CN108320079B - Electric power secondary system risk assessment method considering information system connection and transmission - Google Patents
Electric power secondary system risk assessment method considering information system connection and transmission Download PDFInfo
- Publication number
- CN108320079B CN108320079B CN201810007519.0A CN201810007519A CN108320079B CN 108320079 B CN108320079 B CN 108320079B CN 201810007519 A CN201810007519 A CN 201810007519A CN 108320079 B CN108320079 B CN 108320079B
- Authority
- CN
- China
- Prior art keywords
- information
- node
- ied
- data packet
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 31
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000012502 risk assessment Methods 0.000 title claims abstract description 11
- 238000004088 simulation Methods 0.000 claims abstract description 20
- 238000005070 sampling Methods 0.000 claims abstract description 5
- 238000005259 measurement Methods 0.000 claims description 15
- 238000012544 monitoring process Methods 0.000 claims description 13
- 230000009471 action Effects 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 5
- 238000000342 Monte Carlo simulation Methods 0.000 claims description 3
- 230000002457 bidirectional effect Effects 0.000 claims description 3
- 230000003111 delayed effect Effects 0.000 claims description 3
- 230000000977 initiatory effect Effects 0.000 claims description 3
- 230000010354 integration Effects 0.000 claims description 3
- 230000008439 repair process Effects 0.000 claims description 3
- 239000000126 substance Substances 0.000 claims description 3
- 230000003068 static effect Effects 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000007429 general method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000010355 oscillation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Educational Administration (AREA)
- Marketing (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Game Theory and Decision Science (AREA)
- Operations Research (AREA)
- Health & Medical Sciences (AREA)
- Public Health (AREA)
- Water Supply & Treatment (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a risk assessment method for a secondary power system in consideration of connection and transmission of an information system. The invention comprises the following steps: step 1, abstracting information system elements in a secondary system to generate an information network topology; setting a network operation simulation number N; step 2, performing state sampling on the related elements by using the reliability parameters, removing a fault part in the information network topology, and updating the information network topology; step 3, simulating the operation of the information network according to the routing strategy and the data packet transmission model; if the network operation times reach N, entering step 4; otherwise, returning to the step 2; step 4, counting the completion conditions of the uplink task and the downlink task in the network, and calculating the failure probability of the related IED function; and 5, calculating a risk index of the secondary system according to the value index and the failure probability of the IED function. The invention has better expansibility, stronger adaptability and higher practicability.
Description
Technical Field
The invention belongs to the technical field of power system automation, and particularly relates to a power secondary system risk assessment method considering information system connection and transmission.
Background
With the increasing degree of information in the power industry, the secondary power system (information system) has become an integral part of the whole power system, which is inseparable and depends on operation. On one hand, the powerful functions of the secondary system provide technical support for the normal operation of the power system; on the other hand, failure of the secondary system may affect reliable operation of the power system, even leading to system oscillation or large-scale power failure accidents. Therefore, establishing an effective power secondary system risk assessment method is of great significance to perfecting the overall risk assessment mechanism of the power system.
At present, many researches on the security risk of the secondary system have appeared at home and abroad, and can be broadly divided into two types: one type is only for modeling of an information system, the safety and the reliability of a secondary system are focused, and the influence of information layer failure on a physical layer of a power grid is not considered; the other type focuses on the specific application of the information system in the power system, and researches the influence of the failure of the secondary system on the power system from specific equipment, specific functions and specific systems. In addition, in the information transfer of the secondary system, most studies are insufficient in consideration of the dynamic transmission characteristics of the information system.
For the above reasons, the applicant hopes to provide a more general method for evaluating the risk of the power secondary system, which takes account of the static connection and dynamic transmission factors of the information system.
Disclosure of Invention
The invention provides a power secondary system risk assessment method considering static connection and dynamic transmission of an information system, and considering the static connection and dynamic transmission factors of the information system. Specifically, the risk assessment of the secondary system is realized through three steps of information network topology generation, information network operation simulation, risk index calculation and the like. The method can provide an auxiliary decision basis for topology optimization, key element identification, risk management and the like of a secondary system.
The technical scheme adopted by the invention for solving the technical problem comprises the following steps:
and step S1, abstracting information system elements in the secondary system to generate an information network topology. And setting the network operation simulation times N.
And step S2, sampling the state of the related elements by using the reliability parameters, removing the fault part in the information network topology, and updating the information network topology.
And step S3, simulating the operation of the information network according to the routing strategy and the data packet transmission model. If the network running times reach N, the step S4 is carried out; otherwise, the process returns to step S2.
And step S4, counting the completion conditions of the uplink task and the downlink task in the network, and calculating the failure probability of the related IED function.
And step S5, calculating a risk index of the secondary system according to the value index and the failure probability of the IED function.
In step S1, the description and definition of the related contents are as follows:
the information system elements include a monitoring host, a switch, an Intelligent Electronic Device (IED), and a communication line. The IEDs are classified into an action type IED and a measurement type IED.
The information system element is abstracted to generate an information network topology, specifically: the supervisory host, switches and IEDs are abstracted as nodes and the communication lines are abstracted as edges. Wherein, the edge between the action type IED and the switch points to the former from the latter, the edge between the measurement type IED and the switch points to the latter from the former, and the rest edges are bidirectional. The direction of the edge represents the direction of information transfer.
In step S2, the description and definition of the related contents are as follows:
the reliability parameters of the related elements include Mean Time To Failure (MTTF), Mean Time To Repair (MTTR). The state of the element is sampled using the monte carlo method, with 0 representing normal and 1 representing fault. The failed element is removed from the network topology. Only itself needs to be removed for an edge; for a node to remove itself, it also removes the edges that it connects to.
In step S3, the description and definition of the related contents are as follows:
the routing strategy can be made according to actual requirements, such as shortest path routing.
Regarding the operation of the information network, the following assumptions are made:
(1) each node can transmit data packets to the adjacent nodes and receive the data packets from the adjacent nodes in each time step;
(2) each node can process C data packets at most in each time step;
(3) each node transmits data packets in sequence based on a first-in first-out (FIFO) principle;
(4) the packet queues at each node may be infinitely long;
(5) the data packet automatically disappears from the network when reaching the destination node;
(6) the monitoring host can generate a data packet, and a destination node of the data packet is an action type IED; the measurement IED can generate a data packet, and the destination node of the data packet is the monitoring host.
With respect to the packet transmission model, assuming that a packet P is transmitted to node m at time t +1 (t is an integer) and the destination node is D, the packet P can be represented as
P (t) ═ P (S, D, m, k) (formula 1)
Wherein, S is valid information (such as electrical quantity or control command) of the data packet P, and can be represented by binary code; D. m represents the address of the corresponding node in addition to the node; k is the number of time steps that have elapsed since the generation of the packet.
The contents of S and D may be erroneous every time step passes, and m and k are automatically updated. Specifically, from time t to t +1, there are
S′=S-int(θ-αS) Δ S (formula 2)
D′=D-int(θ-αD) Δ D (formula 3)
k' ═ k +1 (equation 4)
Wherein θ ═ rand (0,1) is a random number between 0 and 1; int is a rounding function; alpha is alphaS、αDRespectively the probability of the corresponding error; Δ S and Δ D are error amounts. Equations 2 and 3 are the transmission error model.
In addition, the transmission of data packets may also be delayed, expressed mathematically as
P (t + x) ═ P (t),1 ≦ x ≦ τ (equation 5)
Wherein tau is the total delay step number; x is an integer between 1 and tau. Equation 5 is the propagation delay model. The actual delay phenomenon is caused by channel congestion. In performing a simulation of a simple network, τ can be generated by equation 6:
τ ═ -int (θ - β) Δ T (equation 6)
Wherein β is the probability of generating a delay; Δ T is a delay amount set in advance.
Simulating the operation of the information network, and emptying information packets in the network. And generating a plurality of downlink data packets at each monitoring host node and a plurality of uplink data packets at each measurement type IED node, wherein the initial time t is 0. Each packet updates its state once every time step. The time step taken for each packet to reach the destination node is recorded by the variable k. When all the data packets reach the destination node, the secondary simulation is finished.
In step S4, the description and definition of the related contents are as follows:
the generation of the data packet marks the initiation of the task. The uplink task corresponds to the realization of the measurement type IED function, the downlink task corresponds to the realization of the action type IED function, and the following three conditions are simultaneously met when one task is judged to be completed: (1) correct valid information S is transmitted; (2) the correct destination node D is reached; (3) the time step k passed by the transmission is within the allowable range.
Assuming that a certain task A corresponds to a certain IED function f, in N times of network operation simulation, the failure probability y of the function ffIs defined as
Wherein the content of the first and second substances,the total number of the tasks A in the ith simulation is initiated;is the total number of completions of task A in the ith simulation.
In step S5, the description and definition of the related contents are as follows:
for an IED function f, its value VfMay be measured by the impact on the physical layer grid when the function fails. The specific indexes can adopt reliability indexes of the power system, such as expected energy shortage (EENS) and loss loadProbability (LOLP), etc. The value of function f is defined in the present invention as the EENS value of the power system when f fails is considered.
The risk indicator R of the secondary system is defined as
R=∑ΥfVf(formula 8)
Wherein the summation symbol represents risk integration for all IED functions in the system.
The invention has the following beneficial effects:
on the basis of the conventional secondary system risk assessment method, the invention mainly takes the influence of dynamic transmission of an information system into consideration, and provides a risk index calculation method based on the functional failure probability. Compared with the traditional method, the method has better expansibility, stronger adaptability and higher practicability.
Detailed Description
The power secondary system risk assessment method considering information system connection and transmission specifically comprises the following steps:
and step S1, abstracting information system elements in the secondary system to generate an information network topology. And setting the network operation simulation times N.
And step S2, sampling the state of the related elements by using the reliability parameters, removing the fault part in the information network topology, and updating the information network topology.
And step S3, simulating the operation of the information network according to the routing strategy and the data packet transmission model. If the network running times reach N, the step S4 is carried out; otherwise, the process returns to step S2.
And step S4, counting the completion conditions of the uplink task and the downlink task in the network, and calculating the failure probability of the related IED function.
And step S5, calculating a risk index of the secondary system according to the value index and the failure probability of the IED function.
In step S1, the description and definition of the related contents are as follows:
the information system elements include a monitoring host, a switch, an Intelligent Electronic Device (IED), and a communication line. The IEDs are classified into an action type IED and a measurement type IED.
The information system element is abstracted to generate an information network topology, specifically: the supervisory host, switches and IEDs are abstracted as nodes and the communication lines are abstracted as edges. Wherein, the edge between the action type IED and the switch points to the former from the latter, the edge between the measurement type IED and the switch points to the latter from the former, and the rest edges are bidirectional. The direction of the edge represents the direction of information transfer.
In step S2, the description and definition of the related contents are as follows:
the reliability parameters of the related elements include Mean Time To Failure (MTTF), Mean Time To Repair (MTTR). The state of the element is sampled using the monte carlo method, with 0 representing normal and 1 representing fault. The failed element is removed from the network topology. Only itself needs to be removed for an edge; for a node to remove itself, it also removes the edges that it connects to.
In step S3, the description and definition of the related contents are as follows:
the routing strategy can be made according to actual requirements, such as shortest path routing.
Regarding the operation of the information network, the following assumptions are made:
(7) each node can transmit data packets to the adjacent nodes and receive the data packets from the adjacent nodes in each time step;
(8) each node can process C data packets at most in each time step;
(9) each node transmits data packets in sequence based on a first-in first-out (FIFO) principle;
(10) the packet queues at each node may be infinitely long;
(11) the data packet automatically disappears from the network when reaching the destination node;
(12) the monitoring host can generate a data packet, and a destination node of the data packet is an action type IED; the measurement IED can generate a data packet, and the destination node of the data packet is the monitoring host.
With respect to the packet transmission model, assuming that a packet P is transmitted to node m at time t +1 (t is an integer) and the destination node is D, the packet P can be represented as
P (t) ═ P (S, D, m, k) (formula 1)
Wherein, S is valid information (such as electrical quantity or control command) of the data packet P, and can be represented by binary code; D. m represents the address of the corresponding node in addition to the node; k is the number of time steps that have elapsed since the generation of the packet.
The contents of S and D may be erroneous every time step passes, and m and k are automatically updated. Specifically, from time t to t +1, there are
S′=S-int(θ-αS) Δ S (formula 2)
D′=D-int(θ-αD) Δ D (formula 3)
k' ═ k +1 (equation 4)
Wherein θ ═ rand (0,1) is a random number between 0 and 1; int is a rounding function; alpha is alphaS、αDRespectively the probability of the corresponding error; Δ S and Δ D are error amounts. Equations 2 and 3 are the transmission error model.
In addition, the transmission of data packets may also be delayed, expressed mathematically as
P (t + x) ═ P (t),1 ≦ x ≦ τ (equation 5)
Wherein tau is the total delay step number; x is an integer between 1 and tau. Equation 5 is the propagation delay model. The actual delay phenomenon is caused by channel congestion. In performing a simulation of a simple network, τ can be generated by equation 6:
τ ═ -int (θ - β) Δ T (equation 6)
Wherein β is the probability of generating a delay; Δ T is a delay amount set in advance.
Simulating the operation of the information network, and emptying information packets in the network. And generating a plurality of downlink data packets at each monitoring host node and a plurality of uplink data packets at each measurement type IED node, wherein the initial time t is 0. Each packet updates its state once every time step. The time step taken for each packet to reach the destination node is recorded by the variable k. When all the data packets reach the destination node, the secondary simulation is finished.
In step S4, the description and definition of the related contents are as follows:
the generation of the data packet marks the initiation of the task. The uplink task corresponds to the realization of the measurement type IED function, the downlink task corresponds to the realization of the action type IED function, and the following three conditions are simultaneously met when one task is judged to be completed: (1) correct valid information S is transmitted; (2) the correct destination node D is reached; (3) the time step k passed by the transmission is within the allowable range.
Assuming that a certain task A corresponds to a certain IED function f, in N times of network operation simulation, the failure probability y of the function ffIs defined as
Wherein the content of the first and second substances,the total number of the tasks A in the ith simulation is initiated;is the total number of completions of task A in the ith simulation.
In step S5, the description and definition of the related contents are as follows:
for an IED function f, its value VfMay be measured by the impact on the physical layer grid when the function fails. The specific indexes can adopt the reliability indexes of the power system, such as expected energy shortage (EENS), load loss probability (LOLP) and the like. The value of function f is defined in the present invention as the EENS value of the power system when f fails is considered.
The risk indicator R of the secondary system is defined as
R=∑ΥfVf(formula 8)
Wherein the summation symbol represents risk integration for all IED functions in the system.
Claims (3)
1. The electric power secondary system risk assessment method considering information system connection and transmission is characterized by comprising the following steps:
step S1, abstracting information system elements in the secondary system to generate an information network topology; setting a network operation simulation number N;
step S2, sampling the state of the related elements by using the reliability parameters, removing the fault part in the information network topology, and updating the information network topology;
step S3, simulating the operation of the information network according to the routing strategy and the data packet transmission model; if the network running times reach N, the step S4 is carried out; otherwise, returning to the step S2;
step S4, counting the completion conditions of the uplink task and the downlink task in the network, and calculating the failure probability of the related IED function;
step S5, calculating a risk index of the secondary system according to the value index and the failure probability of the IED function;
in step S1, the description and definition of the related contents are as follows:
the information system elements comprise a monitoring host, a switch, intelligent electronic equipment (IED) and a communication line; the IEDs are divided into action type IEDs and measurement type IEDs;
the information system element is abstracted to generate an information network topology, specifically: abstracting a monitoring host, a switch and an IED into nodes, and abstracting a communication line into edges; wherein, the edge between the action type IED and the switch points to the former from the latter, the edge between the measurement type IED and the switch points to the latter from the former, and the rest edges are bidirectional; the direction of the edge represents the direction of information transmission;
in step S2, the description and definition of the related contents are as follows:
the reliability parameters of the related elements comprise Mean Time To Failure (MTTF), Mean Time To Repair (MTTR); sampling the state of the element by adopting a Monte Carlo method, wherein 0 represents normal and 1 represents fault; removing the failed element from the network topology; only itself needs to be removed for an edge; for a node, removing the node and removing edges connected with the node;
in step S3, the description and definition of the related contents are as follows:
the routing strategy can be formulated according to actual requirements;
regarding the operation of the information network, the following assumptions are made:
(1) each node can transmit data packets to the adjacent nodes and receive the data packets from the adjacent nodes in each time step;
(2) each node can process C data packets at most in each time step;
(3) each node transmits data packets in sequence based on a first-in first-out (FIFO) principle;
(4) the packet queues at each node may be infinitely long;
(5) the data packet automatically disappears from the network when reaching the destination node;
(6) the monitoring host can generate a data packet, and a destination node of the data packet is an action type IED; the measurement IED can generate a data packet, and a destination node of the data packet is a monitoring host;
regarding the data packet transmission model, suppose that a data packet P is transmitted to a node m at time t +1, where t is an integer; with destination node D, packet P can be represented as
P (t) ═ P (S, D, m, k) (formula 1)
Wherein, S is the effective information of the data packet P and can be represented by binary codes; D. m represents the address of the corresponding node in addition to the node; k is the number of time steps that have elapsed since the generation of the data packet;
every time a time step passes, the contents of S and D may generate errors, and m and k are automatically updated; specifically, from time t to t +1, there are
S′=S-int(θ-αS) Δ S (formula 2)
D′=D-int(θ-αD) Δ D (formula 3)
k' ═ k +1 (equation 4)
Wherein θ ═ rand (0,1) is a random number between 0 and 1; int is a rounding function; alpha is alphaS、αDRespectively the probability of the corresponding error; Δ S and Δ D are error amounts; formulas 2 and 3 are transmission error models;
in addition, the transmission of data packets may also be delayed, expressed mathematically as
P (t + x) ═ P (t),1 ≦ x ≦ τ (equation 5)
Wherein tau is the total delay step number; x is an integer between 1 and tau; equation 5 is the transmission delay model; the actual delay phenomenon is caused by channel congestion; in performing a simulation of a simple network, τ can be generated by equation 6:
τ ═ -int (θ - β) Δ T (equation 6)
Wherein β is the probability of generating a delay; Δ T is a delay amount set in advance;
simulating the operation of an information network, and emptying information packets in the network; generating a plurality of downlink data packets at each monitoring host node and a plurality of uplink data packets at each measurement type IED node at an initial time t equal to 0; updating the state of each data packet once every time a time step passes; the time step length of each data packet when reaching the destination node is recorded by a variable k; when all the data packets reach the destination node, the secondary simulation is finished.
2. The method for evaluating risk of a secondary power system in consideration of connection and transmission of an information system according to claim 1, wherein in step S4, the description and definition of the related contents are as follows:
the generation of the data packet marks the initiation of the task; the uplink task corresponds to the realization of the measurement type IED function, the downlink task corresponds to the realization of the action type IED function, and the following three conditions are simultaneously met when one task is judged to be completed: (1) correct valid information S is transmitted; (2) the correct destination node D is reached; (3) the time step k of transmission is within an allowable range;
assuming that a certain task A corresponds to a certain IED function f, in N times of network operation simulation, the failure probability y of the function ffIs defined as
3. The method for evaluating risk of a secondary power system in consideration of connection and transmission of an information system according to claim 2, wherein in step S5, the description and definition of the related contents are as follows:
for an IED function f, its value VfCan be measured by the impact on the physical layer power grid when the function fails; the specific indexes can adopt the reliability indexes of the power system, namely expected energy shortage (EENS) and load loss probability (LOLP); defining the value of the function f as an EENS value of the power system when f fails;
the risk indicator R of the secondary system is defined as
R=∑ΥfVf(formula 8)
Wherein the summation symbol represents risk integration for all IED functions in the system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810007519.0A CN108320079B (en) | 2018-01-04 | 2018-01-04 | Electric power secondary system risk assessment method considering information system connection and transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810007519.0A CN108320079B (en) | 2018-01-04 | 2018-01-04 | Electric power secondary system risk assessment method considering information system connection and transmission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108320079A CN108320079A (en) | 2018-07-24 |
CN108320079B true CN108320079B (en) | 2021-12-24 |
Family
ID=62893898
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810007519.0A Active CN108320079B (en) | 2018-01-04 | 2018-01-04 | Electric power secondary system risk assessment method considering information system connection and transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108320079B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109858822B (en) * | 2019-02-15 | 2021-07-06 | 北京邮电大学 | Information power fusion system reliability assessment method based on flow correlation analysis |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102663530A (en) * | 2012-05-25 | 2012-09-12 | 中国南方电网有限责任公司超高压输电公司 | Safety early warning and evaluating system for high-voltage direct current transmission system |
CN102723775A (en) * | 2012-04-26 | 2012-10-10 | 上海市电力公司 | Reliability assessment method for secondary system of intelligent substation |
CN103347279A (en) * | 2013-07-11 | 2013-10-09 | 清华大学 | Transmitting method and transmitting system based on risk assessment |
CN103607291A (en) * | 2013-10-25 | 2014-02-26 | 北京科东电力控制系统有限责任公司 | Alarm analysis merging method for power secondary system intranet security monitoring platform |
CN104281976A (en) * | 2013-07-09 | 2015-01-14 | 国家电网公司 | Power secondary system reliability assessment information processing method |
CN104361531A (en) * | 2014-11-14 | 2015-02-18 | 广东电网有限责任公司电力调度控制中心 | Identification method and system for high-risk failure equipment of substation automation system |
CN104680425A (en) * | 2015-02-15 | 2015-06-03 | 国网浙江省电力公司宁波供电公司 | Method for establishing improved functional decomposition-based secondary system risk quantification model |
CN106600138A (en) * | 2016-12-09 | 2017-04-26 | 贵州大学 | Secondary equipment risk assessment method |
CN106815770A (en) * | 2015-11-27 | 2017-06-09 | 中国电力科学研究院 | It is a kind of to consider abundance and security of system the methods of risk assessment of system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140280714A1 (en) * | 2013-03-15 | 2014-09-18 | Schweitzer Engineering Laboratories, Inc. | Mixed-Mode Communication Between Devices in an Electrical Power System |
WO2018042587A1 (en) * | 2016-09-01 | 2018-03-08 | 三菱電機株式会社 | Intelligent electronic device |
-
2018
- 2018-01-04 CN CN201810007519.0A patent/CN108320079B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102723775A (en) * | 2012-04-26 | 2012-10-10 | 上海市电力公司 | Reliability assessment method for secondary system of intelligent substation |
CN102663530A (en) * | 2012-05-25 | 2012-09-12 | 中国南方电网有限责任公司超高压输电公司 | Safety early warning and evaluating system for high-voltage direct current transmission system |
CN104281976A (en) * | 2013-07-09 | 2015-01-14 | 国家电网公司 | Power secondary system reliability assessment information processing method |
CN103347279A (en) * | 2013-07-11 | 2013-10-09 | 清华大学 | Transmitting method and transmitting system based on risk assessment |
CN103607291A (en) * | 2013-10-25 | 2014-02-26 | 北京科东电力控制系统有限责任公司 | Alarm analysis merging method for power secondary system intranet security monitoring platform |
CN104361531A (en) * | 2014-11-14 | 2015-02-18 | 广东电网有限责任公司电力调度控制中心 | Identification method and system for high-risk failure equipment of substation automation system |
CN104680425A (en) * | 2015-02-15 | 2015-06-03 | 国网浙江省电力公司宁波供电公司 | Method for establishing improved functional decomposition-based secondary system risk quantification model |
CN106815770A (en) * | 2015-11-27 | 2017-06-09 | 中国电力科学研究院 | It is a kind of to consider abundance and security of system the methods of risk assessment of system |
CN106600138A (en) * | 2016-12-09 | 2017-04-26 | 贵州大学 | Secondary equipment risk assessment method |
Non-Patent Citations (2)
Title |
---|
一种输变电设备多源数据处理系统的功能设计;龚霄等;《机电工程》;20170620;第34卷(第6期);659-663,673 * |
智能变电站二次设备在线监测与故障诊断;胡定林;《电子技术与软件工程》;20171206;208-209 * |
Also Published As
Publication number | Publication date |
---|---|
CN108320079A (en) | 2018-07-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110300018B (en) | Object-oriented hierarchical modeling method for power grid information physical system | |
Cai et al. | Modeling and impact analysis of interdependent characteristics on cascading failures in smart grids | |
Baccelli et al. | TCP is max-plus linear and what it tells us on its throughput | |
CN111697566B (en) | Reliability assessment method for active power distribution network information physical system considering information failure | |
CN103323707A (en) | Transformer failure rate predicating method based on half Markoff process | |
Fencl et al. | Network topology design | |
CN105553843A (en) | Transmission line relay protection control service channel route configuration method and device | |
CN104320324A (en) | Virtual network mapping method based on link interference | |
CN110224427B (en) | Information physical system modeling method based on micro-grid energy control strategy | |
CN104049533A (en) | Network control system controller design method based on hidden semi-markov model | |
CN107025524B (en) | Equipment overload auxiliary decision-making method considering load power supply reliability requirement | |
CN104601375A (en) | Intelligent substation communication network monitoring system, setting method and monitoring method | |
CN102546432B (en) | Method and device for planning packet transmission bearer network capacity | |
CN103607320A (en) | An electric power communication network survivability evaluating method | |
EP1798894A1 (en) | A fast simulated annealing for traffic matrix estimation | |
US8990056B2 (en) | Method, computer program product, and apparatus for comparing traffic pattern models of a complex communication system | |
CN108320079B (en) | Electric power secondary system risk assessment method considering information system connection and transmission | |
CN104217120A (en) | Method for evaluating reliability of digital transformer substation relay protection system | |
CN116015707A (en) | Network topology optimization method, device and terminal for power distribution network information physical system | |
CN107277828B (en) | Information physical system planning method for balancing failure risk of system | |
CN113868813B (en) | Performance evaluation method of power information system, electronic device and storage medium | |
EP4167540A1 (en) | Availability slo-aware network optimization | |
CN115879806A (en) | Power system and traffic network vulnerability assessment method based on complex network | |
CN113660677B (en) | Maximum error independent path calculation method of weighted time-varying network under consumption limit | |
CN103200104B (en) | A kind of heuristic routing table update method based on volume forecasting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |