Unlock instant, AI-driven research and patent intelligence for your innovation.

Electricity stealing and electric leakage user identification method and device, computer equipment and storage medium

A technology for user identification and identification, which is applied to computer parts, calculations, calculation models, etc., can solve the problems of low efficiency, low efficiency, and complicated process of manual inspection and stealing electricity

Pending Publication Date: 2020-10-27
深圳天顺智慧能源科技有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional anti-theft and leakage methods are mainly to find electricity theft or metering device failure through regular inspections, regular calibration of meters, and user reports of electricity theft. However, this method is too dependent on people, and the goal of leak detection Not clear, there are congenital defects and deficiencies; moreover, with the generalization and diversification of the phenomenon of electricity theft and leakage, the manual inspection of electricity theft is inefficient, the process is complicated, and the subjectivity is too strong. Judging based on experience
The existing electric power metering automation system can collect electricity load data such as current and voltage of each phase, as well as user abnormal data. The abnormal warning information and electricity load data can reflect the user's electricity consumption. and on-site inspections to find out the users who steal electricity and leak electricity and enter them into the system, but there is no way to automatically extract the key features of users who steal electricity and leak electricity, and automatically identify users who steal electricity and leak electricity, and the efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electricity stealing and electric leakage user identification method and device, computer equipment and storage medium
  • Electricity stealing and electric leakage user identification method and device, computer equipment and storage medium
  • Electricity stealing and electric leakage user identification method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0051] It should also be understood that the terminology used in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an electricity stealing and electric leakage user identification method and device, computer equipment and a storage medium, and the method comprises the steps of obtaining to-be-identified abnormal data, so as to obtain to-be-identified data; performing feature extraction on the to-be-identified data to obtain feature data; inputting the feature data into an identification model for user identification to obtain an identification result; feeding back an identification result to the terminal, wherein the identification model is obtained by training a random forest model by taking a plurality of characteristic data related to electricity stealing and electric leakage and characteristic data related to non-electricity stealing and electric leakage as data sets. The invention comprises acquiring data to be identified; the data is input into the recognition model to be automatically recognized, the recognition result can be obtained; the recognition model is a random forest model formed after iterative optimization is conducted through a particle swarm optimization algorithm, the classification accuracy is high, key features of electricity stealing and leakageusers are extracted, the electricity stealing and leakage users are recognized, the efficiency is high, and the accuracy is high.

Description

technical field [0001] The present invention relates to electricity data identification method, more specifically refers to the user identification method, device, computer equipment and storage medium of electricity stealing and leakage. Background technique [0002] With the rapid development of social economy, power resources play an increasingly important role in people's daily life. However, in order to reduce the expenditure of power resource costs, individual users steal electricity through deceptive means such as stealing electricity and fraud, which has caused serious economic losses to the power company. To solve this problem, the power company has taken many measures to inspect and rectify, and achieved certain results. [0003] The traditional anti-theft and leakage methods are mainly to find electricity theft or metering device failure through regular inspections, regular calibration of meters, and user reports of electricity theft. However, this method is too ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62G06N3/00G06Q30/02G06Q50/06
CPCG06N3/006G06Q30/0201G06Q50/06G06F18/24323
Inventor 刘军汪浩陈瑶
Owner 深圳天顺智慧能源科技有限公司