CN105046582A - Convenient power grid security risk evaluation method - Google Patents

Convenient power grid security risk evaluation method Download PDF

Info

Publication number
CN105046582A
CN105046582A CN201510424424.5A CN201510424424A CN105046582A CN 105046582 A CN105046582 A CN 105046582A CN 201510424424 A CN201510424424 A CN 201510424424A CN 105046582 A CN105046582 A CN 105046582A
Authority
CN
China
Prior art keywords
index
risk
layer
value
evaluation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510424424.5A
Other languages
Chinese (zh)
Inventor
张乐
黄峰
张晓沛
王鹏
於耘新
岑新
李烽
范春阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Nantong Power Supply Co of Jiangsu Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Nantong Power Supply Co of Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Nantong Power Supply Co of Jiangsu Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Publication of CN105046582A publication Critical patent/CN105046582A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention discloses a convenient power grid security risk evaluation method. The method comprises: performing layering on risk factors by using an analytic hierarchy process, and calculating a weight of influence of each risk factor on a system by using the analytic hierarchy process; and then using a D-S evidence theory to correct weight determination by the analytic hierarchy process, combining evidences by using an evidence theory combination rule, and performing ranking on security and effectiveness of each risk factor according to a combined basic reliability distribution function to finally obtain the security and effectiveness level of the system. The method is accurate and effective, and is convenient in evaluation.

Description

Grid security risk assessment method easily
The application is application number: the divisional application of 201510412517.6, the applying date: 2015.7.14, title " grid security risk assessment method ".
Technical field
The present invention relates to a kind of grid security risk assessment method.
Background technology
In recent years, the sustainable development of China's economic is filled with new vitality to the development of power industry, and need for electricity constantly increases, and electric network composition and scale strengthen day by day, and the complex characteristics of electric system also shows become clear day by day.This has higher requirement and challenges to the security and stability control of modern power systems.Under the large good prospect greatly developing intelligent grid, people are to ensureing that the safe and stable operation of electric system is more confident.But people have in the face of a fact---electric system large-area power-cuts risk exists all the time.By the analysis to a series of large-area power-cuts events in recent years, traditional safety evaluation method (comprising deterministic stability analysis and probabilistic appraisal procedure) all Shortcomings parts can be found out.Therefore, except continuing to improve except existing various safety and risk analytical approach, also more complete power system security risk evaluation system must be sought from practical angle.
Summary of the invention
The object of the present invention is to provide one grid security risk assessment method accurately and effectively.
Technical solution of the present invention is:
A kind of grid security risk assessment method, is characterized in that: comprise the following steps:
Step 1: the division carrying out on level to causing the evaluation index of power grid security, is divided into destination layer, rule layer, indicator layer; Determine the membership between layer and layer element;
Step 2: quantize evaluation index, structure multilevel iudge matrix, using last layer time certain element as comparison criterion, compares scale C with one ijrepresent the relative importance of i-th element and a jth element in this level; C ijvalue rule is:
C ij Implication
1 Index i and index j is of equal importance
3 Index i is more important a little than index j
5 Index i is obviously more important than index j
7 Index i is much more important than index j
9 Index i is extremely more important than index j
2,4,6,8 Between above-mentioned judgement
Each inverse Plan compares: the ratio of index j and index i importance: C ij=1/C ji
Set up multilevel iudge Matrix C
Step 3: carry out consistency desired result to the judgment matrix C of structure, formula is as follows:
C R = λ max - n R I ( n - 1 )
Wherein, λ maxbe the eigenvalue of maximum of judgment matrix, calculated by approximate root method; RI is Aver-age Random Consistency Index:
As CR < 0.1, think that matrix has comparatively satisfied consistance, go to step 6; If not just carry out reparation judgment matrix, go to step 4;
Step 4: repair judgment matrix
Step 4.1: by the Elements C in matrix ijdivided by (wherein C i j &OverBar; = 1 n &Sigma; k = 1 n C i k C k j ), make variable S i j = C i j / C i j &OverBar; ;
Step 4.2: if S ij<1, and C ij=9, then do not calculate deviation distance d ijif, S ij>1, and C ij=(1/9), then do not calculate deviation distance d ij, other situation all calculates deviation distance d ij;
Step 4.3: compare maximum d ij, and record the sequence number i of element and the value of j, get in 1 ~ 9 scale closest to C ij/ S ijnumber replace Elements C ij;
Step 4.4: check the consistance after adjustment, if inconsistent, repeats above step by the matrix after adjustment;
Step 5: consider the impact of next hierarchical elements on last layer minor element, must calculate the combining weights of k+1 layer element, its computing formula is as follows:
&omega; k + 1 , k - 1 = ( &omega; 1 k + 1 , k , &omega; 2 k + 1 , k ... &omega; n k + 1 , k ) T ( &omega; k , k - 1 ) T
Wherein: ω k+1, k-1for the upper element of kth+1 layer is relative to the combining weights of element on k-1 layer; for the upper element of kth+1 layer is relative to the weight of element on k layer;
Step 6: determine to evaluate collection, make X={X 1, X 2x kbe model Comment gathers, wherein X 1, X 2x kfor concrete comment;
F (X)={ F (X 1), F (X 2), F (X 3), F (X 4), F (X 5) the fuzzy evaluation value that provides for fuzzy evaluation collection, F (X i) (i=1,2 ... 5) for corresponding to fuzzy evaluation value X iassessed value, its scope is 0<=F (X i) <=1;
Risk comment Risk indicator fuzzy set Value-at-risk
Excessive risk [0.8,1.0] 0.9
High risk [0.6,0.8] 0.7
Medium risk [0.4,0.6] 0.5
Comparatively low-risk [0.2,0.4] 0.3
Low-risk [0.0,0.2] 0.1
Step 7: the basic brief inference function m calculating indices according to assessment result in conjunction with combining weights n(X i), be included in Θ by unknown message, the basic brief inference value of burnt first Θ is simultaneously:
m n ( &Theta; ) = 1 - &Sigma; i = 1 n m n ( X i ) ;
Step 8: according to Combination Rules of Evidence Theory, obtains the basic brief inference function of the indices synthesized, and carries out size sequence by its value; Suppose 2 evidence E under identification framework Θ 1and E 2, its corresponding basic brief inference function is m 1and m 2, burnt unit is respectively X iand Y j, utilize composition rule
In formula: it represents the conflict spectrum between each evidence; The like, can merge each bar evidence theory, obtain the basic brief inference value after merging, realize the rational evaluation to each index;
Step 9: according to ordering relation, can obtain the magnitude relationship of indices safety and effectiveness intuitively and classification, thus realize the safety and effectiveness evaluation to whole system; Index is divided by step theory, is divided into 5 ranks: 1. excellent; 2. good; 3. in; 4. pass; 5. poor; On the basis of the basic brief inference function of each index of aforementioned calculating, adopt credible degree recognition criterion, Assessment for classification is carried out to indices; Arranging reliability is θ (θ > 0.5), and its value is generally 0.6,0.7,0.8 and 0.9; Order the proportion μ shared in systems in which according to the basic brief inference value of indices iwith magnitude relationship, judge the rank that each index belongs to.
The present invention is accurate and effective, convenient; By analyzing the every definition of grid security risk assessment method, the risk factors obtained System's composition threatens mainly can be divided into the out-of-limit rate of equipment operation ratio, equipment, equipment deficiency rate and relay protection to change.Then adopt analytical hierarchy process to carry out distinguishing hierarchy to risk factors, and calculate risk factors to the weight shared by systematic influence.The weight of D-S evidence theory modification level fractional analysis is finally utilized to determine, and use Combination Rules of Evidence Theory to merge each bar evidence, basic brief inference function according to merging carries out classification to the safety and effectiveness of each risk factors, finally draws the safety and effectiveness rank of system.
Grid security risk assessment method uses analytical hierarchy process to carry out distinguishing hierarchy, and calculates risk factors to the weight shared by systematic influence.The weight of D-S evidence theory modification level fractional analysis is utilized to determine, and use Combination Rules of Evidence Theory to merge each bar evidence, basic brief inference function according to merging carries out classification to the safety and effectiveness of each risk factors, finally draws the safety and effectiveness rank of system.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described.
Fig. 1 is present system block diagram.
Fig. 2 is power grid security risk assessment hierarchical chart.
Embodiment
By analyzing the data contained by the systems such as OPEN3000, OMS, carry out the safe operation situation of reflecting regional transformer station.
Assess the security risk index of transformer station mainly: the equipment operation ratio (switch junctions row, equipment are stopped transport) of transformer station; The out-of-limit rate of equipment (trend out-of-limit, voltage out-of-limit); Equipment deficiency rate (electrical equipment, automation equipment, transformer substation video) and relay protection change.Device status data in the basis EMS of wherein equipment operation ratio, the out-of-limit and out-of-limit data of remote signalling of the equipment in the basis EMS of the out-of-limit rate of equipment, the equipment deficiency in the basis OMS that equipment deficiency rate and relay protection change and relay protection change data.
This platform mainly carries out risk assessment to 220KV transformer station, 110KV transformer station, 35KV transformer station and responsible consumer.Guarantor's risk of responsible consumer is comprehensively analyzed according to the risk assessment mark of relevant transformer station.Wherein relevant one-level transformer station, accounting 70%, relevant secondary substation, accounting 30%.
For different transformer stations, as follows to the selection of index:
(1) 220kv system transformer station:
Equipment operation ratio: switch junctions row, equipment stop transport (interconnection, main transformer, bus)
The out-of-limit rate of equipment: trend is out-of-limit, voltage out-of-limit
Equipment deficiency rate: electrical equipment, automation equipment, transformer substation video
Relay protection changes
(2) 110KV system transformer station:
Equipment operation ratio: the mode of connection, equipment stop transport (interconnection, main transformer, bus)
The out-of-limit rate of equipment: trend is out-of-limit, voltage out-of-limit
Equipment deficiency rate: electrical equipment, automation equipment, transformer substation video
Relay protection changes
(3) 35KV system transformer station:
Equipment operation ratio: the mode of connection, equipment stop transport (interconnection, main transformer, bus)
The out-of-limit rate of equipment: trend is out-of-limit, voltage out-of-limit
Equipment deficiency rate: electrical equipment, automation equipment, transformer substation video
Relay protection changes
2. the method adopting analytical hierarchy process (AHP) and D-S evidence theory to be combined with each other is assessed power grid security risk.Analytical hierarchy process is in order to determine the weight of each assessment factor, and the weight of D-S evidence theory modification level fractional analysis is determined.Level methods of risk assessment, particular content is as follows:
Step 1: the division carrying out on level to causing the evaluation index of power grid security, is divided into destination layer, rule layer, indicator layer.Determine the membership between layer and layer element, as shown in Figure 1.
Step 2: quantize evaluation index, structure multilevel iudge matrix, using last layer time certain element as comparison criterion, compares scale C with one ijrepresent the relative importance of i-th element and a jth element in this level.C ijvalue rule is as shown in table 1.
C ij Implication
1 Index i and index j is of equal importance
3 Index i is more important a little than index j
5 Index i is obviously more important than index j
7 Index i is much more important than index j
9 Index i is extremely more important than index j
2,4,6,8 Between above-mentioned judgement
Each inverse Plan compares: the ratio of index j and index i importance: C ij=1/C ji
Table 1 Elements C ijvalue rule
Set up multilevel iudge Matrix C
Step 3: carry out consistency desired result to the judgment matrix C of structure, formula is as follows:
C R = &lambda; max - n R I ( n - 1 )
Wherein, λ maxbe the eigenvalue of maximum of judgment matrix, calculated by approximate root method.RI is Aver-age Random Consistency Index, can be inquired about and can be obtained by table 2
The table 2 consistency check table of comparisons
As CR < 0.1, think that matrix has comparatively satisfied consistance, go to step 6.If not just carry out reparation judgment matrix, go to step 4.
Step 4: repair judgment matrix
Step 4.1: by the Elements C in matrix ijdivided by (wherein C i j &OverBar; = 1 n &Sigma; k = 1 n C i k C k j ), make variable S i j = C i j / C i j &OverBar; ;
Step 4.2: if S ij<1, and C ij=9, then do not calculate deviation distance d ijif, S ij>1, and C ij=(1/9), then do not calculate deviation distance d ij, other situation all calculates deviation distance d ij;
Step 4.3: compare maximum d ij, and record the sequence number i of element and the value of j, get in 1 ~ 9 scale closest to C ij/ S ijnumber replace Elements C ij;
Step 4.4: check the consistance after adjustment, if inconsistent, repeats above step by the matrix after adjustment.
Step 5: consider the impact of next hierarchical elements on last layer minor element, must calculate the combining weights of k+1 layer element, its computing formula is as follows:
&omega; k + 1 , k - 1 = ( &omega; 1 k + 1 , k , &omega; 2 k + 1 , k ... &omega; n k + 1 , k ) T ( &omega; k , k - 1 ) T
Wherein: ω k+1, k-1for the upper element of kth+1 layer is relative to the combining weights of element on k-1 layer; for the upper element of kth+1 layer is relative to the weight of element on k layer.
Step 6: determine to evaluate collection, analyzes data by expert according to professional knowledge and provides, make X={X 1, X 2x kbe model Comment gathers, wherein X 1, X 2x kfor concrete comment, as shown in table 3.F (X)={ F (X 1), F (X 2), F (X 3), F (X 4), F (X 5) the fuzzy evaluation value that provides for fuzzy evaluation collection, F (X i) (i=1,2 ... 5) for corresponding to fuzzy evaluation value X iassessed value, its scope is 0<=F (X i) <=1.
Risk comment Risk indicator fuzzy set Value-at-risk
Excessive risk [0.8,1.0] 0.9
High risk [0.6,0.8] 0.7
Medium risk [0.4,0.6] 0.5
Comparatively low-risk [0.2,0.4] 0.3
Low-risk [0.0,0.2] 0.1
Table 3 risk assessment collection
Step 7: the basic brief inference function m calculating indices according to the assessment result of expert in conjunction with combining weights n(X i), be included in Θ by unknown message, the basic brief inference value of burnt first Θ is simultaneously: m n ( &Theta; ) = 1 - &Sigma; i = 1 n m n ( X i ) .
Step 8: according to Combination Rules of Evidence Theory, obtains the basic brief inference function of the indices synthesized, and carries out size sequence by its value.Suppose 2 evidence E under identification framework Θ 1and E 2, its corresponding basic brief inference function is m 1and m 2, burnt unit is respectively X iand Y j, utilize composition rule
In formula: it represents the conflict spectrum between each evidence.The like, can merge each bar evidence theory, obtain the basic brief inference value after merging, realize the rational evaluation to each index.
Step 9: according to ordering relation, can obtain the magnitude relationship of indices safety and effectiveness intuitively and classification, thus realize the safety and effectiveness evaluation to whole system.Index is divided by step theory, is divided into 5 ranks: 1. excellent; 2. good; 3. in; 4. pass; 5. poor.On the basis of the basic brief inference function of each index of aforementioned calculating, adopt credible degree recognition criterion, Assessment for classification is carried out to indices.Arranging reliability is θ (θ > 0.5), and its value is generally 0.6,0.7,0.8 and 0.9.Order the proportion μ shared in systems in which according to the basic brief inference value of indices iwith magnitude relationship, judge the rank that each index belongs to.

Claims (1)

1. a grid security risk assessment method easily, is characterized in that: comprise the following steps:
Step 1: the division carrying out on level to causing the evaluation index of power grid security, is divided into destination layer, rule layer, indicator layer; Determine the membership between layer and layer element;
Step 2: quantize evaluation index, structure multilevel iudge matrix, using last layer time certain element as comparison criterion, compares scale C with one ijrepresent the relative importance of i-th element and a jth element in this level; C ijvalue rule is:
C ij Implication 1 Index i and index j is of equal importance 3 Index i is more important a little than index j 5 Index i is obviously more important than index j 7 Index i is much more important than index j 9 Index i is extremely more important than index j 2,4,6,8 Between above-mentioned judgement Each inverse Plan compares: the ratio of index j and index i importance: C ij=1/C ji
Set up multilevel iudge Matrix C
Step 3: carry out consistency desired result to the judgment matrix C of structure, formula is as follows:
C R = &lambda; max - n R I ( n - 1 )
Wherein, λ maxbe the eigenvalue of maximum of judgment matrix, calculated by approximate root method; RI is Aver-age Random Consistency Index:
As CR < 0.1, think that matrix has comparatively satisfied consistance, go to step 6; If not just carry out reparation judgment matrix, go to step 4;
Step 4: repair judgment matrix
Step 4.1: by the Elements C in matrix ijdivided by (wherein C i j &OverBar; = 1 n &Sigma; k = 1 n C i k C k j ), make variable S i j = C i j / C i j &OverBar; ;
Step 4.2: if S ij<1, and C ij=9, then do not calculate deviation distance d ijif, S ij>1, and C ij=(1/9), then do not calculate deviation distance d ij, other situation all calculates deviation distance d ij;
Step 4.3: compare maximum d ij, and record the sequence number i of element and the value of j, get in 1 ~ 9 scale closest to C ij/ S ijnumber replace Elements C ij;
Step 4.4: check the consistance after adjustment, if inconsistent, repeats above step by the matrix after adjustment;
Step 5: consider the impact of next hierarchical elements on last layer minor element, must calculate the combining weights of k+1 layer element, its computing formula is as follows:
&omega; k + 1 , k - 1 = ( &omega; 1 k + 1 , k , &omega; 2 k + 1 , k ... &omega; n k + 1 , k ) T ( &omega; k , k - 1 ) T
Wherein: ω k+1, k-1for the upper element of kth+1 layer is relative to the combining weights of element on k-1 layer; for the upper element of kth+1 layer is relative to the weight of element on k layer;
Step 6: determine to evaluate collection, make X={X 1, X 2x kbe model Comment gathers, wherein X 1, X 2x kfor concrete comment;
F (X)={ F (X 1), F (X 2), F (X 3), F (X 4), F (X 5) the fuzzy evaluation value that provides for fuzzy evaluation collection, F (X i) (i=1,2 ... 5) for corresponding to fuzzy evaluation value X iassessed value, its scope is 0<=F (X i) <=1;
Risk comment Risk indicator fuzzy set Value-at-risk Excessive risk [0.8,1.0] 0.9 High risk [0.6,0.8] 0.7 Medium risk [0.4,0.6] 0.5 Comparatively low-risk [0.2,0.4] 0.3 Low-risk [0.0,0.2] 0.1
Step 7: the basic brief inference function m calculating indices according to assessment result in conjunction with combining weights n(X i), be included in Θ by unknown message, the basic brief inference value of burnt first Θ is simultaneously:
m n ( &Theta; ) = 1 - &Sigma; i = 1 n m n ( X i ) ;
Step 8: according to Combination Rules of Evidence Theory, obtains the basic brief inference function of the indices synthesized, and carries out size sequence by its value; Suppose 2 evidence E under identification framework Θ 1and E 2, its corresponding basic brief inference function is m 1and m 2, burnt unit is respectively X iand Y j, utilize composition rule
In formula: it represents the conflict spectrum between each evidence; The like, can merge each bar evidence theory, obtain the basic brief inference value after merging, realize the rational evaluation to each index;
Step 9: according to ordering relation, can obtain the magnitude relationship of indices safety and effectiveness intuitively and classification, thus realize the safety and effectiveness evaluation to whole system; Index is divided by step theory, is divided into 5 ranks: 1. excellent; 2. good; 3. in; 4. pass; 5. poor; On the basis of the basic brief inference function of each index of aforementioned calculating, adopt credible degree recognition criterion, Assessment for classification is carried out to indices; Arranging reliability is θ (θ > 0.5), and its value is generally 0.6,0.7,0.8 and 0.9; Order the proportion μ shared in systems in which according to the basic brief inference value of indices iwith magnitude relationship, judge the rank that each index belongs to;
Described evaluation index to 35KV system transformer station is:
Equipment operation ratio: the mode of connection, equipment are stopped transport;
The out-of-limit rate of equipment: trend is out-of-limit, voltage out-of-limit;
Equipment deficiency rate: electrical equipment, automation equipment, transformer substation video;
Relay protection changes.
CN201510424424.5A 2015-07-14 2015-07-14 Convenient power grid security risk evaluation method Pending CN105046582A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510412517.6A CN105139268A (en) 2015-07-14 2015-07-14 Power grid safety risk assessment method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510412517.6A Division CN105139268A (en) 2015-07-14 2015-07-14 Power grid safety risk assessment method

Publications (1)

Publication Number Publication Date
CN105046582A true CN105046582A (en) 2015-11-11

Family

ID=54453105

Family Applications (4)

Application Number Title Priority Date Filing Date
CN201510424424.5A Pending CN105046582A (en) 2015-07-14 2015-07-14 Convenient power grid security risk evaluation method
CN201510412517.6A Pending CN105139268A (en) 2015-07-14 2015-07-14 Power grid safety risk assessment method
CN201510422865.1A Pending CN105069692A (en) 2015-07-14 2015-07-14 Accurate power grid safety risk assessment method
CN201510423687.4A Pending CN105184662A (en) 2015-07-14 2015-07-14 Effective power grid security risk assessment method

Family Applications After (3)

Application Number Title Priority Date Filing Date
CN201510412517.6A Pending CN105139268A (en) 2015-07-14 2015-07-14 Power grid safety risk assessment method
CN201510422865.1A Pending CN105069692A (en) 2015-07-14 2015-07-14 Accurate power grid safety risk assessment method
CN201510423687.4A Pending CN105184662A (en) 2015-07-14 2015-07-14 Effective power grid security risk assessment method

Country Status (1)

Country Link
CN (4) CN105046582A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096830A (en) * 2016-06-07 2016-11-09 武汉大学 Relay protection method for evaluating state based on broad sense evidence theory and system
CN106169113A (en) * 2016-05-30 2016-11-30 重庆大学 A kind of liquid hydrogen filling control system safety real time evaluating method
CN107239907A (en) * 2017-06-08 2017-10-10 清华大学 Cities and towns integrate appraisal procedure, the device and system of Disaster-bearing ability
CN109919441A (en) * 2019-01-31 2019-06-21 中国人民解放军92942部队 A kind of Ship Equipment evaluation on environment adjustability method based on evidential reasoning
CN109919440A (en) * 2019-01-31 2019-06-21 中国人民解放军92942部队 A kind of warship equipment appraisal procedure based on evidential reasoning
CN110443037A (en) * 2019-08-14 2019-11-12 广州思泰信息技术有限公司 A kind of power monitoring network security postures cognitive method based on modified AHP

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105260861A (en) * 2015-11-25 2016-01-20 海南电网有限责任公司 Comprehensive risk assessment method for electric vehicle battery replacement station
CN107944702A (en) * 2017-11-23 2018-04-20 绥化学院 A kind of network security step analysis appraisal procedure, device and computer-readable recording medium
CN109379563B (en) * 2018-10-30 2020-10-23 华南师范大学 Method and system for monitoring video data storage management
JP6500160B1 (en) * 2018-12-27 2019-04-10 株式会社ドワンゴ Processing device, program, and display medium
CN110598966B (en) * 2019-03-28 2024-01-26 中国辐射防护研究院 Grading method of equipment in risk-guided post-processing facility
CN111815171A (en) * 2020-07-10 2020-10-23 中国人民解放军96901部队22分队 Equipment state evaluation method based on two-factor weighting correction
CN112581021B (en) * 2020-12-28 2022-12-06 云南电网有限责任公司昆明供电局 Method for automatically evaluating superiority and inferiority of operation scheme based on analytic hierarchy process
CN113435759B (en) * 2021-07-01 2023-07-04 贵州电网有限责任公司 Primary equipment risk intelligent assessment method based on deep learning

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102013085B (en) * 2010-12-14 2016-03-30 天津市电力公司 Evaluation method for distribution network reliability
CN102063657A (en) * 2010-12-23 2011-05-18 中国电力科学研究院 Operating level and power supplying capability evaluation method for urban electric distribution network
CN102902882A (en) * 2012-09-14 2013-01-30 安徽南瑞继远软件有限公司 Method for evaluating operation quality of information systems
CN103095494B (en) * 2012-12-31 2016-06-29 北京邮电大学 A kind of electric power telecommunication network risk assessment method
CN103617561A (en) * 2013-12-02 2014-03-05 深圳供电局有限公司 System and method for evaluating state of secondary device of power grid intelligent substation
CN103778575B (en) * 2014-03-04 2017-02-15 国网浙江宁波市鄞州区供电公司 Transformer state evaluation method and system
CN104077489A (en) * 2014-07-09 2014-10-01 国家电网公司 Method and system for analyzing energy efficiency of energy consumption device
CN104537575A (en) * 2014-12-22 2015-04-22 国家电网公司 Computing method of power grid safety economy high-quality operation comprehensive index

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
严世华等: "基于层次分析法的判断矩阵一致性调整方法", 《兵工自动化》 *
李宁等: "基于层次分析法和证据理论的矿山井下六大系统安全评价", 《中南大学学报(自然科学版)》 *
郭少坤: "停电计划安全风险评估的研究", 《中国优秀硕士学位论文全文数据库经济与管理科学辑》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106169113A (en) * 2016-05-30 2016-11-30 重庆大学 A kind of liquid hydrogen filling control system safety real time evaluating method
CN106096830A (en) * 2016-06-07 2016-11-09 武汉大学 Relay protection method for evaluating state based on broad sense evidence theory and system
CN106096830B (en) * 2016-06-07 2020-06-09 武汉大学 Relay protection state evaluation method and system based on generalized evidence theory
CN107239907A (en) * 2017-06-08 2017-10-10 清华大学 Cities and towns integrate appraisal procedure, the device and system of Disaster-bearing ability
CN109919441A (en) * 2019-01-31 2019-06-21 中国人民解放军92942部队 A kind of Ship Equipment evaluation on environment adjustability method based on evidential reasoning
CN109919440A (en) * 2019-01-31 2019-06-21 中国人民解放军92942部队 A kind of warship equipment appraisal procedure based on evidential reasoning
CN110443037A (en) * 2019-08-14 2019-11-12 广州思泰信息技术有限公司 A kind of power monitoring network security postures cognitive method based on modified AHP
CN110443037B (en) * 2019-08-14 2023-04-07 广州思泰信息技术有限公司 Power monitoring network security situation perception method based on improved AHP method

Also Published As

Publication number Publication date
CN105184662A (en) 2015-12-23
CN105069692A (en) 2015-11-18
CN105139268A (en) 2015-12-09

Similar Documents

Publication Publication Date Title
CN105046582A (en) Convenient power grid security risk evaluation method
CN102722759B (en) Method for predicting power supply reliability of power grid based on BP neural network
CN102509018B (en) System and method for evaluating importance of power system facilities
CN102184465A (en) Substation energy efficiency evaluating method
CN104091008B (en) Based on the user power utilization equipment safety appraisal procedure improving interval based AHP
CN101309009A (en) Urban electric grid overall evaluation system established based on layer analysis and Delphi
CN106329516A (en) Typical scene recognition based dynamic reconstruction method of power distribution network
CN105956779A (en) Power transformer running state evaluation method and power transformer running state evaluation device
CN103761690A (en) Evaluation method based on voltage reactive power control system in grid system
CN104318482A (en) Comprehensive assessment system and method of smart distribution network
CN105023065A (en) Power grid planning risk evaluation system and method based on grey correlation degree TOPSIS (Technique for Order Preference by Similarity to an Ideal Solution)
CN103744850A (en) Power grid disaster real-time regulating and control device and method based on intuition fuzzy rough set
CN104951866A (en) Line loss comprehensive-management benchmarking evaluating system and method for county-level power enterprises
CN102063657A (en) Operating level and power supplying capability evaluation method for urban electric distribution network
CN103150635B (en) Power equipment O&amp;M method
CN104376413A (en) Power grid planning scheme evaluation system based on analytic hierarchy process and data envelopment analysis
CN104331773A (en) Comprehensive assessment method for power network planning schemes
CN104166788A (en) Overhead transmission line optimal economic life range assessment method
CN103996147A (en) Comprehensive evaluation method for power distribution network
CN104218569B (en) A kind of evaluation analysis method of large scale electric network security analysis
CN110378549B (en) Transmission tower bird damage grade assessment method based on FAHP-entropy weight method
CN106651189A (en) Transformer state evaluation method based on multilayer compound rule
CN104281892A (en) New construction and reconstruction planning cooperative optimization method for main equipment in power distribution network
CN104462718A (en) Method for evaluating economic operation year range of transformer substation
CN106779436A (en) A kind of Electric Power Network Planning stage construction harmony comprehensive estimation method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151111

RJ01 Rejection of invention patent application after publication