介绍了广东电网电压调控安全评估系统的开发及在线应用情况。该系统是以Linux Redhat作为操作系统,以Oracle作为数据库管理系统,以PSAT(power system analysis toolbox)作为全过程动态仿真工具,采用Java Eclipse平台开发的多平台、多任...介绍了广东电网电压调控安全评估系统的开发及在线应用情况。该系统是以Linux Redhat作为操作系统,以Oracle作为数据库管理系统,以PSAT(power system analysis toolbox)作为全过程动态仿真工具,采用Java Eclipse平台开发的多平台、多任务系统。该系统在线读取广东电网电力调度控制中心EMS系统传送的实时运行方式断面数据,在线评估全网自动电压控制(automatic voltage control,AVC)系统的调控对广东电网电压质量、网损、静态电压稳定性、暂态电压稳定和长期电压稳定的影响,并给出提高电网各种运行指标的改进控制策略,且评估结果通过WEB发布。建立了电压调控效果评估的指标体系,介绍了评估系统的主要功能模块及其实现技术。实际运行分析表明,评估系统的各分析计算模块均具有很好的运行鲁棒性,能够对连续变化的电网实时运行方式数据进行在线电压调控安全评估。展开更多
The rapid development of the Network makes the comprehensive analysis as well as the quantitative evaluation of its security become more and mere important. This paper illustrates the major realization process of a Ne...The rapid development of the Network makes the comprehensive analysis as well as the quantitative evaluation of its security become more and mere important. This paper illustrates the major realization process of a Network Security Quantitative Evaluation System,which,from an intruder's angle ,established a Hierarchy Intrusion Relationship Graph by analyzing the credit degree fusion and relevancy of the secure information of the target network and by combining with powerful database information. At last, by applying some relative mathematics model and arithmetic, the paper analyzes and evaluates the security of this Network Hierarchy Intrusion Relationship Graph comprehensively and quantitatively.展开更多
文摘介绍了广东电网电压调控安全评估系统的开发及在线应用情况。该系统是以Linux Redhat作为操作系统,以Oracle作为数据库管理系统,以PSAT(power system analysis toolbox)作为全过程动态仿真工具,采用Java Eclipse平台开发的多平台、多任务系统。该系统在线读取广东电网电力调度控制中心EMS系统传送的实时运行方式断面数据,在线评估全网自动电压控制(automatic voltage control,AVC)系统的调控对广东电网电压质量、网损、静态电压稳定性、暂态电压稳定和长期电压稳定的影响,并给出提高电网各种运行指标的改进控制策略,且评估结果通过WEB发布。建立了电压调控效果评估的指标体系,介绍了评估系统的主要功能模块及其实现技术。实际运行分析表明,评估系统的各分析计算模块均具有很好的运行鲁棒性,能够对连续变化的电网实时运行方式数据进行在线电压调控安全评估。
文摘The rapid development of the Network makes the comprehensive analysis as well as the quantitative evaluation of its security become more and mere important. This paper illustrates the major realization process of a Network Security Quantitative Evaluation System,which,from an intruder's angle ,established a Hierarchy Intrusion Relationship Graph by analyzing the credit degree fusion and relevancy of the secure information of the target network and by combining with powerful database information. At last, by applying some relative mathematics model and arithmetic, the paper analyzes and evaluates the security of this Network Hierarchy Intrusion Relationship Graph comprehensively and quantitatively.