期刊文献+

光字信息系统在500kV变电站的应用 被引量:1

Application of Visual Annunciator Information System in 500 kV Substation
下载PDF
导出
摘要 在变电站运行中,光字信号回路图是运行人员判断光字异常的依据,由于查找光字回路图耗时耗力,判断光字的及时性得不到满足。在对现场应用需求及相关新技术进行研究的基础上,提出了1套可行的光字信息系统设计方案,通过在500 kV天柱变电站的应用表明,光字信息系统在很大程度上提高了运行人员处理现场异常情况的效率。 Visual annunciator signal circuit diagram is the basis for operators to judge abnormity of visual annunciator during the operation of substation.Since it costs much time and effort to search visual annunicator circuit diagram,the judgment of abnormal signal can not be achieved in time.This paper presents a feasible plan for design of visual annunciator information system based on the researches on the onsite application requirements and new technologies.The application in the 500 kV Tianzhu substation indicates that the visual annunciator information system improves the efficiency of operators dealing with abnormal situation to a great extent.
机构地区 温州电力局
出处 《浙江电力》 2010年第11期16-18,24,共4页 Zhejiang Electric Power
关键词 变电 运行 光字系统 substation operation visual annunciator system
  • 相关文献

参考文献3

二级参考文献10

  • 1[1]David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn and Ramaswamy Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security, Vol 4, No. 3, August 2001, 224-274.
  • 2[2]Ravi Sandhu, Edward J Coyne. Role-Based Access Control Models.Computer, 1996.2,38-47.
  • 3[3]Andreas Schaad, Jonathan Moffett, Jeremy Jacob. The Role-Based Access Control System of a European Bank:A Case Study and Discussion. SACMAT 2001:6th ACM Symposium on Access Control Models and Technologies,Chantilly VA,USA,ACM.
  • 4[4]Ravi Sandhu,David Ferraiolo and Richard Kuhn. The NIST Model for Role-Based Access Control: Towards A Unified Standard. ACM 2000,47-63.
  • 5Schneier S B.Applied Cryptography-Protocols,Algorithms and Sources Code in C [M].New York:John Wiley Sons Inc.,1994:366-367.
  • 6Sandhu R,Ferraiolo D,Kuhn R.The NIST Model for Role - Based Access Conrol:Towards A Unified Standard [A].Proceedings of 5th ACM Workshop on Role - Based Access Control [C].ACM,Berlin,Germany,July 2000.26-28.
  • 7Stinson D R.Cryptography Theory and Practice [M].New york:CRC Press Inc,1995.285-288.
  • 8David F,Ferraiolo,Ravi Sandhu,etal.Richard Kuhn and Ramaswamy Chandramouli.Proposed NIST Standard for Role-Based Access Control[J].ACM Transactions on Information and System Security,2001,4(3):224-274.
  • 9Sandhu R,Munawer Q.The ARBAC99 Model for Administration of Roles [A].The Proceedings of the Fifteenth Annual Computer Security Applications Conference [C].Scottsdale,AZ,1999.12:142-153.
  • 10魏洪涛,李群,王维平.基于Web的管理信息系统的安全模型设计[J].计算机应用,2003,23(5):77-80. 被引量:28

共引文献9

同被引文献1

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部