CN107328974A - A kind of stealing recognition methods and device - Google Patents
A kind of stealing recognition methods and device Download PDFInfo
- Publication number
- CN107328974A CN107328974A CN201710657087.3A CN201710657087A CN107328974A CN 107328974 A CN107328974 A CN 107328974A CN 201710657087 A CN201710657087 A CN 201710657087A CN 107328974 A CN107328974 A CN 107328974A
- Authority
- CN
- China
- Prior art keywords
- user
- stealing
- identified
- default
- abnormal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R11/00—Electromechanical arrangements for measuring time integral of electric power or current, e.g. of consumption
- G01R11/02—Constructional details
- G01R11/24—Arrangements for avoiding or indicating fraudulent use
Abstract
A kind of stealing recognition methods and device are present embodiments provided, this method includes:Obtain the electricity consumption data of user to be identified;Default abnormal power consumption index is calculated according to the electricity consumption data of the user to be identified;If the user to be identified is abnormal user, the abnormal power consumption index according to the user to be identified generates the electricity consumption characteristic vector of user to be identified;The value of the similarity of the electricity consumption characteristic vector of the user to be identified and the stealing fingerprint vector of default every kind of stealing gimmick is calculated respectively;If the value for calculating any one obtained similarity exceedes default threshold value, then it represents that the user to be identified is stealing suspicion user.In the present embodiment, by the value for the similarity for calculating user power utilization characteristic vector to be identified and stealing fingerprint vector, whether the automatic identification user to be identified belong to stealing suspicion user, it is to avoid the subjectivity that expert recognizes to stealing is assumed, and improves the degree of accuracy of stealing identification.
Description
Technical field
The present invention relates to power domain, more particularly to a kind of stealing recognition methods and device.
Background technology
With the fast development of China's economy, the need for electricity rapid growth of user.However, electricity stealing, especially specially
Increasingly serious with the electricity stealing of transformer, stealing gimmick becomes increasingly abundant to increase severely year by year with hidden, stealing loss.
In the prior art, for the identification of dedicated transformer electricity stealing, generally analyzed according to expertise, it is this
Analysis mode subjectivity is strong and accuracy of identification is relatively low.
The content of the invention
In view of this, the embodiments of the invention provide a kind of stealing recognition methods and device, by the method for the present embodiment,
The method automatic identification stealing gimmick that can not only be matched by vector similarity, and improve the degree of accuracy of stealing identification.
A kind of stealing recognition methods provided in an embodiment of the present invention, including:
Obtain the electricity consumption data of user to be identified;
Default abnormal power consumption index is calculated according to the electricity consumption data of the user to be identified;
Judge whether the user to be identified belongs to abnormal user, if abnormal user, according to the abnormal power consumption index
Generate the electricity consumption characteristic vector of the user to be identified;
Calculate respectively the electricity consumption characteristic vector of the user to be identified and the stealing fingerprint of default every kind of stealing gimmick to
The value of the similarity of amount;
If the value for calculating any one obtained similarity exceedes default threshold value, then it represents that the user to be identified is surreptitiously
Electric suspicion user.
Optionally, the abnormal power consumption index includes:
The mode of connection, metering method, line loss increase-volume, daily power consumption bust, A phases are under-voltage percentage, B phases are under-voltage percentage, C
Mutually under-voltage percentage, current imbalance rate, power surpass appearance, power factor bust, A phase currents bust, B phase currents bust, C phases electricity
Flow bust.
Optionally, it is described to judge whether the user to be identified belongs to abnormal user, including:
Judge each abnormal power consumption index of the user to be identified whether in corresponding default normal range (NR) respectively
It is interior;
If any one abnormal power consumption index of user to be identified is not in default normal range (NR), the use to be identified
Family is abnormal user.
Optionally, the electricity consumption characteristic vector that the user to be identified is calculated respectively and default every kind of stealing gimmick
The value of the similarity of stealing fingerprint vector, including:
Obtain the corresponding stealing fingerprint vector of every kind of stealing gimmick successively from default stealing fingerprint base;
Calculate successively user to be identified electricity consumption characteristic vector and the corresponding stealing fingerprint vector of every kind of stealing gimmick it is remaining
String value.
Optionally, the generation method of the stealing fingerprint vector of the stealing gimmick, including:
Obtain the electricity consumption data of the stealing gimmick;
Default abnormal power consumption index is calculated according to the electricity consumption data of the stealing gimmick;
The abnormal power consumption index is arranged to the characteristic vector for generating stealing gimmick according to default order.
A kind of stealing identifying device, including:
First acquisition unit, the electricity consumption data for obtaining user to be identified;
First abnormal power consumption index computing unit, for calculating default different according to the electricity consumption data of the user to be identified
Normal power consumption index;
First generation unit, for judging whether the user to be identified belongs to abnormal user, if abnormal user, foundation
The abnormal power consumption index generates the electricity consumption characteristic vector of the user to be identified;
Similarity calculated, for calculate respectively the user to be identified electricity consumption characteristic vector and it is default it is every kind of steal
The value of the similarity of the stealing fingerprint vector of electric hand method;
Indexing unit, if exceeding default threshold value for the value for calculating any one obtained similarity, then it represents that described
User to be identified is stealing suspicion user.
Optionally, the abnormal power consumption index includes:
The mode of connection, metering method, line loss increase-volume, daily power consumption bust, A phases are under-voltage percentage, B phases are under-voltage percentage, C
Mutually under-voltage percentage, current imbalance rate, power surpass appearance, power factor bust, A phase currents bust, B phase currents bust, C phases electricity
Flow bust.
Optionally, the generation unit, including:
First judgment sub-unit, for judging each abnormal power consumption index of the user to be identified whether in phase respectively
In the default normal range (NR) answered;
Subelement is marked, if any one abnormal power consumption index for user to be identified is not in default normal range (NR)
Interior, then the user to be identified is abnormal user.
Optionally, the similarity calculated, including:
Subelement is obtained, for obtaining the corresponding stealing fingerprint of every kind of stealing gimmick successively from default stealing fingerprint base
Vector;
Similarity value computation subunit, electricity consumption characteristic vector and every kind of stealing gimmick for calculating user to be identified successively
The cosine value of corresponding stealing fingerprint vector.
Optionally, in addition to:
Second acquisition unit, the electricity consumption data for obtaining the stealing gimmick;
Second abnormal power consumption index computing unit, for calculating default exception according to the electricity consumption data of the stealing gimmick
Power consumption index;
Second generation unit, the spy of stealing gimmick is generated for the abnormal power consumption index to be arranged according to default order
Levy vector.
A kind of stealing recognition methods is present embodiments provided, including:Obtain the electricity consumption data of user to be identified;According to described
The electricity consumption data of user to be identified calculates default abnormal power consumption index;If the user to be identified is abnormal user, foundation should
The abnormal power consumption index of user to be identified generates the electricity consumption characteristic vector of user to be identified;The use of the user to be identified is calculated respectively
The value of the similarity of the stealing fingerprint vector of the default every kind of stealing gimmick of electrical feature vector sum;If calculating any one obtained
The value of similarity exceedes default threshold value, then it represents that the user to be identified is stealing suspicion user.In the present embodiment, pass through meter
The value of the similarity of user power utilization characteristic vector to be identified and stealing fingerprint vector is calculated, whether the automatic identification user to be identified belongs to
In stealing suspicion user, and the subjectivity assumption that expert recognizes to stealing is avoided, improve the degree of accuracy of stealing identification.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 shows a kind of schematic flow sheet of stealing recognition methods provided in an embodiment of the present invention;
Fig. 2 shows a kind of structural representation of stealing identifying device provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
With reference to Fig. 1, a kind of schematic flow sheet of stealing recognition methods provided in an embodiment of the present invention is shown, in this implementation
In example, this method is used for dedicated transformer, and this method includes:
S101:Obtain the electricity consumption data of user to be identified.
In the present embodiment, the electricity consumption data of user to be identified includes:The data of dedicated transformer user, dedicated transformer are set
Standby information, line loss information, information of voltage, current information, information about power etc..In addition, the electricity consumption data of user to be identified
History can also be included to record in violation of rules and regulations.
, it is necessary to which explanation, the stealing due to this method for dedicated transformer is recognized in the present embodiment, therefore, this reality
It is the user using dedicated transformer to apply the user to be identified mentioned in example, referred to as specially becomes user.
S102:Default abnormal power consumption index is calculated according to the electricity consumption data of the user to be identified got.
In the present embodiment, default abnormal power consumption index includes:Power surpass appearance, daily power consumption bust, circuit line loss uprush,
Current imbalance rate, unbalanced power rate, A phases are under-voltage percentage, B phases are under-voltage percentage, C under-voltage percentages, electric current A busts
Rate, electric current B busts rate, electric current C busts rate, power factor bust, there is power bust day.
Wherein, each abnormal power consumption index has corresponding computational methods, as shown in table 1 below:
S103:Judge whether the user to be identified belongs to abnormal user, if abnormal user, the exception obtained according to calculating
Power consumption index generates electricity consumption characteristic vector.
These obtained abnormal power consumption indexs are calculated in the present embodiment, in S102, all in the presence of a normal value range, are led to
Cross and judge these abnormal power consumption indexs whether in normal scope, it is determined whether occur in that abnormal situation, specifically, bag
Include:
Judge each abnormal user index of user to be identified whether in corresponding normal range (NR) respectively;
If any one abnormal user index of user to be identified is not in default normal range (NR), the user to be identified
For abnormal user.
If it should be noted that all abnormal power consumption indexs represent that this is to be identified in default normal range (NR)
User is not abnormal user, then without carrying out follow-up operation;If any one user's index to be identified is not in the index
In normal range (NR), then it represents that the user to be identified is abnormal user.
In the present embodiment, the electricity consumption characteristic vector of generation be by abnormal power consumption index according to default tactic, and
And each abnormal power consumption index exists in vector form.
Illustrate:Characteristic vector A=(a of electricity consumption1,a2,a3,a4,…,a10,a11,a12,a13), wherein, each component
Implication be respectively:
Wherein, in characteristic vector A each component order, i.e. a1,a2,a3,a4,…,a10,a11,a12,a13To be default different
Chang Zhibiao's puts in order.
S104:The electricity consumption characteristic vector of user to be identified and the stealing fingerprint with default every kind of stealing gimmick are calculated respectively
The similitude of vector.
S105:If the value for calculating any one obtained similarity exceedes default threshold value, then it represents that the user to be identified
For stealing suspicion user.
In the present embodiment, stealing gimmick is stored in stealing fingerprint base, every kind of stealing gimmick one stealing fingerprint of correspondence to
Amount.Wherein stealing gimmick includes:Privately increase-volume, secondary side A phases are shunted, secondary side C phases are shunted, secondary side symmetrical flow division, secondary
The shunting of side A, B, C balance, CT primary side A phases are shunted, CT primary side C phases are shunted, CT primary sides symmetrical flow division, around more metering, four
Line height meter B phase decompressions are under-voltage, four lines height meter A phase decompressions are under-voltage, four lines height meter C phase decompressions are under-voltage, the low meter B decompressions of four lines, four lines
Low meter A decompressions, the low meter C decompressions of four lines, three lines height meter A decompressions, three lines height meter C decompressions, the low meter A decompressions of three lines, the low meter C of three lines lose
Pressure etc..
It should be noted that default stealing fingerprint vector includes stealing gimmicks all in stealing fingerprint base.Therefore, need
Calculate the similar of the stealing fingerprint vector of every kind of stealing gimmick in the electricity consumption characteristic vector and stealing fingerprint base of user to be identified
Property.
Wherein, S104 can be realized by following formula:
Wherein, X=(x1,x2,x3...xn) represent stealing fingerprint vector;Y=(y1,y2,y3...yn) represent user to be identified
Characteristic vector.
It is stealing suspicion user by the user's mark to be identified as cos (θ) > a, wherein a is constant, is represented default
Threshold value.
For example, as cos (θ) > 0.9, can now be designated as similarity can be by the user's mark to be identified more than 90 points
For stealing suspicion user, and the corresponding stealing gimmick of the stealing fingerprint vector is the stealing gimmick that stealing suspicion user uses.
In the present embodiment, the generating process of the stealing fingerprint vector of specific stealing gimmick includes:
Obtain the electricity consumption data of stealing gimmick;
Default abnormal power consumption index is calculated according to the electricity consumption data of stealing gimmick;
Abnormal power consumption index is arranged to the characteristic vector for generating stealing gimmick according to default order.
Wherein, the order of abnormal power consumption index can be:The mode of connection, metering method, line loss are uprushed, daily power consumption is dashed forward
Drop, A the is under-voltage under-voltage % of %, B under-voltage %, C, current imbalance rate, power surpass appearance, power factor bust, electric current A busts, electric current B
Bust, electric current C busts.
For example, characteristic vector B=(b of the stealing gimmick for increase-volume privately1,b2,b3,b4,…,b10,b11,b12,b13), its
In, the implication of each component is respectively:
Illustrate:The preservation form of stealing fingerprint base can be the form of table 2 below:
Table 2
It should be noted that stealing fingerprint base is to constantly update, after new stealing gimmick is found, the stealing can be generated
The stealing fingerprint vector of gimmick, and the stealing fingerprint vector of the gimmick is saved in stealing fingerprint base.
In the present embodiment, first-line staff can use according to the list of the stealing suspicion user detected, and stealing suspicion
The relevant information at family, scene evidence taking is carried out to stealing suspicion user.Wherein, the relevant information of stealing suspicion user includes:Stealing
User number, user name, unit, address, stealing gimmick, suspicion degree etc..
In the present embodiment, the abnormal power consumption index of user to be identified is calculated, and calculates the abnormal electricity consumption of user to be identified and is referred to
Mark calculates the similar value with the stealing fingerprint vector of every kind of stealing gimmick in default stealing fingerprint base, if any one obtained
Similar value has exceeded default threshold value, then it represents that the user to be identified is stealing suspicion user.With it, can not only
The method automatic identification stealing gimmick matched by vector similarity, and improve the degree of accuracy of stealing identification.
With reference to Fig. 2, a kind of structural representation of stealing identifying device provided in an embodiment of the present invention is shown, in this implementation
In example, described device includes:
201:First acquisition unit, the electricity consumption data for obtaining user to be identified;
202:First abnormal power consumption index computing unit, for calculating default according to the electricity consumption data of the user to be identified
Abnormal power consumption index;
203:First generation unit, for judging whether the user to be identified belongs to abnormal user, if abnormal user,
The electricity consumption characteristic vector of the user to be identified is generated according to the abnormal power consumption index;
204:Similarity calculated, for calculating the electricity consumption characteristic vector of the user to be identified respectively and default every
Plant the value of the similarity of the stealing fingerprint vector of stealing gimmick;
205:Indexing unit, if exceeding default threshold value for the value for calculating any one obtained similarity, then it represents that
The user to be identified is stealing suspicion user.
Optionally, the abnormal power consumption index includes:
The mode of connection, metering method, line loss increase-volume, daily power consumption bust, A phases are under-voltage percentage, B phases are under-voltage percentage, C
Mutually under-voltage percentage, current imbalance rate, power surpass appearance, power factor bust, A phase currents bust, B phase currents bust, C phases electricity
Flow bust.
Optionally, the generation unit, including:
First judgment sub-unit, for judging each abnormal power consumption index of the user to be identified whether in phase respectively
In the default normal range (NR) answered;
Subelement is marked, if any one abnormal power consumption index for user to be identified is not in default normal range (NR)
Interior, then the user to be identified is abnormal user.
Optionally, the similarity calculated, including:
Subelement is obtained, for obtaining the corresponding stealing fingerprint of every kind of stealing gimmick successively from default stealing fingerprint base
Vector;
Similarity value computation subunit, electricity consumption characteristic vector and every kind of stealing gimmick for calculating user to be identified successively
The cosine value of corresponding stealing fingerprint vector.
Optionally, in addition to:
Second acquisition unit, the electricity consumption data for obtaining the stealing gimmick;
Second abnormal power consumption index computing unit, for calculating default exception according to the electricity consumption data of the stealing gimmick
Power consumption index;
Second generation unit, the spy of stealing gimmick is generated for the abnormal power consumption index to be arranged according to default order
Levy vector.
By the device of the present embodiment, the similarity of user power utilization characteristic vector to be identified and stealing fingerprint vector is calculated
Value, realizes the automatic identification user to be identified and whether belongs to the mode of stealing suspicion user, and avoid expert to stealing
The subjectivity of identification is assumed, and improves the degree of accuracy of stealing identification.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation be all between difference with other embodiment, each embodiment identical similar part mutually referring to.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or using the present invention.
A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The most wide scope caused.
Claims (10)
1. a kind of stealing recognition methods, it is characterised in that including:
Obtain the electricity consumption data of user to be identified;
Default abnormal power consumption index is calculated according to the electricity consumption data of the user to be identified;
Judge whether the user to be identified belongs to abnormal user, if abnormal user, generated according to the abnormal power consumption index
The electricity consumption characteristic vector of the user to be identified;
The electricity consumption characteristic vector of the user to be identified and the stealing fingerprint vector of default every kind of stealing gimmick are calculated respectively
The value of similarity;
If the value for calculating any one obtained similarity exceedes default threshold value, then it represents that the user to be identified dislikes for stealing
Doubt user.
2. according to the method described in claim 1, it is characterised in that the abnormal power consumption index includes:
The mode of connection, metering method, line loss increase-volume, daily power consumption bust, A phases are under-voltage percentage, B phases are under-voltage percentage, C phases are owed
Press percentage, current imbalance rate, power to surpass appearance, power factor bust, A phase currents bust, B phase currents bust, C phase currents to dash forward
Drop.
3. according to the method described in claim 1, it is characterised in that described to judge whether the user to be identified belongs to abnormal use
Family, including:
Judge each abnormal power consumption index of the user to be identified whether in corresponding default normal range (NR) respectively;
If any one abnormal power consumption index of user to be identified is not in default normal range (NR), the user to be identified is
Abnormal user.
4. according to the method described in claim 1, it is characterised in that it is described calculate the user to be identified respectively use electrical feature
The value of the similarity of the stealing fingerprint vector of the default every kind of stealing gimmick of vector sum, including:
Obtain the corresponding stealing fingerprint vector of every kind of stealing gimmick successively from default stealing fingerprint base;
The electricity consumption characteristic vector of user to be identified and the cosine value of the corresponding stealing fingerprint vector of every kind of stealing gimmick are calculated successively.
5. method according to claim 4, it is characterised in that the generation side of the stealing fingerprint vector of the stealing gimmick
Method, including:
Obtain the electricity consumption data of the stealing gimmick;
Default abnormal power consumption index is calculated according to the electricity consumption data of the stealing gimmick;
The abnormal power consumption index is arranged to the characteristic vector for generating stealing gimmick according to default order.
6. a kind of stealing identifying device, it is characterised in that including:
First acquisition unit, the electricity consumption data for obtaining user to be identified;
First abnormal power consumption index computing unit, for calculating default abnormal use according to the electricity consumption data of the user to be identified
Electric index;
First generation unit, for judging whether the user to be identified belongs to abnormal user, if abnormal user, according to described
Abnormal power consumption index generates the electricity consumption characteristic vector of the user to be identified;
Similarity calculated, electricity consumption characteristic vector and default every kind of stealing hand for calculating the user to be identified respectively
The value of the similarity of the stealing fingerprint vector of method;
Indexing unit, if exceeding default threshold value for the value for calculating any one obtained similarity, then it represents that described to wait to know
Other user is stealing suspicion user.
7. device according to claim 6, it is characterised in that the abnormal power consumption index includes:
The mode of connection, metering method, line loss increase-volume, daily power consumption bust, A phases are under-voltage percentage, B phases are under-voltage percentage, C phases are owed
Press percentage, current imbalance rate, power to surpass appearance, power factor bust, A phase currents bust, B phase currents bust, C phase currents to dash forward
Drop.
8. device according to claim 6, it is characterised in that the generation unit, including:
First judgment sub-unit, for judging each abnormal power consumption index of the user to be identified whether corresponding respectively
In default normal range (NR);
Subelement is marked, if any one abnormal power consumption index for user to be identified is not in default normal range (NR),
The user to be identified is abnormal user.
9. device according to claim 6, it is characterised in that the similarity calculated, including:
Obtain subelement, for obtained successively from default stealing fingerprint base the corresponding stealing fingerprint of every kind of stealing gimmick to
Amount;
Similarity value computation subunit, the electricity consumption characteristic vector for calculating user to be identified successively is corresponding with every kind of stealing gimmick
Stealing fingerprint vector cosine value.
10. device according to claim 9, it is characterised in that also include:
Second acquisition unit, the electricity consumption data for obtaining the stealing gimmick;
Second abnormal power consumption index computing unit, for calculating default abnormal electricity consumption according to the electricity consumption data of the stealing gimmick
Index;
Second generation unit, for by the abnormal power consumption index according to default order arrange generate stealing gimmick feature to
Amount.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710657087.3A CN107328974B (en) | 2017-08-03 | 2017-08-03 | Electricity stealing identification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710657087.3A CN107328974B (en) | 2017-08-03 | 2017-08-03 | Electricity stealing identification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107328974A true CN107328974A (en) | 2017-11-07 |
CN107328974B CN107328974B (en) | 2020-06-02 |
Family
ID=60226323
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710657087.3A Active CN107328974B (en) | 2017-08-03 | 2017-08-03 | Electricity stealing identification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107328974B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108490288A (en) * | 2018-03-09 | 2018-09-04 | 华南师范大学 | A kind of stealing detection method and system |
CN109213787A (en) * | 2018-11-07 | 2019-01-15 | 闫福录 | A kind of anti-electricity-theft algorithm chip and electricity anti-theft method in integration characteristic library |
CN109270372A (en) * | 2018-09-14 | 2019-01-25 | 美林数据技术股份有限公司 | A kind of stealing identifying system and method based on line loss and user power consumption variation relation |
CN110264015A (en) * | 2019-06-28 | 2019-09-20 | 国网河南省电力公司电力科学研究院 | It opposes electricity-stealing and checks monitoring method and platform |
CN110988422A (en) * | 2019-12-19 | 2020-04-10 | 北京中电普华信息技术有限公司 | Electricity stealing identification method and device and electronic equipment |
CN111443237A (en) * | 2020-04-20 | 2020-07-24 | 北京中电普华信息技术有限公司 | Method and system for determining compensation electric quantity |
CN112649641A (en) * | 2020-12-14 | 2021-04-13 | 北京科东电力控制系统有限责任公司 | Electricity stealing user judgment method based on electricity stealing characteristics |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103792420A (en) * | 2014-01-26 | 2014-05-14 | 威胜集团有限公司 | Electricity larceny preventing and electricity utilization monitoring method based on load curves |
CN104700484A (en) * | 2015-03-20 | 2015-06-10 | 泉州智勇达电气有限责任公司 | Intelligent padlock management system |
CN105808900A (en) * | 2014-12-29 | 2016-07-27 | 西门子公司 | Method and device for determining electricity stealing suspicion of user to be evaluated |
CN106022951A (en) * | 2016-05-09 | 2016-10-12 | 北京智芯微电子科技有限公司 | Electricity consumption abnormity analysis method and apparatus |
-
2017
- 2017-08-03 CN CN201710657087.3A patent/CN107328974B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103792420A (en) * | 2014-01-26 | 2014-05-14 | 威胜集团有限公司 | Electricity larceny preventing and electricity utilization monitoring method based on load curves |
CN105808900A (en) * | 2014-12-29 | 2016-07-27 | 西门子公司 | Method and device for determining electricity stealing suspicion of user to be evaluated |
CN104700484A (en) * | 2015-03-20 | 2015-06-10 | 泉州智勇达电气有限责任公司 | Intelligent padlock management system |
CN106022951A (en) * | 2016-05-09 | 2016-10-12 | 北京智芯微电子科技有限公司 | Electricity consumption abnormity analysis method and apparatus |
Non-Patent Citations (1)
Title |
---|
陈文瑛,等: "基于指纹库的智能反窃电平台的研究与应用", 《电子世界》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108490288A (en) * | 2018-03-09 | 2018-09-04 | 华南师范大学 | A kind of stealing detection method and system |
CN108490288B (en) * | 2018-03-09 | 2019-04-16 | 华南师范大学 | A kind of stealing detection method and system |
CN109270372A (en) * | 2018-09-14 | 2019-01-25 | 美林数据技术股份有限公司 | A kind of stealing identifying system and method based on line loss and user power consumption variation relation |
CN109213787A (en) * | 2018-11-07 | 2019-01-15 | 闫福录 | A kind of anti-electricity-theft algorithm chip and electricity anti-theft method in integration characteristic library |
CN109213787B (en) * | 2018-11-07 | 2022-03-08 | 闫福录 | Electricity larceny prevention algorithm chip integrated with feature library and electricity larceny prevention method |
CN110264015A (en) * | 2019-06-28 | 2019-09-20 | 国网河南省电力公司电力科学研究院 | It opposes electricity-stealing and checks monitoring method and platform |
CN110988422A (en) * | 2019-12-19 | 2020-04-10 | 北京中电普华信息技术有限公司 | Electricity stealing identification method and device and electronic equipment |
CN110988422B (en) * | 2019-12-19 | 2022-04-26 | 北京中电普华信息技术有限公司 | Electricity stealing identification method and device and electronic equipment |
CN111443237A (en) * | 2020-04-20 | 2020-07-24 | 北京中电普华信息技术有限公司 | Method and system for determining compensation electric quantity |
CN112649641A (en) * | 2020-12-14 | 2021-04-13 | 北京科东电力控制系统有限责任公司 | Electricity stealing user judgment method based on electricity stealing characteristics |
CN112649641B (en) * | 2020-12-14 | 2023-05-02 | 北京科东电力控制系统有限责任公司 | Electricity stealing user judging method based on electricity stealing characteristics |
Also Published As
Publication number | Publication date |
---|---|
CN107328974B (en) | 2020-06-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107328974A (en) | A kind of stealing recognition methods and device | |
CN108445438B (en) | Method and device for detecting wrong wiring of electric energy metering device | |
CN105896586B (en) | The fault location and restoration methods and system of a kind of voltage source converter station | |
CN107492888B (en) | A kind of voltage weakness zone appraisal procedure of direct current receiving end AC system | |
CN103986357A (en) | Method for suppressing circulating current in modular multilevel converter for high voltage direct-current transmission | |
CN102682408A (en) | Comprehensive electric energy quality estimation method based on improved radar graph | |
Chen et al. | State estimation for distribution systems using micro-synchrophasors | |
CN102938130A (en) | Comprehensive assessment method for performance indexes of power quality based on PQView | |
CN104167726A (en) | Calculation method of single-phase multi-feed-in interaction effect factor based on impedance matrix | |
CN101788597A (en) | Three-phase three-wire system phase voltage measuring method | |
CN109507630A (en) | Wiring judgment method and system | |
CN104730393A (en) | District line loss rate detecting method and system | |
CN102830266A (en) | Phase discriminating circuit of residual current phase | |
CN105391044B (en) | A kind of earth-fault current detection circuit and method | |
CN105242135B (en) | Three-phase power transformer on-line parameter identification device and its realize algorithm | |
CN104931781B (en) | The measuring method and device at electricity phase angle in three-phase and four-line circuit | |
CN107688658A (en) | The localization method and device of a kind of abnormal data | |
Pradhan et al. | Solution to close-in fault problem in directional relaying | |
CN107274054A (en) | The power distribution network operational efficiency evaluation method of ability is available for based on same layer equipment maximum | |
CN209432893U (en) | EPS is AC electrically isolated from detection device | |
CN201536250U (en) | Self-power protective device | |
CN208874349U (en) | A kind of power-supply system of neutron detector experimental situation | |
CN208399623U (en) | A kind of wiring testing device of alternating-current charging pile | |
CN203339713U (en) | Static var generator SVG for inhibiting unbalanced load | |
CN107017637B (en) | A kind of simplified modeling evaluating method of three phase rectifier unit harmonic power |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |