1. Research on distribution automation security situational awareness technology based on risk transmission path and multi-source information fusion
- Author
-
Jingzhi Liu, Hongyi Yang, Quanlei Qu, Zhidong Liu, and Yang Cao
- Subjects
Risk transmission path ,Multi source information fusion ,Distribution automation ,Security situational awareness ,Perception factor ,DS evidence fusion ,Computer engineering. Computer hardware ,TK7885-7895 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract It may be difficult for existing methods to make full use of the correlation and complementarity of various kinds of information when processing multi-source information. In order to accurately perceive the security situation of distribution automation and ensure the safe and stable operation of distribution network, the multi-source information fusion distribution automation security situation awareness technology based on risk transmission path is studied. Based on the risk transmission path, the distribution automation security situational awareness factors are analyzed, and the main factors affecting the distribution automation security situation are divided into two dimensions: internal source and external source, and eight main awareness factors; Different types of sensors are set in the main areas of security situational awareness factors to collect data of different awareness factors. Using ant colony algorithm to optimize DS evidence fusion method, data with different perception factors are fused, and data fusion results with different perception factors are obtained. The distribution automation security situational awareness model is constructed, and the security situational awareness results are obtained based on the data fusion results of the awareness factors. If the results are higher than the set threshold, the abnormal signal can be output to determine the area where the distribution automation abnormal equipment is located. The experimental results show that the multi-source data fusion effect of this method is good, and it can accurately perceive the security status of different nodes of the experimental object at different time nodes.
- Published
- 2024
- Full Text
- View/download PDF