CN112686773A - Method for constructing power metering full-link key service abnormity positioning model based on fusion service topology - Google Patents

Method for constructing power metering full-link key service abnormity positioning model based on fusion service topology Download PDF

Info

Publication number
CN112686773A
CN112686773A CN202011494859.4A CN202011494859A CN112686773A CN 112686773 A CN112686773 A CN 112686773A CN 202011494859 A CN202011494859 A CN 202011494859A CN 112686773 A CN112686773 A CN 112686773A
Authority
CN
China
Prior art keywords
link
abnormal
full
service
metering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011494859.4A
Other languages
Chinese (zh)
Other versions
CN112686773B (en
Inventor
余飞娅
吴才远
安江
徐宏伟
谭池
叶文波
代湘蓉
唐贤敏
常强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Power Grid Co Ltd
Original Assignee
Guizhou Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Power Grid Co Ltd filed Critical Guizhou Power Grid Co Ltd
Priority to CN202011494859.4A priority Critical patent/CN112686773B/en
Priority claimed from CN202011494859.4A external-priority patent/CN112686773B/en
Publication of CN112686773A publication Critical patent/CN112686773A/en
Application granted granted Critical
Publication of CN112686773B publication Critical patent/CN112686773B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P80/00Climate change mitigation technologies for sector-wide applications
    • Y02P80/10Efficient use of energy, e.g. using compressed air or pressurized fluid as energy carrier

Abstract

The invention relates to a method for constructing an electric power measurement full-link key service abnormity positioning model based on fusion service topology, belonging to the technical field of abnormity management. The method comprises the following steps: s1: preprocessing all-link abnormal information; s2: analyzing the abnormal weight of the whole link; s3: and solidifying the full link abnormal positioning rule. According to the method, abnormal data in key services of the metering link are adopted, preprocessing such as topology dimension reduction and abnormal digitization is carried out on the metering service link, a link with a large weight area is excavated by introducing an abnormal weight analysis algorithm of the metering link, root cause positioning is carried out on the abnormality on the link, finally, a positioning result and rules are solidified, and a set of metering full-link key service abnormality positioning model is constructed, so that an electric power company can be effectively assisted to find the root cause abnormality on the metering service link more accurately, the abnormality on the metering service link is efficiently checked and solved, and stable operation of a power grid is guaranteed.

Description

Method for constructing power metering full-link key service abnormity positioning model based on fusion service topology
Technical Field
The invention belongs to the technical field of power metering management, and particularly relates to a power metering full-link key service abnormity positioning model construction method based on fusion service topology.
Background
In a power grid system, a large amount of exceptions are generated on a metering service link, one of the exceptions is large, and all links such as network communication, data loading, terminal data acquisition and the like generate exceptions; continuity, the abnormity of the system is alarmed by taking time as a sequence; thirdly, relevance is obtained, all the exceptions on the whole link of the metering master station are generated on the nodes buckled with the ring, and data flow and calling instructions generated by the exceptions are related to the topological relation of the link. However, the abnormal items need to be positioned and solved, and a method for finding a root source from link logic is lacked for processing the abnormal items, so that the problems of large operation and maintenance workload, low efficiency and the like are caused. Therefore, a set of measurement full-link key service abnormity positioning model is urgently needed based on an abnormity weight area algorithm by combining abnormal data in measurement services.
Disclosure of Invention
In view of the above, the present invention provides a method for constructing an anomaly location model of a power metering full-link key service based on a converged service topology, which can overcome the problems in the prior art by constructing a set of anomaly location model of the metering full-link key service.
The purpose of the invention is realized by the following technical scheme:
the method for constructing the power metering full-link key service abnormity positioning model based on the fusion service topology comprises the following steps:
step S1: preprocessing all-link abnormal information;
step S2: constructing a full link abnormal weight analysis;
step S3: and solidifying the full link abnormal positioning rule.
Specifically, in step S1, the full link exception information preprocessing includes: constructing a metering full-link key service topological graph, reducing the dimension of the metering full-link key service topology, acquiring abnormal items of the metering full-link key service, filtering noise abnormality and cutting a time sequence, and finally standardizing an abnormal link for positioning a root cause.
Specifically, the step S2 is specifically: and performing full link abnormal weight analysis by taking four core dimension reduction links as an example by combining the key service abnormal items of the metering full link.
Specifically, the step S3 is specifically:
repeatedly carrying out weight area calculation on the abnormity on the link through historical data, placing the abnormity on the link with high priority to find the source abnormity on the link, and reserving a full-link path;
and comparing and verifying the root source abnormal result with an abnormal investigation result in daily operation and maintenance, and solidifying the matched abnormal positioning rule into a rule base.
Particularly, the drawing and metering full-link key service topological graph is based on two types of key service topological graphs of issuing of drawing instructions and task acquisition through researching and combing operation and maintenance manuals and front design description.
Particularly, the measurement full-link key service topology dimension reduction is divided into 4 core links of main acquisition task instruction issuing, main acquisition task information acquisition, complementary acquisition task instruction issuing and complementary acquisition task information acquisition.
In particular, the metering full link key service abnormal item comprises a full link state evaluation abnormal value and an operation and maintenance log abnormal item.
Specifically, the full link anomaly weight analysis is performed by the following steps:
step S21: abnormal link digital processing: and combining the abnormal chain of the service information and the time information, abstracting the abnormal chain after the sequence adjustment, deleting redundant service information and time information, using 1 to represent an abnormal node, and using 0 to represent a non-abnormal node to obtain an abstracted 01 abnormal chain.
Step S22: the special multiplying power assignment further improves the calculation accuracy of the abnormal link by adding weight. The key business of the full link is analyzed and measured and needs three abnormal weight algorithms of special chains to be adjusted;
step S23: the abnormal link weight area algorithm calculates the abnormal link association degree through the abnormal quantity and the abnormal density degree on the link links, and provides reference for abnormal positioning;
step S24: calculating the weight area of the abnormal link: evaluating, calculating and displaying abnormal items of the log records on links corresponding to the links, digitizing abnormal information into standard chains represented by 0 and 1 through a timestamp, and obtaining the area of each chain through a weight area algorithm so as to represent the abnormal priority of different chains and achieve the purpose of assisting in troubleshooting of operation and maintenance abnormity;
step S25: and (3) metering all-link root source exception positioning: and setting the priority of the link, and determining the root cause exception according to the time stamp sequence in the priority range.
Specifically, in step S22, the specific rule is as follows:
the full chain only has a single-node abnormal chain of a single abnormal node: multiplying factor c is 1+ abnormal node sequence/total node number;
there is a single anomalous dense segment and an anomalous chain is placed after the last of the chains: multiplying factor c by the overall abnormal weight by 10 times;
all exception chains in which all nodes of the whole chain are exception: the multiplier c is 10 times of the overall abnormal weight.
Specifically, in step S24, the specific steps of calculating the link abnormal association degree are as follows:
step S231: expressing the number of the abnormal nodes by width, and if the number N of the abnormal nodes of the link is 1, the width a is 1; if the number of the abnormal nodes of the link is more than 1, the width a is max (the number of the connected abnormal nodes);
step S232: the anomaly densities are expressed in length: if the number of the abnormal nodes of the link is equal to 1, the length b is equal to 1+ the serial number of the link where the alarm node is located/the total number of the nodes of the link, and if the number of the abnormal nodes of the link is greater than 1, the length b is equal to 1
Figure BDA0002841828190000031
Step S233: calculating the weight area of the abnormal link by using the following formula of the weight area of the abnormal link:
S=a*b*100*c。
the invention has the beneficial effects that:
the method can construct a set of power metering full-link key service abnormity positioning model based on fusion service topology based on metering link abnormity data. In the practical process, the abnormal information on the link is preprocessed, the abnormal relevance of the abnormal link is quantitatively calculated by using a weight area algorithm, the root cause abnormality is positioned by sequencing the priority of the abnormal relevance of the link, and finally the key business abnormality positioning method of the whole metering link is determined by rule solidification, so that an electric power company is assisted to more accurately find the root cause abnormality on the metering link, the abnormal troubleshooting and processing efficiency of daily operation and maintenance work is improved, and the stable operation of a power grid is guaranteed.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the present invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail with reference to the accompanying drawings, in which:
FIG. 1 is a flow chart of the construction of the present invention;
FIG. 2 is a schematic diagram of a full link critical service topology;
FIG. 3 is a schematic view of measuring the dimensionality reduction of a full-link key service topology;
FIG. 4 is a schematic diagram illustrating measurement of a full link key service abnormal item;
FIG. 5 is a diagram illustrating exception link digitization processing;
FIG. 6 is a comparison table of link positioning accuracy for the examples;
FIG. 7 is an interface display diagram of an example of anomaly location.
Detailed Description
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be understood that the preferred embodiments are illustrative of the invention only and are not limiting upon the scope of the invention.
As shown in fig. 1, the method for constructing an electric power metering full-link key service anomaly positioning model based on fusion service topology of the present invention includes the following steps:
step S1: preprocessing all-link abnormal information;
the preprocessing of the full link exception information comprises the following steps: constructing a metering full-link key service topological graph, reducing the dimension of the metering full-link key service topology, acquiring abnormal items of the metering full-link key service, filtering noise abnormality and cutting a time sequence, and finally standardizing an abnormal link for positioning a root cause.
In this embodiment, as shown in fig. 2, drawing a metering full-link key service topological graph is based on two types of key service topological graphs, namely, drawing instruction issuing and task acquisition through a research, carding, operation and maintenance manual and a pre-set design description;
as shown in fig. 3, the measurement of the full-link key service topology dimension reduction is divided into 4 core links, namely, main acquisition task instruction issuing, main acquisition task information acquisition, complementary acquisition task instruction issuing and complementary acquisition task information acquisition;
the measurement of the abnormal items of the full link key service includes the steps of evaluating abnormal values of the full link state and abnormal items of the operation and maintenance log, removing noise abnormality and cutting the abnormal items according to the time sequence to obtain the abnormal items focused by abnormal positioning, as shown in fig. 4.
Step S2: constructing a full link abnormal weight analysis; the method specifically comprises the following steps:
and performing full link abnormal weight analysis by taking four core dimension reduction links as an example by combining the key service abnormal items of the metering full link.
In this embodiment, the analysis of the full link abnormal weight is performed by the following steps:
step S21: abnormal link digital processing: and combining the abnormal chain of the service information and the time information, abstracting the abnormal chain after the sequence adjustment, deleting redundant service information and time information, using 1 to represent an abnormal node, and using 0 to represent a non-abnormal node to obtain an abstracted 01 abnormal chain. As shown in particular in fig. 5.
Step S22: the special multiplying power assignment further improves the calculation accuracy of the abnormal link by adding weight. The key business of the full link is analyzed and measured and needs three abnormal weight algorithms of special chains to be adjusted;
step S23: the abnormal link weight area algorithm calculates the abnormal link association degree through the abnormal quantity and the abnormal density degree on the link links, and provides reference for abnormal positioning;
step S24: calculating the weight area of the abnormal link: evaluating, calculating and displaying abnormal items of the log records on links corresponding to the links, digitizing abnormal information into standard chains represented by 0 and 1 through a timestamp, and obtaining the area of each chain through a weight area algorithm so as to represent the abnormal priority of different chains and achieve the purpose of assisting in troubleshooting of operation and maintenance abnormity;
step S25: and (3) metering all-link root source exception positioning: and setting the priority of the link, and determining the root cause exception according to the time stamp sequence in the priority range.
In step S22, the specific rule is as follows:
(1) the full chain only has a single-node abnormal chain of a single abnormal node: multiplying factor c is 1+ abnormal node sequence/total node number;
(2) there is a single anomalous dense segment and an anomalous chain is placed after the last of the chains: multiplying factor c by the overall abnormal weight by 10 times;
(3) all exception chains in which all nodes of the whole chain are exception: the multiplier c is 10 times of the overall abnormal weight.
In step S23, the specific steps of calculating the link abnormal association degree are as follows:
the specific steps for calculating the link abnormal association degree are as follows:
step S231: expressing the number of the abnormal nodes by width, and if the number N of the abnormal nodes of the link is 1, the width a is 1; if the number of the abnormal nodes of the link is more than 1, the width a is max (the number of the connected abnormal nodes);
step S232: the anomaly densities are expressed in length: if the number of the abnormal nodes of the link is equal to 1, the length b is equal to 1+ the serial number of the link where the alarm node is located/the total number of the nodes of the link, and if the number of the abnormal nodes of the link is greater than 1, the length b is equal to 1
Figure BDA0002841828190000051
Step S233: calculating the weight area of the abnormal link by using the following formula of the weight area of the abnormal link:
S=a*b*100*c。
step S3: and solidifying the full link abnormal positioning rule. The method specifically comprises the following steps:
firstly, repeatedly carrying out weight area calculation on the abnormity on the link through historical data, locating the abnormity on the link with high priority to find the source abnormity on the link, and reserving a full-link path;
and comparing and verifying the root source abnormal result with an abnormal investigation result in daily operation and maintenance, and solidifying the matched abnormal positioning rule into a rule base.
In the example, through historical abnormal data and an operation and maintenance investigation log, 5.32 million pieces of data from 10 days at 4 months in 2020 to 24 days at 4 months in 2020 are selected as a training sample set, and an error report with a higher importance degree in a 15-day 5-class link is selected as abnormal information, which includes: the method comprises the steps of generating failure error reporting of a task generating link, communication delay error reporting of a preposed service link, low state evaluation of a task scheduling link and abnormal error reporting of a group protocol link. Selecting abnormal information within 10 minutes before and after the abnormal information, acquiring the abnormal information once every 2 minutes, and finally analyzing the link with the abnormal association degree priority set as 3 before ranking, wherein the ratio of the link covering the root source abnormality exceeds 50%, the positioning accuracy of 5 types of key abnormalities is higher than 75%, and the accuracy and the effectiveness of the power measurement full-link key business abnormality positioning rule provided by the method are verified, as shown in fig. 6.
In the example of abnormal positioning, the positioning information is visually displayed, the positioning node and the link information are displayed, and the operation and maintenance personnel are helped to investigate the root cause of the abnormality, wherein an interface is shown in fig. 7.
It should be recognized that embodiments of the present invention can be realized and implemented by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer-readable storage medium configured with the computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner, according to the methods and figures described in the detailed description. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, the operations of processes described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described herein (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
Further, the method may be implemented in any type of computing platform operatively connected to a suitable interface, including but not limited to a personal computer, mini computer, mainframe, workstation, networked or distributed computing environment, separate or integrated computer platform, or in communication with a charged particle tool or other imaging device, and the like. Aspects of the invention may be embodied in machine-readable code stored on a non-transitory storage medium or device, whether removable or integrated into a computing platform, such as a hard disk, optically read and/or write storage medium, RAM, ROM, or the like, such that it may be read by a programmable computer, which when read by the storage medium or device, is operative to configure and operate the computer to perform the procedures described herein. Further, the machine-readable code, or portions thereof, may be transmitted over a wired or wireless network. The invention described herein includes these and other different types of non-transitory computer-readable storage media when such media include instructions or programs that implement the steps described above in conjunction with a microprocessor or other data processor. The invention also includes the computer itself when programmed according to the methods and techniques described herein.
A computer program can be applied to input data to perform the functions described herein to transform the input data to generate output data that is stored to non-volatile memory. The output information may also be applied to one or more output devices, such as a display. In a preferred embodiment of the invention, the transformed data represents physical and tangible objects, including particular visual depictions of physical and tangible objects produced on a display.
Finally, the above embodiments are only intended to illustrate the technical solutions of the present invention and not to limit the present invention, and although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions, and all of them should be covered by the claims of the present invention.

Claims (10)

1. A method for constructing a power metering full-link key service abnormity positioning model based on fusion service topology is characterized by comprising the following steps: the method comprises the following steps:
step S1: preprocessing all-link abnormal information;
step S2: constructing a full link abnormal weight analysis;
step S3: and solidifying the full link abnormal positioning rule.
2. The method for constructing the power metering full-link key service abnormity positioning model based on the converged service topology according to claim 1, is characterized in that: in step S1, the preprocessing of the full link exception information includes: constructing a metering full-link key service topological graph, reducing the dimension of the metering full-link key service topology, acquiring abnormal items of the metering full-link key service, filtering noise abnormality and cutting a time sequence, and finally standardizing an abnormal link for positioning a root cause.
3. The method for constructing the power metering full-link key service abnormity positioning model based on the converged service topology according to claim 1, is characterized in that: the step S2 specifically includes: and performing full link abnormal weight analysis by taking four core dimension reduction links as an example by combining the key service abnormal items of the metering full link.
4. The method for constructing the power metering full-link key service abnormity positioning model based on the converged service topology according to claim 1, is characterized in that: the step S3 specifically includes:
repeatedly carrying out weight area calculation on the abnormity on the link through historical data, placing the abnormity on the link with high priority to find the source abnormity on the link, and reserving a full-link path;
and comparing and verifying the root source abnormal result with an abnormal investigation result in daily operation and maintenance, and solidifying the matched abnormal positioning rule into a rule base.
5. The method for constructing the power metering full-link key service abnormity positioning model based on the converged service topology according to claim 2, is characterized in that: the drawing and metering full-link key service topological graph is based on two types of key service topological graphs of research, carding, operation and maintenance manuals and front design description drawing instruction issuing and task acquisition.
6. The method for constructing the power metering full-link key service abnormity positioning model based on the converged service topology according to claim 2, is characterized in that: the measurement full-link key service topology dimensionality reduction is divided into 4 core links of main acquisition task instruction issuing, main acquisition task information acquisition, complementary acquisition task instruction issuing and complementary acquisition task information acquisition.
7. The method for constructing the power metering full-link key service abnormity positioning model based on the converged service topology according to claim 2, is characterized in that: the metering full link key service abnormal item comprises a full link state evaluation abnormal value and an operation and maintenance log abnormal item.
8. The method for constructing the power metering full-link key service abnormity positioning model based on the converged service topology according to claim 3, wherein the method comprises the following steps: the analysis of the full link abnormal weight is carried out by adopting the following steps:
step S21: abnormal link digital processing: combining the abnormal chain of the service information and the time information, abstracting the abnormal chain after the sequence adjustment, deleting redundant service information and time information, using 1 to represent an abnormal node, and using 0 to represent a non-abnormal node to obtain an abstracted 01 abnormal chain;
step S22: the special multiplying power assignment further improves the calculation accuracy of the abnormal link by adding weight. The key business of the full link is analyzed and measured and needs three abnormal weight algorithms of special chains to be adjusted;
step S23: calculating the link abnormal association degree by the abnormal link weight area algorithm according to the abnormal quantity and the abnormal density degree of the link links, and providing reference for abnormal positioning;
step S24: calculating the weight area of the abnormal link: evaluating, calculating and displaying abnormal items of the log records on links corresponding to the links, digitizing abnormal information into standard chains represented by 0 and 1 through a timestamp, and obtaining the area of each chain through a weight area algorithm so as to represent the abnormal priority of different chains and achieve the purpose of assisting in troubleshooting of operation and maintenance abnormity;
step S25: and (3) metering all-link root source exception positioning: and setting the priority of the link, and determining the root cause exception according to the time stamp sequence in the priority range.
9. The method for constructing the power metering full-link key service anomaly positioning model based on the converged service topology according to claim 8, wherein the method comprises the following steps: in step S22, the specific rule is as follows:
the full chain only has a single-node abnormal chain of a single abnormal node: multiplying factor c is 1+ abnormal node sequence/total node number;
there is a single anomalous dense segment and an anomalous chain is placed after the last of the chains: multiplying factor c by the overall abnormal weight by 10 times;
all exception chains in which all nodes of the whole chain are exception: the multiplier c is 10 times of the overall abnormal weight.
10. The method for constructing the power metering full-link key service anomaly positioning model based on the converged service topology according to claim 8, wherein the method comprises the following steps: in step S23, the specific steps of calculating the link abnormal association degree are as follows:
step S231: expressing the number of the abnormal nodes by width, and if the number N of the abnormal nodes of the link is 1, the width a is 1; if the number of the abnormal nodes of the link is more than 1, the width a is max (the number of the connected abnormal nodes);
step S232: the anomaly densities are expressed in length: if the number of the abnormal nodes of the link is equal to 1, the length b is equal to 1+ the serial number of the link where the alarm node is located/the total number of the nodes of the link, and if the number of the abnormal nodes of the link is greater than 1, the length b is equal to 1
Figure FDA0002841828180000021
Step S233: calculating the weight area of the abnormal link by using the following formula of the weight area of the abnormal link:
S=a*b*100*c。
CN202011494859.4A 2020-12-17 Electric power metering all-link key business anomaly positioning model construction method based on fusion business topology Active CN112686773B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011494859.4A CN112686773B (en) 2020-12-17 Electric power metering all-link key business anomaly positioning model construction method based on fusion business topology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011494859.4A CN112686773B (en) 2020-12-17 Electric power metering all-link key business anomaly positioning model construction method based on fusion business topology

Publications (2)

Publication Number Publication Date
CN112686773A true CN112686773A (en) 2021-04-20
CN112686773B CN112686773B (en) 2024-05-14

Family

ID=

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114117311A (en) * 2022-01-25 2022-03-01 深圳红途科技有限公司 Data access risk detection method and device, computer equipment and storage medium
CN114492877A (en) * 2022-04-13 2022-05-13 北京蒙帕信创科技有限公司 Operation and maintenance analysis method and device of business system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254137A (en) * 2016-08-30 2016-12-21 广州汇通国信信息科技有限公司 The alarm root-cause analysis system and method for supervisory systems
CN109739715A (en) * 2019-01-22 2019-05-10 京东方科技集团股份有限公司 A kind of fault detection method and device
CN111209178A (en) * 2020-01-13 2020-05-29 中信银行股份有限公司 Full link bottleneck testing method and system
CN111756582A (en) * 2020-07-07 2020-10-09 上海新炬网络技术有限公司 Service chain monitoring method based on NFV log alarm
CN111988176A (en) * 2020-08-20 2020-11-24 国网湖北省电力有限公司信息通信公司 Fault positioning system visualization method based on simulation topological structure
CN112019932A (en) * 2020-08-27 2020-12-01 广州华多网络科技有限公司 Network fault root cause positioning method and device, computer equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254137A (en) * 2016-08-30 2016-12-21 广州汇通国信信息科技有限公司 The alarm root-cause analysis system and method for supervisory systems
CN109739715A (en) * 2019-01-22 2019-05-10 京东方科技集团股份有限公司 A kind of fault detection method and device
CN111209178A (en) * 2020-01-13 2020-05-29 中信银行股份有限公司 Full link bottleneck testing method and system
CN111756582A (en) * 2020-07-07 2020-10-09 上海新炬网络技术有限公司 Service chain monitoring method based on NFV log alarm
CN111988176A (en) * 2020-08-20 2020-11-24 国网湖北省电力有限公司信息通信公司 Fault positioning system visualization method based on simulation topological structure
CN112019932A (en) * 2020-08-27 2020-12-01 广州华多网络科技有限公司 Network fault root cause positioning method and device, computer equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
付卿卿,余飞娅: "电能计量系统技术发展及建议", 电子信息, pages 85 *
李正光;钱锋强;刘艾旺;龚书能;邹健;: "基于多维特征量融合的配电网拓扑异常溯源与应用模型研究", 浙江电力, no. 07, pages 71 - 79 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114117311A (en) * 2022-01-25 2022-03-01 深圳红途科技有限公司 Data access risk detection method and device, computer equipment and storage medium
CN114117311B (en) * 2022-01-25 2022-04-19 深圳红途科技有限公司 Data access risk detection method and device, computer equipment and storage medium
CN114492877A (en) * 2022-04-13 2022-05-13 北京蒙帕信创科技有限公司 Operation and maintenance analysis method and device of business system

Similar Documents

Publication Publication Date Title
CA2491630C (en) System and method for automating generation of an automated sensor network
US7467067B2 (en) Self-learning integrity management system and related methods
CN112395170A (en) Intelligent fault analysis method, device, equipment and storage medium
Rodrigues et al. Modeling and verification for probabilistic properties in software product lines
CN107066500B (en) Power grid mass data quality verification method based on PMS model
CN111045894A (en) Database anomaly detection method and device, computer equipment and storage medium
CN108694448A (en) PHM platforms
US7617313B1 (en) Metric transport and database load
CN113435703A (en) Wind turbine generator system fault analysis system based on SCADA data modeling
CN116187552A (en) Abnormality detection method, computing device, and computer storage medium
Ardito et al. Methodological guidelines for measuring energy consumption of software applications
CN115965237A (en) Electric power market risk prevention and control method, device and storage medium
Mao et al. A visual model-based evaluation framework of cloud-based prognostics and health management
CN117422434A (en) Wisdom fortune dimension dispatch platform
CN111737233A (en) Data monitoring method and device
CN112686773A (en) Method for constructing power metering full-link key service abnormity positioning model based on fusion service topology
CN112686773B (en) Electric power metering all-link key business anomaly positioning model construction method based on fusion business topology
CN114757482A (en) Method, system, device and medium for analyzing electric quantity use trend of user group
US10515316B2 (en) System and method for using data obtained from a group of geographically dispersed magnetic resonance systems to optimize customer-specific clinical, operational and/or financial performance
CN115310923A (en) Energy management service system and method
CN103530730A (en) Supervised object creating and management modeling method of corruption punishment and prevention system
CN112416896A (en) Data abnormity warning method and device, storage medium and electronic device
Chren Towards multi-layered reliability analysis in smart grids
Karanth et al. Workaround prediction of cloud alarms using machine learning
CN117311295B (en) Production quality improving method and system based on wireless network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant