The method of a joint intraday security check system based on cloud computing

被引:1
|
作者
Dong, Wei [1 ]
Feng, Changyou [2 ]
Zhou, Caiqi [2 ]
Cai, Zhi [1 ]
Dan, Xu [1 ]
Dai, Sai [1 ]
Zhang, Chuancheng [1 ]
机构
[1] China Elect Power Res Inst, Power Automat Dept, Beijing 100192, Peoples R China
[2] State Grid Corp, Natl Elect Dispatching & Control Ctr, Beijing 100192, Peoples R China
关键词
D O I
10.1088/1755-1315/52/1/012034
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The intraday security check is the core application in the dispatching control system. The existing security check calculation only uses the dispatch center's local model and data as the functional margin. This paper introduces the design of all-grid intraday joint security check system based on cloud computing and its implementation. To reduce the effect of subarea bad data on the all-grid security check, a new power flow algorithm basing on comparison and adjustment with inter-provincial tie-line plan is presented. And the numerical example illustrated the effectiveness and feasibility of the proposed method.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Research on data mining method of network security situation awareness based on cloud computing
    Zhou, Ying
    Zhao, Guodong
    Alroobaea, Roobaea
    Baqasah, Abdullah M.
    Miglani, Rajan
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 520 - 531
  • [42] Research on the Security Management Method of Cloud Computing Authorized User Based on Anonymous OTP
    Yuan BaoLi
    [J]. PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 : 1 - 4
  • [43] Study on data mining method of network security situation perception based on cloud computing
    Zhang, Yan
    Kaur, Arshpreet
    Jagota, Vishal
    Neware, Rahul
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2022, 31 (01) : 1074 - 1084
  • [44] Intelligent Cloud Training System based on Edge Computing and Cloud Computing
    Chen, Zhijia
    Di, Yanqiang
    Yuan, Hongli
    Feng, Shaochong
    [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1550 - 1553
  • [45] Threshold Cryptography Based Data Security in Cloud Computing
    Saroj, Sushil Kr
    Chauhan, Sanjeev Kr
    Sharma, Aravendra Kr
    Vats, Sundaram
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION TECHNOLOGY CICT 2015, 2015, : 202 - 207
  • [46] The Research Based on Security Model and Cloud Computing Strategy
    Pei, Aoqiu
    Yang, Min
    Tang, Yanbin
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1600 - 1603
  • [47] Security Framework for Agent-Based Cloud Computing
    Venkateshwaran, K.
    Malviya, Anu
    Dikshit, Utkarsha
    Venkatesan, S.
    [J]. INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2015, 3 (03): : 35 - 42
  • [48] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [49] Agent Based Security for Cloud Computing using Obfuscation
    Govinda, K.
    Sathiyamoorthy, E.
    [J]. INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 125 - 129
  • [50] Construction of Digital Campus Security Based on Cloud Computing
    Tang, Lianzhang
    Xiao, Zhineng
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 573 - 576