Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A system and method for mining electricity stealing model of user load based on complex user behavior analysis

A technology of behavior analysis and model mining, applied in information technology support systems, electronic digital data processing, character and pattern recognition, etc., can solve problems such as consuming manpower and material resources

Active Publication Date: 2022-08-09
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the past, it generally relied on manual investigation and analysis of users suspected of stealing electricity, which consumed a lot of manpower and material resources. At present, the State Grid Corporation of China and various equipment manufacturers are actively exploring the use of real-time data such as metering automation systems to provide information for anti-stealing work. The means of modernization and intelligence can effectively combat the behavior of stealing electricity, which shows that the work of anti-stealing electricity is of great significance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for mining electricity stealing model of user load based on complex user behavior analysis
  • A system and method for mining electricity stealing model of user load based on complex user behavior analysis
  • A system and method for mining electricity stealing model of user load based on complex user behavior analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] In order to deepen the understanding of the present invention, the present invention will be described in further detail below with reference to examples, which are only used to explain the present invention and do not constitute a limitation on the protection scope of the present invention.

[0093] like Figure 1-2 As shown, this example provides a user load electricity stealing model mining system based on complex user behavior analysis, including a data processor, a suspected electricity stealing user finder, a user load curve generator and an electricity stealing user diagnostic device, the data The processor is connected with the electricity stealing suspect user finder, the electricity stealing suspect user finder is connected with the user load curve generator, and the user load curve generator is connected with the electricity stealing user diagnostic device.

[0094] This example also provides a method for mining electricity stealing model of user load based o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user load electricity stealing model mining system and method based on complex user behavior analysis, including a data processor, a suspected electricity stealing user finder, a user load curve generator and an electricity stealing user diagnostic device. The utility model is connected with the electricity stealing suspect user finder, the electricity stealing suspect user finder is connected with the user load curve generator, and the user load curve generator is connected with the electricity stealing user diagnostic device. The DBSCAN density clustering algorithm is used to find abnormal electricity users, and then the fuzzy C-means algorithm is applied to generate the user load curve, and finally the electricity stealing users are detected through the curve similarity comparison. Electricity behavior analysis can be used to detect electricity stealing users.

Description

technical field [0001] The invention relates to the field of data mining, in particular to a user load electricity stealing model mining system and method based on complex user behavior analysis. Background technique [0002] With the rapid development of my country's economy and the improvement of people's living standards, people's production and life are more and more inseparable from electric energy, the demand for electricity is also increasing, and the quality and reliability of electric energy requirements are getting higher and higher. The electricity demand of users presents a diversified development trend. At present, my country has entered the era of comprehensively building a smart grid. The data recorded by the electric energy metering automation system is increasing exponentially, with a huge amount of data and various types of structures. Related data, such as current, voltage, load, among which the load data is the most used for the analysis of user's electric...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62G06F16/2458G06F16/215
CPCG06F16/215G06F16/2465G06F18/2321Y04S10/50
Inventor 邓松蔡清媛董霞岳东袁新雅陈福林祝展望张建堂
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products