CN112363400B - Cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes - Google Patents

Cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes Download PDF

Info

Publication number
CN112363400B
CN112363400B CN202011361609.3A CN202011361609A CN112363400B CN 112363400 B CN112363400 B CN 112363400B CN 202011361609 A CN202011361609 A CN 202011361609A CN 112363400 B CN112363400 B CN 112363400B
Authority
CN
China
Prior art keywords
data
optical fiber
array
fiber sensor
intrusion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011361609.3A
Other languages
Chinese (zh)
Other versions
CN112363400A (en
Inventor
孙宏彬
潘欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baicheng Power Supply Co Of State Grid Jilin Electric Power Co Ltd
Changchun Institute of Applied Chemistry of CAS
Original Assignee
Baicheng Power Supply Co Of State Grid Jilin Electric Power Co ltd
Changchun Institute of Applied Chemistry of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Baicheng Power Supply Co Of State Grid Jilin Electric Power Co ltd, Changchun Institute of Applied Chemistry of CAS filed Critical Baicheng Power Supply Co Of State Grid Jilin Electric Power Co ltd
Priority to CN202011361609.3A priority Critical patent/CN112363400B/en
Publication of CN112363400A publication Critical patent/CN112363400A/en
Application granted granted Critical
Publication of CN112363400B publication Critical patent/CN112363400B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B13/00Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion
    • G05B13/02Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
    • G05B13/04Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
    • G05B13/042Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators in which a parameter or coefficient is automatically adjusted to optimise the performance

Abstract

The invention relates to a cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes. The regression prediction model based on abnormal condition codes instead of specific numerical values can be obtained by utilizing the method, the problem that the conventional prediction method cannot stably run for a long time due to the binding of the conventional prediction method and specific experimental numerical values can be solved, and the intrusion condition of the cable tunnel can be effectively monitored in a longer time range.

Description

Cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes
The technical field is as follows:
the invention relates to a cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes, which is used for monitoring cable tunnel intrusion conditions and belongs to the technical field of cable tunnel state safety monitoring.
Background art:
the power cable is an important carrier of power transmission, and the performance of construction efficiency of a power grid is influenced by the failure of a cable tunnel. The invasion condition of criminals often happens to the cable tunnel, internal cross interconnection wires, grounding copper bars and the like in the tunnel are often stolen, so that huge economic loss is caused, and the safe and effective operation of a power system is seriously influenced by the problems, so that the invasion condition of the cable tunnel is very necessary to be monitored.
The current mode of monitoring cable tunnel invasion condition has two kinds: firstly, a specially-assigned person directly checks the tunnel condition at fixed intervals, which not only needs to consume huge labor cost, but also causes untimely detection or missed detection for possible invasion conditions due to long cable distance; secondly, the situation in the tunnel is reflected by the signals of the optical fiber sensor, and a corresponding artificial intelligence model is established to predict the possible invasion situation, wherein the models are usually established based on laboratory data or data obtained at the initial stage of cable tunnel construction, and are characterized in that the precision of binding with a specific numerical value at the initial stage of system operation is very high; however, since the tunnel with large regional distribution inevitably sinks and deforms in the long-term use process, the numerical value-based models are increasingly inaccurate, and the false alarm rate continuously rises after the tunnel runs for a period of time.
Therefore, a method is needed to be provided, which can avoid the problem of binding the traditional method with a specific experimental value, and monitor the intrusion condition of the cable tunnel in a longer time range.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal code description. The method can code the abnormal condition of the input optical fiber sensor signal, further obtain a regression model based on the code, and further realize the monitoring of the cable tunnel invasion condition.
The invention relates to a cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes, which comprises the following steps:
s1, inputting a cable tunnel optical fiber sensor signal data list HistoryList in a normal state, inputting a data list ErrorList in the case of intrusion of a cable tunnel, obtaining the number HistoryNum of HistoryList data entries, and establishing a normal state statistical array HARray; acquiring the number ErrorNum of ErrorList data entries, establishing an intrusion state statistical array EArray, and acquiring the maximum value DistanceMax of an intrusion position;
s101, inputting a cable tunnel optical fiber sensor signal data list HistoryList in a normal state, wherein the fields of the HistoryList comprise:
HSData: and the data type of the normal state optical fiber sensor signal array is a floating point type array with 100 elements.
HRQ, obtaining the time corresponding to the HSData data by the optical fiber sensor;
s102, inputting a data list errorlst of the cable tunnel intrusion, wherein fields of the errorlst include:
ESData: the data type of the signal array of the optical fiber sensor with the intrusion condition is a floating point type array with 100 elements;
EDistance: the distance between the position where the intrusion condition occurs in the tunnel and the optical fiber sensor, wherein the data type of the distance is floating point type data;
ERQ: the optical fiber sensor acquires time corresponding to the ESData data;
s103, HistoryNum = number of data entries of HistoryList, and ErrorNum = number of data entries of ErrorList; HArray = a floating point array of 100 elements; EArray = floating point array of 100 elements; DistanceMax = = elistance field maximum for ErrorList;
s104, setting the values of all elements of the HARRAY to be 0; setting all elements of EArray to 0; sorting the HistoryList according to the HRQ value from small to large; sorting ErrorList according to the value of ERQ from small to large;
s105, historical data counter HistoryNumCounter = 1;
S106,HArray=HArray+(HistoryList[HistoryNumCounter].HSData)×(1+ (HistoryNumCounter/HistoryNum-0.5) /100);
S107, HistoryNumCounter=HistoryNumCounter+1;
s108, if HistoryNumCount > HistoryNum, then go to S109, otherwise go to S106;
S109,HArray=HArray/HistoryNum;
s110, an intrusion condition counter ErrorNumCount = 1;
S111,EArray=EArray+(ErrorList [ErrorNumCounter].ESData);
S112,ErrorNumCounter=ErrorNumCounter+1;
s113, if the ErrorNumCount is greater than the ErrorNum, then the S114 is turned, otherwise, the S111 is turned;
S114,EArray=EArray/ErrorNum;
s2, establishing an optical fiber signal abnormal coding description operator OFeature, wherein the input variable of OFeature is OFeatureInput, the type of OFeatureInput is a floating-point array with 100 elements, the output variable of OFeature is OFeatureOutput, and OFeatureOutput is a floating-point array with 400 elements;
s201, establishing an optical fiber signal abnormal coding description operator OFeature, wherein the input variable of the OFeature is OFeatureInput, and the type of the OFeatureInput is a floating point type array with 100 elements;
s202, establishing a floating-point array of OFeatureOutput =400 elements of an output variable OFeature, and setting all element values of the array to be 0;
s203, the operator counter ofearturecounter = 1;
s204, if ofatutureinput [ ofatuturecounter ] > harrray [ ofatuturecounter ], then ofatutureoutput [ ofatuturecounter ] = 1;
s205, if ofatutureinput [ ofatuturecounter ] > earrray [ ofatuturecounter ], then ofatutureoutput [ ofatuturecounter +100] = 1;
s206, the operator first temporary storage variable ofaturetemp 1= 0; the operator second temporary storage variable ofatuturetemp 1= 0;
s207, ofatuturetemp 1= abs (ofatutureinput [ ofatuturecounter ] -harrray [ ofatuturecounter ]), where abs is the calculated absolute value;
s208, ofatuturetemp 2= abs (ofatutureinput [ ofatuturecounter ] -earrray [ ofatuturecounter ]), where abs is the calculated absolute value;
s209, if OFeatureTemp1> OFeatureTemp2,
this ofeartureoutput [ ofearturecounter +200] = 1;
s210, if abs (ofaturetemp 1-ofaturetemp 2) >0.5, ofatureoutput [ ofaturecounter +300] =1, where abs is the calculated absolute value;
S211, OFeatureCounter=OFeatureCounter+1;
s212, go to S213 if OFeatureCounter >100, otherwise go to S204;
s213, using the OFeatureOutput as the output of the OFeature;
s3, constructing a decision information table decisionTable by using an optical fiber signal feature description operator OFeature, and training a regression model RegModel by using the decisionTable;
s301, establishing a decision information table decisionTable, wherein the field structure of the decisionTable is as follows:
DecisionInput: decision input, which is a floating-point array of 400 elements;
DecisionDistance, the distance of the invasion situation, and the data type of the distance is floating point type data;
s302, the decision counter first variable CreateCounter1= 1;
s303, the decision temporary storage array variable ctemparay = is calculated by ofeacture, and the operator inputs ofeactureinput = HistoryList [ CreateCounter1]. HSData;
s304, newly creating 1 record in the decisionTable; the value of the DecisionInput field in the newly added record is CTempray, and the value of DecisionDistance is-1;
S305,CreateCounter1=CreateCounter1+1;
s306, if the CreateCounter1> HistoryNum, then go to S307, otherwise go to S303;
s307, the decision counter second variable CreateCounter2= 1;
s308, ctemaprray = calculated by ofeacture, operator input ofeactureinput = errorlst [ CreateCounter2]. ESData;
s309, newly building 1 record in the decisionTable; in the newly added record, the value of the decisionInput field is CTempRay, and the value of the decisionDistance is ErrorList [ CreateCounter2]. EDistance/DistanceMax;
S310,CreateCounter2=CreateCounter2+1;
s311, if CreateCounter2> ErrorNum, go to S312, otherwise go to S308;
s312, establishing a neural network regression analysis model RegModel;
s313, taking a decisionInput field of decisionTable as the input of the RegModel model, and taking a decisionDistance field of decisionTable as the output of the RegModel model; inputting all data of decisionTable to train the RegModel;
s4, inputting data CurrentArray acquired by the optical fiber sensor signal in the cable tunnel, and predicting the invasion condition;
s401, inputting data CurrentArray acquired by an optical fiber sensor signal in a cable tunnel, wherein the CurrentArray is a floating-point array with 100 elements;
s402, predicting a temporary storage Feature variable Feature = calculating through OFeature, and inputting OFeatureInput = CurrentArray by an operator;
s403, taking Feature as an input of the RegModel and obtaining an output of the RegModel according to the prediction result variable PResult =;
s404, if PResult is less than 0, outputting 'no intrusion condition' and turning to S408, otherwise, turning to S405;
s405, finally predicting the distance ResultDis = preesult × detancemax;
s406, outputting the intrusion condition and outputting ResultDis as the intrusion position;
s407, go to S409;
S408,HArray=(CurrentArray-HArray)/( HistoryNum×10)+HArray;
and S409, finishing the prediction process.
The invention has the beneficial effects that:
a cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal code description is provided. The method can code the abnormal condition of the input optical fiber sensor signal, further obtain a regression model based on the code, and further realize the monitoring of the cable tunnel invasion condition. The regression prediction model based on abnormal condition codes instead of specific numerical values can be obtained by utilizing the method, the problem that the conventional prediction method cannot stably run for a long time due to the binding of the conventional prediction method and specific experimental numerical values can be solved, and the intrusion condition of the cable tunnel can be effectively monitored in a longer time range.
Detailed Description
The present invention is further illustrated by the following examples, which do not limit the present invention in any way, and any modifications or changes that can be easily made by a person skilled in the art to the present invention will fall within the scope of the claims of the present invention without departing from the technical solution of the present invention.
Example 1
S1, inputting a cable tunnel optical fiber sensor signal data list HistoryList in a normal state, inputting a data list ErrorList in the case of intrusion of a cable tunnel, obtaining the number HistoryNum of HistoryList data entries, and establishing a normal state statistical array HARray; and obtaining the number ErrorNum of ErrorList data entries, establishing an intrusion state statistical array EArray, and obtaining the maximum value DistanceMax of an intrusion position.
S101, inputting a normal cable tunnel optical fiber sensor signal data list HistoryList, where the fields of the HistoryList include:
HSData: the data type of the normal state optical fiber sensor signal array is a floating point type array with 100 elements.
HRQ is the time corresponding to HSData data acquired by the optical fiber sensor.
S102, inputting a data list errorlst of a cable tunnel intrusion condition, where fields of the errorlst include:
ESData: and the data type of the fiber sensor signal array with the intrusion condition is a floating point type array with 100 elements.
EDistance: the data type of the distance between the position with the intrusion condition in the tunnel and the optical fiber sensor is floating point type data.
ERQ: and the optical fiber sensor acquires time corresponding to the ESData data.
S103, HistoryNum = number of data entries of HistoryList, and ErrorNum = number of data entries of ErrorList; HArray = a floating point array of 100 elements; EArray = floating point array of 100 elements; DistanceMax = = elistance field maximum for ErrorList;
s104, setting the values of all elements of the HARRAY to be 0; setting all elements of EArray to 0; sorting the HistoryList according to the HRQ value from small to large; sorting ErrorList according to the value of ERQ from small to large;
s105, historical data counter HistoryNumCounter = 1;
S106,HArray=HArray+(HistoryList[HistoryNumCounter].HSData)×(1+ (HistoryNumCounter/HistoryNum-0.5) /100);
S107, HistoryNumCounter=HistoryNumCounter+1;
s108, if HistoryNumCount > HistoryNum, then go to S109, otherwise go to S106;
S109,HArray=HArray/HistoryNum;
s110, an intrusion condition counter ErrorNumCount = 1;
S111,EArray=EArray+(ErrorList [ErrorNumCounter].ESData);
S112,ErrorNumCounter=ErrorNumCounter+1;
s113, if the ErrorNumCount is greater than the ErrorNum, then the S114 is turned, otherwise, the S111 is turned;
S114,EArray=EArray/ErrorNum。
take data of cable tunnels 2018-2019 in place of Jilin province as an example
Inputting a cable tunnel optical fiber sensor signal data list HistoryList in a normal state, wherein the HistoryList comprises 100 pieces of data and comprises the following contents:
Figure 579113DEST_PATH_IMAGE001
the data list errorlst for the case of an intrusion into the cable tunnel, which contains 100 pieces of data, is as follows:
Figure 965095DEST_PATH_IMAGE002
number HistoryNum =100 to obtain HistoryList data entry
Establishing a normal state statistical array harrray = [0.21, 1.67, 1.23, 0.99, 1.38, 0.48, 1.11, 1.01, 1.18, 1.62,......... 0.28, 0.28, 0.44, 0.00, 0.42, 0.25, 0.25, 0.39, 0.00, 2.40 ];
obtaining the number ErrorNum =100 of ErrorList data entries;
establishing an intrusion status statistics array EArray = [0.11, 1.49, 1.29, 1.25, 1.49, 0.48, 1.61, 0.69, 1.25, 1.62,.... 0.28, 0.28, 0.44, 0.00, 0.42, 0.25, 0.25, 0.39, 0.00, 1.18 ];
obtaining the maximum value DistanCEMax =2349 of the intrusion position;
s2, establishing an optical fiber signal abnormal coding description operator OFeature, wherein the input variable of OFeature is OFeatureInput, the type of OFeatureInput is a floating-point array with 100 elements, the output variable of OFeature is OFeatureOutput, and OFeatureOutput is a floating-point array with 400 elements.
S201, establishing an optical fiber signal abnormal coding description operator OFeature, wherein the input variable of the OFeature is OFeatureInput, and the type of the OFeatureInput is a floating point type array with 100 elements;
s202, establishing a floating-point array of OFeatureOutput =400 elements of an output variable OFeature, and setting all element values of the array to be 0;
s203, the operator counter ofearturecounter = 1;
s204, if ofatutureinput [ ofatuturecounter ] > harrray [ ofatuturecounter ], then ofatutureoutput [ ofatuturecounter ] = 1;
s205, if ofatutureinput [ ofatuturecounter ] > earrray [ ofatuturecounter ], then ofatutureoutput [ ofatuturecounter +100] = 1;
s206, operator first temporary storage variable ofearturetemp 1= 0; the operator second temporary storage variable ofatuturetemp 1= 0;
s207, OFeatureTemp1= abs (OFeatureInput [ OFeatureCounter ] -harrray [ OFeatureCounter ]), where abs is the calculated absolute value;
s208, ofatuturetemp 2= abs (ofatutureinput [ ofatuturecounter ] -earrray [ ofatuturecounter ]), where abs is the calculated absolute value;
s209, if the ofaturetemp 1> ofaturetemp 2, the ofatureoutput [ ofaturecounter +200] = 1;
s210, if abs (ofaturetemp 1-ofaturetemp 2) >0.5, ofatureoutput [ ofaturecounter +300] =1, where abs is the calculated absolute value;
S211, OFeatureCounter=OFeatureCounter+1;
s212, go to S213 if OFeatureCounter >100, otherwise go to S204;
s213, using the OFeatureOutput as the output of the OFeature;
s3, constructing a decision information table DecisionTable by using an optical fiber signal feature description operator OFeature, and training a regression model RegModel by using the DecisionTable;
s301, establishing a decision information table decisionTable, wherein the field structure of the decisionTable is as follows:
DecisionInput: decision input, which is a floating-point array of 400 elements;
DecisionDistance, the distance of the invasion situation, and the data type of the distance is floating point type data;
s302, the decision counter first variable CreateCounter1= 1;
s303, the decision temporary storage array variable ctemparay = is calculated by ofeacture, and the operator inputs ofeactureinput = HistoryList [ CreateCounter1]. HSData;
s304, newly creating 1 record in the decisionTable; the value of the DecisionInput field in the newly added record is CTempray, and the value of DecisionDistance is-1;
S305,CreateCounter1=CreateCounter1+1;
s306, if the CreateCounter1> HistoryNum, then go to S307, otherwise go to S303;
s307, the decision counter second variable CreateCounter2= 1;
s308, ctemaprray = calculated by ofeacture, operator input ofeactureinput = errorlst [ CreateCounter2]. ESData;
s309, newly building 1 record in the decisionTable; in the newly added record, the value of the decisionInput field is CTempRay, and the value of the decisionDistance is ErrorList [ CreateCounter2]. EDistance/DistanceMax;
S310,CreateCounter2=CreateCounter2+1;
s311, if CreateCounter2> ErrorNum, go to S312, otherwise go to S308;
s312, establishing a neural network regression analysis model RegModel;
s313, taking a DesionInput field of a DesionTable as the input of the RegModel model, and taking a DesionDistance field of the DesionTable as the output of the RegModel model; inputting all data of decisionTable to train the RegModel;
s4, inputting data CurrentArray acquired by the optical fiber sensor signal in the cable tunnel, and predicting the invasion condition;
s401, inputting data CurrentArray acquired by an optical fiber sensor signal in a cable tunnel, wherein the CurrentArray is a floating-point array with 100 elements;
s402, predicting a temporary storage Feature variable Feature = calculating through OFeature, and inputting OFeatureInput = CurrentArray by an operator;
s403, taking Feature as an input of the RegModel and obtaining an output of the RegModel according to the prediction result variable PResult =;
s404, if PResult <0, outputting 'no intrusion condition exists' and turning to S408, otherwise, turning to S405;
s405, finally predicting the distance ResultDis = preesult × detancemax;
s406, outputting the intrusion condition, and outputting ResultDis as the intrusion position;
s407, go to S409;
S408,HArray=(CurrentArray-HArray)/( HistoryNum×10)+HArray;
s409, ending the prediction process;
when the collected data CurrentArray = [0.37, 1.68, 0.76, 0.83, 1.62, 0.16, 1.63, 1.13, 0.70, 1.48,....... 0.28, 0.28, 0.44, 0.00, 0.42, 0.25, 0.25, 0.39, 0.00, 0.41 ];
obtaining a PResult = -0.3 output of 'no intrusion condition';
when the collected data CurrentArray = [0.26, 1.30, 0.88, 0.74, 1.27, 0.49, 1.40, 1.22, 0.73, 1.29,.... 0.34, 0.54, 0.48, 0.24, 0.65, 0.28, 0.43, 0.62, 0.00, 2.98 ];
get prosult =0.834 output "intrusion present condition", output ResultDis =0.834 × 2349=1959.1 as the intrusion location.
Example 2:
the method provided by the invention is used for carrying out actual operation test on the cable tunnel in a certain area of Jilin province, the tunnel is put into use in 2016, actual operation data in 2016-2019 are verified, and compared with a traditional neural network regression model and an SVM regression model, the monitoring effect of the method provided by the invention is as follows:
Figure 744832DEST_PATH_IMAGE004
and (4) conclusion: from the above table, it can be seen that the monitoring precision of the conventional method is continuously reduced along with the passage of time, and the false alarm rate is continuously improved, the detection precision of the method of the present invention is the highest among the three methods, and the false alarm rate is also lower.

Claims (1)

1. A cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes comprises the following steps:
s1, inputting a cable tunnel optical fiber sensor signal data list HistoryList in a normal state, inputting a data list ErrorList in the case of intrusion of a cable tunnel, obtaining the number HistoryNum of HistoryList data entries, and establishing a normal state statistical array HARray; acquiring the number ErrorNum of ErrorList data entries, establishing an intrusion state statistical array EArray, and acquiring the maximum value DistanceMax of an intrusion position;
s101, inputting a cable tunnel optical fiber sensor signal data list HistoryList in a normal state, wherein the fields of the HistoryList comprise:
HSData: the data type of the normal state optical fiber sensor signal array is a floating point type array with 100 elements;
HRQ: the optical fiber sensor acquires time corresponding to the HSData data;
s102, inputting a data list errorlst of a cable tunnel intrusion condition, where fields of the errorlst include:
ESData: the data type of the signal array of the optical fiber sensor with the intrusion condition is a floating point type array with 100 elements;
EDistance: the distance between the position where the intrusion condition occurs in the tunnel and the optical fiber sensor, wherein the data type of the distance is floating point type data;
ERQ: the optical fiber sensor acquires time corresponding to the ESData data;
s103, the number of the data items of HistoryNum is equal to that of HistoryList, and the number of the data items of ErrorNum is equal to that of ErrorList; HArray is equal to a floating point type array of 100 elements; EArray is equal to a floating point type array of 100 elements; DistanceMax equals the maximum value of the EDistance field of ErrorList;
s104, setting the values of all elements of the HARRAY to be 0; setting all elements of EArray to 0; sorting the HistoryList according to the HRQ value from small to large; sorting ErrorList according to the value of ERQ from small to large;
s105, historical data counter HistoryNumCounter = 1;
S106,HArray=HArray+(HistoryList[HistoryNumCounter].HSData)×(1+ (HistoryNumCounter/HistoryNum-0.5) /100);
S107, HistoryNumCounter=HistoryNumCounter+1;
s108, if HistoryNumCount > HistoryNum, then go to S109, otherwise go to S106;
S109,HArray=HArray/HistoryNum;
s110, an intrusion condition counter ErrorNumCount = 1;
S111,EArray=EArray+(ErrorList [ErrorNumCounter].ESData);
S112,ErrorNumCounter=ErrorNumCounter+1;
s113, if the ErrorNumCount is greater than the ErrorNum, then the S114 is turned, otherwise, the S111 is turned;
S114,EArray=EArray/ErrorNum;
s2, establishing an optical fiber signal abnormal coding description operator OFeature, wherein the input variable of OFeature is OFeatureInput, the type of OFeatureInput is a floating-point array with 100 elements, the output variable of OFeature is OFeatureOutput, and OFeatureOutput is a floating-point array with 400 elements;
s201, establishing an optical fiber signal abnormal coding description operator OFeature, wherein the input variable of the OFeature is OFeatureInput, and the type of the OFeatureInput is a floating point type array with 100 elements;
s202, establishing an output variable OFeatureOutput of OFeature, wherein the type of the OFeatureOutput is a floating-point type array of 400 elements, and setting all element values of the array to be 0;
s203, the operator counter ofearturecounter = 1;
s204, if ofeactueinput [ ofeactuecounter ] > harrray [ ofeactuecounter ], ofeactueoutput [ ofeactuecounter ] = 1;
s205, if ofatutureinput [ ofatuturecounter ] > earrray [ ofatuturecounter ], then ofatutureoutput [ ofatuturecounter +100] = 1;
s206, the operator first temporary storage variable ofaturetemp 1= 0; the operator second temporary storage variable ofatuturetemp 1= 0;
s207, ofatuturetemp 1= abs (ofatutureinput [ ofatuturecounter ] -harrray [ ofatuturecounter ]), where abs is the calculated absolute value;
s208, ofatuturetemp 2= abs (ofatutureinput [ ofatuturecounter ] -earrray [ ofatuturecounter ]), where abs is the calculated absolute value;
s209, if OFeatureTemp1> OFeatureTemp2,
this ofeartureoutput [ ofearturecounter +200] = 1;
s210, if abs (ofaturetemp 1-ofaturetemp 2) >0.5, ofatureoutput [ ofaturecounter +300] =1, where abs is the calculated absolute value;
S211,OFeatureCounter=OFeatureCounter+1;
s212, go to S213 if OFeatureCounter >100, otherwise go to S204;
s213, using the OFeatureOutput as the output of the OFeature;
s3, constructing a decision information table DecisionTable by using an optical fiber signal anomaly code descriptor OFeature, and training a neural network regression analysis model RegModel by using the DecisionTable;
s301, establishing a decision information table decisionTable, wherein the field structure of the decisionTable is as follows:
DecisionInput: decision input, which is a floating-point array of 400 elements;
DecisionDistance: the distance of the intrusion condition occurs, and the data type of the distance is floating point type data;
s302, the decision counter first variable CreateCounter1= 1;
s303, calculating a decision temporary storage array variable ctemparay through ofearture, where an operator inputs ofeartureinput = HistoryList [ CreateCounter1]. HSData;
s304, newly creating 1 record in the decisionTable; in the newly added record, the value of the DecisionInput field is CTempower, and the value of the DecisionDistance is-1;
S305,CreateCounter1=CreateCounter1+1;
s306, if the CreateCounter1> HistoryNum, then go to S307, otherwise go to S303;
s307, the decision counter second variable CreateCounter2= 1;
s308, ctemaparay is calculated by ofature, operator input ofatureinput = errorlst [ CreateCounter2]. ESData;
s309, newly building 1 record in the decisionTable; in the newly added record, the value of the DecisionInput field is CTempray, and the value of the DecisionDistance is ErrorList [ CreateCounter2]. EDistance/DistanceMax;
S310,CreateCounter2=CreateCounter2+1;
s311, if CreateCounter2> ErrorNum, go to S312, otherwise go to S308;
s312, establishing a neural network regression analysis model RegModel;
s313, taking a decisionInput field of decisionTable as the input of the RegModel model, and taking a decisionDistance field of decisionTable as the output of the RegModel model; inputting all data of decisionTable to train a RegModel model;
s4, inputting data CurrentArray acquired by the optical fiber sensor signal in the cable tunnel, and predicting the invasion condition;
s401, inputting data CurrentArray acquired by optical fiber sensor signals in a cable tunnel, wherein the CurrentArray is a floating point type array with 100 elements;
s402, calculating a predicted temporary storage characteristic variable Feature through OFeature, and inputting OFeatureInput = CurrentArray by an operator;
s403, using Feature as input of the RegModel model and obtaining output of the RegModel model, and using the output of the RegModel model as a prediction result variable PResult;
s404, if PResult <0, outputting 'no intrusion condition exists' and turning to S408, otherwise, turning to S405;
s405, finally predicting the distance ResultDis = PResult × DistanceMax;
s406, outputting the intrusion condition and outputting ResultDis as the intrusion position;
s407, go to S409;
S408,HArray=(CurrentArray-HArray)/( HistoryNum×10)+HArray;
and S409, finishing the prediction process.
CN202011361609.3A 2020-11-28 2020-11-28 Cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes Active CN112363400B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011361609.3A CN112363400B (en) 2020-11-28 2020-11-28 Cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011361609.3A CN112363400B (en) 2020-11-28 2020-11-28 Cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes

Publications (2)

Publication Number Publication Date
CN112363400A CN112363400A (en) 2021-02-12
CN112363400B true CN112363400B (en) 2022-06-24

Family

ID=74535453

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011361609.3A Active CN112363400B (en) 2020-11-28 2020-11-28 Cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes

Country Status (1)

Country Link
CN (1) CN112363400B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008038289A2 (en) * 2006-09-28 2008-04-03 Soniclynx Ltd. A system and a method for detecting and classifying damage in a pipeline
CN107368463A (en) * 2017-07-11 2017-11-21 中国矿业大学 Tunnel nonlinear deformation Forecasting Methodology based on optical fiber grating sensing network data
CN107392786A (en) * 2017-07-11 2017-11-24 中国矿业大学 Mine fiber grating monitoring system missing data compensation method based on SVMs
CN110488147A (en) * 2019-07-16 2019-11-22 国网吉林省电力有限公司白城供电公司 The cable local discharge on-line monitoring method that puts into operation based on GPS clock wireless synchronization

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8620853B2 (en) * 2011-07-19 2013-12-31 Smartsignal Corporation Monitoring method using kernel regression modeling with pattern sequences

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008038289A2 (en) * 2006-09-28 2008-04-03 Soniclynx Ltd. A system and a method for detecting and classifying damage in a pipeline
CN107368463A (en) * 2017-07-11 2017-11-21 中国矿业大学 Tunnel nonlinear deformation Forecasting Methodology based on optical fiber grating sensing network data
CN107392786A (en) * 2017-07-11 2017-11-24 中国矿业大学 Mine fiber grating monitoring system missing data compensation method based on SVMs
CN110488147A (en) * 2019-07-16 2019-11-22 国网吉林省电力有限公司白城供电公司 The cable local discharge on-line monitoring method that puts into operation based on GPS clock wireless synchronization

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于神经网络的SQL注入式攻击漏洞检测问题的研究与实现;张志超;《中国优秀博硕士学位论文全文数据库(硕士) 信息科技辑》;20170315(第03期);第I139-265页全文 *

Also Published As

Publication number Publication date
CN112363400A (en) 2021-02-12

Similar Documents

Publication Publication Date Title
CN115578015B (en) Sewage treatment whole process supervision method, system and storage medium based on Internet of things
Tang et al. Traffic-incident detection-algorithm based on nonparametric regression
CN109583570A (en) The method for determining bridge health monitoring system abnormal data source based on deep learning
CN110933031A (en) Intelligent power grid power distribution terminal unit intrusion detection method based on LSTM
CN105471882A (en) Behavior characteristics-based network attack detection method and device
CN111080982A (en) Dam safety intelligent monitoring and early warning system and method based on multiple sensors
CN116614177B (en) Optical fiber state multidimensional parameter monitoring system
Otuoze et al. Electricity theft detection framework based on universal prediction algorithm
CN113763667A (en) Fire early warning and state monitoring device and method based on 5G edge calculation
CN108981785A (en) A kind of intelligent Detection of coal breaker equipment safety
CN112052732A (en) Method and device for automatically alarming cable abnormity
CN109285331B (en) Power cable temperature early warning system based on data analysis and temperature prediction
CN112363400B (en) Cable tunnel intrusion monitoring method based on optical fiber sensor signals and abnormal codes
CN111030299A (en) Side channel-based power grid embedded terminal safety monitoring method and system
CN107507400B (en) A kind of circumference monitoring protection system and method based on fusion array
CN108761250A (en) A kind of intrusion detection method based on industrial control equipment voltage and current
CN115914267A (en) Basin water ecological safety monitoring and early warning system
CN212112218U (en) Wisdom sewage plant station remote supervision and operation evaluation system based on thing networking
CN204988517U (en) Temperature remote monitoring system
Chun et al. An application of data fusion technology in structural health monitoring and damage identification
CN116935598B (en) Monitoring method and system based on intelligent power distribution of building
CN112504435B (en) High-voltage circuit breaker base screw loosening fault detection method
CN112904816B (en) Intelligent environment-friendly real-time monitoring method
CN220434942U (en) Panoramic fault diagnosis system for wind turbine generator
CN113762913B (en) User account real-time monitoring method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220609

Address after: No. 395, KUANPING Road, Chaoyang District, Changchun City, Jilin Province

Applicant after: CHANGCHUN INSTITUTE OF TECHNOLOGY

Applicant after: Baicheng power supply company of State Grid Jilin Electric Power Co., Ltd

Address before: No. 395, KUANPING Road, Chaoyang District, Changchun City, Jilin Province

Applicant before: CHANGCHUN INSTITUTE OF TECHNOLOGY

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant