CN107328974A - A kind of stealing recognition methods and device - Google Patents

A kind of stealing recognition methods and device Download PDF

Info

Publication number
CN107328974A
CN107328974A CN201710657087.3A CN201710657087A CN107328974A CN 107328974 A CN107328974 A CN 107328974A CN 201710657087 A CN201710657087 A CN 201710657087A CN 107328974 A CN107328974 A CN 107328974A
Authority
CN
China
Prior art keywords
user
stealing
identified
default
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710657087.3A
Other languages
Chinese (zh)
Other versions
CN107328974B (en
Inventor
王树明
胡艳杰
郭冰洁
邱菊
林晓静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Beijing China Power Information Technology Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Beijing China Power Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Information and Telecommunication Co Ltd, Beijing China Power Information Technology Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201710657087.3A priority Critical patent/CN107328974B/en
Publication of CN107328974A publication Critical patent/CN107328974A/en
Application granted granted Critical
Publication of CN107328974B publication Critical patent/CN107328974B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R11/00Electromechanical arrangements for measuring time integral of electric power or current, e.g. of consumption
    • G01R11/02Constructional details
    • G01R11/24Arrangements for avoiding or indicating fraudulent use

Abstract

A kind of stealing recognition methods and device are present embodiments provided, this method includes:Obtain the electricity consumption data of user to be identified;Default abnormal power consumption index is calculated according to the electricity consumption data of the user to be identified;If the user to be identified is abnormal user, the abnormal power consumption index according to the user to be identified generates the electricity consumption characteristic vector of user to be identified;The value of the similarity of the electricity consumption characteristic vector of the user to be identified and the stealing fingerprint vector of default every kind of stealing gimmick is calculated respectively;If the value for calculating any one obtained similarity exceedes default threshold value, then it represents that the user to be identified is stealing suspicion user.In the present embodiment, by the value for the similarity for calculating user power utilization characteristic vector to be identified and stealing fingerprint vector, whether the automatic identification user to be identified belong to stealing suspicion user, it is to avoid the subjectivity that expert recognizes to stealing is assumed, and improves the degree of accuracy of stealing identification.

Description

A kind of stealing recognition methods and device
Technical field
The present invention relates to power domain, more particularly to a kind of stealing recognition methods and device.
Background technology
With the fast development of China's economy, the need for electricity rapid growth of user.However, electricity stealing, especially specially Increasingly serious with the electricity stealing of transformer, stealing gimmick becomes increasingly abundant to increase severely year by year with hidden, stealing loss.
In the prior art, for the identification of dedicated transformer electricity stealing, generally analyzed according to expertise, it is this Analysis mode subjectivity is strong and accuracy of identification is relatively low.
The content of the invention
In view of this, the embodiments of the invention provide a kind of stealing recognition methods and device, by the method for the present embodiment, The method automatic identification stealing gimmick that can not only be matched by vector similarity, and improve the degree of accuracy of stealing identification.
A kind of stealing recognition methods provided in an embodiment of the present invention, including:
Obtain the electricity consumption data of user to be identified;
Default abnormal power consumption index is calculated according to the electricity consumption data of the user to be identified;
Judge whether the user to be identified belongs to abnormal user, if abnormal user, according to the abnormal power consumption index Generate the electricity consumption characteristic vector of the user to be identified;
Calculate respectively the electricity consumption characteristic vector of the user to be identified and the stealing fingerprint of default every kind of stealing gimmick to The value of the similarity of amount;
If the value for calculating any one obtained similarity exceedes default threshold value, then it represents that the user to be identified is surreptitiously Electric suspicion user.
Optionally, the abnormal power consumption index includes:
The mode of connection, metering method, line loss increase-volume, daily power consumption bust, A phases are under-voltage percentage, B phases are under-voltage percentage, C Mutually under-voltage percentage, current imbalance rate, power surpass appearance, power factor bust, A phase currents bust, B phase currents bust, C phases electricity Flow bust.
Optionally, it is described to judge whether the user to be identified belongs to abnormal user, including:
Judge each abnormal power consumption index of the user to be identified whether in corresponding default normal range (NR) respectively It is interior;
If any one abnormal power consumption index of user to be identified is not in default normal range (NR), the use to be identified Family is abnormal user.
Optionally, the electricity consumption characteristic vector that the user to be identified is calculated respectively and default every kind of stealing gimmick The value of the similarity of stealing fingerprint vector, including:
Obtain the corresponding stealing fingerprint vector of every kind of stealing gimmick successively from default stealing fingerprint base;
Calculate successively user to be identified electricity consumption characteristic vector and the corresponding stealing fingerprint vector of every kind of stealing gimmick it is remaining String value.
Optionally, the generation method of the stealing fingerprint vector of the stealing gimmick, including:
Obtain the electricity consumption data of the stealing gimmick;
Default abnormal power consumption index is calculated according to the electricity consumption data of the stealing gimmick;
The abnormal power consumption index is arranged to the characteristic vector for generating stealing gimmick according to default order.
A kind of stealing identifying device, including:
First acquisition unit, the electricity consumption data for obtaining user to be identified;
First abnormal power consumption index computing unit, for calculating default different according to the electricity consumption data of the user to be identified Normal power consumption index;
First generation unit, for judging whether the user to be identified belongs to abnormal user, if abnormal user, foundation The abnormal power consumption index generates the electricity consumption characteristic vector of the user to be identified;
Similarity calculated, for calculate respectively the user to be identified electricity consumption characteristic vector and it is default it is every kind of steal The value of the similarity of the stealing fingerprint vector of electric hand method;
Indexing unit, if exceeding default threshold value for the value for calculating any one obtained similarity, then it represents that described User to be identified is stealing suspicion user.
Optionally, the abnormal power consumption index includes:
The mode of connection, metering method, line loss increase-volume, daily power consumption bust, A phases are under-voltage percentage, B phases are under-voltage percentage, C Mutually under-voltage percentage, current imbalance rate, power surpass appearance, power factor bust, A phase currents bust, B phase currents bust, C phases electricity Flow bust.
Optionally, the generation unit, including:
First judgment sub-unit, for judging each abnormal power consumption index of the user to be identified whether in phase respectively In the default normal range (NR) answered;
Subelement is marked, if any one abnormal power consumption index for user to be identified is not in default normal range (NR) Interior, then the user to be identified is abnormal user.
Optionally, the similarity calculated, including:
Subelement is obtained, for obtaining the corresponding stealing fingerprint of every kind of stealing gimmick successively from default stealing fingerprint base Vector;
Similarity value computation subunit, electricity consumption characteristic vector and every kind of stealing gimmick for calculating user to be identified successively The cosine value of corresponding stealing fingerprint vector.
Optionally, in addition to:
Second acquisition unit, the electricity consumption data for obtaining the stealing gimmick;
Second abnormal power consumption index computing unit, for calculating default exception according to the electricity consumption data of the stealing gimmick Power consumption index;
Second generation unit, the spy of stealing gimmick is generated for the abnormal power consumption index to be arranged according to default order Levy vector.
A kind of stealing recognition methods is present embodiments provided, including:Obtain the electricity consumption data of user to be identified;According to described The electricity consumption data of user to be identified calculates default abnormal power consumption index;If the user to be identified is abnormal user, foundation should The abnormal power consumption index of user to be identified generates the electricity consumption characteristic vector of user to be identified;The use of the user to be identified is calculated respectively The value of the similarity of the stealing fingerprint vector of the default every kind of stealing gimmick of electrical feature vector sum;If calculating any one obtained The value of similarity exceedes default threshold value, then it represents that the user to be identified is stealing suspicion user.In the present embodiment, pass through meter The value of the similarity of user power utilization characteristic vector to be identified and stealing fingerprint vector is calculated, whether the automatic identification user to be identified belongs to In stealing suspicion user, and the subjectivity assumption that expert recognizes to stealing is avoided, improve the degree of accuracy of stealing identification.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 shows a kind of schematic flow sheet of stealing recognition methods provided in an embodiment of the present invention;
Fig. 2 shows a kind of structural representation of stealing identifying device provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
With reference to Fig. 1, a kind of schematic flow sheet of stealing recognition methods provided in an embodiment of the present invention is shown, in this implementation In example, this method is used for dedicated transformer, and this method includes:
S101:Obtain the electricity consumption data of user to be identified.
In the present embodiment, the electricity consumption data of user to be identified includes:The data of dedicated transformer user, dedicated transformer are set Standby information, line loss information, information of voltage, current information, information about power etc..In addition, the electricity consumption data of user to be identified History can also be included to record in violation of rules and regulations.
, it is necessary to which explanation, the stealing due to this method for dedicated transformer is recognized in the present embodiment, therefore, this reality It is the user using dedicated transformer to apply the user to be identified mentioned in example, referred to as specially becomes user.
S102:Default abnormal power consumption index is calculated according to the electricity consumption data of the user to be identified got.
In the present embodiment, default abnormal power consumption index includes:Power surpass appearance, daily power consumption bust, circuit line loss uprush, Current imbalance rate, unbalanced power rate, A phases are under-voltage percentage, B phases are under-voltage percentage, C under-voltage percentages, electric current A busts Rate, electric current B busts rate, electric current C busts rate, power factor bust, there is power bust day.
Wherein, each abnormal power consumption index has corresponding computational methods, as shown in table 1 below:
S103:Judge whether the user to be identified belongs to abnormal user, if abnormal user, the exception obtained according to calculating Power consumption index generates electricity consumption characteristic vector.
These obtained abnormal power consumption indexs are calculated in the present embodiment, in S102, all in the presence of a normal value range, are led to Cross and judge these abnormal power consumption indexs whether in normal scope, it is determined whether occur in that abnormal situation, specifically, bag Include:
Judge each abnormal user index of user to be identified whether in corresponding normal range (NR) respectively;
If any one abnormal user index of user to be identified is not in default normal range (NR), the user to be identified For abnormal user.
If it should be noted that all abnormal power consumption indexs represent that this is to be identified in default normal range (NR) User is not abnormal user, then without carrying out follow-up operation;If any one user's index to be identified is not in the index In normal range (NR), then it represents that the user to be identified is abnormal user.
In the present embodiment, the electricity consumption characteristic vector of generation be by abnormal power consumption index according to default tactic, and And each abnormal power consumption index exists in vector form.
Illustrate:Characteristic vector A=(a of electricity consumption1,a2,a3,a4,…,a10,a11,a12,a13), wherein, each component Implication be respectively:
Wherein, in characteristic vector A each component order, i.e. a1,a2,a3,a4,…,a10,a11,a12,a13To be default different Chang Zhibiao's puts in order.
S104:The electricity consumption characteristic vector of user to be identified and the stealing fingerprint with default every kind of stealing gimmick are calculated respectively The similitude of vector.
S105:If the value for calculating any one obtained similarity exceedes default threshold value, then it represents that the user to be identified For stealing suspicion user.
In the present embodiment, stealing gimmick is stored in stealing fingerprint base, every kind of stealing gimmick one stealing fingerprint of correspondence to Amount.Wherein stealing gimmick includes:Privately increase-volume, secondary side A phases are shunted, secondary side C phases are shunted, secondary side symmetrical flow division, secondary The shunting of side A, B, C balance, CT primary side A phases are shunted, CT primary side C phases are shunted, CT primary sides symmetrical flow division, around more metering, four Line height meter B phase decompressions are under-voltage, four lines height meter A phase decompressions are under-voltage, four lines height meter C phase decompressions are under-voltage, the low meter B decompressions of four lines, four lines Low meter A decompressions, the low meter C decompressions of four lines, three lines height meter A decompressions, three lines height meter C decompressions, the low meter A decompressions of three lines, the low meter C of three lines lose Pressure etc..
It should be noted that default stealing fingerprint vector includes stealing gimmicks all in stealing fingerprint base.Therefore, need Calculate the similar of the stealing fingerprint vector of every kind of stealing gimmick in the electricity consumption characteristic vector and stealing fingerprint base of user to be identified Property.
Wherein, S104 can be realized by following formula:
Wherein, X=(x1,x2,x3...xn) represent stealing fingerprint vector;Y=(y1,y2,y3...yn) represent user to be identified Characteristic vector.
It is stealing suspicion user by the user's mark to be identified as cos (θ) > a, wherein a is constant, is represented default Threshold value.
For example, as cos (θ) > 0.9, can now be designated as similarity can be by the user's mark to be identified more than 90 points For stealing suspicion user, and the corresponding stealing gimmick of the stealing fingerprint vector is the stealing gimmick that stealing suspicion user uses.
In the present embodiment, the generating process of the stealing fingerprint vector of specific stealing gimmick includes:
Obtain the electricity consumption data of stealing gimmick;
Default abnormal power consumption index is calculated according to the electricity consumption data of stealing gimmick;
Abnormal power consumption index is arranged to the characteristic vector for generating stealing gimmick according to default order.
Wherein, the order of abnormal power consumption index can be:The mode of connection, metering method, line loss are uprushed, daily power consumption is dashed forward Drop, A the is under-voltage under-voltage % of %, B under-voltage %, C, current imbalance rate, power surpass appearance, power factor bust, electric current A busts, electric current B Bust, electric current C busts.
For example, characteristic vector B=(b of the stealing gimmick for increase-volume privately1,b2,b3,b4,…,b10,b11,b12,b13), its In, the implication of each component is respectively:
Illustrate:The preservation form of stealing fingerprint base can be the form of table 2 below:
Table 2
It should be noted that stealing fingerprint base is to constantly update, after new stealing gimmick is found, the stealing can be generated The stealing fingerprint vector of gimmick, and the stealing fingerprint vector of the gimmick is saved in stealing fingerprint base.
In the present embodiment, first-line staff can use according to the list of the stealing suspicion user detected, and stealing suspicion The relevant information at family, scene evidence taking is carried out to stealing suspicion user.Wherein, the relevant information of stealing suspicion user includes:Stealing User number, user name, unit, address, stealing gimmick, suspicion degree etc..
In the present embodiment, the abnormal power consumption index of user to be identified is calculated, and calculates the abnormal electricity consumption of user to be identified and is referred to Mark calculates the similar value with the stealing fingerprint vector of every kind of stealing gimmick in default stealing fingerprint base, if any one obtained Similar value has exceeded default threshold value, then it represents that the user to be identified is stealing suspicion user.With it, can not only The method automatic identification stealing gimmick matched by vector similarity, and improve the degree of accuracy of stealing identification.
With reference to Fig. 2, a kind of structural representation of stealing identifying device provided in an embodiment of the present invention is shown, in this implementation In example, described device includes:
201:First acquisition unit, the electricity consumption data for obtaining user to be identified;
202:First abnormal power consumption index computing unit, for calculating default according to the electricity consumption data of the user to be identified Abnormal power consumption index;
203:First generation unit, for judging whether the user to be identified belongs to abnormal user, if abnormal user, The electricity consumption characteristic vector of the user to be identified is generated according to the abnormal power consumption index;
204:Similarity calculated, for calculating the electricity consumption characteristic vector of the user to be identified respectively and default every Plant the value of the similarity of the stealing fingerprint vector of stealing gimmick;
205:Indexing unit, if exceeding default threshold value for the value for calculating any one obtained similarity, then it represents that The user to be identified is stealing suspicion user.
Optionally, the abnormal power consumption index includes:
The mode of connection, metering method, line loss increase-volume, daily power consumption bust, A phases are under-voltage percentage, B phases are under-voltage percentage, C Mutually under-voltage percentage, current imbalance rate, power surpass appearance, power factor bust, A phase currents bust, B phase currents bust, C phases electricity Flow bust.
Optionally, the generation unit, including:
First judgment sub-unit, for judging each abnormal power consumption index of the user to be identified whether in phase respectively In the default normal range (NR) answered;
Subelement is marked, if any one abnormal power consumption index for user to be identified is not in default normal range (NR) Interior, then the user to be identified is abnormal user.
Optionally, the similarity calculated, including:
Subelement is obtained, for obtaining the corresponding stealing fingerprint of every kind of stealing gimmick successively from default stealing fingerprint base Vector;
Similarity value computation subunit, electricity consumption characteristic vector and every kind of stealing gimmick for calculating user to be identified successively The cosine value of corresponding stealing fingerprint vector.
Optionally, in addition to:
Second acquisition unit, the electricity consumption data for obtaining the stealing gimmick;
Second abnormal power consumption index computing unit, for calculating default exception according to the electricity consumption data of the stealing gimmick Power consumption index;
Second generation unit, the spy of stealing gimmick is generated for the abnormal power consumption index to be arranged according to default order Levy vector.
By the device of the present embodiment, the similarity of user power utilization characteristic vector to be identified and stealing fingerprint vector is calculated Value, realizes the automatic identification user to be identified and whether belongs to the mode of stealing suspicion user, and avoid expert to stealing The subjectivity of identification is assumed, and improves the degree of accuracy of stealing identification.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation be all between difference with other embodiment, each embodiment identical similar part mutually referring to.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or using the present invention. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (10)

1. a kind of stealing recognition methods, it is characterised in that including:
Obtain the electricity consumption data of user to be identified;
Default abnormal power consumption index is calculated according to the electricity consumption data of the user to be identified;
Judge whether the user to be identified belongs to abnormal user, if abnormal user, generated according to the abnormal power consumption index The electricity consumption characteristic vector of the user to be identified;
The electricity consumption characteristic vector of the user to be identified and the stealing fingerprint vector of default every kind of stealing gimmick are calculated respectively The value of similarity;
If the value for calculating any one obtained similarity exceedes default threshold value, then it represents that the user to be identified dislikes for stealing Doubt user.
2. according to the method described in claim 1, it is characterised in that the abnormal power consumption index includes:
The mode of connection, metering method, line loss increase-volume, daily power consumption bust, A phases are under-voltage percentage, B phases are under-voltage percentage, C phases are owed Press percentage, current imbalance rate, power to surpass appearance, power factor bust, A phase currents bust, B phase currents bust, C phase currents to dash forward Drop.
3. according to the method described in claim 1, it is characterised in that described to judge whether the user to be identified belongs to abnormal use Family, including:
Judge each abnormal power consumption index of the user to be identified whether in corresponding default normal range (NR) respectively;
If any one abnormal power consumption index of user to be identified is not in default normal range (NR), the user to be identified is Abnormal user.
4. according to the method described in claim 1, it is characterised in that it is described calculate the user to be identified respectively use electrical feature The value of the similarity of the stealing fingerprint vector of the default every kind of stealing gimmick of vector sum, including:
Obtain the corresponding stealing fingerprint vector of every kind of stealing gimmick successively from default stealing fingerprint base;
The electricity consumption characteristic vector of user to be identified and the cosine value of the corresponding stealing fingerprint vector of every kind of stealing gimmick are calculated successively.
5. method according to claim 4, it is characterised in that the generation side of the stealing fingerprint vector of the stealing gimmick Method, including:
Obtain the electricity consumption data of the stealing gimmick;
Default abnormal power consumption index is calculated according to the electricity consumption data of the stealing gimmick;
The abnormal power consumption index is arranged to the characteristic vector for generating stealing gimmick according to default order.
6. a kind of stealing identifying device, it is characterised in that including:
First acquisition unit, the electricity consumption data for obtaining user to be identified;
First abnormal power consumption index computing unit, for calculating default abnormal use according to the electricity consumption data of the user to be identified Electric index;
First generation unit, for judging whether the user to be identified belongs to abnormal user, if abnormal user, according to described Abnormal power consumption index generates the electricity consumption characteristic vector of the user to be identified;
Similarity calculated, electricity consumption characteristic vector and default every kind of stealing hand for calculating the user to be identified respectively The value of the similarity of the stealing fingerprint vector of method;
Indexing unit, if exceeding default threshold value for the value for calculating any one obtained similarity, then it represents that described to wait to know Other user is stealing suspicion user.
7. device according to claim 6, it is characterised in that the abnormal power consumption index includes:
The mode of connection, metering method, line loss increase-volume, daily power consumption bust, A phases are under-voltage percentage, B phases are under-voltage percentage, C phases are owed Press percentage, current imbalance rate, power to surpass appearance, power factor bust, A phase currents bust, B phase currents bust, C phase currents to dash forward Drop.
8. device according to claim 6, it is characterised in that the generation unit, including:
First judgment sub-unit, for judging each abnormal power consumption index of the user to be identified whether corresponding respectively In default normal range (NR);
Subelement is marked, if any one abnormal power consumption index for user to be identified is not in default normal range (NR), The user to be identified is abnormal user.
9. device according to claim 6, it is characterised in that the similarity calculated, including:
Obtain subelement, for obtained successively from default stealing fingerprint base the corresponding stealing fingerprint of every kind of stealing gimmick to Amount;
Similarity value computation subunit, the electricity consumption characteristic vector for calculating user to be identified successively is corresponding with every kind of stealing gimmick Stealing fingerprint vector cosine value.
10. device according to claim 9, it is characterised in that also include:
Second acquisition unit, the electricity consumption data for obtaining the stealing gimmick;
Second abnormal power consumption index computing unit, for calculating default abnormal electricity consumption according to the electricity consumption data of the stealing gimmick Index;
Second generation unit, for by the abnormal power consumption index according to default order arrange generate stealing gimmick feature to Amount.
CN201710657087.3A 2017-08-03 2017-08-03 Electricity stealing identification method and device Active CN107328974B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710657087.3A CN107328974B (en) 2017-08-03 2017-08-03 Electricity stealing identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710657087.3A CN107328974B (en) 2017-08-03 2017-08-03 Electricity stealing identification method and device

Publications (2)

Publication Number Publication Date
CN107328974A true CN107328974A (en) 2017-11-07
CN107328974B CN107328974B (en) 2020-06-02

Family

ID=60226323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710657087.3A Active CN107328974B (en) 2017-08-03 2017-08-03 Electricity stealing identification method and device

Country Status (1)

Country Link
CN (1) CN107328974B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108490288A (en) * 2018-03-09 2018-09-04 华南师范大学 A kind of stealing detection method and system
CN109213787A (en) * 2018-11-07 2019-01-15 闫福录 A kind of anti-electricity-theft algorithm chip and electricity anti-theft method in integration characteristic library
CN109270372A (en) * 2018-09-14 2019-01-25 美林数据技术股份有限公司 A kind of stealing identifying system and method based on line loss and user power consumption variation relation
CN110264015A (en) * 2019-06-28 2019-09-20 国网河南省电力公司电力科学研究院 It opposes electricity-stealing and checks monitoring method and platform
CN110988422A (en) * 2019-12-19 2020-04-10 北京中电普华信息技术有限公司 Electricity stealing identification method and device and electronic equipment
CN111443237A (en) * 2020-04-20 2020-07-24 北京中电普华信息技术有限公司 Method and system for determining compensation electric quantity
CN112649641A (en) * 2020-12-14 2021-04-13 北京科东电力控制系统有限责任公司 Electricity stealing user judgment method based on electricity stealing characteristics

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103792420A (en) * 2014-01-26 2014-05-14 威胜集团有限公司 Electricity larceny preventing and electricity utilization monitoring method based on load curves
CN104700484A (en) * 2015-03-20 2015-06-10 泉州智勇达电气有限责任公司 Intelligent padlock management system
CN105808900A (en) * 2014-12-29 2016-07-27 西门子公司 Method and device for determining electricity stealing suspicion of user to be evaluated
CN106022951A (en) * 2016-05-09 2016-10-12 北京智芯微电子科技有限公司 Electricity consumption abnormity analysis method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103792420A (en) * 2014-01-26 2014-05-14 威胜集团有限公司 Electricity larceny preventing and electricity utilization monitoring method based on load curves
CN105808900A (en) * 2014-12-29 2016-07-27 西门子公司 Method and device for determining electricity stealing suspicion of user to be evaluated
CN104700484A (en) * 2015-03-20 2015-06-10 泉州智勇达电气有限责任公司 Intelligent padlock management system
CN106022951A (en) * 2016-05-09 2016-10-12 北京智芯微电子科技有限公司 Electricity consumption abnormity analysis method and apparatus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈文瑛,等: "基于指纹库的智能反窃电平台的研究与应用", 《电子世界》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108490288A (en) * 2018-03-09 2018-09-04 华南师范大学 A kind of stealing detection method and system
CN108490288B (en) * 2018-03-09 2019-04-16 华南师范大学 A kind of stealing detection method and system
CN109270372A (en) * 2018-09-14 2019-01-25 美林数据技术股份有限公司 A kind of stealing identifying system and method based on line loss and user power consumption variation relation
CN109213787A (en) * 2018-11-07 2019-01-15 闫福录 A kind of anti-electricity-theft algorithm chip and electricity anti-theft method in integration characteristic library
CN109213787B (en) * 2018-11-07 2022-03-08 闫福录 Electricity larceny prevention algorithm chip integrated with feature library and electricity larceny prevention method
CN110264015A (en) * 2019-06-28 2019-09-20 国网河南省电力公司电力科学研究院 It opposes electricity-stealing and checks monitoring method and platform
CN110988422A (en) * 2019-12-19 2020-04-10 北京中电普华信息技术有限公司 Electricity stealing identification method and device and electronic equipment
CN110988422B (en) * 2019-12-19 2022-04-26 北京中电普华信息技术有限公司 Electricity stealing identification method and device and electronic equipment
CN111443237A (en) * 2020-04-20 2020-07-24 北京中电普华信息技术有限公司 Method and system for determining compensation electric quantity
CN112649641A (en) * 2020-12-14 2021-04-13 北京科东电力控制系统有限责任公司 Electricity stealing user judgment method based on electricity stealing characteristics
CN112649641B (en) * 2020-12-14 2023-05-02 北京科东电力控制系统有限责任公司 Electricity stealing user judging method based on electricity stealing characteristics

Also Published As

Publication number Publication date
CN107328974B (en) 2020-06-02

Similar Documents

Publication Publication Date Title
CN107328974A (en) A kind of stealing recognition methods and device
CN108445438B (en) Method and device for detecting wrong wiring of electric energy metering device
CN105896586B (en) The fault location and restoration methods and system of a kind of voltage source converter station
CN107492888B (en) A kind of voltage weakness zone appraisal procedure of direct current receiving end AC system
CN103986357A (en) Method for suppressing circulating current in modular multilevel converter for high voltage direct-current transmission
CN102682408A (en) Comprehensive electric energy quality estimation method based on improved radar graph
Chen et al. State estimation for distribution systems using micro-synchrophasors
CN102938130A (en) Comprehensive assessment method for performance indexes of power quality based on PQView
CN104167726A (en) Calculation method of single-phase multi-feed-in interaction effect factor based on impedance matrix
CN101788597A (en) Three-phase three-wire system phase voltage measuring method
CN109507630A (en) Wiring judgment method and system
CN104730393A (en) District line loss rate detecting method and system
CN102830266A (en) Phase discriminating circuit of residual current phase
CN105391044B (en) A kind of earth-fault current detection circuit and method
CN105242135B (en) Three-phase power transformer on-line parameter identification device and its realize algorithm
CN104931781B (en) The measuring method and device at electricity phase angle in three-phase and four-line circuit
CN107688658A (en) The localization method and device of a kind of abnormal data
Pradhan et al. Solution to close-in fault problem in directional relaying
CN107274054A (en) The power distribution network operational efficiency evaluation method of ability is available for based on same layer equipment maximum
CN209432893U (en) EPS is AC electrically isolated from detection device
CN201536250U (en) Self-power protective device
CN208874349U (en) A kind of power-supply system of neutron detector experimental situation
CN208399623U (en) A kind of wiring testing device of alternating-current charging pile
CN203339713U (en) Static var generator SVG for inhibiting unbalanced load
CN107017637B (en) A kind of simplified modeling evaluating method of three phase rectifier unit harmonic power

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant