Risk user identification method based on measurement data multi-situation judgment
A technology for user identification and data measurement, applied in data processing applications, character and pattern recognition, instruments, etc., it can solve the problems of hidden electricity stealing, inability to change the count of electricity meters, and inability to trace back, etc., to achieve the effect of improving the accuracy rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] Specifically, such as figure 1 As shown, the risk user identification method includes:
[0057] 11. Obtain the user's electricity consumption data, and preprocess the user's electricity consumption data to obtain mature electricity consumption data;
[0058] 12. Extract characteristic parameters from mature electricity consumption data as the input feature set of SVM algorithm,
[0059] 13. Convert the input feature set into a feature vector, and send the feature vector into the SVM classifier for classification training;
[0060] 14. Identify risky users based on the trained SVM algorithm combined with characteristic parameters.
[0061] In implementation, the extraction of characteristic parameters from mature power consumption data as the input feature set of the SVM algorithm includes: selecting active power P, reactive power Q, load utilization rate index μ, daily maximum load, and power fluctuation as data The category extracts characteristic parameters from ma...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


