CN111178667A - Vulnerability-based power system risk assessment method and device - Google Patents

Vulnerability-based power system risk assessment method and device Download PDF

Info

Publication number
CN111178667A
CN111178667A CN201911149617.9A CN201911149617A CN111178667A CN 111178667 A CN111178667 A CN 111178667A CN 201911149617 A CN201911149617 A CN 201911149617A CN 111178667 A CN111178667 A CN 111178667A
Authority
CN
China
Prior art keywords
target power
node
nodes
vulnerability
power system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911149617.9A
Other languages
Chinese (zh)
Inventor
陈丁
余金伟
童可君
罗立华
林科
张炜
张益军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cixi Power Transmission And Transformation Engineering Co ltd
Cixi Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Cixi Power Transmission And Transformation Engineering Co ltd
Cixi Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cixi Power Transmission And Transformation Engineering Co ltd, Cixi Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Cixi Power Transmission And Transformation Engineering Co ltd
Priority to CN201911149617.9A priority Critical patent/CN111178667A/en
Publication of CN111178667A publication Critical patent/CN111178667A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • Public Health (AREA)
  • Primary Health Care (AREA)
  • Water Supply & Treatment (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • General Health & Medical Sciences (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a vulnerability-based power system risk assessment method and device. The method comprises the following steps: acquiring relevant data of a target power system to generate a target power network, wherein nodes in the target power network correspond to power nodes in the target power system; performing vulnerability analysis on a plurality of nodes in the target power network to generate a plurality of node vulnerability values; performing security analysis on a plurality of nodes in the target power network to generate a plurality of node security values; and performing a risk assessment of the target power system based on the node vulnerability value and the node security value. The vulnerability-based power system risk assessment method and device can be used for assessing the risk of a power system by integrating the characteristics of multiple dimensions, assisting in positioning some vulnerable parts of a running power grid, and further reducing the occurrence probability of safety risks such as large-area power failure accidents.

Description

Vulnerability-based power system risk assessment method and device
Technical Field
The disclosure relates to the field of computer information processing, in particular to a vulnerability-based power system risk assessment method and device.
Background
Due to the instability of safe operation of the power system, the risk of large-area power failure is high. And large-area power failure accidents can cause factory production stop and machine operation stop, great economic loss is brought, and serious negative effects can be caused to the life of people. Therefore, the method guarantees the operation safety of the power grid, and eliminates power failure accidents step by step, which is very important and necessary work. Prevention of large area blackouts should address three issues:
(1) large area power failure caused by internal problems of large power grids;
(2) grid dismembering caused by major natural disasters;
(3) the artificial damage may cause the influence of large-area power failure of the power grid.
The large-area power failure accident is prevented, the power failure accident caused by unstable operation inside a power grid is prevented, adverse effects caused by large-area power failure due to natural disasters are prevented, a small part of large-area power failure is caused by manual misoperation, the large-area power failure can be caused, and once the large-area power failure accident occurs, more negative effects can be brought to the society.
The traditional safety analysis method can only analyze the fault condition and the influence thereof in the power grid, and how to implement early warning analysis on the problem except for some uncertain factors (such as hidden faults of elements, small-probability high-order faults, human errors, terrorist deliberate destruction and the like) in the operation process of the power system is an urgent problem to be solved.
Disclosure of Invention
In view of this, the present disclosure provides a method and an apparatus for evaluating a risk of an electrical power system based on vulnerability, which can evaluate the risk of the electrical power system by integrating characteristics of multiple dimensions, assist in locating some vulnerable parts of an operating power grid, and further reduce the occurrence probability of safety risks such as large-area power outage accidents.
According to an aspect of the present disclosure, a vulnerability-based power system risk assessment method is provided, which includes: acquiring relevant data of a target power system to generate a target power network, wherein nodes in the target power network correspond to power nodes in the target power system; performing vulnerability analysis on a plurality of nodes in the target power network to generate a plurality of node vulnerability values; performing security analysis on a plurality of nodes in the target power network to generate a plurality of node security values; and performing a risk assessment of the target power system based on the node vulnerability value and the node security value.
In an exemplary embodiment of the present disclosure, acquiring relevant data of a target power system to generate a target power network includes: acquiring a plurality of power node data of a target power system; acquiring a plurality of basic data of the plurality of power nodes; and generating a target power network from a plurality of base data of the plurality of power nodes.
In an exemplary embodiment of the present disclosure, obtaining a plurality of base data of the plurality of power nodes includes: acquiring system execution data of a target power node; and/or acquiring material reserve data of the target power node; and/or acquiring emergency preparation data of the target power node; and/or obtaining recovery plan data for the target power node.
In an exemplary embodiment of the present disclosure, performing vulnerability analysis on a plurality of nodes in the target power network, generating a plurality of node vulnerability values, includes: performing vulnerability analysis on basic data of a plurality of nodes in the target power network based on a preset multi-dimensional index to generate a plurality of node vulnerability values.
In an exemplary embodiment of the present disclosure, performing vulnerability analysis on basic data of a plurality of nodes in the target power network based on a preset multidimensional index to generate a plurality of node vulnerability values, further includes: generating the preset multi-dimensional index based on data of a plurality of data sources; and performing factor analysis and relevance analysis on the data of the multiple data sources to integrate the multi-dimensional indexes.
In an exemplary embodiment of the present disclosure, performing vulnerability analysis on basic data of a plurality of nodes in the target power network based on a preset multidimensional index to generate a plurality of node vulnerability values includes: determining the weight of each index in the preset multi-dimensional indexes based on an analytic hierarchy process; comparing a plurality of basic data of a plurality of nodes in the target power network with the preset multi-dimensional indexes respectively to generate a plurality of index comparison values; and generating a plurality of node vulnerability values based on the plurality of metric comparison values and their corresponding weights.
In an exemplary embodiment of the present disclosure, performing a security analysis on a plurality of nodes in the target power network to generate a plurality of node security values includes: acquiring historical safety accidents of a plurality of nodes in the target power network; and performing security analysis on the plurality of nodes based on the number of occurrences of the historical security incident to generate a plurality of node security values.
In an exemplary embodiment of the disclosure, performing a risk assessment of the target power system based on the node vulnerability value and the node safety value includes: determining vulnerability weights and security weights corresponding to a plurality of nodes in the target power system; generating a node risk value based on the node vulnerability value, the node security value, vulnerability weight, and security weight; and performing risk assessment of the target power system based on the node risk values of the plurality of nodes.
In an exemplary embodiment of the present disclosure, performing risk assessment of a target power system based on node risk values of a plurality of nodes includes: respectively distributing risk weights for a plurality of nodes; and determining a risk value for the target power system based on the risk weights and risk values for the plurality of nodes.
According to an aspect of the present disclosure, a vulnerability-based power system risk assessment apparatus is provided, the apparatus including: the system comprises a network module, a data processing module and a data processing module, wherein the network module is used for acquiring relevant data of a target power system to generate a target power network, and nodes in the target power network correspond to power nodes in the target power system; the vulnerability analysis module is used for carrying out vulnerability analysis on a plurality of nodes in the target power network to generate a plurality of node vulnerability values; the safety module is used for carrying out safety analysis on a plurality of nodes in the target power network to generate a plurality of node safety values; and an evaluation module for performing risk evaluation of the target power system based on the node vulnerability value and the node safety value.
According to the vulnerability-based power system risk assessment method and device, relevant data of a target power system are obtained to generate a target power network, and nodes in the target power network correspond to power nodes in the target power system; performing vulnerability analysis on a plurality of nodes in the target power network to generate a plurality of node vulnerability values; performing security analysis on a plurality of nodes in the target power network to generate a plurality of node security values; and the risk assessment of the target power system is carried out based on the node fragile value and the node safety value, the risk of the power system can be assessed by integrating the characteristics of multiple dimensions, and the fragile parts of the running power grid can be positioned in an auxiliary mode, so that the occurrence probability of the safety risk of large-area power failure accidents is reduced.
Drawings
Fig. 1 is a system block diagram illustrating a vulnerability-based risk assessment method and apparatus for an electrical power system according to an exemplary embodiment.
FIG. 2 is a flow diagram illustrating a vulnerability-based power system risk assessment method according to an exemplary embodiment.
FIG. 3 is a flow diagram illustrating a vulnerability-based power system risk assessment method according to another exemplary embodiment.
FIG. 4 is a flow diagram illustrating a vulnerability-based power system risk assessment method according to another exemplary embodiment.
FIG. 5 is a schematic diagram illustrating a vulnerability-based power system risk assessment method, according to an example embodiment.
FIG. 6 is a block diagram illustrating a vulnerability-based risk assessment apparatus for an electrical power system, according to an example embodiment.
FIG. 7 is a block diagram illustrating an electronic device in accordance with an example embodiment.
FIG. 8 is a block diagram illustrating a computer-readable medium in accordance with an example embodiment.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. It is to be understood by those skilled in the art that the drawings are merely schematic representations of exemplary embodiments, and that the blocks or processes shown in the drawings are not necessarily required to practice the present disclosure and are, therefore, not intended to limit the scope of the present disclosure.
The inventors of the present disclosure have discovered that the vulnerability of power emergency systems is an inherent attribute that only manifests itself when a disaster or power incident is encountered. The change of the internal structure or function of the power emergency system may be different according to the destructive power of the disaster or the power emergency, and the human factor may also affect the change of the structure or function, which may make the change more serious, but may weaken the change. Vulnerability is also affected in many ways, such as how many people or property are exposed to the victim environment, the more exposed, the greater the vulnerability; or the system has different bearing capacity to the same disaster due to different structures and the like, and the change degree of the structures or the functions generated under the same disaster is different, which is related to the structural weakness of the system, for example, the victims are mostly old people and children, so the vulnerability of the system is larger; or is related to social economy, if the bearing pressure of a disaster-stricken city is too high, citizens lack corresponding electric power emergency professional knowledge and do not undergo corresponding emergency training, or relevant departments do not have corresponding emergency prevention and plans, and detailed measures are not provided for reconstruction and improvement work after disasters, so that the system can show high vulnerability. The lower the vulnerability of the system, the less the loss suffered in the system when a disaster occurs, and the higher subjective initiative and the higher recovery capability are achieved.
In view of this, the vulnerability-based power system risk assessment method and apparatus disclosed herein assess risk in combination with power system vulnerability.
Fig. 1 is a system block diagram illustrating a vulnerability-based risk assessment method and apparatus for an electrical power system according to an exemplary embodiment.
As shown in fig. 1, the system architecture 100 may include data source devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the data source devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
A user may use the data source devices 101, 102, 103 to interact with the server 105 over the network 104 to receive or send messages or the like. The data source devices 101, 102, 103 may have various communication client applications installed thereon, such as a shopping application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The data source devices 101, 102, 103 may be various electronic devices having display screens and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server that provides various services, such as a back-office management server that provides analysis of power system risks. The background management server may analyze and perform other processing on the received relevant data of the target power system, and feed back a processing result (risk assessment of the target power system) to the manager.
The server 105 may, for example, obtain relevant data of a target power system to generate a target power network, nodes in the target power network corresponding to power nodes in the target power system; server 105 may, for example, perform vulnerability analysis on a plurality of nodes in the target power network, generating a plurality of node vulnerability values; the server 105 may, for example, perform a security analysis on a plurality of nodes in the target power network, generating a plurality of node security values; the server 105 may conduct a risk assessment of the target power system, for example, based on the node vulnerability value and the node security value.
The server 105 may be a single entity server, or may be composed of a plurality of servers, for example, it should be noted that the vulnerability-based risk assessment method for the power system provided by the embodiment of the present disclosure may be executed by the server 105, and accordingly, a vulnerability-based risk assessment device for the power system may be disposed in the server 105.
FIG. 2 is a flow diagram illustrating a vulnerability-based power system risk assessment method according to an exemplary embodiment. The vulnerability-based power system risk assessment method 20 includes at least steps S202 to S208.
As shown in fig. 2, in S202, data related to a target power system is acquired to generate a target power network, where nodes in the target power network correspond to power nodes in the target power system.
1. The method specifically comprises the following steps: acquiring a plurality of power node data of a target power system; acquiring a plurality of basic data of the plurality of power nodes; and generating a target power network from a plurality of base data of the plurality of power nodes. The power node can be a transformer, a substation, a key transmission device and other related devices in power grid transmission.
2. Wherein obtaining a plurality of base data for the plurality of power nodes comprises: acquiring system execution data of a target power node; and/or acquiring material reserve data of the target power node; and/or acquiring emergency preparation data of the target power node; and/or obtaining recovery plan data for the target power node.
More specifically, the basic data of the power node may include disaster response capability, emergency handling capability, and emergency drilling capability of the node, may further include more than ten main indexes, such as laws and regulations, material reserves, emergency communication, and emergency drilling, that the node has satisfied, and may further include: the power supply capacity evaluation index, the high-risk user power supply safety evaluation index, the external crisis risk factor index, the power supply enterprise emergency management evaluation index and other indexes, which are not limited in the disclosure.
3. In S204, vulnerability analysis is performed on a plurality of nodes in the target power network, and a plurality of node vulnerability values are generated. The method comprises the following steps: performing vulnerability analysis on basic data of a plurality of nodes in the target power network based on a preset multi-dimensional index to generate a plurality of node vulnerability values. Performing vulnerability analysis on basic data of a plurality of nodes in the target power network based on a preset multi-dimensional index to generate a plurality of node vulnerability values,
4. in one embodiment, further comprising: generating the preset multi-dimensional index based on data of a plurality of data sources; and performing factor analysis and relevance analysis on the data of the multiple data sources to integrate the multi-dimensional indexes.
5. Performing vulnerability analysis on basic data of a plurality of nodes in the target power network based on a preset multidimensional index to generate a plurality of node vulnerability values, including: determining the weight of each index in the preset multi-dimensional indexes based on an analytic hierarchy process; comparing a plurality of basic data of a plurality of nodes in the target power network with the preset multi-dimensional indexes respectively to generate a plurality of index comparison values; and generating a plurality of node vulnerability values based on the plurality of metric comparison values and their corresponding weights.
In S206, a plurality of nodes in the target power network are subjected to security analysis, and a plurality of node security values are generated. The method comprises the following steps: acquiring historical safety accidents of a plurality of nodes in the target power network; and performing security analysis on the plurality of nodes based on the number of occurrences of the historical security incident to generate a plurality of node security values.
For example, the accident of a node in the target power network in the last 20 years can be obtained, the accident reason can be analyzed, so that several types of accident reasons can be sorted out, and then the safety value of the node can be calculated according to the number of times of occurrence of each type of accident and the total number of accidents.
For example, if the a-node grid is overloaded with 19 security incidents and all the overloaded security incidents occur 100 times in the whole target power network, the node security value of the a-node is 0.19. The smaller the node security value, the more secure the node is.
In S208, a risk assessment of the target power system is made based on the node vulnerability value and the node safety value. Can include the following steps: determining vulnerability weights and security weights corresponding to a plurality of nodes in the target power system; generating a node risk value based on the node vulnerability value, the node security value, vulnerability weight, and security weight; and performing risk assessment of the target power system based on the node risk values of the plurality of nodes.
In one embodiment, a risk assessment of a target power system based on node risk values of a plurality of nodes includes: respectively distributing risk weights for a plurality of nodes; and determining a risk value for the target power system based on the risk weights and risk values for the plurality of nodes.
Different weights can be distributed to the safety and the vulnerability of the nodes based on historical experience data, the risk of each node is calculated based on the weights, and then the risk condition of the target power system is calculated according to the risk values of the nodes.
It should be clearly understood that this disclosure describes how to make and use particular examples, but the principles of this disclosure are not limited to any details of these examples. Rather, these principles can be applied to many other embodiments based on the teachings of the present disclosure.
FIG. 3 is a flow diagram illustrating a vulnerability-based power system risk assessment method and apparatus according to another exemplary embodiment. The flow shown in fig. 3 is a detailed description of S204 "performing vulnerability analysis on a plurality of nodes in the target power network to generate a plurality of node vulnerability values" in the flow shown in fig. 2.
As shown in fig. 3, in S302, the preset multi-dimensional index is generated based on data of a plurality of data sources.
In S304, factor analysis and relevance analysis are performed on the data of the multiple data sources to integrate the multidimensional index.
In S306, the weight of each index in the preset multi-dimensional indexes is determined based on an analytic hierarchy process.
In S308, a plurality of basic data of a plurality of nodes in the target power network are respectively compared with the preset multidimensional index, so as to generate a plurality of index comparison values.
In S310, a plurality of node vulnerability values are generated based on the plurality of metric comparison values and their corresponding weights.
In the process of quantifying the emergency indexes, the numerical measures of different indexes are different, and mutual operation cannot be performed, so that data in different indexes must be converted into individual indexes with the same measure, and an evaluation index set has more uniform feeling. The upper bound and the lower bound of each specific index can be determined firstly, then corresponding calculation is carried out on each index, and each index is normalized, so that the final value of each specific index is between 0 and 1, and the value generally represents the importance of the index.
The indexes of the power emergency system are numerous. Since there is a correlation between the indexes, factor analysis is introduced to regroup and reconcile the indexes to find out the intrinsic rules. Can be determined by a factor analysis method. The basic goal of factoring is to describe the covariance relationship between many variables with a few random variables, which are not observable, commonly called factors, essentially the idea is: the variables are grouped according to the correlation size, so that the correlation between the variables in the same group is higher, and the correlation between the variables in different groups is lower.
More specifically, the factor analysis can be performed by the following procedure.
(1) Selecting an original variable according to a problem to be researched;
(2) carrying out standardization processing on the original variables to obtain a correlation matrix;
(3) solving an initial common factor and a factor load matrix;
(4) factor rotation;
(5) scoring the factor;
(6) further analysis was performed based on the factor scores.
And then determining the index weight by combining an analytic hierarchy process. The Analytic Hierarchy Process (AHP) is characterized in that on the basis of deeply analyzing the essence, influence factors, internal relation and the like of a complex decision problem, less quantitative information is utilized to digitize the decision process, so that a simple method is provided for the complex decision problem.
The process of calculating the emergency capacity evaluation index weight of the urban power grid enterprise by using an analytic hierarchy process is as follows:
(1) construct pairwise judgment matrix
And (4) determining which of the two factors is more important and more important by expert scoring, and giving a certain numerical value to the more important factor. The primary evaluation indexes of the power emergency capacity evaluation are 4, a matrix is formed by scoring according to experts, and numbers 1-9 and the reciprocal of the numbers are used as importance scales. Wherein 1 represents that two elements are equally important; 3. 5, 7, 9 respectively indicate that 1 element is slightly more important, significantly more important, strongly more important, absolutely more important than another element; 2. 4, 6, 8 represent the median of 2 adjacent odd scales.
(2) Weight calculation
Adopting a square root method to calculate and judge the maximum characteristic root of the matrix and the characteristic vector thereof, and calculating the steps:
the first step is as follows: calculating the criterion judging matrix A ═ (a)ij)n×nEach row element ai ofjThe n-th square root of the product of
Figure BDA0002283168560000091
The second step is that: will vector
Figure BDA0002283168560000092
Normalization
Figure BDA0002283168560000093
The calculated value is the weight vector of the evaluation index.
The third step: calculating the maximum eigenvalue of the judgment matrix
Figure BDA0002283168560000094
(3) Computation of complex weights
After the weighted value of each index for the upper layer under the single criterion is obtained, the composite weighted value of each index for the target layer can be obtained by adopting a layer-by-layer multiplication method (namely, the weighted value of the second-level index for the corresponding first-level index is multiplied by the weighted value of the first-level index to obtain the weighted value of the second-level index for the target layer).
FIG. 4 is a flowchart illustrating a vulnerability-based power system risk assessment method and apparatus according to another exemplary embodiment. The flow shown in fig. 4 is a detailed description of "generating the preset multi-dimensional index based on data of a plurality of data sources" and "performing factor analysis and association analysis on data of the plurality of data sources to integrate the multi-dimensional index" in fig. 3.
As shown in fig. 4, in S402, the preset multidimensional index is generated based on data of a predetermined schedule data source.
In S404, the preset multi-dimensional index is generated based on the data of the material reserve data source.
In S406, the preset multidimensional index is generated based on the data of the emergency preparation data source.
In S408, the preset multi-dimensional index is generated based on the data of the recovery calculation data source.
In S410, factor analysis and relevance analysis are performed on the data of the multiple data sources to integrate the multidimensional index.
The electric power emergency capacity evaluation index can comprise a power generation enterprise and a power grid system. By extracting information indexes reflecting risk points, according to analysis of an accident tree analysis method, emergency capacity of an emergency of a power system is used as a total index, four links of emergency management are used as an A-level index of a power evaluation index system, and the emergency management system is decomposed layer by applying an analytic hierarchy process and can be divided into the A-level index, the B-level index and a C-level index. Firstly, the total index is converted into an A-level emergency capacity index, and a B-level index is the further decomposition content of the A-level index; the last layer of indexes of the index system are C-level indexes, and the indexes of the layer correspond to basic events and main risk points of the electric power emergency accident tree. Index classification of the power emergency capacity evaluation system to be constructed is shown in fig. 5.
The A-level indexes are 4 in total, and are specifically distributed as follows:
(1) electric power emergency preventive capability
For the evaluation of the emergency prevention capability of the power, the construction of emergency resources, facilities, plans, systems and the like in the operation of the power system needs to be evaluated, and the comprehensive evaluation of the emergency prevention capability of the power system realizes the elimination of the possibility of causing the emergency and the target achievement of enhancing the emergency capability. The emergency prevention capability of power generation enterprises and power grid systems is included, and a plan system, a regulation system, an organization system and the like are established by aiming at ensuring the normal operation of power equipment, the safety of personnel and the like when an emergency occurs.
(2) Electric power emergency readiness capability
And (4) evaluating the power emergency preparation capacity, which comprises the power generation enterprise and the power grid system emergency preparation capacity. The assessment of the capabilities of monitoring internal and external crises, performing early warning issuing and early warning actions, storing emergency materials, propaganda and education and the like of the power system is required, and the assessment of a series of equipment and facility safety adopted for ensuring normal operation of power equipment, safety of personnel and the like when an emergency occurs, and measures adopted for construction such as material preparation, manpower preparation and the like for dealing with emergency situations are emphasized.
(3) Electric power emergency response capability
The evaluation of the power emergency response capability is an evaluation of a series of emergency treatment and rescue measures and actions which are taken for rescuing personnel and equipment and minimizing damage degree when a power system is in an emergency. The method mainly considers the timeliness and the appropriateness of starting plan response and the execution condition of response when an emergency accident occurs in the power system.
(4) Electric power emergency recovery capability
The evaluation of the power emergency recovery capability refers to the evaluation of the capability of achieving the target by a series of measures and actions which are taken to recover people, machines, objects and environments after an emergency accident of a power system to a normal operation state, and the evaluation comprises the following steps: the recovery capability of the damaged equipment, the recovery capability of the accident damage and the recovery capability of the external environment.
The B-level indexes are 17 items in total and can be as follows:
(1) emergency preventive ability. The method comprises a plan system, a regulation system, an organization system, emergency planning and risk analysis.
(2) Emergency readiness capability. Including monitoring early warning, training rehearsal, material deposit, emergent team, propaganda education.
(3) Emergency response capability. The method comprises alarm receiving response, emergency communication, command coordination and emergency rescue.
(4) And (4) emergency recovery capability. Including recovery planning, capital support, survey evaluation.
Those skilled in the art will appreciate that all or part of the steps implementing the above embodiments are implemented as computer programs executed by a CPU. When executed by the CPU, performs the functions defined by the above-described methods provided by the present disclosure. The program may be stored in a computer readable storage medium, which may be a read-only memory, a magnetic or optical disk, or the like.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
FIG. 6 is a block diagram illustrating a vulnerability-based risk assessment apparatus for an electrical power system, according to an example embodiment. As shown in fig. 6, vulnerability-based power system risk assessment apparatus 60 may include: a network module 602, a vulnerability module 604, a security module 606, and an evaluation module 608.
6. The network module 602 is configured to obtain relevant data of a target power system to generate a target power network, where a node in the target power network corresponds to a power node in the target power system; can include the following steps: acquiring a plurality of power node data of a target power system; acquiring a plurality of basic data of the plurality of power nodes; and generating a target power network from a plurality of base data of the plurality of power nodes.
7. The vulnerability module 604 is configured to perform vulnerability analysis on a plurality of nodes in the target power network, and generate a plurality of node vulnerability values; can include the following steps: performing vulnerability analysis on basic data of a plurality of nodes in the target power network based on a preset multi-dimensional index to generate a plurality of node vulnerability values.
The security module 606 is configured to perform security analysis on a plurality of nodes in the target power network, and generate a plurality of node security values; can include the following steps: acquiring historical safety accidents of a plurality of nodes in the target power network; and performing security analysis on the plurality of nodes based on the number of occurrences of the historical security incident to generate a plurality of node security values.
An evaluation module 608 is used to conduct a risk evaluation of the target power system based on the node vulnerability value and the node security value. Can include the following steps: determining vulnerability weights and security weights corresponding to a plurality of nodes in the target power system; generating a node risk value based on the node vulnerability value, the node security value, vulnerability weight, and security weight; and performing risk assessment of the target power system based on the node risk values of the plurality of nodes.
According to the vulnerability-based power system risk assessment device disclosed by the invention, relevant data of a target power system are acquired to generate a target power network, and nodes in the target power network correspond to power nodes in the target power system; performing vulnerability analysis on a plurality of nodes in the target power network to generate a plurality of node vulnerability values; performing security analysis on a plurality of nodes in the target power network to generate a plurality of node security values; and the risk assessment of the target power system is carried out based on the node fragile value and the node safety value, the risk of the power system can be assessed by integrating the characteristics of multiple dimensions, and the fragile parts of the running power grid can be positioned in an auxiliary mode, so that the occurrence probability of the safety risk of large-area power failure accidents is reduced.
FIG. 7 is a block diagram illustrating an electronic device in accordance with an example embodiment.
An electronic device 200 according to this embodiment of the present disclosure is described below with reference to fig. 7. The electronic device 200 shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 7, the electronic device 200 is embodied in the form of a general purpose computing device. The components of the electronic device 200 may include, but are not limited to: at least one processing unit 210, at least one memory unit 220, a bus 230 connecting different system components (including the memory unit 220 and the processing unit 210), a display unit 240, and the like.
Wherein the storage unit stores program code executable by the processing unit 210 to cause the processing unit 210 to perform the steps according to various exemplary embodiments of the present disclosure described in the above-mentioned electronic prescription flow processing method section of the present specification. For example, the processing unit 210 may perform the steps as shown in fig. 2, 3, 4.
The memory unit 220 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)2201 and/or a cache memory unit 2202, and may further include a read only memory unit (ROM) 2203.
The storage unit 220 may also include a program/utility 2204 having a set (at least one) of program modules 2205, such program modules 2205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 230 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 200 may also communicate with one or more external devices 300 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 200, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 200 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 250. Also, the electronic device 200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 260. The network adapter 260 may communicate with other modules of the electronic device 200 via the bus 230. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 200, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, as shown in fig. 8, the technical solution according to the embodiment of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, or a network device, etc.) to execute the above method according to the embodiment of the present disclosure.
The software product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The computer readable medium carries one or more programs which, when executed by a device, cause the computer readable medium to perform the functions of: acquiring relevant data of a target power system to generate a target power network, wherein nodes in the target power network correspond to power nodes in the target power system; performing vulnerability analysis on a plurality of nodes in the target power network to generate a plurality of node vulnerability values; performing security analysis on a plurality of nodes in the target power network to generate a plurality of node security values; and performing a risk assessment of the target power system based on the node vulnerability value and the node security value.
Those skilled in the art will appreciate that the modules described above may be distributed in the apparatus according to the description of the embodiments, or may be modified accordingly in one or more apparatuses unique from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Exemplary embodiments of the present disclosure are specifically illustrated and described above. It is to be understood that the present disclosure is not limited to the precise arrangements, instrumentalities, or instrumentalities described herein; on the contrary, the disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (10)

1. The vulnerability-based power system risk assessment method is characterized by comprising the following steps:
acquiring relevant data of a target power system to generate a target power network, wherein nodes in the target power network correspond to power nodes in the target power system;
performing vulnerability analysis on a plurality of nodes in the target power network to generate a plurality of node vulnerability values;
performing security analysis on a plurality of nodes in the target power network to generate a plurality of node security values; and
performing a risk assessment of the target power system based on the node vulnerability value and the node safety value.
2. The method of claim 1, wherein obtaining data related to a target power system generates a target power network, comprising:
acquiring a plurality of power node data of a target power system;
acquiring a plurality of basic data of the plurality of power nodes; and
generating a target power network from a plurality of base data for the plurality of power nodes.
3. The method of claim 2, wherein obtaining a plurality of base data for the plurality of power nodes comprises:
acquiring system execution data of a target power node; and/or
Acquiring material reserve data of a target power node; and/or
Acquiring emergency preparation data of a target power node; and/or
And acquiring recovery plan data of the target power node.
4. The method of claim 1, wherein performing vulnerability analysis on a plurality of nodes in the target power network, generating a plurality of node vulnerability values, comprises:
performing vulnerability analysis on basic data of a plurality of nodes in the target power network based on a preset multi-dimensional index to generate a plurality of node vulnerability values.
5. The method of claim 4, wherein performing vulnerability analysis on base data of a plurality of nodes in the target power network based on a preset multidimensional metric to generate a plurality of node vulnerability values, further comprising:
generating the preset multi-dimensional index based on data of a plurality of data sources; and
and performing factor analysis and relevance analysis on the data of the multiple data sources to integrate the multi-dimensional indexes.
6. The method of claim 4, wherein performing vulnerability analysis on base data of a plurality of nodes in the target power network based on preset multidimensional metrics to generate a plurality of node vulnerability values comprises:
determining the weight of each index in the preset multi-dimensional indexes based on an analytic hierarchy process;
comparing a plurality of basic data of a plurality of nodes in the target power network with the preset multi-dimensional indexes respectively to generate a plurality of index comparison values; and
generating a plurality of node vulnerability values based on the plurality of metric comparison values and their corresponding weights.
7. The method of claim 1, wherein performing a security analysis on a plurality of nodes in the target power network to generate a plurality of node security values comprises:
acquiring historical safety accidents of a plurality of nodes in the target power network; and
performing security analysis on the plurality of nodes based on the number of occurrences of the historical security incident to generate a plurality of node security values.
8. The method of claim 1, wherein conducting a risk assessment of the target power system based on the node vulnerability value and the node safety value comprises:
determining vulnerability weights and security weights corresponding to a plurality of nodes in the target power system;
generating a node risk value based on the node vulnerability value, the node security value, vulnerability weight, and security weight; and
and performing risk assessment of the target power system based on the node risk values of the plurality of nodes.
9. The method of claim 8, wherein performing a risk assessment of the target power system based on node risk values for a plurality of nodes comprises:
respectively distributing risk weights for a plurality of nodes; and
determining a risk value for the target power system based on the risk weights and risk values for the plurality of nodes.
10. A vulnerability-based power system risk assessment device, comprising:
the system comprises a network module, a data processing module and a data processing module, wherein the network module is used for acquiring relevant data of a target power system to generate a target power network, and nodes in the target power network correspond to power nodes in the target power system;
the vulnerability analysis module is used for carrying out vulnerability analysis on a plurality of nodes in the target power network to generate a plurality of node vulnerability values;
the safety module is used for carrying out safety analysis on a plurality of nodes in the target power network to generate a plurality of node safety values; and
an evaluation module to perform a risk evaluation of the target power system based on the node vulnerability value and the node safety value.
CN201911149617.9A 2019-11-21 2019-11-21 Vulnerability-based power system risk assessment method and device Pending CN111178667A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911149617.9A CN111178667A (en) 2019-11-21 2019-11-21 Vulnerability-based power system risk assessment method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911149617.9A CN111178667A (en) 2019-11-21 2019-11-21 Vulnerability-based power system risk assessment method and device

Publications (1)

Publication Number Publication Date
CN111178667A true CN111178667A (en) 2020-05-19

Family

ID=70653724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911149617.9A Pending CN111178667A (en) 2019-11-21 2019-11-21 Vulnerability-based power system risk assessment method and device

Country Status (1)

Country Link
CN (1) CN111178667A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107193274A (en) * 2017-07-04 2017-09-22 广东电网有限责任公司电力调度控制中心 A kind of Power Grid Vulnerability Assessment method based on various dimensions overall target
CN107679716A (en) * 2017-09-19 2018-02-09 西南交通大学 Consider the risk assessment of interconnected network cascading failure and the alarm method of communication fragile degree
CN109066650A (en) * 2018-07-16 2018-12-21 国网河北省电力有限公司经济技术研究院 Power system vulnerability appraisal procedure and terminal device
KR101987319B1 (en) * 2017-12-21 2019-06-10 한국수력원자력 주식회사 SYSTEM FOR ANALYSING HAZID(Hazard Identification Study) EMP EFFECT OF NUCLEAR POWER PLANT

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107193274A (en) * 2017-07-04 2017-09-22 广东电网有限责任公司电力调度控制中心 A kind of Power Grid Vulnerability Assessment method based on various dimensions overall target
CN107679716A (en) * 2017-09-19 2018-02-09 西南交通大学 Consider the risk assessment of interconnected network cascading failure and the alarm method of communication fragile degree
KR101987319B1 (en) * 2017-12-21 2019-06-10 한국수력원자력 주식회사 SYSTEM FOR ANALYSING HAZID(Hazard Identification Study) EMP EFFECT OF NUCLEAR POWER PLANT
CN109066650A (en) * 2018-07-16 2018-12-21 国网河北省电力有限公司经济技术研究院 Power system vulnerability appraisal procedure and terminal device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周依希 等: ""基于AHP_灰色关联度的复杂电网节点综合脆弱性评估"", 《电力系统保护与控制》 *

Similar Documents

Publication Publication Date Title
Ding et al. A 2-dimension uncertain linguistic DEMATEL method for identifying critical success factors in emergency management
Mao et al. Assessment of the impact of interdependencies on the resilience of networked critical infrastructure systems
Hadiguna et al. Implementing a web-based decision support system for disaster logistics: A case study of an evacuation location assessment for Indonesia
Leiras et al. Literature review of humanitarian logistics research: trends and challenges
de Gusmão et al. Information security risk analysis model using fuzzy decision theory
Barabadi et al. Post-disaster infrastructure recovery: Prediction of recovery rate using historical data
Shan et al. An emergency response decision support system framework for application in e-government
CN109460664A (en) Risk analysis method, device, Electronic Design and computer-readable medium
CN107886235A (en) A kind of Fire risk assessment method for coupling certainty and uncertainty analysis
Mengolini et al. Effectiveness evaluation methodology for safety processes to enhance organisational culture in hazardous installations
Shadabfar et al. Resilience-based design of infrastructure: Review of models, methodologies, and computational tools
Wells et al. Modeling critical infrastructure resilience under compounding threats: A systematic literature review
Lo et al. A new soft computing approach for analyzing the influential relationships of critical infrastructures
Bingzhen et al. An approach to evaluation of emergency plans for unconventional emergency events based on soft fuzzy rough set
Chen et al. Resilience assessment and management: A review on contributions on process safety and environmental protection
Liu et al. Probabilistic-based cascading failure approach to assessing workplace hazards affecting human error
Osei-Kyei et al. Systematic review of critical infrastructure resilience indicators
Uddin et al. Systems thinking approach for resilient critical infrastructures in urban disaster management and sustainable development
Li et al. Study on operator's SA reliability in digital NPPs. Part 2: Data-driven causality model of SA
Wang et al. Identification of protective actions to reduce the vulnerability of safety‐critical systems to malevolent intentional acts: An optimization‐based decision‐making approach
CN111160694A (en) Method and device for evaluating emergency capacity of power system
Urbina et al. Identification of risk management models and parameters For critical infrastructures
CN111178666A (en) Vulnerability-based power system emergency strategy generation method and device
CN111178667A (en) Vulnerability-based power system risk assessment method and device
Chen et al. Risk analysis of oilfield gathering station

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200519

RJ01 Rejection of invention patent application after publication