基于物联网标识技术的保护装置身份识别与信息管理方法
CSTR:
作者:
通讯作者:

段佳莉(1989-),女,硕士,工程师,主要从事变电二次运维技术研究;E-mail:hnzzssx@126.com

中图分类号:

TM933

基金项目:

国网天津市电力公司科技项目(SGTJCN00DKJS1801607)


Identification and information management method of protection device based on internet of things identification technology
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [21]
  • | | | |
  • 文章评论
    摘要:

    继电保护设备数量繁多、种类庞杂。传统的纸质记录与人工管理相结合的继电保护设备运维方式存在工作量大、易出错等问题。在此背景下,基于二维码技术在继电保护设备管理中的应用价值,利用二维码具有容量大、尺寸小、识别率高的特点,将其运用于二次设备运维、资产信息的存储中,建立装置的身份识别与信息管理方法。通过记录每台继电保护设备在安装、投运、缺陷、退运等不同阶段的信息,实现对继电保护设备的全寿命周期管理。最后,以具体的二次设备为例,通过二维码技术实现对设备缺陷、资产信息的存储。结果表明,二维码技术很好地解决了人工管理存在的账实不符、效率低下的问题,对提高继电保护现场运行维护和检修效率具有重大意义。

    Abstract:

    The relay protection equipment has many kinds and huge number of quantities. The traditional operation and maintenance mode of relay protection equipment that combines paper records and manual management has problems such as the heavy workload and errorproneness. Based on the application value of twodimensional code technology in the management of relay protection equipment, this paper uses twodimensional code with the characteristics of large capacity, small size, and high recognition rate, and applies it to the operation and maintenance of secondary equipment and the storage of asset information.By recording the information of each relay protection equipment in different stages of installation, operation, defect and return, the life cycle management of relay protection equipment is realized.Taking a specific secondary equipment as an example, the storage of equipment defects and asset information is realized through twodimensional code technology.The results show the twodimensional code technology can solve the problems of inconsistent accounts and low efficiency in manual management and is of great significance to improve the efficiency of onsite operation and maintenance of relay protection.

    参考文献
    [1] 张琳波,李本瑜,石恒初,等.基于信息融合的继电保护智能管控系统研究[J].供用电,2020,37(3):52-57.ZHANG Linbo,LI Benyu,SHI Hengchu,et al.Study of relay protection and intelligent management and control system based on information fusion[J].Distribution & Utilization,2020,37(3):52-57.
    [2] 杨建新,王一栋,刘东英.330 kV变电站主变继电保护系统及自动灭火系统的设计和实施[J].电网与清洁能源,2019,35(11):16.YANG Jianxin,WANG Yidong,LIU Dongying.Design and implementation of main transformer relay protection system and automatic fire extinguishing system for 330 kV substations [J].Power System and Clean Energy,2019,35(11):16.
    [3] 杨国生,戴飞扬,王文焕,等.基于灰度关联法和TOPSIS法的继电保护状态评估综合算法研究与应用[J].中国电力,2019,52(2):94-103.YANG Guosheng,DAI Feiyang,WANG Wenhuan,et al Research and application of comprehensive algorithm of relay protection status assessment based on gray correlation analysis and TOPSIS method[J].Electric Power,2019,52(2):94-103.
    [4] 张羲海,张葛祥,王健,等.计及继电保护与油气信息的变压器故障推理[J].高压电器,2020,56(9):136-143.ZHANG Xihai,ZHANG Gexiang,WANG Jian,et al.Transformer fault reasoning under relay protection and gas dissolved in oil information[J].HighVoltageApparatus,2020,56(9):136-143.
    [5] 钱海,贾松江,杨飞,等.基于移动互联的继电保护设备智能运维技术研究[J].智慧电力,2019,47(11):60-66.QIAN Hai,JIA Songjiang,YANG Fei,et al.Intelligent operation and maintenance technology for relay protection equipment based on mobile internet[J].SmartPower,2019,47(11):60-66.
    [6] 裘愉涛,周震宇,杨剑友,等.继电保护远程运维技术研究与应用[J].电力系统保护与控制,2018,46(18):17-24.QIU Yutao,ZHOU Zhengyu,YANG Jianyou,et al.Research and application of remote operation and maintenance technology of relay protection[J].Power System Protection and Control,2018,46(18):17-24.
    [7] 曾治安,姚树友,郑晓玲,等.基于移动互联网技术的继电保护设备智能运维管理模式探讨[J].电力系统保护与控制,2019,47(16):80-86.ZENG Zhian,YAO Shuyou,ZHENG Xiaoling,et al.Discussion on intelligent operation and maintenance management mode of relay protection equipment based on mobile Internet technology[J].Power System Protection and Control,2019,47(16):80-86.
    [8] 邢颖,郎燕生,李强,等.多级智能电网调控系统集中运维模式的探讨[J].电力系统保护与控制,2018,46(15):142-148.XING Ying,LANG Yansheng,LI Qiang,et al.Discussion on pattern of centralized operation and maintenance for multilevel smart power dispatching control system[J].Power System Protection and Control,2018,46(15):142-148.
    [9] 张兴忠,杨罡,赵国伟.基于全域电力大数据的配电网现状自动诊断分析技术研究[J].电测与仪表,2019,56(16):111-115.ZHANG Xingzhong,YANG Gang,ZHAO Guowei,et al.Research on automatic diagnosis and analysis technology of distribution network status based on global large power data[J].Electrical Measurement & Instrumentation,2019,56(16)111-115.
    [10] Gordon Holden,Lyp Thomas,Kimbro Calvin,et al.A novel IoT sensor authentication using HaLo extraction method and memory chip variability[J].Discover Internet of Things,2021,1(1):19.
    [11] Mouro Joo,Ferreira Mafalda,Silva Ana V,et al.Derivation of analytical expressions for the stress/strain distributions,bending plane and curvature radius in multilayer thinfilm composites[J].Journal of Micromechanics and Microengineering,2021,31:113003.
    [12] Wu Yulei,Cui Laizhong,Leung Victor CM,et al.Towards efficient and flexible management and interworking techniques for Industrial Internet of Things[J].Computer Networks,2021,200:108-541.
    [13] 马立林.云计算环境下基于二维码的移动终端身份认证方案[J].微电子学与计算机,2016,33(1):140-143+148.MA Lilin.An identity authentication scheme of mobile terminal based on twodimension code in cloud computing environment[J].Microelectronics & Computer,2016,33(1):140-143+148.
    [14] 郑平标,侯海永.RFID技术在仓储管理系统中的应用[J].铁道货运,2005(12):18-21+55.ZHENG Pinbiao,HOU Haiyong.The application of RFID technique in warehouse management system[J].Railway Freight Transport,2005(12):18-21+55.
    [15] 谭德林,李均利.基于DHKE的二维码技术[J].微电子学与计算机,2018,35(2):22-25.TAN Delin,LI Junli.The 2D code technology based on DHKE[J].Microelectronics&Computer,2018,35(2):22-25.
    [16] 殷浩然,苗世洪,韩佶,等.基于三维卷积神经网络的配电物联网异常辨识方法[J/OL].电力系统自动化:115[20211020].http://kns.cnki.net/kcms/detail/32.1180.TP.20211020.1126.004.html.YIN Haoran,MIAO Shihong,HAN Ji,et al.Anomaly identification method for power distribution Internet of things based on threedimensional convolutional neural network[J/OL].Automation of Electric Power Systems:115[20211020].http://kns.cnki.net/kcms/detail/32.1180.TP.20211020.1126.004.html.
    [17] Haseeb Junaid,Mansoori Masood,Hirose Yuichi,et al.Autoencoderbased feature construction for IoT attacks clustering[J/OL].Future Generation Computer Systems,2022,127:487502[20211022].https://doi.org/10.1016/j.future.2021.09.025.
    [18] Tanghatari Ehsan,Kamal Mehdi,AfzaliKusha Ali,et al.Distributing DNN training over IoT edge devices based on transfer learning[J/OL].Neurocomputing,2022,467:5665[20211018].https://doi.org/10.1016/j.neucom.2021.09.045
    [19] 刘映尚,陶文伟,周凯,等.基于变权物元可拓模型的二次设备状态综合评价[J].电力系统保护与控制,2017,45(8):80-85.LIUYingshang,TAO Wenwei,ZHOU Kai,et al.Comprehensive evaluation on secondary equipment condition based on matterelementextension model with variable weight[J].Power System Protection and Control,2017,45(8):80-85.
    [20] Rathi Vipin Kumar,Rajput Nikhil Kumar,Mishra Shubham,et al.An edge AIenabled IoT healthcare monitoring system for smart cities[J].Computers & Electrical Engineering,2021,96(B):107524.
    [21] Kuang Boyu,Fu Anmin,Susilo Willy,et al.A survey of remote attestation in internet of things:attacks,countermeasures,and prospects[J/OL].Computers & Security,2022,112:102498[20211022].https://doi.org/10.1016/j.cose.2021.102498.
    相似文献
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

段佳莉,孙羽宁,胡静娴,等.基于物联网标识技术的保护装置身份识别与信息管理方法[J].电力科学与技术学报,2021,36(6):204-210.
DUAN Jiali, SUN Yuning, HU Jingxian, et al. Identification and information management method of protection device based on internet of things identification technology[J]. Journal of Electric Power Science and Technology,2021,36(6):204-210.

复制
分享
文章指标
  • 点击次数:206
  • 下载次数: 846
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 在线发布日期: 2022-01-05
文章二维码