CN108320079B - Electric power secondary system risk assessment method considering information system connection and transmission - Google Patents

Electric power secondary system risk assessment method considering information system connection and transmission Download PDF

Info

Publication number
CN108320079B
CN108320079B CN201810007519.0A CN201810007519A CN108320079B CN 108320079 B CN108320079 B CN 108320079B CN 201810007519 A CN201810007519 A CN 201810007519A CN 108320079 B CN108320079 B CN 108320079B
Authority
CN
China
Prior art keywords
information
node
ied
data packet
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810007519.0A
Other languages
Chinese (zh)
Other versions
CN108320079A (en
Inventor
郭逸豪
郭创新
戴波
姚一杨
叶伟静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Zhejiang University ZJU
State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU, State Grid Zhejiang Electric Power Co Ltd filed Critical Zhejiang University ZJU
Priority to CN201810007519.0A priority Critical patent/CN108320079B/en
Publication of CN108320079A publication Critical patent/CN108320079A/en
Application granted granted Critical
Publication of CN108320079B publication Critical patent/CN108320079B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Educational Administration (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a risk assessment method for a secondary power system in consideration of connection and transmission of an information system. The invention comprises the following steps: step 1, abstracting information system elements in a secondary system to generate an information network topology; setting a network operation simulation number N; step 2, performing state sampling on the related elements by using the reliability parameters, removing a fault part in the information network topology, and updating the information network topology; step 3, simulating the operation of the information network according to the routing strategy and the data packet transmission model; if the network operation times reach N, entering step 4; otherwise, returning to the step 2; step 4, counting the completion conditions of the uplink task and the downlink task in the network, and calculating the failure probability of the related IED function; and 5, calculating a risk index of the secondary system according to the value index and the failure probability of the IED function. The invention has better expansibility, stronger adaptability and higher practicability.

Description

Electric power secondary system risk assessment method considering information system connection and transmission
Technical Field
The invention belongs to the technical field of power system automation, and particularly relates to a power secondary system risk assessment method considering information system connection and transmission.
Background
With the increasing degree of information in the power industry, the secondary power system (information system) has become an integral part of the whole power system, which is inseparable and depends on operation. On one hand, the powerful functions of the secondary system provide technical support for the normal operation of the power system; on the other hand, failure of the secondary system may affect reliable operation of the power system, even leading to system oscillation or large-scale power failure accidents. Therefore, establishing an effective power secondary system risk assessment method is of great significance to perfecting the overall risk assessment mechanism of the power system.
At present, many researches on the security risk of the secondary system have appeared at home and abroad, and can be broadly divided into two types: one type is only for modeling of an information system, the safety and the reliability of a secondary system are focused, and the influence of information layer failure on a physical layer of a power grid is not considered; the other type focuses on the specific application of the information system in the power system, and researches the influence of the failure of the secondary system on the power system from specific equipment, specific functions and specific systems. In addition, in the information transfer of the secondary system, most studies are insufficient in consideration of the dynamic transmission characteristics of the information system.
For the above reasons, the applicant hopes to provide a more general method for evaluating the risk of the power secondary system, which takes account of the static connection and dynamic transmission factors of the information system.
Disclosure of Invention
The invention provides a power secondary system risk assessment method considering static connection and dynamic transmission of an information system, and considering the static connection and dynamic transmission factors of the information system. Specifically, the risk assessment of the secondary system is realized through three steps of information network topology generation, information network operation simulation, risk index calculation and the like. The method can provide an auxiliary decision basis for topology optimization, key element identification, risk management and the like of a secondary system.
The technical scheme adopted by the invention for solving the technical problem comprises the following steps:
and step S1, abstracting information system elements in the secondary system to generate an information network topology. And setting the network operation simulation times N.
And step S2, sampling the state of the related elements by using the reliability parameters, removing the fault part in the information network topology, and updating the information network topology.
And step S3, simulating the operation of the information network according to the routing strategy and the data packet transmission model. If the network running times reach N, the step S4 is carried out; otherwise, the process returns to step S2.
And step S4, counting the completion conditions of the uplink task and the downlink task in the network, and calculating the failure probability of the related IED function.
And step S5, calculating a risk index of the secondary system according to the value index and the failure probability of the IED function.
In step S1, the description and definition of the related contents are as follows:
the information system elements include a monitoring host, a switch, an Intelligent Electronic Device (IED), and a communication line. The IEDs are classified into an action type IED and a measurement type IED.
The information system element is abstracted to generate an information network topology, specifically: the supervisory host, switches and IEDs are abstracted as nodes and the communication lines are abstracted as edges. Wherein, the edge between the action type IED and the switch points to the former from the latter, the edge between the measurement type IED and the switch points to the latter from the former, and the rest edges are bidirectional. The direction of the edge represents the direction of information transfer.
In step S2, the description and definition of the related contents are as follows:
the reliability parameters of the related elements include Mean Time To Failure (MTTF), Mean Time To Repair (MTTR). The state of the element is sampled using the monte carlo method, with 0 representing normal and 1 representing fault. The failed element is removed from the network topology. Only itself needs to be removed for an edge; for a node to remove itself, it also removes the edges that it connects to.
In step S3, the description and definition of the related contents are as follows:
the routing strategy can be made according to actual requirements, such as shortest path routing.
Regarding the operation of the information network, the following assumptions are made:
(1) each node can transmit data packets to the adjacent nodes and receive the data packets from the adjacent nodes in each time step;
(2) each node can process C data packets at most in each time step;
(3) each node transmits data packets in sequence based on a first-in first-out (FIFO) principle;
(4) the packet queues at each node may be infinitely long;
(5) the data packet automatically disappears from the network when reaching the destination node;
(6) the monitoring host can generate a data packet, and a destination node of the data packet is an action type IED; the measurement IED can generate a data packet, and the destination node of the data packet is the monitoring host.
With respect to the packet transmission model, assuming that a packet P is transmitted to node m at time t +1 (t is an integer) and the destination node is D, the packet P can be represented as
P (t) ═ P (S, D, m, k) (formula 1)
Wherein, S is valid information (such as electrical quantity or control command) of the data packet P, and can be represented by binary code; D. m represents the address of the corresponding node in addition to the node; k is the number of time steps that have elapsed since the generation of the packet.
The contents of S and D may be erroneous every time step passes, and m and k are automatically updated. Specifically, from time t to t +1, there are
S′=S-int(θ-αS) Δ S (formula 2)
D′=D-int(θ-αD) Δ D (formula 3)
k' ═ k +1 (equation 4)
Wherein θ ═ rand (0,1) is a random number between 0 and 1; int is a rounding function; alpha is alphaS、αDRespectively the probability of the corresponding error; Δ S and Δ D are error amounts. Equations 2 and 3 are the transmission error model.
In addition, the transmission of data packets may also be delayed, expressed mathematically as
P (t + x) ═ P (t),1 ≦ x ≦ τ (equation 5)
Wherein tau is the total delay step number; x is an integer between 1 and tau. Equation 5 is the propagation delay model. The actual delay phenomenon is caused by channel congestion. In performing a simulation of a simple network, τ can be generated by equation 6:
τ ═ -int (θ - β) Δ T (equation 6)
Wherein β is the probability of generating a delay; Δ T is a delay amount set in advance.
Simulating the operation of the information network, and emptying information packets in the network. And generating a plurality of downlink data packets at each monitoring host node and a plurality of uplink data packets at each measurement type IED node, wherein the initial time t is 0. Each packet updates its state once every time step. The time step taken for each packet to reach the destination node is recorded by the variable k. When all the data packets reach the destination node, the secondary simulation is finished.
In step S4, the description and definition of the related contents are as follows:
the generation of the data packet marks the initiation of the task. The uplink task corresponds to the realization of the measurement type IED function, the downlink task corresponds to the realization of the action type IED function, and the following three conditions are simultaneously met when one task is judged to be completed: (1) correct valid information S is transmitted; (2) the correct destination node D is reached; (3) the time step k passed by the transmission is within the allowable range.
Assuming that a certain task A corresponds to a certain IED function f, in N times of network operation simulation, the failure probability y of the function ffIs defined as
Figure GDA0001667364840000041
Wherein the content of the first and second substances,
Figure GDA0001667364840000042
the total number of the tasks A in the ith simulation is initiated;
Figure GDA0001667364840000043
is the total number of completions of task A in the ith simulation.
In step S5, the description and definition of the related contents are as follows:
for an IED function f, its value VfMay be measured by the impact on the physical layer grid when the function fails. The specific indexes can adopt reliability indexes of the power system, such as expected energy shortage (EENS) and loss loadProbability (LOLP), etc. The value of function f is defined in the present invention as the EENS value of the power system when f fails is considered.
The risk indicator R of the secondary system is defined as
R=∑ΥfVf(formula 8)
Wherein the summation symbol represents risk integration for all IED functions in the system.
The invention has the following beneficial effects:
on the basis of the conventional secondary system risk assessment method, the invention mainly takes the influence of dynamic transmission of an information system into consideration, and provides a risk index calculation method based on the functional failure probability. Compared with the traditional method, the method has better expansibility, stronger adaptability and higher practicability.
Detailed Description
The power secondary system risk assessment method considering information system connection and transmission specifically comprises the following steps:
and step S1, abstracting information system elements in the secondary system to generate an information network topology. And setting the network operation simulation times N.
And step S2, sampling the state of the related elements by using the reliability parameters, removing the fault part in the information network topology, and updating the information network topology.
And step S3, simulating the operation of the information network according to the routing strategy and the data packet transmission model. If the network running times reach N, the step S4 is carried out; otherwise, the process returns to step S2.
And step S4, counting the completion conditions of the uplink task and the downlink task in the network, and calculating the failure probability of the related IED function.
And step S5, calculating a risk index of the secondary system according to the value index and the failure probability of the IED function.
In step S1, the description and definition of the related contents are as follows:
the information system elements include a monitoring host, a switch, an Intelligent Electronic Device (IED), and a communication line. The IEDs are classified into an action type IED and a measurement type IED.
The information system element is abstracted to generate an information network topology, specifically: the supervisory host, switches and IEDs are abstracted as nodes and the communication lines are abstracted as edges. Wherein, the edge between the action type IED and the switch points to the former from the latter, the edge between the measurement type IED and the switch points to the latter from the former, and the rest edges are bidirectional. The direction of the edge represents the direction of information transfer.
In step S2, the description and definition of the related contents are as follows:
the reliability parameters of the related elements include Mean Time To Failure (MTTF), Mean Time To Repair (MTTR). The state of the element is sampled using the monte carlo method, with 0 representing normal and 1 representing fault. The failed element is removed from the network topology. Only itself needs to be removed for an edge; for a node to remove itself, it also removes the edges that it connects to.
In step S3, the description and definition of the related contents are as follows:
the routing strategy can be made according to actual requirements, such as shortest path routing.
Regarding the operation of the information network, the following assumptions are made:
(7) each node can transmit data packets to the adjacent nodes and receive the data packets from the adjacent nodes in each time step;
(8) each node can process C data packets at most in each time step;
(9) each node transmits data packets in sequence based on a first-in first-out (FIFO) principle;
(10) the packet queues at each node may be infinitely long;
(11) the data packet automatically disappears from the network when reaching the destination node;
(12) the monitoring host can generate a data packet, and a destination node of the data packet is an action type IED; the measurement IED can generate a data packet, and the destination node of the data packet is the monitoring host.
With respect to the packet transmission model, assuming that a packet P is transmitted to node m at time t +1 (t is an integer) and the destination node is D, the packet P can be represented as
P (t) ═ P (S, D, m, k) (formula 1)
Wherein, S is valid information (such as electrical quantity or control command) of the data packet P, and can be represented by binary code; D. m represents the address of the corresponding node in addition to the node; k is the number of time steps that have elapsed since the generation of the packet.
The contents of S and D may be erroneous every time step passes, and m and k are automatically updated. Specifically, from time t to t +1, there are
S′=S-int(θ-αS) Δ S (formula 2)
D′=D-int(θ-αD) Δ D (formula 3)
k' ═ k +1 (equation 4)
Wherein θ ═ rand (0,1) is a random number between 0 and 1; int is a rounding function; alpha is alphaS、αDRespectively the probability of the corresponding error; Δ S and Δ D are error amounts. Equations 2 and 3 are the transmission error model.
In addition, the transmission of data packets may also be delayed, expressed mathematically as
P (t + x) ═ P (t),1 ≦ x ≦ τ (equation 5)
Wherein tau is the total delay step number; x is an integer between 1 and tau. Equation 5 is the propagation delay model. The actual delay phenomenon is caused by channel congestion. In performing a simulation of a simple network, τ can be generated by equation 6:
τ ═ -int (θ - β) Δ T (equation 6)
Wherein β is the probability of generating a delay; Δ T is a delay amount set in advance.
Simulating the operation of the information network, and emptying information packets in the network. And generating a plurality of downlink data packets at each monitoring host node and a plurality of uplink data packets at each measurement type IED node, wherein the initial time t is 0. Each packet updates its state once every time step. The time step taken for each packet to reach the destination node is recorded by the variable k. When all the data packets reach the destination node, the secondary simulation is finished.
In step S4, the description and definition of the related contents are as follows:
the generation of the data packet marks the initiation of the task. The uplink task corresponds to the realization of the measurement type IED function, the downlink task corresponds to the realization of the action type IED function, and the following three conditions are simultaneously met when one task is judged to be completed: (1) correct valid information S is transmitted; (2) the correct destination node D is reached; (3) the time step k passed by the transmission is within the allowable range.
Assuming that a certain task A corresponds to a certain IED function f, in N times of network operation simulation, the failure probability y of the function ffIs defined as
Figure GDA0001667364840000071
Wherein the content of the first and second substances,
Figure GDA0001667364840000072
the total number of the tasks A in the ith simulation is initiated;
Figure GDA0001667364840000073
is the total number of completions of task A in the ith simulation.
In step S5, the description and definition of the related contents are as follows:
for an IED function f, its value VfMay be measured by the impact on the physical layer grid when the function fails. The specific indexes can adopt the reliability indexes of the power system, such as expected energy shortage (EENS), load loss probability (LOLP) and the like. The value of function f is defined in the present invention as the EENS value of the power system when f fails is considered.
The risk indicator R of the secondary system is defined as
R=∑ΥfVf(formula 8)
Wherein the summation symbol represents risk integration for all IED functions in the system.

Claims (3)

1. The electric power secondary system risk assessment method considering information system connection and transmission is characterized by comprising the following steps:
step S1, abstracting information system elements in the secondary system to generate an information network topology; setting a network operation simulation number N;
step S2, sampling the state of the related elements by using the reliability parameters, removing the fault part in the information network topology, and updating the information network topology;
step S3, simulating the operation of the information network according to the routing strategy and the data packet transmission model; if the network running times reach N, the step S4 is carried out; otherwise, returning to the step S2;
step S4, counting the completion conditions of the uplink task and the downlink task in the network, and calculating the failure probability of the related IED function;
step S5, calculating a risk index of the secondary system according to the value index and the failure probability of the IED function;
in step S1, the description and definition of the related contents are as follows:
the information system elements comprise a monitoring host, a switch, intelligent electronic equipment (IED) and a communication line; the IEDs are divided into action type IEDs and measurement type IEDs;
the information system element is abstracted to generate an information network topology, specifically: abstracting a monitoring host, a switch and an IED into nodes, and abstracting a communication line into edges; wherein, the edge between the action type IED and the switch points to the former from the latter, the edge between the measurement type IED and the switch points to the latter from the former, and the rest edges are bidirectional; the direction of the edge represents the direction of information transmission;
in step S2, the description and definition of the related contents are as follows:
the reliability parameters of the related elements comprise Mean Time To Failure (MTTF), Mean Time To Repair (MTTR); sampling the state of the element by adopting a Monte Carlo method, wherein 0 represents normal and 1 represents fault; removing the failed element from the network topology; only itself needs to be removed for an edge; for a node, removing the node and removing edges connected with the node;
in step S3, the description and definition of the related contents are as follows:
the routing strategy can be formulated according to actual requirements;
regarding the operation of the information network, the following assumptions are made:
(1) each node can transmit data packets to the adjacent nodes and receive the data packets from the adjacent nodes in each time step;
(2) each node can process C data packets at most in each time step;
(3) each node transmits data packets in sequence based on a first-in first-out (FIFO) principle;
(4) the packet queues at each node may be infinitely long;
(5) the data packet automatically disappears from the network when reaching the destination node;
(6) the monitoring host can generate a data packet, and a destination node of the data packet is an action type IED; the measurement IED can generate a data packet, and a destination node of the data packet is a monitoring host;
regarding the data packet transmission model, suppose that a data packet P is transmitted to a node m at time t +1, where t is an integer; with destination node D, packet P can be represented as
P (t) ═ P (S, D, m, k) (formula 1)
Wherein, S is the effective information of the data packet P and can be represented by binary codes; D. m represents the address of the corresponding node in addition to the node; k is the number of time steps that have elapsed since the generation of the data packet;
every time a time step passes, the contents of S and D may generate errors, and m and k are automatically updated; specifically, from time t to t +1, there are
S′=S-int(θ-αS) Δ S (formula 2)
D′=D-int(θ-αD) Δ D (formula 3)
k' ═ k +1 (equation 4)
Wherein θ ═ rand (0,1) is a random number between 0 and 1; int is a rounding function; alpha is alphaS、αDRespectively the probability of the corresponding error; Δ S and Δ D are error amounts; formulas 2 and 3 are transmission error models;
in addition, the transmission of data packets may also be delayed, expressed mathematically as
P (t + x) ═ P (t),1 ≦ x ≦ τ (equation 5)
Wherein tau is the total delay step number; x is an integer between 1 and tau; equation 5 is the transmission delay model; the actual delay phenomenon is caused by channel congestion; in performing a simulation of a simple network, τ can be generated by equation 6:
τ ═ -int (θ - β) Δ T (equation 6)
Wherein β is the probability of generating a delay; Δ T is a delay amount set in advance;
simulating the operation of an information network, and emptying information packets in the network; generating a plurality of downlink data packets at each monitoring host node and a plurality of uplink data packets at each measurement type IED node at an initial time t equal to 0; updating the state of each data packet once every time a time step passes; the time step length of each data packet when reaching the destination node is recorded by a variable k; when all the data packets reach the destination node, the secondary simulation is finished.
2. The method for evaluating risk of a secondary power system in consideration of connection and transmission of an information system according to claim 1, wherein in step S4, the description and definition of the related contents are as follows:
the generation of the data packet marks the initiation of the task; the uplink task corresponds to the realization of the measurement type IED function, the downlink task corresponds to the realization of the action type IED function, and the following three conditions are simultaneously met when one task is judged to be completed: (1) correct valid information S is transmitted; (2) the correct destination node D is reached; (3) the time step k of transmission is within an allowable range;
assuming that a certain task A corresponds to a certain IED function f, in N times of network operation simulation, the failure probability y of the function ffIs defined as
Figure FDA0003308950130000031
Wherein the content of the first and second substances,
Figure FDA0003308950130000032
the total number of the tasks A in the ith simulation is initiated;
Figure FDA0003308950130000033
is the total number of completions of task A in the ith simulation.
3. The method for evaluating risk of a secondary power system in consideration of connection and transmission of an information system according to claim 2, wherein in step S5, the description and definition of the related contents are as follows:
for an IED function f, its value VfCan be measured by the impact on the physical layer power grid when the function fails; the specific indexes can adopt the reliability indexes of the power system, namely expected energy shortage (EENS) and load loss probability (LOLP); defining the value of the function f as an EENS value of the power system when f fails;
the risk indicator R of the secondary system is defined as
R=∑ΥfVf(formula 8)
Wherein the summation symbol represents risk integration for all IED functions in the system.
CN201810007519.0A 2018-01-04 2018-01-04 Electric power secondary system risk assessment method considering information system connection and transmission Active CN108320079B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810007519.0A CN108320079B (en) 2018-01-04 2018-01-04 Electric power secondary system risk assessment method considering information system connection and transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810007519.0A CN108320079B (en) 2018-01-04 2018-01-04 Electric power secondary system risk assessment method considering information system connection and transmission

Publications (2)

Publication Number Publication Date
CN108320079A CN108320079A (en) 2018-07-24
CN108320079B true CN108320079B (en) 2021-12-24

Family

ID=62893898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810007519.0A Active CN108320079B (en) 2018-01-04 2018-01-04 Electric power secondary system risk assessment method considering information system connection and transmission

Country Status (1)

Country Link
CN (1) CN108320079B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858822B (en) * 2019-02-15 2021-07-06 北京邮电大学 Information power fusion system reliability assessment method based on flow correlation analysis

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663530A (en) * 2012-05-25 2012-09-12 中国南方电网有限责任公司超高压输电公司 Safety early warning and evaluating system for high-voltage direct current transmission system
CN102723775A (en) * 2012-04-26 2012-10-10 上海市电力公司 Reliability assessment method for secondary system of intelligent substation
CN103347279A (en) * 2013-07-11 2013-10-09 清华大学 Transmitting method and transmitting system based on risk assessment
CN103607291A (en) * 2013-10-25 2014-02-26 北京科东电力控制系统有限责任公司 Alarm analysis merging method for power secondary system intranet security monitoring platform
CN104281976A (en) * 2013-07-09 2015-01-14 国家电网公司 Power secondary system reliability assessment information processing method
CN104361531A (en) * 2014-11-14 2015-02-18 广东电网有限责任公司电力调度控制中心 Identification method and system for high-risk failure equipment of substation automation system
CN104680425A (en) * 2015-02-15 2015-06-03 国网浙江省电力公司宁波供电公司 Method for establishing improved functional decomposition-based secondary system risk quantification model
CN106600138A (en) * 2016-12-09 2017-04-26 贵州大学 Secondary equipment risk assessment method
CN106815770A (en) * 2015-11-27 2017-06-09 中国电力科学研究院 It is a kind of to consider abundance and security of system the methods of risk assessment of system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140280714A1 (en) * 2013-03-15 2014-09-18 Schweitzer Engineering Laboratories, Inc. Mixed-Mode Communication Between Devices in an Electrical Power System
WO2018042587A1 (en) * 2016-09-01 2018-03-08 三菱電機株式会社 Intelligent electronic device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102723775A (en) * 2012-04-26 2012-10-10 上海市电力公司 Reliability assessment method for secondary system of intelligent substation
CN102663530A (en) * 2012-05-25 2012-09-12 中国南方电网有限责任公司超高压输电公司 Safety early warning and evaluating system for high-voltage direct current transmission system
CN104281976A (en) * 2013-07-09 2015-01-14 国家电网公司 Power secondary system reliability assessment information processing method
CN103347279A (en) * 2013-07-11 2013-10-09 清华大学 Transmitting method and transmitting system based on risk assessment
CN103607291A (en) * 2013-10-25 2014-02-26 北京科东电力控制系统有限责任公司 Alarm analysis merging method for power secondary system intranet security monitoring platform
CN104361531A (en) * 2014-11-14 2015-02-18 广东电网有限责任公司电力调度控制中心 Identification method and system for high-risk failure equipment of substation automation system
CN104680425A (en) * 2015-02-15 2015-06-03 国网浙江省电力公司宁波供电公司 Method for establishing improved functional decomposition-based secondary system risk quantification model
CN106815770A (en) * 2015-11-27 2017-06-09 中国电力科学研究院 It is a kind of to consider abundance and security of system the methods of risk assessment of system
CN106600138A (en) * 2016-12-09 2017-04-26 贵州大学 Secondary equipment risk assessment method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种输变电设备多源数据处理系统的功能设计;龚霄等;《机电工程》;20170620;第34卷(第6期);659-663,673 *
智能变电站二次设备在线监测与故障诊断;胡定林;《电子技术与软件工程》;20171206;208-209 *

Also Published As

Publication number Publication date
CN108320079A (en) 2018-07-24

Similar Documents

Publication Publication Date Title
CN110300018B (en) Object-oriented hierarchical modeling method for power grid information physical system
Cai et al. Modeling and impact analysis of interdependent characteristics on cascading failures in smart grids
Baccelli et al. TCP is max-plus linear and what it tells us on its throughput
CN111697566B (en) Reliability assessment method for active power distribution network information physical system considering information failure
CN103323707A (en) Transformer failure rate predicating method based on half Markoff process
Fencl et al. Network topology design
CN105553843A (en) Transmission line relay protection control service channel route configuration method and device
CN104320324A (en) Virtual network mapping method based on link interference
CN110224427B (en) Information physical system modeling method based on micro-grid energy control strategy
CN104049533A (en) Network control system controller design method based on hidden semi-markov model
CN107025524B (en) Equipment overload auxiliary decision-making method considering load power supply reliability requirement
CN104601375A (en) Intelligent substation communication network monitoring system, setting method and monitoring method
CN102546432B (en) Method and device for planning packet transmission bearer network capacity
CN103607320A (en) An electric power communication network survivability evaluating method
EP1798894A1 (en) A fast simulated annealing for traffic matrix estimation
US8990056B2 (en) Method, computer program product, and apparatus for comparing traffic pattern models of a complex communication system
CN108320079B (en) Electric power secondary system risk assessment method considering information system connection and transmission
CN104217120A (en) Method for evaluating reliability of digital transformer substation relay protection system
CN116015707A (en) Network topology optimization method, device and terminal for power distribution network information physical system
CN107277828B (en) Information physical system planning method for balancing failure risk of system
CN113868813B (en) Performance evaluation method of power information system, electronic device and storage medium
EP4167540A1 (en) Availability slo-aware network optimization
CN115879806A (en) Power system and traffic network vulnerability assessment method based on complex network
CN113660677B (en) Maximum error independent path calculation method of weighted time-varying network under consumption limit
CN103200104B (en) A kind of heuristic routing table update method based on volume forecasting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant