KEYWORDS: Data modeling, Power grids, Data fusion, Feature fusion, Feature extraction, Panoramic photography, Associative arrays, Internet of things, Instrument modeling, Sensors
This article proposes a panoramic mapping and interaction method for real-world images and power grid real-world twins. The data of the power grid scene is obtained through high-precision data acquisition technology, and accurate positioning is carried out. Secondly, the collected point cloud data is optimized and processed to construct a power grid real-world twin model, and texture mapping is performed. The panoramic mapping algorithm is used to map the power grid real-world twin model to the real-world image. Real time object detection and tracking, attitude estimation, and visual feedback and effect presentation are performed. The YOLO object detection algorithm and Kalman filter technology are used to achieve target detection, tracking, and state estimation. Finally, the Extended Kalman Filter (EKF) algorithm is used to reflect the changes in the real power grid, and it is inputted as an observation value. In EKF, through the prediction and update steps of EKF, Integrate the state of the model and sensor observations to perform incremental updates on the dynamic model.
KEYWORDS: Data modeling, Network security, Data privacy, Data fusion, Data conversion, Computer security, Fusion energy, Power grids, Deep learning, Data processing
The new power system has a new operation mode of "the source follows the load, the load follows the network, and the source loads interact". With the continuous excavation of flexible regulation resources, new third-party entities such as virtual power plants or load integrators need to consider implementing differentiated network security protection requirements to ensure their fair access to business. At the same time, with the clarity of the regulation level of the new power system and the continuous participation of various entities in the construction, the company's network security protection boundary will no longer be "horizontal and vertical", but will become more uneven, with more types of interfaces and interfaces. It is necessary to refine the boundary protection measures according to different interaction needs. The new regulatory subject on the demand side of the new power system involves the privacy information of a large number of users. Data flow and sharing, cross access and collaborative analysis among the subjects have security problems such as unauthorized access and privacy leakage. This paper focuses on the scenario based intelligent desensitization and dynamic access control technology for power distribution and distributed new energy data resources, and combs various factors involved in the data access process, On the basis of obtaining the data access authority, the dynamic correlation analysis of the three elements of user role and access authority, sensitive data level, power allocation and distributed new energy business scenario is integrated, and finally the appropriate desensitization method is selected from the desensitization algorithm library, and finally the appropriate desensitization method is selected from the desensitization algorithm library to ensure the security protection capability of the new distribution network under the flexible, open and interactive energy scenario, Effectively respond to new major network security risks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.