Abnormal user identification method based on GBDT algorithm and factor fusion

A user identification and anomaly technology, applied in the field of unified distribution network topology construction based on graph fusion technology, can solve the problem of no output user stealing probability, low prediction accuracy of power consumption abnormal model and anti-stealing model, and narrowing the scope of investigation and other problems to achieve the effect of narrowing the scope of investigation, submitting accuracy, and reducing workload

Pending Publication Date: 2020-05-15
STATE GRID BEIJING ELECTRIC POWER +1
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the prediction accuracy of the existing abnormal power consumption model and anti-stealing model is low, and there is no output user electricity theft probability, so that the anti-stealing work can focus on the investigation while reducing the scope of investigation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal user identification method based on GBDT algorithm and factor fusion
  • Abnormal user identification method based on GBDT algorithm and factor fusion
  • Abnormal user identification method based on GBDT algorithm and factor fusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0030] All the data of the present invention are adopted from a marketing business application system of a power supply company. It mainly includes user files, user power consumption data, line loss data, and power supply and consumption data in the station area. This model is suitable for the electricity stealing behavior analysis of districts and counties, that is to say, only one district and county electricity stealing situation is analyzed each time. Therefore, it is necessary to determine which districts and counties are to be analyzed for power theft before modeling. Generally, districts and counties with high average line loss in the past three months are selected for modeling analysis. After the districts and counties are determined, through the business understanding and data exploration of the anti-stealing problem, the high-loss station areas under the district and county are selected as the target detection station areas. After the selection of the station area ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an abnormal user identification method based on a GBDT algorithm and factor fusion. The abnormal user identification method comprises the following steps: step 1, data preprocessing: collecting user power consumption data and transformer area power supply data and preprocessing the user power consumption data and transformer area power supply data; step 2, feature extraction: screening out features related to electricity stealing from historical electricity consumption and electricity consumption transaction related features by adopting a support vector machine algorithm according to the relationship between each feature and the electricity stealing behavior; step 3, model construction: using the features related to electricity stealing screened in the step 2 as input data of an abnormal user identification model, and using GBDT as a modeling algorithm to construct the abnormal user identification model; and calculating a suspected abnormal electricity user through the abnormal user identification model, and calculating the electricity stealing probability P of the abnormal user according to a suspected electricity stealing probability formula. According tothe invention, accurate identification of electricity consumption behavior abnormity and calculation of the electricity stealing probability of the user can be effectively realized, so that the troubleshooting range is reduced, the troubleshooting key point is realized, the workload of troubleshooting personnel is reduced, and the submission accuracy is improved.

Description

technical field [0001] The invention belongs to the technical field of electric power information, and in particular relates to a method for constructing a topology of a unified distribution network grid based on graph fusion technology. Background technique [0002] With the acceleration of my country's modernization, the country's energy consumption is also increasing, especially the demand for electricity is increasing year by year. In this context, some criminals steal power resources by various means, and even some areas are very rampant. Stealing electricity not only seriously affects the normal order of power supply and consumption, but also brings serious economic losses to power grid enterprises, and also causes damage to power supply and transmission equipment, and even endangers the security of the power grid. [0003] At present, most of them adopt the method of daily inspection to detect anti-stealing behaviors, but this method of investigation is inefficient, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q50/06
CPCG06Q10/067G06Q50/06
Inventor 李清涛陆斯悦张禄吴钢任宇驰李林松安佳琪李国昌赵宇彤张宝群
Owner STATE GRID BEIJING ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products