Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic self-adaptive power system terminal security threat evaluation method

A dynamic self-adaptive and power system technology, applied in data processing applications, instruments, calculations, etc., can solve problems such as poor adaptability of safety evaluation models, large deviations of model algorithms, and limitations of environmental dynamic adaptability

Active Publication Date: 2015-05-27
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the lack of dynamic evaluation considerations makes the adaptability of the security evaluation model poor when the physical environment changes, which is not conducive to actual deployment and application
The dynamic risk assessment based on the neural network algorithm needs to use a large amount of historical data to train the network, and the calculation complexity is high. Usually, the network needs to be retrained after the data changes, which has great limitations on the dynamic adaptability of the environment. In addition, data training There are also problems of overtraining and network instability
The algorithm based on the hidden Markov model has strong theoretical guidance in theory, but in actual use, it has to face the problem of large deviation of the model algorithm caused by data anomalies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic self-adaptive power system terminal security threat evaluation method
  • Dynamic self-adaptive power system terminal security threat evaluation method
  • Dynamic self-adaptive power system terminal security threat evaluation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0072] The following description and drawings illustrate specific embodiments of the invention sufficiently to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely represent possible variations. Individual components and functions are optional unless explicitly required, and the order of operations may vary. Portions and features of some embodiments may be included in or substituted for those of other embodiments. The scope of embodiments of the present invention includes the full scope of the claims, and all available equivalents of the claims. These embodiments of the present invention may be referred to herein, individually or collectively, by the term "invention", which is for convenience only and is not...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a dynamic self-adaptive power system terminal security threat evaluation method. The dynamic self-adaptive power system terminal security threat evaluation method comprises the following steps: acquiring data and cleaning the data; extracting characteristics, namely aiming at independent data generated by a power system terminal, extracting the characteristics to establish a characteristic vector of the power system terminal; constructing an evaluation model; constructing an evaluation set; carrying out fuzzy evaluation: constructing a judgment matrix according to a judgment sample total body and each judgment score; and quantifying an evaluation result. According to the dynamic self-adaptive power system terminal security threat evaluation method, starting from the aspect of a hierarchical model, a related matrix is arranged and a threat effect can be transmitted to the whole model when one party is influenced between layers, so that the risk evaluation of environment dynamic changes is realized. A strategy set is set, and a strategy is selected from the strategy set firstly when dynamic adjustment is needed, so that the evaluation effect can be more rapidly given by applying the model, and the efficiency is greatly improved.

Description

technical field [0001] The invention relates to an assessment method in the technical field of power system security threat assessment, in particular to a dynamic self-adaptive power system terminal security threat assessment method. Background technique [0002] As the power system interacts more frequently with the actual physical world, the security of power terminals is facing more and more challenges. Fully excavating monitoring data information has become one of the important directions of power system for terminal risk assessment and security protection, especially with the development of cyber-physical integration, the attention to the assessment of power system terminal security is more urgent. [0003] At present, there are many security evaluation models. The hierarchical analysis model establishes the security evaluation hierarchy of the terminal from the perspective of security layering and grading, and achieves security transmission through the mutual influence...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q50/06
CPCG06Q50/06
Inventor 叶云余勇石聪聪高鹏曹宛恬
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products