Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

34 results about "Risk theory" patented technology

Engineering-risk wireless-sensing early-warning visualization system and method

The invention relates to an engineering-risk wireless-sensing early-warning visualization system and method. The system comprises a sensor module, a microprocessor module, a wireless receiving and transmitting module, a site early-warning module, a data storage module, a long-distance early-warning module and an upper computer. The sensor module is arranged in an engineering structure and is connected with the microprocessor module. The microprocessor module is connected with the wireless receiving and transmitting module and the upper computer respectively. The wireless receiving and transmitting module is connected with the site early-warning module, the data storage module and the long-distance early-warning module respectively. The site early-warning module is arranged at an engineering site, the long-distance early-warning module is arranged in a long-distance monitoring room, and the data storage module is connected with the upper computer. Compared with the prior art, the engineering-risk wireless-sensing early-warning visualization system and method are used for safety monitoring and early-warning of the civil engineering, a monitoring theory, an engineering risk theory and an automatic control theory are combined, the limitation of an existing monitoring and early-warning method is broken through, real-time feedback and timely early warning are achieved, and safety in the engineering construction and operation process is guaranteed to the maximum degree.
Owner:TONGJI UNIV

Information security risk assessment method oriented to typical metallurgy process control system

The invention provides an information security risk assessment method oriented to a typical metallurgy process control system and belongs to the technical field of industrial control system information security. The system robustness under different attack modes and policies is analyzed by establishing an attack model under the typical scenes of the metallurgy process, and therefore, the security risk assessment on the typical metallurgy process control system in different attack modes and a failure mode can be realized. Based on the risk theory, the method is used for performing the security risk assessment by use of a random probability algorithm by defining the metallurgy process control system as a physical information fusion system; from the two aspects of the occurrence probability and the influence of attack sources or failure sources, a security assessment method based on risk indexes is developed. Quantitative estimation is performed based on risk indexes; a security incident set is created based on the established physical information fusion model and attack model, and then the security incident set is combined with the calculated robustness assessment indexes for the quantitative estimation, and therefore, the weak security links in the control system can be located conveniently.
Owner:AUTOMATION RES & DESIGN INST OF METALLURGICAL IND

Virtual power plant optimization scheduling modeling method based on CVaR

The invention provides a virtual power plant (VPP) optimization scheduling modeling method based on a conditional risk value (CVaR). The risk theory is utilized to discuss a VPP scheduling optimization problem, the VPP contains a large number of renewable energy such as wind and light, the output is different from conventional energy, strong gap and volatility exist, a VPP scheduling optimizationproblem is an uncertainty problem, so VPP scheduling is made to face a possible risk, the CVaR theory can be utilized to accurately measure the risk of the VPP in scheduling operation, and thereby economical efficiency and the risk are balanced. In a target function of traditional VPP scheduling operation, a CVaR item for measuring the risk is added, the target function of a mathematical model ofthe problem is made to not only consider minimum total cost, but also the least risk, the CVaR is multiplied by a weight coefficient and is then added to the target function, and a multi-target problem is converted into a single-target problem for solution. The method is advantaged in that operators with different risk preferences are further graded, and instructive solutions are provided for theVPP operators with the different risk preferences.
Owner:YANCHENG POWER SUPPLY CO STATE GRID JIANGSU ELECTRIC POWER CO +3

Electric power system protection and control method based on risk assessment

The invention discloses an electric power system protection and control method based on a risk assessment. The method comprises the following steps: carrying out the risk assessment on an electric power system, and calculating power network risk values; establishing a protection and control object function; inputting electric power system running states and parameters; and according to the protection and control object function and the power network risk values, formulating electric power system protection and control measures. According to the invention, risk theories are applied to the protection and control of the electric power system, the problem of formulating protection and control measured by reliance on experience of dispatchers is solved, and quantifiable measures can be obtained by use of the method so as to effectively realize safety protection and control of the electric power system. Besides, the method, on the basis of the risk assessment, takes control cost into consideration in an integrated approach, draws up the protection and control object function and formulates the quantifiable protection and control measures according to the object function so as to reduce the control cost as much as possible under the condition that safety protection of the electric power network is realized.
Owner:ELECTRIC POWER SCHEDULING CONTROL CENT OF GUIZHOU POWER GRID CO LTD +1

Power grid operating state assessment method based on risk theory

ActiveCN103646350AComprehensive understanding of risksData processing applicationsIslandingPower grid
The invention discloses a power grid operating state assessment method based on the risk theory. The method comprises the following steps: data is collated, and a data processing module is established; the outage probability of power grid elements is calculated; the element outage probability data is stored; the power grid operating state is extracted through the Monte Carlo method; the system state is analyzed; system state analysis is performed through a submodule 5 to judge whether problems, such as the circuit overload problem, the voltage out-of-limit problem, the bus isolation problem, the problem that a system is separated into isolated islands, etc., occur; the power grid operating risk indicators are calculated; and the power grid operating state risk indicator result is analyzed to give out the weak link of the power grid. According to the invention, risk assessment is performed on the power grid operating state; the actual operating state of the power grid is simulated by using the Monte Carlo method, the event random nature of the power grid is taken into account reasonably; different risk indicators are used, multi-angle and multi-level assessment is performed on the power grid operating state risk; and the power grid operating state risk assessment result is analyzed to give out the weak link of the power grid.
Owner:江西汇能电力工程技术有限公司

Foundation pit risk management method based on big data analysis and foundation pit risk management system based on big data analysis

The invention provides a foundation pit risk management method based on big data analysis and a foundation pit risk management system based on big data analysis. The foundation pit risk management method comprises following steps: step1, establishment of a foundation pit risk management system hardware platform; step2, acquisition of foundation pit risk related information; step 3, dynamic acquisition of foundation pit deformation data; step 4, analysis, comparison, calculation of related data information; step 5, the display of the acquired foundation pit risk related information by adopting visualization means; step6, timely transmission of effective information to information demanders by adopting an Internet way; step7, recording of risk treatment means and treatment results proposed by the information demanders. By adopting an informatization way, the foundation pit risk related information is acquired, the storage, the extraction, the arrangement, and the analysis of the above mentioned information are facilitated; foundation pit data is timely updated; by adopting the constant accumulation and analysis of the foundation pit risk related information, a foundation pit risk theory is in dynamic adjustment, and therefore the risk management is more accurate and effective; the transmission efficiency and the transmission accuracy of the information are improved, and risk prevention early warning is provided.
Owner:上海斯涵福信息科技有限公司

Low frequency risk comprehensive evaluation method for nuclear power accessed to grid

The invention discloses a low frequency risk comprehensive evaluation method for nuclear power accessed to grid, which comprises safety risk evaluation indexes with plant-grid risks combined, a low frequency risk evaluation model integrating safety and economy between the nuclear power and the power grid, and a nuclear power low frequency risk evaluation method for a low frequency safety risk transformation ratio, an index safety risk value, a device low frequency risk sensitivity and the like. The low frequency risk indexes comprise a low frequency risk index for evaluating reduction of the system frequency on the plant-grid influence degree and a device risk index based on a plant-grid low frequency protection device; the low frequency comprehensive risk model is built based on a risk theory and a plant-grid side economic index is introduced, and quantitative analysis on the low frequency risk is realized; and the risk calculation method for the safety risk transformation ratio, the index safety risk value, the device low frequency risk sensitivity and the like is easy to compare and analyze, and a basis is provided for making a protection device parameter optimization scheme and a plant-grid coordination control strategy. The structure is rigorous and clear, and requirements of risk analysis and decision are met; and model parameters have clear meaning and are easy to acquire, the modeling process is clear, quick, convenient, efficient, accuracy and strong in practicability.
Owner:WUHAN UNIV

Method for evaluating the influence of insecticidal protein on adults of propylaea japonica and feeding device

The invention discloses a method for evaluating the influence of insecticidal protein on adults of propylaea japonica and a feeding device. The invention firstly designs a feeding device for simulating the plant gland, and the suction mode of cotton flower extrafloral nectaries is simulated, and then a cotton juice extract is used as a solvent to dissolve the exogenous insecticidal protein, and fructose is added to serve as a phagostimulant of the propylaea japonica adults; a single-pair of the propylaea japonica adults are put into the feeding device with a feeding solution, and enough pea aphids are supplemented to culture in an illumination cultivation box. According to the indexes of the to-be-detected solution on the death rate of the propylaea japonica adults, the egg laying early stage, the egg laying amount and the weight, whether the insecticidal protein has the influence on the propylaea japonica adults or not is judged. On the base of establishing the risk theory of evaluating that the secondary metabolites and the insecticidal protein in the plant interact to influence the propylaea javanica, the natural environment of the insecticidal protein threat which is faced by the propylaea ladyridis can be reflected more truly, the evaluation method is simple, and the applicability is high.
Owner:INST OF COTTON RES CHINESE ACAD OF AGRI SCI

Resource environment bearing capacity measurement and risk management and control method based on risk theory

ActiveCN110288186AImprove processing efficiencyService planning and constructionResourcesData setRisk theory
The invention belongs to the technical field of computer software, and discloses a resource environment bearing capacity measurement and risk management and control method based on the risk theory, which comprises the steps that after collected data are transmitted to a computer, data preprocessing, classification and storage are carried out, risk factor recognition of a resource environment is carried out through the short board technology, and a large database of the resource environment bearing capacity is established; health, property and life risks of the resource environment are calculated and classified according to the resource environment data stored in the computer; resource environment data stored in a computer are called, and a storage data set of resource bearing capacity is established; game analysis is carried out on the basis of benefits-cost ratio, and comprehensive evaluation on resource bearing capacity is carried out; and risk adaptation, transfer and emergency disposal schemes are formulated. According to the risk-based resource environment bearing capacity evaluation principle, the risk-based resource environment bearing capacity evaluation technical method system and evaluation criteria, new theories and key technologies are provided for resource environment bearing capacity evaluation, and a basis is provided for demarcation of three red lines in territorial space development.
Owner:XIAN CENT OF GEOLOGICAL SURVEY CGS

Quantitative optimization analysis method and system for uncertain factors of comprehensive service station

The invention provides a quantitative optimization analysis method and system for uncertain factors of a comprehensive service station. The method comprises the following steps: constructing a probability distribution model of various uncertain factors of the comprehensive service station; introducing stochastic programming and scene analysis, converting comprehensive service station optimization scheduling containing the uncertain factors into optimization of a plurality of determined scenes, wherein each scene set is the probability of the running state of the comprehensive service station at the current time; and calculating expected loss by using a conditional value-at-risk theory, and measuring the influence of uncertain factor fluctuation on a decision target. According to the method, the probability distribution model of various uncertain factors of the comprehensive service station is constructed, the random programming theory and the conditional value-at-risk theory are applied, the influence of uncertain factor fluctuation on a decision-making target is measured, and a bidding model of the comprehensive service station for optimizing multi-type resource output in a market environment is established; the model gives consideration to the robustness and economy of the bidding decision of the comprehensive service station, can deal with severe scenes, and is more practical.
Owner:STATE GRID SHANDONG ELECTRIC POWER +1

An information security risk assessment method for typical metallurgical process control systems

The invention provides an information security risk assessment method oriented to a typical metallurgy process control system and belongs to the technical field of industrial control system information security. The system robustness under different attack modes and policies is analyzed by establishing an attack model under the typical scenes of the metallurgy process, and therefore, the security risk assessment on the typical metallurgy process control system in different attack modes and a failure mode can be realized. Based on the risk theory, the method is used for performing the security risk assessment by use of a random probability algorithm by defining the metallurgy process control system as a physical information fusion system; from the two aspects of the occurrence probability and the influence of attack sources or failure sources, a security assessment method based on risk indexes is developed. Quantitative estimation is performed based on risk indexes; a security incident set is created based on the established physical information fusion model and attack model, and then the security incident set is combined with the calculated robustness assessment indexes for the quantitative estimation, and therefore, the weak security links in the control system can be located conveniently.
Owner:AUTOMATION RES & DESIGN INST OF METALLURGICAL IND

A Risk Theory-Based Evaluation Method of Power Grid Operational State

ActiveCN103646350BComprehensive understanding of risksSpecial data processing applicationsIslandingPower grid
The invention discloses a power grid operating state assessment method based on the risk theory. The method comprises the following steps: data is collated, and a data processing module is established; the outage probability of power grid elements is calculated; the element outage probability data is stored; the power grid operating state is extracted through the Monte Carlo method; the system state is analyzed; system state analysis is performed through a submodule 5 to judge whether problems, such as the circuit overload problem, the voltage out-of-limit problem, the bus isolation problem, the problem that a system is separated into isolated islands, etc., occur; the power grid operating risk indicators are calculated; and the power grid operating state risk indicator result is analyzed to give out the weak link of the power grid. According to the invention, risk assessment is performed on the power grid operating state; the actual operating state of the power grid is simulated by using the Monte Carlo method, the event random nature of the power grid is taken into account reasonably; different risk indicators are used, multi-angle and multi-level assessment is performed on the power grid operating state risk; and the power grid operating state risk assessment result is analyzed to give out the weak link of the power grid.
Owner:江西汇能电力工程技术有限公司

A Risk Theory-Based Method for Determination of Resource and Environment Carrying Capacity and Risk Control

The invention belongs to the technical field of computer software, and discloses a risk theory-based resource and environment bearing capacity measurement and risk control method. After the collected data is transmitted to a computer, data preprocessing, classification and storage are performed, and short board technology is used to carry out Identify the risk factors of the resource environment and establish a large database of the resource and environment carrying capacity; calculate and classify the health, property, and life risks of the resource and environment for the resource and environment data stored in the computer; use the resource and environment data stored in the computer to establish the resource carrying capacity Based on the game analysis based on the benefit-cost ratio, a comprehensive evaluation of resource carrying capacity is carried out; risk adaptation, transfer and emergency response plans are formulated. The risk-based resource and environment carrying capacity evaluation principle, technical method system and evaluation criteria of the present invention provide new theories and key technologies for the evaluation of resource and environment carrying capacity, and provide a basis for the delineation of "three red lines" for land space development.
Owner:XIAN CENT OF GEOLOGICAL SURVEY CGS

Core backbone network frame construction method based on risk theory

The invention relates to an electric power system differentiation planning technology, in particular to a core backbone network frame construction method based on a risk theory, and the method comprises the steps: constructing an electric power system safety risk assessment index system based on the risk theory; calculating the weight of each index based on a CRITIC weighting method; and completing risk assessment through a probabilistic load flow calculation result, constructing a core backbone network frame search model by taking the minimum sum of the comprehensive risk level and the length of the core backbone network frame as an objective function; solving the constructed model based on an improved fireworks algorithm, and repairing the net rack connectivity through a Floyd-Warshall algorithm to obtain a core backbone net rack construction scheme. According to the method, risk factors are fully considered in construction of the core backbone network frame, the adverse conditions of voltage out-of-limit, power out-of-limit and the like are effectively improved, and the risk level of operation of the core backbone network frame is reduced. The risk level of the power system under the large-scale new energy access trend is reduced, and the disaster resistance of the system is improved.
Owner:WUHAN UNIV +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products