CN112633692A - Acquisition method and device for electricity stealing checking threshold value, and electricity stealing checking device and method - Google Patents

Acquisition method and device for electricity stealing checking threshold value, and electricity stealing checking device and method Download PDF

Info

Publication number
CN112633692A
CN112633692A CN202011546989.8A CN202011546989A CN112633692A CN 112633692 A CN112633692 A CN 112633692A CN 202011546989 A CN202011546989 A CN 202011546989A CN 112633692 A CN112633692 A CN 112633692A
Authority
CN
China
Prior art keywords
electricity
user
power
data
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011546989.8A
Other languages
Chinese (zh)
Inventor
石纹赫
聂东
刘春蕾
霍雄伟
纪剑辉
贾晶韬
尹耕初
陈曦
张智慧
赵雪娇
张书峰
董沛毅
侯骁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Baoding Power Supply Co of State Grid Hebei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Baoding Power Supply Co of State Grid Hebei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Baoding Power Supply Co of State Grid Hebei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202011546989.8A priority Critical patent/CN112633692A/en
Publication of CN112633692A publication Critical patent/CN112633692A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063114Status monitoring or status determination for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply

Abstract

The application provides a method and a device for obtaining an electricity stealing checking threshold value and an electricity stealing checking device and a method, and solves the problem of how to check electricity stealing in the prior art. The acquisition method of the electricity stealing check threshold comprises the following steps: acquiring power utilization characteristic parameters and power utilization data of a plurality of users; determining a user category to which each user belongs according to the electricity utilization characteristic parameters and a user classification table, wherein the user classification table comprises a corresponding relation between the users and the user categories in the value intervals of the electricity utilization characteristic parameters; and respectively calculating the average value of the power consumption data of the users of the same user category in the user classification table to serve as a threshold value for judging whether the users of the current user category steal power.

Description

Acquisition method and device for electricity stealing checking threshold value, and electricity stealing checking device and method
Technical Field
The application relates to the technical field of power distribution networks, in particular to a method and a device for obtaining an electricity stealing check threshold value and an electricity stealing check device and method.
Background
Electric energy is one of indispensable energy sources in daily life. For many years, lawless persons steal electric energy in various forms in order to seek personal interests, so that good electricity utilization environment is destroyed, and national interests are damaged.
Disclosure of Invention
In view of this, embodiments of the present application aim to provide an acquisition method and an apparatus for electricity stealing checking threshold, an electricity stealing checking apparatus and an electricity stealing method, so as to solve the problem of how to check electricity stealing in the prior art.
The application provides a method for acquiring a power stealing check threshold in a first aspect, which comprises the following steps: acquiring power utilization characteristic parameters and power utilization data of a plurality of users; determining a user category to which each user belongs according to the electricity utilization characteristic parameters and a user classification table, wherein the user classification table comprises a corresponding relation between the users and the user categories in the value intervals of the electricity utilization characteristic parameters; and respectively calculating the average value of the power consumption data of the users of the same user category in the user classification table to serve as a threshold value for judging whether the users of the current user category steal power.
In one embodiment, the user classification table includes a plurality of levels, and the electricity consumption characteristic parameter includes a plurality of parameters respectively corresponding to the plurality of levels; wherein each level comprises a plurality of classifications according to different divisions of corresponding parameters; one of the categories in a lowest one of the plurality of levels corresponds to a user category.
In one embodiment, the electricity utilization characteristic parameter includes one or more of the following parameter information in combination: the type of electricity used, the grade of electricity used and the wiring mode.
In one embodiment, the electricity utilization types comprise at least two of urban resident living electricity utilization, large industrial electricity utilization, non-resident lighting electricity utilization, agricultural irrigation and drainage electricity utilization, agricultural production electricity utilization, common industrial electricity utilization, commercial electricity utilization, rural resident living electricity utilization and middle and primary school teaching electricity utilization; and/or the power consumption grade comprises at least two of 50kVA or below, 100kVA, 200kVA, 315kVA, 500kVA, 800kVA, 1000kVA and seven grades above; and/or the wiring patterns include three-phase three-wire and three-phase four-wire.
In one embodiment, before acquiring the electricity utilization characteristic parameters and the electricity utilization data of a plurality of users, the method further comprises the following steps: acquiring electrical data of a plurality of users acquired by an electric energy metering device; and calculating power utilization data based on the electrical data, wherein the power utilization data reflects the fluctuation degree of the electrical data in the power utilization process.
In one embodiment, the electrical data includes: at least one of three-phase power, three-phase voltage, three-phase current, three-phase power factor and zero-sequence current; and/or the electricity usage data comprises: at least one of power unbalance, current unbalance, voltage unbalance, power sudden drop coefficient, current sudden drop coefficient, voltage sudden drop coefficient, normal production power factor effective value and normal production zero sequence current effective value.
In one embodiment, before calculating the electricity utilization data based on the electrical data, the method further comprises the step of preprocessing the electrical data; preprocessing electrical data includes: the electric data is reduced into a secondary value according to the rated transformation ratio of the transformer corresponding to the electric energy metering device; carrying out noise reduction processing on the secondary value; and carrying out interpolation calculation on the secondary values subjected to the noise reduction processing to obtain preprocessed electrical data.
In one embodiment, the calculating the average value of the power consumption data of the users of the same user category in the user classification table respectively comprises: and calculating the mean value of the power consumption data respectively aiming at the users of the same user category in the user classification table by using a regression analysis method.
In one embodiment, further comprising: acquiring power utilization characteristic parameters and power utilization data of a new user; and updating the threshold value according to the electricity utilization characteristic parameters and the electricity utilization data of the new user.
The second aspect of the present application provides a method for checking electricity stealing, comprising: acquiring power utilization characteristic parameters and power utilization data of a target user; determining the user category of the target user according to the power utilization characteristic parameters and the user classification table; and determining whether the target user has the electricity stealing behavior according to the threshold value of the electricity utilization data corresponding to the user category and the electricity utilization data, wherein the threshold value of the electricity utilization data is obtained according to the method for obtaining the electricity stealing checking threshold value provided by any embodiment of the application.
In one embodiment, the electricity usage data includes a plurality of parameter values reflecting a degree of fluctuation of the electricity data during the electricity usage; the threshold value of the electricity utilization data comprises a plurality of parameter threshold values which correspond to a plurality of parameter values one to one; determining whether the current user has the electricity stealing behavior according to the threshold value of the electricity utilization data corresponding to the user category and the electricity utilization data comprises the following steps: counting the number of the parameter values which are more than or equal to the corresponding parameter threshold; and when the number is greater than or equal to the number threshold value, determining that the electricity stealing behavior exists in the current user.
In one embodiment, further comprising: and when the current user is determined to have the electricity stealing behavior, displaying the geographical position information of the current user and giving an alarm.
The third aspect of the present application provides an obtaining apparatus for checking a power stealing threshold, including: the acquisition module is used for acquiring the electricity utilization characteristic parameters and the electricity utilization data of a plurality of users; the determining module is used for determining the user category to which each user belongs according to the electricity utilization characteristic data and the user classification table, wherein the user classification table comprises the corresponding relation between the users and the user categories in the value intervals of the electricity utilization characteristic parameters; and the calculation module is used for calculating the average value of the power consumption data of the users of the same category in the user classification table respectively to be used as a threshold value for measuring whether the users of the current user category steal power or not.
The fourth aspect of the present application provides an electricity stealing checking device, comprising: the acquisition module is used for acquiring the electricity utilization characteristic parameters and the electricity utilization data of the target user; the first determining module is used for determining the user category of the target user according to the power utilization characteristic parameters and the user classification table; the second determining module is used for determining whether a target user has electricity stealing behavior according to the threshold value of the electricity utilization data corresponding to the user category and the electricity utilization data, and the threshold value of the electricity utilization data is obtained according to the electricity stealing checking method provided by any embodiment of the application.
A fifth aspect of the present application provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executed by the processor, wherein the processor implements the method for obtaining a power stealing threshold and/or the steps of the power stealing checking method provided in any embodiment of the present application when executing the computer program.
A sixth aspect of the present application provides a computer-readable storage medium, on which a computer program is stored, wherein the computer program, when being executed by a processor, implements the method for obtaining a power stealing check threshold and/or the steps of the power stealing check method provided in any embodiment of the present application.
According to the method and the device for acquiring the electricity stealing checking threshold, the method and the device for checking electricity stealing, the computer equipment and the readable storage medium, the electricity users are divided into different categories, and the electricity utilization properties of the users in the same category are the same or similar; and then, calculating the average value of the power consumption data of the users in the same category based on the big data statistical result, and using the average value as a threshold value for measuring whether the users in the same category have power stealing behaviors or not. Subsequently, whether the current user has the electricity stealing behavior can be accurately identified in real time by means of the threshold, and only the electricity stealing behavior is required to be checked at the server side, so that the cost is reduced.
Drawings
Fig. 1 shows an exemplary system architecture diagram to which the method and apparatus for obtaining a power stealing threshold, the method and apparatus for detecting power stealing provided by the embodiments of the present application can be applied.
Fig. 2 is a flowchart illustrating a method for obtaining a power stealing threshold according to a first exemplary embodiment of the present application.
FIG. 3 is a diagram illustrating a user classification table provided in an exemplary embodiment of the present application.
Fig. 4 is a flowchart illustrating a method for obtaining a power stealing threshold according to a second exemplary embodiment of the present application.
Fig. 5 is a flowchart illustrating a method for obtaining a power stealing threshold according to a third exemplary embodiment of the present application.
Fig. 6 is a schematic flow chart of a power stealing checking method provided in the first exemplary embodiment of the present application.
Fig. 7 is a flowchart illustrating a method for checking electricity stealing according to a second exemplary embodiment of the present application.
Fig. 8 is a schematic structural diagram of an apparatus for acquiring a power stealing threshold according to a first exemplary embodiment of the present application.
Fig. 9 is a schematic structural diagram of an apparatus for acquiring a theft detection threshold according to a second exemplary embodiment of the present application.
FIG. 10 illustrates a block diagram of an electronic device in accordance with an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Summary of the application
With the development of the power industry and the construction of power grids, the monitoring and control means of the operation of the power system become more mature. However, as the distribution network layout is complex and the system is huge in China, the management work of the power grid still has a vulnerability, and for the electricity stealing phenomenon, the power grid management work is always the key and difficult point due to the diversification of the electricity stealing mode, the low technical level of electricity stealing prevention and the like, and the power supply parts at all levels are disturbed. The electricity stealing behavior not only seriously disturbs the power supply order, but also seriously affects the power supply reliability and the power quality of the power distribution network. Therefore, in order to guarantee the economic benefits of power supply enterprises and the legitimate interests of power users, the technical level of electricity stealing prevention is improved in an effort to find and effectively inhibit electricity stealing behaviors in time, and the method has important research value and practical significance.
For a long time, electricity stealing checking in power distribution network management mainly depends on manpower checking, the working efficiency is low, and the abnormal electricity utilization phenomenon is difficult to accurately and timely find due to great influence of subjective factors. Some recent anti-electricity-stealing devices with electricity-stealing checking function include using a special metering box, sealing a conductor from a low-voltage outlet end of a transformer to the metering device, adopting a lead sealing technology, improving an external structure of an electric meter to prevent electricity-stealing behavior and the like, however, the anti-electricity-stealing devices are mainly based on the 'electricity-stealing prevention' design of a user electric energy meter, so that the anti-electricity-stealing devices need to be installed separately for each user, and the input cost is increased.
In view of the above, the present application provides an acquisition method and apparatus for electricity stealing checking threshold, an electricity stealing checking method and apparatus, a computer device, and a readable storage medium. According to the embodiments of the application, the electricity utilization users are divided into different categories, and the electricity utilization properties of the users in the same category are the same or similar; and then, calculating the average value of the power consumption data of the users in the same category based on the big data statistical result, and using the average value as a threshold value for measuring whether the users in the same category have power stealing behaviors or not. By means of the threshold, whether the current user has the electricity stealing behavior can be accurately identified in real time, and only the electricity stealing behavior is required to be checked at the server side, so that the cost is reduced.
Exemplary System
Fig. 1 shows an exemplary system architecture diagram to which the method and apparatus for obtaining a power stealing threshold, the method and apparatus for detecting power stealing provided by the embodiments of the present application can be applied. As shown in fig. 1, the system architecture includes a power monitoring management system 11, an electric energy metering device 12, and a communication network 13 for connecting the power monitoring management system 11 and the electric energy metering device 12.
The communication network 13 is used to provide a medium of communication link between the power monitoring management system 11 and the electric energy metering device 12. The electric energy metering device 12 is, for example, a smart meter, and is used for performing online monitoring on a distribution transformer and an end user and acquiring electrical data such as user load, electric quantity, voltage, current and the like. The power monitoring and management system 11 is a server of a power grid management department, and is used for monitoring data collected by the electric energy metering device 12 and providing various services based on the data. In this way, the electric energy metering device 12 interacts with the power monitoring management system 11 through the communication network 13 to receive or transmit messages.
For example, the electric energy metering device 12 uploads the collected electrical data to the electric power monitoring and management system 11, and the electric power monitoring and management system 11 may obtain the threshold of the electricity consumption data of the same type of users with similar electricity consumption properties by executing the method for obtaining the electricity stealing checking threshold provided in the embodiment of the present application based on the obtained electrical data, and then may determine whether the target user has an electricity stealing behavior based on the threshold.
For another example, the power monitoring and management system 11 is pre-stored with a power utilization data threshold obtained according to the method for obtaining the electricity stealing check threshold provided by the embodiment of the present application. In this case, the power monitoring and management system 11 can determine whether any user has power stealing behavior by executing the power stealing detection method provided by the embodiment of the present application.
In this embodiment, the method for acquiring the electricity stealing threshold and the method for checking electricity stealing provided by the embodiment of the present application are executed by the power monitoring and management system 11, and accordingly, the apparatus for acquiring the electricity stealing threshold and the apparatus for checking electricity stealing are provided in the power monitoring and management system 11. In other embodiments, some of the electric energy metering devices 12 have a function similar to the server, thereby performing the electricity stealing threshold value acquisition method and/or the electricity stealing detection method, and having corresponding electricity stealing threshold value acquisition means and/or electricity stealing detection means.
Exemplary method
Fig. 2 is a flowchart illustrating a method for obtaining a power stealing threshold according to a first exemplary embodiment of the present application. The present embodiment can be applied to a server of the power monitoring and management system 11, as shown in fig. 2, the method 200 for obtaining the electricity stealing threshold includes the following steps:
step S210, acquiring power utilization characteristic parameters and power utilization data of a plurality of users.
The electricity utilization characteristic parameters indicate the electricity utilization characteristics of the users, and different users can be distinguished according to different electricity utilization characteristic parameters. The electricity utilization characteristic parameters are, for example, electricity utilization types including industrial power supply, agricultural electricity utilization, commercial electricity utilization and the like; the second example can be a wiring mode, including a three-phase three-wire system, a three-phase four-wire system and the like; further examples include electricity usage levels including 50kVA or less, 200kVA, 800kVA, 1000kVA, etc.; and for example, the method can be used for main products and operation ranges of enterprises, monthly capacity, energy consumption level, pollution level and the like.
The electricity consumption data refers to electric power parameters related to the electricity consumption process of the user, and comprises primary electric data directly acquired by the electric energy metering device, such as voltage, current, electric quantity and the like; or a secondary value converted from the primary electric data according to the rated transformation ratio; it may also be three electrical data calculated from the primary or secondary electrical data, such as power imbalance, current imbalance, voltage imbalance, etc.
Step S220, determining the user category to which each user belongs according to the electricity utilization characteristic parameters and the user classification table, wherein the user classification table comprises the corresponding relation between the users and the user categories in the value intervals of the electricity utilization characteristic parameters.
The power utilization users are classified according to different power utilization characteristic parameters, so that the users with the same or similar power utilization properties are classified into one class, and a user classification table is formed.
In one embodiment, the user classification table includes a plurality of levels, and the electricity usage characteristic parameter includes a plurality of parameters respectively corresponding to the plurality of levels. Wherein each level comprises a plurality of classifications according to different divisions of corresponding parameters; one of the categories in a lowest one of the plurality of levels corresponds to a user category.
For example, the electricity usage characteristic parameters include the type of electricity usage, the level of electricity usage, and the manner of wiring. In this case, the user classification table may be represented in the form shown in fig. 3.
The electricity utilization type refers to that a national power grid company divides electricity utilization users into different categories according to different electricity utilization properties of the users, such as residential life electricity utilization, commercial electricity utilization, industrial electricity utilization and the like, wherein each category can be further divided into more detailed categories. Taking commercial power consumption as an example, the commercial power consumption is further divided into commodity sales power consumption, storage power consumption, hotel power consumption, repair service power consumption and the like according to different industries.
The wiring mode refers to the wiring mode of the household transformer, and comprises a three-phase three-wire system and a three-phase four-wire system.
The power consumption grade refers to that users are classified into different grades according to different power consumption, such as 50kVA and below, 50kVA to 100kVA, 100kVA and above.
As shown in fig. 3, the user classification table includes a first hierarchy 31, a second hierarchy 32, and a third hierarchy 33, the first hierarchy 31 includes a plurality of first sub-classes classified according to different electricity usage types, the second hierarchy 32 includes a plurality of second sub-classes classified according to different electricity usage levels for each of the first sub-classes, and the third hierarchy 33 includes a plurality of third sub-classes classified according to different wiring manners for each of the second sub-classes.
It should be appreciated that as the hierarchy increases, the number of parameters used to represent the user category increases. For example, referring to fig. 3, the first hierarchy is composed of 1 parameter of the electricity usage type, the second hierarchy is composed of 2 parameters of the electricity usage type and the electricity usage level, and the third hierarchy is composed of 3 parameters of the electricity usage type, the electricity usage level, and the wiring manner. That is to say, the type of the electricity, the grade of the electricity consumption and the wiring mode jointly form a user category, for example, the electricity-500 kVA-three-phase three-wire system for teaching in middle and primary schools corresponds to a user category. For convenience of recording, a number may be set for each user category, for example, "teaching power for middle and primary schools-500 kVA-three-phase three-wire system" is set to correspond to category 2 user category.
According to the user classification table provided by the embodiment, the users are divided into three levels according to the electricity utilization type, the wiring mode and the electricity consumption grade, and the three levels are nested layer by layer and are infiltrated step by step, so that the classification has higher fineness.
In one embodiment, as shown in fig. 3, the electricity consumption types include urban resident domestic electricity consumption, large industrial electricity consumption, non-resident lighting electricity consumption, agricultural irrigation and drainage electricity consumption, agricultural production electricity consumption, general industrial electricity consumption, commercial electricity consumption, rural resident domestic electricity consumption, and middle and primary school teaching electricity consumption. The power usage levels include seven levels of 50kVA and below, 100kVA, 200kVA, 315kVA, 500kVA, 800kVA, 1000kVA and above. The wiring mode includes a three-phase three-wire system and a three-phase four-wire system. According to the dividing mode, all users are basically covered, the coverage is wide, and the classification fineness is further improved.
In one embodiment, the power utilization characteristic parameter of the current user is matched with each category in the user classification table, and when the power utilization characteristic parameter is completely matched with a certain category, the current user is determined to belong to the certain category. For example, when the current user uses electricity for teaching in middle and primary schools, the electricity consumption level is 500kVA, and the wiring mode is a three-phase three-wire system, the current user is determined to belong to the user category of 'teaching electricity for middle and primary schools-500 kVA-three-phase three-wire system'.
Step S230, respectively calculating a mean value of the power consumption data of the users of the same user category in the user classification table, so as to be used as a threshold for measuring whether the users of the current user category steal power.
The electricity usage data includes at least one parameter. When the power utilization data comprises a plurality of parameters, the average value is calculated for each parameter, and the average value of each parameter can be used for independently measuring whether the current user steals power or not, and can also be used for measuring whether the current user steals power or not by combining the average values of the plurality of parameters with a predetermined rule.
In one embodiment, the mean value of the power consumption data is calculated for the users of the same user category in the user classification table respectively by using a regression analysis method. Specifically, when the electricity consumption data includes at least one parameter, a regression curve is calculated according to each parameter of users of the same user category by using a regression analysis method, and the parameter of the regression curve is the mean value of the current parameter.
According to the method for acquiring the electricity stealing detection threshold, the electricity users are divided into different categories, and the electricity utilization properties of the users of the same category are the same or similar; and then, calculating the average value of the power consumption data of the users in the same category based on the big data statistical result, and using the average value as a threshold value for measuring whether the users in the same category have power stealing behaviors or not. Subsequently, whether the current user has the electricity stealing behavior can be accurately identified in real time by means of the threshold, and only the electricity stealing behavior is required to be checked at the server side, so that the cost is reduced.
Fig. 4 is a flowchart illustrating a method for obtaining a power stealing threshold according to a second exemplary embodiment of the present application. As shown in fig. 4, the obtaining method 400 further includes step S410 and step S420 executed before step S210 on the basis of the obtaining method 200 shown in fig. 2.
Step S410, acquiring electrical data of a plurality of users acquired by the electric energy metering device.
The electrical data collected by the electric energy metering device includes electric quantity, voltage, current, and the like.
And step S420, calculating power utilization data based on the electrical data, wherein the power utilization data reflects the fluctuation degree of the electrical data in the power utilization process.
In this embodiment, the user is a dedicated transformer user, that is, a user who uses electricity with an independent transformer. Since the electricity data of the specific user usually stabilizes near the rated value, when obvious fluctuation occurs, the user is indicated that the electricity abnormality may exist. Therefore, the electricity stealing detection threshold value is calculated by selecting the electricity utilization data capable of reflecting the fluctuation degree of the electrical data in the electricity utilization process for the special transformer user, and the method is visual and reliable.
The electricity consumption data reflecting the fluctuation degree of the electrical data in the electricity consumption process includes: at least one of power unbalance, current unbalance, voltage unbalance, power sudden drop coefficient, current sudden drop coefficient, voltage sudden drop coefficient, normal production power factor effective value and normal production zero sequence current effective value.
In one embodiment, referring to fig. 4, the acquisition method 400 further includes a step of preprocessing the electrical data performed before step S420. Because the electrical data received by the power monitoring and management system 11 has a certain loss due to communication and other reasons, the electrical data transmitted through the communication network 13 needs to be preprocessed to compensate for the missing electrical data.
Specifically, the step of preprocessing the electrical data comprises:
and step S430, the electrical data is reduced into a secondary value according to the rated transformation ratio of the transformer corresponding to the electric energy metering device.
In the power grid, the electric energy metering device is usually arranged at a primary end of the transformer, namely, between a user end and the transformer, so that the electric energy metering device collects primary values of electric data. In order to ensure data uniformity, the primary values need to be reduced to secondary values, i.e. electrical data output by the distribution network without passing through the transformer.
In step S440, noise reduction processing is performed on the secondary value. The noise reduction processing can remove noise in the secondary value of the electrical data so as not to influence the accuracy of the result. For example, the quadratic values are denoised with a filter.
And S450, carrying out interpolation calculation on the secondary values subjected to the noise reduction processing to obtain preprocessed electric data. For example, cubic spline interpolation or linear interpolation or a combination of both is used.
Fig. 5 is a flowchart illustrating a method for obtaining a power stealing threshold according to a third exemplary embodiment of the present application. As shown in fig. 5, the acquiring method 500 further includes a step S510 and a step S520 executed after the step S230 on the basis of the acquiring method 200 shown in fig. 2 and the acquiring method 400 shown in fig. 4. Specifically, taking the obtaining method 200 as an example, the obtaining method 500 further includes, executed after step S230:
and step S510, acquiring the electricity utilization characteristic parameters and the electricity utilization data of the new user.
And step S520, updating the threshold value according to the electricity utilization characteristic parameters and the electricity utilization data of the new user.
Specifically, firstly, determining the user category of a new user according to the power utilization characteristic parameters of the new user and a user classification table; then adding the electricity utilization data of the new user into the electricity utilization data of the user category to which the new user belongs to form a new sample; and finally, calculating the mean value of the new sample to serve as a new threshold value.
According to the method for acquiring the electricity stealing detection threshold value, when a new user is added into the power grid, the threshold value can be updated in real time, and the threshold value precision is ensured.
The application also provides an electricity stealing checking method which can monitor whether a user steals electricity in real time based on the obtaining method according to the electricity stealing checking threshold value. Fig. 6 is a schematic flow chart of a power stealing checking method provided in the first exemplary embodiment of the present application. As shown in fig. 6, the electricity stealing checking method 600 includes:
and step S610, acquiring the electricity utilization characteristic parameters and the electricity utilization data of the target user.
And S620, determining the user category of the target user according to the power utilization characteristic parameters and the user classification table.
Specifically, the electricity utilization characteristic parameters of the target user are matched with each category in the user classification table, and when the electricity utilization characteristic parameters are completely matched with a certain category, the target user is determined to belong to the certain category. For example, referring to fig. 3, when the electricity type of the target user is electricity for teaching in primary and secondary schools, the electricity consumption level is 500kVA, and the connection mode is a three-phase three-wire system, it is determined that the target user belongs to the user category of "electricity for teaching in primary and secondary schools-500 kVA-three-phase three-wire system".
Step S630, determining whether the target user has an electricity stealing behavior according to the threshold of the electricity data corresponding to the user category and the electricity data, where the threshold of the electricity data is obtained according to the method for obtaining the electricity stealing check threshold provided in any of the embodiments.
In one embodiment, the electricity usage data includes a plurality of parameter values reflecting a degree of fluctuation of the electricity data during the electricity usage; the threshold value of the electricity consumption data includes a plurality of parameter threshold values in one-to-one correspondence with a plurality of parameter values. In this case, step S630 is specifically executed as: counting the number of the parameter values which are more than or equal to the corresponding parameter threshold; and when the number is greater than or equal to the number threshold value, determining that the electricity stealing behavior exists in the current user.
The number threshold is set reasonably according to actual needs, and may be any value greater than or equal to 1.
According to the electricity stealing detection method provided by the embodiment, the electricity stealing detection behavior of the user can be monitored in real time at the power monitoring and management system, which is equivalent to a server. On one hand, the monitoring is real-time; on the other hand, hardware and software do not need to be installed at the user side, so that the cost is saved; on the other hand, the development of an intelligent power grid is promoted, and the intelligent level of the power monitoring and management system 11 is improved.
Fig. 7 is a flowchart illustrating a method for checking electricity stealing according to a second exemplary embodiment of the present application. As shown in fig. 7, the electricity stealing checking method 700 further includes a step S710 performed before the step S630 and a step S720 performed after the step S630 on the basis of the electricity stealing checking method 600.
Step S710, obtaining the geographical location information of the target user. The execution order of step S710 and step S610 may be interchanged.
And step S720, when the current user is determined to have the electricity stealing behavior, displaying the geographical position information of the current user and giving an alarm.
According to the electricity stealing checking method provided by the embodiment, the electricity stealing users can be conveniently and quickly positioned by the power supervision department, so that the electricity stealing problem is timely solved.
Exemplary devices
Fig. 8 is a schematic structural diagram of an apparatus for acquiring a power stealing threshold according to a first exemplary embodiment of the present application. As shown in fig. 8, the electricity stealing threshold checking and acquiring device 80 includes: an obtaining module 81, configured to obtain power consumption characteristic parameters and power consumption data of multiple users; the determining module 82 is configured to determine a user category to which each user belongs according to the power utilization characteristic data in combination with a user classification table, where the user classification table includes a correspondence between users and user categories in a value range of the power utilization characteristic parameter; the calculating module 83 is configured to calculate an average value of the power consumption data of the users of the same category in the user classification table, so as to be used as a threshold for measuring whether the user of the current user category steals power.
In one embodiment, the user classification table includes a plurality of levels, and the electricity usage characteristic parameter includes a plurality of parameters respectively corresponding to the plurality of levels. Wherein each level comprises a plurality of classifications according to different divisions of corresponding parameters; one of the categories in a lowest one of the plurality of levels corresponds to a user category.
In one embodiment, the electricity utilization characteristic parameter includes one or more of the following parameter information in combination: the type of electricity used, the grade of electricity used and the wiring mode.
In one embodiment, the electricity utilization types comprise at least two of urban resident living electricity utilization, large industrial electricity utilization, non-resident lighting electricity utilization, agricultural irrigation and drainage electricity utilization, agricultural production electricity utilization, common industrial electricity utilization, commercial electricity utilization, rural resident living electricity utilization and middle and primary school teaching electricity utilization; and/or the power consumption grade comprises at least two of 50kVA or below, 100kVA, 200kVA, 315kVA, 500kVA, 800kVA, 1000kVA and seven grades above; and/or the wiring patterns include three-phase three-wire and three-phase four-wire.
In one embodiment, the obtaining module 81 is further configured to obtain electrical data of a plurality of users collected by the electric energy metering device; the calculation module 83 is further configured to calculate power consumption data based on the electrical data, where the power consumption data reflects a fluctuation degree of the electrical data in a power consumption process.
In one embodiment, the electrical data includes: at least one of three-phase power, three-phase voltage, three-phase current, three-phase power factor and zero-sequence current; and/or, the electricity usage data comprises: at least one of power unbalance, current unbalance, voltage unbalance, power sudden drop coefficient, current sudden drop coefficient, voltage sudden drop coefficient, normal production power factor effective value and normal production zero sequence current effective value.
In one embodiment, the acquisition device 80 further includes a pre-processing module 84. The preprocessing module 84 specifically includes: the conversion unit 841 is used for converting the electrical data into a secondary value according to the rated transformation ratio of the transformer corresponding to the electric energy metering device; a noise reduction unit 842 for performing noise reduction processing on the secondary value; and the interpolation unit 843 is configured to perform interpolation calculation on the noise-reduced secondary value to obtain preprocessed electrical data.
In an embodiment, the calculating module 83 is specifically configured to calculate the mean value of the power consumption data for the users of the same user category in the user classification table by using a regression analysis method.
In one embodiment, the obtaining module 81 is further configured to obtain the electricity utilization characteristic parameters and the electricity utilization data of the new user; and an updating module 85, wherein the user updates the threshold according to the electricity utilization characteristic parameters and the electricity utilization data of the new user.
The device 80 for obtaining the electricity stealing detection threshold provided by the embodiment of the application and the method for obtaining the electricity stealing detection threshold provided by the embodiment of the application belong to the same inventive concept, can execute the method for obtaining the electricity stealing detection threshold provided by any embodiment of the application, and has the corresponding functional modules and beneficial effects of the method for obtaining the electricity stealing detection threshold. For details of the technology not described in detail in this embodiment, reference may be made to the method for checking the electricity stealing threshold provided in the embodiment of the present application, and details are not described here again.
Fig. 9 is a schematic structural diagram of an apparatus for acquiring a theft detection threshold according to a second exemplary embodiment of the present application. As shown in fig. 9, the electricity stealing checking device 90 includes: the acquiring module 91 is used for acquiring the electricity utilization characteristic parameters and the electricity utilization data of the target user; the first determining module 92 is used for determining the user category of the target user according to the electricity utilization characteristic parameters and the user classification table; the second determining module 93 is configured to determine whether a target user has an electricity stealing behavior according to the threshold of the electricity consumption data corresponding to the user category and the electricity consumption data, where the threshold of the electricity consumption data is obtained according to the method for obtaining the electricity stealing checking threshold provided in any embodiment of the present application.
In one embodiment, the electricity usage data includes a plurality of parameter values reflecting a degree of fluctuation of the electricity data during the electricity usage; the threshold value of the electricity consumption data includes a plurality of parameter threshold values in one-to-one correspondence with a plurality of parameter values. The second determining module 93 specifically includes: a counting unit 931 configured to count the number of the plurality of parameter values that is greater than or equal to the corresponding parameter threshold; a determining unit 932, configured to determine that there is electricity stealing behavior for the current user when the number is greater than or equal to the number threshold.
In one embodiment, the electricity stealing detection device 90 further comprises: and the display module 94 is used for displaying the geographical position information of the current user and giving an alarm when the current user is determined to have the electricity stealing behavior.
The electricity stealing checking device 90 provided by the embodiment of the application and the electricity stealing checking method provided by the embodiment of the application belong to the same invention concept, can execute the electricity stealing checking method provided by any embodiment of the application, and has corresponding functional modules and beneficial effects for executing the electricity stealing checking method. For details of the technology that are not described in detail in this embodiment, reference may be made to the electricity stealing detection method provided in the embodiment of the present application, and details are not described here again.
Exemplary electronic device
Next, an electronic apparatus provided in an embodiment of the present application is described with reference to fig. 10. The electronic device 100 may be a server in the power monitoring management system 11 or the electric energy metering device 12.
FIG. 10 illustrates a block diagram of an electronic device in accordance with an embodiment of the present application.
As shown in fig. 10, the electronic device 100 includes one or more processors 101 and memory 102.
The processor 101 may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device 100 to perform desired functions.
Memory 102 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, Random Access Memory (RAM), cache memory (cache), and/or the like. The non-volatile memory may include, for example, Read Only Memory (ROM), hard disk, flash memory, etc. One or more computer program instructions may be stored on the computer-readable storage medium and executed by the processor 101 to implement the above-described electricity stealing threshold obtaining method and/or electricity stealing detecting method of the various embodiments of the present application, and/or other desired functions. Various contents such as an input signal, a signal component, a noise component, etc. may also be stored in the computer-readable storage medium.
In one example, the electronic device 100 may further include: an input device 103 and an output device 104, which are interconnected by a bus system and/or other form of connection mechanism (not shown).
For example, the input device 103 may be a microphone or a microphone array as described above for capturing an input signal of a sound source. When the electronic device is a stand-alone device, the input device 103 may be a communication network connector for receiving the collected input signal from between the power monitoring management system 11 and the electric energy metering device 12.
The input device 103 may also include, for example, a keyboard, a mouse, and the like.
The output device 104 may output various information including the determined distance information, direction information, and the like to the outside. The output devices 104 may include, for example, a display, speakers, a printer, and a communication network and its connected remote output devices, among others.
Of course, for the sake of simplicity, only some of the components related to the present application in the electronic apparatus 100 are shown in fig. 10, and components such as a bus, an input/output interface, and the like are omitted. In addition, electronic device 100 may include any other suitable components depending on the particular application.
Exemplary computer program product and computer-readable storage Medium
In addition to the above-described methods and apparatus, embodiments of the present application may also be a computer program product comprising computer program instructions which, when executed by a processor, cause the processor to perform the method of obtaining a hacking threshold and/or the steps of the method of checking for hacking according to various embodiments of the present application described in the "exemplary methods" section of this specification above.
The computer program product may be written with program code for performing the operations of embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium having stored thereon computer program instructions, which, when executed by a processor, cause the processor to perform the method for obtaining a hacking threshold and/or the steps in the method for checking for hacking according to various embodiments of the present application described in the "exemplary methods" section above in this specification.
The computer-readable storage medium may take any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing describes the general principles of the present application in conjunction with specific embodiments, however, it is noted that the advantages, effects, etc. mentioned in the present application are merely examples and are not limiting, and they should not be considered essential to the various embodiments of the present application. Furthermore, the foregoing disclosure of specific details is for the purpose of illustration and description and is not intended to be limiting, since the foregoing disclosure is not intended to be exhaustive or to limit the disclosure to the precise details disclosed.
The block diagrams of devices, apparatuses, systems referred to in this application are only given as illustrative examples and are not intended to require or imply that the connections, arrangements, configurations, etc. must be made in the manner shown in the block diagrams. These devices, apparatuses, devices, systems may be connected, arranged, configured in any manner, as will be appreciated by those skilled in the art. Words such as "including," "comprising," "having," and the like are open-ended words that mean "including, but not limited to," and are used interchangeably therewith. The words "or" and "as used herein mean, and are used interchangeably with, the word" and/or, "unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
It should also be noted that in the devices, apparatuses, and methods of the present application, the components or steps may be decomposed and/or recombined. These decompositions and/or recombinations are to be considered as equivalents of the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. An acquisition method for a power stealing check threshold is characterized by comprising the following steps:
acquiring power utilization characteristic parameters and power utilization data of a plurality of users;
determining a user category to which each user belongs according to the electricity utilization characteristic parameters and a user classification table, wherein the user classification table comprises a corresponding relation between the users and the user categories in a value interval of the electricity utilization characteristic parameters;
and respectively calculating the average value of the power consumption data of the users of the same user category in the user classification table to serve as a threshold value for measuring whether the users of the current user category steal power.
2. The method according to claim 1, wherein the user classification table includes a plurality of levels, and the electricity utilization characteristic parameter includes a plurality of parameters respectively corresponding to the plurality of levels;
wherein each of the levels comprises a plurality of classifications according to different divisions of the corresponding parameter; one of the classifications in a lowest one of the plurality of levels corresponds to one of the user categories.
3. The method for acquiring and constructing electricity stealing threshold according to claim 1, further comprising, before the acquiring the electricity utilization characteristic parameters and the electricity utilization data of a plurality of users:
acquiring electrical data of the plurality of users acquired by the electric energy metering device;
and calculating the electricity utilization data based on the electrical data, wherein the electricity utilization data reflects the fluctuation degree of the electrical data in the electricity utilization process.
4. The method for acquiring the electricity stealing detection threshold according to claim 3, wherein the electricity utilization characteristic parameter comprises one or more of the following parameter information: electricity type, electricity consumption grade and wiring mode; and/or
The electricity consumption data includes: at least one of power unbalance, current unbalance, voltage unbalance, power sudden drop coefficient, current sudden drop coefficient, voltage sudden drop coefficient, normal production power factor effective value and normal production zero sequence current effective value; and/or
The electrical data includes: at least one of three-phase power, three-phase voltage, three-phase current, three-phase power factor and zero-sequence current.
5. The method for obtaining the electricity stealing detection threshold according to claim 3, further comprising the step of preprocessing the electrical data before the step of calculating the electricity utilization data based on the electrical data;
preprocessing the electrical data includes:
the electrical data are reduced into secondary values according to the rated transformation ratio of the transformer corresponding to the electric energy metering device;
carrying out noise reduction processing on the secondary value;
and carrying out interpolation calculation on the secondary values after the noise reduction treatment to obtain the preprocessed electrical data.
6. The method according to claim 1, wherein the calculating the average of the power consumption data of the users in the same user category in the user classification table comprises:
and calculating the mean value of the power utilization data respectively aiming at the users of the same user category in the user classification table by utilizing a regression analysis method.
7. The method for acquiring the electricity stealing check threshold according to claim 1, further comprising:
acquiring the electricity utilization characteristic parameters and the electricity utilization data of a new user;
and updating the threshold according to the electricity utilization characteristic parameters and the electricity utilization data of the new user.
8. An acquisition device for checking a power stealing threshold, comprising:
the acquisition module is used for acquiring the electricity utilization characteristic parameters and the electricity utilization data of a plurality of users;
the determining module is used for determining a user category to which each user belongs according to the power utilization characteristic data and a user classification table, wherein the user classification table comprises a corresponding relation between the user and the user category in a value interval of the power utilization characteristic parameter;
and the calculation module is used for calculating the average value of the power consumption data of the users in the same category in the user classification table respectively to be used as a threshold value for measuring whether the users in the current user category steal power or not.
9. A computer device comprising a memory, a processor and a computer program stored on the memory for execution by the processor, characterized in that the processor, when executing the computer program, implements the steps of the method of obtaining a power stealing threshold as claimed in any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for obtaining a power stealing threshold as claimed in any one of claims 1 to 7.
CN202011546989.8A 2020-12-24 2020-12-24 Acquisition method and device for electricity stealing checking threshold value, and electricity stealing checking device and method Pending CN112633692A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011546989.8A CN112633692A (en) 2020-12-24 2020-12-24 Acquisition method and device for electricity stealing checking threshold value, and electricity stealing checking device and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011546989.8A CN112633692A (en) 2020-12-24 2020-12-24 Acquisition method and device for electricity stealing checking threshold value, and electricity stealing checking device and method

Publications (1)

Publication Number Publication Date
CN112633692A true CN112633692A (en) 2021-04-09

Family

ID=75324241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011546989.8A Pending CN112633692A (en) 2020-12-24 2020-12-24 Acquisition method and device for electricity stealing checking threshold value, and electricity stealing checking device and method

Country Status (1)

Country Link
CN (1) CN112633692A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117147958A (en) * 2023-08-23 2023-12-01 广东电网有限责任公司佛山供电局 Method and device for discriminating electricity larceny based on real-time electricity utilization monitoring

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117147958A (en) * 2023-08-23 2023-12-01 广东电网有限责任公司佛山供电局 Method and device for discriminating electricity larceny based on real-time electricity utilization monitoring

Similar Documents

Publication Publication Date Title
CN114298863B (en) Data acquisition method and system of intelligent meter reading terminal
Kang et al. Big data analytics in China's electric power industry: modern information, communication technologies, and millions of smart meters
US9194899B2 (en) Utility network and revenue assurance
CN110097297A (en) A kind of various dimensions stealing situation Intellisense method, system, equipment and medium
CN108376982B (en) Load phase sequence identification method and device
CN110806518B (en) Transformer area line loss abnormal motion analysis module and operation method thereof
CN112131441B (en) Method and system for rapidly identifying abnormal electricity consumption behavior
CN109270482B (en) Online evaluation method for metering accuracy of voltage transformer and terminal equipment
CN108198408B (en) Self-adaptive anti-electricity-stealing monitoring method and system based on electricity information acquisition system
CN108197774B (en) Distributed photovoltaic power generation capacity abnormity diagnosis method and device
CN109085454B (en) Intelligent measurement cross-family discrimination method based on big data analysis
CN111008193A (en) Data cleaning and quality evaluation method and system
CN114519514A (en) Low-voltage transformer area reasonable line loss value measuring and calculating method, system and computer equipment
CN113033617A (en) Deep mining analysis method based on line loss data of big data transformer area
CN112633692A (en) Acquisition method and device for electricity stealing checking threshold value, and electricity stealing checking device and method
Lu et al. The development of a smart distribution grid testbed for integrated information management systems
CN116522746A (en) Power distribution hosting method for high-energy-consumption enterprises
CN113269478B (en) Concentrator abnormal data reminding method and system based on multiple models
CN114839462A (en) Intelligent anti-electricity-stealing monitoring method and system
CN115166625A (en) Intelligent ammeter error estimation method and device
CN110873857B (en) Intelligent electric energy meter running state evaluation method and system based on multi-source data fusion
CN114184996A (en) Method, device and equipment for identifying metering abnormal behaviors of low-voltage transformer area intelligent electric meter and storage medium
CN113888360A (en) Method, device, equipment and storage medium for identifying electricity stealing users
CN111967747A (en) Power consumer power failure influence assessment method and device and storage medium
CN113376456A (en) Cloud platform-based method for analyzing and managing electric quantity and electric charge of large electric power user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination