Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Electricity larceny object screening method based on big data analysis

A big data and electricity stealing technology, applied in the electric power field, can solve the problems of low screening efficiency, high experience requirements for screening personnel, and high personnel costs, so as to reduce manpower input and cost, narrow the scope of screening, and high screening accuracy Effect

Active Publication Date: 2020-04-21
内蒙古科电数据服务有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Stealing electricity has caused huge losses to the power operation company, interfered with the normal order of power supply and consumption, and may cause grid security accidents, and even cause casualties. The loss of electric energy increases the line loss and increases the burden on other legitimate electricity customers. , therefore, the consequences of stealing electricity are not only the loss of electricity, but also affect the safe operation of the power grid and social stability
[0003] In response to the above problems, the power operation company has also proposed some methods for troubleshooting electricity theft. The main method is to eliminate it through manual inspection. The investigators analyze the electricity consumption data generated by electricity customers based on experience, and find out that there may be electricity theft and breach of contract. Customers who use electricity, and then go to the site to investigate and confirm whether the electricity theft and breach of contract are true or not; the disadvantages of this method are: the investigation target is not clear, blind investigation, large manpower investment, high personnel cost, and low investigation efficiency. Moreover, the experience requirements for the investigators are high, the accuracy rate is low, and the timeliness is poor. Most customers who steal electricity cannot be found in time.
There are also professional stealing monitoring equipment on the market to monitor the voltage, current, and load of customers who use electricity, and can also find abnormal electricity consumption by users who steal electricity. Customers who violate the contract can only invest in large quantities of funds to purchase equipment, which leads to high investment costs and low investigation efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] A screening method for electricity stealing objects based on big data analysis, using big data of electricity consumption, through industry screening, electricity consumption scale screening, electricity consumption smoothness screening, capacity and power matching screening, power consumption and line Loss comparison screening and electricity customer measurement change screening, respectively screen out the first inspection scope, the second inspection scope, the third inspection scope, the fourth investigation scope, the fifth investigation scope and the sixth investigation scope. If it falls into the first, second, third, fourth, fifth, and sixth inspection scopes, the customer will be included in the investigation scope of electricity stealing objects, and then the investigators will check Scope of investigation of power-stealing objects Carry out on-the-spot investigations to find out the final power-stealing objects.

[0037] Big data on electricity consumption i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electricity stealing object screening method based on big data analysis. Utilizing electricity utilization big data, industry screening, power consumption scale screening, power consumption stability screening, capacity and electric quantity matching screening, electric quantity and line loss comparison screening and power consumption customer metering change screening are carried out on power consumption customers. Respectively screening out a first troubleshooting range, a second troubleshooting range, a third troubleshooting range, a fourth troubleshooting range,a fifth troubleshooting range and a sixth troubleshooting range; when the electricity customer falls into the first troubleshooting range, the second troubleshooting range, the third troubleshooting range, the fourth troubleshooting range, the fifth troubleshooting range and the sixth troubleshooting range at the same time, the electricity customer is listed into the electricity stealing object troubleshooting range, then troubleshooting personnel carry out field troubleshooting on the electricity stealing object troubleshooting range, and a final electricity stealing object is found out. Themethod has the advantages that the troubleshooting range can be greatly reduced, blind troubleshooting is avoided, time and labor are saved, the screening accuracy is high, and the troubleshooting efficiency is high.

Description

Technical field: [0001] The invention relates to the field of electric power technology, in particular to a method for screening electricity-stealing objects based on big data analysis. Background technique: [0002] For a long time, some electricity customers have been driven by their interests, and they have tried every means to tamper with the electricity metering equipment and steal electricity. Stealing electricity has caused huge losses to the power operation company, interfered with the normal order of power supply and consumption, and may cause grid security accidents, and even cause casualties. The loss of electric energy increases the line loss and increases the burden on other legitimate electricity customers. , Therefore, the consequences of stealing electricity are not only the loss of electricity, but also affect the safe operation of the power grid and social stability. [0003] In response to the above problems, the power operation company has also proposed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/903G06F17/18G06Q50/06
CPCG06F17/18G06Q50/06Y02D10/00
Inventor 衣丰超温晓辉段军李运博刘国霞段黎明宋云平
Owner 内蒙古科电数据服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products