CN107506832B - Hidden danger mining method for assisting monitoring tour - Google Patents
Hidden danger mining method for assisting monitoring tour Download PDFInfo
- Publication number
- CN107506832B CN107506832B CN201710557973.9A CN201710557973A CN107506832B CN 107506832 B CN107506832 B CN 107506832B CN 201710557973 A CN201710557973 A CN 201710557973A CN 107506832 B CN107506832 B CN 107506832B
- Authority
- CN
- China
- Prior art keywords
- power grid
- data
- monitoring
- hidden danger
- grid equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 119
- 238000000034 method Methods 0.000 title claims abstract description 70
- 238000005065 mining Methods 0.000 title claims description 28
- 238000007689 inspection Methods 0.000 claims abstract description 28
- 238000009412 basement excavation Methods 0.000 claims abstract description 19
- 238000004364 calculation method Methods 0.000 claims abstract description 11
- 238000010219 correlation analysis Methods 0.000 claims abstract description 8
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 6
- 238000011156 evaluation Methods 0.000 claims description 25
- 230000007547 defect Effects 0.000 claims description 9
- 238000012423 maintenance Methods 0.000 claims description 7
- 238000001914 filtration Methods 0.000 claims description 6
- 238000012216 screening Methods 0.000 claims description 4
- 238000004088 simulation Methods 0.000 claims description 4
- 230000001629 suppression Effects 0.000 claims description 3
- 230000001131 transforming effect Effects 0.000 claims description 3
- 239000011159 matrix material Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000013598 vector Substances 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2465—Query processing support for facilitating data mining operations in structured databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/35—Clustering; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/20—Administration of product repair or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Public Health (AREA)
- Water Supply & Treatment (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Fuzzy Systems (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- Testing Or Calibration Of Command Recording Devices (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment provides a hidden danger excavation method for assisting monitoring tour, which belongs to the field of power equipment monitoring and comprises the following steps: acquiring real-time monitoring data of each power grid device, and performing incremental coverage on historical monitoring data of each power grid device according to the real-time monitoring data to obtain a sample database; setting a reference threshold value for key data in a sample database, and selecting sample data exceeding the threshold value; and according to the inspection requirement, carrying out merging operation on the sample data to obtain an operation result, and taking the power grid equipment corresponding to the operation result as an object to be processed. By means of threshold judgment, comparison logic, correlation analysis and the like, the judgment, calculation and analysis results are stored in a computer cache to support upper-layer application, the problems that the traditional method needs frequent inspection by manpower, the information is not complete in cross-specialty acquisition and the relational data is slow to inquire are solved, different specialties and related data inspection operations and logic algorithms are packaged, the data value is fully mined, and potential problems and hidden dangers are effectively found.
Description
Technical Field
The invention belongs to the field of power equipment monitoring, and particularly relates to a hidden danger mining method for assisting monitoring inspection.
Background
The operation monitoring of the current power equipment mainly depends on three modes of real-time monitoring, professional inspection and operation and maintenance inspection. The real-time monitoring patrol cycle is too long, the means is single, and the quality is not high; the 'professional patrol' is long in period, due to different emphasis of each specialty, data is not comprehensive enough, and the 'operation and maintenance patrol' is a passive waiting type and poor in on-site feeling.
In conclusion, the existing monitoring mode cannot effectively mine the data value, and potential problems and hidden dangers are effectively discovered.
Disclosure of Invention
In order to solve the defects and shortcomings in the prior art, the invention provides a hidden danger mining method for screening out power grid equipment with potential dangers through a threshold value.
In order to achieve the technical purpose, the invention provides a hidden danger mining method for assisting monitoring tour, which comprises the following steps:
acquiring real-time monitoring data of each power grid device, and performing incremental coverage on historical monitoring data of each power grid device according to the real-time monitoring data to obtain a sample database representing the latest state of each power grid device;
setting a reference threshold value for key data in a sample database, and selecting sample data exceeding the threshold value;
and according to the inspection requirement, carrying out merging operation on the sample data to obtain an operation result, and taking the power grid equipment corresponding to the operation result as an object to be processed.
Optionally, the real-time detecting data includes:
the method comprises the following steps of (1) transforming plant, interval, power grid equipment name, telemetering description, telemetering type, out-of-limit state, telemetering state, measured value, occurrence time and limit value;
wherein the telemetry types comprise current, voltage and active power;
the out-of-limit state comprises normal, upper limit and upper limit;
telemetry states include blockade, suppression;
limits include messages from the EMS and the limit of the operation.
Optionally, the hidden danger excavation method includes:
acquiring real-time monitoring data of each power grid device at each moment;
performing cluster evaluation on the real-time monitoring data at each moment to obtain a monitoring tour evaluation result;
wherein the real-time monitoring data comprises: the method comprises the following steps of power grid equipment encoding, power grid equipment running state, power grid equipment monitoring parameters and power grid equipment fault parameters.
Optionally, the hidden danger excavation method includes:
displaying the monitoring patrol evaluation result in a monitoring patrol popup window corresponding to each power grid device;
optionally, the hidden danger excavation method includes:
filtering monitoring and inspecting evaluation results of the plurality of power grid devices;
and displaying the monitoring and inspecting evaluation results of the power grid equipment meeting the filtering condition in a popup window corresponding to each power grid equipment.
Optionally, the hidden danger excavation method includes:
according to the monitoring sample data of the power grid equipment at each historical moment, simulating replay by adopting a preset accident inversion simulation algorithm;
and analyzing the simulation replay process to obtain the fault information of each power grid device.
Optionally, the hidden danger excavation method includes:
establishing a power grid equipment fault tree according to the power grid equipment structure;
calculating the fault probability of each level of events in the fault tree of the power grid equipment by using a fault model probability calculation model and a fault probability calculation model and utilizing the historical defect records of the power grid equipment;
the power grid equipment fault tree comprises multilevel events forming a tree structure.
Optionally, the hidden danger excavation method includes:
making a depth inspection theme according to the power grid maintenance working condition, the new equipment commissioning starting, the climate environment characteristics, the power grid load condition and the like;
and according to the theme of deep inspection, deeply inspecting various monitoring charts and pictures, and performing trend comparison and correlation analysis on the monitoring data.
Optionally, the hidden danger excavation method includes:
and selecting a customized auxiliary tool kit, and carrying out deep inspection by using tools provided in the tool kit.
Optionally, the hidden danger excavation method includes:
and manually confirming and analyzing the object to be processed, and judging whether the power grid equipment corresponding to the object to be processed has hidden danger or not.
The technical scheme provided by the invention has the beneficial effects that:
by means of threshold judgment, comparison logic, correlation analysis and the like, the judgment, calculation and analysis results are stored in a computer cache to support upper-layer application, the problems that the traditional method needs frequent inspection by manpower, the information is not complete in cross-specialty acquisition and the relational data is slow to inquire are solved, different specialties and related data inspection operations and logic algorithms are packaged, the data value is fully mined, and potential problems and hidden dangers are effectively found.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a schematic flow chart of a hidden danger mining method for assisting in monitoring and patrolling provided by the invention;
fig. 2 is another schematic flow chart of the hidden danger mining method for assisting in monitoring tour provided by the present invention.
Detailed Description
To make the structure and advantages of the present invention clearer, the structure of the present invention will be further described with reference to the accompanying drawings.
Example one
The invention provides a hidden danger mining method for assisting monitoring and inspection, as shown in fig. 1, the hidden danger mining method comprises the following steps:
11. acquiring real-time monitoring data of each power grid device, and performing incremental coverage on historical monitoring data of each power grid device according to the real-time monitoring data to obtain a sample database representing the latest state of each power grid device;
12. setting a reference threshold value for key data in a sample database, and selecting sample data exceeding the threshold value;
13. and according to the inspection requirement, carrying out merging operation on the sample data to obtain an operation result, and taking the power grid equipment corresponding to the operation result as an object to be processed.
In implementation, in order to find potential hazards that may exist in the power grid equipment, the embodiment provides a potential hazard mining method for determining whether the power grid equipment has the potential hazards based on monitoring data of the power grid equipment. The specific method comprises the following three steps:
firstly, acquiring real-time monitoring data of each power grid device, and covering historical monitoring data increment based on the real-time monitoring data. The incremental coverage is performed here because the latest state of the power grid equipment is known in a data tracing manner from the historical monitoring data as a traditional patrol result, and the method is to perform full-table scanning on the historical monitoring data table, so that the efficiency is poor, a great burden is also brought to the database, and the overall function of the system is affected. In view of the defects, the historical monitoring data is subjected to real-time incremental coverage based on the acquired real-time monitoring data, namely, the extra part of the real-time monitoring data relative to the historical monitoring data is supplemented and updated on the basis of the historical monitoring data, so that the latest state value of the power grid equipment can be obtained at the first time during patrol.
Secondly, after the real-time monitoring data is obtained, if the amount of the accumulated data is small, problem data can be found quickly, but if the large amount of the data is generated continuously, automatic screening is needed, a threshold value is set in a key dimension in the obtained monitoring data, and only the data exceeds the threshold value, the data can be selected. The actually established threshold is an upper limit or a lower limit in an acceptable range, the upper limit can be subdivided according to the severity of the problem caused by the hidden trouble, for example, the upper limit and the lower limit are required to be set, and the range can be reduced.
Finally, after sample data is obtained, merging operation may be required with other module data, and the result is recorded. The merging operation refers to adding real-time monitoring data generated by other power grid equipment connected with the power grid equipment corresponding to the sample data on the basis of screening the sample data. The merging operation of the sample data and the real-time monitoring data of other power grid equipment considers that the power grid equipment is not completely independent and certain faults are caused by a plurality of modules formed by a plurality of power grid equipment together, so that the merging operation is carried out on the sample data obtained by a single power grid equipment in combination with the real-time monitoring data of other power grid equipment, and the defects of each module are conveniently predicted.
Optionally, the real-time detecting data includes:
the method comprises the following steps of (1) transforming plant, interval, power grid equipment name, telemetering description, telemetering type, out-of-limit state, telemetering state, measured value, occurrence time and limit value;
wherein the telemetry types comprise current, voltage and active power;
the out-of-limit state comprises normal, upper limit and upper limit;
telemetry states include blockade, suppression;
limits include messages from the EMS and the limit of the operation.
In implementation, in order to sufficiently detect the state of the power grid equipment, the obtained real-time monitoring data includes a plurality of contents, which typically include a substation, an interval, a power grid equipment name, a telemetry description, a telemetry type, an out-of-limit state, a telemetry state, an actual measurement value, an occurrence time, and a limit value.
Optionally, as shown in fig. 2, the hidden danger excavation method includes:
21. acquiring real-time monitoring data of each power grid device at each moment;
22. performing cluster evaluation on the real-time monitoring data at each moment to obtain a monitoring tour evaluation result;
wherein the real-time monitoring data comprises: the method comprises the following steps of power grid equipment encoding, power grid equipment running state, power grid equipment monitoring parameters and power grid equipment fault parameters.
In practice, the method for potential hazard mining proposed in this embodiment includes steps 21 to 22 in addition to the aforementioned steps 11 to 13.
Wherein the content of step 21 is similar to the content of the real-time monitoring data obtained in step 11, and the obtained real-time monitoring data needs to be subjected to cluster evaluation in step 22.
As the name implies, clustering evaluation is a process of evaluating results obtained by clustering. In the present case, the method of assessment mainly comprises:
(1) and the external method is used for evaluating the clustering analysis result according to the known real grouping, constructing a confusion matrix, summarizing whether any pair of records containing the two records belong to the same grouping or not, and calculating the accuracy of the clustering analysis according to the confusion matrix.
(2) The internal method can calculate the inner square sum and the outer square sum as evaluation indexes by using the recorded feature vectors when the real grouping situation is unknown.
(3) When only two variables exist, a visual method is adopted to evaluate the clustering result. For example, a ggplot () function may be called to draw a scatter diagram, and each cluster and each central point are identified, generally considering the following factors:
1) whether the clusters are well separated from each other or not;
2) whether there are clusters of only a few points;
3) whether there is a close center point.
After the obtained real-time monitoring data are subjected to cluster evaluation, typical data represented by the classified real-time monitoring data are obtained, and then a monitoring patrol evaluation result formed by power grid equipment fault parameters corresponding to the typical data is determined.
Optionally, the hidden danger excavation method includes:
23. the patrol evaluation result is displayed in a monitoring patrol popup window corresponding to each power grid device;
in implementation, after the monitoring patrol evaluation results are obtained in steps 21 to 22, the monitoring patrol evaluation results need to be sent to the monitoring patrol terminal, so that the monitoring patrol evaluation results are displayed in a monitoring patrol popup window in a display interface of the monitoring patrol terminal, and a result reminding process is completed.
Optionally, the hidden danger excavation method includes:
231. filtering the monitoring and inspecting evaluation result of the power grid equipment;
232. and displaying the monitoring and inspecting evaluation results of the power grid equipment meeting the filtering condition in a popup window corresponding to each power grid equipment.
In practice, the foregoing step 23 further includes the contents shown in steps 231 and 232.
After the monitoring patrol evaluation result is obtained, the monitoring patrol evaluation result needs to be displayed in a pop-up window mode. However, considering that the display mode of the pop-up window may limit the content to be displayed, before displaying, the content shown in step 231 needs to be filtered, so as to filter out the content that is not suitable for displaying in the pop-up window mode, and send the filtered content to the display interface of the monitoring tour terminal corresponding to each power grid device to display in the pop-up window mode.
Optionally, the hidden danger excavation method includes:
according to the monitoring sample data of the power grid equipment at each historical moment, simulating replay by adopting a preset accident inversion simulation algorithm;
and analyzing the simulation replay process to obtain the fault information of each power grid device.
In implementation, various accident simulation deduction logics are established according to a preset accident model, and fault information of each power grid device is deduced by adopting monitoring sample data of each historical time of the power grid device.
Optionally, the hidden danger excavation method includes:
establishing a power grid equipment fault tree according to the power grid equipment structure;
calculating the fault probability of each level of events in the fault tree of the power grid equipment by using a fault model probability calculation model and a fault probability calculation model and utilizing the historical defect records of the power grid equipment;
the power grid equipment fault tree comprises multilevel events forming a tree structure.
In implementation, according to an equipment structure, an equipment fault tree is established, wherein the equipment fault tree comprises a plurality of levels of events forming a tree structure; and calculating the fault probability of each level of event in the equipment fault tree by using the equipment historical defect record by adopting a fault model probability calculation model and a fault probability calculation model.
Optionally, the hidden danger excavation method includes:
making a depth inspection theme according to the power grid maintenance working condition, the new equipment commissioning starting, the climate environment characteristics, the power grid load condition and the like;
and according to the theme of deep inspection, deeply inspecting various monitoring charts and pictures, and performing trend comparison and correlation analysis on the monitoring data.
In the implementation, in the specific implementation process, in order to analyze the potential hazards of the power grid equipment based on the real-time monitoring data, a deep inspection theme is formulated in advance according to the power grid maintenance working condition, the new equipment commissioning starting, the climate environment characteristics, the power grid load condition and the like, then the power grid equipment is monitored according to the deep inspection theme, a monitoring chart and a monitoring picture are obtained, so that trend comparison and correlation analysis are performed on the monitoring data, and the defects possibly existing in the power grid equipment are determined.
Optionally, the hidden danger excavation method includes:
and selecting a customized auxiliary tool kit, and carrying out deep inspection by using tools provided in the tool kit.
In implementation, a monitoring information analyst formulates a deep inspection theme according to the power grid maintenance working condition, the new equipment commissioning starting, the climate environment characteristics, the power grid load condition and the like, deeply inspects various monitoring charts and pictures, performs trend comparison and correlation analysis on monitoring data, can also select a customized auxiliary tool kit, and performs deep inspection by using tools provided in the tool kit.
Optionally, the hidden danger excavation method includes:
and manually confirming and analyzing the object to be processed, and judging whether the power grid equipment corresponding to the object to be processed has hidden danger or not.
In implementation, in order to improve the reliability of the hidden danger mining method provided by the present application, on the basis of processing by the foregoing contents, a step of manual analysis needs to be introduced, and the to-be-processed correspondence obtained in step 13 is further analyzed by working experience to determine whether a hidden danger exists in the to-be-processed object.
The embodiment provides a hidden danger excavation method for assisting monitoring tour, which comprises the following steps: acquiring real-time monitoring data of each power grid device, and performing incremental coverage on historical monitoring data of each power grid device according to the real-time monitoring data to obtain a sample database representing the latest state of each power grid device; setting a reference threshold value for key data in a sample database, and selecting sample data exceeding the threshold value; and according to the inspection requirement, carrying out merging operation on the sample data to obtain an operation result, and taking the power grid equipment corresponding to the operation result as an object to be processed. By means of threshold judgment, comparison logic, correlation analysis and the like, the judgment, calculation and analysis results are stored in a computer cache to support upper-layer application, the problems that the traditional method needs frequent inspection by manpower, the information is not complete in cross-specialty acquisition and the relational data is slow to inquire are solved, different specialties and related data inspection operations and logic algorithms are packaged, the data value is fully mined, and potential problems and hidden dangers are effectively found.
The sequence numbers in the above embodiments are merely for description, and do not represent the sequence of the assembly or the use of the components.
The above description is only exemplary of the present invention and should not be taken as limiting the invention, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. The hidden danger excavation method for assisting monitoring tour is characterized by comprising the following steps:
acquiring real-time monitoring data of each power grid device, and performing incremental coverage on historical monitoring data of each power grid device according to the real-time monitoring data to obtain a sample database representing the latest state of each power grid device;
setting a reference threshold value for key data in a sample database, and selecting sample data exceeding the threshold value;
according to the inspection requirement, carrying out merging operation on the sample data to obtain an operation result, and taking the power grid equipment corresponding to the operation result as an object to be processed;
the method specifically comprises the following steps:
firstly, acquiring real-time monitoring data of each power grid device, and covering historical monitoring data increment based on the real-time monitoring data;
secondly, after the real-time monitoring data are obtained, if the amount of the accumulated data is small, problem data are found, and if the amount of the accumulated data is large, automatic screening is carried out;
and finally, after the sample data is obtained, carrying out merging operation with data of other modules, recording the result, merging the sample data obtained by the single power grid equipment with the real-time monitoring data of other power grid equipment, and predicting the defects of each module.
2. The method according to claim 1, wherein the real-time monitoring data comprises:
the method comprises the following steps of (1) transforming plant, interval, power grid equipment name, telemetering description, telemetering type, out-of-limit state, telemetering state, measured value, occurrence time and limit value;
wherein the telemetry types comprise current, voltage and active power;
the out-of-limit state comprises normal, upper limit and upper limit;
telemetry states include blockade, suppression;
limits include messages from the EMS and the limit of the operation.
3. The hidden danger mining method for assisting in monitoring rounds as claimed in claim 1, characterized in that the hidden danger mining method comprises:
acquiring real-time monitoring data of each power grid device at each moment;
performing cluster evaluation on the real-time monitoring data at each moment to obtain a monitoring tour evaluation result;
wherein the real-time monitoring data comprises: the method comprises the following steps of power grid equipment encoding, power grid equipment running state, power grid equipment monitoring parameters and power grid equipment fault parameters.
4. The hidden danger mining method for assisting in monitoring patrol according to claim 3, wherein the hidden danger mining method comprises:
and displaying the monitoring patrol evaluation result in a monitoring patrol popup window corresponding to each power grid device.
5. The hidden danger mining method for assisting in monitoring patrol according to claim 3 or 4, characterized in that the hidden danger mining method comprises:
filtering monitoring and inspecting evaluation results of the plurality of power grid devices;
and displaying the monitoring and inspecting evaluation results of the power grid equipment meeting the filtering condition in a popup window corresponding to each power grid equipment.
6. The hidden danger mining method for assisting in monitoring rounds as claimed in claim 1, characterized in that the hidden danger mining method comprises:
according to the monitoring sample data of the power grid equipment at each historical moment, simulating replay by adopting a preset accident inversion simulation algorithm;
and analyzing the simulation replay process to obtain the fault information of each power grid device.
7. The hidden danger mining method for assisting in monitoring rounds as claimed in claim 1, characterized in that the hidden danger mining method comprises:
establishing a power grid equipment fault tree according to the power grid equipment structure;
calculating the fault probability of each level of events in the fault tree of the power grid equipment by using a fault model probability calculation model and a fault probability calculation model and utilizing the historical defect records of the power grid equipment;
the power grid equipment fault tree comprises multilevel events forming a tree structure.
8. The hidden danger mining method for assisting in monitoring rounds as claimed in claim 1, characterized in that the hidden danger mining method comprises:
making a depth inspection theme according to the power grid maintenance working condition, the new equipment commissioning starting, the climate environment characteristics, the power grid load condition and the like;
and according to the theme of deep inspection, deeply inspecting various monitoring charts and pictures, and performing trend comparison and correlation analysis on the monitoring data.
9. The hidden danger mining method for assisting in monitoring rounds as set forth in claim 8, characterized in that the hidden danger mining method comprises:
and selecting a customized auxiliary tool kit, and carrying out deep inspection by using tools provided in the tool kit.
10. The hidden danger mining method for assisting in monitoring rounds as claimed in claim 1, characterized in that the hidden danger mining method comprises:
and manually confirming and analyzing the object to be processed, and judging whether the power grid equipment corresponding to the object to be processed has hidden danger or not.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710557973.9A CN107506832B (en) | 2017-07-10 | 2017-07-10 | Hidden danger mining method for assisting monitoring tour |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710557973.9A CN107506832B (en) | 2017-07-10 | 2017-07-10 | Hidden danger mining method for assisting monitoring tour |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107506832A CN107506832A (en) | 2017-12-22 |
CN107506832B true CN107506832B (en) | 2021-09-07 |
Family
ID=60679670
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710557973.9A Active CN107506832B (en) | 2017-07-10 | 2017-07-10 | Hidden danger mining method for assisting monitoring tour |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107506832B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110245163A (en) * | 2019-01-17 | 2019-09-17 | 国网浙江德清县供电有限公司 | A kind of Operation of Electric Systems hidden troubles removing method |
CN113537415A (en) * | 2021-09-17 | 2021-10-22 | 中国南方电网有限责任公司超高压输电公司广州局 | Convertor station inspection method and device based on multi-information fusion and computer equipment |
CN116030422B (en) * | 2023-03-28 | 2023-05-30 | 深圳市海威恒泰智能科技有限公司 | Visual video monitoring intelligent operation and maintenance management system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101958536B (en) * | 2010-09-20 | 2014-02-19 | 中国电力科学研究院 | Distribution network failure isolation and quick power service restoration decision support system |
CN105528671B (en) * | 2015-11-30 | 2019-10-11 | 武汉大学 | A kind of power grid Multidimensional Awareness based on big data and safety estimation system and method |
-
2017
- 2017-07-10 CN CN201710557973.9A patent/CN107506832B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107506832A (en) | 2017-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110647133B (en) | Rail transit equipment state detection maintenance method and system | |
CN110929898B (en) | Hydropower station start-stop equipment operation and maintenance and fault monitoring online evaluation system and method | |
CN107506832B (en) | Hidden danger mining method for assisting monitoring tour | |
CN115526422B (en) | Coal mine gas explosion risk prediction method | |
CN113806969B (en) | Compressor unit health prediction method based on time domain data correlation modeling | |
CN113902241A (en) | Power grid equipment maintenance strategy system and method based on comprehensive state evaluation | |
CN115358155A (en) | Power big data abnormity early warning method, device, equipment and readable storage medium | |
CN110472851A (en) | A kind of power distribution network risk hidden danger dynamic evaluation model building method neural network based | |
CN113137221A (en) | Three-level gas leakage evaluation system and evaluation method for whole gas extraction system | |
CN114332713B (en) | Construction area operation monitoring method, device and system based on Internet of things | |
CN115049326A (en) | Production management system and management method | |
CN109285331B (en) | Power cable temperature early warning system based on data analysis and temperature prediction | |
CN108377209A (en) | Equipment fault detecting system based on SCADA and detection method | |
CN117150418B (en) | Transformer operation detection period formulation method and system based on state characteristic fault tree | |
CN116896166A (en) | Digital twin panoramic management and control system and method for urban cable | |
CN116579601B (en) | Mine safety production risk monitoring and early warning system and method | |
CN112632325A (en) | Remote monitoring management method and device for operation site based on digital 3D imaging | |
CN116545111A (en) | Information interaction system based on internal and external networks of transformer substation | |
CN111509839A (en) | Trip event model analysis method based on alarm signal | |
CN116108376A (en) | Monitoring system and method for preventing electricity stealing, electronic equipment and medium | |
CN113590663B (en) | Environment detection method and system | |
CN113591909A (en) | Abnormality detection method, abnormality detection device, and storage medium for power system | |
CN113259346A (en) | Situation awareness system for network security | |
CN112486096A (en) | Machine tool operation state monitoring method | |
CN112116108A (en) | Expert system and method for failure analysis of power equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |