期刊文献+

基于统一数据平台的电力调度管理系统 被引量:5

Power Dispatching Operation Management System Based on Uniform Digital Platform
下载PDF
导出
摘要 以电力调度自动化系统为研究对象,通过对系统存在的数据源多、数据一致性差、存在信息孤岛等现象分析,提出综合运用数据库相关技术建立基于统一数据平台,并以此建立全新的电力调度管理系统,为用户提供标准、准确、快速的数据服务。简要介绍了统一数据平台的体系结构、调度管理系统的设计思路及实现的关键技术等。 Taking the power dispatching automatic system as the objective of study, and based on an analysis on the phenomena of Multiple-Data-Source, data differences and information islands, this paper establishes a wholly new Operation Management System by means of the Uniform Digital Platform to provide users with the standard, accurate and fast digital data service. The paper briefly discusses the key technologies such as the architectonic construction, the design philosophy and systems application architecture and the key technologies of realization of the Operation Management System, etc.
出处 《电网与清洁能源》 2012年第10期47-50,共4页 Power System and Clean Energy
关键词 统一数据平台 电力调度 信息孤岛 调度管理系统 Uniform Digital Platform power dispatching information island OMS system
  • 相关文献

参考文献7

二级参考文献25

  • 1沈昌祥.用信息安全工程理论规范信息安全建设[J].计算机世界,2001,(34):01-01.
  • 2马东平.设计企业信息系统的安全体系[J].计算机世界,2001,(34):08-08.
  • 3DoD. Information Assurance Technical Framework V 3. 0.http://www. iatf. net, 1996.
  • 4SSE-CMM Project. Systems Security Engineering Capability Maturity Model Version 2.0. http://www. sse-cmm. org, 1999-04-01.
  • 5Herrmann P, Krumm H. Object-oriented Security Analysis and Modeling. In: Proc 9th International Conference on Telecommunication Systems— Modeling and Analysis. Dallas(US): 2001. 21-32.
  • 6Lowman T, Mosier D. Applying the DoD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architectures. New York: IEEE, 1997.
  • 7ISO/IEC TR 13335-5. Information Technology — Guidelines for the Management of IT Security, Part 5: Management Guidance on Network Security (First Edition). 2001.
  • 8Kienzle D M. Practical Computer Security Analysis (Thesis).Charlottesville: University of Virginia, 1998.
  • 9ISO/IEC 15408-2. Information Technology — Security Techniques Evaluation Criteria for IT Security, Part 2:Security Functions Requirements (First Edition). 1999.
  • 10张华钦,计算机世界,2000年

共引文献99

同被引文献27

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部