Electricity stealing prevention monitoring method and system based on electricity utilization big data

A technology of electricity consumption data and monitoring system, which is applied in the field of electricity theft monitoring, can solve problems such as large errors, weak pertinence, and poor effects, and achieve the effects of reducing detection costs, maintaining social fairness, and improving accuracy

Pending Publication Date: 2021-10-08
国网吉林省电力有限公司信息通信公司
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the disadvantages of weak pertinence, large error and poor effect in the extraction of power consumption information and algorithm calculation in the above-mentioned prior art, the present invention provides an anti-stealing power monitoring method based on big data of power consumption and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electricity stealing prevention monitoring method and system based on electricity utilization big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] The present invention is an anti-stealing electricity monitoring system based on electricity consumption data, such as figure 1 as shown, figure 1 It is the overall framework and flow diagram of the present invention.

[0044] The anti-stealing electricity monitoring system based on electricity consumption data in the present invention builds an anti-electricity theft management business application system, including an electricity consumption data acquisition module, an anti-electricity theft strategy management module, a comprehensive monitoring module, an anti-electricity theft abnormal warning module, and an event management module And the service module of damage assessment and rectification.

[0045] The power consumption data acquisition module is connected to an external service database through a local area network, and collects relational index data composed of load curves, daily power consumption, abnormal events, customer information, credit theft, voltage ...

Embodiment 2

[0054] The embodiment of the present invention also provides an anti-stealing electricity monitoring method based on electricity consumption data, such as figure 1 as shown, figure 1 It is the overall framework and flow diagram of the present invention.

[0055] The inventive method comprises the following steps:

[0056] Step 1. Build an anti-theft management business application system.

[0057] The present invention builds an anti-stealing power management business application system, uses big data analysis technology and computer algorithms to monitor user power consumption data in real time, builds intelligent power consumption abnormality analysis and anti-stealing power applications, and analyzes power consumption information and tables in multiple dimensions. Data information such as meter status and line loss can detect electricity theft events in a timely and effective manner, and quickly locate users suspected of electricity theft. Through the construction of int...

Embodiment 3

[0075] Based on the same inventive concept, an embodiment of the present invention also provides a computer storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the one based on The steps of the anti-stealing electricity monitoring method of electricity consumption data.

[0076] Those skilled in the art should understand that the embodiments of the present application may be provided as methods, systems, or computer program products. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of electricity stealing monitoring of power grid monitoring, and particularly relates to an electricity stealing prevention monitoring method and system based on electricity utilization big data. The system comprises a power utilization data acquisition module, an anti-electricity-stealing strategy management module, a comprehensive monitoring module, an anti-electricity-stealing abnormal early warning module, an event management module and a loss assessment rectification service module. According to the invention, the suspected electricity stealing user can be scientifically, effectively and accurately identified, the accuracy, comprehensiveness, timeliness and reliability of electricity stealing detection are improved, and the detection cost is reduced; and through double analysis of electric power business application data and electric energy information acquisition data, various data are summarized, a scientific and accurate data analysis model is established, a system monitors and screens a metering device and line loss of each level in real time on line, and positions suspected electricity stealing users, intelligent analysis and diagnosis are carried out, and abnormal problem data are alarmed, so that a more efficient and intelligent technical means is provided for preventing electricity stealing, reducing line loss and increasing power supply, and the electricity stealing behavior is effectively prevented and attacked.

Description

technical field [0001] The invention belongs to the technical field of electricity theft monitoring for power grid monitoring, and in particular relates to an anti-theft electricity monitoring method and system based on electricity consumption big data. Background technique [0002] Stealing electricity has a great impact on normal power supply order and safe electricity use. Stealing electricity loads fluctuate greatly, and some methods of stealing electricity are brutal and brutal, ranging from damaging low-voltage electrical facilities to causing local power supply interruptions due to chain reactions. Moreover, most of the electricity stealers are non-professional technicians, and it is very easy to cause electric shock and cause casualties when stealing electricity, threatening the personal safety of themselves and others. [0003] With the development of science and technology, high-tech stealing methods make it extremely difficult to identify, define, and obtain evid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G01R11/24
CPCG01R11/24
Inventor 林涛吕洪波孔祥靖郝成亮艾利姚志忠陈明李同丁雪刘超于旭东姜华窦增张凯郑磊王众王志宇曹源
Owner 国网吉林省电力有限公司信息通信公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products