KEYWORDS: Data modeling, Telecommunications, Data conversion, Data fusion, Performance modeling, Optimization (mathematics), Lithium, Systems modeling, Network security, Data communications
The equipment and device protocols in the power monitoring system are difficult to unify, and the existing power monitoring system structure system analysis protocol takes a long time. In order to improve the system operation efficiency, a power monitoring system architecture based on multi-protocol fusion is designed. Establish a power monitoring system model through the power and state change equations; coordinate the data analysis in the system and the caching and reading functions of key logic to ensure multi-protocol fusion and conversion of power monitoring data; reset the power monitoring architecture based on the multi-protocol fusion method, establish a multi-objective optimization model, set its constraints, and obtain a new power monitoring system architecture. Taking the user scale as a variable, comparing the response time of four different power monitoring systems, it can be seen from the experimental data that the time required for this architecture is the minimum value under the same conditions under five different operations. The optimization effect is the best, which can realize the fast response of the power monitoring system.
The existing security alarm system is difficult to accurately judge the effective alarm data, resulting in a large amount of redundant data in the alarm system database. In order to alleviate the operation pressure of the alarm system, a power monitoring network security threat alarm system based on attribute attack graph is designed. In the system hardware, the CPU power supply and network interface are designed. In the system software, the visual traceability analysis of security threat data is carried out. Based on the attribute attack graph, the topology algorithm is used as the analysis tool of attack nodes, and the weight index of information similarity is established. The binary attack node system in the system is established by atomic attack node and attribute attack node to judge the similarity level of different alarm information. In the experiment, the alarm aggregation rate and system reliability of four different alarm systems are tested. The experimental data show that the system can remove more redundant data without losing alarm data, which shows that the system has better performance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.