CN108512217A - A kind of safe operation of electric network hidden danger intelligent identification Method - Google Patents
A kind of safe operation of electric network hidden danger intelligent identification Method Download PDFInfo
- Publication number
- CN108512217A CN108512217A CN201810184735.2A CN201810184735A CN108512217A CN 108512217 A CN108512217 A CN 108512217A CN 201810184735 A CN201810184735 A CN 201810184735A CN 108512217 A CN108512217 A CN 108512217A
- Authority
- CN
- China
- Prior art keywords
- security risk
- hidden danger
- substation
- power grid
- permission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 230000007935 neutral effect Effects 0.000 claims abstract description 26
- 238000004458 analytical method Methods 0.000 claims abstract description 19
- 230000011664 signaling Effects 0.000 claims abstract description 11
- 230000000903 blocking effect Effects 0.000 claims description 12
- 238000012544 monitoring process Methods 0.000 claims description 12
- 230000008569 process Effects 0.000 claims description 10
- 230000002159 abnormal effect Effects 0.000 claims description 6
- 230000005856 abnormality Effects 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000001514 detection method Methods 0.000 claims description 6
- 230000004048 modification Effects 0.000 claims description 4
- 238000012986 modification Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 4
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 230000002045 lasting effect Effects 0.000 claims description 3
- 238000010937 topological data analysis Methods 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 7
- 230000008859 change Effects 0.000 description 2
- 238000003745 diagnosis Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000004630 mental health Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J3/00—Circuit arrangements for ac mains or ac distribution networks
-
- H02J13/0006—
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J2203/00—Indexing scheme relating to details of circuit arrangements for AC mains or AC distribution networks
- H02J2203/20—Simulating, e g planning, reliability check, modelling or computer assisted design [CAD]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E60/00—Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S10/00—Systems supporting electrical power generation, transmission or distribution
- Y04S10/16—Electric power substations
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S10/00—Systems supporting electrical power generation, transmission or distribution
- Y04S10/40—Display of information, e.g. of data or controls
Landscapes
- Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Remote Monitoring And Control Of Power-Distribution Networks (AREA)
- Supply And Distribution Of Alternating Current (AREA)
Abstract
The present invention relates to the technical fields of electric system power grid regulation; more specifically; it is related to a kind of safe operation of electric network hidden danger intelligent identification Method; establish security risk model library; the various factors such as comprehensive utilization history security risk information analyze operation of power networks situation in real time, and the security risks such as reclosing mistake, protection mismatch, prepared auto restart, stable mismatch for being obtained to analysis intelligently generate warning information;By acquiring and analyzing the remote signalling data of SCADA system in real time, the remote control rights state of substation is recorded, realizes that transformer substation remote-control permission timing intelligent is reminded;By to power grid depth topological analysis, realizing to the rational intelligent diagnostics of neutral grounding mode and prompting.The present invention can solve the problems such as power grid scale is difficult to analyze greatly, be had differences between regulation and control personnel, security risk is easily missed, and realize to the full scale of bulk power grid, all the period of time, security risk real time scan, intellectual analysis and be automatically reminded in all directions.
Description
Technical field
The present invention relates to the technical fields of electric system power grid regulation, hidden more particularly, to a kind of safe operation of electric network
Suffer from intelligent identification Method.
Background technology
In recent years, since power grid scale is drastically expanded, it is in brand diversification that first and second equipment of power grid is overall, vdiverse in function
Change, the trend that configuration complicates so that the cooperation of protection definite value and stability strategy requires higher and higher;And regulate and control operations staff
Technical merit and form of thinking have differences so that hidden to safety such as reclosing mistake, protection mismatch, prepared auto restart, stable mismatches
Suffer from the accuracy monitored and promptness difference;In addition regulation and control person works' amount is increasingly heavy, traditional power grid security hidden danger prison
Control seems time-consuming and laborious by the mode of manual analysis, and certain security risks are even just found after accident event generation, sternly
The promotion of power grid regulation operational safety level is constrained again.
Currently, dispatching and monitoring person is by record of relieving, Personal Skills are horizontal and working experience identifies security risk, succeed
Dispatching and monitoring person great effort need to be spent for being familiar with operation of power networks state, screening operation monitoring " blind spot ", with upper value people
Member joins and confirms hidden danger information etc..However, being screened to the whole network all devices by manual type, cover grid equipment number
Amount is big, and brand is more, and the configuration of each plant equipment and parameter are variant, and dispatching and monitoring person depends on the analysis depth of security risk
Personal Skills' experience level.Certain special method of operation duration are long, and dispatching and monitoring person needs to continue timing to associated safety
Hidden danger implements concern, and is linked up by phone and relevant device leader and scene fortune inspection personnel, in addition present workload day
Benefit increases, and is easy to cause related personnel and omits processing security risk, is also brought to the routine work for regulating and controlling operations staff larger
Work load and Mental health problem.
Invention content
It is an object of the invention to overcome the deficiencies of the prior art and provide one kind can realize for the full scale of bulk power grid,
All the period of time, in all directions security risk real time scan, intellectual analysis and the safe operation of electric network hidden danger intelligent recognition side being automatically reminded to
Method.
In order to solve the above technical problems, the technical solution adopted by the present invention is:
A kind of safe operation of electric network hidden danger intelligent identification Method is provided, is included the following steps:
S10. it obtains grid topology data in SCADA system in real time by data transmission interface, establishes safe operation of electric network hidden danger
Intelligent identifying system;
S20. the security risk edit page of the intelligent identifying system increases security risk newly in step slo, for the safety
Hidden danger sets Rule of judgment, and the security risk and its corresponding Rule of judgment are stored, and establishes power grid security hidden danger mould
Type library;
S30. security risk all in power grid security hidden danger model library is traversed, and power grid is transported using history security risk information
Row situation is analyzed in real time, and warning information is intelligently generated to the security risk that analysis obtains;
S40. transformer substation remote-control permission and conversion time database are established, to realize uninterrupted scanning full electric network substation
It is remotely controlled permission, while establishing information intelligent and issuing function is reminded pointedly to issue security risk information to related personnel;It is described
Permission includes permission in station and scheduling permission, and interior permission of standing or scheduling permission duration are time interval t;
S50. by the topological data of SCADA system and on off state data, from busbar, substation is found by topology
The neutral ground disconnecting link or blocking device grounding switch of connection, it is whether abnormal according to interpretation of result neutral point is found.
The safe operation of electric network hidden danger intelligent identification Method of the present invention, solve power grid scale be difficult to analyze greatly, regulation and control personnel
Between have differences, the problems such as security risk is easily missed, realize to the full scale of bulk power grid, all the period of time, security risk is real in all directions
When scanning, intellectual analysis and be automatically reminded to;Intelligent knowledge can be carried out to particular safety hidden danger according to historical data and expertise
Not;Permission is remotely controlled to plant stand simultaneously and the common security risk easily ignored of neutral grounding mode establishes corresponding identification mould
Block finds and excludes in advance security risk by issuing security risk information automatically to related personnel.
Preferably, the Rule of judgment set in step S20 is selected from line switching closure, line switching disconnects, main transformer voltage
It is more than or equal to setting value not equal to setting value, main transformer voltage equal to setting value, main transformer voltage, main transformer voltage is less than setting value, master
Time variant voltage is less than or equal to one or more combinations of setting value.Multiple Rule of judgment can use with or merge.
Preferably, the process of security risk traverse scanning includes the following steps in step S30:
S31. all security risks stored in the power grid security hidden danger model library described in traversal step S20, according to safety
The corresponding Rule of judgment of hidden danger obtains from SCADA system and the telemetry for judgement is needed to be judged;If Rule of judgment
All meet, then goes to step S32;If Rule of judgment is not met, next security risk is traversed;
Whether the security risk that S32. Rule of judgment all meets in judgment step S30 is shown in power grid abnormality detection window and does not have
Have and is handled:If not handled, which traverses next security risk;If the security risk is
It is processed, then go to step S33;
S33. whether processed security risk is lasting security risk in judgment step S32:If so, the safety
Vulnerability scan terminates, and traverses next security risk;If it is not, then generating warning information and being shown on power grid abnormality detection window;
System platform is extracted into warning information in system from database by Hibernate technologies and JDBC technologies, then passes through MVC frames
It is pushed to foreground, is presented on the browser of user finally by HTML5 technologies and CSS3 patterns packaging;
S34. judge whether that all security risks all have stepped through:If all having stepped through, terminate present scan;Conversely, then
Next security risk is traversed to traversing all security risks.
Preferably, the remote control permission monitoring of step S40 carries out as follows:
S41. remote control rights state and the permission modification time that substation is recorded by obtaining the remote signalling data of SCADA system, with
Judge the duration that transformer substation remote-control permission is gone in station;
S42. traversal all permissions are the plant stand in station:(1)Judge be remotely controlled permission switch to station in duration whether be more than
Time interval t begins stepping through next substation if it is not, then stopping this traversal;If so, going to step(2);(2)Judge
Whether the substation has transmission short message in time interval t:If not, the phone number for inquiring substation administration personnel is concurrent
Send reminding short message;If so, going to step(3);Judge whether time interval t is more than for 24 hours, if so, generating warning information simultaneously
Include in power grid exception monitoring frame by described information;If it is not, then going to step(4);(4)Judge whether all substations all
Through traversal:If so, traversal terminates;If it is not, then beginning stepping through next substation;
S43. after traversing, on a web browser by the switching result displaying of processing remote control permission.
Preferably, the time interval t is 4h ~ 6h.Substation is recorded by obtaining major network SCADA system remote signalling data
It is remotely controlled rights state.After the remote control permission of substation switches in station more than 4h ~ 6h, system will send short messages per 4h ~ 6h automatically
The supervisor of inspection center personnel and the electric substation to the substation remind, until the remote control permission of the substation switches
To scheduling.The operation in 5 minutes of this flow is primary, is realized using the storing process of Oracle.
Preferably, the neutral point anomaly analysis process in step S50 carries out as follows:
S51. busbar in substation is inserted into interim table, and traverses busbar all in interim table;
S52. it is found by the switchgear of closure and is connect with busbar from busbar by topological data and remote signalling data
Our station main transformer;
S53. from main transformer, topology finds neutral ground disconnecting link or the blocking device ground connection for the closure being connect with main transformer
Disconnecting link, and judge to find the neutral ground disconnecting link or blocking device grounding switch number of closure:If one and only one is closed
The grounding switch or blocking device grounding switch of conjunction then to be normal, otherwise are abnormal;
S54. judge whether all busbares all have stepped through:If all busbares all have stepped through, traversal terminates;If there is mother
Line does not traverse, then traverses next busbar, until all busbares are traversed;
S55. merge the same substation and topology arrives the busbar of identical main transformer, and interim table is transferred in formal table.
Based on topology theory, a set of transformer neutral point grounding safety hidden danger judgment method is established.By obtaining in real time
Take the division state of the topological structure of power grid and equipment in SCADA system, all grounding mode of transformer neutral-point of Accurate Diagnosis,
Solving transformer neutral point Analysis of Grounding, to be related to equipment more, and analysis is complicated, is easy the problem omitted.
Preferably, the security risk includes reclosing error, protection mismatch, prepared auto restart, stable mismatch and transformation
Device neutral grounding mode is incorrect.These security risks will not directly result in accident event, but can be sent out in accident event
Cause accident event to expand when raw, postpone the problems such as telegram in reply time, is easy to be adjusted the potential operation threat that personnel ignore.
Compared with prior art, the beneficial effects of the invention are as follows:
(1)Security risk model library is established, the comprehensive utilization various factors such as history security risk information and expertise are to power grid
Operation conditions is analyzed in real time, and the safety such as reclosing mistake, protection mismatch, prepared auto restart, stable mismatch for being obtained to analysis is hidden
Suffer from intelligence and generate warning information, easy to use, high opening so as to the recognition accuracy of security risk with security risk mould
The increase of type is continuously improved.
(2)By acquiring and analyzing SCADA system remote signalling data in real time, the remote control rights state of substation is recorded, is realized
Transformer substation remote-control permission timing intelligent is reminded, and permission switchback " distant place " will be remotely controlled by forgeing after preventing power transformation personnel on site from operating, and be led
Scheduling is caused to lose equipment control ability, analysis efficiency is high, and information reminding is quick and precisely.
(3)By to power grid depth topological analysis, realizing to the rational intelligent diagnostics of neutral grounding mode and prompting,
Anti- leak-stopping closes, the neutral point that closes leads to protection mismatch, tripping etc. of bypassing the immediate leadership more, is conducive to security risk and excludes rapidly.
Description of the drawings
Fig. 1 is the flow chart of the safe operation of electric network hidden danger intelligent identification Method of the present invention.
Fig. 2 is the flow chart of the security risk traverse scanning process of safe operation of electric network hidden danger intelligent identification Method.
Fig. 3 is the flow chart of the remote control permission monitoring process of safe operation of electric network hidden danger intelligent identification Method.
Fig. 4 is the flow chart of the neutral point anomaly analysis process of safe operation of electric network hidden danger intelligent identification Method.
Specific implementation mode
The present invention is further illustrated With reference to embodiment.Wherein, attached drawing only for illustration,
What is indicated is only schematic diagram rather than pictorial diagram, should not be understood as the limitation to this patent;Reality in order to better illustrate the present invention
Example is applied, the certain components of attached drawing have omission, zoom in or out, and do not represent the size of actual product;To those skilled in the art
For, the omitting of some known structures and their instructions in the attached drawings are understandable.
The same or similar label correspond to the same or similar components in the attached drawing of the embodiment of the present invention;In retouching for the present invention
In stating, it is to be understood that if it is based on attached drawing to have the orientation or positional relationship of the instructions such as term "upper", "lower", "left", "right"
Shown in orientation or positional relationship, be merely for convenience of description of the present invention and simplification of the description, do not indicate or imply the indicated
Device or element must have a particular orientation, with specific azimuth configuration and operation, therefore position relationship described in attached drawing
Term only for illustration, should not be understood as the limitation to this patent, for the ordinary skill in the art, can
To understand the concrete meaning of above-mentioned term as the case may be.
Embodiment 1
It is as shown in Figures 1 to 4 the first embodiment of the safe operation of electric network hidden danger intelligent identification Method of the present invention, such as Fig. 1 institutes
Show, safe operation of electric network hidden danger intelligent identification Method of the invention includes the following steps:
S10. it obtains grid topology data in SCADA system in real time by data transmission interface, establishes safe operation of electric network hidden danger
Intelligent identifying system;
S20. the security risk edit page of the intelligent identifying system increases security risk newly in step slo, for the safety
Hidden danger sets Rule of judgment, and the security risk and its corresponding Rule of judgment are stored, and establishes power grid security hidden danger mould
Type library;
S30. security risk all in power grid security hidden danger model library is traversed, and power grid is transported using history security risk information
Row situation is analyzed in real time, and warning information is intelligently generated to the security risk that analysis obtains;
S40. transformer substation remote-control permission and conversion time database are established, to realize uninterrupted scanning full electric network substation
It is remotely controlled permission, while establishing information intelligent and issuing function is reminded pointedly to issue security risk information to related personnel;It is described
Permission includes permission in station and scheduling permission, and interior permission of standing or scheduling permission duration are time interval t;
S50. by the topological data of SCADA system and on off state data, from busbar, substation is found by topology
The neutral ground disconnecting link or blocking device grounding switch of connection, it is whether abnormal according to interpretation of result neutral point is found.
Wherein, the security risk includes reclosing error, protection mismatch, prepared auto restart, stable mismatch and transformer
Neutral grounding mode is incorrect.The Rule of judgment set in step S20 is selected from line switching closure, line switching disconnects, main
Time variant voltage is equal to setting value, main transformer voltage is more than or equal to setting value, main transformer voltage less than setting not equal to setting value, main transformer voltage
Value, main transformer voltage are less than or equal to one or more combinations of setting value.
As shown in Fig. 2, the process of security risk traverse scanning includes the following steps in step S30:
S31. all security risks stored in the power grid security hidden danger model library described in traversal step S20, according to safety
The corresponding Rule of judgment of hidden danger obtains from SCADA system and the telemetry for judgement is needed to be judged;If Rule of judgment
All meet, then goes to step S32;If Rule of judgment is not met, next security risk is traversed;
Whether the security risk that S32. Rule of judgment all meets in judgment step S30 is shown in power grid abnormality detection window and does not have
Have and is handled:If not handled, which traverses next security risk;If the security risk is
It is processed, then go to step S33;
S33. whether processed security risk is lasting security risk in judgment step S32:If so, the safety
Vulnerability scan terminates, and traverses next security risk;If it is not, then generating warning information and being shown on power grid abnormality detection window;
System platform is extracted into warning information in system from database by Hibernate technologies and JDBC technologies, then passes through MVC frames
It is pushed to foreground, is presented on the browser of user finally by HTML5 technologies and CSS3 patterns packaging;
S34. judge whether that all security risks all have stepped through:If all having stepped through, terminate present scan;Conversely, then
Next security risk is traversed to traversing all security risks.
As shown in figure 3, the remote control permission monitoring of step S40 carries out as follows:
S41. remote control rights state and the permission modification time that substation is recorded by obtaining the remote signalling data of SCADA system, with
Judge the duration that transformer substation remote-control permission is gone in station;
S42. traversal all permissions are the plant stand in station:(1)Judge be remotely controlled permission switch to station in duration whether be more than
Time interval t begins stepping through next substation if it is not, then stopping this traversal;If so, going to step(2);(2)Judge
Whether the substation has transmission short message in time interval t:If not, the phone number for inquiring substation administration personnel is concurrent
Send reminding short message;If so, going to step(3);Judge whether time interval t is more than for 24 hours, if so, generating warning information simultaneously
Include in power grid exception monitoring frame by described information;If it is not, then going to step(4);(4)Judge whether all substations all
Through traversal:If so, traversal terminates;If it is not, then beginning stepping through next substation;
S43. after traversing, on a web browser by the switching result displaying of processing remote control permission.
Wherein, the time interval of the present embodiment is 6h, and substation is recorded by obtaining major network SCADA system remote signalling data
It is remotely controlled rights state.It is more than when the remote control permission of substation switches in station6hAfterwards, system is sent short messages automatic per 6h to the change
The inspection center personnel in power station and the supervisor of the electric substation remind, until the remote control permission of the substation switches to tune
Degree.The operation in 5 minutes of this flow is primary, is realized using the storing process of Oracle.
As shown in figure 4, the neutral point anomaly analysis process in step S50 carries out as follows:
S51. busbar in substation is inserted into interim table, and traverses busbar all in interim table;
S52. pass through the switchgear searching of closure and busbar from busbar by topological data and remote signalling remote signalling data
The our station main transformer of connection;
S53. from main transformer, topology finds neutral ground disconnecting link or the blocking device ground connection for the closure being connect with main transformer
Disconnecting link, and judge to find the neutral ground disconnecting link or blocking device grounding switch number of closure:If one and only one is closed
The grounding switch or blocking device grounding switch of conjunction then to be normal, otherwise are abnormal;
S54. judge whether all busbares all have stepped through:If all busbares all have stepped through, traversal terminates;If there is mother
Line does not traverse, then traverses next busbar, until all busbares are traversed;
S55. merge the same substation and topology arrives the busbar of identical main transformer, and interim table is transferred in formal table.
By obtaining the division state of the topological structure of power grid and equipment in SCADA system, all changes of Accurate Diagnosis in real time
Depressor neutral grounding mode, solving transformer neutral point Analysis of Grounding, to be related to equipment more, and analysis is complicated, is easy the difficulty omitted
Topic.
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair
The restriction of embodiments of the present invention.For those of ordinary skill in the art, may be used also on the basis of the above description
To make other variations or changes in different ways.There is no necessity and possibility to exhaust all the enbodiments.It is all this
All any modification, equivalent and improvement etc., should be included in the claims in the present invention made by within the spirit and principle of invention
Protection domain within.
Claims (7)
1. a kind of safe operation of electric network hidden danger intelligent identification Method, which is characterized in that include the following steps:
S10. it obtains grid topology data in SCADA system in real time by data transmission interface, establishes safe operation of electric network hidden danger
Intelligent identifying system;
S20. the security risk edit page of the intelligent identifying system increases security risk newly in step slo, for the safety
Hidden danger sets Rule of judgment, and the security risk and its corresponding Rule of judgment are stored, and establishes power grid security hidden danger mould
Type library;
S30. security risk all in power grid security hidden danger model library is traversed, and power grid is transported using history security risk information
Row situation is analyzed in real time, and warning information is intelligently generated to the security risk that analysis obtains;
S40. transformer substation remote-control permission and conversion time database are established, to realize uninterrupted scanning full electric network substation
It is remotely controlled permission, while establishing information intelligent and issuing function is reminded pointedly to issue security risk information to related personnel;It is described
Permission includes permission in station and scheduling permission, and interior permission of standing or scheduling permission duration are time interval t;
S50. by the topological data of SCADA system and on off state data, from busbar, substation is found by topology
The neutral ground disconnecting link or blocking device grounding switch of connection, it is whether abnormal according to interpretation of result neutral point is found.
2. safe operation of electric network hidden danger intelligent identification Method according to claim 1, which is characterized in that set in step S20
Fixed Rule of judgment, which is not equal to selected from line switching closure, line switching disconnection, main transformer voltage equal to setting value, main transformer voltage, to be set
Definite value, main transformer voltage be more than or equal to setting value, main transformer voltage be less than setting value, main transformer voltage be less than or equal to setting value one kind or
A variety of combinations.
3. safe operation of electric network hidden danger intelligent identification Method according to claim 1, which is characterized in that pacify in step S30
The process of full hidden danger traverse scanning includes the following steps:
S31. all security risks stored in the power grid security hidden danger model library described in traversal step S20, according to safety
The corresponding Rule of judgment of hidden danger obtains from SCADA system and the telemetry for judgement is needed to be judged;If Rule of judgment
All meet, then goes to step S32;If Rule of judgment is not met, next security risk is traversed;
Whether the security risk that S32. Rule of judgment all meets in judgment step S30 is shown in power grid abnormality detection window and does not have
Have and is handled:If not handled, which traverses next security risk;If the security risk is
It is processed, then go to step S33;
S33. whether processed security risk is lasting security risk in judgment step S32:If so, the safety
Vulnerability scan terminates, and traverses next security risk;If it is not, then generating warning information and being shown on power grid abnormality detection window;
S34. judge whether that all security risks all have stepped through:If all having stepped through, terminate present scan;Conversely, then
Next security risk is traversed to traversing all security risks.
4. safe operation of electric network hidden danger intelligent identification Method according to claim 1, which is characterized in that step S40's is distant
Control permission monitoring carries out as follows:
S41. remote control rights state and the permission modification time that substation is recorded by obtaining the remote signalling data of SCADA system, with
Judge the duration that transformer substation remote-control permission is gone in station;
S42. traversal all permissions are the plant stand in station:(1)Judge be remotely controlled permission switch to station in duration whether be more than
Time interval t begins stepping through next substation if it is not, then stopping this traversal;If so, going to step(2);(2)Judge
Whether the substation has transmission short message in time interval t:If not, the phone number for inquiring substation administration personnel is concurrent
Send reminding short message;If so, going to step(3);Judge whether time interval t is more than for 24 hours, if so, generating warning information simultaneously
Include in power grid exception monitoring frame by described information;If it is not, then going to step(4);(4)Judge whether all substations all
Through traversal:If so, traversal terminates;If it is not, then beginning stepping through next substation;
S43. after traversing, on a web browser by the switching result displaying of processing remote control permission.
5. safe operation of electric network hidden danger intelligent identification Method according to claim 4, which is characterized in that the time interval
T is 4h ~ 6h.
6. safe operation of electric network hidden danger intelligent identification Method according to claim 1, which is characterized in that in step S50
Neutral point anomaly analysis process carries out as follows:
S51. busbar in substation is inserted into interim table, and traverses busbar all in interim table;
S52. it is found by the switchgear of closure and is connect with busbar from busbar by topological data and remote signalling data
Our station main transformer;
S53. from main transformer, topology finds neutral ground disconnecting link or the blocking device ground connection for the closure being connect with main transformer
Disconnecting link, and judge to find the neutral ground disconnecting link or blocking device grounding switch number of closure:If one and only one is closed
The grounding switch or blocking device grounding switch of conjunction then to be normal, otherwise are abnormal;
S54. judge whether all busbares all have stepped through:If all busbares all have stepped through, traversal terminates;If there is mother
Line does not traverse, then traverses next busbar, until all busbares are traversed;
S55. merge the same substation and topology arrives the busbar of identical main transformer, and interim table is transferred in formal table.
7. safe operation of electric network hidden danger intelligent identification Method according to any one of claims 1 to 6, which is characterized in that institute
The security risk stated includes reclosing error, protects mismatch, prepared auto restart, stable mismatch and grounding mode of transformer neutral-point not
Correctly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810184735.2A CN108512217B (en) | 2018-03-06 | 2018-03-06 | A kind of safe operation of electric network hidden danger intelligent identification Method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810184735.2A CN108512217B (en) | 2018-03-06 | 2018-03-06 | A kind of safe operation of electric network hidden danger intelligent identification Method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108512217A true CN108512217A (en) | 2018-09-07 |
CN108512217B CN108512217B (en) | 2019-10-29 |
Family
ID=63376173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810184735.2A Active CN108512217B (en) | 2018-03-06 | 2018-03-06 | A kind of safe operation of electric network hidden danger intelligent identification Method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108512217B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111342446A (en) * | 2020-03-02 | 2020-06-26 | 国网天津市电力公司电力科学研究院 | Three-dimensional household intelligent energy-consumption ubiquitous scheduling control method and system |
CN116207845A (en) * | 2022-11-28 | 2023-06-02 | 无锡广盈集团有限公司 | Automatic monitoring method and system for protecting power equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102904333A (en) * | 2012-10-25 | 2013-01-30 | 深圳供电局有限公司 | Spare power automatic switching simulation method for power grid |
CN103208089A (en) * | 2013-04-07 | 2013-07-17 | 山东电力集团公司德州供电公司 | System and method for intelligent power grid scheduling on basis of mode recognition technology |
WO2013112639A1 (en) * | 2012-01-23 | 2013-08-01 | Itron, Inc. | Analytics in a utility infrastructure |
-
2018
- 2018-03-06 CN CN201810184735.2A patent/CN108512217B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013112639A1 (en) * | 2012-01-23 | 2013-08-01 | Itron, Inc. | Analytics in a utility infrastructure |
CN102904333A (en) * | 2012-10-25 | 2013-01-30 | 深圳供电局有限公司 | Spare power automatic switching simulation method for power grid |
CN103208089A (en) * | 2013-04-07 | 2013-07-17 | 山东电力集团公司德州供电公司 | System and method for intelligent power grid scheduling on basis of mode recognition technology |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111342446A (en) * | 2020-03-02 | 2020-06-26 | 国网天津市电力公司电力科学研究院 | Three-dimensional household intelligent energy-consumption ubiquitous scheduling control method and system |
CN111342446B (en) * | 2020-03-02 | 2023-10-27 | 国网天津市电力公司电力科学研究院 | Three-dimensional household intelligent energy ubiquitous dispatching control method and system |
CN116207845A (en) * | 2022-11-28 | 2023-06-02 | 无锡广盈集团有限公司 | Automatic monitoring method and system for protecting power equipment |
CN116207845B (en) * | 2022-11-28 | 2024-05-28 | 无锡广盈集团有限公司 | Automatic monitoring method and system for protecting power equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108512217B (en) | 2019-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103545922B (en) | Based on the intelligent alarm inference method of many scene analysis | |
CN104092310B (en) | A kind of intelligent power distribution monitoring and energy management system backstage | |
CN106680634B (en) | A kind of intelligent early-warning method of intelligent substation relay protection safety measure | |
CN107834523B (en) | Extra-high voltage direct-current fault diagnosis system and working method based on model and rule base | |
CN102867232B (en) | Substation comprehensive information visualization display method in a kind of energy management system | |
CN106532935B (en) | For carrying out the method and its system of secondary system of intelligent substation fault diagnosis | |
CN103078403B (en) | On-line state evaluation method for secondary system of intelligent substation | |
CN105021925A (en) | Cement industry-based electric power supervision system and method | |
CN105099364A (en) | Photovoltaic power station remote monitoring system | |
CN103607042A (en) | Power distribution network fault processing method for suburb long overhead line-oriented fault indicator | |
CN105573243A (en) | Pump station monitoring system based on PLC | |
CN103354055A (en) | Simulating system for simulated training of electricity-consuming network operation | |
CN104407577A (en) | Intelligent check anti-maloperation method based on real-time trend | |
CN108512217B (en) | A kind of safe operation of electric network hidden danger intelligent identification Method | |
CN104166941B (en) | A kind of warning information method for visualizing and its system for electric network current diagram | |
CN103324845B (en) | A kind of intelligent substation switch state estimation method based on uncertain inference | |
CN107482772A (en) | A kind of measure and control device and its anti-misoperation locking logic methods of exhibiting | |
CN103279520A (en) | Power substation secondary system failure reconnaissance method | |
CN104730421A (en) | Diagnostic method and system for grid fault equipment | |
CN107357237A (en) | A kind of system of intelligent monitoring transformer station | |
CN106570613A (en) | Secondary equipment maintenance strategy generation method based on state monitoring | |
CN108667073A (en) | A kind of anti-isolated island method of photovoltaic based on dispatch automated system | |
CN109768619A (en) | Monitoring information automatic debugging system and adjustment method | |
CN104218680A (en) | Real-time alarm system and communication method thereof for supervisory control and data acquisition (SCADA) system | |
CN105762932B (en) | A kind of intelligent substation intelligent warning system based on Plugin Mechanism |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |