[go: up one dir, main page]

CN111143428A - Protection abnormity alarm processing method based on correlation analysis method - Google Patents

Protection abnormity alarm processing method based on correlation analysis method Download PDF

Info

Publication number
CN111143428A
CN111143428A CN201911208235.9A CN201911208235A CN111143428A CN 111143428 A CN111143428 A CN 111143428A CN 201911208235 A CN201911208235 A CN 201911208235A CN 111143428 A CN111143428 A CN 111143428A
Authority
CN
China
Prior art keywords
protection
item
alarm information
data
item set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911208235.9A
Other languages
Chinese (zh)
Other versions
CN111143428B (en
Inventor
邬小坤
王宇恩
万春竹
赵武智
牛静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Power Grid Co Ltd
Original Assignee
Guizhou Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Power Grid Co Ltd filed Critical Guizhou Power Grid Co Ltd
Priority to CN201911208235.9A priority Critical patent/CN111143428B/en
Publication of CN111143428A publication Critical patent/CN111143428A/en
Application granted granted Critical
Publication of CN111143428B publication Critical patent/CN111143428B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2465Query processing support for facilitating data mining operations in structured databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/288Entity relationship models
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Public Health (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Water Supply & Treatment (AREA)
  • Human Resources & Organizations (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to the technical field of protection abnormity alarm processing for data mining analysis of secondary equipment data, and particularly discloses a protection abnormity alarm processing method based on an association analysis method, which comprises the following steps of 1, establishing a transaction database D by utilizing alarm information data in a security system database, and converting the transaction database D into a Boolean transaction database D'; step 2, mining a frequent item set in the D 'by using an Apriori algorithm, scanning the transaction database D' and obtaining a candidate 1-item set C1(ii) a Step 3, setting a minimum support count, and comparing the minimum support count with the value C1Comparing the support counts of the medium item sets to obtain a frequent 1-item set L1And the like. The inventionAnd on the basis of the data of the information protection system, performing correlation analysis on the action alarm information and the protection switching value alarm information of the protection device, and analyzing and mining the relationship between the action alarm information and the protection switching value alarm information to achieve the aim of early warning the protection state of the power system.

Description

Protection abnormity alarm processing method based on correlation analysis method
Technical Field
The invention relates to the technical field of protection abnormity alarm processing for data mining analysis of secondary equipment data.
Background
Generally, power system protection is referred to, and the protection device is mainly concerned, but power grid protection is a system in nature. The main factors influencing the protection performance of the secondary equipment comprise the protection type, the reliability of device hardware, the reliability of a protection principle, the influence of operation and maintenance operation on the protection reliability and the influence of an operation environment on the protection reliability.
Disclosure of Invention
The invention aims to provide a protection abnormity alarm processing method based on a correlation analysis method, which is characterized in that on the basis of data of a protection system, action alarm information of a protection device and protection switching value alarm information are subjected to correlation analysis, and the relation between the action alarm information and the protection switching value alarm information is analyzed and mined, so that the aim of early warning the protection state of an electric power system is fulfilled.
In order to achieve the above object, the basic scheme of the present invention provides a protection anomaly alarm processing method based on an association analysis method, which comprises the following steps,
step 1, establishing a transaction database D by utilizing alarm information data in a security system database, and converting the transaction database D into a Boolean transaction database D';
step 2, mining a frequent item set in the D 'by using an Apriori algorithm, scanning the transaction database D' and obtaining a candidate 1-item set C1
Step 3, setting a minimum support count, and comparing the minimum support count with the value C1Comparing the support counts of the medium item sets to obtain a frequent 1-item set L1
Step 4, from L1Connection generation C2(C2=L1×L1) And scanning D' to obtain C2The support of the middle item set is counted, and C is counted2Repeating the process of step 3 to obtain L2
Step 5, from the set L of frequent 2-item sets2Concatenating to generate a set C of candidate 3-item sets3In the connection process, only the item set with one common item can be connected, and the connection result is frequently verified that all non-empty subsets of the connection result are also connected, and C is obtained3Then carrying out support degree verification, and repeating the process until no item set meets the requirement, namely
Figure BDA0002297413200000025
Then
Figure BDA0002297413200000026
At this point, the frequent item set mining process is finished;
step 6, generating association rules by the frequent item sets after obtaining the frequent item sets of the transaction database D', and setting a minimum confidence threshold value to obtain strong association rules;
and 7, analyzing the obtained frequent item set and the association rule.
Further, step 6 specifically comprises:
the first step is as follows: for each frequent item set l, obtaining all non-empty subsets s of the l;
the second step is that: for each non-null s of l, calculate
Figure BDA0002297413200000021
Degree of confidence of
Figure BDA0002297413200000022
If it is not
Figure BDA0002297413200000023
Not less than the minimum confidence threshold Min _ confidence, then the strong association rule can be obtained
Figure BDA0002297413200000024
Further, the step 1 specifically comprises:
data preprocessing is carried out on data of a transaction database D, fault occurrence time is divided according to different seasons in one year, namely attribute value discretization is carried out, for alarm condition and protection type in fault alarm information, the attribute value is originally a discrete value, the discrete value is subjected to integral treatment, after the alarm information data are subjected to discretization treatment, the data are converted into Boolean type data suitable for being mined by an Apriori algorithm, after the original transaction database D is subjected to discretization treatment, an item set in the database is I { I ═ I { (I } I { (I) } n1,i2,i3(in the formula, i1、i2、i3Respectively representing ' alarm occurrence time ', ' alarm ' and ' protection type ' in the alarm information), converting the quantitative data in D into Boolean data to form a new database D ', and requiring to convert the item I in the item set I into the new database DmIs compared with the set of terms in D '═ I'1,i′2… } of formula (I'nAnd correspondingly.
Further, in step 3, if some item sets are empty, the empty item sets can be directly ignored.
Further, the analysis in step 7 includes:
according to the obtained frequent item set, which alarm information types and protection types are high concurrent events and frequently occur in which time periods, so that a better protection decision can be made for the protection of the power system;
and/or according to the obtained strong association rule, the probability of certain alarm information occurring on a specific protection type can be obtained, namely when certain alarm information occurs in the future;
and/or the protection type of the alarm information can be quickly predicted according to the previous mining analysis, so that the early warning purpose is achieved, the protection of the power system can be more quickly and accurately realized, and the generated strong association rule plays an important role in the early warning of the future protection state.
The invention has the following advantages:
the algorithm based on the invention is Apriori algorithm, which is an algorithm for mining the frequent item set of the Boolean association rule with the most influence. The purpose of the algorithm is to find out the relation between the alarm information and the protection type in the data set of the trust system, and to carry out the overall correlation analysis and mining on the researched data by obtaining the relation between the alarm information and the protection type.
The algorithm can provide two very substantial aids, the first way is to get a frequent set of terms that will give the elements that appear often together, providing some support for possible decisions; the second way is an association rule, each association rule means a relation of 'if … …' between element items, the element items to be examined can be analyzed with emphasis, and the mined information has important reference value in the decision making process.
Drawings
Fig. 1 is a logic block diagram of Apriori algorithm in a protection anomaly alarm processing method based on an association analysis method according to the present invention.
Detailed Description
The following is further detailed by the specific embodiments:
example (b):
the basic scheme of the invention provides a protection abnormity alarm processing method based on a correlation analysis method, which comprises the following steps,
step 1, establishing a transaction database D by utilizing alarm information data in a security system database, and converting the transaction database D into a Boolean transaction database D';
step 2, mining a frequent item set in the D 'by using an Apriori algorithm, scanning the transaction database D' and obtaining a candidate 1-item set C1
Step 3, setting a minimum support count, and comparing the minimum support count with the value C1Comparing the support counts of the medium item sets to obtain a frequent 1-item set L1
Step 4, from L1Connection generation C2(C2=L1×L1) And scanning D' to obtain C2The support of the middle item set is counted, and C is counted2Repeating the process of step 3 to obtain L2
Step 5, from the set L of frequent 2-item sets2Concatenating to generate a set C of candidate 3-item sets3In the connection process, only the item set with one common item can be connected, and the connection result is frequently verified that all non-empty subsets of the connection result are also connected, and C is obtained3Then carrying out support degree verification, and repeating the process until no item set meets the requirement, namely
Figure BDA0002297413200000031
Then
Figure BDA0002297413200000032
At this point, the frequent item set mining process is finished;
step 6, generating association rules by the frequent item sets after obtaining the frequent item sets of the transaction database D', and setting a minimum confidence threshold value to obtain strong association rules;
and 7, analyzing the obtained frequent item set and the association rule.
Wherein, the step 6 specifically comprises the following steps:
the first step is as follows: for each frequent item set l, obtaining all non-empty subsets s of the l;
the second step is that: for each non-null s of l, calculate
Figure BDA0002297413200000041
Degree of confidence of
Figure BDA0002297413200000042
If it is not
Figure BDA0002297413200000043
Not less than the minimum confidence threshold Min _ confidence, then the strong association rule can be obtained
Figure BDA0002297413200000044
Wherein, the step 1 specifically comprises the following steps:
data preprocessing is carried out on data of a transaction database D, fault occurrence time is divided according to different seasons in one year, namely attribute value discretization is carried out, for alarm condition and protection type in fault alarm information, the attribute value is originally a discrete value, the discrete value is subjected to integral treatment, after the alarm information data are subjected to discretization treatment, the data are converted into Boolean type data suitable for being mined by an Apriori algorithm, after the original transaction database D is subjected to discretization treatment, an item set in the database is I { I ═ I { (I } I { (I) } n1,i2,i3(in the formula, i1、i2、i3Respectively representing ' alarm occurrence time ', ' alarm ' and ' protection type ' in the alarm information), converting the quantitative data in D into Boolean data to form a new database D ', and requiring to convert the item I in the item set I into the new database DmIs compared with the set of terms in D '═ I'1,i′2… } of formula (I'nAnd correspondingly.
In step 3, if some item sets are empty, the empty item sets can be directly ignored.
Wherein the analysis in step 7 comprises:
according to the obtained frequent item set, which alarm information types and protection types are high concurrent events and frequently occur in which time periods, so that a better protection decision can be made for the protection of the power system;
and/or according to the obtained strong association rule, the probability of certain alarm information occurring on a specific protection type can be obtained, namely when certain alarm information occurs in the future;
and/or the protection type of the alarm information can be quickly predicted according to the previous mining analysis, so that the early warning purpose is achieved, the protection of the power system can be more quickly and accurately realized, and the generated strong association rule plays an important role in the early warning of the future protection state.
As shown in fig. 1, which is a flowchart of Apriori algorithm, it can be seen that Apriori algorithm searches frequent item sets layer by layer through an iterative method. First a set L of frequent 1-item sets is searched for in a transaction database D1Then from Lk-1Search Lk(k 2, 3, …, n) until the collection of the obtained frequent (k +1) -term sets is empty, the search cannot be continued. The process of searching for frequent item sets can be divided into two steps, a connecting step and a pruning step according to Apriori properties.
A connecting step:
mixing L withk-1And Lk-1The concatenation produces a set of candidate k-term sets, denoted C in the apriori algorithm flow diagram shown in FIG. 1kThe connection method is Ck=Lk-1×Lk-1
Wherein L isk-1The item sets in (1) are connectable, requiring that the connected item sets share k-2 items.
Pruning:
obtaining a set of candidate items C in the concatenation stepkThen, the set L of frequent k-term sets is determined based on the minimum support countk. But in this process, if CkThe larger size involves a large amount of computation, and the (k-1) -subset may be excluded from L to reduce the computationk-1The candidate k-item set in (1) is deleted. According to Apriori properties, it is unlikely that all infrequent (k-1) -term sets are a subset of frequent k-term sets, i.e., LkThe subset of (k-1) items of all the item sets in (L) must be included ink-1In (1).
In the example analysis process, a transaction database D is established by utilizing the alarm information data in the security system database.
Table 1 is a simple example of D after data preprocessing.
Table 1 simple example of a transaction database D
Figure RE-GDA0002391980790000051
In the data example shown in table 1, the fault attributes included are the time of occurrence of a fault, the alarm condition, and the protection type.
In the alarm information data correlation analysis in this section, the "time to failure" is divided into different seasons of the year, so k is 4, and the attribute value of the "time to failure" after the dispersion is shown in table 2.
TABLE 2 discretization result of attribute value of "time of occurrence of failure
Figure BDA0002297413200000052
Figure RE-GDA0002391980790000061
For the "alarm condition" and the "protection type" in the fault alarm information, the attribute value is originally a discrete value, and we need to integer the discrete value. The introduction of data mining is carried out by taking 9 alarm messages and the protection types in 5 as examples. Discrete value to integer value correspondence is shown in table 3,
TABLE 3 "failure cause" and "zone 1" attribute value integers
Figure BDA0002297413200000062
After the alarm information data is discretized, the data is converted into Boolean data suitable for mining by an Apriori algorithm. After the original transaction database D is subjected to discretization processing, the item set in the database is I ═ I1,i2,i3(in the formula, i1、i2、i3Respectively represent "alarm occurrence time", "alarm", "protection type" in the alarm information. Converting the quantized data in D into Boolean data to form a new database D', wherein the items I in the item set I need to be convertedmIs compared with the set of terms in D '═ I'1,i′2… } of formula (I'nAnd correspondingly.
Specific conversion results are shown in table 4.
TABLE 4 conversion of quantized data to Boolean data mapping Table
Figure RE-GDA0002391980790000071
After the quantized transaction database D is converted into the boolean transaction database D ', a frequent item set in D' may be mined by applying Apriori algorithm according to the flow shown in fig. 1.
Step 1: the transaction database D' is scanned, a hypothetical number is given to the model, and a set C of candidate 1-item sets is obtained1,C1The contents are shown in table 5.
TABLE 5 set C of candidate 1 item sets1
Figure BDA0002297413200000072
Figure BDA0002297413200000081
Step 2: let the minimum support count Min _ count be 50(Min _ support 50/1914 be 2.65%), and compare with C1Comparing the support counts of the medium item sets to obtain a frequent 1-item set L1. It is noted at all that there is a set of items ({ i'5}、{i′13}、{i′18H) is the result of the real value unknown or the gap value filling in the data processing, and the mining of the related rule by using the association rule has no practical significance, and in order to simplify the subsequent mining process, the step C is1Generating L1Can directly ignore these sets of items, L1The contents are shown in table 6.
TABLE 6 set of frequent 1-item sets L1
Item set Count of support counts Item set Count of support counts
{i1'} 321 {i9'} 419
{i2'} 496 {i10'} 268
{i3'} 589 {i11'} 229
{i4'} 508 {i15'} 772
{i7'} 377 {i16'} 238
{i8'} 131 {i17'} 866
And step 3: from L1Connection generation C2(C2=L1×L1) And scanning D' to obtain C2The support of the middle item set is counted, and C is counted2Repeating the process of step 2 to obtain L2,L2The contents are shown in table 7.
TABLE 7 set L of frequent 2-item sets2
Figure BDA0002297413200000082
Figure BDA0002297413200000091
And 4, step 4: collections L of frequent 2-item sets2Concatenating to generate a set C of candidate 3-item sets3. Only a set of items that have one common item can be joined during the join process and it is also frequent for the join result to verify all its non-empty subsets, the so-called "pruning" process. Obtaining C3Then carrying out support degree verification to obtain L3,L3The contents are shown in table 8.
TABLE 8 Collection of frequent 3-item sets L3
Item set Count of support counts
{i2',i9',i15'} 56
{i2',i10',i17'} 56
{i3',i9',i17'} 50
{i3',i10',i17'} 100
{i4',i7',i17'} 68
{i4',i9',i15'} 57
{i4',i9',i17'} 52
From L3Connection generation C4When the branch is cut, no item set meets the requirement, that is
Figure BDA0002297413200000093
Then
Figure BDA0002297413200000094
At this point, the frequent itemset mining process ends.
After the frequent item sets of the transaction database D' are obtained, association rules can be generated from the frequent item sets, and the method for obtaining the association rules is introduced in the above section. For set L of frequent 3-item sets shown in Table 83The generated association rules and the confidence of each rule are shown in appendix 3.
If the minimum confidence threshold Min _ confidence is set to 50%, then strong association rules can be obtained as shown in table 9.
Table 9 mined strong association rules and their confidence
Figure BDA0002297413200000092
Figure BDA0002297413200000101
By mining the association rules of the attributes of "alarm occurrence time", "alarm information type", and "protection type" in the alarm information in the database for one year, the association rules shown in table 9 can be obtained on the target, and the corresponding rules are:
58.95% of the alarm information caused by device hardware alarms in the second quarter occurred in circuit breaker protection;
of the power distribution network faults caused by device program alarms in the third quarter, 50% occur in circuit breaker protection;
of the alarm information caused by device hardware alarms in the third quarter, 66.67% occurred in circuit breaker protection, and so on;
the above description is made in conjunction with the accompanying drawings for the specific embodiments of the present invention, and the protection scheme is formulated according to the summary of the analysis results, which plays an important role in the protection state early warning.
The above description is only an example of the present invention, and the common general knowledge of the known specific structures and characteristics in the embodiments is not described herein. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practical applicability of the present invention. The scope of the claims of the present application shall be defined by the claims, and the description of specific embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (5)

1. A protection abnormity alarm processing method based on a correlation analysis method is characterized by comprising the following steps,
step 1, establishing a transaction database D by utilizing alarm information data in a security system database, and converting the transaction database D into a Boolean transaction database D';
step 2, mining a frequent item set in the D 'by using an Apriori algorithm, scanning the transaction database D' and obtaining a candidate 1-item set C1
Step 3, setting a minimum support count, and comparing the minimum support count with the value C1Comparing the support counts of the medium item sets to obtain a frequent 1-item set L1
Step 4, from L1Connection generation C2(C2=L1×L1) And scanning D' to obtain C2The support of the middle item set is counted, and C is counted2Repeating the process of step 3 to obtain L2
Step 5, from the set L of frequent 2-item sets2Concatenating to generate a set C of candidate 3-item sets3In the connection process, only the item set with one common item can be connected, and the connection result is frequently verified that all non-empty subsets of the connection result are also connected, and C is obtained3Then carrying out support degree verification, and repeating the process until no item set meets the requirement, namely
Figure FDA0002297413190000011
Then
Figure FDA0002297413190000012
So far, the frequent item set mining process is finished;
step 6, generating association rules by the frequent item sets after obtaining the frequent item sets of the transaction database D', and setting a minimum confidence threshold value to obtain strong association rules;
and 7, analyzing the obtained frequent item set and the association rule.
2. The method for processing protection anomaly alarm based on the correlation analysis method according to claim 1, wherein the step 6 specifically comprises:
the first step is as follows: for each frequent item set l, obtaining all non-empty subsets s of the l;
the second step is that: for each non-null s of l, calculate
Figure FDA0002297413190000013
Degree of confidence of
Figure FDA0002297413190000014
If it is not
Figure FDA0002297413190000015
Not less than the minimum confidence threshold Min _ confidence, then the strong association rule can be obtained
Figure FDA0002297413190000016
3. The protection anomaly alarm processing method based on the correlation analysis method according to claim 1 or 2, wherein the step 1 specifically comprises:
data preprocessing is carried out on data of a transaction database D, fault occurrence time is divided according to different seasons in one year, namely attribute value discretization is carried out, for alarm condition and protection type in fault alarm information, the attribute value is originally a discrete value, the discrete value is subjected to integral treatment, after the alarm information data are subjected to discretization treatment, the data are converted into Boolean data suitable for being mined by an Apriori algorithm, after the original transaction database D is subjected to discretization treatment, and an item set in the database is I ═ I1,i2,i3In the formula, i1、i2、i3Respectively representing ' alarm occurrence time ', ' alarm ' and ' protection type ' in the alarm information, converting the quantitative data in D into Boolean data to form a new database D ', and requiring to convert the item I in the item set ImIs compared with the set of terms in D '═ I'1,i′2… } of formula (I'nAnd correspondingly.
4. The method for processing protection anomaly alarms based on correlation analysis method as claimed in claim 3, wherein in step 3, if some item sets are empty, these empty item sets can be directly ignored.
5. The protection anomaly alarm processing method based on the association analysis method according to any one of claims 1, 2 or 4, wherein the analysis in the step 7 comprises:
according to the obtained frequent item set, which alarm information types and protection types are high concurrent events and frequently occur in which time periods, so that a better protection decision can be made for the protection of the power system;
and/or according to the obtained strong association rule, the probability of certain alarm information occurring on a specific protection type can be obtained, namely when certain alarm information occurs in the future;
and/or the protection type of the alarm information can be quickly predicted according to the previous mining analysis, so that the early warning purpose is achieved, the protection of the power system can be more quickly and accurately realized, and the generated strong association rule plays an important role in the early warning of the future protection state.
CN201911208235.9A 2019-11-30 2019-11-30 Protection abnormity alarm processing method based on correlation analysis method Active CN111143428B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911208235.9A CN111143428B (en) 2019-11-30 2019-11-30 Protection abnormity alarm processing method based on correlation analysis method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911208235.9A CN111143428B (en) 2019-11-30 2019-11-30 Protection abnormity alarm processing method based on correlation analysis method

Publications (2)

Publication Number Publication Date
CN111143428A true CN111143428A (en) 2020-05-12
CN111143428B CN111143428B (en) 2023-01-31

Family

ID=70517455

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911208235.9A Active CN111143428B (en) 2019-11-30 2019-11-30 Protection abnormity alarm processing method based on correlation analysis method

Country Status (1)

Country Link
CN (1) CN111143428B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112101798A (en) * 2020-09-18 2020-12-18 国网辽宁省电力有限公司电力科学研究院 Power equipment service life management method based on big data technology
CN112699281A (en) * 2021-01-08 2021-04-23 北京明略软件系统有限公司 Alarm event rule mining method and system based on gspan algorithm
CN112699106A (en) * 2020-12-23 2021-04-23 中国电力科学研究院有限公司 Multi-dimensional alarm information time sequence incidence relation analysis method for relay protection device based on Apriori algorithm
CN112712348A (en) * 2021-01-08 2021-04-27 中国南方电网有限责任公司超高压输电公司昆明局 Log correlation analysis method and diagnosis device for converter station
CN113836196A (en) * 2021-09-08 2021-12-24 国网江苏省电力有限公司 A method and system for identifying an undefined event type in a power grid
CN114003683A (en) * 2021-11-04 2022-02-01 公安部交通管理科学研究所 Alarm condition analysis method based on natural language processing and association rule
CN114490144A (en) * 2022-02-11 2022-05-13 山东山大电力技术股份有限公司 A method and system for reliability assessment and correlation analysis of power system protection
CN115034492A (en) * 2022-06-23 2022-09-09 广东电网有限责任公司 Non-deterministic energy consumption prediction method and related device in the case of missing input variables
CN115484148A (en) * 2022-08-30 2022-12-16 卡斯柯信号有限公司 A Maintenance Diagnosis and Alarm Method under the Boolean Code Bit Structure
CN116303416A (en) * 2022-11-22 2023-06-23 中国电力科学研究院有限公司 High-voltage cable operation big data correlation analysis method, device and medium
CN116662934A (en) * 2022-12-08 2023-08-29 中国人民解放军空军预警学院 Analysis method, system, storage medium and terminal of early warning target association relationship

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239437A (en) * 2014-08-28 2014-12-24 国家电网公司 An intelligent alarm analysis method for power grid dispatching
CN105677759A (en) * 2015-12-30 2016-06-15 国家电网公司 Alarm correlation analysis method in communication network
CN109597836A (en) * 2018-11-29 2019-04-09 武汉大学 A kind of communication equipment alarm association rule digging method based on weighting matrix

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239437A (en) * 2014-08-28 2014-12-24 国家电网公司 An intelligent alarm analysis method for power grid dispatching
CN105677759A (en) * 2015-12-30 2016-06-15 国家电网公司 Alarm correlation analysis method in communication network
CN109597836A (en) * 2018-11-29 2019-04-09 武汉大学 A kind of communication equipment alarm association rule digging method based on weighting matrix

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112101798A (en) * 2020-09-18 2020-12-18 国网辽宁省电力有限公司电力科学研究院 Power equipment service life management method based on big data technology
CN112699106A (en) * 2020-12-23 2021-04-23 中国电力科学研究院有限公司 Multi-dimensional alarm information time sequence incidence relation analysis method for relay protection device based on Apriori algorithm
CN112699106B (en) * 2020-12-23 2024-09-24 中国电力科学研究院有限公司 Method for analyzing time sequence association relation of multi-dimensional alarm information of relay protection device based on Apriori algorithm
CN112699281B (en) * 2021-01-08 2024-03-15 青岛明略软件技术开发有限公司 Alarm event rule mining method and system based on gspan algorithm
CN112699281A (en) * 2021-01-08 2021-04-23 北京明略软件系统有限公司 Alarm event rule mining method and system based on gspan algorithm
CN112712348A (en) * 2021-01-08 2021-04-27 中国南方电网有限责任公司超高压输电公司昆明局 Log correlation analysis method and diagnosis device for converter station
CN113836196A (en) * 2021-09-08 2021-12-24 国网江苏省电力有限公司 A method and system for identifying an undefined event type in a power grid
CN114003683A (en) * 2021-11-04 2022-02-01 公安部交通管理科学研究所 Alarm condition analysis method based on natural language processing and association rule
CN114003683B (en) * 2021-11-04 2024-08-27 公安部交通管理科学研究所 Alarm analysis method based on natural language processing and association rules
CN114490144A (en) * 2022-02-11 2022-05-13 山东山大电力技术股份有限公司 A method and system for reliability assessment and correlation analysis of power system protection
CN115034492A (en) * 2022-06-23 2022-09-09 广东电网有限责任公司 Non-deterministic energy consumption prediction method and related device in the case of missing input variables
CN115034492B (en) * 2022-06-23 2025-01-17 广东电网有限责任公司 Non-deterministic energy consumption prediction method and related device under the condition of missing input variables
CN115484148A (en) * 2022-08-30 2022-12-16 卡斯柯信号有限公司 A Maintenance Diagnosis and Alarm Method under the Boolean Code Bit Structure
CN116303416A (en) * 2022-11-22 2023-06-23 中国电力科学研究院有限公司 High-voltage cable operation big data correlation analysis method, device and medium
CN116662934A (en) * 2022-12-08 2023-08-29 中国人民解放军空军预警学院 Analysis method, system, storage medium and terminal of early warning target association relationship

Also Published As

Publication number Publication date
CN111143428B (en) 2023-01-31

Similar Documents

Publication Publication Date Title
CN111143428B (en) Protection abnormity alarm processing method based on correlation analysis method
Zhang et al. Time series anomaly detection for smart grids: A survey
CN107301296B (en) Qualitative analysis method of circuit breaker fault influencing factors based on data
Li Application of CART decision tree combined with PCA algorithm in intrusion detection
CN106375339A (en) Attack Pattern Detection Method Based on Event Sliding Window
Shi et al. Online event detection in synchrophasor data with graph signal processing
CN107871216A (en) A kind of recognition methods of power distribution network fragility node
Cheng et al. Online power system event detection via bidirectional generative adversarial networks
CN110348683A (en) The main genetic analysis method, apparatus equipment of electrical energy power quality disturbance event and storage medium
CN105117771B (en) A kind of agricultural machinery fault recognition method based on correlation rule directed acyclic graph
CN115544519A (en) A method for security correlation analysis of threat intelligence in metering automation system
CN115508672A (en) Fault traceability reasoning method, system, equipment and medium of power grid main equipment
CN111628888B (en) A fault diagnosis method, device, equipment and computer storage medium
CN117992741A (en) CVT error state evaluation method and system based on wide-area phasor measurement data
CN110147449A (en) File classification method and device
CN118627066A (en) A BERT-based APT attack tracing method
CN110458432B (en) A reliability diagnosis method for power optical transmission network based on cloud model
Duan et al. Afalog: A general augmentation framework for log-based anomaly detection with active learning
CN112286987A (en) Electric power internet of things abnormal alarm compression method based on Apriori algorithm
CN119199393A (en) A distribution network fault analysis and positioning method and system based on artificial intelligence
CN105677565A (en) A Measuring Method of Defect Correlation Coefficient
CN118710440A (en) Intelligent operation and maintenance management method and system for power system
CN112329432A (en) Power distribution network voltage out-of-limit problem correlation analysis method based on improved Apriori
CN108427744B (en) An intelligent data association determination method based on information operation and maintenance
Zhou et al. A review of a text classification technique: K-Nearest Neighbor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant