KEYWORDS: Data modeling, Power grids, Modeling, Instrument modeling, Data fusion, RGB color model, Systems modeling, 3D modeling, Feature fusion, Analytical research
In this paper, the digital modeling technology based on multi-source data of power grid is studied. First, the theoretical system of power grid digital twin model is established to provide theoretical reference for the modeling and analysis of power grid digital twin and further application. Secondly, the construction of power grid digital twin model based on physics-guided deep learning framework, interface learning framework and probability graph model is studied to create the foundation and prerequisite for subsequent applications, and the foundation and core elements of power grid digital twin. Thirdly, the assembly and fusion of power grid equipment level model, power equipment cluster level model and power system level model based on multi-source heterogeneous data fusion technology are studied to realize multi-level digital twin model fusion for power grid. Finally, the paper studies the dynamic balance of update cost and accuracy to update the digital twin model of power grid and realizes the flexible and dynamic update of power grid twin model.
KEYWORDS: Polymerization, Internet, Solar energy, Power grids, Modeling, Data modeling, Power supplies, Computer simulations, Mathematical optimization, Data storage
In this paper, a kind of digital twin dynamic polymerization technology based on clustering and intelligent analysis is studied. In the first step, the goal and business requirements of device-level digital twin polymerization are studied, and the principle of hierarchical and distributed dynamic polymerization of device-level digital twin is proposed. The second step analyzes the dynamic characteristics of the county energy Internet source network charge and storage, and studies the spatio-temporal dynamic aggregation modeling technology of the device-level digital twin based on the dynamic characteristics of the source network charge and storage. The third step is to study the hierarchical polymerization framework and polymerization method of the virtual power plant at the source, load and storage side facing the distributed multi-level interaction framework of the county energy Internet, the hierarchical polymerization framework and polymerization method of the county energy Internet side, and the hierarchical polymerization framework and polymerization method of the virtual power plant at the source, load and storage side facing the county network side.
KEYWORDS: Data modeling, Network security, Data privacy, Data fusion, Data conversion, Computer security, Fusion energy, Power grids, Deep learning, Data processing
The new power system has a new operation mode of "the source follows the load, the load follows the network, and the source loads interact". With the continuous excavation of flexible regulation resources, new third-party entities such as virtual power plants or load integrators need to consider implementing differentiated network security protection requirements to ensure their fair access to business. At the same time, with the clarity of the regulation level of the new power system and the continuous participation of various entities in the construction, the company's network security protection boundary will no longer be "horizontal and vertical", but will become more uneven, with more types of interfaces and interfaces. It is necessary to refine the boundary protection measures according to different interaction needs. The new regulatory subject on the demand side of the new power system involves the privacy information of a large number of users. Data flow and sharing, cross access and collaborative analysis among the subjects have security problems such as unauthorized access and privacy leakage. This paper focuses on the scenario based intelligent desensitization and dynamic access control technology for power distribution and distributed new energy data resources, and combs various factors involved in the data access process, On the basis of obtaining the data access authority, the dynamic correlation analysis of the three elements of user role and access authority, sensitive data level, power allocation and distributed new energy business scenario is integrated, and finally the appropriate desensitization method is selected from the desensitization algorithm library, and finally the appropriate desensitization method is selected from the desensitization algorithm library to ensure the security protection capability of the new distribution network under the flexible, open and interactive energy scenario, Effectively respond to new major network security risks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.