LU501401B1 - Action risk identification method for power system field operation based on graph convolution - Google Patents

Action risk identification method for power system field operation based on graph convolution Download PDF

Info

Publication number
LU501401B1
LU501401B1 LU501401A LU501401A LU501401B1 LU 501401 B1 LU501401 B1 LU 501401B1 LU 501401 A LU501401 A LU 501401A LU 501401 A LU501401 A LU 501401A LU 501401 B1 LU501401 B1 LU 501401B1
Authority
LU
Luxembourg
Prior art keywords
graph
power system
operators
action
human
Prior art date
Application number
LU501401A
Other languages
German (de)
Inventor
Yifan Li
Jiaxin Zhang
hengrui Ma
Yinyu Zhou
Tian Zhang
Fuqi Ma
Peng Luo
Hongxia Wang
Yingchen Zhang
Bo Wang
Original Assignee
Univ Wuhan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Wuhan filed Critical Univ Wuhan
Priority to LU501401A priority Critical patent/LU501401B1/en
Application granted granted Critical
Publication of LU501401B1 publication Critical patent/LU501401B1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Educational Administration (AREA)
  • Water Supply & Treatment (AREA)
  • Public Health (AREA)
  • Development Economics (AREA)
  • Primary Health Care (AREA)
  • General Health & Medical Sciences (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Alarm Systems (AREA)

Abstract

The present disclosure relates to a dynamic action risk identification method for power system field operators, the method extracts skeleton information of the field operators in the power system by using a human posture estimation method, thereby transforming the video information into an undirected graph that contains the skeleton information. Then a spatiotemporal graph convolution network is used to realize the action identification of the field operators. The present disclosure can realize the risk identification of the dynamic behaviors of the field operators. The violations and risks of the field operators can be identified in real time, thereby providing technical means for the early warning and management of safety risks at the power production site, and the probability of power system accidents can be reduced. Meanwhile, the intrinsic safety level of power production is improved.

Description

BL-5405
ACTION RISK IDENTIFICATION METHOD FOR POWER SYSTEM 4501401
FIELD OPERATION BASED ON GRAPH CONVOLUTION
TECHNICAL FIELD
[01] The present disclosure relates to a field of power system operation safety management and control, and more particularly, to a dynamic action risk identification method for power system field operators based on graph convolution.
BACKGROUND ART
[02] Safe production is the basic guarantee for stable operation of power system.
Once a security accident occurs in the power system, it will cause huge economic losses and adverse social impact. The real-time identification and control of on-site operation risk of the power system is of great significance to ensure the personal safety of operators and the safe and stable operation of power grid.
[03] At present, the safety risk management methods for on-site operation mainly include manual safety supervision method and video monitoring method. The manual safety supervision method is mainly to supervise the behavior and operation of operators by specially arranging supervisors. However, the supervisors cannot guarantee all-round supervision of the operators. Moreover, the supervisors are as susceptible to external factors as operators, their attention may be distracted, which may lead to safety accidents. In particular, the power system operation has the characteristics of large amount of on-site operations, large numbers of equipment and complex operation.
Therefore, the manual supervision method is unable to realize the real-time supervision and risk early warning of all operation processes. The video monitoring system provides effective assistance for safety supervision, but the actual monitoring task still needs more manual work. The monitoring system usually only records video images for later evidence collection. In addition, some scholars have proposed the intelligent analysis methods based on surveillance video, including personnel information verification of on-site operators, safety helmet and safety belt detection, transformer substation fire detection and billboard detection. The existing methods mainly focus on static safety risk identification. However, the actual field operation in power system is a continuous and dynamic process, in which there are many dynamic security risks and violations.
The existing safety risk identification methods for safety supervision cannot identify those dynamic risks and violations of operators.
[04] Therefore, the present disclosure introduces a risk identification method for dynamic behavior of field operators of power system, to realize the dynamic action risk identification, real-time safety management and control of the field operators.
SUMMARY
[05] The purpose of the present disclosure is to provide a risk identification method for dynamic behavior of field operators of power system, which can realize dynamic risk identification of field operators of power system. The main steps of the method are as follows:
[06] Step 1, behavior monitoring and image transmission of the field operators of a 1
BL-5405 power system. Monitoring behavior of the operators through monitoring cameras LU501401 arranged on operation site of the power system, and uploading monitoring videos to a central cloud platform.
[07] Step 2, operator behavior posture estimation. Estimating behavior postures of field operators in the monitoring videos by using openpose, a human posture estimation model , then obtaining skeleton information of the field operators' behavior.
[08] Step 3, connecting the obtained human skeleton information and constructing an undirected graph G=(v,A,X) containing action information of the field operators,
N wherein Jom is a set of N vertices, A is a weighted adjacency matrix, X is a signal matrix on the vertices, and a vertex set V corresponds to all N joints of the skeleton, the adjacency matrix A represents a link relationship between two vertices, wherein if vertex vi and vertex vj are directly connected, Ajj = 1, otherwise Ai = 0.
[09] Step 4, transforming the constructed undirected graph into a spectral domain, and filtering the undirected graph containing human skeleton information in the spectral domain. For an undirected graph G=(v,A,X), a Laplace matrix L of the undirected graph is defined as follows:
[10] L=D-A;
[11] wherein, D is a degree matrix of vertices, and diagonal elements are degrees of each vertex in turn.
[12] The Laplace matrix L of the undirected graph is a symmetric positive definite matrix. The Laplace matrix L can be decomposed as follows:
[13] L=UAU",
[14] Where, A=diag([A ‚A ‚...,An ]) is a diagonal matrix of eigenvalues, and U— [ui ,u2,...,un ] is an orthogonal matrix corresponding to eigenvalue vectors.
[15] Presetting a filtering function g (-) of the undirected graph G the frequency domain filtering response of input signal X can be defined as Z(A)=X(4)g(A4), and the inverse Fourier transform of graph is defined as follows: 16] 10=D FAA) ;
[17] therefore, the matrix description of undirected graph filtering can be defined as follows:
[18] Z=Uldiag[g(4),&(%),...,&(A,)DU'LX .
[19] Step 5, identifying the undirected graph containing human skeleton information by using a graph convolutional network (GCN).
[20] Step 6, adding a human key bone node attention module between the graph convolution networks, focusing on key bone nodes related to actions, to improve the feature expression and action recognition accuracy of the network. For the violation behaviors of the operators in the power system, the influence of each skeleton joint on action recognition is different. Because an action of the operators usually has a strong correlation with only a few bone joints, weak correlation with other joints. Therefore, the patent proposes to use a human key bone node attention module to enhance the 2
BL-5405 information of key bone joints, thus improve the accuracy of operator's illegal action LU501401 identification. Assuming the feature graph obtained by graph convolution is H, the output feature graph H 'obtained by the key bone node attention module is as follows.
[21] H=WWHH;
[22] where, Wj; >0 and SW, =1. The larger the Wj, i-th joint node is more important for violation identification.
[23] Step 7, action identification and classification. For feature graphs containing human posture information extracted by the graph convolution network, all feature graphs are converted into a one-dimensional matrix by using use a full connection layer, and then a softmax function is used to identify and classify illegal behaviors and risk actions of different operators.
[24] The features of the present disclosure are:
[25] The present disclosure converts the video information into the undirected graph containing the skeleton information by extracting the skeleton information of the field operators of the power system. Then uses the graph convolution network to realize the action identification of the field operator. The present disclosure can realize the risk identification of the dynamic behaviors of the field operators. It also can identify the violations and risks of the field operators in real time, thereby providing technical means for the early warning and management of safety risks at the power production site. Simultaneously, reducing the probability of power system accidents and improving the intrinsic safety level of the power production.
BRIEF DESCRIPTION OF THE DRAWINGS
[26] Fig. 1 is a flowchart of an action risk identification method for power system field operation based on graph convolution of the present disclosure.
DETAILED DESCRIPTION OF THE EMBODIMENTS
[27] The present disclosure will be further described in detail below in combination with the accompanying drawings and specific embodiments, but the present disclosure is not limited to these embodiments.
[28] Specific embodiment:
[29] A flowchart of an action risk identification method for power system field operation based on graph convolution is shown in Fig. 1, and the specific steps are as follows:
[30] Step 1, behavior monitoring and image transmission of field operators of a power system. Monitoring behavior of the operators through monitoring cameras arranged on operation site of the power system, and uploading monitoring videos to a central cloud platform.
[31] Step 2, operator behavior posture estimation. Estimating behavior postures of the field operators in the monitoring videos by using a human posture estimation model openpose, and obtaining skeleton information of the field operators’ behavior.
[32] Step 3, connecting the obtained human skeleton information to construct an undirected graph G=(v,A,X) containing action information of the field operators. 3
BL-5405
N LU501401 wherein U Jom is a set of N vertices, A is a weighted adjacency matrix, X is a signal matrix on the vertices, and a vertex set V corresponds to all N joints of the skeleton, the adjacency matrix A represents a link relationship between two vertices, wherein if vertex vi and vertex vj are directly connected, Aj = 1, otherwise Ajj = 0.
[33] Step 4, transforming the constructed undirected graph into a spectral domain, filtering the undirected graph which contained the human skeleton information in the spectral domain. For an undirected graph G=(v,A,X), a Laplace matrix L of the undirected graph is defined as follows:
[34] L=D-A;
[35] where D is a degree matrix of vertices, and diagonal elements are degrees of each vertex in turn.
[36] The Laplace matrix L of the undirected graph is a symmetric positive definite matrix. The Laplace matrix L can be decomposed as follows:
[37] L=UAU",
[38] WhereA—diag([M ‚A ‚...,An ]) is a diagonal matrix of eigenvalues, and U— [ui ,u2,...,un ] is an orthogonal matrix corresponding to eigenvalue vectors.
[39] Presetting a filtering function g (-) of the undirected graph G the frequency domain filtering response of input signal X can be defined as Z(A)=X(4)g(A4), and the inverse Fourier transform of graph is defined as follows:
Ol 20=D 509800 ;
[41] therefore, the matrix description of undirected graph filtering can be defined as follows:
[42] Z =Uldiag[g(4),&(%,),...,&(4,)DU'LX .
[43] Step 5, identifying the undirected graph containing human skeleton information by using a graph convolutional network (GCN).
[44] Step 5.1, for the obtained undirected graph G(V,E) of human body architecture, calculating the degree matrix D, adjacency matrix A and Laplace matrix L, then performing the graph convolution on the input undirected graph G to get an output result as shown below: 3 i as] Cod AD SEW.
[46] Where, | represents layer input, W is weight matrix and is quantity to be solved.
[47] Step 5.2, inputting the undirected graph G into four graph convolution neural network modules, respectively, Block] 3x3, Block2 64x3, Block3 128x3 and
Block4 256x3 for feature extraction.
[48] Step 6, adding a human key bone node attention module between the graph convolution networks. Focusing on key bone nodes related to actions, to improve the feature expression and action recognition accuracy of the network.
[49] For the violation behaviors of operators in the power system, the influence of each skeleton joint on action recognition is different. Due to an action of the operators 4
BL-5405 . . ne . LU501401 usually has a strong correlation with only a few bone joints, and it has a weak correlation with others. Therefore, the patent proposes to use a human key bone node attention module to enhance the information of key bone joints, to improve the accuracy of operator's illegal action identification. If the feature graph obtained by graph convolution is H, then the output feature graph H 'obtained by the key bone node attention module is as follows.
[50] H'=W(H)H;
[51] wherein, Wj >0 and SW, =1. The larger the W;;, i-th joint node is more important for violation identification.
[52] Step 7, action identification and classification. For feature graphs containing human posture information extracted by the graph convolution network, all feature graphs are converted into a one-dimensional matrix by using use a full connection layer with 256 neurons. Then a softmax function is used to identify and classify illegal behaviors and risk actions of different operators.

Claims (1)

BL-5405 WHAT IS CLAIMED IS: LUS01401
1. An action risk identification method for power system field operation based on graph convolution consists of the following steps: step 1, behavior monitoring and image transmission of field operators of a power system. Monitoring behaviors of the operators through monitoring cameras which arranged on the operation site of the power system. Then uploading monitoring videos to a central cloud platform. step 2, operator behavior posture estimation. Estimating behavior postures of field operators in the monitoring videos by using a human posture estimation model openpose, and obtaining the skeleton information of the field operators' behavior. step 3, constructing an undirected graph that contains the human skeleton information. Connecting the obtained human skeleton information and constructing an undirected graph G=(v,A,X) which contained the action information of the field N operators. where, Jum is a set of N vertices, A is a weighted adjacency matrix, X is a signal matrix on the vertices, and a vertex set V corresponds to all N joints of the skeleton. The adjacency matrix A represents a link relationship between two vertices, where, if vertex vi and vertex v; are directly connected, Ajj = 1, otherwise Ai = 0; step 4, transforming the constructed undirected graph into a spectral domain, and filtering the undirected graph that contains the human skeleton information in the spectral domain. step 5, identifying the undirected graph that contains the human skeleton information by using a spatiotemporal graph convolution network. step 6, adding a human key bone node attention module between the graph convolution networks. A feature graph obtained by graph convolution is H, and an output feature graph H 'obtained by the key bone node attention module is as follows: H'=W(H)H; wherein, Wj >0 and SW, =1, and the larger the W;;, i-th joint node is more important for violation identification. step 7, action identification and classification. For the feature graphs containing human posture information extracted by the graph convolution network, all feature graphs are converted into a one-dimensional matrix by using a full connection layer. Then a softmax function is used to identify and classify the illegal behaviors and risk actions of different operators. 1
LU501401A 2022-02-07 2022-02-07 Action risk identification method for power system field operation based on graph convolution LU501401B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
LU501401A LU501401B1 (en) 2022-02-07 2022-02-07 Action risk identification method for power system field operation based on graph convolution

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
LU501401A LU501401B1 (en) 2022-02-07 2022-02-07 Action risk identification method for power system field operation based on graph convolution

Publications (1)

Publication Number Publication Date
LU501401B1 true LU501401B1 (en) 2023-08-07

Family

ID=87554114

Family Applications (1)

Application Number Title Priority Date Filing Date
LU501401A LU501401B1 (en) 2022-02-07 2022-02-07 Action risk identification method for power system field operation based on graph convolution

Country Status (1)

Country Link
LU (1) LU501401B1 (en)

Similar Documents

Publication Publication Date Title
CN110674772B (en) Intelligent safety control auxiliary system and method for electric power operation site
CN112734692B (en) Defect identification method and device for power transformation equipment
CN103617469B (en) Power system device failure prediction method and system
CN112183265A (en) Electric power construction video monitoring and alarming method and system based on image recognition
CN117172414A (en) Building curtain construction management system based on BIM technology
Zhao et al. Detection and location of safety protective wear in power substation operation using wear-enhanced YOLOv3 algorithm
CN112257500A (en) Intelligent image recognition system and method for power equipment based on cloud edge cooperation technology
CN110298234A (en) Substation's charging zone safe early warning method and system based on human body attitude identification
CN110379036A (en) Intelligent substation patrol recognition methods, system, device and storage medium
CN116846059A (en) Edge detection system for power grid inspection and monitoring
CN114037873A (en) Transformer substation secondary circuit protection pressing plate detection system and method based on artificial intelligence
LU501401B1 (en) Action risk identification method for power system field operation based on graph convolution
CN112200030A (en) Power system field operation action risk identification method based on graph convolution
CN113762115B (en) Distribution network operator behavior detection method based on key point detection
CN116052035A (en) Power plant personnel perimeter intrusion detection method based on convolutional neural network
Xudong et al. Research of YOLOv5s Model Acceleration Strategy in AI Chip
Zheng et al. Research on optimization of agricultural machinery fault monitoring system based on artificial neural network algorithm.
CN117237993B (en) Method and device for detecting operation site illegal behaviors, storage medium and electronic equipment
Zhao Power safety management and control based on the risk fusion model of object detection and power operation
Chen et al. Research on deep learning-based behavioral recognition technology for electricity operators
CN117172989B (en) Intelligent campus management method and system based on big data
CN113780224B (en) Unmanned inspection method and system for transformer substation
Menghao et al. Research on the Application of Artificial Intelligence Technology in Safety Control of Electric Power Operation Site
Zhang et al. A Power Operation Site Safety Assistant System Based on Convolutional Neural Network
Lin et al. A Method for Analyzing and Warning the Safety Behavior of Smart Campus Personnel Based on Deep Learning

Legal Events

Date Code Title Description
FG Patent granted

Effective date: 20230807