A low-voltage user electricity stealing identification method based on edge-end fusion

A technology for stealing electricity and users, applied in the direction of measuring electric variables, data processing applications, instruments, etc., can solve the problems of difficult anti-stealing electricity, achieve strong adaptability of the method, reduce user data analysis work suspected of stealing electricity, and achieve good engineering The effect of practical value

Active Publication Date: 2022-07-15
ZHEJIANG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current anti-stealing technology still has relatively large limitations, and the means of stealing electricity are increasingly concealed, diversified, rapid and high-tech, and the difficulty of anti-stealing electricity is becoming more and more difficult.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A low-voltage user electricity stealing identification method based on edge-end fusion
  • A low-voltage user electricity stealing identification method based on edge-end fusion
  • A low-voltage user electricity stealing identification method based on edge-end fusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The specific implementation of the present invention will be further described below with reference to the accompanying drawings and examples.

[0063] like figure 1 The implementation process provided for the embodiment of the present invention specifically includes the following steps:

[0064] Step 1: Based on the file information of the target station area, collect the multivariate electricity consumption data of the user's electricity meter, including the cover-opening event record of the single-phase meter and the three-phase meter, the neutral current and live line current of the single-phase meter, and the voltage of the single-phase meter. Load curve, voltage load curve and power load curve of three-phase meter;

[0065] Specifically, the terminal-side equipment (ie the electricity meter) is used to collect the zero-line current, live-line current and voltage load curve data of the single-phase meter, and the abnormality of the zero-line current deviation and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a low-voltage user electricity stealing identification method based on edge-end fusion. Collect multiple power consumption data of users through the cooperation of side-end equipment. For single-phase users, process and obtain quantitative parameters of suspected electricity theft based on the opening event record, neutral line current, live line current and voltage load curve; for three-phase users, based on the opening cover Event records, voltage load curves and active power load curves are processed to obtain the quantitative parameters of suspected electricity theft; establish the weight model of suspected electricity theft for single and three-phase meters, determine the weight parameters in the weight model of suspected electricity theft through AHP, and calculate Electricity suspect parameters and judgment to obtain electricity theft identification results. The invention makes full use of the user's multiple power consumption data characteristics, can effectively identify the user's electricity stealing behavior, and does not need to install additional monitoring equipment, avoiding high investment, operation and maintenance costs; It can effectively alleviate the influence of factors such as high data communication pressure and poor clock synchronization on the recognition accuracy.

Description

technical field [0001] The invention relates to a power consumption detection method of a power Internet of Things information system, in particular to a low-voltage user power stealing identification method based on edge-end data fusion. Background technique [0002] With the increasingly close relationship between social and economic development and electricity, some lawbreakers are driven by economic interests to steal electricity by various means, and the phenomenon of electricity theft has been banned repeatedly. The problems that have plagued power supply companies for a long time have not only seriously damaged the benefits of power supply companies, disrupted the normal order of electricity consumption, but also caused damage to power facilities and caused major electricity safety problems. It has become a topic that cannot be ignored. Power supply companies have been increasing efforts to combat electricity theft, and at the same time, they are constantly improving ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q30/00G06Q50/06G01R11/24
CPCG06Q30/0185G06Q50/06G01R11/24
Inventor 林国营丁一徐文倩胡怡霜
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products