With the rapid development of human society, the shortage of traditional energy reserves in the world and the environmental problems caused by the use of traditional energy are gradually becoming prominent, and will eventually become the bottleneck restricting the economic and social development of various countries. This paper first studies the Hadoop platform that supports large-scale data processing, mainly studies HDFS, MapReduce and HBase and other components in the Hadoop ecosystem. Then, the existing power quality monitoring system is analyzed from the two aspects of power quality monitoring data storage and data processing flow, and the correctness of the calculation based on MapReduce power quality analysis operation is verified. Issues and provide policy recommendations for future sustainable development. And the optimization objective function of power energy structure is established with the lowest total cost of power generation. The differential evolution algorithm, genetic algorithm and particle swarm algorithm are used to optimize the power energy structure of M province. The total cost of power generation calculated by the differential evolution algorithm is the lowest, and its value is 15,471,420,000 yuan. According to the results of the optimization model, Put forward strategic suggestions and policy measures for the planning and application of power energy system in Mprovince.
KEYWORDS: Information security, Network security, Chromium, Computer security, Control systems, Systems modeling, Quantitative analysis, Data modeling, System identification, Power supplies
Aiming at the problem of smart grid network information security assessment, this paper proposes a risk assessment method of smart grid network information security based on risk weight algorithm. Firstly, the information security evaluation model is established, and the existing standards are taken as the evaluation basis. Then, the hierarchy structure is established for the host security and network security, and the risk weight algorithm is used to analyze the model. The experimental results show that the evaluation method can effectively realize the quantitative evaluation of smart grid network information security.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.