CN111581191B - Nuclear safety data verification method, device, computer equipment and storage medium - Google Patents

Nuclear safety data verification method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN111581191B
CN111581191B CN202010279922.6A CN202010279922A CN111581191B CN 111581191 B CN111581191 B CN 111581191B CN 202010279922 A CN202010279922 A CN 202010279922A CN 111581191 B CN111581191 B CN 111581191B
Authority
CN
China
Prior art keywords
nuclear
data
safety data
nuclear safety
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010279922.6A
Other languages
Chinese (zh)
Other versions
CN111581191A (en
Inventor
林思基
何继强
谭福生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China General Nuclear Power Corp
CGN Power Co Ltd
Daya Bay Nuclear Power Operations and Management Co Ltd
Lingdong Nuclear Power Co Ltd
Guangdong Nuclear Power Joint Venture Co Ltd
Lingao Nuclear Power Co Ltd
Original Assignee
China General Nuclear Power Corp
CGN Power Co Ltd
Daya Bay Nuclear Power Operations and Management Co Ltd
Lingdong Nuclear Power Co Ltd
Guangdong Nuclear Power Joint Venture Co Ltd
Lingao Nuclear Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China General Nuclear Power Corp, CGN Power Co Ltd, Daya Bay Nuclear Power Operations and Management Co Ltd, Lingdong Nuclear Power Co Ltd, Guangdong Nuclear Power Joint Venture Co Ltd, Lingao Nuclear Power Co Ltd filed Critical China General Nuclear Power Corp
Priority to CN202010279922.6A priority Critical patent/CN111581191B/en
Publication of CN111581191A publication Critical patent/CN111581191A/en
Application granted granted Critical
Publication of CN111581191B publication Critical patent/CN111581191B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Computational Linguistics (AREA)
  • Testing And Monitoring For Control Systems (AREA)

Abstract

The application relates to the technical field of informatization construction of nuclear power stations, and discloses a nuclear safety data verification method, a device, computer equipment and a storage medium, wherein the method comprises the following steps: acquiring at least two groups of nuclear safety data from a KNS system; acquiring the collection time of each group of nuclear safety data, and acquiring the working condition information of the nuclear power unit corresponding to each group of collection time; determining a verification rule of the nuclear safety data according to the working condition information; and verifying at least two groups of nuclear safety data according to the verification rule, and generating a verification result. According to the application, the nuclear safety data is automatically acquired, the nuclear safety data is automatically checked, the check result is rapidly generated, the processing efficiency of staff on the nuclear safety data is greatly improved, and the identification capability on abnormal data is enhanced.

Description

Nuclear safety data verification method, device, computer equipment and storage medium
Technical Field
The application relates to the technical field of informatization construction of nuclear power stations, in particular to a nuclear safety data verification method, a device, computer equipment and a storage medium.
Background
In the nuclear power field, in order to ensure that a nuclear power unit operates in a safe state, a large number of monitoring meters are required to be arranged to measure operation data of the nuclear power unit, and whether the operation data are abnormal or not is checked regularly. Up to ten thousand operating data are obtained. The staff is required to take a great deal of time and effort to retrieve and analyze the operation data, and the processing efficiency is low. Moreover, excessive processing of operational data tends to be distracting to the staff, resulting in portions of the anomalous data being ignored.
Disclosure of Invention
In view of the foregoing, it is necessary to provide a method, an apparatus, a computer device and a storage medium for verifying nuclear security data, so as to improve the processing efficiency of the nuclear security data and enhance the identification capability of abnormal data.
A method of verifying nuclear security data, comprising:
acquiring at least two groups of nuclear safety data from a KNS system;
acquiring the collection time of each group of the nuclear safety data, and acquiring the working condition information of the nuclear power unit corresponding to each group of the collection time;
determining a verification rule of the nuclear safety data according to the working condition information;
and verifying the at least two groups of nuclear safety data according to the verification rule, and generating a verification result.
A nuclear security data verification apparatus comprising:
the data acquisition module is used for acquiring at least two groups of nuclear safety data from the KNS system;
the working condition information determining module is used for acquiring the collection time of each group of the nuclear safety data and acquiring the working condition information of the nuclear power unit corresponding to each group of the collection time;
the verification rule determining module is used for determining the verification rule of the nuclear safety data according to the working condition information;
and the verification result generation module is used for verifying the at least two groups of nuclear safety data according to the verification rule and generating a verification result.
A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the above-described nuclear security data verification method when executing the computer program.
A computer readable storage medium storing a computer program which when executed by a processor implements the above-described nuclear security data verification method.
According to the nuclear safety data verification method, the device, the computer equipment and the storage medium, the nuclear safety data is automatically obtained, the nuclear safety data is automatically verified, the verification result is rapidly generated, the processing efficiency of workers on the nuclear safety data is greatly improved, and the recognition capability of abnormal data is enhanced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments of the present application will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an application environment of a method for verifying kernel security data according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for verifying kernel security data according to an embodiment of the application;
FIG. 3 is a flow chart illustrating a method for verifying the security data according to an embodiment of the application;
FIG. 4 is a flow chart of a method for verifying the security data according to an embodiment of the application;
FIG. 5 is a flow chart of a method for verifying the security data according to an embodiment of the application;
FIG. 6 is a flow chart of a method for verifying the security data according to an embodiment of the application;
FIG. 7 is a schematic diagram of a device for verifying data in a kernel security according to an embodiment of the present application;
FIG. 8 is a schematic diagram of a computer device in accordance with an embodiment of the application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The method for verifying the nuclear security data provided in this embodiment may be applied in an application environment as shown in fig. 1, where a client communicates with a server. Clients include, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The server may be implemented by a stand-alone server or a server cluster formed by a plurality of servers.
In one embodiment, as shown in fig. 2, a method for checking nuclear security data is provided, and the method is applied to the server in fig. 1 for illustration, and includes the following steps:
s10, acquiring at least two groups of nuclear safety data from the KNS system.
In this embodiment, the KNS system refers to an offline monitoring system for the status of a power plant. The KNS system collects operation data of a plurality of nuclear power units in a centralized manner through a PI server (a server provided with a PI database, wherein the PI database is a database for industrial data acquisition and storage) arranged in the nuclear power station. The nuclear safety data are operation data which are selected based on operation experience of the nuclear power plant and have high influence on the safety operation importance of the nuclear power unit. The KNS system is provided with a data acquisition interface, and nuclear safety data can be acquired through the data acquisition interface.
The purpose of the verification method for the nuclear safety data provided by the embodiment is not only to monitor the nuclear safety data, but also to analyze the nuclear safety data, so that hidden risks possibly existing in the nuclear power unit can be found. Therefore, at least two groups of core security data are generally required, and the security check of the core security data is realized through the comparison between different groups of core security data. The nuclear safety data comprises a plurality of operation data which are obtained by monitoring at different monitoring points of the nuclear power unit, such as leakage flow of a main pump No. two shaft seals of a nuclear island system of the No. 1 unit, water level reference values of a voltage stabilizer of the nuclear island system, leakage flow of a chemical and volume control system of the No. 1 unit, charging flow of the chemical and volume control system of the No. 1 unit, steam flow of a steam generator of the No. 1 unit and the like. The obtained nuclear safety data can be operation data acquired by the same nuclear power unit at different times, or operation data acquired by different nuclear power units at the same or different times.
S20, acquiring the collection time of the nuclear safety data of each group, and acquiring the working condition information of the nuclear power unit corresponding to the collection time of each group.
In this embodiment, each set of core security data includes a collection time. The corresponding working condition information of the nuclear power units can be the same or different in different collecting time. The working condition information refers to the running working condition of the nuclear power unit. For example, the working condition information before and after the unit power is greatly changed is greatly different (such as the working condition information before and after ELPO (long-term low-power operation)), and the unit is greatly repaired to form the working condition information of the uplink and the downlink (including the working condition information of the downlink thermal shutdown and the working condition information of the uplink thermal shutdown).
S30, determining a verification rule of the nuclear safety data according to the working condition information.
In this embodiment, the verification rules of the corresponding nuclear security data are different according to different working condition information. The check rule not only comprises a check rule of a single group of nuclear safety data, but also comprises check rules among different groups of nuclear safety data. The verification rule is formed based on a combination of theoretical calculation and historical operation experience. The verification rule may be updated based on new verification results obtained from the verification of the historical nuclear security data.
And S40, checking the at least two groups of nuclear safety data according to the checking rule, and generating a checking result.
In this embodiment, the verification rule obtained in step S30 may be used to verify the corresponding core security data, and obtain a verification result. When checking, each piece of nuclear safety data needs to be checked one by one, and the risk level of the nuclear safety data is judged to form a checking result. In some cases, the verification result contains a portion of the core security data marked as normal (i.e., normal data) and another portion of the core security data marked as abnormal (i.e., abnormal data). In addition, for the nuclear security data marked as abnormal, a new risk level may be classified according to the degree to which the data deviates from the check rule.
Optionally, as shown in fig. 3, step S10 includes:
s101, receiving a first input instruction, and acquiring first nuclear safety data from the KNS system according to the first input instruction;
s102, receiving a second input instruction, and acquiring second nuclear safety data from the KNS according to the second input instruction.
In this embodiment, the method for verifying the core security data may be implemented in the form of an application program. In the application program, a plurality of input buttons (buttons on the user operation interface) for inputting the nuclear security data may be provided. The staff member can generate corresponding input instructions through the input buttons and import the nuclear safety data. For example, a first input button provided in the application program for generating a first input instruction and importing first nuclear security data; and the first input button is used for generating a first input instruction and importing first nuclear safety data. The first nuclear security data (refer to the nuclear security data imported through the first input button, and the like), the second nuclear security data, the third nuclear security data, and the like can be classified according to the input buttons.
Here, two or more sets of the nuclear security data may be input according to the application settings. For example, the first nuclear security data may be data collected by a unit at a first time, and the second nuclear security data may be data collected by the unit at a second time. The first time and the second time are different.
Optionally, as shown in fig. 4, step S30 includes:
s301, when the first nuclear safety data are collected when the nuclear power unit is in a first working condition, acquiring a first check rule corresponding to the first working condition, wherein the first check rule is used for checking the first nuclear safety data;
s302, when the second nuclear safety data are collected when the nuclear power unit is in a second working condition, acquiring a second check rule corresponding to the second working condition, wherein the second check rule is used for checking the second nuclear safety data;
s303, acquiring a combination verification rule according to the first working condition and the second working condition, wherein the combination verification rule is used for verifying the difference value between the first nuclear safety data and the second nuclear safety data.
In this embodiment, the verification rules under different working conditions are generally different. The verification rule comprises a group of nuclear safety data used for independently verifying a certain working condition, and two or more groups of nuclear safety data used for verifying different working conditions or the same working condition. For example, under the first working condition, the first check rule sets a preset value range of the nuclear safety data a (belonging to the first nuclear safety data) to be [0,1]; under the second working condition, the second check rule sets the preset numerical range of the nuclear safety data A (belonging to the second nuclear safety data) as [2,3]; and the combination check rule sets a preset numerical range of the difference value between the nuclear safety data A under the first working condition and the nuclear safety data A under the second working condition to be [1,2.5].
Optionally, as shown in fig. 5, step S40 includes:
s401, judging whether the first nuclear safety data is in a first preset numerical range specified by the first check rule; if yes, judging that the first nuclear safety data is normal data; if not, marking the first nuclear safety data as abnormal data;
s402, judging whether the second nuclear safety data is in a second preset numerical range specified by the second check rule; if yes, judging that the second nuclear safety data is normal data; if not, marking the second nuclear safety data as abnormal data;
s403, judging whether the difference value between the first nuclear safety data and the second nuclear safety data is in a difference value range specified by the combined check rule; if yes, marking the first nuclear safety data and the second nuclear safety data as normal data; if not, judging that the first nuclear safety data and the second nuclear safety data are abnormal data.
In this embodiment, if the core security data (including the first core security data and the second core security data) and the difference value obtained based on the core security data (such as the difference value between the first core security data and the second core security data) are within the corresponding numerical range, it is determined that the core security data is normal data; if the data is not in the corresponding numerical range, the data is judged to be abnormal data. Specifically, the normal data may be identified in a first color, data in which an abnormality occurs once (e.g., the first nuclear safety data is in a first preset numerical range specified by a first check rule, but the difference between the first nuclear safety data and the second nuclear safety data is not in a difference numerical range specified by a combination check rule) may be identified in a second color, and data in which an abnormality occurs twice (e.g., the second nuclear safety data is not in a second preset numerical range specified by a second check rule, and the difference between the first nuclear safety data and the second nuclear safety data is not in a difference numerical range specified by a combination check rule) may be identified in a third color. For example, the first color may be green, the second color may be yellow, and the third color may be red. It should be noted that steps S401-S403 are independent determination processes, and each verification of the core security data is performed twice (when the third core security data exists, a pairwise comparison mode may be still adopted), and the result of each verification is independent. The final verification result is superposition of the results after multiple verification.
Optionally, as shown in fig. 6, step S10 includes:
s103, acquiring a plurality of groups of nuclear safety data from the KNS system according to a preset acquisition period;
s104, selecting the at least two groups of nuclear safety data from the plurality of groups of nuclear safety data according to a preset selection rule.
In this embodiment, the preset acquisition period may be set according to actual needs. For example, it may be set three times per day. In a primary acquisition process, multiple groups of nuclear safety data can be acquired from the KNS system, and each group of nuclear safety data refers to operation data of one nuclear power unit. After the acquisition is completed, the nuclear safety data can be stored in a database on a local disk or a cloud server. It should be noted that the multiple sets of nuclear safety data referred to herein include both currently acquired nuclear safety data and previously acquired (several times before) nuclear safety data.
The preset selection rule can be set according to actual needs, for example, the preset selection rule can be set as follows: and selecting the nuclear safety data of the first nuclear power unit at the first moment of the first day as first nuclear safety data, and selecting the nuclear safety data of the first nuclear power unit at the first moment of the second day as second nuclear safety data. The preset selection rule may also refer to a manually entered setting.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present application.
In an embodiment, a device for checking the nuclear security data is provided, where the device for checking the nuclear security data corresponds to the method for checking the nuclear security data in the above embodiment one by one. As shown in fig. 7, the nuclear safety data verification device includes a data acquisition module 10, a working condition determining information module 20, a verification rule determining module 30 and a verification result generating module 40. The functional modules are described in detail as follows:
a data acquisition module 10 for acquiring at least two sets of nuclear safety data from the KNS system;
the working condition information determining module 20 is used for acquiring the collection time of each group of the nuclear safety data and acquiring the working condition information of the nuclear power unit corresponding to each group of the collection time;
a determining and checking rule module 30, configured to determine a checking rule of the nuclear safety data according to the working condition information;
and a verification result generation module 40, configured to verify the at least two sets of core security data according to the verification rule, and generate a verification result.
Optionally, the data acquisition module 10 includes:
the first input unit is used for receiving a first input instruction and acquiring first nuclear safety data from the KNS according to the first input instruction;
and the second input unit is used for receiving a second input instruction and acquiring second nuclear safety data from the KNS according to the second input instruction.
Optionally, the determining check rule module 30 includes:
the first rule obtaining unit is used for obtaining a first check rule corresponding to a first working condition when the first nuclear safety data are collected when the nuclear power unit is in the first working condition, and the first check rule is used for checking the first nuclear safety data;
the second rule obtaining unit is used for obtaining a second check rule corresponding to a second working condition when the second nuclear safety data are collected when the nuclear power unit is in the second working condition, and the second check rule is used for checking the second nuclear safety data;
and the combination rule acquisition unit is used for acquiring a combination verification rule according to the first working condition and the second working condition, wherein the combination verification rule is used for verifying the difference value between the first nuclear safety data and the second nuclear safety data.
Optionally, the generating verification result module 40 includes:
the first judging unit is used for judging whether the first nuclear safety data is in a first preset numerical range specified by the first check rule; if yes, judging that the first nuclear safety data is normal data; if not, marking the first nuclear safety data as abnormal data;
a second judging unit, configured to judge whether the second nuclear security data is in a second preset numerical range specified by the second check rule; if yes, judging that the second nuclear safety data is normal data; if not, marking the second nuclear safety data as abnormal data;
the combination judging unit is used for judging whether the difference value between the first nuclear safety data and the second nuclear safety data is in a difference value range specified by the combination check rule; if yes, marking the first nuclear safety data and the second nuclear safety data as normal data; if not, judging that the first nuclear safety data and the second nuclear safety data are abnormal data.
Optionally, the data acquisition module 10 includes:
the automatic acquisition unit is used for acquiring a plurality of groups of nuclear safety data from the KNS system according to a preset acquisition period;
and the automatic selection unit is used for selecting the at least two groups of nuclear safety data from the plurality of groups of nuclear safety data according to a preset selection rule.
For specific limitations of the core security data verification apparatus, reference may be made to the above limitation of the core security data verification method, and no further description is given here. The above-mentioned each module in the nuclear security data checking device may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing the data related to the nuclear security data verification method. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a method of verification of nuclear security data.
In one embodiment, a computer device is provided comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of when executing the computer program:
acquiring at least two groups of nuclear safety data from a KNS system;
acquiring the collection time of each group of the nuclear safety data, and acquiring the working condition information of the nuclear power unit corresponding to each group of the collection time;
determining a verification rule of the nuclear safety data according to the working condition information;
and verifying the at least two groups of nuclear safety data according to the verification rule, and generating a verification result.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring at least two groups of nuclear safety data from a KNS system;
acquiring the collection time of each group of the nuclear safety data, and acquiring the working condition information of the nuclear power unit corresponding to each group of the collection time;
determining a verification rule of the nuclear safety data according to the working condition information;
and verifying the at least two groups of nuclear safety data according to the verification rule, and generating a verification result.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (10)

1. A method for verifying nuclear security data, comprising:
acquiring at least two groups of nuclear safety data from a KNS system;
acquiring the collection time of each group of the nuclear safety data, and acquiring the working condition information of the nuclear power unit corresponding to each group of the collection time;
determining a verification rule of the nuclear safety data according to the working condition information;
checking the at least two groups of nuclear safety data according to the checking rule, and generating a checking result;
the determining the verification rule of the nuclear safety data according to the working condition information comprises the following steps:
when first nuclear safety data are collected when the nuclear power unit is in a first working condition, acquiring a first check rule corresponding to the first working condition, wherein the first check rule is used for checking the first nuclear safety data;
when the second nuclear safety data are collected when the nuclear power unit is in a second working condition, acquiring a second check rule corresponding to the second working condition, wherein the second check rule is used for checking the second nuclear safety data;
and acquiring a combined verification rule according to the first working condition and the second working condition, wherein the combined verification rule is used for verifying the difference value between the first nuclear safety data and the second nuclear safety data.
2. The method for verifying nuclear security data as defined in claim 1, wherein the obtaining at least two sets of nuclear security data from the KNS system comprises:
receiving a first input instruction, and acquiring the first nuclear safety data from the KNS system according to the first input instruction;
and receiving a second input instruction, and acquiring the second nuclear safety data from the KNS according to the second input instruction.
3. The method for verifying the nuclear security data according to claim 1, wherein verifying the at least two sets of nuclear security data according to the verification rule and generating a verification result comprises:
judging whether the first nuclear safety data is in a first preset numerical range specified by the first check rule; if yes, judging that the first nuclear safety data is normal data; if not, judging the first nuclear safety data as abnormal data;
judging whether the second nuclear safety data is in a second preset numerical range specified by the second check rule; if yes, judging that the second nuclear safety data is normal data; if not, judging the second nuclear safety data as abnormal data;
judging whether the difference value between the first nuclear safety data and the second nuclear safety data is in a difference value range specified by the combination check rule; if yes, judging that the first nuclear safety data and the second nuclear safety data are normal data; if not, judging that the first nuclear safety data and the second nuclear safety data are abnormal data.
4. The method for verifying nuclear security data as defined in claim 1, wherein the obtaining at least two sets of nuclear security data from the KNS system comprises:
acquiring a plurality of groups of nuclear safety data from a KNS system according to a preset acquisition period;
and selecting the at least two groups of nuclear safety data from the plurality of groups of nuclear safety data according to a preset selection rule.
5. A nuclear security data verification apparatus, comprising:
the data acquisition module is used for acquiring at least two groups of nuclear safety data from the KNS system;
the working condition information determining module is used for acquiring the collection time of each group of the nuclear safety data and acquiring the working condition information of the nuclear power unit corresponding to each group of the collection time;
the verification rule determining module is used for determining the verification rule of the nuclear safety data according to the working condition information;
the verification result generation module is used for verifying the at least two groups of nuclear safety data according to the verification rule and generating a verification result;
the determining and checking rule module comprises:
the nuclear power unit comprises a first rule acquisition unit, a first verification unit and a second rule acquisition unit, wherein the first rule acquisition unit is used for acquiring a first verification rule corresponding to a first working condition when first nuclear safety data are collected when the nuclear power unit is in the first working condition, and the first verification rule is used for verifying the first nuclear safety data;
the second rule obtaining unit is used for obtaining a second check rule corresponding to a second working condition when second nuclear safety data are collected when the nuclear power unit is in the second working condition, and the second check rule is used for checking the second nuclear safety data;
and the combination rule acquisition unit is used for acquiring a combination verification rule according to the first working condition and the second working condition, wherein the combination verification rule is used for verifying the difference value between the first nuclear safety data and the second nuclear safety data.
6. The nuclear security data verification apparatus of claim 5, wherein the data acquisition module comprises:
the first input unit is used for receiving a first input instruction and acquiring first nuclear safety data from the KNS according to the first input instruction;
and the second input unit is used for receiving a second input instruction and acquiring second nuclear safety data from the KNS according to the second input instruction.
7. The nuclear security data verification apparatus of claim 5, wherein the generate verification result module comprises:
the first judging unit is used for judging whether the first nuclear safety data is in a first preset numerical range specified by the first check rule; if yes, judging that the first nuclear safety data is normal data; if not, judging the first nuclear safety data as abnormal data;
a second judging unit, configured to judge whether the second nuclear security data is in a second preset numerical range specified by the second check rule; if yes, judging that the second nuclear safety data is normal data; if not, judging the second nuclear safety data as abnormal data;
the combination judging unit is used for judging whether the difference value between the first nuclear safety data and the second nuclear safety data is in a difference value range specified by the combination check rule; if yes, judging that the first nuclear safety data and the second nuclear safety data are normal data; if not, judging that the first nuclear safety data and the second nuclear safety data are abnormal data.
8. The nuclear security data verification apparatus of claim 5, wherein the data acquisition module comprises:
the automatic acquisition unit is used for acquiring a plurality of groups of nuclear safety data from the KNS system according to a preset acquisition period;
and the automatic selection unit is used for selecting the at least two groups of nuclear safety data from the plurality of groups of nuclear safety data according to a preset selection rule.
9. A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the nuclear security data verification method according to any one of claims 1 to 4 when executing the computer program.
10. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the nuclear security data verification method according to any one of claims 1 to 4.
CN202010279922.6A 2020-04-10 2020-04-10 Nuclear safety data verification method, device, computer equipment and storage medium Active CN111581191B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010279922.6A CN111581191B (en) 2020-04-10 2020-04-10 Nuclear safety data verification method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010279922.6A CN111581191B (en) 2020-04-10 2020-04-10 Nuclear safety data verification method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111581191A CN111581191A (en) 2020-08-25
CN111581191B true CN111581191B (en) 2023-10-13

Family

ID=72126149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010279922.6A Active CN111581191B (en) 2020-04-10 2020-04-10 Nuclear safety data verification method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111581191B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112396015B (en) * 2020-11-26 2024-04-16 岭东核电有限公司 Supercooling signal identification method and device for nuclear power unit of nuclear power plant
CN112597194A (en) * 2020-12-04 2021-04-02 中广核工程有限公司 Method and system for calibrating data information of nuclear power instrument
CN112817953A (en) * 2021-01-22 2021-05-18 深圳依时货拉拉科技有限公司 Data verification method and device, computer equipment and computer-readable storage medium

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101740153A (en) * 2009-12-01 2010-06-16 中国广东核电集团有限公司 Device and system for monitoring and displaying normal operating condition of unit of nuclear power plant
KR20110116378A (en) * 2010-04-19 2011-10-26 비앤에프테크놀로지 주식회사 Data collecting method for detection and on-time warning system of industrial process
CN102412003A (en) * 2011-09-20 2012-04-11 中广核工程有限公司 Nuclear power station DCS debugging system and method thereof
WO2016180267A1 (en) * 2015-05-13 2016-11-17 阿里巴巴集团控股有限公司 Method of processing exchanged data and device utilizing same
CN106599271A (en) * 2016-12-22 2017-04-26 江苏方天电力技术有限公司 Emission monitoring time series data abnormal value detection method for coal-fired unit
CN107910086A (en) * 2017-11-23 2018-04-13 中广核工程有限公司 One kind is based on nuclear plant safety abnormal parameters condition adjudgement system and method
CN108087210A (en) * 2017-12-19 2018-05-29 北京金风科创风电设备有限公司 Wind generating set blade abnormity identification method and device
KR20180075889A (en) * 2016-12-27 2018-07-05 주식회사 엠앤디 alarm occurring method for using big data of nuclear power plant
CN109146137A (en) * 2018-07-23 2019-01-04 广东核电合营有限公司 Predict the method, apparatus and terminal device of operation state of generator variation tendency
CN109446345A (en) * 2018-09-26 2019-03-08 深圳中广核工程设计有限公司 Nuclear power file verification processing method and system
CN109579217A (en) * 2018-12-17 2019-04-05 珠海格力电器股份有限公司 Data processing method, device, unit equipment and the storage medium of unit equipment
CN110175756A (en) * 2019-05-07 2019-08-27 岭澳核电有限公司 Nuclear power station information system operational safety method for early warning, device, equipment and medium
CN110427526A (en) * 2019-07-26 2019-11-08 珠海格力电器股份有限公司 Unit and its control method, device, equipment, electrical equipment and storage medium
CN110426123A (en) * 2019-07-15 2019-11-08 乌江渡发电厂 A kind of method for detecting vibration of the top cover of power plants generating electricity unit
CN110515998A (en) * 2019-08-27 2019-11-29 南京河海南自水电自动化有限公司 Hydroenergy storage station change working optimization method and system
WO2019232832A1 (en) * 2018-06-06 2019-12-12 平安科技(深圳)有限公司 Data monitoring method and device, computer device, and storage medium
CN110617209A (en) * 2019-09-20 2019-12-27 江苏欣皓测试技术有限公司 Online monitoring and diagnosing method and system for pump station unit

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4445180A (en) * 1973-11-06 1984-04-24 Westinghouse Electric Corp. Plant unit master control for fossil fired boiler implemented with a digital computer
KR101736405B1 (en) * 2016-03-31 2017-05-16 한국전력기술 주식회사 System and method for designing nuclear power plant

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101740153A (en) * 2009-12-01 2010-06-16 中国广东核电集团有限公司 Device and system for monitoring and displaying normal operating condition of unit of nuclear power plant
KR20110116378A (en) * 2010-04-19 2011-10-26 비앤에프테크놀로지 주식회사 Data collecting method for detection and on-time warning system of industrial process
CN102412003A (en) * 2011-09-20 2012-04-11 中广核工程有限公司 Nuclear power station DCS debugging system and method thereof
WO2016180267A1 (en) * 2015-05-13 2016-11-17 阿里巴巴集团控股有限公司 Method of processing exchanged data and device utilizing same
CN106599271A (en) * 2016-12-22 2017-04-26 江苏方天电力技术有限公司 Emission monitoring time series data abnormal value detection method for coal-fired unit
KR20180075889A (en) * 2016-12-27 2018-07-05 주식회사 엠앤디 alarm occurring method for using big data of nuclear power plant
CN107910086A (en) * 2017-11-23 2018-04-13 中广核工程有限公司 One kind is based on nuclear plant safety abnormal parameters condition adjudgement system and method
CN108087210A (en) * 2017-12-19 2018-05-29 北京金风科创风电设备有限公司 Wind generating set blade abnormity identification method and device
WO2019232832A1 (en) * 2018-06-06 2019-12-12 平安科技(深圳)有限公司 Data monitoring method and device, computer device, and storage medium
CN109146137A (en) * 2018-07-23 2019-01-04 广东核电合营有限公司 Predict the method, apparatus and terminal device of operation state of generator variation tendency
CN109446345A (en) * 2018-09-26 2019-03-08 深圳中广核工程设计有限公司 Nuclear power file verification processing method and system
CN109579217A (en) * 2018-12-17 2019-04-05 珠海格力电器股份有限公司 Data processing method, device, unit equipment and the storage medium of unit equipment
CN110175756A (en) * 2019-05-07 2019-08-27 岭澳核电有限公司 Nuclear power station information system operational safety method for early warning, device, equipment and medium
CN110426123A (en) * 2019-07-15 2019-11-08 乌江渡发电厂 A kind of method for detecting vibration of the top cover of power plants generating electricity unit
CN110427526A (en) * 2019-07-26 2019-11-08 珠海格力电器股份有限公司 Unit and its control method, device, equipment, electrical equipment and storage medium
CN110515998A (en) * 2019-08-27 2019-11-29 南京河海南自水电自动化有限公司 Hydroenergy storage station change working optimization method and system
CN110617209A (en) * 2019-09-20 2019-12-27 江苏欣皓测试技术有限公司 Online monitoring and diagnosing method and system for pump station unit

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
C.J. D´ıeza.NDEC: A NEA platform for nuclear data testing, verification and benchmarking.EPJ Web of Conferences.2017,1-4. *
关建军.大亚湾核电站900MW发电机组运行状况分析与评价.大电机技术.2001,(第06期),39-43. *
刘丽影等. 基于ETAP仿真的核电机组厂用电系统暂态稳定分析.电力建设.2013,第34卷(第34期),68-73. *

Also Published As

Publication number Publication date
CN111581191A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
CN111581191B (en) Nuclear safety data verification method, device, computer equipment and storage medium
CN110175756B (en) Nuclear power station information system operation safety early warning method, device, equipment and medium
CN111429087B (en) Nuclear power test-based test procedure information processing method and device
US11562114B2 (en) Apparatus and method for safety analysis evaluation with data-driven workflow
CN108427632B (en) Automatic test method and device
CN108876207A (en) Operating risk appraisal procedure, device, computer equipment and storage medium
Wang et al. Impacts of operators’ behavior on reliability of power grids during cascading failures
CN111259791B (en) Nuclear power station material acceptance method and device, computer equipment and storage medium
CN111240929A (en) Mobile machine room supervision method and device, computer equipment and storage medium
CN111325159A (en) Fault diagnosis method and device, computer equipment and storage medium
CN110175935A (en) Nuclear power data monitoring method, device, computer equipment and storage medium
CN112684247A (en) User electricity stealing detection method and device, computer equipment and storage medium
CN112803585A (en) Monitoring method and device for low-voltage contact cabinet, computer equipment and storage medium
CN113538370A (en) Power grid inspection method and device, computer equipment and storage medium
CN115529315A (en) Cloud edge coordination system
CN111367754A (en) Data monitoring method and device, computer equipment and storage medium
CN109389294B (en) Usability evaluation method and device of nuclear security level DCS (distributed control System)
CN116992274B (en) Short-term wind speed prediction method and system based on improved principal component regression model
CN112488484A (en) Personnel reliability evaluation method, system, computer equipment and storage medium
CN109192340B (en) Method and device for monitoring generator measuring point of million-kilowatt pressurized water reactor nuclear power station
CN110942187A (en) Method and system for optimizing unavailable related terms of fire detection system and storage medium
CN110265165A (en) Nuclear power vessel temp adjusting method, device, computer equipment and storage medium
CN110969430B (en) Suspicious user identification method, suspicious user identification device, computer equipment and storage medium
CN114186872A (en) Emergency state assessment method and device for nuclear power plant and computer equipment
CN112862459A (en) Test abnormity monitoring method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant