WO2014005405A1 - 一种适应于安全稳定控制装置的策略表搜索算法 - Google Patents
一种适应于安全稳定控制装置的策略表搜索算法 Download PDFInfo
- Publication number
- WO2014005405A1 WO2014005405A1 PCT/CN2012/086687 CN2012086687W WO2014005405A1 WO 2014005405 A1 WO2014005405 A1 WO 2014005405A1 CN 2012086687 W CN2012086687 W CN 2012086687W WO 2014005405 A1 WO2014005405 A1 WO 2014005405A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- policy
- layer
- stability control
- tree
- node
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
Definitions
- the present invention belongs to the field of power systems and their automation technologies, and more particularly to a strategy table search algorithm adapted to a security and stability control device.
- the safety and stability control device is an important device for ensuring the safe and stable operation of the second and third lines of the power system.
- the control strategy table is used to realize the function of the safety and stability control device.
- the control mode is the most commonly used control mode. figure 1.
- the total strategy table consists of several sub-strategy tables, each of which has a sub-strategy table (Ti) for each mode of operation (Yi), and the sub-strategy table is divided by the faulty component (L) of the grid and the fault type (K) of the component.
- the safety and stability control device After detecting the failure of the power grid, the safety and stability control device determines the control measures to be taken by searching the strategy table. Therefore, the efficiency of the search algorithm directly determines the control speed of the safety and stability control device.
- the traditional strategy table search algorithm searches for each policy element cycle, and its algorithm can be expressed as:
- the object of the present invention is to provide a fast and effective strategy table search algorithm suitable for a security and stability control device for the shortcomings of the above strategy table search algorithm, thereby improving the control speed of the security and stability control device.
- the policy table of the security and stability control device is divided into five basic policy elements: operation mode, fault component, fault type, power flow mode and control measure.
- the tree structure is used to store and describe the five basic policy elements of the policy table.
- the tree structure consists of the root node layer and five basic policy element layers.
- the five basic policy element layers are represented by the root node layer as the operation mode layer, the fault component layer, the fault type layer, the power flow mode layer, and the control measures. Layer, each layer corresponds to a policy element.
- the leaf nodes in the tree structure are incremented from zero to the initial weight in order from left to right, and then the bottom will be
- the leaf node weight with the largest weight in the leaf node set with the common parent node is assigned to the parent node, and the weighted tree is obtained.
- a hash function Construct a hash function according to the weighted tree, first construct a quaternion variable function, wherein the quaternion variables are the leaf node weights corresponding to the operation mode, the fault component, the fault type, and the power flow mode, respectively, and the quaternion group
- the value field of the variable function is the leaf node weight corresponding to the control measure, and then each path in the weighted tree is represented as a function map of the quad variable function and a mapping table is generated, and finally constructed according to the mapping table.
- Hash function Construct a hash function according to the weighted tree, first construct a quaternion variable function, wherein the quaternion variables are the leaf node weights corresponding to the operation mode, the fault component, the fault type, and the power flow mode, respectively, and the quaternion group
- the value field of the variable function is the leaf node weight corresponding to the control measure, and then each path in the weighted tree is represented as
- step 3 Search the control strategy using the hash function constructed in step 3. For the given operation mode, faulty component, fault type, and power flow mode value, the corresponding control measures are obtained from the hash function.
- the invention has the beneficial effects that: the invention adopts a search algorithm for constructing a hash function, and the time complexity is 0 (1), which can greatly improve the search efficiency, improve the search speed of the strategy table, improve the response speed of the device, and improve the control effect. .
- the device storage space can fully meet the space complexity requirements of the algorithm, so that the invention has good practicability.
- Figure 1 is a schematic diagram of the general format of the control policy table.
- FIG. 2 is a schematic view of a tree structure of the present invention.
- FIG. 3 is a schematic diagram of a weighted tree structure of the present invention.
- Figure 4 is a specific flow chart of the present invention.
- Figure 4 shows a specific flow chart of the present invention, in which the strategy of the safety and stability control device is firstly outlined. It is divided into five basic strategy elements: operation mode, fault component, fault type, power flow mode and control measures.
- the tree structure is used to store and describe the five basic strategy elements of the policy table.
- the tree structure consists of the root node layer and five basic elements.
- the policy element layer is composed of five basic policy element layers, which are respectively represented by the root node layer as the operation mode layer, the fault component layer, the fault type layer, the power flow mode layer, and the control measure layer, and each layer corresponds to one policy element.
- the five-layer structure of the policy table tree structure can be expressed as L n ( ne [1, 5] ), as shown in FIG. 2 .
- a policy table of a stable control system is shown in Table 1, where m is the operation mode, e is the fault component, f is the fault type, p is the power flow mode, and c is the control measure:
- the quaternion variable function f is constructed first, wherein the quaternion quantities are the leaf nodes corresponding to the operation mode x, the fault component, the fault type 2, and the power flow mode k respectively.
- the value of each variable is zero, it means that the corresponding policy element in this control strategy does not exist.
- mapping table of hash functions f(x, y, z, k) as shown in Table 2 can be constructed:
- control strategy (L lX , L 2 y, L 3 z, L 4 k, L 5 c) is searched according to the constructed hash function f(x, y, z, k).
- the value of x, y, z, k is given in the hash function f(x, y, z, k)
- the corresponding control measure L 5 c is immediately obtained with a time complexity of 0 (1).
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Supply And Distribution Of Alternating Current (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BR112015000033-9A BR112015000033B1 (pt) | 2012-07-05 | 2012-12-14 | Método de busca de tabela de estratégia adaptado a um dispositivo de controle de segurança e estabilidade. |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210230978.8A CN102831158B (zh) | 2012-07-05 | 2012-07-05 | 一种适应于安全稳定控制装置的策略表搜索方法 |
CN201210230978.8 | 2012-07-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014005405A1 true WO2014005405A1 (zh) | 2014-01-09 |
Family
ID=47334295
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2012/086687 WO2014005405A1 (zh) | 2012-07-05 | 2012-12-14 | 一种适应于安全稳定控制装置的策略表搜索算法 |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN102831158B (zh) |
BR (1) | BR112015000033B1 (zh) |
WO (1) | WO2014005405A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113991678A (zh) * | 2021-11-01 | 2022-01-28 | 中国南方电网有限责任公司 | 一种电力系统的稳控分析方法、装置、介质和设备 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102831158B (zh) * | 2012-07-05 | 2015-12-09 | 国电南瑞科技股份有限公司 | 一种适应于安全稳定控制装置的策略表搜索方法 |
CN106250356B (zh) * | 2016-08-09 | 2019-09-10 | 南京国电南自电网自动化有限公司 | 基于Hash表的继电保护装置抽象对象的快速解析方法 |
CN106356850B (zh) * | 2016-11-04 | 2019-05-14 | 广东电网有限责任公司电力调度控制中心 | 安全稳定控制装置故障离线控制策略模型的生成方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101299535A (zh) * | 2007-11-08 | 2008-11-05 | 国网南京自动化研究院 | 大电网连锁故障及异地多点故障的自动识别控制方法 |
CN101299534A (zh) * | 2007-11-08 | 2008-11-05 | 江苏省电力公司 | 电力系统暂态稳定和热稳定协调紧急控制方法 |
CN101576929A (zh) * | 2009-06-16 | 2009-11-11 | 程治永 | 一种快速词条提示的实现方法 |
CN102831158A (zh) * | 2012-07-05 | 2012-12-19 | 国网电力科学研究院 | 一种适应于安全稳定控制装置的策略表搜索算法 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1878164A (zh) * | 2005-06-08 | 2006-12-13 | 华为技术有限公司 | E.164号码域名存储和查询方法 |
-
2012
- 2012-07-05 CN CN201210230978.8A patent/CN102831158B/zh active Active
- 2012-12-14 BR BR112015000033-9A patent/BR112015000033B1/pt active IP Right Grant
- 2012-12-14 WO PCT/CN2012/086687 patent/WO2014005405A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101299535A (zh) * | 2007-11-08 | 2008-11-05 | 国网南京自动化研究院 | 大电网连锁故障及异地多点故障的自动识别控制方法 |
CN101299534A (zh) * | 2007-11-08 | 2008-11-05 | 江苏省电力公司 | 电力系统暂态稳定和热稳定协调紧急控制方法 |
CN101576929A (zh) * | 2009-06-16 | 2009-11-11 | 程治永 | 一种快速词条提示的实现方法 |
CN102831158A (zh) * | 2012-07-05 | 2012-12-19 | 国网电力科学研究院 | 一种适应于安全稳定控制装置的策略表搜索算法 |
Non-Patent Citations (1)
Title |
---|
ZHANG, YAN ET AL.: "A new method of expression and storage on decision table for the stability control of power systems", RELAY, vol. 31, no. 12, 15 December 2003 (2003-12-15), pages 55 - 57, 63 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113991678A (zh) * | 2021-11-01 | 2022-01-28 | 中国南方电网有限责任公司 | 一种电力系统的稳控分析方法、装置、介质和设备 |
CN113991678B (zh) * | 2021-11-01 | 2023-09-26 | 中国南方电网有限责任公司 | 一种电力系统的稳控分析方法、装置、介质和设备 |
Also Published As
Publication number | Publication date |
---|---|
BR112015000033B1 (pt) | 2021-11-16 |
BR112015000033A2 (pt) | 2017-08-01 |
CN102831158B (zh) | 2015-12-09 |
CN102831158A (zh) | 2012-12-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cui et al. | DDoS detection and defense mechanism based on cognitive-inspired computing in SDN | |
CN105227645A (zh) | 一种云数据迁移方法 | |
WO2014005405A1 (zh) | 一种适应于安全稳定控制装置的策略表搜索算法 | |
CN103810244A (zh) | 一种基于数据分布的分布式数据存储系统的扩容方法 | |
CN103455531B (zh) | 一种支持高维数据实时有偏查询的并行索引方法 | |
CN103646051B (zh) | 一种基于列存储的大数据并行处理系统及方法 | |
CN104077423A (zh) | 一种基于一致性散列的结构化数据存储、查询和迁移方法 | |
WO2011011916A1 (zh) | 正则表达式匹配方法和系统及查找装置 | |
WO2015062182A1 (zh) | 大规模分布异构数据的虚拟化方法 | |
Liao et al. | An improved parallel K-means clustering algorithm with MapReduce | |
JP2016531355A5 (zh) | ||
CN105243081B (zh) | 一种基于形式概念的文件系统目录结构组织方法 | |
CN106126334A (zh) | 概率性重复数据删除感知的工作负载迁移 | |
CN103544300B (zh) | 一种云环境下可扩展存储索引结构的实现方法 | |
CN104102699B (zh) | 一种聚簇图集合中的子图检索方法 | |
CN104636814A (zh) | 一种随机森林模型的优化方法及系统 | |
CN103345536B (zh) | 一种语义关联索引方法 | |
Xiao et al. | Write-optimized and consistent skiplists for non-volatile memory | |
CN104809210A (zh) | 一种基于分布式计算框架下海量数据加权top-k查询方法 | |
CN103092767B (zh) | 一种对云计算内部物理机信息内存池的管理方法 | |
Zhang et al. | A novel scalable architecture of cloud storage system for small files based on p2p | |
CN105354243B (zh) | 基于归并聚类的并行化频繁概率子图搜索方法 | |
CN109408505A (zh) | 一种布隆过滤器的生成方法 | |
CN104112025A (zh) | 处理节点计算能力感知的虚拟资产数据划分方法 | |
CN103336829A (zh) | 基于模拟退火算法的查询优化方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12880304 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112015000033 Country of ref document: BR |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12880304 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 112015000033 Country of ref document: BR Kind code of ref document: A2 Effective date: 20150102 |