectory indices for lines connecting battery storage energy stations,” Journal of Modern Power Systems and Clean Energy, vol. 12, no. 4, pp. 1074-1086, Jul. 2024. [Baidu Scholar]
Y. Liang, Y. Ren, and Z. Zhang, “Pilot protection based on two-dimensional space projection of dual differential currents for lines connecting MMC-HVDC stations,” IEEE Transactions on Industrial Electronics, vol. 70, no. 5, pp. 4356-4368, May 2023. [Baidu Scholar]
Y. Liang, C. Pan, and J. Zhang, “Current trajectory coefficient based time domain line protection for battery storage energy stations,” Journal of Energy Storage, vol. 51, p. 104468, Jul. 2022. [Baidu Scholar]
Y. Liang, X. Yang, Y. Wang et al., “Internal fault probability-based time domain differential protection applied to transmission lines connecting battery energy storage stations,” Journal of Energy Storage, vol. 55, p. 105707, Nov. 2022. [Baidu Scholar]
A. Jamehbozorg and S. M. Shahrtash, “A decision-tree-based method for fault classification in single-circuit transmission lines,” IEEE Transactions on Power Delivery, vol. 25, no. 4, pp. 2190-2196, Oct. 2010. [Baidu Scholar]
Y. Chen, O. Fink, and G. Sansavini, “Combined fault location and classification for power transmission lines fault diagnosis with integrated feature extraction,” IEEE Transactions on Industrial Electronics, vol. 65, no. 1, pp. 561-569, Jan. 2018. [Baidu Scholar]
Y. Zhu and H. Peng, “Multiple random forests based intelligent location of single-phase grounding fault in power lines of DFIG-based wind farm,” Journal of Modern Power Systems and Clean Energy, vol. 10, no. 5, pp. 1152-1163, Sept. 2022. [Baidu Scholar]
S. Afrasiabi, M. Afrasiabi, B. Parang et al., “Integration of accelerated deep neural network into power transformer differential protection,” IEEE Transactions on Industrial Informatics, vol. 16, no. 2, pp. 865-876, Feb. 2020. [Baidu Scholar]
J. Mei, R. Ge, Z. Liu et al., “An auxiliary fault identification strategy of flexible HVDC grid based on convolutional neural network with branch structures,” IEEE Access, vol. 8, pp. 115922-115931, Jun. 2020. [Baidu Scholar]
S. K. Murugan, S. P. Simon, and R. R. Eapen, “A novel signal localized convolution neural network for power transformer differential protection,” IEEE Transactions on Power Delivery, vol. 37, no. 2, pp. 1242-1251, Apr. 2022. [Baidu Scholar]
S. Hou, W. Guo, Z. Wang et al., “Deep-learning-based fault type identification using modified CEEMDAN and image augmentation in distribution power grid,” IEEE Sensors Journal, vol. 22, no. 2, pp. 1583-1596, Dec. 2022. [Baidu Scholar]
X. Wang, C. Li, Z. Liang et al., “Fault feeder detection method of distribution network based on Grampian angular field and convolutional neural network,” CSEE Journal of Power and Energy Systems, doi: 10.17775/CSEEJPES.2022.00080. [Baidu Scholar]
Z. Xu, Z. Tang, T. Ji et al., “Detection and identification of underground cable incipient faults based on denoising autoencoder and optimized convolutional neural network,” in Proceedings of 2023 International Conference on Power System Technology (PowerCon), Jinan, China, Sept. 2023, pp. 1-9. [Baidu Scholar]
Y. Liang, Y. Ren, J. Yu et al., “Current trajectory image-based protection algorithm for transmission lines connected to MMC-HVDC stations using CA-CNN,” Protection and Control of Modern Power Systems, vol. 8, no. 1, pp. 1-15, Jan. 2023. [Baidu Scholar]
Manitoba Hydro International Ltd. (2018, May). IEEE 39 bus system. [Online]. Available: https://hvdc.ca/knowledge-base/read,article/28/ieee-39-bus-system/v [Baidu Scholar]
B. Wu, “Fundamentals of Mechanical Vibration,” in Physics, Xi’an: Xi’an Jiaotong University Press, 2009. [Baidu Scholar]
K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” in Proceedings of 3rd International Conference on Learning Representations, ICLR 2015 – Conference Track Proceedings, San Diego, USA, May 2015, pp. 1-12. [Baidu Scholar]
C. Szegedy, W. Liu, Y. Jia et al., “Going deeper with convolutions,” in Proceedings of 2015 IEEE Conference on Computer Vision and Pattern Recognition, Boston, USA, Jun. 2015, pp. 1-9. [Baidu Scholar]
A. G. Howard, M. Zhu, B. Chen et al. (2017, Apr.). “MobileNets: efficient convolutional neural networks for mobile vision applications. [Online]. Available: https://arxiv.org/abs/1704.04861 [Baidu Scholar]
B. Shahriari, K. Swersky, Z. Wang et al., “Taking the human out of the loop: a review of Bayesian optimization,” Proceedings of the IEEE, vol. 104, no. 1, pp. 148-175, Jan. 2016. [Baidu Scholar]
B. Bischl, M. Binder, M. Lang et al., “Hyperparameter optimization: foundations, algorithms, best practices, and open challenges,” WIREs Data Mining and Knowledge Discovery, vol. 13, no. 2, pp. 1-43. Mar. 2023. [Baidu Scholar]