CN113963500A - Electricity stealing behavior monitoring method and device, electronic equipment and storage medium - Google Patents

Electricity stealing behavior monitoring method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113963500A
CN113963500A CN202111139390.7A CN202111139390A CN113963500A CN 113963500 A CN113963500 A CN 113963500A CN 202111139390 A CN202111139390 A CN 202111139390A CN 113963500 A CN113963500 A CN 113963500A
Authority
CN
China
Prior art keywords
time
electricity
image data
meter box
line loss
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111139390.7A
Other languages
Chinese (zh)
Inventor
鲁桂国
刘涛
张震雷
田昀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guodiantong Network Technology Co Ltd
Original Assignee
Beijing Guodiantong Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guodiantong Network Technology Co Ltd filed Critical Beijing Guodiantong Network Technology Co Ltd
Priority to CN202111139390.7A priority Critical patent/CN113963500A/en
Publication of CN113963500A publication Critical patent/CN113963500A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R11/00Electromechanical arrangements for measuring time integral of electric power or current, e.g. of consumption
    • G01R11/02Constructional details
    • G01R11/24Arrangements for avoiding or indicating fraudulent use
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/009Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)

Abstract

The present disclosure provides a method for monitoring electricity stealing behavior, comprising: acquiring the power supply quantity and the electricity selling quantity of an electricity meter box, and obtaining the line loss rate according to the power supply quantity and the electricity selling quantity; in response to detecting that the line loss rate reaches a set threshold at a first time, acquiring image data of the electric meter box in a first time period based on the first time, wherein the first time period comprises the first time; and identifying the intrusion event of the electric meter box based on the image data, and judging whether the electricity stealing behavior occurs. The method aims at various types of power users and complex power utilization environments, and realizes functions of real-time sensing when the box is opened, automatic reporting of early warning, high-definition portrait shooting, fixed evidence storage and the like through a power stealing behavior detection method. The method has the advantages of strong concealment, sufficient evidence, accuracy, time saving and the like.

Description

Electricity stealing behavior monitoring method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of power technologies, and in particular, to a method and an apparatus for monitoring electricity stealing behavior, an electronic device, and a storage medium.
Background
The ammeter case is the special case of power consumer's electric quantity measurement, including box, single-phase or three-phase electric energy meter, low-voltage switch, and inlet wire and be qualified for the next round of competitions etc.. The electric meter box is usually installed nearby at a user, and due to the lack of better precautionary measures, electricity is often stolen by lawless persons, huge economic loss is caused to the power department, and the safe operation and power supply reliability of a power grid are seriously affected.
Along with the increasing complexity of electricity utilization conditions, electricity stealing means are diversified, the characteristics of manipulation specialization, behavior hiding and main body scale are presented, and the difficulty of monitoring electricity stealing behaviors through a manual investigation mode is more and more large.
Disclosure of Invention
In view of the above, an object of the present disclosure is to provide a method and an apparatus for monitoring electricity stealing behavior, an electronic device, and a storage medium.
Based on the above purpose, the present disclosure provides a method for monitoring electricity stealing behavior, including:
acquiring the power supply quantity and the electricity selling quantity of an electricity meter box, and obtaining the line loss rate according to the power supply quantity and the electricity selling quantity;
in response to detecting that the line loss rate reaches a set threshold at a first time, acquiring image data of the electric meter box in a first time period based on the first time, wherein the first time period comprises the first time;
and identifying the intrusion event of the electric meter box based on the image data, and judging whether the electricity stealing behavior occurs.
Based on the same inventive concept, the present disclosure also provides an electricity stealing behavior monitoring device, comprising:
the acquisition module is used for acquiring the power supply quantity and the electricity selling quantity of the electricity meter box;
the calculation module is used for obtaining a line loss rate according to the power supply quantity and the electricity selling quantity;
the obtaining module is further configured to obtain image data of the ammeter box in a first time period based on a first time in response to detecting that the line loss rate reaches a set threshold at the first time, wherein the first time period comprises the first time;
and the behavior identification module is used for identifying the invasion event of the electric meter box based on the image data and judging whether the electricity stealing behavior occurs.
Based on the same inventive concept, the present disclosure also provides an electronic device, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the method according to any one of the above aspects when executing the program.
Based on the same inventive concept, the present disclosure also provides a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the method as described in any one of the above.
This is disclosed to the power consumer of polymorphic type and complicated power consumption environment, through stealing electric action detection method, realizes functions such as real-time perception of unpacking, automatic early warning that reports, high definition portrait make a video recording and fixed evidence of storage and has advantages such as disguised strong, the evidence is abundant, accurate saving time. The method provides help for effectively preventing and striking regional and industrial electricity stealing behaviors and stopping electricity stealing, and can achieve the aim of lean management of line loss of the low-voltage distribution network.
Drawings
In order to more clearly illustrate the technical solutions in the present disclosure or related technologies, the drawings needed to be used in the description of the embodiments or related technologies are briefly introduced below, and it is obvious that the drawings in the following description are only embodiments of the present disclosure, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of a method of monitoring electricity stealing behavior in an embodiment of the disclosure;
FIG. 2 is a schematic structural diagram of an electricity stealing behavior monitoring device according to an embodiment of the disclosure;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
For the purpose of promoting a better understanding of the objects, aspects and advantages of the present disclosure, reference is made to the following detailed description taken in conjunction with the accompanying drawings.
It is to be noted that technical terms or scientific terms used in the embodiments of the present disclosure should have a general meaning as understood by those having ordinary skill in the art to which the present disclosure belongs, unless otherwise defined. The use of "first," "second," and similar terms in the embodiments of the disclosure is not intended to indicate any order, quantity, or importance, but rather to distinguish one element from another. The word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", and the like are used merely to indicate relative positional relationships, and when the absolute position of the object being described is changed, the relative positional relationships may also be changed accordingly.
In the related art, the electric meter box is installed in a low-voltage space, a power supply is usually taken from a low-voltage 220V power grid, the self-protection function is poor, the electric meter box is easy to damage by people, and a sampled reference signal is easy to make hands and feet. The concealed intermittent electricity stealing behavior is difficult to obtain electricity stealing evidence through manual investigation.
In view of the above problems in the related art, the embodiments of the present disclosure provide a method for monitoring electricity stealing behavior.
Hereinafter, the technical means of the present disclosure will be described in further detail with reference to specific examples.
First, one or more embodiments of the present specification provide a method of monitoring electricity stealing behavior. Referring to fig. 1, the method includes the steps of:
step S101, acquiring the power supply quantity and the electricity selling quantity of the electricity meter box, and obtaining the line loss rate according to the power supply quantity and the electricity selling quantity.
In the embodiment of the disclosure, the current and voltage values are collected in real time by utilizing the buckle type mutual inductorAnd calculating the current and voltage values by the following formula to obtain the instantaneous power: p (t) u (t) i (t), where p (t) represents instantaneous power, u (t) represents voltage value, and i (t) represents current value; then, integral operation is carried out on the instantaneous power to obtain the average power:
Figure BDA0003283077970000031
wherein the content of the first and second substances,
Figure BDA0003283077970000032
represents the average power and T represents the total time. The average power is converted into a pulse signal with the frequency in direct proportion to the average power through a conversion circuit, and the pulse signal is sent to a counter for accumulated counting, so that the power supply quantity is obtained. The actual electricity consumption (electricity sales) of the single-phase or three-phase electric energy meter of the user in the meter box is read through the 485 communication line.
This openly can acquire real-time current value and magnitude of voltage through buckle formula mutual-inductor and 485 communication line, through current value and magnitude of voltage calculation power supply volume, then read actual power consumption, can obtain the difference of the two according to two numerical values, obtain the loss electric quantity. The buckle type mutual inductor is light and convenient, is easy to install, and can provide calculation and storage of data. When the communication distance is dozens of meters to thousands of meters, the RS-485 serial bus standard can be adopted. RS-485 adopts balanced transmission and differential receiving, has the ability of inhibiting common mode interference, and it is more accurate to obtain actual power consumption data through the 485 communication line.
On the basis, the line loss rate can be obtained according to the power supply quantity and the power selling quantity, and the line loss rate comprises the following steps:
Figure BDA0003283077970000033
wherein, P represents the line loss rate, I represents the power supply amount, and O represents the power sale amount.
In the embodiment of the present disclosure, the line loss rate may represent a change condition of the power loss.
Step S102, in response to the fact that the line loss rate reaches a set threshold value at a first time, acquiring image data of the electric meter box at a first time period based on the first time, wherein the first time period comprises the first time.
The first time period includes a first time, which may refer to a period of time after the first time is taken as a starting point, a period of time before the first time is taken as an ending point, an arbitrary period of time before the first time, and an arbitrary period of time after the first time.
In the embodiment of the disclosure, when the line loss rate reaches the set threshold, the image data monitored by the line loss can be traced back, the image data in a time range before and after the arrival time of the line loss rate is retrieved, and the image data in the time range is associated with the arrival time of the line loss rate at the threshold. For example, the threshold may be set to be 20% at first, when the line loss rate is 20% at 16:40, the 16:40 is the first time, two hours before and after 16:40 are retrieved, image data in a total range of four hours, that is, the image data and the line loss rate reach 20%, are all associated to the first time 16:40, and are used as line loss evidence, the line loss evidence may be retained locally or uploaded to a cloud for storage, the evidence may be retained in real time, and evidence support is provided for subsequent investigation.
In some embodiments, a method according to embodiments of the present disclosure further comprises: and detecting that the electric meter box is opened, and starting an image acquisition device to acquire the image data of the electric meter box.
Particularly, when the ammeter case unpack, the pass gate state sensor discernment table chamber door open mode opens the camera in order to launch the function of making a video recording in the twinkling of an eye, carries out automatic snapshot to the on-the-spot action. For example, a camera with a face recognition function can analyze and process a static scene, and through image recognition, image comparison, pattern matching and the like, extraction and analysis of human related feature information are achieved, and a face is accurately detected and recognized. In some embodiments, the camera can also perform self-diagnosis to accurately analyze, judge and process conditions such as common camera faults, video signal interference or common changes, and the like, such as screen blackness, blurring, loss of control of a pan-tilt, picture freezing and the like. In some embodiments, the camera can also adopt low-illumination and infrared night vision supplementary lighting to assist in capturing images in the night environment, so that the shooting definition and accuracy are improved.
In some embodiments, a method according to embodiments of the present disclosure further comprises:
carrying out target identification based on the image data to obtain a target identification result;
judging whether the target object is an authorized user or not;
and determining that the box opening is an intrusion event in response to the target object being an unauthorized user.
In the embodiment of the disclosure, the image is analyzed immediately after the image data is acquired, the portrait in the image data is extracted, whether the portrait in the image is a worker or not is judged, the portrait is compared with the registered face image, whether the portrait in the image data is the registered worker or not is determined, if the portrait is the registered worker, the image data is directly stored, if the portrait is not the registered worker, the unpacking event is marked as an intrusion event, the image data is marked as the intrusion event, evidence storage of electricity stealing behaviors can be guaranteed, and the searching accuracy and accuracy of the intrusion behaviors are improved.
In some embodiments, the image data is saved locally and/or uploaded to a server.
The image data is stored locally, can be exported in a wired mode, such as a power carrier module or a mobile phone data line, and can also be exported in a wireless mode, such as an intrusion event that a meter box door is illegally opened and snapshot image data are uploaded to a cloud server through a 4G network.
And step S103, identifying the intrusion event of the electric meter box based on the image data, and judging whether the electricity stealing behavior occurs.
In the embodiment of the disclosure, image data within a time range before and after the line loss rate time is acquired, the image data is identified, and whether a behavior of electricity stealing occurs is judged.
And on the basis, recognizing the invasion event of the electric meter box and determining the electricity stealing behavior.
Specifically, the image data can be searched, whether the intrusion event label exists or not can be judged, and the electricity stealing behavior can be determined.
On the basis, in response to the fact that the line loss rate reaches a set threshold value at the first time, an alarm signal and position information of the electric meter box are sent.
Particularly, when detecting that the line loss rate exceeds a set threshold, the electric meter box position with the line loss rate exceeding the threshold is sent to the staff, and the staff can carry out the repair work of electric meter box according to the electric meter box position of acquireing, has reduced the time that the investigation needs.
The embodiment of the disclosure aims at various types of power consumers and complex power utilization environments, and realizes functions of real-time sensing of unpacking, automatic reporting of early warning, high-definition portrait shooting, fixed evidence storage and the like by a power stealing behavior detection method, and has the advantages of strong concealment, sufficient evidence, accuracy, time saving and the like. The method provides help for effectively preventing and striking regional and industrial electricity stealing behaviors and stopping electricity stealing, and can achieve the aim of lean management of the line loss of the low-voltage distribution network.
Based on the same inventive concept, the invention also provides a device for monitoring the electricity stealing behavior, which corresponds to the method of any embodiment.
As shown in fig. 2, the electricity stealing behavior monitoring apparatus includes:
the obtaining module 201 is used for obtaining the power supply quantity and the electricity selling quantity of the electricity meter box;
the calculating module 202 is configured to obtain a line loss rate according to the power supply amount and the electricity selling amount;
the calculation module calculates the line loss rate according to a formula
Figure BDA0003283077970000051
And calculating, wherein P represents the line loss rate, I represents the power supply amount, and O represents the power selling amount.
The obtaining module is further configured to obtain image data of the ammeter box in a first time period based on a first time in response to detecting that the line loss rate reaches a set threshold at the first time, wherein the first time period comprises the first time;
and the behavior identification module 203 is used for identifying the intrusion event of the electric meter box based on the image data and judging whether an electricity stealing behavior occurs.
The behavior identification module 203 may be further configured to determine that a power stealing behavior occurs in response to identifying an intrusion event to the meter box.
The device further comprises an image acquisition module, wherein the image acquisition module is used for responding to the detection that the electric meter box is opened and starting an image acquisition device to acquire the image data of the electric meter box.
The image acquisition module can be further used for carrying out target identification based on the image data to obtain a target identification result; judging whether the target object is an authorized user or not; and determining that the box opening is an intrusion event in response to the target object being an unauthorized user.
The device also comprises a data storage module used for storing the image data to the local and/or uploading the image data to a server.
The device also comprises a line loss alarm module, which is used for responding to the fact that the line loss rate reaches a set threshold value detected at the first time, and sending an alarm signal and the position information of the electric meter box.
For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, the functionality of the various modules may be implemented in the same one or more software and/or hardware implementations of the present disclosure.
The apparatus of the foregoing embodiment is used to implement the corresponding method for scheduling autonomous domain systems in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Based on the same inventive concept, corresponding to the method of any embodiment described above, the present disclosure further provides an electronic device, including a memory, a processor, and a computer program stored in the memory and operable on the processor, where the processor executes the program to implement the scheduling method of the autonomous domain system according to any embodiment described above.
Fig. 3 is a schematic diagram illustrating a more specific hardware structure of an electronic device according to this embodiment, where the electronic device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein the processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 are communicatively coupled to each other within the device via bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random Access Memory), a static storage device, a dynamic storage device, or the like. The memory 1020 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1020 and called to be executed by the processor 1010.
The input/output interface 1030 is used for connecting an input/output module to input and output information. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1040 is used for connecting a communication module (not shown in the drawings) to implement communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1050 includes a path that transfers information between various components of the device, such as processor 1010, memory 1020, input/output interface 1030, and communication interface 1040.
It should be noted that although the above-mentioned device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040 and the bus 1050, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
The electronic device of the foregoing embodiment is used to implement the corresponding electricity stealing behavior monitoring method in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Based on the same inventive concept, corresponding to any of the above-described embodiment methods, the present disclosure also provides a non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the electricity stealing behavior monitoring method according to any of the above-described embodiments.
Computer-readable media of the present embodiments, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The storage medium of the above embodiment stores computer instructions for causing the computer to execute the electricity stealing behavior monitoring method according to any of the above embodiments, and has the beneficial effects of the corresponding method embodiments, which are not described herein again.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to these examples; within the idea of the present disclosure, also technical features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the embodiments of the present disclosure as described above, which are not provided in detail for the sake of brevity.
In addition, well-known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown in the provided figures for simplicity of illustration and discussion, and so as not to obscure the embodiments of the disclosure. Furthermore, devices may be shown in block diagram form in order to avoid obscuring embodiments of the present disclosure, and this also takes into account the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform within which the embodiments of the present disclosure are to be implemented (i.e., specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the disclosure, it should be apparent to one skilled in the art that the embodiments of the disclosure can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative instead of restrictive.
While the present disclosure has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of these embodiments will be apparent to those of ordinary skill in the art in light of the foregoing description. For example, other memory architectures (e.g., dynamic ram (dram)) may use the discussed embodiments.
The disclosed embodiments are intended to embrace all such alternatives, modifications and variances which fall within the broad scope of the appended claims. Therefore, any omissions, modifications, equivalents, improvements, and the like that may be made within the spirit and principles of the embodiments of the disclosure are intended to be included within the scope of the disclosure.

Claims (10)

1. A method of monitoring electricity theft behavior, comprising:
acquiring the power supply quantity and the electricity selling quantity of an electricity meter box, and obtaining the line loss rate according to the power supply quantity and the electricity selling quantity;
in response to detecting that the line loss rate reaches a set threshold at a first time, acquiring image data of the electric meter box in a first time period based on the first time, wherein the first time period comprises the first time;
and identifying the intrusion event of the electric meter box based on the image data, and judging whether the electricity stealing behavior occurs.
2. The method of claim 1, wherein identifying an intrusion event for the meter box based on the image data to determine whether electricity stealing behavior occurs comprises:
and determining that electricity stealing behavior occurs in response to recognizing the intrusion event of the electric meter box.
3. The method of claim 1, further comprising:
and responding to the detection that the electric meter box is opened, and starting an image acquisition device to acquire the image data of the electric meter box.
4. The method of claim 3, further comprising:
carrying out target identification based on the image data to obtain a target identification result;
judging whether the target object is an authorized user or not;
and determining that the box opening is an intrusion event in response to the target object being an unauthorized user.
5. The method of claim 1, further comprising:
and saving the image data to a local and/or uploading the image data to a server.
6. The method of claim 1, further comprising:
and sending an alarm signal and position information of the electric meter box in response to the fact that the line loss rate reaches a set threshold value at the first time.
7. The method of claim 1, wherein said deriving a line loss rate from said supply and sales power amounts comprises:
Figure FDA0003283077960000011
wherein, P represents the line loss rate, I represents the power supply amount, and O represents the power sale amount.
8. An electricity stealing behavior monitoring device comprising:
the acquisition module is used for acquiring the power supply quantity and the electricity selling quantity of the electricity meter box;
the calculation module is used for obtaining a line loss rate according to the power supply quantity and the electricity selling quantity;
the obtaining module is further configured to obtain image data of the ammeter box in a first time period based on a first time in response to detecting that the line loss rate reaches a set threshold at the first time, wherein the first time period comprises the first time;
and the behavior identification module is used for identifying the invasion event of the electric meter box based on the image data and judging whether the electricity stealing behavior occurs.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of claims 1 to 7 when executing the program.
10. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the method of any one of claims 1 to 7.
CN202111139390.7A 2021-09-27 2021-09-27 Electricity stealing behavior monitoring method and device, electronic equipment and storage medium Pending CN113963500A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111139390.7A CN113963500A (en) 2021-09-27 2021-09-27 Electricity stealing behavior monitoring method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111139390.7A CN113963500A (en) 2021-09-27 2021-09-27 Electricity stealing behavior monitoring method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113963500A true CN113963500A (en) 2022-01-21

Family

ID=79462428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111139390.7A Pending CN113963500A (en) 2021-09-27 2021-09-27 Electricity stealing behavior monitoring method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113963500A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070247789A1 (en) * 2006-03-31 2007-10-25 Eric Benson Data analysis system, such as a theft scenario analysis system for automated utility metering
CN201927147U (en) * 2010-12-30 2011-08-10 河南瑞特电气有限公司 Network electricity stealing preventing system
CN106841727A (en) * 2017-01-16 2017-06-13 国网山东省电力公司龙口市供电公司 Electricity anti-theft system and electricity anti-theft method
CN110728814A (en) * 2019-10-23 2020-01-24 国网山西省电力公司晋中供电公司 Anti-electricity-stealing video evidence-obtaining and real-time warning device
CN211179963U (en) * 2019-12-10 2020-08-04 国网四川省电力公司德阳供电公司 Electric energy meter box with electricity stealing alarm function
CN112003372A (en) * 2020-08-19 2020-11-27 贵州电网有限责任公司 Remote intelligent monitoring method for preventing electricity theft
CN112098700A (en) * 2020-09-02 2020-12-18 新乡华源电力集团有限公司 Outdoor electricity stealing prevention method and outdoor electricity stealing prevention electric energy metering box device
CN112578172A (en) * 2020-12-18 2021-03-30 北京国电通网络技术有限公司 A visual monitoring device of multidimension for batch meter
CN113406374A (en) * 2021-06-02 2021-09-17 南京能瑞自动化设备股份有限公司 Power distribution network electricity larceny prevention monitoring system and monitoring method thereof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070247789A1 (en) * 2006-03-31 2007-10-25 Eric Benson Data analysis system, such as a theft scenario analysis system for automated utility metering
CN201927147U (en) * 2010-12-30 2011-08-10 河南瑞特电气有限公司 Network electricity stealing preventing system
CN106841727A (en) * 2017-01-16 2017-06-13 国网山东省电力公司龙口市供电公司 Electricity anti-theft system and electricity anti-theft method
CN110728814A (en) * 2019-10-23 2020-01-24 国网山西省电力公司晋中供电公司 Anti-electricity-stealing video evidence-obtaining and real-time warning device
CN211179963U (en) * 2019-12-10 2020-08-04 国网四川省电力公司德阳供电公司 Electric energy meter box with electricity stealing alarm function
CN112003372A (en) * 2020-08-19 2020-11-27 贵州电网有限责任公司 Remote intelligent monitoring method for preventing electricity theft
CN112098700A (en) * 2020-09-02 2020-12-18 新乡华源电力集团有限公司 Outdoor electricity stealing prevention method and outdoor electricity stealing prevention electric energy metering box device
CN112578172A (en) * 2020-12-18 2021-03-30 北京国电通网络技术有限公司 A visual monitoring device of multidimension for batch meter
CN113406374A (en) * 2021-06-02 2021-09-17 南京能瑞自动化设备股份有限公司 Power distribution network electricity larceny prevention monitoring system and monitoring method thereof

Similar Documents

Publication Publication Date Title
CN108629791B (en) Pedestrian tracking method and device and cross-camera pedestrian tracking method and device
US10049283B2 (en) Stay condition analyzing apparatus, stay condition analyzing system, and stay condition analyzing method
WO2014050518A1 (en) Information processing device, information processing method, and information processing program
CN103270536A (en) Stopped object detection
CN105187786A (en) Voice prompting method of intelligent cat eye, and intelligent cat eye
CN112348054A (en) Data processing method, device, medium and system for multi-type sensor
KR102034559B1 (en) Appartus and method for monitoring security using variation of correlation coefficient pattern in sound field spectra
CN110929584A (en) Network training method, monitoring method, system, storage medium and computer equipment
CN102902960A (en) Leave-behind object detection method based on Gaussian modelling and target contour
CN109614291A (en) Alarm method and device
CN111814510B (en) Method and device for detecting legacy host
Anderson Non-intrusive load monitoring: Disaggregation of energy by unsupervised power consumption clustering
CN109711346A (en) A kind of birds abnormality recognition method and device
Tabi Fouda et al. Research and software design of an Φ-OTDR-based optical fiber vibration recognition algorithm
CN112307143A (en) Space-time trajectory construction method, system, device and medium
CN115965913A (en) Security monitoring method, device and system and computer readable storage medium
CN108564751A (en) The monitoring method of cable tunnel anti-intrusion, apparatus and system
CN112885011B (en) Intrusion detection method of optical fiber perimeter security system and related equipment
CN114882251A (en) Internet of things big data intelligent video security monitoring method and device
CN105117767B (en) Display screen attention rate statistical method and system
CN113963500A (en) Electricity stealing behavior monitoring method and device, electronic equipment and storage medium
CN113032047A (en) Face recognition system application method, electronic device and storage medium
CN106291016A (en) A kind of intelligent electric meter preventing power stealing
CN113138423B (en) Metal detection method and device
CN111103490B (en) Load identification event detection method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220121