Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus, a repetitive description thereof will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations, or operations have not been shown or described in detail to avoid obscuring aspects of the disclosure.
The block diagrams depicted in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow diagrams depicted in the figures are merely exemplary in nature and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution order may be changed according to the actual situation.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various components, these components should not be limited by these terms. These terms are used to distinguish one element from another. Thus, a first component discussed below may be termed a second component without departing from the teachings of the disclosed concept. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It is to be understood by those skilled in the art that the drawings are merely schematic representations of exemplary embodiments, and that the blocks or processes shown in the drawings are not necessarily required to practice the present disclosure and are, therefore, not intended to limit the scope of the present disclosure.
Fig. 1 is a system block diagram illustrating a processing method and apparatus for substation anti-misoperation according to an exemplary embodiment.
As shown in fig. 1, the system architecture may includeterminal devices 101, 102, 103, anetwork 104 and aserver 105. Thenetwork 104 is used to provide the medium of communication links between theterminal devices 101, 102, 103 and theserver 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may use theterminal devices 101, 102, 103 to interact with theserver 105 via thenetwork 104 to receive or send messages or the like. Theterminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a shopping application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
Theterminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
Theserver 105 may be a server providing various services, for example, a server performing background management on information of the power transmission and transformation running devices collected by the user using theterminal devices 101, 102, and 103. Theserver 105 may analyze and perform other processing on the received alarm information of the power transmission and transformation operating device, and feed back a processing result to the terminal device.
Theserver 105 may, for example, obtain historical data and real-time data of a plurality of power transmission and transformation operating devices;server 105 may, for example, analyze the historical data and the real-time data to determine a risk value for each of a plurality of electric transmission and transformation operating devices;server 105 may generate risk information, for example, when the risk value exceeds a threshold; theserver 105 may, for example, send the risk information to the target person in accordance with the first template.
Theserver 105 may, for example, obtain alarm information for the electric transmission and transformation operating equipment; theserver 105 may analyze the alarm information, for example, through multiple dimensions, to determine a label of the power transmission and transformation operating equipment; theserver 105 may determine the hidden danger target device, for example, from the tag.
Theserver 105 may, for example, send the alert information to the target person in accordance with the second template; theserver 105 may, for example, process the real-time warning information according to the operation procedure corresponding to the warning information.
Theserver 105 may, for example, store the alert information; theserver 105 may analyze the alert information, for example, periodically.
Theserver 105 may be a physical server, or may be composed of a plurality of servers, for example, it should be noted that the power transmission and transformation operation equipment early warning method provided by the embodiment of the present disclosure may be executed by theserver 105, and accordingly, the power transmission and transformation operation equipment early warning device may be disposed in theserver 105.
Fig. 2 is a flowchart illustrating a processing method for substation anti-misoperation according to an exemplary embodiment. The power transmission and transformation operation equipment early warning method at least comprises the steps S202 to S208.
As shown in fig. 2, in S202, historical data and real-time data of a plurality of electric transmission and transformation operating devices are acquired.
In one embodiment, obtaining historical data and real-time data for a plurality of electric transmission and transformation operating devices may include, for example: acquiring historical monitoring information of a plurality of power transmission and transformation operation devices; acquiring defect record information of a plurality of power transmission and transformation operation devices; acquiring system ledger information of a plurality of power transmission and transformation operation devices; acquiring meteorological environment information of a plurality of power transmission and transformation operation devices; and acquiring real-time monitoring information of the plurality of power transmission and transformation operation devices.
According to the analysis research and practice of the centralized monitoring information of the saturated power grid, aiming at the problems of low utilization rate, lack of effective correlation butt joint and the like of the current regulation and control data, a regulation and control cloud database is built by utilizing the monitoring information and typical defect records of the transformer substation and combining system ledgers such as PMS, OMS and the like and information such as meteorological environment, online monitoring and the like, and the massive deep sleep data are fully awakened and regulated. The method is characterized by combining important defects and operation tracking conditions of the equipment, analyzing the operation potential safety hazard of the equipment, deeply excavating monitoring information, and carrying out special analysis on monitoring events, including accident special analysis, abnormal (defect) special analysis, remote operation special analysis and other related special analysis.
In S204, the historical data and the real-time data are analyzed, and a risk value of each of the plurality of power transmission and transformation operating devices is determined.
In one embodiment, analyzing the historical data and the real-time data comprises: analyzing the historical data and real-time data from a time dimension; and/or analyzing the historical data and the real-time data from the spatial dimension; and/or analyzing the historical data and the real-time data from a type dimension; and/or analyzing the historical data and the real-time data from the device dimension.
By analyzing the uploaded information, combining data resources such as equipment ledgers, defect historical records, environmental meteorology and online monitoring information and the like, and utilizing a reasonable organization management method and a scientific technical analysis method, the equipment operation state is deeply excavated by taking equipment hidden dangers as targets in advance of the occurrence of faults and defects of the power transformation equipment, so that the positioning and prejudgment of the equipment hidden dangers are realized, the capability of centralized monitoring for controlling the health condition of key equipment of a transformer substation is improved, and the monitoring operation safety and stability are effectively supported.
For accurate analysis of the device status, an analysis log table can be built as follows:
TABLE 1 analysis and record table for hidden trouble of equipment defect
In S206, when the risk value exceeds a threshold, risk information is generated.
In S208, the risk information is sent to the target person according to the first template. The method comprises the steps of classifying and confirming alarm information every day according to action reasons, rechecking the handling timeliness and correctness of a current value monitor, associating items such as equipment defects, risk identification and problem feedback, and combing, summarizing, monitoring and operating conditions and power grid operating conditions, so that early warning of potential hazards of the power transformation equipment is realized.
According to the early warning method for the power transmission and transformation operation equipment, accident tripping and defect events are compared and information monitoring alarming is carried out by utilizing different technologies based on different dimensions in the process of information review and excavation, correlation analysis, time sequence analysis, frequency analysis and text analysis of information and hidden dangers are carried out, alarm information is generated, quality attributes, relation attributes and state attribute labels are added, potential hidden dangers are located, and the potential hidden dangers are listed in an equipment hidden danger library through analysis and processing, so that early warning and locating of the hidden dangers are achieved.
It should be clearly understood that this disclosure describes how to make and use particular examples, but the principles of this disclosure are not limited to any details of these examples. Rather, these principles can be applied to many other embodiments based on the teachings of the present disclosure.
Fig. 3 is a flow chart illustrating a processing method for substation anti-misoperation according to another exemplary embodiment. The power transmission and transformation operation equipment early warning method in fig. 3 is further described in the method in fig. 2, and includes steps S302 to S306.
In S302, alarm information of the power transmission and transformation operation device is acquired. Further comprising: sending the alarm information to a target person according to a second template; and the target personnel processes the real-time alarm information according to the operation procedure corresponding to the alarm information.
In S304, the alarm information is analyzed through multiple dimensions, and a label of the power transmission and transformation operating device is determined.
In one embodiment, analyzing the alarm information through multiple dimensions, and determining the label of the power transmission and transformation operation device includes: analyzing the alarm information through a correlation analysis method to determine a label of the power transmission and transformation operation equipment; and/or analyzing the alarm information by a time sequence analysis method to determine the label of the power transmission and transformation operation equipment; and/or analyzing the alarm information by a frequency analysis method to determine the label of the power transmission and transformation operation equipment; and/or analyzing the alarm information through a text analysis method to determine the label of the power transmission and transformation operation equipment.
In one embodiment, analyzing the alarm information through multiple dimensions, and determining the label of the power transmission and transformation operation device includes: determining a quality attribute label according to the alarm information; determining a relation attribute tag according to the alarm information; and determining the state attribute label according to the alarm information.
In S306, the hidden danger target device is determined according to the tag.
According to the early warning method for the power transmission and transformation operation equipment, the data-permeable hidden trouble management system for the power transmission and transformation operation equipment is applied, the monitoring working efficiency and the monitoring effect are greatly improved, a large amount of labor cost is saved, the service life of the equipment is prolonged, the maintenance cost is reduced, and the indirect economic benefit is realized by 2 million yuan each year.
The data-penetration-type hidden danger management system for the power transmission and transformation operation equipment effectively improves the operation management and control level of the power grid equipment, strengthens and ensures the safety and stability of the power grid, particularly the operation safety of the power grid in heavy rainfall, typhoon and summer time facing the peak, avoids large-area power failure events and improves the reliability of power supply service.
Fig. 4 is a flowchart illustrating a processing method for substation anti-misoperation according to another exemplary embodiment. The power transmission and transformation operation equipment early warning method in fig. 4 is further described in the method in fig. 2, and includes steps S402 to S426.
In S402, the alarm information matches the grid time, and an event tag is added.
In S404, the association is analyzed.
In S406, the timing is analyzed.
In S408, the frequency is analyzed.
In S410, the text is analyzed.
In S412, a tag is added to the alarm information.
In S414, the hidden danger device is determined.
In S416, whether a special analysis is performed.
At S418, a special analysis agent is included.
In S420, the closed loop is tracked.
In S422, rectification is required.
In S424, an rectification notification is initiated.
In S426, the equipment hidden danger library is added.
The method has the advantages that the discovery and the control of hidden dangers are enhanced in daily work, the technical support of advanced applications such as intelligent patrol functions and the like in comprehensive intelligent alarm is perfected by means of information analysis and enhancement of scheduling technology support system function technology application, long-term tracking and deep excavation are carried out on abnormal information through deep analysis and patrol of monitoring information, equipment hidden dangers are discovered in time, monitoring operation work is promoted to be changed from passive receiving to active precaution, a normal state mechanism of monitoring information comprehensive improvement and monitoring risk identification and hidden danger investigation is established, potential problems and equipment hidden dangers which are difficult to discover in normal monitoring work of a monitor are effectively made up, and the safe operation level of a power grid is further improved.
Through periodic hidden danger early warning and positioning work, a regulation and control mechanism organizes systematic monitoring information recheck, deeply excavates the value of the monitoring information, perfects a monitoring operation safety control mechanism, classifies and confirms daily warning information according to action reasons, rechecks the handling timeliness and correctness of a current value monitor, associates items such as equipment defect, risk identification and problem feedback, and combs, summarizes, monitors and operates and the power grid operation condition, so that the early warning of the hidden danger of the power transformation equipment is realized.
For example, in the process of checking monitoring information, a person in a power grid in a certain place discovers that potential hazards of voltage transformation in the 110kV era can exist through frequency analysis of the monitoring information, the probability of the potential hazards of a secondary circuit is judged to be the maximum in advance, and the insulation of a voltage transformation secondary terminal in a station is reduced due to high humidity in the plum rain season after on-site inspection and feedback of an overhaul unit, so that the defect of the voltage transformation secondary circuit is developed if measures are not taken timely.
And carrying out deep sorting analysis on the eliminated defects, and inquiring and matching according to information such as equipment type, equipment manufacturer, equipment model, defect parts, delivery date and the like. If any sub item has more than 3 same problems, special analysis work is established for the related defects, the hidden danger of the equipment is further excavated, and the early warning of the hidden danger is perfected. The method has obvious effect of deeply analyzing and continuously tracking abnormal information, for example, potential safety hazards caused by poor insulation of a direct-current system of more 220 kV substations are discovered and processed, and hidden defects such as low power supply quality caused by three-phase imbalance of 10kV bus voltages of a plurality of substations are detected, so that major accidents are avoided.
Those skilled in the art will appreciate that all or part of the steps implementing the above embodiments are implemented as computer programs executed by a CPU. When executed by the CPU, performs the above-described functions defined by the above-described methods provided by the present disclosure. The program may be stored in a computer readable storage medium, which may be a read-only memory, a magnetic or optical disk, or the like.
Furthermore, it should be noted that the above-mentioned figures are only schematic illustrations of the processes involved in the methods according to exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
Fig. 5 is a block diagram illustrating an early warning apparatus for power transmission and transformation operating equipment according to an exemplary embodiment. The power transmission and transformation operation equipment early warning device includes: adata module 502, ananalysis module 504, adetermination module 506, and a sendingmodule 508.
Thedata module 502 is configured to obtain historical data and real-time data of a plurality of power transmission and transformation operating devices; examples of such methods include: acquiring historical monitoring information of a plurality of power transmission and transformation operation devices; acquiring defect record information of a plurality of power transmission and transformation operation devices; acquiring system ledger information of a plurality of power transmission and transformation operation devices; acquiring meteorological environment information of a plurality of power transmission and transformation operation devices; and acquiring real-time monitoring information of the plurality of power transmission and transformation operation devices.
Theanalysis module 504 is configured to analyze the historical data and the real-time data, and determine a risk value of each of the plurality of power transmission and transformation operating devices; analyzing the historical data and real-time data from a time dimension; and/or analyzing the historical data and the real-time data from the spatial dimension; and/or analyzing the historical data and the real-time data from a type dimension; and/or analyzing the history data and the real-time data from the device dimension.
The judgingmodule 506 is configured to generate risk information when the risk value exceeds a threshold; and
the sendingmodule 508 is configured to send the risk information to the target person according to the first template. The method comprises the steps of classifying and confirming daily alarm information according to action reasons, rechecking the handling timeliness and correctness of a current value monitor, associating items such as equipment defects, risk identification and problem feedback, and combing, summarizing, monitoring and operating conditions and power grid operating conditions, so that early warning of potential hazards of the power transformation equipment is realized.
According to the early warning device for the power transmission and transformation operation equipment, accident tripping and defect events are compared and monitored information is alarmed by using different technologies based on different dimensions in the process of information review and excavation, correlation analysis, time sequence analysis, frequency analysis and text analysis of information and hidden dangers are carried out, alarm information is generated, quality attributes, relation attributes and state attribute labels are added, potential hidden dangers are located, the hidden dangers are listed in an equipment hidden danger library through analysis and processing, and early warning location of the hidden dangers is achieved.
Fig. 6 is a block diagram illustrating an early warning apparatus for power transmission and transformation operating equipment according to another exemplary embodiment. The early warning device of the power transmission and transformation operation equipment further comprises: analarm module 602, atag module 604, and anequipment module 606.
Thealarm module 602 is configured to obtain alarm information of the power transmission and transformation operating device; further comprising: sending the alarm information to a target person according to a second template; and the target personnel processes the real-time alarm information according to the operation procedure corresponding to the alarm information.
Thelabel module 604 is configured to analyze the alarm information in multiple dimensions to determine a label of the power transmission and transformation operating device; the method comprises the following steps: analyzing the alarm information through a correlation analysis method to determine a label of the power transmission and transformation operation equipment; and/or analyzing the alarm information by a time sequence analysis method to determine the label of the power transmission and transformation operation equipment; and/or analyzing the alarm information by a frequency analysis method to determine the label of the power transmission and transformation operation equipment; and/or analyzing the warning information by a text analysis method to determine the label of the power transmission and transformation operation equipment.
Thedevice module 606 is configured to determine a hidden danger target device according to the tag.
The utility model provides a power transmission and transformation operation equipment early warning device, the hidden trouble management system of power transmission and transformation operation equipment of application data infiltration type promotes monitoring work efficiency and effect by a wide margin, saves a large amount of human costs, extension equipment life reduces the cost of overhaul, realizes that indirect economic benefits totals 2 hundred million yuan every year.
FIG. 7 is a block diagram illustrating an electronic device in accordance with an example embodiment.
Anelectronic device 200 according to this embodiment of the present disclosure is described below with reference to fig. 7. Theelectronic device 200 shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 7, theelectronic device 200 is embodied in the form of a general purpose computing device. The components of theelectronic device 200 may include, but are not limited to: at least oneprocessing unit 210, at least onememory unit 220, abus 230 connecting different system components (including thememory unit 220 and the processing unit 210), adisplay unit 240, and the like.
Wherein the storage unit stores program code executable by theprocessing unit 210 to cause theprocessing unit 210 to perform the steps according to various exemplary embodiments of the present disclosure described in the above-mentioned electronic prescription flow processing method section of the present specification. For example, theprocessing unit 210 may perform the steps as shown in fig. 2, 3, 4.
Thememory unit 220 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)2201 and/or acache memory unit 2202, and may further include a read only memory unit (ROM) 2203.
Thestorage unit 220 may also include a program/utility 2204 having a set (at least one) ofprogram modules 2205,such program modules 2205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 230 may be one or more of any of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
Theelectronic device 200 may also communicate with one or more external devices 300 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with theelectronic device 200, and/or with any devices (e.g., router, modem, etc.) that enable theelectronic device 200 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O)interface 250. Also, theelectronic device 200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as an Internet, via thenetwork adapter 260. Thenetwork adapter 260 may communicate with other modules of theelectronic device 200 via thebus 230. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with theelectronic device 200, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the embodiments described herein may be implemented by software, or may be implemented by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, or a network device, etc.) to execute the above method according to the embodiments of the present disclosure.
Fig. 8 schematically illustrates a computer-readable storage medium in an exemplary embodiment of the disclosure.
Referring to fig. 8, aprogram product 400 for implementing the above method according to an embodiment of the present disclosure is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present disclosure is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The computer readable medium carries one or more programs which, when executed by a device, cause the computer readable medium to perform the functions of: acquiring historical data and real-time data of a plurality of power transmission and transformation operation devices; analyzing the historical data and the real-time data, and determining a risk value of each power transmission and transformation operation device in a plurality of power transmission and transformation operation devices; generating risk information when the risk value exceeds a threshold; and sending the risk information to the target personnel according to the first template.
Those skilled in the art will appreciate that the modules described above may be distributed in the apparatus according to the description of the embodiments, or may be modified accordingly in one or more apparatuses unique from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Exemplary embodiments of the present disclosure are specifically illustrated and described above. It is to be understood that the present disclosure is not limited to the precise arrangements, instrumentalities, or instrumentalities described herein; on the contrary, the disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.