<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Energy Res.</journal-id>
<journal-title>Frontiers in Energy Research</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Energy Res.</abbrev-journal-title>
<issn pub-type="epub">2296-598X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1342793</article-id>
<article-id pub-id-type="doi">10.3389/fenrg.2024.1342793</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Energy Research</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Strategy for evaluating the status of relay protection equipment for the new generation of intelligent substations</article-title>
<alt-title alt-title-type="left-running-head">Liu et al.</alt-title>
<alt-title alt-title-type="right-running-head">
<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fenrg.2024.1342793">10.3389/fenrg.2024.1342793</ext-link>
</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Liu</surname>
<given-names>Dapeng</given-names>
</name>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Wu</surname>
<given-names>Kuizhong</given-names>
</name>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Guo</surname>
<given-names>Zhenhua</given-names>
</name>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Cui</surname>
<given-names>Yunhai</given-names>
</name>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Liu</surname>
<given-names>Wenbin</given-names>
</name>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zhang</surname>
<given-names>Jinjing</given-names>
</name>
<uri xlink:href="https://loop.frontiersin.org/people/2584699/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/Writing - review &#x26; editing/"/>
</contrib>
</contrib-group>
<aff>
<institution>State Grid Jilin Electric Power Co., LTD.</institution>, <addr-line>Jilin</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1052970/overview">Ningyi Dai</ext-link>, University of Macau, China</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1981803/overview">Dhivya Swaminathan</ext-link>, Vellore Institute of Technology (VIT), India</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2687859/overview">Wenguo Wu</ext-link>, Chongqing University, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Dapeng Liu, <email>ldp4505@163.com</email>
</corresp>
</author-notes>
<pub-date pub-type="epub">
<day>08</day>
<month>04</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2024</year>
</pub-date>
<volume>12</volume>
<elocation-id>1342793</elocation-id>
<history>
<date date-type="received">
<day>22</day>
<month>11</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>20</day>
<month>03</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2024 Liu, Wu, Guo, Cui, Liu and Zhang.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Liu, Wu, Guo, Cui, Liu and Zhang</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>With the rapid development of power grid, the structure and technology of the secondary system in substations are also constantly innovating. The new generation of intelligent substations has achieved online monitoring functions for secondary equipment, making some state variables of relay protection equipment become observable indicators. Based on this, this paper proposes a novel relay protection equipment status evaluation strategy. Firstly, considering the fuzziness and uncertainty of the boundary division of relay protection evaluation levels, a relay protection risk assessment method based on normal cloud model has been proposed. Then, due to the particularity of historical statistical data, a weight calculation method combining analytical hierarchy process (AHP) and entropy weight method is adopted to eliminate subjective factors in the weight calculation process. Meanwhile, the equipment operation risk level was determined by calculating the certainty of the corresponding evaluation level for each indicator. Finally, in case study, the proposed method is used to evaluate the status of relay protection equipment, and the feasibility and accuracy of this method are verified through the analysis of the results.</p>
</abstract>
<kwd-group>
<kwd>intelligent substations</kwd>
<kwd>relay protection equipment</kwd>
<kwd>status evaluation strategy</kwd>
<kwd>cloud model</kwd>
<kwd>power system</kwd>
</kwd-group>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Smart Grids</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<sec id="s1-1">
<title>1.1 Background and motivation</title>
<p>At present, the development of the national economy largely depends on the continuity of power transmission. To ensure the reliability of electricity consumption, it is necessary to ensure the safety and stability of electricity consumption (<xref ref-type="bibr" rid="B16">Tse et al., 2020</xref>; <xref ref-type="bibr" rid="B9">Hatziargyriou et al., 2021</xref>; <xref ref-type="bibr" rid="B18">Wu et al., 2023</xref>). With the continuous evolution of the power grid structure, its operational uncertainty is increasing year by year, posing new challenges to the reliable operation of relay protection equipment (<xref ref-type="bibr" rid="B3">Castellani et al., 2014</xref>; <xref ref-type="bibr" rid="B1">Ahmed et al., 2016</xref>; <xref ref-type="bibr" rid="B11">Jia et al., 2024</xref>). Due to the influence of certain factors such as equipment aging, external interference, incorrect parameter settings, communication failures and so on, the state of relay protection equipment may undergo changes, affecting the normal operation of the equipment. According to the requirements of the &#x201c;four characteristics&#x201d; of relay protection (i.e., reliability, selectivity, sensitivity, and speed), once there is a fault within the power grid, it is necessary to accurately, quickly, and effectively limit it to the minimum range to avoid the chain development and expansion of accidents. Against the backdrop of such rapid development in the power system, it remains to be tested whether traditional relay protection and setting principles can adapt to the constantly improving and complex topology of the power grid. Especially in the case of internal hidden faults in relay protection devices, it is necessary to quantify and evaluate the impact of their abnormal operation on the power grid, and quantitatively evaluate the correctness of relay protection actions and operational risks (<xref ref-type="bibr" rid="B8">Hao et al., 2018</xref>; <xref ref-type="bibr" rid="B19">Xia and Zhang, 2018</xref>).</p>
</sec>
<sec id="s1-2">
<title>1.2 Literature review</title>
<p>Relay protection status evaluation has evolved with the development of condition based maintenance technology, mainly based on online monitoring data and offline statistical data, as well as combining with actual operating environment, to obtain information that characterizes the operating status of equipment. By establishing a suitable evaluation model to comprehensively judge the operating status of equipment, it provides a theoretical basis for condition based maintenance and fault diagnosis, and helps to improve the level of lean equipment operation management. The commonly used state evaluation theories currently include fuzzy set theory (<xref ref-type="bibr" rid="B2">Bansal, 2003</xref>), evidence theory (<xref ref-type="bibr" rid="B13">Li et al., 2013</xref>), grey theory (<xref ref-type="bibr" rid="B6">Guo et al., 2014</xref>), and rough set theory (<xref ref-type="bibr" rid="B12">Jiang et al., 2007</xref>). In (<xref ref-type="bibr" rid="B10">Hu et al., 2023</xref>), the authors employ the Arrhenius model and consider various environmental and reliability factors. This approach offers a more accurate representation of the actual operation status of relay protection equipment (<xref ref-type="bibr" rid="B7">Guo et al., 2022</xref>). Introduces a relay protection status evaluation method based on fuzzy support vector machines. Based on status inspection and fault records, the remaining life percentage of each inspection point equipment can be calculated. The original unstructured record data of relay protection device defects may pose challenges for data mining due to a lack of quantitative assessment. Therefore, (<xref ref-type="bibr" rid="B21">Zheng et al., 2023</xref>), introduces an evaluation method for the quality of unstructured defect record texts of relay protection equipment based on the relay protection device fault text ontology and knowledge graph. This method reveals the characteristics of data quality in terms of text length, defect level, and dispatching area (<xref ref-type="bibr" rid="B5">Gama et al., 2021</xref>). Assesses the function of differential protection for transmission lines based on incremental current from both mathematical and experimental perspectives, and tests different fault scenarios for application (<xref ref-type="bibr" rid="B15">Srivastava et al., 2023</xref>). Introduces an experimental validation of a transmission line protection scheme based on dynamic state estimation under different fault types and conditions. The protection scheme utilizes real-time high-frequency sampling measurements from advanced sensors, avoiding potential issues with relay coordination. The reliability analysis of vertically integrated protection devices is crucial for the design of substations based on the International Electrotechnical Commission (IEC) 61850 standard (<xref ref-type="bibr" rid="B14">Li et al., 2023</xref>). Constructs a reliability analysis model for protection devices and their protection systems using the functional information transmission chain of protection devices, measurement and control devices, merging units, and intelligent terminals based on the fault tree analysis method. Reference (<xref ref-type="bibr" rid="B17">Wang et al., 2018</xref>) has established a relatively complete evaluation index system for intelligent substation relay protection devices from the perspective of maintenance and operation. It proposes a fuzzy comprehensive evaluation method based on the membership trapezoidal cloud model, which takes into account the ambiguity and randomness of indicator information. When the evaluation results are similar, the principle of maximum member-ship degree is adopted, which can easily lead to indistinguishable evaluation results and misjudgment. Reference (<xref ref-type="bibr" rid="B20">Xu and Lin, 2018</xref>) proposes a generalized evidence theory evaluation method for line relay protection, which first combines the output results of cloud models and fuzzy comprehensive evaluation methods, and obtains the initial probability distribution of the evidence theory through confidence correction. The application of fuzzy evidence theory in equipment condition assessment has improved the accuracy and reliability of the assessment to a certain extent. Unfortunately, there are still limitations such as over-dependence on parameter settings and high computational complexity.</p>
</sec>
<sec id="s1-3">
<title>1.3 Contributions and organization</title>
<p>Evaluating the operational status of relay protection equipment is essentially a comprehensive consideration of the uncertainty, fuzziness, and dynamic changes of various factors. How to effectively utilize the operational status information is the key to the relay protection status evaluation methods. However, there are still several challenges in the current evaluation of relay protection status:<list list-type="simple">
<list-item>
<p>(1) Firstly, the existing state evaluation model is not yet comprehensive. The evaluation of relay protection status is a multi-indicator and multi-level evaluation process, with different weight calculation methods, and the evaluation process is fuzzy and uncertain.</p>
</list-item>
<list-item>
<p>(2) The processing method of evaluation results is not considered. The evaluation principle generally adopts maximum membership or other reliability criteria, and the judgment method ignores the fuzziness of the evaluation level. Therefore, there is still room for improvement in accurately expressing and describing the operating status of the equipment.</p>
</list-item>
</list>
</p>
<p>To overcome the shortcomings mentioned above, this paper proposes a relay protection equipment status evaluation strategy for the new generation of intelligent sub-stations, from the perspective of real-time operation status and historical risk of relay protection equipment, which can provide theoretical basis for intelligent operation and maintenance of relay protection equipment and fault diagnosis technology. The innovation of this paper are as follows:<list list-type="simple">
<list-item>
<p>(1) Considering the actual needs of relay protection equipment status evaluation and the fuzziness in the process of qualitative and quantitative evaluation transformation, and the advantage of cloud model theory is that it considers the random characteristics of the evaluation process. In all, the introduction of cloud model theory in relay protection equipment status evaluation can overcome the shortcomings of previous fuzzy evaluation and be more in line with engineering practice.</p>
</list-item>
<list-item>
<p>(2) This article uses the AHP entropy weight method to combine and assign weights to the evaluation system, achieving complementary advantages and disadvantages of subjective objective evaluation methods. It can not only overcome the one-sidedness and conservatism of subjective methods, but also accurately reflect the importance of indicators, thereby achieving accurate evaluation of the status of relay protection equipment.</p>
</list-item>
</list>
</p>
<p>The framework of this article is arranged as follows: in <xref ref-type="sec" rid="s2">Section 2</xref>, the cloud theory is introduced to describe the random characteristics of the evaluation process and detailed status evaluation model for relay protection is given. Then, <xref ref-type="sec" rid="s3">Section 3</xref> makes a detailed description of evaluation boundary fuzzy processing and cloud model parameter determination methods. Then, a real-world case study is used to demonstrate the effectiveness and feasibility of the proposed method. Finally, <xref ref-type="sec" rid="s5">Section 5</xref> concludes the whole paper.</p>
</sec>
</sec>
<sec id="s2">
<title>2 Evaluation model for relay protection based on cloud theory</title>
<p>This paper introduces the cloud model method to handle the randomness and fuzziness of historical statistical data information in <xref ref-type="sec" rid="s2-1">Section 2.1</xref>. Meanwhile, <xref ref-type="sec" rid="s2-2">Section 2.2</xref> gives status evaluation indicators for relay protection equipment. Finally, a combination model based on AHP and Entropy Weight (EW) Method are used to determine the wigth, which is given in <xref ref-type="sec" rid="s2-3">Section 2.3</xref>, thus making the evaluation system weights more in line with engineering practice.</p>
<sec id="s2-1">
<title>2.1 Introduction to cloud model</title>
<p>Cloud model is a mapping theory based on probability theory and fuzzy mathematics theory, used to achieve the uncertainty transformation between qualitative concepts and their quantitative values. The basic mathematical expression of the cloud model is as follows:</p>
<p>Firstly, make the following definition. <italic>W</italic> represents the domain, and <italic>K</italic> represents a qualitative concept related to <italic>W</italic>. Let <inline-formula id="inf1">
<mml:math id="m1">
<mml:mrow>
<mml:mi>a</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mi>W</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> be a random implementation of the qualitative concept <italic>K</italic>, and let the random number <inline-formula id="inf2">
<mml:math id="m2">
<mml:mrow>
<mml:mi>&#x3bc;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> be a deterministic degree function belonging to <italic>K</italic>, that is, the degree of membership of <italic>a</italic> to <italic>K</italic>, satisfying: <inline-formula id="inf3">
<mml:math id="m3">
<mml:mrow>
<mml:mi>&#x3bc;</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>:</mml:mo>
<mml:mi>W</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mo>&#x2200;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mi>W</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. Furthermore, the distribution of <italic>a</italic> on the domain <italic>K</italic> is called a cloud, and <italic>a</italic> is called a cloud droplet.</p>
<p>The cloud distribution map reflects the distribution characteristics of the concept through three feature parameters: mathematical expectations <italic>E</italic>
<sub>
<italic>x</italic>
</sub>, entropy <italic>E</italic>
<sub>
<italic>n</italic>
</sub>, and hyperentropy <italic>H</italic>
<sub>
<italic>e</italic>
</sub>. Among them, <italic>E</italic>
<sub>
<italic>x</italic>
</sub> reflects the distribution center of cloud droplets and can significantly characterize the qualitative quantitative transformation center; <italic>E</italic>
<sub>
<italic>n</italic>
</sub> represents the degree of dispersion of cloud droplets; <italic>H</italic>
<sub>
<italic>e</italic>
</sub> represents the stability of cloud droplets and the uncertainty of entropy. The indicator diagram of cloud model is shown in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>The indicator diagram of cloud model.</p>
</caption>
<graphic xlink:href="fenrg-12-1342793-g001.tif"/>
</fig>
<p>It should be noted here that due to the special mathematical connections between cloud parameters, the special structure of the cloud model only requires input of relaxed constraints compared to fuzzy set theory, which can obtain membership functions with stronger ability to describe uncertainty. Considering the actual needs of relay protection equipment status evaluation and the fuzziness in the process of qualitative and quantitative evaluation transformation, and the advantage of cloud model theory is that it considers the random characteristics of the evaluation process. In all, the introduction of cloud model theory in relay protection equipment status evaluation can overcome the shortcomings of previous fuzzy evaluation and be more in line with engineering practice.</p>
<p>Cloud generators mainly include forward cloud generators and reverse cloud generators, and this paper mainly uses forward cloud generators. In detail, based on the digital features of the cloud model and the number of cloud droplets <italic>N</italic>, a normal cloud generator can be used to calculate the quantitative values of the output cloud droplets. These cloud droplets can form a cloud map. The standard definition of a normal cloud model is given below: let <italic>U</italic> be a quantitative domain represented by precise numerical values, and <italic>T</italic> be a qualitative concept on <italic>U</italic>. If a quantitative value <inline-formula id="inf4">
<mml:math id="m4">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mi>U</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> and <italic>x</italic> is a random implementation of the qualitative concept <italic>T</italic>, if <italic>x</italic> satisfies: <inline-formula id="inf5">
<mml:math id="m5">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x223c;</mml:mo>
<mml:mi>N</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>x</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, and the certainty degree of <italic>x</italic> over <italic>T</italic> satisfies:<disp-formula id="e1">
<mml:math id="m6">
<mml:mrow>
<mml:mi>&#x3bc;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>exp</mml:mi>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>x</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>n</mml:mi>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>
</p>
<p>To gain a better understanding, the forward cloud generator algorithm can be described as follows:<list list-type="simple">
<list-item>
<p>(1) Input the characteristic values of the cloud model, and first generate a normally distributed random number <inline-formula id="inf6">
<mml:math id="m7">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> (i.e., <inline-formula id="inf7">
<mml:math id="m8">
<mml:mrow>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>N</mml:mi>
<mml:mi>O</mml:mi>
<mml:mi>R</mml:mi>
<mml:mi>M</mml:mi>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mi>e</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>) with an expected value of <italic>E</italic>
<sub>
<italic>n</italic>
</sub> and a standard deviation of <italic>H</italic>
<sub>
<italic>e</italic>
</sub>;</p>
</list-item>
<list-item>
<p>(2) Generate a normal random number <italic>x</italic>, <italic>x</italic> &#x3d; <italic>Norm</italic> (<italic>E</italic>
<sub>
<italic>x</italic>
</sub>, <italic>E</italic>
<sub>
<italic>n</italic>
</sub>), where the expected value is <italic>E</italic>
<sub>
<italic>x</italic>
</sub>, the standard deviation is <italic>En</italic>, and <italic>x</italic> is the a cloud droplet on a cloud model;</p>
</list-item>
<list-item>
<p>(3) Determine the degree of certainty <italic>&#x3bc;</italic> that cloud droplet <italic>x</italic> belongs to the cloud model through steps (1) and (2);</p>
</list-item>
<list-item>
<p>(4) Repeat steps (1) and (3) and set the number of cloud droplets <italic>N</italic> to output a positive cloud model with characteristic values of (<italic>E</italic>
<sub>
<italic>x</italic>
</sub>, <italic>E</italic>
<sub>
<italic>n</italic>
</sub>, <italic>H</italic>
<sub>
<italic>e</italic>
</sub>).</p>
</list-item>
</list>
</p>
</sec>
<sec id="s2-2">
<title>2.2 Status evaluation indicators for relay protection equipment</title>
<p>The historical operation information of relay protection equipment contains hidden information that characterizes equipment faults, aging, and operational risks. By evaluating the historical operation level of equipment, it is possible to predict equipment operation risks in advance and provide decision-making for maintenance and fault diagnosis. The evaluation of the historical operation level of equipment is essentially a comprehensive consideration of the relative quality of the equipment, by analyzing statistical data during operation, to identify weak links in the relay protection system. When not considering the operating conditions before the protection equipment is put into operation, the historical information of the secondary equipment is mainly obtained from the equipment&#x2019;s historical operation and maintenance records, which mainly includes the following two aspects: historical operation status and maintenance status. The historical operation status mainly includes the defects and faults of the equipment since its operation, equipment operation assessment indicators, and family operation data of the same model (batch) of equipment. The equipment maintenance situation mainly includes the regular inspection and countermeasures of the equipment, as well as supplementary verification in case of equipment modification or plug-in updates. This paper selects historical statistical data from a certain device, as shown in <xref ref-type="table" rid="T1">Table 1</xref>, and the indicator scoring criteria are shown in <xref ref-type="table" rid="T2">Table 2</xref>.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Evaluation indicators and their content.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Evaluating indicator</th>
<th align="center">Evaluation content</th>
<th align="center">Unit</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">1</td>
<td align="center">Pilot protection action time</td>
<td align="center">ms/time</td>
</tr>
<tr>
<td align="center">2</td>
<td align="center">Correct action ratio</td>
<td align="center">percentage/year</td>
</tr>
<tr>
<td align="center">3</td>
<td align="center">Number of defects</td>
<td align="center">time/year</td>
</tr>
<tr>
<td align="center">4</td>
<td align="center">Operation time</td>
<td align="center">year</td>
</tr>
<tr>
<td align="center">5</td>
<td align="center">Regular over inspection time</td>
<td align="center">time/year</td>
</tr>
<tr>
<td align="center">6</td>
<td align="center">Proportion of precise evaluation of countermeasures</td>
<td align="center">percentage/year</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>
<bold>Note</bold>: The evaluating indicator 1&#x2013;6 respectively represent average action time, correct action rate, number of device defects, equipment running time, maintenance situation and counter measures situation.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Evaluation criteria for different indicators.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="center">Evaluating indicator</th>
<th colspan="4" align="center">Evaluation criteria</th>
</tr>
<tr>
<th align="center">Acceptable</th>
<th align="center">Tolerable</th>
<th align="center">Unexpected</th>
<th align="left">Unacceptable</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">1</td>
<td align="center">[0, 15]</td>
<td align="center">[15, 20]</td>
<td align="center">[20, 25]</td>
<td align="center">[25, 30]</td>
</tr>
<tr>
<td align="center">2</td>
<td align="center">[99.9, 100]</td>
<td align="center">[99.8, 99.9]</td>
<td align="center">[99.6, 99.8]</td>
<td align="center">[99.4, 99.6]</td>
</tr>
<tr>
<td align="center">3</td>
<td align="center">[0, 1]</td>
<td align="center">[1, 2]</td>
<td align="center">[2, 3]</td>
<td align="center">[3, 5]</td>
</tr>
<tr>
<td align="center">4</td>
<td align="center">[0, 7]</td>
<td align="center">[7, 10]</td>
<td align="center">[10, 13]</td>
<td align="center">[13, 15]</td>
</tr>
<tr>
<td align="center">5</td>
<td align="center">[0, 1]</td>
<td align="center">[1, 2]</td>
<td align="center">[2, 3]</td>
<td align="center">[3, 5]</td>
</tr>
<tr>
<td align="center">6</td>
<td align="center">[90, 100]</td>
<td align="center">[70, 90]</td>
<td align="center">[60, 70]</td>
<td align="center">[50, 60]</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>
<bold>Note</bold>: The definition of evaluating indicator 1&#x2013;6 is the same with <xref ref-type="table" rid="T1">Table 1</xref>.</p>
</fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="s2-3">
<title>2.3 Weight calculation method</title>
<p>The existing weight calculation methods are usually divided into subjective weighting methods and objective weighting methods. The subjective weighting method involves collecting opinions from relevant experts and unifying their opinions through a multi-round scoring model to achieve a subjective evaluation. Its advantage is that the conclusions drawn are usually intuitive and consistent with the basic experience of system operation. The objective weighting method evaluates the operational status through the relevant digital features of its operational indicators, with the advantage that it is usually more in line with the actual operational situation. This paper adopts the AHP-EW combined method and assign weights to the evaluation system, in order to complement the advantages and disadvantages of the subjective objective evaluation method and make the weight of the evaluation system more in line with engineering practice. Analytical Hierarchy Process (AHP) and Entropy Weight Method are two commonly used multi-criteria Decision Analysis methods. AHP mainly determines the weights of various factors through steps such as constructing a hierarchical structure model, constructing a judgment matrix, single-level sorting, and consistency testing. On the other hand, the Entropy Weight Method determines the weights by calculating the information entropy of each indicator based on the theory of information entropy. Combining the two methods for the assessment of relay protection status allows for the comprehensive consideration of both experts&#x2019; subjective judgments and the objective information inherent in the data, thus improving the accuracy of the assessment. Below are the detailed steps for combining AHP and Entropy Weight Method in relay protection status assessment:<list list-type="simple">
<list-item>
<p>(1) Define Assessment Objectives and Indicators: Determine the overall objectives of the relay protection status assessment, such as the overall performance, safety, and reliability of the equipment. Select and identify specific assessment indicators based on the overall objectives, such as equipment operation time, fault frequency, maintenance records, etc.</p>
</list-item>
<list-item>
<p>(2) Construct a Hierarchical Structure Model: Build a hierarchical structure model for the assessment objectives and indicators, typically including the goal level, criterion level, and indicator level.</p>
</list-item>
<list-item>
<p>(3) Create a Judgment Matrix: For each element in the criterion and indicator levels, construct a pairwise comparison judgment matrix through expert scoring or group discussion. The elements of the judgment matrix are generally assigned using the 1&#x2013;9 scale method, indicating the relative importance among various elements.</p>
</list-item>
<list-item>
<p>(4) Single-Level Sorting and Consistency Testing: Utilize the judgment matrix to calculate the weight vectors of each element and perform consistency testing. If the consistency test fails, readjust the judgment matrix until it meets the consistency requirements. Calculate Entropy Values and Entropy Weights</p>
</list-item>
<list-item>
<p>(5) Collect actual data and construct a decision matrix: Calculate the entropy values of each indicator based on the decision matrix. Determine the entropy weights of each indicator based on the entropy values, reflecting the objective information of the data.</p>
</list-item>
<list-item>
<p>(6) Determine the Combined Weights: Combine the weights obtained from the analytical hierarchy process and the Entropy Weight Method to determine the combined weights through a certain method (such as weighted averaging).</p>
</list-item>
<list-item>
<p>(7) Conduct Status Assessment: Calculate the comprehensive scores of each assessment object based on the combined weights and the decision matrix. Rank and evaluate the relay protection status based on the comprehensive scores.</p>
</list-item>
<list-item>
<p>(8) Result Analysis and Improvement: Analyse the assessment results to identify the key factors affecting the relay protection status. Develop appropriate improvement measures based on the analysis results to enhance the performance and safety of the equipment.</p>
</list-item>
</list>
</p>
<p>By following these steps, an accurate and comprehensive assessment of relay protection status can be achieved, taking into account both subjective expert opinions and objective data information.</p>
</sec>
</sec>
<sec id="s3">
<title>3 Evaluation boundary fuzzy processing and cloud model parameter determination</title>
<sec id="s3-1">
<title>3.1 Boundary division method</title>
<p>As mentioned in <xref ref-type="table" rid="T2">Table 2</xref>, this paper divides the risk level status of various indicators of relay protection into four levels: acceptable level, tolerable level, unexpected level, and unacceptable level, represented by <italic>V</italic>
<sub>1</sub>, <italic>V</italic>
<sub>2</sub>, <italic>V</italic>
<sub>3</sub>, and <italic>V</italic>
<sub>4</sub>, respectively. The specific status is determined by searching for relevant information and regulations, and the risk level classification of relay protection devices is shown in <xref ref-type="table" rid="T3">Table 3</xref>.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Classification of relay protection evaluation levels.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Evaluation level</th>
<th align="center">Status description</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">Acceptable level</td>
<td align="center">No action required</td>
</tr>
<tr>
<td align="center">Tolerable level</td>
<td align="center">Risk reduction costs and benefits are asymmetric, and the economy is poor</td>
</tr>
<tr>
<td align="center">Unexpected level</td>
<td align="center">Under the premise of economic conditions, take certain measures to reduce risks</td>
</tr>
<tr>
<td align="center">Unacceptable level</td>
<td align="center">Quickly take measures to reduce risks without considering economic considerations</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>To facilitate the determination of the risk level of each evaluation indicator and eliminate the impact of indicator category differences, the evaluation values and risk level standard set of each indicator are uniformly normalized to the interval [0,1]. 0 represents acceptable risk of relay protection equipment, and 1 represents unacceptable risk. The larger the standardized value, the more unacceptable the risk of the protection equipment. Below, the selected status information is classified and processed.</p>
<p>The state parameters represented by the number of times should be handled using a normal distribution function. Generally speaking, the distribution pattern of historical data is difficult to characterize with a certain type of probability distribution. Normal distribution, due to its good mathematical form, reflects the probability distribution of random variables well. Therefore, a normal distribution function is applied to fuzzily quantify degree type indicators. For increasing and decreasing indicators, they can be represented by larger/smaller normal distribution functions, as shown in Eqs <xref ref-type="disp-formula" rid="e2">2</xref>, <xref ref-type="disp-formula" rid="e3">3</xref>:<disp-formula id="e2">
<mml:math id="m9">
<mml:mrow>
<mml:msub>
<mml:mi>V</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="" separators="|">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mn>1</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:msup>
<mml:mi>&#x3c3;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:msup>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>
<disp-formula id="e3">
<mml:math id="m10">
<mml:mrow>
<mml:msub>
<mml:mi>V</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="{" close="" separators="|">
<mml:mrow>
<mml:mtable columnalign="center">
<mml:mtr>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mi>e</mml:mi>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:msup>
<mml:mi>&#x3c3;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:msup>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x3e;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>
</p>
<p>Here, <inline-formula id="inf8">
<mml:math id="m11">
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>/</mml:mo>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>; <inline-formula id="inf9">
<mml:math id="m12">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> indicates the optimal operating value of the state indicator, which can also be determined based on the factory value of the device; <inline-formula id="inf10">
<mml:math id="m13">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>m</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> indicates the boundary value of the unacceptable level of risk for protective equipment, based on relevant regulations and operating experience.</p>
<p>The statistical data on the aging degree of the reaction device, such as operating years and action time, should be processed in the form of indicators, as shown in Eq. <xref ref-type="disp-formula" rid="e4">4</xref>.<disp-formula id="e4">
<mml:math id="m14">
<mml:mrow>
<mml:msub>
<mml:mi>V</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>r</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
</sec>
<sec id="s3-2">
<title>3.2 Cloud parameter determination</title>
<p>Because the qualitative concepts represented by cloud droplets have randomness and fuzziness, which can weaken the subjective randomness of indicator evaluation, a hard grading of the risk level boundary of relay protection operation is performed to construct the cloud model. By combining the eigenvalues (<italic>E</italic>
<sub>
<italic>x</italic>
</sub>, <italic>E</italic>
<sub>
<italic>n</italic>
</sub>, <italic>H</italic>
<sub>
<italic>e</italic>
</sub>) of the normal cloud model, considering the level constraints of each evaluation indicator, and considering the uncertainty of the level boundary conditions, a relay protection risk level based on cloud model is established after moderate expansion. The basic principle of the comprehensive evaluation method using cloud models is to treat the qualitative indicator level of the research problem as a concept of natural language, and map it to a cloud. Based on the evaluation indicator standard set and the normalization method of the level standard, the corresponding cloud digital features of the level are calculated. Then, based on entropy and super entropy, normal distribution random numbers are generated to form cloud droplets, and the cloud generator generates the evaluation factor belonging to a certain level of cloud model; Based on the statistical data of the samples to be evaluated, calculate the certainty of each indicator belonging to each level, and combine the corresponding factor weights to obtain the comprehensive certainty. Considering the reliability of the cloud model&#x2019;s comprehensive evaluation method, use the evaluation model to analyze the risk level of relay protection devices, and finally apply the level characteristic values to determine the risk level of the evaluation samples. To gain a better understanding, a case is given. For example, given a certain evaluation indicator <italic>x</italic>
<sub>
<italic>i</italic>
</sub>, the interval after fuzzy processing of the evaluation level is set to [<italic>x</italic>
<sub>1</sub>, <italic>x</italic>
<sub>2</sub>], [<italic>x</italic>
<sub>3</sub>, <italic>x</italic>
<sub>4</sub>], [<italic>x</italic>
<sub>5</sub>, <italic>x</italic>
<sub>6</sub>], [<italic>x</italic>
<sub>7</sub>, <italic>x</italic>
<sub>8</sub>].<list list-type="simple">
<list-item>
<p>(1) Solve mathematical expectation <italic>Ex</italic>. The expectation of the cloud model is obtained through boundary constraint conditions at each level, and the calculation formula is shown as Eq. <xref ref-type="disp-formula" rid="e5">5</xref>:</p>
</list-item>
</list>
<disp-formula id="e5">
<mml:math id="m15">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>x</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>
<list list-type="simple">
<list-item>
<p>(2) Solve entropy <italic>E</italic>
<sub>
<italic>n</italic>
</sub>. The adjacent evaluation levels have a dynamic transition characteristic, and the artificial hard grading has fuzziness and subjectivity. Obviously, if the two point values in <italic>x</italic>
<sub>
<italic>i</italic>
</sub> and <italic>x</italic>
<sub>
<italic>i</italic>&#x2b;1</sub> belong to different states with the same degree of certainty, then Eqs <xref ref-type="disp-formula" rid="e6">6</xref>&#x2013;<xref ref-type="disp-formula" rid="e8">8</xref> are satisfied</p>
</list-item>
</list>
<disp-formula id="e6">
<mml:math id="m16">
<mml:mrow>
<mml:mi>&#x3bc;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>exp</mml:mi>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mi>x</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:msubsup>
<mml:mi>E</mml:mi>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:msubsup>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>exp</mml:mi>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.5</mml:mn>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>
<disp-formula id="e7">
<mml:math id="m17">
<mml:mrow>
<mml:msub>
<mml:mi>E</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mn>2.355</mml:mn>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(7)</label>
</disp-formula>
<disp-formula id="e8">
<mml:math id="m18">
<mml:mrow>
<mml:msub>
<mml:mi>H</mml:mi>
<mml:mi>e</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:math>
<label>(8)</label>
</disp-formula>
</p>
<p>Here, <italic>x</italic>
<sub>
<italic>i</italic>
</sub> and <italic>x</italic>
<sub>
<italic>i</italic>&#x2b;1</sub> represent the adjacent boundaries of two levels; <italic>s</italic> is a constant, and based on the correlation between the fuzziness and randomness of the corresponding evaluation object, this paper takes 0.005. This article comprehensively considers the risk assessment boundary and calculates the cloud feature parameters of the risk boundary using the above formulas.</p>
</sec>
<sec id="s3-3">
<title>3.3 Full process description of relay protection equipment status evaluation</title>
<p>The basic principle of the comprehensive evaluation method using cloud models is to treat the qualitative indicator level as a natural language concept and map it to a cloud. Based on the evaluation indicator standard set and the normalization method of the level standard, the corresponding cloud digital features of the level are calculated. Then, based on entropy and hyperentropy, normal distribution random numbers are generated to form cloud droplets, and the cloud generator generates the evaluation factor belonging to a certain level of cloud model. Based on the statistical data of the samples to be evaluated, calculate the certainty of each indicator belonging to each level, and combine the corresponding factor weights to obtain the comprehensive certainty. Considering the reliability of the evaluation method using cloud model, analyze the risk level of relay protection devices, and finally apply the level characteristic values to determine the risk level.</p>
<p>The detailed calculation steps are as follows:<list list-type="simple">
<list-item>
<p>(1) Determine the classification indicators and category standard set of the research object, and perform fuzzy processing on the classification indicators and category standard set according to the standardized <xref ref-type="disp-formula" rid="e1">Formula 1</xref>&#x2013;<xref ref-type="disp-formula" rid="e4">4</xref>.</p>
</list-item>
<list-item>
<p>(2) Based on the evaluation indicator digital features of the cloud model, a normal cloud generator is applied to generate cloud models for each evaluation indicator level. The evaluation indicators for cloud digital features of a certain level standard can be calculated using <xref ref-type="disp-formula" rid="e6">Formula 6</xref>&#x2013;<xref ref-type="disp-formula" rid="e8">8</xref>.</p>
</list-item>
<list-item>
<p>(3) Based on the collected historical statistical data, the uncertainty of each indicator level is calculated to form a comprehensive evaluation matrix <bold>
<italic>A</italic>
</bold>. Combined with the weight <italic>w</italic> of the indicator calculated using unascertained rational numbers, the variable fuzzy evaluation model <xref ref-type="disp-formula" rid="e9">Formula 9</xref> is used to calculate the comprehensive membership degree of the corresponding level by analyzing the values of different model parameters.</p>
</list-item>
</list>
<disp-formula id="e9">
<mml:math id="m19">
<mml:mrow>
<mml:msub>
<mml:mi>u</mml:mi>
<mml:mi>h</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mn>1</mml:mn>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>m</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:msup>
<mml:mrow>
<mml:mfenced open="[" close="]" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>A</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mi>h</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:msup>
</mml:mrow>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>m</mml:mi>
</mml:munderover>
</mml:mstyle>
<mml:msup>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:msub>
<mml:mi>&#x3bc;</mml:mi>
<mml:mi>A</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mfenced open="(" close=")" separators="|">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
</mml:mrow>
<mml:mi>h</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:msup>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mfenced>
</mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>a</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>&#x3c1;</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:msup>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(9)</label>
</disp-formula>
</p>
<p>Here, <inline-formula id="inf11">
<mml:math id="m20">
<mml:mrow>
<mml:msub>
<mml:mi>w</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> represents weight; <italic>a</italic> represents optimization criteria parameters; when <italic>a</italic> &#x3d; 1, it means that first-order criterion is adopted; when <italic>a</italic> &#x3d; 2, it means that least squared criterion is adopted.<list list-type="simple">
<list-item>
<p>(4) Finally, by analysing the level characteristics and obtaining comprehensive evaluation results, the risk level of each indicator is determined.</p>
</list-item>
</list>
</p>
<p>In summary, the specific operation process of the cloud model comprehensive evaluation method is shown in <xref ref-type="fig" rid="F2">Figure 2</xref>.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Process of the cloud model comprehensive evaluation method.</p>
</caption>
<graphic xlink:href="fenrg-12-1342793-g002.tif"/>
</fig>
</sec>
</sec>
<sec id="s4">
<title>4 Case study</title>
<sec id="s4-1">
<title>4.1 The introduction of test data</title>
<p>In this section, we selected a newly built 220&#xa0;kV intelligent substation and used a differential protection device for a certain line as the research object to verify the effectiveness and feasibility of the method proposed in this paper. Compared to smart stations of other voltage levels, 220&#xa0;kV smart stations have a relatively high degree of technological maturity and have been widely applied in actual operation. This means that conducting relay protection status estimation research on 220&#xa0;kV smart stations can yield more reliable data and results. Firstly, obtain the historical status information of the protection device and the risk assessment statistical data is shown in <xref ref-type="table" rid="T4">Table 4</xref>. The data collection in this article is mainly obtained through online monitoring. For intelligent substations, according to the DL/T860 engineering implementation standard, the network topology of relay protection system intelligent substations is divided into three layers, namely, station control layer, interval layer, and process layer. The operation status of the microcomputer protection device comes from the self-check of the device, mainly including CPU status, sampling status, memory status, as well as the input and output status of the device. Smart substations integrate advanced information technology, automation control, and communication technology, enabling them to automatically collect equipment status information. The collected data is automatically analysed and processed by computers, providing real-time understanding of the grid&#x2019;s operational status and enabling prompt detection and handling of issues, thus eliminating the need for manual data recording. In contrast, conventional substations require the installation of additional status monitoring units on primary equipment to achieve similar data collection capabilities, resulting in lower levels of automation and intelligence in data acquisition. Accurate evaluation data reflecting the status of relay protection equipment can be obtained through backend monitoring equipment. Five experts were selected, all of whom have a bachelor&#x2019;s degree or above and are engaged in relay protection related work. Information is collected by distributing electronic questionnaires. Before the evaluation, researchers first solicited the willingness of experts to participate to ensure the smooth progress of the evaluation.</p>
<table-wrap id="T4" position="float">
<label>TABLE 4</label>
<caption>
<p>Risk assessment statistical data.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Risk assessment indicators</th>
<th align="center">Normal value</th>
<th align="center">Maximum degradation value</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">1</td>
<td align="center">10&#xa0;ms</td>
<td align="center">30&#xa0;ms</td>
</tr>
<tr>
<td align="center">2</td>
<td align="center">99.99%</td>
<td align="center">99.4%</td>
</tr>
<tr>
<td align="center">3</td>
<td align="center">0 time</td>
<td align="center">5 time</td>
</tr>
<tr>
<td align="center">4</td>
<td align="center">/</td>
<td align="center">15&#xa0;years</td>
</tr>
<tr>
<td align="center">5</td>
<td align="center">0 time</td>
<td align="center">5&#xa0;years</td>
</tr>
<tr>
<td align="center">6</td>
<td align="center">100%</td>
<td align="center">50%</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>
<bold>Note</bold>: The definition of evaluating indicator 1&#x2013;6 is the same with <xref ref-type="table" rid="T1">Table 1</xref>.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p>Based on historical statistical data of relay protection, the risk assessment model established in this paper is adopted. Firstly, based on the AHP-EW method, the weight of the selected indicators is solved. Then, the risk level boundary is fuzzily quantified using cloud model calculation method. After obtaining the cloud membership degree of each risk level corresponding to a single indicator, an evaluation matrix is established. Finally, the operational risk level of the protection device is determined by combining the variable fuzzy set evaluation model.</p>
</sec>
<sec id="s4-2">
<title>4.2 Weight calculation</title>
<p>Investigate the importance evaluation of historical status information evaluation indicators by multiple experts in relay protection operation and maintenance, and assign weights to the evaluation values of multiple authoritative experts based on the AHP-EW combined method. In this paper, the number of experts is 4. Detailed quantitative standards for authoritative experts is given in <xref ref-type="table" rid="T5">Table 5</xref>.</p>
<table-wrap id="T5" position="float">
<label>TABLE 5</label>
<caption>
<p>Detailed quantitative standards for authoritative experts.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Essential factor</th>
<th align="center">Weight</th>
<th align="center">Level</th>
<th align="center">Score</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td rowspan="4" align="center">Professional title</td>
<td rowspan="4" align="center">4</td>
<td align="center">Professor of engineering</td>
<td align="center">0.8</td>
</tr>
<tr>
<td align="center">Senior engineer</td>
<td align="center">0.6</td>
</tr>
<tr>
<td align="center">Engineer</td>
<td align="center">0.4</td>
</tr>
<tr>
<td align="center">Assistant engineer</td>
<td align="center">0.2</td>
</tr>
<tr>
<td rowspan="4" align="center">Length of service</td>
<td rowspan="4" align="center">3</td>
<td align="center">&#x3e;20</td>
<td align="center">0.8</td>
</tr>
<tr>
<td align="center">10&#x2013;20</td>
<td align="center">0.6</td>
</tr>
<tr>
<td align="center">5&#x2013;10</td>
<td align="center">0.4</td>
</tr>
<tr>
<td align="center">&#x3c;5</td>
<td align="center">0.2</td>
</tr>
<tr>
<td rowspan="4" align="center">Education</td>
<td rowspan="4" align="center">3</td>
<td align="center">Postgraduate</td>
<td align="center">0.8</td>
</tr>
<tr>
<td align="center">Undergraduate</td>
<td align="center">0.6</td>
</tr>
<tr>
<td align="center">Junior college</td>
<td align="center">0.4</td>
</tr>
<tr>
<td align="center">Other</td>
<td align="center">0.2</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>According to the weight calculation strategy, the weight assignment value of average action time is 5.6848. Similarly, the weight assignment values for correct action rate, number of device defects, operation time, maintenance situation, and precise evaluation of countermeasures can be obtained, which is shown in <xref ref-type="fig" rid="F3">Figure 3</xref>.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Weight assignment values for different evaluating indicators.</p>
</caption>
<graphic xlink:href="fenrg-12-1342793-g003.tif"/>
</fig>
</sec>
<sec id="s4-3">
<title>4.3 Analysis of risk assessment results for relay protection equipment</title>
<p>Based on the operation specifications of relay protection devices and practical operation and maintenance experience, the evaluation level boundary standards of relay protection state parameters are processed and hard graded. The calculation results of each state level <italic>V</italic>
<sub>
<italic>i</italic>
</sub> (<italic>i</italic> &#x3d; 1, 2, 3, 4) are shown in <xref ref-type="table" rid="T6">Table 6</xref>.</p>
<table-wrap id="T6" position="float">
<label>TABLE 6</label>
<caption>
<p>Detailed quantitative standards for authoritative experts.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Evaluation indicators</th>
<th align="center">
<italic>V</italic>
<sub>1</sub>
</th>
<th align="center">
<italic>V</italic>
<sub>2</sub>
</th>
<th align="center">
<italic>V</italic>
<sub>3</sub>
</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">1</td>
<td align="center">[0, 0.25]</td>
<td align="center">[0.25, 0.45]</td>
<td align="center">[0.45, 0.7]</td>
</tr>
<tr>
<td align="center">2</td>
<td align="center">[0, 0.15]</td>
<td align="center">[0.15, 0.35]</td>
<td align="center">[0.35, 0.7]</td>
</tr>
<tr>
<td align="center">3</td>
<td align="center">[0, 0.25]</td>
<td align="center">[0.25, 0.7]</td>
<td align="center">[0.7, 0.9]</td>
</tr>
<tr>
<td align="center">4</td>
<td align="center">[0, 0.2]</td>
<td align="center">[0.2, 0.45]</td>
<td align="center">[0.45, 0.75]</td>
</tr>
<tr>
<td align="center">5</td>
<td align="center">[0, 0.2]</td>
<td align="center">[0.2, 0.5]</td>
<td align="center">[0.5, 0.8]</td>
</tr>
<tr>
<td align="center">6</td>
<td align="center">[0, 0.2]</td>
<td align="center">[0.2, 0.6]</td>
<td align="center">[0.6, 0.8]</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>
<bold>Note</bold>: The definition of indicator 1&#x2013;6 is the same with <xref ref-type="table" rid="T1">Table 1</xref> and the definition of <italic>V</italic>
<sub>1</sub>-<italic>V</italic>
<sub>4</sub> is the same with <xref ref-type="table" rid="T3">Table 3</xref>.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p>Treat the boundary of relay protection level as a double constraint condition [<italic>x</italic>
<sub>
<italic>i</italic>
</sub>, <italic>x</italic>
<sub>
<italic>i</italic>&#x2b;1</sub>], apply the interval eigenvalue formula of the cloud model mentioned earlier, calculate the boundary level eigenvalue <italic>E</italic>
<sub>
<italic>x</italic>
</sub>, <italic>E</italic>
<sub>
<italic>n</italic>
</sub> and <italic>H</italic>
<sub>
<italic>e</italic>
</sub> for each indicator, and finally output the normal cloud model of relay protection evaluation indicators to achieve softening of the boundary. The characteristic values of each indicator cloud model are shown in <xref ref-type="fig" rid="F4">Figure 4</xref>.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>The characteristic values of each indicator cloud model. <bold>(A)</bold> Characteristic values of indicator 1. <bold>(B)</bold> Characteristic values of indicator 2. <bold>(C)</bold> Characteristic values of indicator 3. <bold>(D)</bold> Characteristic values of indicator 4. <bold>(E)</bold> Characteristic values of indicator 5. <bold>(F)</bold> Characteristic values of indicator 6.</p>
</caption>
<graphic xlink:href="fenrg-12-1342793-g004.tif"/>
</fig>
<p>According to <xref ref-type="fig" rid="F4">Figure 4</xref>, the expectation and entropy of the cloud model can be calculated to obtain the level boundary for each indicator. The statistical data of evaluation indicators are standardized according to <xref ref-type="disp-formula" rid="e1">Formula 1</xref>&#x2013;<xref ref-type="disp-formula" rid="e4">4</xref>, and the calculation results are shown in <xref ref-type="table" rid="T7">Table 7</xref>.</p>
<table-wrap id="T7" position="float">
<label>TABLE 7</label>
<caption>
<p>Standard processing results of evaluation indicators.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Evaluation indicators</th>
<th align="center">Statistical data of indicators</th>
<th align="center">Standard processing results</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">1</td>
<td align="center">24.1&#xa0;ms</td>
<td align="center">0.64</td>
</tr>
<tr>
<td align="center">2</td>
<td align="center">99.5%</td>
<td align="center">0.82</td>
</tr>
<tr>
<td align="center">3</td>
<td align="center">0 time</td>
<td align="center">0.25</td>
</tr>
<tr>
<td align="center">4</td>
<td align="center">12&#xa0;years</td>
<td align="center">0.65</td>
</tr>
<tr>
<td align="center">5</td>
<td align="center">0 time</td>
<td align="center">0.3</td>
</tr>
<tr>
<td align="center">6</td>
<td align="center">80%</td>
<td align="center">0.16</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>If the evaluation value of a certain indicator is known, it is easy to determine the risk level of the indicator from the level boundary cloud model. By using <xref ref-type="disp-formula" rid="e9">Formula 9</xref>, the comprehensive membership degree of evaluation indicators can be calculated to obtain the membership degree of evaluation levels under four different model parameters. The calculation results are shown in <xref ref-type="table" rid="T8">Table 8</xref>, and the risk level assessment is easily completed based on the principle of eigenvalue judgment.</p>
<table-wrap id="T8" position="float">
<label>TABLE 8</label>
<caption>
<p>Calculation results of comprehensive membership degree using different modes.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="center">Mode</th>
<th align="center">Comprehensive membership degree</th>
<th align="center">Eigenvalue</th>
<th align="center">Level</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="center">1</td>
<td align="center">[0.2, 0.25, 0.25, 0.3]</td>
<td align="center">2.7</td>
<td align="center">
<italic>V</italic>
<sub>3</sub>
</td>
</tr>
<tr>
<td align="center">2</td>
<td align="center">[0.2, 0.2, 0.25, 0.35]</td>
<td align="center">2.7</td>
<td align="center">
<italic>V</italic>
<sub>3</sub>
</td>
</tr>
<tr>
<td align="center">3</td>
<td align="center">[0.1, 0.2, 0.2, 0.5]</td>
<td align="center">3.0</td>
<td align="center">
<italic>V</italic>
<sub>3</sub>
</td>
</tr>
<tr>
<td align="center">4</td>
<td align="center">[0.1, 0.2, 0.2, 0.5]</td>
<td align="center">3.1</td>
<td align="center">
<italic>V</italic>
<sub>3</sub>
</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>
<bold>Note</bold>: Mode 1&#x2013;4 represent fuzzy comprehensive model, TOPSISI, ideal point model, S-function model and fuzzy optimization model, respectively.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p>From <xref ref-type="table" rid="T8">Table 8</xref>, it can be seen that the distribution of the comprehensive membership degree vector at each level is relatively uniform and tends towards level <italic>V</italic>
<sub>4</sub>. According to the principle of eigenvalue evaluation, only the fuzzy optimization model determines that the result is unacceptable level <italic>V</italic>
<sub>4</sub>, and the rest are unexpected level <italic>V</italic>
<sub>3</sub>. The average eigenvalue of the level is obtained to be 2.875, which comprehensively determines that the risk of the protection device is unexpected level <italic>V</italic>
<sub>3</sub>, and points out that the risk of the device is further increasing. Based on the real-time status evaluation of protection devices, the current analysis shows that there are three indicators in the statistical data that are at the <italic>V</italic>
<sub>3</sub> risk level, one indicator that is at the <italic>V</italic>
<sub>2</sub> risk level, and two indicators that are at the <italic>V</italic>
<sub>1</sub> risk level. After analysis, the indicator at the <italic>V</italic>
<sub>3</sub> level is related to the reliability of the device. Obviously, the reliability of the device has decreased due to its long service life, and its maintenance status and real-time operation status cannot be ignored. Based on the actual operation status of the protection device, it is evaluated as an abnormal state. After timely maintenance, it can meet its normal operation. In combination with the risk assessment standards in this paper, it is comprehensively determined that the operating status of the protection device is an unexpected risk level <italic>V</italic>
<sub>3</sub>.</p>
</sec>
</sec>
<sec sec-type="conclusion" id="s5">
<title>5 Conclusion</title>
<p>This paper considers the characteristics in the status evaluation process of relay protection. A cloud model that can handle random features is introduced and a variable fuzzy evaluation method is adopted to handle the randomness and fuzziness of historical statistical data information. The weight calculation adopts the AHP-EW combined method, which effectively avoids the subjective randomness of weights in the calculation process. Finally, the risk level of relay protection devices is determined using the variable fuzzy comprehensive evaluation method. Finally, the feasibility and effectiveness of the proposed method are verified through case study. In all, the calculation process of the method proposed in this article is simple and can to some extent eliminate subjective influence. Due to limitations in research time and experience, there are still some issues that need further improvement.<list list-type="simple">
<list-item>
<p>(1) The indicator system is not comprehensive enough. Based on the development of state monitoring technology, it is necessary to further explore the state variables that affect the normal operation of equipment, and consider the state of the secondary system circuit.</p>
</list-item>
<list-item>
<p>(2) Variable fuzzy sets have strong operability and complex calculation processes. Consider combining artificial neural networks to design a more intelligent state evaluation model.</p>
</list-item>
</list>
</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="s6">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/Supplementary material, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec id="s7">
<title>Author contributions</title>
<p>DL: Methodology, Writing&#x2013;original draft. KW: Methodology, Writing&#x2013;original draft. ZG: Methodology, Writing&#x2013;original draft. YC: Data curation, Writing&#x2013;original draft. WL: Data curation, Methodology, Writing&#x2013;original draft. JZ: Formal Analysis, Writing&#x2013;review and editing.</p>
</sec>
<sec sec-type="funding-information" id="s8">
<title>Funding</title>
<p>The author(s) declare that financial support was received for the research, authorship, and/or publication of this article. This research was funded by State Grid Jilin Electric Power Co., Ltd. Technology Project (No. 2023-54): Research and Application of Virtual Debugging Technology for a New Generation Intelligent Substation Based on Intermediate Model Library and Configuration Template. The authors declare that this study received funding from State Grid Jilin Electric Power Co., Ltd. The funder was not involved in the study design, collection, analysis, interpretation of data, the writing of this article, or the decision to submit it for publication.</p>
</sec>
<sec sec-type="COI-statement" id="s9">
<title>Conflict of interest</title>
<p>Authors DL, KW, ZG, YC, WL, and JZ were employed by State Grid Jilin Electric Power Co., LTD.</p>
</sec>
<sec sec-type="disclaimer" id="s10">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Ahmed</surname>
<given-names>M. T.</given-names>
</name>
<name>
<surname>Concalves</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Tlemcani</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2016</year>). &#x201c;<article-title>Single diode model parameters analysis of photovoltaic cell</article-title>,&#x201d; in <conf-name>Birmingham: IEEE International Conference on Renewable Energy Research and Applications(ICRERA)</conf-name>, <conf-loc>Birmingham, UK</conf-loc>, <conf-date>November, 2016</conf-date>, <fpage>396</fpage>&#x2013;<lpage>400</lpage>.</citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bansal</surname>
<given-names>R. C.</given-names>
</name>
</person-group> (<year>2003</year>). <article-title>Bibliography on the fuzzy set theory applications in power systems (1994-2001)</article-title>. <source>IEEE Trans. Power Syst.</source> <volume>18</volume> (<issue>4</issue>), <fpage>1291</fpage>&#x2013;<lpage>1299</lpage>. <pub-id pub-id-type="doi">10.1109/tpwrs.2003.818595</pub-id>
</citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Castellani</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Garinei</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Terzi</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Astolfi</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Gaudiosi</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2014</year>). <article-title>Improving windfarm operation practice through numerical modelling and supervisory control and data acquisition data analysis</article-title>. <source>IET Renew. Power Gener.</source> <volume>8</volume> (<issue>4</issue>), <fpage>367</fpage>&#x2013;<lpage>379</lpage>. <pub-id pub-id-type="doi">10.1049/iet-rpg.2013.0182</pub-id>
</citation>
</ref>
<ref id="B4">
<citation citation-type="book">
<collab>Disturbance Analysis Working Group</collab> (<year>1979</year>). <source>Review of selected electric system disturbances in North America</source>. <publisher-loc>Princeton</publisher-loc>: <publisher-name>Disturbance Analysis Working Group</publisher-name>.</citation>
</ref>
<ref id="B5">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gama</surname>
<given-names>L. A.</given-names>
</name>
<name>
<surname>Almeida</surname>
<given-names>M. L. S.</given-names>
</name>
<name>
<surname>Honorato</surname>
<given-names>T. R.</given-names>
</name>
<name>
<surname>Serpa</surname>
<given-names>V. R.</given-names>
</name>
<name>
<surname>Silva</surname>
<given-names>K. M.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Mathematical and experimental evaluation of an incremental differential protection function embedded in a real transmission line relay</article-title>. <source>Electr. Power Syst. Res.</source> <volume>196</volume>, <fpage>107158</fpage>. <pub-id pub-id-type="doi">10.1016/j.epsr.2021.107158</pub-id>
</citation>
</ref>
<ref id="B6">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Guo</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Liang</surname>
<given-names>Y.</given-names>
</name>
<etal/>
</person-group> (<year>2014</year>). <article-title>State evaluation of high-voltage circuit breakers based on grey fuzzy comprehensive evaluation</article-title>. <source>Power Autom. Equip.</source> <volume>034</volume> (<issue>11</issue>), <fpage>161</fpage>&#x2013;<lpage>167</lpage>.</citation>
</ref>
<ref id="B7">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Guo</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Long</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2022</year>). &#x201c;<article-title>Intelligent substation relay protection condition monitoring based on support vector machine algorithm</article-title>,&#x201d; in <conf-name>2022 2nd International Conference on Networking, Communications and Information Technology (NetCIT)</conf-name>, <conf-loc>Manchester, United Kingdom</conf-loc>, <conf-date>December, 2022</conf-date>, <fpage>638</fpage>&#x2013;<lpage>642</lpage>.</citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hao</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Ren</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Design of comprehensive early-warning system based on risk assessment</article-title>. <source>Electron. Des. Eng.</source> <volume>26</volume> (<issue>3</issue>), <fpage>138</fpage>&#x2013;<lpage>141</lpage>.</citation>
</ref>
<ref id="B9">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hatziargyriou</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Milanovic</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Rahmann</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Ajjarapu</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Canizares</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Erlich</surname>
<given-names>I.</given-names>
</name>
<etal/>
</person-group> (<year>2021</year>). <article-title>Definition and classification of power system stability &#x2013; revisited and extended</article-title>. <source>IEEE Trans. Power Syst.</source> <volume>36</volume> (<issue>4</issue>), <fpage>3271</fpage>&#x2013;<lpage>3281</lpage>. <pub-id pub-id-type="doi">10.1109/tpwrs.2020.3041774</pub-id>
</citation>
</ref>
<ref id="B10">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Hu</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Kang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Ye</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2023</year>). &#x201c;<article-title>A relay protection state evaluation method with multiple influencing factors</article-title>,&#x201d; in <conf-name>2023 IEEE Sustainable Power and Energy Conference (iSPEC)</conf-name>, <conf-loc>Chongqing, China</conf-loc>, <conf-date>November, 2023</conf-date>, <fpage>1</fpage>&#x2013;<lpage>5</lpage>.</citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jia</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Hou</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Yong</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>D.</given-names>
</name>
<etal/>
</person-group> (<year>2024</year>). <article-title>Voltage stability constrained operation optimization: an ensemble sparse oblique regression tree method</article-title>. <source>IEEE Trans. Power Syst.</source> <volume>39</volume> (<issue>1</issue>), <fpage>160</fpage>&#x2013;<lpage>171</lpage>. <pub-id pub-id-type="doi">10.1109/tpwrs.2023.3236164</pub-id>
</citation>
</ref>
<ref id="B12">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jiang</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Fan</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2007</year>). <article-title>Evaluation of the operational status of overhead transmission lines based on rough set theory</article-title>. <source>Electr. Technol.</source> (<issue>04</issue>), <fpage>63</fpage>&#x2013;<lpage>65</lpage>.</citation>
</ref>
<ref id="B13">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Feng</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Song</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2013</year>). <article-title>Fuzzy evidence theory online state evaluation model for medium voltage vacuum circuit breakers</article-title>. <source>High. Volt. Electr. Appliances</source> (<issue>1</issue>), <fpage>40</fpage>&#x2013;<lpage>45</lpage>.</citation>
</ref>
<ref id="B14">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Liang</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Liang</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>Reliability analysis for vertical integration of protection, measurement, merge unit, and intelligent terminal device</article-title>. <source>Glob. Energy Interconnect.</source> <volume>6</volume> (<issue>6</issue>), <fpage>772</fpage>&#x2013;<lpage>784</lpage>. <pub-id pub-id-type="doi">10.1016/j.gloei.2023.11.010</pub-id>
</citation>
</ref>
<ref id="B15">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Srivastava</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Anh Tuan</surname>
<given-names>Le</given-names>
</name>
<name>
<surname>Steen</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Carlson</surname>
<given-names>O.</given-names>
</name>
<name>
<surname>Omar</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Bijwaard</surname>
<given-names>D.</given-names>
</name>
</person-group> (<year>2023</year>). <article-title>Dynamic state estimation based transmission line protection scheme: performance evaluation with different fault types and conditions</article-title>. <source>Int. J. Electr. Power &#x26; Energy Syst.</source> <volume>148</volume>, <fpage>108994</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijepes.2023.108994</pub-id>
</citation>
</ref>
<ref id="B16">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tse</surname>
<given-names>C. K.</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>X. L.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Circuits and systems issues in power electronics penetrated power grid</article-title>. <source>IEEE Open J. Circuits Syst.</source> <volume>1</volume>, <fpage>140</fpage>&#x2013;<lpage>156</lpage>. <pub-id pub-id-type="doi">10.1109/ojcas.2020.3020633</pub-id>
</citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>Z.</given-names>
</name>
<etal/>
</person-group> (<year>2018</year>). <article-title>State evaluation of secondary equipment in intelligent substations based on cloud theory</article-title>. <source>Power Syst. Prot. Control</source> <volume>46</volume> (<issue>1</issue>), <fpage>71</fpage>&#x2013;<lpage>77</lpage>.</citation>
</ref>
<ref id="B18">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wu</surname>
<given-names>H.</given-names>
</name>
<etal/>
</person-group> (<year>2023</year>). <article-title>Control and stability of large-scale power system with highly distributed renewable Energy generation: viewpoints from six aspects</article-title>. <source>CSEE J. Power Energy Syst.</source> <volume>9</volume> (<issue>1</issue>), <fpage>8</fpage>&#x2013;<lpage>14</lpage>.</citation>
</ref>
<ref id="B19">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xia</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Research on risk assessment and maintenance decision and secondary equipment of distribution automation</article-title>. <source>Electr. Power Eng. Technol.</source> <volume>26</volume> (<issue>3</issue>), <fpage>155</fpage>&#x2013;<lpage>160</lpage>.</citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xu</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Lin</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>State evaluation of line relay protection based on generalized evidence theory</article-title>. <source>Hydroelectr. Energy Sci.</source> <volume>36</volume> (<issue>3</issue>), <fpage>196</fpage>&#x2013;<lpage>200</lpage>.</citation>
</ref>
<ref id="B21">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zheng</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Dong</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>S.</given-names>
</name>
<etal/>
</person-group> (<year>2023</year>). <article-title>A quality evaluation method for the unstructured defect record of relay protection devices based on ontology and knowledge graph</article-title>. <source>Energy Rep.</source> <volume>9</volume> (<issue>7</issue>), <fpage>771</fpage>&#x2013;<lpage>781</lpage>. <pub-id pub-id-type="doi">10.1016/j.egyr.2023.04.157</pub-id>
</citation>
</ref>
</ref-list>
</back>
</article>