Check patentability & draft patents in minutes with Patsnap Eureka AI!

Electricity stealing user identification method and device combining cloud end and side end

A technology for user identification and power theft, applied in neural learning methods, character and pattern recognition, instruments, etc., can solve problems affecting power supply order, electric shock accidents, manpower and material resources, etc., to improve computing efficiency and detection Efficiency, speed up calculation, and reduce calculation burden

Pending Publication Date: 2021-09-17
国网江西综合能源服务有限公司 +2
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Stealing electricity not only seriously affects the normal order of power supply and consumption, but also brings large economic losses to power grid enterprises, and also causes electric shock accidents and electrical fire accidents, endangering personal and power grid safety
[0003] At present, most of the identification methods for users suspected of stealing electricity are worker inspections and regular house-to-house inspections. However, this method is inefficient and consumes a lot of manpower and material resources. At the same time, it is difficult to accurately identify some concealed methods of stealing electricity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electricity stealing user identification method and device combining cloud end and side end
  • Electricity stealing user identification method and device combining cloud end and side end
  • Electricity stealing user identification method and device combining cloud end and side end

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0016] see figure 1 , which shows a flow chart of a method for identifying a power-stealing user combining the cloud and the edge of the present application.

[0017] Such as figure 1 As shown, the electricity stealing user identification method combining the cloud and the edge specifically includes:

[0018]Step S101 , in response to acquiring...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electricity larceny user identification method and device combining a cloud end and a side end, and the method comprises the steps: responding to the historical electricity utilization data of a user at the side end and the electricity larceny record of a terminal device, extracting an electricity larceny identification evaluation index and an electricity larceny label, and enabling a training data set to be formed; training a combined classification model based on the training data set, wherein the combined classification model is a combined model based on a LightGBM sub-model and a neural network sub-model; and inputting real-time power consumption data of a certain user into the combined classification model, and outputting an electricity stealing suspicion coefficient of the certain user, so that an electricity stealing suspicion user is determined. According to the technical scheme of the invention, the side end server preprocesses the data and generates the electricity larceny identification label, the calculation burden of the cloud server is reduced, the calculation efficiency and the detection efficiency are improved, and a combined model of the LightGBM model and the BP neural network is adopted, so that the calculation speed is increased, and the classification accuracy is improved.

Description

technical field [0001] The invention belongs to the technical field of power grid anti-stealing, and in particular relates to a method and device for identifying electricity-stealing users combining cloud and edge terminals. Background technique [0002] With the acceleration of my country's modernization, the country's energy consumption is also increasing, especially the demand for electricity is increasing year by year. In this context, some criminals steal power resources by destroying metering devices and connecting lines privately, thereby reducing electricity costs. Stealing electricity not only seriously affects the normal order of power supply and consumption, but also brings large economic losses to power grid enterprises, and also causes electric shock accidents and electrical fire accidents, endangering personal and power grid safety. [0003] At present, most of the identification methods for users suspected of stealing electricity are worker inspections and re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62G06N3/04G06N3/08
CPCG06N3/084G06N3/048G06N3/045G06F18/241G06F18/24323
Inventor 户艳琴张吴敏刘念傅皆恺李承霖黄天翔张延石德文李柯舟胡志强范志夫李晨晨宋伟业
Owner 国网江西综合能源服务有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More