A Detection Method of Malicious Data in Power System Based on Jensen-Shannon Distance
A technology of malicious data and detection methods, applied in the fields of electrical digital data processing, instruments, computing, etc., can solve the problem of inability to detect malicious data, and achieve the goal of improving engineering practicability, improving success rate, good stability and practicability. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0080] Introduce the calculation example of the present invention below:
[0081] The calculation example tested by the present invention is a standard IEEE14 node system, such as figure 2 shown. The load change curve in this system is the load data of the 220 kV bus in an actual area, and the sampling interval is 5 minutes; The redundancy is 2.5 (the measurement redundancy of the actual transmission network is around 3).
[0082] The power system is a quasi-steady state system, so the state of the system changes slowly at adjacent moments, and the corresponding quantity measurement changes are also small. Assume that the real-time quantity measurement of the system at time k is z k , the measurement change at this moment is Δz k =z k -z k-1 . Such as Figure 3 to Figure 6 Shown is the histogram of the IEEE14 power-saving system measurement change from December 2010 to March 2011.
[0083] Depend on Figure 3 to Figure 6 It can be seen that when the power system is ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


