Monitoring and Operation Analysis on Power Environment of Computer Room Based on Big Data

Article Preview

Abstract:

Based on the requirement of the Reduce of power information network failures, the power environment monitoring system based on big data is designed and implemented. The system includes five application modules: acquisition and monitoring module, resource management module, analysis and decision module, alarm center module and configuration management module. An improvement of Apriori algorithm by the unique design array which is used for data analysis can enhance efficiency of the algorithm. The system based on Big Data technology, by the efficient analysis of power data, environmental data, main data and external Data, to achieve a comprehensive perception of monitoring and operation analysis on power environment of computer room based on big data, intelligent auxiliary user decisions. Through research and implementation of the project, we can realize real-time monitoring of the video and the environment of the substation, besides we can locate and prevent the various alarms (fire, flooding and theft, etc.) timely. Providing effective technical support for staff remote inspection and troubleshooting. The project can prevent accidents, combat crime, protect property, ensure that the system is stable, and make the substation security technology improving to a new level.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

258-263

Citation:

Online since:

April 2017

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2017 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Y. J. Shi, Centralized supervision and control system for power supply and environment, Electrified Railway, (06) (2004) 40-43.

Google Scholar

[2] L. X. Tang, X. F. Liu, X. Y. Xu, Research of Centralized Monitoring of Machine Room Environment, Inform. Technol. Informatization, (3) (2009) 81-82.

Google Scholar

[3] L. Chen, Y. H. Chen, J. H. Liu, et al. Association Analysis and Processing Strategy for Network Events based on the Combination of RBR and CBR, Appl. Mech. Mater. 687-691 (2014) 2320-2325.

DOI: 10.4028/www.scientific.net/amm.687-691.2320

Google Scholar

[4] L. Chen, J. H. Liu, Q. Wang, et al. Design and Implement of Operational Rule Base Based on Machine Learning and Association Rule Mining, Appl. Mech. Mater. 734 (2015) 422-427.

DOI: 10.4028/www.scientific.net/amm.734.422

Google Scholar

[5] Information on http: /www. ntut. edu. tw/~rhlin/AI/Lecture/12-1. pdf.

Google Scholar

[6] H. Wu, Z. Lu, L. Pan, et al. An Improved Apriori-based Algorithm for Association Rules Mining, Fuzzy Systems and Knowledge Discovery, 2009. FSKD '09. Sixth Int. Conf. IEEE, (2009), pp.51-55.

DOI: 10.1109/fskd.2009.193

Google Scholar

[7] C. Yadav, S. Wang, M. Kumar, An approach to improve apriori algorithm based on association rule mining, Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth International Conference on. IEEE, (2013), pp.1-9.

DOI: 10.1109/icccnt.2013.6726678

Google Scholar

[8] P. J. Wang, L. Shi, J. N. Bai, et al. Mining Association Rules Based on Apriori Algorithm and Application, Computer Science-Technology and Applications, International Forum on. IEEE, (2009), pp.141-143.

DOI: 10.1109/ifcsta.2009.41

Google Scholar