Low-voltage user electricity stealing identification method based on side-end fusion

An identification method and electricity stealing technology, which is applied in the direction of measuring electrical variables, data processing applications, instruments, etc., can solve the problems of high difficulty in anti-electricity theft, and achieve the effects of strong adaptability, low cost, and good engineering practical value

Active Publication Date: 2022-01-11
ZHEJIANG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current anti-stealing technology still has relatively large limitations, and the means of stealing electricity are increasingly concealed, diversified, rapid and high-tech, and the difficulty of anti-stealing electricity is becoming more and more difficult.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Low-voltage user electricity stealing identification method based on side-end fusion
  • Low-voltage user electricity stealing identification method based on side-end fusion
  • Low-voltage user electricity stealing identification method based on side-end fusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The specific implementation of the present invention will be further described below in conjunction with the accompanying drawings and examples.

[0063] Such as figure 1 The implementation process provided for the embodiment of the present invention specifically includes the following steps:

[0064] Step 1: Based on the file information of the target station area, collect multiple electricity consumption data of the user's electricity meter, including the event record of opening the cover of the single-phase meter and the three-phase meter, the neutral current and the live wire current of the single-phase meter, and the voltage of the single-phase meter Load curve, voltage load curve and power load curve of three-phase meter;

[0065] Specifically, the end-side equipment (that is, the electric meter) is used to collect the zero line current, live line current and voltage load curve data of the single-phase meter, and the current deviation and voltage abnormality of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a low-voltage user electricity stealing identification method based on side-end fusion. The method comprises the following steps: acquiring multivariate power utilization data of a user through cooperation of side end equipment, and processing to obtain power stealing suspicion quantitative parameters for a single-phase user based on cover opening event records, zero line current, live line current and a voltage load curve; for the three-phase user, based on the cover opening event record, the voltage load curve and the active power load curve, processing to obtain an electricity larceny suspicion quantitative parameter; and establishing an electricity larceny suspicion weight model of the single-phase and three-phase meters, determining weight parameters in the electricity larceny suspicion weight model through an analytic hierarchy process, calculating electricity larceny suspicion parameters, and judging to obtain an electricity larceny identification result. According to the invention, the multi-element power consumption data characteristics of the user are fully utilized, the electricity stealing behavior of the user can be effectively identified, additional monitoring equipment is not needed, and high investment, operation and maintenance cost is avoided; and meanwhile, the influence of factors such as high data communication pressure and poor clock synchronism on the recognition accuracy can be effectively relieved by utilizing the cooperation of the edge end equipment on data acquisition.

Description

technical field [0001] The invention relates to a power consumption detection method of an electric power internet of things information system, in particular to a low-voltage user electricity stealing identification method based on edge-end data fusion. Background technique [0002] As the relationship between social and economic development and electricity becomes closer and closer, some criminals are driven by economic interests to use various means to steal electricity, and the phenomenon of electricity theft is repeatedly prohibited. The problem that has plagued power supply companies for a long time not only seriously damages the benefits of power supply companies and disrupts the normal order of power consumption, but also causes damage to power facilities and poses a major power safety problem. It has become a topic that cannot be ignored. Power supply companies have been increasing their efforts to combat electricity theft, and are also constantly improving the tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/00G06Q50/06G01R11/24
CPCG06Q30/0185G06Q50/06G01R11/24
Inventor 林国营丁一徐文倩胡怡霜
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products