CN113178842A - Relay protection setting value monitoring method and device, relay protection equipment and storage medium - Google Patents

Relay protection setting value monitoring method and device, relay protection equipment and storage medium Download PDF

Info

Publication number
CN113178842A
CN113178842A CN202110510395.XA CN202110510395A CN113178842A CN 113178842 A CN113178842 A CN 113178842A CN 202110510395 A CN202110510395 A CN 202110510395A CN 113178842 A CN113178842 A CN 113178842A
Authority
CN
China
Prior art keywords
binary data
relay protection
monitoring
feature code
target binary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110510395.XA
Other languages
Chinese (zh)
Other versions
CN113178842B (en
Inventor
徐强超
张海川
徐茂鑫
郭毅明
江文东
王幸
陈文睿
李津
谭桂轩
程振华
牛铭
毛远翱
钟华
顾雅云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Power Supply Bureau of Guangdong Power Grid Co Ltd
Original Assignee
Guangzhou Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Power Supply Bureau of Guangdong Power Grid Co Ltd filed Critical Guangzhou Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority to CN202110510395.XA priority Critical patent/CN113178842B/en
Publication of CN113178842A publication Critical patent/CN113178842A/en
Application granted granted Critical
Publication of CN113178842B publication Critical patent/CN113178842B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02HEMERGENCY PROTECTIVE CIRCUIT ARRANGEMENTS
    • H02H3/00Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition with or without subsequent reconnection ; integrated protection
    • H02H3/006Calibration or setting of parameters
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02HEMERGENCY PROTECTIVE CIRCUIT ARRANGEMENTS
    • H02H1/00Details of emergency protective circuit arrangements
    • H02H1/0092Details of emergency protective circuit arrangements concerning the data processing means, e.g. expert systems, neural networks

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Operations Research (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Emergency Protection Circuit Devices (AREA)

Abstract

The application relates to a relay protection setting value monitoring method and device, relay protection equipment and a storage medium. The method comprises the following steps: acquiring target binary data; the target binary data comprises binary data corresponding to each fixed value information; splitting target binary data to obtain each subdata, and performing XOR operation on each subdata to obtain a monitoring feature code; and determining a fixed value monitoring result according to the comparison result of the monitoring feature code and the preset feature code. The method has the advantages of less calculation amount and simple steps, and can complete fixed value monitoring through the relay equipment, so that the monitoring cost can be reduced, and the difficulty of upgrading and reconstruction can be reduced. Meanwhile, in the monitoring process of the relay protection equipment, a safety calculation margin can be reserved, so that the safety of a power grid can be improved, the scheme of the application can be applied to most relay protection equipment, and the applicability is enhanced.

Description

Relay protection setting value monitoring method and device, relay protection equipment and storage medium
Technical Field
The application relates to the technical field of operation and maintenance of power grid equipment, in particular to a relay protection setting value monitoring method and device, relay protection equipment and a storage medium.
Background
With the high-speed development of power systems, the scale of power grids is increasingly large, and the connection between power and the society is tighter, so that the guarantee of the safe operation of the power systems is very important. The correctness of the relay protection device constant value directly affects the correctness of the protection action of the device, and is closely related to the reliability of power supply. Therefore, in the operation and maintenance process of the power grid equipment, the constant value information of the relay protection equipment is often required to be monitored in real time so as to ensure the operation condition of the relay protection equipment.
At present, the checking mode of the relay protection setting value still mainly adopts manual checking, namely the setting value is printed on paper or called to a local background and then checked item by item and item by item, the checking process is time-consuming and labor-consuming, and the operation and maintenance pressure is greatly increased by the scale expansion of the relay protection equipment. In addition, the equipment setting items are various, and the conditions of wrong watching, missing watching and the like are easy to occur when the equipment is checked item by item manually, so that the safe operation of the relay protection equipment is not facilitated.
In order to solve the problems of high operation and maintenance pressure, low safety, low monitoring efficiency and the like caused by manual checking, the conventional technology combines a relay protection device constant value printing communication interface with a newly added auxiliary device, so that constant value monitoring is realized; or calling the fixed value to a background system and monitoring through auxiliary software. However, the conventional method needs an additional device to implement the fixed value monitoring, and has a problem of high cost.
Disclosure of Invention
Therefore, in order to solve the above technical problems, it is necessary to provide a relay protection constant value monitoring method, a relay protection constant value monitoring device, a relay protection device, and a storage medium, which can reduce implementation difficulty, have a small amount of calculation, have simple steps, and can be applied to a plurality of relay protection devices.
A relay protection fixed value monitoring method, the method comprising:
acquiring target binary data; the target binary data comprises binary data corresponding to each fixed value information;
splitting target binary data to obtain each subdata, and performing XOR operation on each subdata to obtain a monitoring feature code;
and determining a fixed value monitoring result according to the comparison result of the monitoring feature code and the preset feature code.
In one embodiment, the step of splitting the target binary data to obtain each sub-data includes:
determining a splitting length;
and splitting the target binary data according to the splitting length to obtain each subdata with the splitting length.
In one embodiment, the split length is greater than or equal to 16 bits.
In one embodiment, the step of splitting the target binary data to obtain each sub-data includes:
and splitting the target binary data from the highest bit of the target binary data to the lowest bit of the target binary data to obtain each subdata.
In one embodiment, the step of obtaining target binary data comprises:
and binary data corresponding to each fixed value information is obtained, and the binary data corresponding to each fixed value information are merged according to a preset merging sequence to obtain target binary data.
In one embodiment, the step of determining the constant value monitoring result comprises:
if the monitoring feature code is consistent with the preset feature code, determining that the constant value configuration of the relay protection equipment is normal; otherwise, determining that the constant value configuration of the relay protection equipment is abnormal, and sending an alarm.
In one embodiment, the fixed value information includes a fixed value area code, a fixed value list and a program version.
A relay protection definite value monitoring devices, the device includes:
the target binary data acquisition module is used for acquiring target binary data; the target binary data comprises binary data corresponding to each fixed value information;
the monitoring feature code acquisition module is used for splitting target binary data to obtain each subdata and carrying out XOR operation on each subdata to obtain a monitoring feature code;
and the monitoring result acquisition module is used for determining a fixed value monitoring result according to the comparison result of the monitoring feature code and the preset feature code.
A relay protection device comprising a processor which, when executing a computer program, performs the steps of:
acquiring target binary data; the target binary data comprises binary data corresponding to each fixed value information;
splitting target binary data to obtain each subdata, and performing XOR operation on each subdata to obtain a monitoring feature code;
and determining a fixed value monitoring result according to the comparison result of the monitoring feature code and the preset feature code.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring target binary data; the target binary data comprises binary data corresponding to each fixed value information;
splitting target binary data to obtain each subdata, and performing XOR operation on each subdata to obtain a monitoring feature code;
and determining a fixed value monitoring result according to the comparison result of the monitoring feature code and the preset feature code.
According to the relay protection setting value monitoring method and device, the relay protection equipment and the storage medium, target binary data are obtained, wherein the target binary data comprise binary data corresponding to each piece of setting value information; splitting target binary data to obtain each subdata, and performing XOR operation on each subdata to obtain a monitoring feature code; and determining a fixed value monitoring result according to the comparison result of the monitoring feature code and the preset feature code. Therefore, the relay protection equipment performs constant value monitoring by using binary data corresponding to the constant value information as a monitoring basis, has the advantages of less calculation amount and simple steps, and can complete constant value monitoring through the relay equipment, so that the monitoring cost and the difficulty of upgrading and reconstruction can be reduced. Meanwhile, in the monitoring process of the relay protection equipment, a safety calculation margin can be reserved, so that the safety of a power grid can be improved, the scheme of the application can be applied to most relay protection equipment, and the applicability is enhanced.
Drawings
Fig. 1 is a schematic diagram of a first process of a relay protection constant value monitoring method in one embodiment;
FIG. 2 is a schematic flow chart illustrating steps of obtaining sub-data according to an embodiment;
fig. 3 is a schematic diagram of a second process of the relay protection constant value monitoring method in another embodiment;
fig. 4 is a block diagram of a relay protection setting value monitoring device in one embodiment;
fig. 5 is an internal structural diagram of the relay protection device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
As used herein, the singular forms "a", "an" and "the" may include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises/comprising," "includes" or "including," etc., specify the presence of stated features, integers, steps, operations, components, parts, or combinations thereof, but do not preclude the presence or addition of one or more other features, integers, steps, operations, components, parts, or combinations thereof. Also, as used in this specification, the term "and/or" includes any and all combinations of the associated listed items.
As described in the background art, the conventional technology needs additional auxiliary equipment when performing fixed value monitoring, and has a problem of high monitoring cost, and the inventor finds that the problem is caused because the equipment models of relay protection equipment currently put into use have certain differences, some relay protection equipment can be products before many years (such as products before 7-8 years, even products before 10 years), and other relay protection equipment can be products with relatively new models, so that the relay protection equipment has great differences in aspects of hardware configuration, function support and the like. If the constant value monitoring function is to be realized through the relay protection equipment under the condition of meeting the configuration of each relay protection equipment, the problem of high difficulty in upgrading and reconstruction exists, and the cost is increased.
In addition, the calculation power of some relay protection devices is difficult to satisfy the calculation with a large calculation amount under the condition of reserving a safety calculation power margin, such as failing to satisfy Cyclic Redundancy Check (CRC), Message-Digest Algorithm (MD 5), sha256 calculation, and the like. If a calculation with a large calculation amount is performed on the relay protection device which is configured relatively backward, the relay protection device cannot support or needs to be fully loaded to perform the calculation. Under the condition, the relay protection equipment cannot respond to emergency and emergency in time, the operation safety of the power grid is reduced, the relevant regulations of the power grid are not met, and the upgrading and transformation difficulty is further increased.
Based on the above, the application provides a relay protection fixed value monitoring method, a relay protection device, relay protection equipment and a computer readable storage medium, which have the advantages of less calculation amount and simple steps, can be applied to various relay protection devices to realize fixed value monitoring, and have strong applicability and can reduce monitoring cost.
In an embodiment, as shown in fig. 1, a relay protection constant value monitoring method is provided, and this embodiment is exemplified by applying the method to a relay protection device, and it is understood that the method may also be applied to other devices except the relay protection device. In this embodiment, the method includes the steps of:
step 110, obtaining target binary data; the target binary data includes binary data corresponding to each fixed value information.
The relay protection device may correspond to one or more items of fixed value information to be monitored, including but not limited to information such as a fixed value area number, a fixed value list, and/or a program version, and it may be understood that the fixed value information to be monitored may be determined according to an actual situation, and the fixed value information shown in the foregoing example may be added, deleted, or replaced, which is not specifically limited in this application.
Specifically, the relay protection device acquires target binary data, wherein the target binary data is a string of binary data and includes binary data corresponding to each piece of fixed value information. Further, before the relay protection device acquires the target binary data, the relay protection device can convert each fixed value information into corresponding binary data, and acquire the target binary data according to the binary data corresponding to each fixed value information; alternatively, the relay protection device may directly acquire the target binary data by communicating with an external device.
And step 120, splitting the target binary data to obtain each subdata, and performing exclusive-or operation on each subdata to obtain a monitoring feature code.
Specifically, after the target binary data is obtained, the relay protection device splits the target binary data to obtain a plurality of subdata, and the data lengths of any two subdata may be the same or different. If the subdata is combined in sequence according to a certain sequence, the target binary data can be obtained. Further, the relay protection device may split the target binary system according to a preset splitting rule, for example, the target binary system may be split according to a total length of the target binary data, a number of the fixed value information, and/or a length of each preset sub data.
After the sub-data is obtained by splitting, the relay protection equipment can perform XOR operation on the sub-data according to the bit and obtain a monitoring feature code, namely according to the bit
Figure BDA0003060082470000061
The monitoring feature code is obtained, wherein H is the monitoring feature code,
Figure BDA0003060082470000062
for XOR operation, d1Is the first subdata, d2Is the second subdata, and so on, dkIs the kth sub-data. The relay protection equipment carries out XOR operation on the first data of each subdata to obtain the first data of the monitoring feature codeAnd carrying out XOR operation on the second bit data of each subdata by the relay protection equipment to obtain the second bit data of the monitoring feature code, and so on, and respectively determining the data of each bit of the monitoring feature code.
When the lengths of the sub-data are not consistent, the length of the monitoring feature code can be determined according to the length of the longest sub-data, when the XOR operation is performed, the sub-data with the data length larger than or equal to the current calculation bit is determined as the target sub-data, and the XOR operation is performed on the value corresponding to the current calculation bit in each target sub-data, so as to obtain the value of the corresponding bit in the monitoring feature code. For example, if the data length of the sub-data 1 is 2 bits, the data length of the sub-data 2 is 3 bits, and the data length of the sub-data 3 is 4 bits, the length of the monitoring signature may be 4 bits. When the monitoring feature code is calculated, an exclusive or result of the first bit of the sub data 1, the first bit of the sub data 2, and the first bit of the sub data 3 may be determined as the first bit of the monitoring feature code, an exclusive or result of the second bit of the sub data 1, the second bit of the sub data 2, and the second bit of the sub data 3 may be determined as the second bit of the monitoring feature code, an exclusive or result of the third bit of the sub data 2 and the third bit of the sub data 3 may be determined as the third bit of the monitoring feature code, and the fourth bit of the sub data 3 may be determined as the fourth bit of the monitoring feature code.
In one embodiment, the relay protection device may perform an exclusive-or operation on each sub-data recursively to obtain the monitoring feature code. E.g. first pair d1And d2Carrying out XOR operation to obtain a first XOR result; the first XOR result and d3Carrying out XOR operation to obtain a second XOR result; the second XOR result with d4And performing XOR operation to obtain a third XOR result, and so on until the XOR operation of all the subdata is completed.
And step 130, determining a fixed value monitoring result according to the comparison result of the monitoring feature code and the preset feature code.
In one embodiment, the preset feature code may be stored in the background system. And the fixed value monitoring result is used for indicating whether the fixed value configuration of the relay protection equipment is abnormal or not.
Specifically, in the normal operation process of the relay protection device, the fixed value information does not change, and in the process, under the condition that the splitting rules are consistent, the monitoring feature code obtained by calculation according to the fixed value information does not change, so that the change of the fixed value execution state of the device can be monitored according to the monitoring feature code. Specifically, the relay protection device compares the monitoring feature code with the preset feature code to confirm the matching degree of the monitoring feature code and the preset feature code, and accordingly, a fixed value monitoring result is determined.
According to the relay protection setting value monitoring method, the monitoring feature codes are used as the unique identification of the setting value information of the equipment, when the setting value information is checked, all the setting value information does not need to be checked one by one, and the setting value execution condition of the equipment can be known only by checking the feature codes, so that the operation and maintenance workload of the equipment is reduced, and the operation and maintenance efficiency and the information checking accuracy are improved.
In the relay protection fixed value monitoring method, target binary data is obtained, wherein the target binary data comprises binary data corresponding to each piece of fixed value information; splitting target binary data to obtain each subdata, and performing XOR operation on each subdata to obtain a monitoring feature code; and determining a fixed value monitoring result according to the comparison result of the monitoring feature code and the preset feature code. Therefore, the relay protection equipment performs constant value monitoring by using binary data corresponding to the constant value information as a monitoring basis, has the advantages of less calculation amount and simple steps, and can complete constant value monitoring through the relay equipment, so that the monitoring cost and the difficulty of upgrading and reconstruction can be reduced. Meanwhile, in the monitoring process of the relay protection equipment, a safety calculation margin can be reserved, so that the safety of a power grid can be improved, the scheme of the application can be applied to most relay protection equipment, and the applicability is enhanced.
In an embodiment, referring to fig. 2, the step of splitting the target binary data to obtain each sub-data includes:
step 210, determining a splitting length;
and step 220, splitting the target binary data according to the split length to obtain each subdata with the split length.
The splitting length refers to a data length of each subdata, and it can be understood that the splitting length can be determined according to monitoring efficiency and accuracy, which is not specifically limited in the present application. In one embodiment, the splitting length may be greater than or equal to 16 bits, that is, the length of each sub-data may be greater than or equal to 16 bits, for example, may be 16 bits, 32 bits, or 64 bits, so that the monitoring accuracy may be ensured while the monitoring efficiency is improved.
Specifically, in the process of obtaining each subdata, the relay protection device determines a splitting length and splits the target binary data into a plurality of subdata with fixed lengths, and the data length of each subdata is the splitting length. When splitting the target binary data with length N by step length M, the obtained sub-data can be represented as d1,d2,……dkWherein, in the step (A),
Figure BDA0003060082470000091
k is the number of sub-data obtained after splitting,
Figure BDA0003060082470000092
is rounded up.
In one embodiment, considering that the data length of the target binary data is not necessarily an integral multiple of the split length, and the target binary data cannot be equally divided according to the split length, the relay protection device may zero-fill the sub-data with a shorter length until the length of the sub-data is equal to the split length, so that a plurality of sub-data with equal length may be obtained. It should be noted that the relay protection device may perform high-order zero padding, low-order zero padding, or zero padding at a specific position, which is not specifically limited in the present application, and only needs to make the length of each subdata equal to the splitting length. Further, the zero padding rule may be determined according to the splitting rule, for example, when the splitting rule is to split from high order to low order, a low order zero padding mode may be adopted; when the splitting rule is to split from low to high, a high zero padding mode can be adopted.
In this embodiment, the splitting length is determined, and the target binary data is split into a plurality of sub-data with the splitting length, so that a plurality of sub-data with the same length can be obtained, and it can be ensured that each monitoring feature code is obtained by xoring the same number of values, thereby reducing the interference effect and improving the monitoring accuracy.
In one embodiment, the step of splitting the target binary data to obtain each sub-data includes: and splitting the target binary data from the highest bit of the target binary data to the lowest bit of the target binary data to obtain each subdata.
Specifically, when splitting is performed, the relay protection device may split from the highest position to the lowest position, that is, the target binary data is split in order from left to right. In an example, taking target binary data as 10100101 as an example for explanation, when the split length is 3 bits, the split initial sub-data is: 101. 001, 01, at this time, zero padding can be performed on the sub data 01 at low order, and 010 can be obtained, so that the data length of each sub data is consistent. And the relay protection equipment performs exclusive OR operation on the three subdata 101, 001 and 010 according to bits, and obtains a monitoring feature code of 110.
In this embodiment, the relay protection device splits the target binary data in the direction from the highest position to the lowest position, and obtains each subdata, which has the advantages of less calculation amount and simple steps, and can complete the fixed value monitoring through the relay device, thereby reducing the monitoring cost and the difficulty of upgrading and transforming.
In one embodiment, the step of obtaining target binary data comprises: and binary data corresponding to each fixed value information is obtained, and the binary data corresponding to each fixed value information are merged according to a preset merging sequence to obtain target binary data.
The preset merging sequence is used for indicating the sequence of the binary data corresponding to each piece of constant value information in the target binary data, for example, the binary data corresponding to the constant value area code is a, the binary data corresponding to the constant value list is B, and the binary data corresponding to the program version is C, and the preset merging sequence is used for indicating whether each piece of binary data is merged according to the sequence of A, B, C, A, C, B or C, A, B.
Specifically, the relay protection device may obtain binary data corresponding to each fixed value information by reading data stored in the memory, or may obtain original data of each fixed value information, perform binary conversion on the original data to obtain binary data corresponding to each fixed value information, or perform communication with an external device to obtain each binary data. After the binary data corresponding to each fixed value information is obtained, the relay protection device can merge each binary data according to a preset merging sequence, and obtain a string of target binary data. Therefore, the constant value information can be merged according to the same merging sequence in the process of multiple constant value monitoring, the sequence of each constant value information in the target binary data is ensured to be unchanged, the subsequent splitting and monitoring are facilitated, and the calculated amount is reduced.
In one embodiment, the step of determining the fixed-value monitoring result comprises: if the monitoring feature code is consistent with the preset feature code, determining that the constant value configuration of the relay protection equipment is normal; otherwise, determining that the constant value configuration of the relay protection equipment is abnormal, and sending an alarm.
Specifically, the relay protection device compares the monitoring feature code with a preset feature code, and if the value of the monitoring feature code is the same as that of the preset feature code in each bit, it can be determined that the monitoring feature code is the same as the preset feature code, and it is determined that the configuration of the fixed value of the relay protection device is normal. Otherwise, if the value of the monitoring feature code on at least one bit is different from the value corresponding to the preset feature code, the monitoring feature code is considered to be inconsistent with the preset feature code, and the abnormal configuration of the fixed value of the relay protection device is determined. When the configuration is abnormal, the relay protection equipment can send out an alarm. In one embodiment, the relay protection device may display the monitoring feature code and the comparison result on a local display device, or transmit the foregoing information to a monitoring system for monitoring by operation and maintenance personnel.
To facilitate understanding of the aspects of the present application, a specific example will be described below. Referring to fig. 3, the method for monitoring the relay protection setting value of the present application includes:
and step 310, the relay protection equipment acquires all the fixed value information and respectively stores all the fixed value information as corresponding binary data.
And step 320, the relay protection equipment merges the binary data corresponding to each fixed value information according to a preset merging sequence, and obtains target binary data.
Step 330, the relay protection equipment splits the target binary data into a plurality of subdata with fixed length; the length of each subdata is the binary digit of the subdata. Specifically, the target binary data may be split according to the method shown in the above embodiment, and in the case that the target binary data cannot be equally split, zero padding is performed on the lower bits.
And 340, the relay protection equipment performs exclusive-or operation on the sub-data in sequence and recursively, and confirms the result of the exclusive-or operation as the monitoring feature code. The length of the monitoring feature code is consistent with the length of each subdata.
And 350, comparing the monitoring feature code with a preset feature code recorded in the background system by the relay protection equipment, and giving an alarm when the comparison result is inconsistent. When alarming is carried out, the relay protection equipment can display the monitoring feature code and the comparison result on local display equipment or transmit the information to a monitoring system so that operation and maintenance personnel can monitor the information.
The method is based on the self-coding technology, utilizes binary data of the constant value information as the calculation basis of the recursion characteristics, has the advantages of less calculation amount and simple steps, and is easy to modify and upgrade the existing equipment.
It should be understood that although the various steps in the flow charts of fig. 1-3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1-3 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 4, there is provided a relay protection setting value monitoring device, including: target binary data acquisition module, monitoring characteristic code acquisition module and monitoring result acquisition module, wherein:
the target binary data acquisition module is used for acquiring target binary data; the target binary data comprises binary data corresponding to each fixed value information;
the monitoring feature code acquisition module is used for splitting target binary data to obtain each subdata and carrying out XOR operation on each subdata to obtain a monitoring feature code;
and the monitoring result acquisition module is used for determining a fixed value monitoring result according to the comparison result of the monitoring feature code and the preset feature code.
In one embodiment, the monitoring feature code obtaining module includes a split length determining unit and a first splitting unit. The split length determining unit is used for determining the split length; the first splitting unit is used for splitting the target binary data according to the splitting length to obtain each subdata with the splitting length.
In one embodiment, the split length is greater than or equal to 16 bits.
In one embodiment, the monitoring feature code obtaining module includes a second splitting unit, and the second splitting unit is configured to split the target binary data from a highest bit of the target binary data to a lowest bit of the target binary data, so as to obtain each sub data.
In an embodiment, the target binary data obtaining module is configured to obtain binary data corresponding to each fixed value information, and merge the binary data corresponding to each fixed value information according to a preset merging sequence to obtain the target binary data.
In one embodiment, the monitoring result obtaining module is configured to determine that the constant value configuration of the relay protection device is normal under the condition that the monitoring feature code is consistent with the preset feature code; otherwise, determining that the constant value configuration of the relay protection equipment is abnormal, and sending an alarm.
In one embodiment, the fixed value information includes a fixed value area code, a fixed value list, and a program version.
For specific limitations of the relay protection setting value monitoring device, reference may be made to the above limitations of the relay protection setting value monitoring method, and details are not described herein again. All modules in the relay protection setting value monitoring device can be completely or partially realized through software, hardware and a combination of the software and the hardware. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a relay protection device, and its internal structure diagram may be as shown in fig. 5. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to realize a relay protection constant value monitoring method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a relay protection device comprising a processor which, when executing a computer program, performs the steps of:
acquiring target binary data; the target binary data comprises binary data corresponding to each fixed value information;
splitting target binary data to obtain each subdata, and performing XOR operation on each subdata to obtain a monitoring feature code;
and determining a fixed value monitoring result according to the comparison result of the monitoring feature code and the preset feature code.
In one embodiment, the processor, when executing the computer program, further performs the steps of: determining a splitting length; and splitting the target binary data according to the splitting length to obtain each subdata with the splitting length.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the split length is greater than or equal to 16 bits.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and splitting the target binary data from the highest bit of the target binary data to the lowest bit of the target binary data to obtain each subdata.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and binary data corresponding to each fixed value information is obtained, and the binary data corresponding to each fixed value information are merged according to a preset merging sequence to obtain target binary data.
In one embodiment, the processor, when executing the computer program, further performs the steps of: if the monitoring feature code is consistent with the preset feature code, determining that the constant value configuration of the relay protection equipment is normal; otherwise, determining that the constant value configuration of the relay protection equipment is abnormal, and sending an alarm.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the fixed value information comprises a fixed value area code, a fixed value list and a program version.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring target binary data; the target binary data comprises binary data corresponding to each fixed value information;
splitting target binary data to obtain each subdata, and performing XOR operation on each subdata to obtain a monitoring feature code;
and determining a fixed value monitoring result according to the comparison result of the monitoring feature code and the preset feature code.
In one embodiment, the computer program when executed by the processor further performs the steps of: determining a splitting length; and splitting the target binary data according to the splitting length to obtain each subdata with the splitting length.
In one embodiment, the computer program when executed by the processor further performs the steps of: the split length is greater than or equal to 16 bits.
In one embodiment, the computer program when executed by the processor further performs the steps of: and splitting the target binary data from the highest bit of the target binary data to the lowest bit of the target binary data to obtain each subdata.
In one embodiment, the computer program when executed by the processor further performs the steps of: and binary data corresponding to each fixed value information is obtained, and the binary data corresponding to each fixed value information are merged according to a preset merging sequence to obtain target binary data.
In one embodiment, the computer program when executed by the processor further performs the steps of: if the monitoring feature code is consistent with the preset feature code, determining that the constant value configuration of the relay protection equipment is normal; otherwise, determining that the constant value configuration of the relay protection equipment is abnormal, and sending an alarm.
In one embodiment, the computer program when executed by the processor further performs the steps of: the fixed value information comprises a fixed value area code, a fixed value list and a program version.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A relay protection constant value monitoring method is characterized by comprising the following steps:
acquiring target binary data; the target binary data comprises binary data corresponding to each fixed value information;
splitting the target binary data to obtain each subdata, and performing XOR operation on each subdata to obtain a monitoring feature code;
and determining a fixed value monitoring result according to the comparison result of the monitoring feature code and a preset feature code.
2. The relay protection fixed value monitoring method according to claim 1, wherein the step of splitting the target binary data to obtain each piece of sub-data comprises:
determining a splitting length;
and splitting the target binary data according to the splitting length to obtain each subdata with the length being the splitting length.
3. The relay protection constant value monitoring method according to claim 2, wherein the splitting length is greater than or equal to 16 bits.
4. The relay protection fixed value monitoring method according to claim 1, wherein the step of splitting the target binary data to obtain each piece of sub-data comprises:
and splitting the target binary data from the highest bit of the target binary data to the lowest bit of the target binary data to obtain each subdata.
5. The relay protection constant value monitoring method according to claim 1, wherein the step of obtaining target binary data includes:
and binary data corresponding to each fixed value information is obtained, and the binary data corresponding to each fixed value information are merged according to a preset merging sequence to obtain the target binary data.
6. Determining a fixed value monitoring result according to the comparison result of the monitoring feature code and a preset feature code, wherein the step comprises the following steps:
if the monitoring feature code is consistent with the preset feature code, determining that the constant value configuration of the relay protection equipment is normal; otherwise, determining that the constant value configuration of the relay protection equipment is abnormal, and sending an alarm.
7. The relay protection constant value monitoring method according to any one of claims 1 to 6, wherein the constant value information includes a constant value area code, a constant value list and a program version.
8. A relay protection constant value monitoring device, the device comprising:
the target binary data acquisition module is used for acquiring target binary data; the target binary data comprises binary data corresponding to each fixed value information;
the monitoring feature code acquisition module is used for splitting the target binary data to obtain each subdata and performing XOR operation on each subdata to obtain a monitoring feature code;
and the monitoring result acquisition module is used for determining a fixed value monitoring result according to the comparison result of the monitoring feature code and a preset feature code.
9. A relay protection device comprising a processor, wherein the processor when executing a computer program implements the steps of the method of any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202110510395.XA 2021-05-11 2021-05-11 Relay protection constant value monitoring method and device, relay protection equipment and storage medium Active CN113178842B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110510395.XA CN113178842B (en) 2021-05-11 2021-05-11 Relay protection constant value monitoring method and device, relay protection equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110510395.XA CN113178842B (en) 2021-05-11 2021-05-11 Relay protection constant value monitoring method and device, relay protection equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113178842A true CN113178842A (en) 2021-07-27
CN113178842B CN113178842B (en) 2023-11-17

Family

ID=76928714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110510395.XA Active CN113178842B (en) 2021-05-11 2021-05-11 Relay protection constant value monitoring method and device, relay protection equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113178842B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116631492A (en) * 2023-07-25 2023-08-22 中国电力科学研究院有限公司 Relay protection method and system based on multi-core processor chip
CN116760851A (en) * 2023-08-18 2023-09-15 绛县祥信盈风力发电有限公司 Cloud storage method for relay protection fixed value list

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1574006A (en) * 2003-06-19 2005-02-02 三星电子株式会社 Apparatus and method for detecting binary data
JP2012182904A (en) * 2011-03-01 2012-09-20 Chugoku Electric Power Co Inc:The Transfer interrupting system for distributed power supply, and setting value processing device
CN104618064A (en) * 2015-02-13 2015-05-13 广州供电局有限公司 Monitoring method and device for static information based on CRC (Cyclic Redundancy Check) inspection
CN105337247A (en) * 2015-12-04 2016-02-17 国网浙江省电力公司 Setting value downloading method and system of smart grid relay protection device
CN106296450A (en) * 2016-08-05 2017-01-04 广东电网有限责任公司电力调度控制中心 The fixed value modification method and system of self checking mechanism
CN111078462A (en) * 2019-12-26 2020-04-28 海光信息技术有限公司 Data checking method and circuit
CN112104412A (en) * 2020-11-17 2020-12-18 四川九洲电器集团有限责任公司 Accelerator suitable for low-orbit satellite broadband communication
CN112217525A (en) * 2020-10-15 2021-01-12 天津津航计算技术研究所 Automatic updating method for iterative times of Turbo decoding

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1574006A (en) * 2003-06-19 2005-02-02 三星电子株式会社 Apparatus and method for detecting binary data
JP2012182904A (en) * 2011-03-01 2012-09-20 Chugoku Electric Power Co Inc:The Transfer interrupting system for distributed power supply, and setting value processing device
CN104618064A (en) * 2015-02-13 2015-05-13 广州供电局有限公司 Monitoring method and device for static information based on CRC (Cyclic Redundancy Check) inspection
CN105337247A (en) * 2015-12-04 2016-02-17 国网浙江省电力公司 Setting value downloading method and system of smart grid relay protection device
CN106296450A (en) * 2016-08-05 2017-01-04 广东电网有限责任公司电力调度控制中心 The fixed value modification method and system of self checking mechanism
CN111078462A (en) * 2019-12-26 2020-04-28 海光信息技术有限公司 Data checking method and circuit
CN112217525A (en) * 2020-10-15 2021-01-12 天津津航计算技术研究所 Automatic updating method for iterative times of Turbo decoding
CN112104412A (en) * 2020-11-17 2020-12-18 四川九洲电器集团有限责任公司 Accelerator suitable for low-orbit satellite broadband communication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
盛海华等: "适应智能电网继电保护定值的在线管控方案", 《电力系统自动化》 *
盛海华等: "适应智能电网继电保护定值的在线管控方案", 《电力系统自动化》, no. 15, 10 August 2016 (2016-08-10), pages 160 - 164 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116631492A (en) * 2023-07-25 2023-08-22 中国电力科学研究院有限公司 Relay protection method and system based on multi-core processor chip
CN116631492B (en) * 2023-07-25 2023-09-26 中国电力科学研究院有限公司 Relay protection method and system based on multi-core processor chip
CN116760851A (en) * 2023-08-18 2023-09-15 绛县祥信盈风力发电有限公司 Cloud storage method for relay protection fixed value list
CN116760851B (en) * 2023-08-18 2023-10-17 绛县祥信盈风力发电有限公司 Cloud storage method for relay protection fixed value list

Also Published As

Publication number Publication date
CN113178842B (en) 2023-11-17

Similar Documents

Publication Publication Date Title
CN112148577B (en) Data anomaly detection method and device, electronic equipment and storage medium
CN111880740B (en) Data processing method, device, computer system and readable storage medium
CN113178842A (en) Relay protection setting value monitoring method and device, relay protection equipment and storage medium
CN112416728A (en) Buried point data acquisition method and device, client device and readable storage medium
CN105786702A (en) Computer software analysis system
US20220035532A1 (en) System and method for using free space to improve erasure code locality
CN111475324A (en) Log information analysis method and device, computer equipment and storage medium
CN114722387A (en) Database abnormal tampering detection method, device, equipment and storage medium
CN117391099A (en) Data downloading and checking method and system for smart card and storage medium
CN117499412A (en) Cluster optimization processing method based on high-availability link and related equipment thereof
CN112256532A (en) Test interface generation method and device, computer equipment and readable storage medium
CN116610336A (en) Firmware upgrading method, system, device and readable storage medium
CN115017436B (en) Data interaction method and device of application program, computer equipment and storage medium
Levitin et al. Optimal backup in heterogeneous standby systems exposed to shocks
CN115617634A (en) Nuclear power equipment abnormity diagnosis method and device based on 5G and computer equipment
CN114564336A (en) Data consistency checking method, device, equipment and storage medium
CN110879757B (en) Restarting method and device for abnormal operation of client and computer equipment
CN112540799A (en) Management method, system, terminal device and storage medium of startup data
CN111723153A (en) Data synchronous processing method, device, equipment and storage medium
CN111752600A (en) Code anomaly detection method and device, computer equipment and storage medium
CN112379918B (en) Code issuing method, device, computer equipment and storage medium
CN115828977B (en) Industrial Internet label coding method, device, medium and electronic equipment
CN115062353B (en) Trusted computing system and trusted computing method based on single chip
CN114578714B (en) Method and device for determining simulation operation times based on performance index convergence control
CN113627938B (en) Data deleting method, device and equipment of block chain and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant