CN113094417A - Evaluation method and device for nuclear power plant, terminal equipment and readable storage medium - Google Patents

Evaluation method and device for nuclear power plant, terminal equipment and readable storage medium Download PDF

Info

Publication number
CN113094417A
CN113094417A CN202110259025.3A CN202110259025A CN113094417A CN 113094417 A CN113094417 A CN 113094417A CN 202110259025 A CN202110259025 A CN 202110259025A CN 113094417 A CN113094417 A CN 113094417A
Authority
CN
China
Prior art keywords
target
tool
risk evaluation
plan
evaluation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110259025.3A
Other languages
Chinese (zh)
Inventor
李敏
陈培锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China General Nuclear Power Corp
CGN Power Co Ltd
Guangdong Nuclear Power Joint Venture Co Ltd
Suzhou Nuclear Power Research Institute Co Ltd
Original Assignee
China General Nuclear Power Corp
CGN Power Co Ltd
Guangdong Nuclear Power Joint Venture Co Ltd
Suzhou Nuclear Power Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China General Nuclear Power Corp, CGN Power Co Ltd, Guangdong Nuclear Power Joint Venture Co Ltd, Suzhou Nuclear Power Research Institute Co Ltd filed Critical China General Nuclear Power Corp
Priority to CN202110259025.3A priority Critical patent/CN113094417A/en
Publication of CN113094417A publication Critical patent/CN113094417A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/254Extract, transform and load [ETL] procedures, e.g. ETL data flows in data warehouses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Game Theory and Decision Science (AREA)
  • Databases & Information Systems (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application is applicable to the technical field of industrial safety of nuclear power plants, and provides an evaluation method, an evaluation device, terminal equipment and a readable storage medium for the nuclear power plants, wherein the method comprises the following steps: a plan making tool obtains a target maintenance plan; and the plan making tool sends the target maintenance plan to a risk evaluation tool through a first data interface so as to instruct the risk evaluation tool to carry out risk evaluation on the target maintenance plan and obtain a target evaluation result. The method and the device can solve the problems that the existing risk evaluation method of the nuclear power plant is troublesome and easy to make mistakes, and the efficiency is low to a certain extent.

Description

Evaluation method and device for nuclear power plant, terminal equipment and readable storage medium
Technical Field
The application belongs to the technical field of industrial safety of nuclear power plants, and particularly relates to an evaluation method and device of a nuclear power plant, terminal equipment and a readable storage medium.
Background
The development of human society is not energy-saving. At present, petroleum energy is mainly used by human beings. However, with the rapid development of society, the consumption rate of energy is faster and faster, so that the total yield of petroleum energy reaches the peak. And the combustion of petroleum energy can generate greenhouse gases, which can affect the environment. Therefore, in recent years, each country advocates the development of clean and efficient new energy. Among the numerous new energy sources, nuclear energy is widely used.
However, nuclear fuel is radioactive. Therefore, safety evaluations must be performed for various activities of the nuclear power plant. For example, before a maintenance activity is performed at a nuclear power plant, a risk assessment of the maintenance activity is performed.
At present, the risk evaluation method for maintenance activities mainly comprises the following steps: the staff member first makes a maintenance plan in the software (for example, the software P3E or P6), then stores the maintenance plan, and finally, the staff member manually introduces the maintenance plan into a risk monitor based on Probabilistic Safety Assessment (PSA) for risk Assessment.
The staff is troublesome to import the maintenance plan into the risk monitor manually, and mistakes are easy to make during manual import, and the efficiency is low.
Therefore, the conventional risk evaluation method for the nuclear power plant is troublesome, is easy to make mistakes and has low efficiency.
Disclosure of Invention
The embodiment of the application provides an evaluation method and device for a nuclear power plant, terminal equipment and a readable storage medium, and can solve the problems of troublesome risk evaluation method, high error possibility and low efficiency of the conventional nuclear power plant to a certain extent.
In a first aspect, an embodiment of the present application provides an evaluation method for a nuclear power plant, including:
a plan making tool obtains a target maintenance plan;
and the plan making tool sends the target maintenance plan to a risk evaluation tool through a first data interface so as to instruct the risk evaluation tool to carry out risk evaluation on the target maintenance plan and obtain a target evaluation result.
In a possible implementation manner of the first aspect, the evaluation method further includes:
the target tool determines target unavailable information according to original information of a target maintenance activity, wherein the target maintenance activity is a maintenance activity included in the target maintenance plan;
correspondingly, the planning tool obtains a target maintenance plan, and includes:
the plan making tool acquires target unavailable information through a second data interface and receives a target maintenance plan made by a user according to the target unavailable information.
In another possible implementation manner of the first aspect, the target tool includes an identification sub-tool and a management sub-tool;
correspondingly, the target tool obtains target unavailable information according to the original information of the target maintenance activity, and the method comprises the following steps:
the identification sub-tool obtains original information of the target maintenance activities and searches target identification codes corresponding to the original information;
if the target identification code exists, the identifying sub-tool searches for target unavailable information corresponding to the target identification code, and sends the target unavailable information to the managing sub-tool through a third data interface;
the management sub-tool sends the target unavailable information to the planning tool through the second data interface.
In another possible implementation manner of the first aspect, after the obtaining, by the identifier tool, original information of the target maintenance activity and searching for a target identification code corresponding to the original information, the method further includes:
if the target identification code exists, the identification sub-tool sends the target identification code to the management sub-tool through a third data interface;
the management sub-tool searches for target unavailable information corresponding to the target identification code and sends the target unavailable information to the plan making tool through the second data interface.
In another possible implementation manner of the first aspect, the evaluation method further includes:
if the target identification code does not exist, the identification sub-tool analyzes the original information to obtain the target unavailable information;
and the identification sub-tool stores the target unavailable information and the target identification code in an associated manner, and sends the target unavailable information to the management sub-tool through a third data interface.
In another possible implementation manner of the first aspect, the target evaluation result includes prompt information, and the prompt information is used to instruct a user to adjust the target maintenance plan.
In another possible implementation manner of the first aspect, the risk evaluation tool performs risk evaluation on the target maintenance plan to obtain a target evaluation result, and the method includes:
the risk evaluation tool determines a target basic event, wherein the target basic event is a basic event corresponding to target unavailable information in the target maintenance plan;
the risk evaluation tool searches an original minimum cut set corresponding to the target basic event, and removes the target basic event from the original minimum cut set to obtain a first target minimum cut set;
the risk evaluation tool absorbs and/or merges the minimum cut sets in the first target minimum cut set to obtain a second target minimum cut set;
and the risk evaluation tool carries out risk evaluation on the target maintenance plan according to the second target minimum cut set to obtain a target evaluation result.
In a second aspect, an embodiment of the present application provides an evaluation apparatus for a nuclear power plant, including:
a plan making tool for obtaining a target maintenance plan;
the plan making tool is further configured to send the target maintenance plan to a risk evaluation tool through a first data interface, so as to instruct the risk evaluation tool to perform risk evaluation on the target maintenance plan, and obtain a target evaluation result.
In a third aspect, an embodiment of the present application provides a terminal device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the method according to the first aspect when executing the computer program.
In a fourth aspect, the present application provides a computer readable storage medium, which stores a computer program, and the computer program, when executed by a processor, implements the steps of the method as described in the first aspect.
In a fifth aspect, the present application provides a computer program product, which when run on a terminal device, causes the terminal device to execute the evaluation method of any one of the first aspects.
It is understood that the beneficial effects of the second aspect to the fifth aspect can be referred to the related description of the first aspect, and are not described herein again.
Compared with the prior art, the embodiment of the application has the advantages that:
the application provides an evaluation method of a nuclear power plant. And then the plan making tool sends the target maintenance plan to a risk evaluation tool through a first data interface so as to instruct the risk evaluation tool to carry out risk evaluation on the target maintenance plan and obtain a target evaluation result. In this application promptly, the plan making tool can send the target maintenance plan to the risk evaluation tool through first data interface automatically, need not during staff's manual leading-in to the risk evaluation tool with the target maintenance plan, and is simple and convenient, has eliminated the data interaction obstacle of plan making tool and risk evaluation tool. And because manual introduction is not needed, errors caused by manual introduction are reduced, and the risk evaluation efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed for the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without inventive work.
FIG. 1 is a schematic flow chart of a method for evaluating a nuclear power plant provided by an embodiment of the present application;
FIG. 2 is a schematic diagram of a targeting tool, a second data interface, and a planning tool provided in an embodiment of the present application;
FIG. 3 is a schematic diagram of a target tool, an identification sub-tool, an administration sub-tool, a third data interface, a second data interface, and a planning tool provided by an embodiment of the present application;
FIG. 4 is a schematic diagram of a planning tool, a first data interface, and a risk assessment tool provided in an embodiment of the present application;
FIG. 5 is a diagram of an original minimal cut set and a first target minimal cut set provided by an embodiment of the present application;
FIG. 6 is a diagram of an original minimal cut set and a first target minimal cut set provided by another embodiment of the present application;
FIG. 7 is a schematic diagram of an evaluation device of a nuclear power plant according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in the specification of the present application and the appended claims, the term "if" may be interpreted contextually as "when. Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments," unless otherwise expressly specified. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
The evaluation method of the nuclear power plant provided by the embodiment of the application can be applied to terminal devices such as a mobile phone, a tablet computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), and the like, and the specific type of the terminal device is not limited in any way in the embodiment of the application.
In order to explain the technical solution described in the present application, the following description will be given by way of specific examples.
Example one
Referring to fig. 1, a method for evaluating a nuclear power plant according to an embodiment of the present disclosure is described below, where the method includes:
and S101, acquiring a target maintenance plan by a plan making tool.
In step S101, the target maintenance plan is a plan made by the user based on the maintenance activities. And (4) making a target maintenance plan in the plan making tool by the user, and obtaining the target maintenance plan by the plan making tool after the making is completed. The target repair plan may include a name of the target repair activity, a description of the target repair activity, a start-stop time of the target repair activity, and target unavailable information. It should be appreciated that at least one repair activity may be included in the target repair plan. For the number of the maintenance activities included in the target maintenance plan, the user may select the number according to the actual situation, which is not limited herein.
In some embodiments, the method further comprises: the target tool determines target unavailable information according to the original information of the target maintenance activities, wherein the target maintenance activities are maintenance activities included in the target maintenance plan; accordingly, the planning tool obtains a target maintenance plan, including: and the planning tool acquires the target unavailable information through the second data interface and receives a target maintenance plan which is planned by the user according to the target unavailable information.
In the related art, target unavailable information caused by target maintenance activities is generally identified by professionals, and then manually introduced into a planning tool and a risk assessment tool by the professionals. The process needs manual identification and manual leading-in, has multiple steps, needs professional personnel to complete, and can not be completed by common power plant workers.
Thus, in this embodiment, the target unavailable information is determined from the raw information of the target repair activity using the target tool. The planning tool then retrieves the target unavailable information via the second data interface (as shown in FIG. 2). And finally, the user formulates a target maintenance plan according to the target unavailable information.
The original information of the target maintenance activity includes the name of the target maintenance activity, the description of the target maintenance activity, and the like. The target unavailable information refers to Structure System and Component (SSC) unavailable information caused by target repair activities.
In this embodiment, the target tool can automatically determine the unavailable information of the target, and then the planning tool acquires the unavailable information of the target through the second data interface, so that the professional is not required to determine the unavailable information of the target, the professional is not required to guide the planning tool and the risk evaluation tool, simplicity and convenience are realized, and common power plant workers can also finish the operation.
In some possible implementations, the target tools include an identification sub-tool and a management sub-tool; correspondingly, the target tool obtains target unavailable information according to the original information of the target maintenance activity, and the method comprises the following steps: the identification sub-tool acquires original information of the target maintenance activity and searches a target identification code corresponding to the original information; if the target identification code exists, the identifying sub-tool searches for target unavailable information corresponding to the target identification code, and sends the target unavailable information to the managing sub-tool through a third data interface; the administrative sub-tool sends the target unavailable information to the planning tool through the second data interface.
In the implementation mode, the target identification code is set, and then the target maintenance activities and the target unavailable information are stored through the target identification code. When the identifying tool obtains the original information of the target maintenance activity, the identifying tool searches the target identification code corresponding to the original information, so that the target unavailable information corresponding to the target maintenance activity can be found, and the original information does not need to be analyzed each time to obtain the target unavailable information, so that the target unavailable information can be obtained more conveniently and rapidly.
And after the identification sub-tool acquires the target unavailable information, the target unavailable information is sent to the management sub-tool through the third data interface. The administrative sub-tool, in turn, sends the target unavailable information to the planning tool (as shown in fig. 3) via the second data interface.
The identification sub-tool is a Data system of the power plant, and the management sub-tool can be an SAP (systems Application product Data processing) system. In the related art, the data system of the power plant cannot perform data interaction with the SAP system. In the implementation mode, a third data interface is arranged to connect the data system with the SAP system, so that the data system of the power plant can send target unavailable information to the SAP system.
In other possible implementation manners, the recognition sub-tool may only search the target identification code corresponding to the original information, and then send the target identification code to the management sub-tool through the third data interface. And then the management sub-tool searches for target unavailable information corresponding to the target identification code and sends the target unavailable information to the plan making tool through a second data interface.
In other possible implementation manners, if the target identification code does not exist, the recognition sub-tool analyzes the original information to obtain the target unavailable information. The process of analyzing the original information by the identifier tool is as follows:
after the identification widget obtains the raw information, the identification widget first determines whether the system corresponding to the target maintenance activity has a corresponding PSA model according to the raw information. If there is no corresponding PSA model, the recognition sub-tool does not determine target unavailable information from the raw information. If the system has a corresponding PSA model present, the identifier utility then determines the tagged devices in the system.
The identification widget then determines whether the marked device has a corresponding PSA model. After the marked device with the PSA model is found, the identifying tool searches the marked device with the PSA model for the target device corresponding to the target maintenance activity. And finally, searching for target unavailable information corresponding to the target equipment for maintenance by the identification sub-tool.
If the marked equipment can not be found in the system, or the corresponding PSA model can not exist in the marked equipment, or the target equipment corresponding to the target maintenance activity can not be found in the marked equipment in which the PSA model exists, the manual intervention is carried out.
In this implementation, the correspondence between the tagged device in which the PSA model exists and the target unavailable information, which is the unavailable information corresponding to the tagged device in which the PSA model exists, is stored. Then after the identification sub-tool acquires the target maintenance activity, the identification sub-tool screens out target equipment corresponding to the target maintenance activity on marked equipment with a PSA model step by step, and finally searches for target unavailable information corresponding to the target equipment, so that the target unavailable information can be accurately and quickly acquired.
After the identification sub-tool obtains the target unavailable information, the identification sub-tool stores the target unavailable information and the target identification code in an associated mode, and sends the target unavailable information to the management sub-tool through the third data interface.
And S102, the plan making tool sends the target maintenance plan to the risk evaluation tool through the first data interface so as to instruct the risk evaluation tool to carry out risk evaluation on the target maintenance plan and obtain a target evaluation result.
In step S102, a risk assessment tool may be launched by the planning tool. After the plan making tool obtains the target maintenance plan, the plan making tool sends the target maintenance plan to the risk evaluation tool through the first data interface, and therefore the risk evaluation tool is instructed to conduct risk evaluation on the target maintenance plan, and a target evaluation result is obtained. The risk evaluation tool may transmit the target evaluation result to the planning tool through the first data interface, and the planning tool may display the target evaluation result (see fig. 4).
In some embodiments, the target evaluation result includes a prompt for instructing the user to adjust the target maintenance plan.
In the related art, the target evaluation result does not include prompt information, when the target evaluation result is unacceptable, a worker is required to adjust the target maintenance plan according to experience every time, and then risk evaluation is performed again, so that time and labor are wasted, and the efficiency is low. In this embodiment, the target evaluation result may include not only the instantaneous risk, the cumulative risk, and the risk level of the configuration (the configuration refers to a specific unit state formed by the specific conditions of each system and equipment of the nuclear power plant at the same time), but also prompt information. When the staff judges that the target evaluation result is unacceptable, the staff can adjust the target maintenance plan according to the prompt information, so that the risk evaluation efficiency is improved.
For example, when 8 target repair activities are included in the target repair plan and 2 of the target repair activities may not be performed simultaneously with the other 6 target repair activities, the risk assessment tool may prompt the worker in the target assessment result to stagger the 2 target repair activities from the other 6 target repair activities in the target repair plan.
In addition, the target evaluation result may further include a risk curve, and the risk curve is associated with the target maintenance activities, so that the staff may quickly identify the target maintenance activities and the combination of the target maintenance activities corresponding to the medium-high risk configuration.
In this embodiment, the risk evaluation tool may perform quantitative analysis on the target maintenance plan (to obtain the risk levels of the instantaneous risk, the accumulated risk, and the configuration), and may perform qualitative analysis on the target maintenance plan to obtain the prompt information, so that the user may adjust the target maintenance plan according to the prompt information, and further improve the risk evaluation efficiency of the target maintenance plan.
In other embodiments, the risk evaluation tool performs risk evaluation on the target maintenance plan to obtain a target evaluation result, including: determining a target basic event by a risk evaluation tool, wherein the target basic event is a basic event corresponding to target unavailable information in a target maintenance plan; the risk evaluation tool searches an original minimum cut set corresponding to the target basic event and eliminates the target basic event from the original minimum cut set to obtain a first target minimum cut set; the risk evaluation tool absorbs and/or merges the minimum cut sets in the first target minimum cut set to obtain a second target minimum cut set; and the risk evaluation tool carries out risk evaluation on the target maintenance plan according to the second target minimum cut set to obtain a target evaluation result.
When the risk evaluation tool carries out risk evaluation, the risk evaluation tool needs to re-analyze the fault tree and the event tree every time to obtain a new minimum cut set, and then a target evaluation result is obtained according to the new minimum cut set. The fault tree and the event tree need to be re-analyzed each time, which is troublesome and consumes much time.
In this embodiment, all the minimal cut sets of the fault tree are stored first. Then after the risk evaluation tool acquires the target maintenance plan, the risk evaluation tool firstly determines a target basic event corresponding to the target unavailable information in the target maintenance plan and searches an original minimum cut set corresponding to the target basic event.
Then, the risk evaluation tool removes the target basic event from the original minimum cut set to obtain a first target minimum cut set. And then the risk evaluation tool absorbs and/or merges the minimal cut sets in the first target minimal cut set to obtain a second target minimal cut set. And finally, the risk evaluation tool acquires the probability value of each basic event in the second target minimum cut set from the database, and then carries out risk evaluation on the target maintenance plan according to the probability value of each basic event in the second target minimum cut set to obtain a target evaluation result.
The target basic event is a bottom event in the fault tree, and the occurrence reason of the bottom event does not need to be ascertained. The minimum cut-set refers to a cut-set where the number of bottom events can no longer be reduced, the minimum cut-set reflecting the failure mode of the system. The fault tree refers to a tree logic diagram formed by connecting top events, middle events and bottom events according to a certain causal relationship by using corresponding event symbols, logic gate symbols and transition symbols.
The original minimal cut set corresponding to the target basic event refers to a set including a minimal cut set of the target basic event, or refers to a set including both a minimal cut set with the target basic event and a minimal cut set without the target basic event, and each minimal cut set in the set includes the same number of basic events.
For example, when the target basic events corresponding to the target unavailable information are C1-C4 and the original minimal cut set corresponding to the target basic events C1-C4 is shown as 501 in fig. 5 (at this time, the original minimal cut set includes minimal cut set 1, minimal cut set 2, minimal cut set 3, and minimal cut set 4), the target basic events C1-C4 are removed from the original minimal cut set to obtain a first target minimal cut set, and the first target minimal cut set is shown as 502 in fig. 5. At this time, since the minimal cut set 1, the minimal cut set 2, the minimal cut set 3, and the minimal cut set 4 in the first target minimal cut set are the same minimal cut set, the minimal cut set 1, the minimal cut set 2, the minimal cut set 3, and the minimal cut set 4 in the first target minimal cut set are merged to obtain a second target minimal cut set.
Or, when the target basic event corresponding to the target unavailable information is C and the original minimal cut set corresponding to the target basic event C is shown as 601 in fig. 6 (at this time, the original minimal cut set includes the minimal cut set 11, the minimal cut set 12, the minimal cut set 13, and the minimal cut set 14), the target basic event C is removed from the original minimal cut set to obtain a first target minimal cut set, and the first target minimal cut set is shown as 602 in fig. 6. At this time, since the minimal cut sets 12, 13, and 14 in the first target minimal cut set are not already minimal cut sets, the minimal cut sets 12, 13, and 14 in the first target minimal cut set are absorbed to obtain the second target minimal cut set.
It should be noted that, in the process of absorbing and/or merging the minimum cut sets in the first target minimum cut set, a Hash Algorithm (Hash Algorithm) may be used to accelerate the speed of absorbing and merging, so as to further improve the efficiency of risk evaluation. Or when the risk evaluation is needed by a plurality of target maintenance plans, the risk evaluation is carried out on the plurality of target maintenance plans by adopting multithreading, so that the efficiency of the risk evaluation is further improved.
In this embodiment, all the minimal cut sets of the fault tree are stored first. After the risk evaluation tool determines the target basic event, an original minimum cut set corresponding to the target basic event is searched, and the target basic event is removed from the original minimum cut set to obtain a first target minimum cut set. And the risk evaluation tool absorbs and/or merges the minimum cut sets in the first target minimum cut set to obtain a second target minimum cut set. Therefore, the second target minimal cut set can be obtained without re-analyzing the fault tree and the event tree every time, and the target evaluation result can be obtained more quickly.
To sum up, the application provides an evaluation method of a nuclear power plant, and first, a plan making tool obtains a target maintenance plan. And then the plan making tool sends the target maintenance plan to a risk evaluation tool through a first data interface so as to instruct the risk evaluation tool to carry out risk evaluation on the target maintenance plan and obtain a target evaluation result. In this application promptly, the plan making tool can be automatically through first data interface with target maintenance plan send to the risk evaluation tool, need not the staff and manually imports the target maintenance plan into the risk evaluation tool, and is simple and convenient, has eliminated the data interaction obstacle of plan making tool and risk evaluation tool. And because manual introduction is not needed, errors caused by manual introduction are reduced, and the risk evaluation efficiency is improved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Example two
Fig. 7 shows an example of an evaluation device of a nuclear power plant, and only a part related to an embodiment of the present application is shown for convenience of explanation. The apparatus 700 comprises:
a planning tool 701 for obtaining a target maintenance plan.
The plan making tool 701 is further configured to send the target maintenance plan to a risk evaluation tool through the first data interface, so as to instruct the risk evaluation tool to perform risk evaluation on the target maintenance plan, and obtain a target evaluation result.
Optionally, the apparatus 700 further comprises:
and the target tool is used for determining target unavailable information according to the original information of the target maintenance activities, and the target maintenance activities are the maintenance activities included in the target maintenance plan.
Accordingly, the planning tool 701 is further configured to perform:
and acquiring target unavailable information through a second data interface, and receiving a target maintenance plan formulated by a user according to the target unavailable information.
Optionally, the target tools include an identification sub-tool and a management sub-tool.
And the recognition sub-tool is used for acquiring the original information of the target maintenance activity and searching the target identification code corresponding to the original information.
And if the target identification code exists, the identifying sub-tool is also used for searching target unavailable information corresponding to the target identification code and sending the target unavailable information to the managing sub-tool through a third data interface.
And the management sub-tool is used for sending the target unavailable information to the planning tool 701 through a second data interface.
Optionally, if the object identifier exists, the identifying sub-tool is further configured to send the object identifier to the managing sub-tool through the third data interface.
The management sub-tool is further configured to search for target unavailability information corresponding to the target identification code, and send the target unavailability information to the plan making tool 701 through the second data interface.
Optionally, the identifier tool is further configured to:
and if the target identification code does not exist, analyzing the original information to obtain target unavailable information.
And performing associated storage on the target unavailable information and the target identification code, and sending the target unavailable information to the management sub-tool through a third data interface.
Optionally, the target evaluation result includes prompt information for instructing the user to adjust the target maintenance plan.
Optionally, the risk assessment tool is specifically configured to perform:
and determining a target basic event, wherein the target basic event is a basic event corresponding to the target unavailable information in the target maintenance plan.
And searching an original minimal cut set corresponding to the target basic event, and removing the target basic event from the original minimal cut set to obtain a first target minimal cut set.
And absorbing and/or combining the minimum cut sets in the first target minimum cut set to obtain a second target minimum cut set.
And performing risk evaluation on the target maintenance plan according to the second target minimum cut set to obtain a target evaluation result.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, since the same concept is based on the first embodiment of the method of the present application, specific functions and technical effects thereof may be referred to a part of the method embodiment, and details are not described herein again.
EXAMPLE III
Fig. 8 is a schematic diagram of a terminal device provided in the third embodiment of the present application. As shown in fig. 8, the terminal apparatus 800 of this embodiment includes: a processor 801, a memory 802, and a computer program 803 stored in the memory 802 and operable on the processor 801. The steps in the various method embodiments described above are implemented when the processor 801 described above executes the computer program 803 described above. Alternatively, the processor 801 implements the functions of the modules/units in the device embodiments when executing the computer program 803.
Illustratively, the computer program 803 may be divided into one or more modules/units, which are stored in the memory 802 and executed by the processor 801 to complete the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 803 in the terminal device 800. For example, the computer program 803 described above may be divided into planning tools that specifically function as follows:
a plan making tool obtains a target maintenance plan;
and the plan making tool sends the target maintenance plan to a risk evaluation tool through a first data interface so as to instruct the risk evaluation tool to carry out risk evaluation on the target maintenance plan and obtain a target evaluation result.
The terminal device may include, but is not limited to, a processor 801 and a memory 802. Those skilled in the art will appreciate that fig. 8 is merely an example of a terminal device 800 and does not constitute a limitation of terminal device 800, and may include more or fewer components than shown, or some components may be combined, or different components, for example, the terminal device may also include input-output devices, network access devices, buses, etc.
The Processor 801 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware card, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 802 may be an internal storage unit of the terminal device 800, such as a hard disk or a memory of the terminal device 800. The memory 802 may also be an external storage device of the terminal device 800, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 800. Further, the memory 802 may include both an internal storage unit and an external storage device of the terminal device 800. The memory 802 is used for storing the computer program and other programs and data required by the terminal device. The memory 802 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned functional units and modules are illustrated as being divided, and in practical applications, the above-mentioned functions may be distributed as different functional units and modules according to needs, that is, the internal structure of the apparatus may be divided into different functional units or modules to implement all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit, and the integrated unit may be implemented in the form of a hardware or a software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. For the specific working processes of the units and modules in the system, reference may be made to the corresponding processes in the foregoing method embodiments, which are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described or recited in detail in a certain embodiment, reference may be made to the descriptions of other embodiments.
Those of ordinary skill in the art would appreciate that the elements and algorithm steps of the various embodiments described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the above-described modules or units may be divided into only one logical function, and may be implemented in other ways, for example, multiple units or plug-ins may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units described above, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes in the above method embodiments may be implemented by a computer program, which may be stored in a computer readable storage medium and executed by a processor, so as to implement the steps of the above method embodiments. Wherein the computer program comprises computer program code, and the computer program code may be in source code form, object code form, executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying the above-mentioned computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signal, telecommunication signal, software distribution medium, etc. It should be noted that the computer readable medium described above may include content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media that does not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the present disclosure, and are intended to be included within the scope thereof.

Claims (10)

1. A method of evaluating a nuclear power plant, comprising:
a plan making tool obtains a target maintenance plan;
and the plan making tool sends the target maintenance plan to a risk evaluation tool through a first data interface so as to instruct the risk evaluation tool to carry out risk evaluation on the target maintenance plan and obtain a target evaluation result.
2. The method of evaluating a nuclear power plant according to claim 1, further comprising:
the target tool determines target unavailable information according to original information of a target maintenance activity, wherein the target maintenance activity is a maintenance activity included in the target maintenance plan;
accordingly, the planning tool obtains a target maintenance plan, comprising:
and the plan making tool acquires target unavailable information through a second data interface and receives a target maintenance plan made by a user according to the target unavailable information.
3. The evaluation method for a nuclear power plant according to claim 2, wherein the target tool includes an identification sub-tool and a management sub-tool;
correspondingly, the target tool obtains target unavailable information according to the original information of the target maintenance activity, and the method comprises the following steps:
the recognition sub-tool acquires original information of the target maintenance activity and searches a target identification code corresponding to the original information;
if the target identification code exists, the recognition sub-tool searches for target unavailable information corresponding to the target identification code and sends the target unavailable information to the management sub-tool through a third data interface;
the management sub-tool sends the target unavailability information to the planning tool through the second data interface.
4. The evaluation method of the nuclear power plant according to claim 3, wherein after the recognition sub-tool obtains the original information of the target maintenance activity and searches for the target identification code corresponding to the original information, the method further comprises:
if the target identification code exists, the identification sub-tool sends the target identification code to the management sub-tool through a third data interface;
and the management sub-tool searches for target unavailable information corresponding to the target identification code and sends the target unavailable information to the plan making tool through the second data interface.
5. The evaluation method of a nuclear power plant according to claim 3, further comprising:
if the target identification code does not exist, the identifier tool analyzes the original information to obtain the target unavailable information;
and the identification sub-tool stores the target unavailable information and the target identification code in an associated manner, and sends the target unavailable information to the management sub-tool through a third data interface.
6. The evaluation method of a nuclear power plant according to claim 1, wherein the target evaluation result includes a prompt for instructing a user to adjust a target maintenance plan.
7. The method of evaluating a nuclear power plant according to claim 1, wherein the risk evaluation tool performs risk evaluation on the target maintenance plan to obtain a target evaluation result, and the method comprises:
the risk evaluation tool determines a target basic event, wherein the target basic event is a basic event corresponding to target unavailable information in the target maintenance plan;
the risk evaluation tool searches an original minimal cut set corresponding to the target basic event, and removes the target basic event from the original minimal cut set to obtain a first target minimal cut set;
the risk evaluation tool absorbs and/or merges the minimum cut sets in the first target minimum cut set to obtain a second target minimum cut set;
and the risk evaluation tool carries out risk evaluation on the target maintenance plan according to the second target minimum cut set to obtain a target evaluation result.
8. An evaluation device of a nuclear power plant, comprising:
a plan making tool for obtaining a target maintenance plan;
the plan making tool is further used for sending the target maintenance plan to a risk evaluation tool through a first data interface so as to instruct the risk evaluation tool to carry out risk evaluation on the target maintenance plan and obtain a target evaluation result.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1-7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202110259025.3A 2021-03-10 2021-03-10 Evaluation method and device for nuclear power plant, terminal equipment and readable storage medium Pending CN113094417A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110259025.3A CN113094417A (en) 2021-03-10 2021-03-10 Evaluation method and device for nuclear power plant, terminal equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110259025.3A CN113094417A (en) 2021-03-10 2021-03-10 Evaluation method and device for nuclear power plant, terminal equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN113094417A true CN113094417A (en) 2021-07-09

Family

ID=76666852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110259025.3A Pending CN113094417A (en) 2021-03-10 2021-03-10 Evaluation method and device for nuclear power plant, terminal equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN113094417A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117236702A (en) * 2023-11-15 2023-12-15 福建福清核电有限公司 Method and device for risk assessment based on probability risk model

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101710400A (en) * 2009-12-15 2010-05-19 中科华核电技术研究院有限公司 Method and device for evaluating risk of nuclear power station
CN103400246A (en) * 2013-08-23 2013-11-20 中国科学院合肥物质科学研究院 System and method for monitoring risks of nuclear power plant based on cloud architecture
CN103685490A (en) * 2013-12-03 2014-03-26 中国核电工程有限公司 Nuclear plant safety evaluating system and method
KR20140055100A (en) * 2012-10-30 2014-05-09 한국수력원자력 주식회사 System and method for operating risk evaluation according to maintenance plan of nuclear power plant
CN105469186A (en) * 2014-11-28 2016-04-06 上海核工程研究设计院 Risk monitoring system capable of realizing self-monitoring and self-monitoring method
CN106295956A (en) * 2016-07-27 2017-01-04 武汉大学 A kind of reliability estimation method considering that nuclear power plant's electric power system can repair multimode complex characteristics
CN109064035A (en) * 2018-08-07 2018-12-21 苏州热工研究院有限公司 The risk-informed type analysis method of nuclear power plant's Technical specification optimization
CN109102089A (en) * 2018-10-23 2018-12-28 中核核电运行管理有限公司 A kind of system monitor method based on effectiveness of maintenance assessment
CN112328275A (en) * 2020-10-10 2021-02-05 岭东核电有限公司 Data updating method and device for nuclear power plant, terminal equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101710400A (en) * 2009-12-15 2010-05-19 中科华核电技术研究院有限公司 Method and device for evaluating risk of nuclear power station
KR20140055100A (en) * 2012-10-30 2014-05-09 한국수력원자력 주식회사 System and method for operating risk evaluation according to maintenance plan of nuclear power plant
CN103400246A (en) * 2013-08-23 2013-11-20 中国科学院合肥物质科学研究院 System and method for monitoring risks of nuclear power plant based on cloud architecture
CN103685490A (en) * 2013-12-03 2014-03-26 中国核电工程有限公司 Nuclear plant safety evaluating system and method
CN105469186A (en) * 2014-11-28 2016-04-06 上海核工程研究设计院 Risk monitoring system capable of realizing self-monitoring and self-monitoring method
CN106295956A (en) * 2016-07-27 2017-01-04 武汉大学 A kind of reliability estimation method considering that nuclear power plant's electric power system can repair multimode complex characteristics
CN109064035A (en) * 2018-08-07 2018-12-21 苏州热工研究院有限公司 The risk-informed type analysis method of nuclear power plant's Technical specification optimization
CN109102089A (en) * 2018-10-23 2018-12-28 中核核电运行管理有限公司 A kind of system monitor method based on effectiveness of maintenance assessment
CN112328275A (en) * 2020-10-10 2021-02-05 岭东核电有限公司 Data updating method and device for nuclear power plant, terminal equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117236702A (en) * 2023-11-15 2023-12-15 福建福清核电有限公司 Method and device for risk assessment based on probability risk model

Similar Documents

Publication Publication Date Title
CN104966172A (en) Large data visualization analysis and processing system for enterprise operation data analysis
CN110704873B (en) Method and system for preventing sensitive data from being leaked
US20120259865A1 (en) Automated correlation discovery for semi-structured processes
CN104346574A (en) Automatic host computer security configuration vulnerability restoration method and system based on configuration specification
CN112445875B (en) Data association and verification method and device, electronic equipment and storage medium
CN110069929B (en) Vulnerability disposal analysis method and construction method and device of analysis model thereof
CN111241059B (en) Database optimization method and device based on database
CN104270389A (en) Method and system for automatically restoring security configuration vulnerability of router/ interchanger
CN112348521A (en) Intelligent risk quality inspection method and system based on business audit and electronic equipment
CN111324781A (en) Data analysis method, device and equipment
CN113094417A (en) Evaluation method and device for nuclear power plant, terminal equipment and readable storage medium
KR101198397B1 (en) Compatible system and method for monitoring risk of nuclear power plant at full power operation
CN108376320A (en) Fulfilling data managing method and device
CN113505367B (en) Security audit method, device, system, electronic device and readable storage medium
CN112965793B (en) Identification analysis data-oriented data warehouse task scheduling method and system
CN102193859A (en) Code analysis method and system
CN114676061A (en) Knowledge graph-based automatic firmware detection method
CN104426708A (en) Method and system for executing security detection service
CN114428812A (en) Report data monitoring method, device, equipment and storage medium
CN114021759A (en) Method for managing digital factory equipment based on AIOT and MR technology
CN116302762B (en) Evaluation method and system for fault location application based on red-blue countermeasure
CN116383020B (en) Internet data analysis management system and method based on blockchain
CN109582534B (en) Method and device for determining operation entry of system and server
CN115455921A (en) Method and device for determining report cell calculation order for batch report calculation
CN115129749A (en) Complex query optimization method, device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination