Data Object Modeling for Industrial Internet of Things and Its Efficient Implementation in a Cloud Test System for Relay Protection
Published Online: Mar 24, 2025
Received: Oct 29, 2024
Accepted: Feb 02, 2025
DOI: https://doi.org/10.2478/amns-2025-0779
Keywords
© 2025 Xiang Huang et al., published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
With the rapid development of China’s electric power industry, the capacity of major power systems and the grid area is expanding, resulting in increasingly complex grid structure, and the complexity of the rectification calculation is also increasing [1-2]. A set of complete and scientific rectification scheme will produce different protection coordination effects due to different network structure, protection configuration, and rectification principle selection methods [3-4]. Therefore, how to obtain an optimal rectification scheme is very critical for relay protection to function correctly [5-6].
With the gradual implementation and completion of large-scale power transmission projects such as “Western Electricity Sent to the East, Nationwide Networking”, ultra-high voltage grid, Yindong DC, etc., China’s power grid will enter into a new scale never seen before, coupled with new energy sources such as wind power, photovoltaic power, biomass power generation, nuclear power and other new energy sources being connected to the grid one after another, the structure of the network becomes more complex, which puts higher requirements on the reliability of the power grid [7-9]. Protection configuration requires more comprehensive and detailed consideration, coupled with frequent new energy into the grid, grid boundary impedance changes frequently, the workload of relay protection calibration calculation is getting bigger and bigger, the complexity of protection coordination is getting higher and higher, grid relay protection calibration coordination is very difficult or even impossible to realize if manual manual coordination is used again, which increases the risk of safe and stable operation of the power grid [10-13].
With the construction of extra-high voltage power grids and the rapid development of the grid scale, especially large-scale new energy access to medium and low voltage distribution networks, the traditional sense of the upper and lower levels has been difficult to define, the short-circuit current flow tends to be complex, and the degree of mutual influence is increasing [14-16]. For this reason, a large number of scholars and engineers and technicians start from the relay protection integrated rectification calculation, and study how to establish a set of rectification calculation of the whole network basic data containing each voltage level [17-18].
One way of thinking is centralized modeling. That is to say, the setting calculation personnel dispersed in different regions jointly maintain and establish a set of setting calculation basic data model on the same server according to the jurisdiction of scheduling and the distribution of authority. The advantage of this idea is that it is easy to understand and simple to realize. The disadvantage is that it requires higher performance of the server, lower efficiency of the calibration calculation, and stronger dependence on the network [19-21]. The larger the size of the grid, the more decentralized the regional distribution, its shortcomings are more obvious. Another idea is the distributed modeling of “decentralized modeling and data splicing” [22-23]. That is, the calibration calculators in different regions build calibration data models on their own servers according to the jurisdiction of scheduling, and then construct the whole network model through the data splicing of the upper and lower level servers. According to the characteristics of the power grid, this idea can flexibly choose whether to use the whole network data or the equivalent simplified model for the rectification calculation, with higher computational efficiency, lower dependence on the network, ensuring the daily work of relay protection rectification calculation, and lower performance requirements for the server, which has gradually become the mainstream program [24-27].
The purpose of building relay protection cloud testing system is to improve the informationization and intelligence level of dispatching system, make all aspects of secondary device operation and management “controllable and under control”, and realize the modernization of relay protection professional management. The article takes the IEC61850 standard protocol as the basis for grid data object modeling, presents the specific framework of a relay protection cloud testing system, and utilizes the IEC61850 standard for relay protection modeling. The indexing method for database data storage and query is established based on the quadtree algorithm, and the fixed value inspection and alarm function module is designed in the relay protection cloud testing system. For the fixed-value verification of relay protection cloud test system, this paper constructs an intelligent warning model for relay protection fixed-value verification based on the principle of fixed-value verification and the introduction of radial basis network model. For the application of relay protection cloud test system, this paper carries out data analysis from the transmission performance of data objects and the effectiveness of relay protection fixed value calibration, aiming at exploring a new path to realize the stable operation of power grid.
Due to the extensive content and complex structure of power system automation and informatization, different communication technologies are used, and the application systems are inconsistent due to technical requirements, communication protocols and data representations, resulting in their inability to share and interact with each other and the formation of a large number of information islands. This problem also exists in the existing relay protection cloud testing system. Since the system adopts a dedicated communication protocol, a dedicated API and a dedicated data representation, the object model and communication protocol of the system must be converted for information exchange between the system and other systems. This type of conversion requires a large amount of software overhead, a long conversion time, high costs, and a large maintenance workload. Based on this, this paper proposes a data object modeling method for the Industrial Internet of Things and applies it to the relay protection cloud testing system, aiming to further improve the information interaction capability of the relay protection cloud testing system and realize the effective scheduling and testing of the power system.
Relay protection cloud testing system involves a wide range of aspects. One needs to consider relay protection, dispatching operations, substation operations, maintenance, and other aspects of demand. The functions are complex and involve real-time monitoring and control of secondary devices, automatic analysis of power grid faults, relay protection action behavior, relay protection related calculation and analysis. Cross-regional, cross-system, access to a variety of equipment, the need to interconnect with substation automation, dispatch automation, and other systems, and compatibility with a variety of different manufacturers, and different signals of the protection device. Considering a variety of possible communication connections and specialized applications, the framework of a relay protection cloud testing system for industrial IoT should be shown in Figure 1 [28]. The sub-station system in the figure is connected to the master system by means of network (or leased line, carrier wave, etc.), and the same sub-station system can be connected to multiple master systems. The master systems are connected together through the power dispatch data network, and the master systems in different regions may belong to different communication networks, and the sub-station systems send all the collected data to the directly connected master systems. The master system, as a data concentrator, provides access to the data of the sub-station systems to other master systems through data services, and similarly, the master system can access the data of the sub-stations distributed in other master systems.

Relay protection cloud test system framework
From the above structure, on one hand, the system is characterized by a natural distribution, which makes the data physically distributed. On the other hand, the master system not only needs the data of all directly connected sub-systems, but also may need the data of other non-directly connected sub-systems, which makes it logically possible for the data to be used in a “centralized” way. The cloud test system for relay protection should have a hierarchical distributed structure. Layers can simplify the system design and create the necessary conditions for the system’s openness, scalability, and maintainability. Distribution can reduce the redundancy of data storage and achieve the in situ closure of complexity, thus reducing the overall cost of the system.
In the substation layer, the substation of the system only behaves as a customer of the information service of the intelligent device, and the substation system must be adapted to the communication protocols of various intelligent devices including the standard protocol of IEC61850.The formulation of the IEC61850 standard provides a better idea of the modeling of the communication data interfaces of the relay protection cloud test system.The information model of IEC61850 has a strong ability to express the information. The information model of the IEC61850 standard protocol is able to transmit all the information of the substation, which is suitable for secondary information modeling.
The IEC61850 standard contains a hierarchically structured data model, which is abstracted into Server, Logical Device, Logical Node, Data Object, Data Attribute, etc. by virtualizing the actual physical device IED [29].There are 10 parts in the IEC61850 standard, and the first 5 parts of the IEC61850 mainly focuses on the general requirements, terminology, system and engineering management, communication requirements, and other basic descriptions about the system. Part 6 deals with the configuration description language in terms of functionality, modeling, and communication. Part 7 describes the information exchange model, which describes the basic model of the standard, abstract communication services, and basic data types. Parts 8-9 are about mapping abstract services to communication protocols and transmitting communications according to the protocols, and Part 10 is about conformance testing of the system.
The IEC61850 standard proposes the concept of station information layering, which utilizes the method of information layering to achieve the purpose of station communication data division. The advantages of adopting a layered distributed structure are as follows:
It is conducive to the independent installation of electrical equipment and the corresponding protection and measurement functions, and the system operation is not affected by the failure of a single element. It is conducive to the rapid location of faulty equipment and implementation of isolation, and realizes the system self-diagnosis and even self-healing function. Adopt layered network structure, which is conducive to the realization of information transmission and sharing. Flexible system expansion.
From a hierarchical point of view, the substation automation system is divided into station control layer, interval layer and process layer, which defines the communication interfaces between and within the layers, effectively realizing the exchange of various types of data between the two sides of the communication. The process layer collects analog quantities of system operation, monitors the operating status of equipment, sends control commands related to the function of primary equipment, etc., and interacts with the interval layer. The interval layer provides a summary of the data processing for an interval and operates its primary equipment according to communication information. The station control layer summarizes the data information of the whole station, executes the tripping and blocking signals of the whole station, and realizes the communication functions such as human-machine interface and remote control.
The IEC 61850 standard uses an object-oriented model that decomposes substation functions into logical nodes representing the smallest functional units. It also defines a communication service model and an information model, including a server (Server), logical devices (LD), logical nodes (LN) and data objects (DO) and data attributes (DA).
The Server encapsulates logical nodes and data and offers interfaces for external access. A logical device consists of logical nodes and additional services representing a set of functions, each representing a logical node. A logical node is the smallest unit that implements a data function. Data objects provide a means of illustrating the representation of information, and data attributes define the name, format, range, or allowed values, and the notation of the sampled values to be transmitted.
Overall, to build the IEC61850 information model, it is first necessary to define the specific logical nodes and data objects required for the goal, and to construct logical devices based on the selected objects, which are then constructed into servers to publish/subscribe the communication data to realize the transfer of information between different substation systems.
The IEC61850 standard is an object-oriented modeling approach to model the relay protection cloud test system, which not only allows for modification of the system’s functionality at any time, but also works well with other units and has good scalability. Therefore, information modeling is the core key point of the IEC61850 standard.
The primary task of modeling a relay protection device using the IEC 61850 standard protocol is to describe and define the various functions of relay protection as follows:
Protection functions. Multi-segment grounding and inter-phase distance element protection, multi-segment zero sequence and inter-phase overcurrent element protection, longitudinal protection, circuit breaker failure protection, and oscillation blocking protection. Measurement function. Measurement of voltage and current of each phase, measurement of active and reactive power, and power factor, and measurement of phase angle difference between voltage and current. Control function. Automatic reclosing, circuit breaker control, constant value adjustment, relay input and output control.
The relay protection configuration generally includes fast main protection in the direction of the longitudinal fault component and the zero sequence direction, fast I section protection consisting of distance elements, and backup protection consisting of three-section phase-to-phase and grounding distance and a number of sections of zero sequence direction overcurrent.
It is known from the IEC 61850 standard that the various functions in a line protection device can be defined in terms of logical nodes, with each function of the actual device defined as an instance of a functional logical node. The geometry of all logical nodes plus ancillary services constitute a logical device. A logical device can be defined as a protected line, and each line is an instance of a logical device. All functions and data of the line protection device can be provided and accessed via a server, which in the actual device is the communication structure of the physical protection device with the corresponding communication address. In the logical node there should also be defined an object model for the Generalized Data Variables (GGIO), which is the common data attribute geometry in the protection device. It defines data objects for controlling and accessing the configuration parameters of the protective device.The GGIOs are used for amplitude, saving and activating the configuration parameters of the protective device as well as for determining the operating paradigm of the protection. The values of phase voltages, phase-to-phase voltages, phase currents, voltages, and currents of each sequence obtained by the metrological value measurement unit can be defined in this object model for retrieval and use by the user.
Database data modeling design Based on the configuration of relay protection devices, it can be seen that the various types of grid data converge in the logical node layer, and the basis of database modeling is to determine the entity or object class of the database and its attributes. The database data of the relay protection cloud test system is divided into basic data, equipment parameter data, and operation paradigm data. The basic data mainly corresponds to grid area information and provincial grid information. The entities corresponding to the equipment parameter data are mainly plant stations, transformers, bus bars, lines, generators, series compensation capacitor reactors, and other grid components and equipment. The entities corresponding to the operation mode data mainly include the system operation mode and plant operation mode, and the plant operation mode includes the operation status (whether it is put into operation or not) of each grid component. Each of the above types of data needs to be indexed in a suitable way to help users understand the changes in relay protection data and provide data support for the realization of relay protection. Quad-Tree Algorithm Quad-tree (Quad-tree) is a tree-like data structure, each node has up to four subtrees [30]. Quad-trees are very efficient in indexing and storing data and thus play an important role in categorizing data. The quadtree divides the two-dimensional space of the experimental area equally into four equal subspaces, that is, four subtrees, and recursively goes on until it reaches a certain depth or stops dividing when it meets the human-set requirements. When data is inserted, one of the four subtrees is selected according to the set conditions and continues down until the bottom child node is reached. Quadtrees can be categorized into edge quadtrees, point quadtrees, and quadtree blocks according to their morphology. A quadtree divides the two-dimensional space, i.e., the experimental space is divided into four groups of the same quadrant on the plane, and each leaf node represents a quadrant, which contains the experimental data for each node in the tree. The number of its child nodes is either 4 or 0 (for a leaf node). Quadtree-based data storage and indexing design The logical nodes in the relay protection cloud test system contain a large amount of data, how to realize the effective storage and indexing of its data has become an important issue to improve the transmission efficiency and abnormality judgment of the relay protection cloud test system. Based on this, this paper proposes to design the data storage and indexing method based on quadtree algorithm in the database data model, because the coordinates of the logical nodes in the relay protection cloud testing system are adjacent to each other, and the quadtree data structure is used to represent the logical nodes by a better organizational effect. According to the quadtree index construction process, the coordinate data points are constructed recursively. All data points are stored in the leaf nodes of the quadtree, and the non-leaf nodes represent the rectangular region it represents, which contains the center coordinate information of the region. Quadtree represents the index of two-dimensional regional coordinates, the query process is an iterative process, that is, constantly and the center of the rectangular region to compare, to determine the data to be queried belongs to the rectangular region of which four small rectangular region, and has been iterated until to find the coordinates of the data information to be found.
The fixed value inspection module mainly realizes the summoning and checking of the fixed values of the protection devices in the field of the sub-station, including the summoning and checking of the fixed values of the protection devices in the operation area and the summoning of the fixed values in the non-operation area. At the same time, in special mode, some protection devices need to execute temporary fixed values, and thus two or more sets of fixed values will be stored in the protection devices in different zones. If the fixed value of different fixed value area is mixed, it will cause the protection device to misoperate or refuse to operate and other serious consequences, so the summoning of the current fixed value area number of the protection device is also a basic function that the fixed value inspection module should be able to realize. Fixed-value inspection module work, the first need to detect the fixed value of the protection device and the system stored in the standard library of the fixed value of the same, when the detection of the fixed value of the content of the difference, or with a set of protection device information transmission is not smooth, then issued an alarm to remind the staff to check.
Fixed-value inspection module work that finds on-site fixed-value anomalies should be issued in a timely manner to remind the staff to deal with the alarm in a timely manner. The realization of the alarm function requires the use of a fixed-value inspection alarm module. When the alarm information is generated, the fixed value inspection alarm module will transmit the alarm information to the corresponding workstation to remind the relevant staff to check and deal with it promptly. Reminders generally use sound and light alarm modes. Alarm information can be used in the form of a light sign, so that the alarm is more direct and eye-catching. The first level of information is displayed as the specific name of the substation, the second level of information is displayed as the specific interval of the substation’s protective devices, and the third level of information is displayed as the specific list of entries. Through the three-level information display, maintenance personnel can locate specific protective devices, which helps them deal with them timely.
Relay protection value verification refers to the process of obtaining real-time data on equipment values during system operation and verifying the accuracy and reasonableness of various relay protection values in the current system. According to the real-time data collected by the system (including the system operation mode, protection configuration value, and so on)., the intelligent verification real-time judgment of all the system relay protection value adjustment status, including the adjustment range and reasonableness of the relay protection. It gives early warning information to all relay protections with potential risk of false operation, which facilitates the operation and maintenance personnel to find and eliminate the potential risk of equipment operation in time, ensures the safe and stable operation of relay protection devices, and thus improves the safety and reliability of the power system operation.
Relay protection sensitivity requirements, that is, in the protection range can be sensitive and rapid response to faults or abnormal operating conditions, and make the corresponding action, the sensitivity of the advantages and disadvantages of the sensitivity coefficient is measured by the size of the sensitivity coefficient.
Zero sequence current protection Consider the maximum zero sequence current 3
Where Zero sequence current protection II Consider the minimum zero sequence current Zero sequence current protection section III When the zero sequence current protection section III is used as a near backup protection, it is calibrated according to the minimum zero sequence current 3
When used as a remote backup protection, it is calibrated to the minimum zero sequence current at the time of a ground fault at the end of an adjacent line, i.e:
The selectivity of relay protection requires that the fault be removed in the first instance by the circuit breaker closest to the power side of the point of fault. If the protection for this action refuses to act, then the higher level of protection on the power side should act.
Line protection selectivity of the calibration mainly depends on when the fault occurs in the protection line outside the measurement, the protection can reliably not action. When checking, it is mainly to see whether there is selectivity between the protection delay section and the neighboring sections of protection. Zero sequence current protection selective checking of the basic rules are: to be checked according to the time of the protection action, to find out the neighboring and the protection of the action time is most similar to the two segments, set as M-1 paragraph and M paragraph, and its action time is between the two. If the full length of the range to be protected by the check is less than the range of the protection M-1 segment, the system selectivity requirements are met. Otherwise, it is not selective with the neighboring protection M segment.
Figure 2 shows a schematic diagram of protection coordination, A protection II segment action range is smaller than the B protection M-1 segment action range, when the fault occurs in the range of 0% ~ a%, B protection M-1 segment has a quick-acting first to excise the fault, and the protection A will not occur in the false action. If the fault occurs in the range of a%~100%, which is beyond the range of A protection, A does not act, i.e. the selectivity requirement is satisfied.

A schematic of protection
Figure 3 shows another schematic diagram of protection coordination, A protection II section action range exceeds the B protection M-1 section action range, if the fault occurs in the a%~b% section, due to the A protection II section action time is smaller than the B protection M section action time, so the A protection may be the first to take action to remove the fault first or the two are removed at the same time. At this time, the A protection will be faulty, which does not meet the system selectivity requirements.

Another schematic of protection
Grounding distance I checking Grounding distance I protection in the protection line range should be reliable when the end of the fault does not act. Grounding distance I protection is quick-acting protection, no delay instantaneous action. In order to ensure that the end of the scope of protection (adjacent line outlet) fault occurs, the protective device of the grounding distance I section does not operate, must be set in the action impedance setting, so that the scope of protection does not reach the full length of the line. The calibration formula is:
Where, Grounding distance II section calibration Grounding distance II protection belongs to the fixed-time protection, and grounding distance I protection together constitute the main protection of the distance protection, when the line end of the ground fault occurs when it must have enough sensitivity to cut off the fault. That is, it should satisfy:
In the formula, Grounding distance III section calibration Sensitivity, phase distance III protection can not only be used as the line I, II section of the protection of the near backup protection, but also as a neighboring lower equipment protection of the far backup, which must meet a certain degree of sensitivity. The far backup protection calibration formula is:
Where
Near backup protection calibration formula is:
Where
Selectivity does not exceed the range of the next level of protection that cooperates in time.
In order to realize the fast warning of smart grid relay protection fixed value for relay protection cloud testing system, this paper proposes the fast warning method of relay protection fixed value based on radial basis network (RBF) [31].
The relay protection fixed value that does not satisfy the sensitivity as well as selectivity requirements is taken as the input to the radial basis neuron network, which is represented by the input vector
Assuming that the neuron network weight is
Radial basis neuron network learning consists of Gaussian function center value Adjust the hidden layer neuron center and width radial basis neuron network error function formula is as follows:
where
where
The parameter correction is proportional to the negative gradient to minimize the error function, then the parameter correction Δ
Where,
After inputting all the samples, the parameter equations are adjusted by iterative method as follows:
Where
When the width change rate is higher than the learning rate of the neuron center of the hidden layer, the radial basis neural network generalization performance is better.
Determine the radial basis neural network weights Let
In the formula,
The RBF-based relay protection value calibration process proposed in this paper is shown in Fig. 4, which mainly contains two phases of offline training and online calibration, aiming at realizing the intelligent and fast warning of relay protection value calibration, and fully ensuring the stable operation and scheduling of the power network.

Based on RBF’s relay protection value check process
Offline training consists of four parts:
Extreme operation mode data generation. Generally, through offline simulation, a large number of extreme operation mode data is generated for a specific network to constitute a sample set. It is also possible to collect the extreme modes of operation that have occurred in the past period of time, but the extreme modes of operation collected in this way are often not comprehensive enough, and need to be supplemented by offline simulation calculations. Physical model calibration. Apply the physical calibration model to each extreme operation mode in the sample set to determine whether the protection loses selectivity, in order to generate the sample label set. Modeling the mode fixing matrix. According to the operation steps in Section 3.2.1, a mode fixing matrix model containing protection fixing and operation mode information is established as input data for RBF. RBF modeling and training. The RBF model is trained by taking the sample way value matrix as input and the sample label set as output, and the RBF model is tuned by the control variable method.
The online calibration process is broken down into two parts: input data construction and fixed-value calibration. When a new extreme operation mode occurs, the mode fixed value matrix is first generated according to the current operation mode information and the protection fixed values information. Since only part of the lines are put into and taken out of service under extreme operation mode, the mode fixed value matrix can be obtained by modifying the mode fixed value matrix under the original operation mode. Then the matrix is inputted into the trained RBF model to obtain the results of relay protection value checking.
Relay protection value is closely related to the safe and stable operation of the system. In recent years, all kinds of relay protection setting calculation software basically adopts mature algorithms and software technology, which provides a better calculation management platform for relay protection professionals and improves the automation and management level of relay protection setting calculation. However, there are still various defects in the actual application, which cannot adequately meet the application needs of relay protection setting calculation professionals. Based on this, this paper proposes an IEC61850 standard relay protection cloud test system for industrial Internet of Things, which can realize intelligent calibration of relay protection by combining with neural network, and it can be used to guide the work of relay protection setting calculation and calibration, which can effectively improve the accuracy and reliability of relay protection setting value calibration.
In the data transmission process of relay protection cloud testing system, this paper designs a semantic indexing method based on quadtree algorithm, which aims to better realize the efficient transmission of relay protection related data. In order to verify the effectiveness of the application of this method in the relay protection cloud testing system, this paper quantitatively analyzes the four indexes, namely, query response time, query comparison times, the amount of data transferred by the server and the number of server connections. The indexing model without cache, semantic cache model (SCM) and quad-tree indexing methods are selected for comparison, and the data object query performance of different methods is obtained as shown in Fig. 5, where Fig. 5(a)~(b) shows the comparison results of query response time and query comparison times, respectively.

Data object query performance
Generally speaking, the query and the processing process with larger data volume takes more time. In Fig. 5(a), it can be seen that the slope of the response time of the no-cache model is larger than that of the semantic cache model, and the response time of the quadtree-based indexing is less than that of the traditional semantic cache model, and the average response time of the indexing query based on the quadtree algorithm is only 3.17 s in the process of 30 queries.This is due to the fact that both the query time and the volume of the data returned from the server are more important in the design of the indexing based on the quadtree algorithm are less than the traditional semantic caching model. Moreover, in Fig. 5(b), the number of query comparisons is proportional to the number of queries for the uncached model, while the slope of the curve for the cached model is very small. More importantly, the number of query comparisons for the indexing method based on the quadtree algorithm is less than that of the traditional semantic caching model. This is due to the fact that location-dependent queries have a high level of similarity, and therefore unnecessary comparisons can be eliminated by using the quadtree algorithm. The results above show that the indexing method based on the quadtree algorithm can better utilize the data cache of the relay protection cloud testing system and improve the efficiency of data queries.
In addition, this paper further compares the amount of data transferred to the server and the number of connections between the no-cache and the methods in this paper, and Fig. 6 shows the comparison results of the different methods, where Fig. 6(a)~(b) shows the comparison results of the amount of data transferred to the server and the number of connections, respectively. From the figure, we can see that in the absence of caching model, the amount of data transmitted over the network is very large, almost proportional to the number of queries. With the same amount of data transferred in the semantic caching model, the slope is significantly lower. This is due to the fact that all or part of the desired query results are contained in the semantic cache. Additionally, the number of server connections is inversely proportional to the number of queries in the no-cache model. This is due to the fact that in the no-cache scenario, the server is accessed for each query request. Whereas, in the quadtree-based index design, the number of service connections is less, this is because the required query results are contained in the data cache in whole or in part. In summary, the quadtree index design for query processing can fully utilize cache resources, reduce network load, and also support frequent disconnections occurring during the query.

Comparison results of different methods
In the data storage experiments, this paper selects 5 hours of monitoring data from a substation for testing and conducts parallel writing experiments on the above 5 hours of data respectively. In order to verify the effectiveness of this paper’s indexing algorithm based on the quadtree algorithm, the five hours of grid monitoring data were constructed in parallel, respectively, and the traditional parallel writing algorithm as well as the parallel resampling algorithm were selected as comparisons, and Fig. 7 shows the results of the comparison of different methods.

Comparison results of different methods
As can be seen from the figure, the indexing method based on the quadtree algorithm in this paper takes only 93.54ms on average for parallel writing of grid monitoring data into the database, which is 65.41% and 33.97% lower than the traditional algorithm and parallel resampling algorithm, respectively, and the time required is much smaller than the two comparative algorithms. When the amount of data gradually increased, the traditional algorithm to write the database time increase is larger and this paper based on the quadtree indexing method of the time required although increased but the overall rise is smaller, which can be seen in this paper proposed method effectively reduces the reduction of the time required to write the grid monitoring data into the database, can be higher storage efficiency will be related to the logical nodes of the data written into the database, for the user’s timely application to provide efficient and fast data service.
In addition, this paper also analyzes the acceleration ratio for different grid monitoring data, from the analysis results, when the experimental grid data is less the acceleration ratio effect of the parallel algorithm is not very ideal, the data import time is almost unchanged, but as the data increases the acceleration ratio gradually increases, the time of data writing decreases, and the indexing efficiency based on the quadtree algorithm increases. This is mainly because, when the amount of data is small, the number of regions to be divided when storing on HBase is small, and the data exists only in a fixed number of nodes, which leads to little change in the data import time. However, with the increase in the amount of data HBase need to increase the number of region, then different logical nodes can be written to HBase, the algorithm accelerates the effect is more obvious.
Taking a regional localized power grid as an experimental object, the system of this paper is applied within the regional localized power grid to verify the automatic alarm effect of the system of this paper for electrical relay protection equipment. The topology of the regional localized power grid is shown in Figure 8. The topology of the regional local power grid contains 7 substations, 10 relay protection devices, 1 power plant, 21 lines, and the three protection values of each relay protection device are shown in Table 1.

Local grid topology diagram
Protection of relay protection equipment
| Relay protection equipment | I Protected value (Ω/s) | II Protected value (Ω/s) | III Protected value (Ω/s) |
|---|---|---|---|
| R1 | 32.45/0 | 66.65/1.53 | 75.64/3.68 |
| R2 | 5.98/0 | 28.19/1.22 | 29.95/3.51 |
| R3 | 5.31/0 | 26.48/1.21 | 27.92/3.43 |
| R4 | 2.52/0 | 9.69/1.21 | 9.22/3.42 |
| R5 | 2.43/0 | 9.66/1.23 | 9.18/3.47 |
| R6 | 15.38/0 | 33.31/1.21 | 41.84/3.26 |
| R7 | 18.46/0 | 35.39/1.02 | 45.93/3.21 |
| R8 | 16.42/0 | 32.26/1.05 | 39.61/3.23 |
| R9 | 24.31/0 | 40.03/0.94 | 47.39/3.15 |
| R10 | 28.22/0 | 43.19/0.95 | 43.72/3.16 |
Using the system in this paper in the EMS and offline calibration calculation system, according to the relay protection equipment operating state information, generate relay protection equipment operating state information samples, to R1 to R5 of the first five relay protection equipment as an example, using the system in this paper to generate the five relay protection equipment operating state information samples distribution is shown in Figure 9. As can be seen from the figure, the system can effectively generate relay protection equipment operating state information according to the operating state information of relay protection equipment to generate relay protection equipment operating state information samples, and generated between the five relay protection equipment operating state information, there is no confusion, can be clearly distinguished between the five relay protection equipment operating state information for the subsequent automatic warning of relay protection equipment to provide more convenient data support. Experiments have proved that the system in this paper can effectively generate operational state information samples for relay protection equipment.

Operation status information sample distribution
Using the system in this paper, the local relay protection equipment in the region is calibrated and automatically alarms according to the results of the calibration. The results of the calibration of the relay protection equipment are shown in Table 2, and Figure 10 shows the results of the automatic alarms, with the red markers in the figure as the alarm relay protection equipment modules.
The result of the fixed value check
| Relay protection equipment | Desired mode of operation | Critical value (Ω) | Actual check value (Ω) | Check result |
|---|---|---|---|---|
| R1 | L1 Stop | 115.28 | 62 | Meet the selective demand |
| R2 | C2 Primary stop | 120.42 | 62 | Meet the selective demand |
| R3 | C2 Primary stop | 120.19 | 62 | Meet the selective demand |
| R4 | L7 Hang check | 233.58 | 62 | Meet the selective demand |
| R5 | L9 Hang check | 59.86 | 62 | Match with III line, Mismatch selection |
| R6 | C5 Primary stop | 58.32 | 62 | Match with III line, Mismatch selection |
| R7 | C5 Primary stop | 36.64 | 62 | Match with III line, Mismatch selection |
| R8 | L15 Hang check | 110.35 | 62 | Meet the selective demand |
| R9 | L16 Hang check | 106.57 | 62 | Meet the selective demand |
| R10 | L19 Stop | 88.97 | 62 | Meet the selective demand |

Automatic alarm result of the fixed value check
According to the intelligent calibration results, it can be seen that the relay protection cloud testing system designed in this paper can effectively complete the calibration of the fixed value of the relay protection equipment and carry out automatic alarms according to the calibration results. In the local power grid in the region, the relay protection equipment R5, R6, and R7 have faults, which are prone to mis-actuation or refusal to act, affecting the stability of power grid operation. The relay protection cloud testing system designed in this paper relies on the intelligent warning model of relay protection fixed value calibration designed by RBF network, which can send the alarm information to maintenance personnel in time. The above results show that the relay protection cloud test system designed in this paper can effectively verify the fixed value of relay protection equipment, realize automatic alarm of relay protection equipment, and provide support for ensuring stable operation of the power grid and rapid location and identification of abnormal points.
The application scope of the relay protection cloud testing system designed in this paper is oriented to the industrial Internet of Things, and in order to further verify the effectiveness of the system, this paper aims to apply the system to the provincial relay protection integration. The system is spliced with power grid data from different regions to verify cross-region relay protection values. Based on this, this paper selects the grid data of a province’s A and B areas, and splices them with the relay protection cloud test system designed in this paper, and the fixed-value calibration model before and after splicing is shown in Fig. 11, of which Fig. 11(a)~(c) are the model of the local regulator and the provincial regulator before splicing, as well as the complete model after splicing, respectively.

The fixed value check model before and after the splicing
In order to objectively analyze the difference between the results of relay protection value verification before and after data splicing, the calculation results of single-phase and three-phase short-circuit faults occurring in the system at three typical locations in the large and small ways are selected for comparison. Take the 220kV bus short-circuit faults of BGS, JJL, and DBJ as an example, in which BGS and JJL become the boundaries of provincial and local data splicing, while DBJ becomes the boundary of non-splicing. The calculation results are shown in Table 3, where SPF and TPF are single-phase faults and three-phase faults respectively.
Short circuit current results for different models
| Fault position | Operation mode | Fault phase current/standard value-Before | Fault phase current/standard value-After | Percentage difference (%) | |||
|---|---|---|---|---|---|---|---|
| SPF | TPF | SPF | TPF | SPF | TPF | ||
| BGS | Big | 9.028 | 9.916 | 9.483 | 10.443 | 5.04 | 5.31 |
| Small | 8.746 | 9.585 | 9.176 | 10.089 | 4.92 | 5.26 | |
| JJL | Big | 8.342 | 9.442 | 8.654 | 9.785 | 3.74 | 3.63 |
| Small | 7.813 | 9.037 | 8.084 | 9.283 | 3.47 | 2.72 | |
| DBJ | Big | 13.024 | 13.751 | 13.121 | 13.784 | 0.74 | 0.24 |
| Small | 12.251 | 12.943 | 12.364 | 12.995 | 0.92 | 0.40 | |
The closer the nodes are to the data splicing boundary, the more obvious the difference between the fault calculation results before and after splicing is, with the maximum difference reaching 5.31% (primary current of about 1274A), but overall within the allowable range of engineering calibration. This confirms the rationale for ignoring the 110kV system in the current calculation of the provincial regulator’s relay protection calibration. Under the situation of rapid development of extra-high voltage grid, integration of province, prefecture and county, and even integration of state grid and province, the relay protection cloud testing system based on IEC61850 standard proposed in this paper has many advantages, such as simple principle, high reliability, low requirements for grid topology modeling, and convenient engineering realization, etc., and has a good prospect for popularization and application. The method proposed in this paper is based on the general principle of multilevel dispatching and hierarchical management. Regardless of the type of division method used for the interface between the upper and lower levels of the dispatching units, the boundaries of the grid in a certain region are always solidified and predictable. Therefore, the method proposed in this paper is effective regardless of the number of levels of vertical dispatching used or the number of levels of dispatching used to carry out integrated calibration calculations.
Relay protection is one of the most important secondary equipments of the power system, which is a guarantee for the safe operation of the power system. The article takes the IEC61850 standard as the basis for power system-oriented data modeling, constructs a data indexing method based on quadtree, and designs an intelligent early warning model based on RBF for relay protection fixed value calibration. In order to verify the practical application effect of the system, data analysis is carried out through example data.
When the quadtree algorithm is utilized for data indexing query, the average response time is only 3.17 s, and the average time required to write the grid monitoring data into the database in parallel is only 93.54 ms. On the whole, the data parallel storage and querying efficiency of the quadtree algorithm is better than that of the traditional method, which can significantly improve the data transmission efficiency of the relay protection cloud testing system. The intelligent early warning model of relay protection fixed value calibration designed in this paper can realize the accurate calibration of abnormal nodes in the power grid, and make clear the change of the fixed value calibration of relay protection. Moreover, the maximum difference in the value checking of the relay protection cloud testing system introduced into the provincial power grid scheduling is 5.31%, which is within the allowed range of engineering calibration. Therefore, the combination of relay protection and cloud testing systems can effectively dispatch power grids across regions and provide new technical support for the stable operation of power grids.
