CN112733456A - Electricity stealing prevention behavior identification method and system - Google Patents

Electricity stealing prevention behavior identification method and system Download PDF

Info

Publication number
CN112733456A
CN112733456A CN202110057744.7A CN202110057744A CN112733456A CN 112733456 A CN112733456 A CN 112733456A CN 202110057744 A CN202110057744 A CN 202110057744A CN 112733456 A CN112733456 A CN 112733456A
Authority
CN
China
Prior art keywords
user
electricity stealing
electricity
evaluation index
suspected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110057744.7A
Other languages
Chinese (zh)
Other versions
CN112733456B (en
Inventor
王雍
张世林
李伟
姚琼琼
罗辉勇
李会君
杨蕾
谢延军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Henan Electric Power Co Marketing Service Center
State Grid Corp of China SGCC
State Grid Henan Electric Power Co Ltd
Original Assignee
State Grid Henan Electric Power Co Marketing Service Center
State Grid Corp of China SGCC
State Grid Henan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Henan Electric Power Co Marketing Service Center, State Grid Corp of China SGCC, State Grid Henan Electric Power Co Ltd filed Critical State Grid Henan Electric Power Co Marketing Service Center
Priority to CN202110057744.7A priority Critical patent/CN112733456B/en
Publication of CN112733456A publication Critical patent/CN112733456A/en
Application granted granted Critical
Publication of CN112733456B publication Critical patent/CN112733456B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • G06F30/27Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Evolutionary Computation (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Artificial Intelligence (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Operations Research (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Public Health (AREA)
  • Molecular Biology (AREA)
  • Computational Linguistics (AREA)
  • Biophysics (AREA)
  • Mathematical Physics (AREA)
  • Biomedical Technology (AREA)
  • Data Mining & Analysis (AREA)
  • Water Supply & Treatment (AREA)
  • Primary Health Care (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Geometry (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses an electric larceny prevention behavior identification method and system, wherein the method comprises the steps of obtaining historical electric utilization evaluation index parameter data of a user; constructing a suspected electricity stealing user identification model; adopting a suspected electricity stealing user identification model to identify suspected electricity stealing users; and verifying suspected electricity stealing users by combining the transverse data of the user electricity utilization evaluation index parameters to determine the electricity stealing users. This application can be according to electric wire netting historical data, under the condition that power line does not appear the hardware damage, according to the user power consumption evaluation index parameter data preliminary judgement user's power consumption state that electric wire netting data platform gathered, the prediction user steals electric action, carries out many-sided branch institute to the power consumption user to reduce search range, improve anti-electricity-stealing work efficiency.

Description

Electricity stealing prevention behavior identification method and system
Technical Field
The invention belongs to the technical field of power utilization evaluation index parameter data monitoring, and relates to a method and a system for identifying anti-electricity-stealing behaviors.
Background
Aiming at the characteristics of specialization and concealment of the current electricity stealing behavior, the electricity stealing prevention technology gradually changes to intellectualization.
Conventional means for preventing electricity theft include: firstly, the cabinet is installed and locked at the place where the electric energy meter is installed, so that a user cannot contact the electric energy meter, and the electricity stealing behavior can be effectively prevented. However, in some remote areas this method is difficult to use and requires constant inspection by personnel. And secondly, the problem that the electric energy meter is easy to pry and recover is improved, the sealing position of the electric energy meter is sealed again, unified numbering is adopted, and management is enhanced. And thirdly, by adopting the intelligent electric energy meter, although the theoretical outstanding advantages of the intelligent electric energy meter have good effect in the field of electricity stealing prevention, in practical use, due to the fact that the intelligent electric energy meter is limited by the influences of transmission speed, information quantity and the like at present, abnormal operation events such as voltage loss, current loss, phase failure, power failure, voltage reverse phase sequence and the like stored and recorded by the intelligent electric energy meter cannot be uploaded to relevant departments in time, and automatic alarm cannot be completely realized when electricity stealing behaviors occur.
In addition, the background analysis and processing capability of the existing power utilization information acquisition system needs to be further improved.
Disclosure of Invention
In order to overcome the defects in the prior art, the application provides the electric larceny prevention behavior identification method and the electric larceny prevention behavior identification system, the diagnosis effect is good, and various branches can be performed on the electricity utilization user, so that the search range is narrowed, and the work efficiency of electric larceny prevention is improved.
In order to achieve the above purpose, the invention adopts the following technical scheme:
an anti-electricity-stealing behavior identification method is characterized in that:
the method comprises the following steps:
step 1: acquiring historical power utilization evaluation index parameter data of a user;
step 2: establishing and training a suspected electricity stealing user identification model based on the historical electricity utilization evaluation index parameter data of the user;
and step 3: adopting a suspected electricity stealing user identification model to identify suspected electricity stealing users;
and 4, step 4: and verifying suspected electricity stealing users by combining the transverse data of the user electricity utilization evaluation index parameters to determine the electricity stealing users.
The invention further comprises the following preferred embodiments:
preferably, the user historical electricity utilization evaluation index parameter data obtained in step 1 include electricity consumption, power consumption factors, three-phase voltage unbalance rates, three-phase current unbalance rates, meter types and flag bits of whether electricity is stolen or not of electricity stealing users and normal users.
Preferably, the method further comprises the following steps: and 5: and issuing a checking list of the electricity stealing users for manual checking.
Preferably, the method further comprises the following steps: and storing and displaying the data of each step so as to facilitate the user query and retraining of the suspected electricity stealing user identification model.
Preferably, step 2 specifically comprises:
step 2.1: normalizing the historical power utilization evaluation index parameter data of the user:
the raw data is linearly transformed by dispersion normalization, so that the result is mapped between [0-1], and the conversion function is as follows:
Figure BDA0002901237480000021
wherein x is historical power utilization evaluation index parameter data of the user, x is a processed value, max is the maximum value of the sample data, and min is the minimum value of the sample data;
step 2.2: and constructing and training a suspected electricity stealing user identification model.
Preferably, in step 2.2, a suspected electricity stealing user identification model is constructed based on the BP neural network:
Figure BDA0002901237480000022
θ2=θ2+β·(Ypred-Yreal)·Ypred·(1-Ypred)
Figure BDA0002901237480000023
Figure BDA0002901237480000024
wherein α and β are learning rates; a is a constant;
Figure BDA0002901237480000025
a threshold for the jth neuron of the hidden layer;
Figure BDA0002901237480000026
the connection weight value from the ith neuron to the jth neuron of the hidden layer; hjAnd IiOutputting a vector for a sample of the hidden layer; theta2Is the bias value of the output layer node;
Figure BDA0002901237480000027
the bias value of the output layer where the jth neuron is located; y ispred、YrealThe predicted target and the target are output respectively.
Preferably, in step 2.2, in the training process, the target output of the BP neural network is obtained: real electricity consumption Yreal
If the target output YrealAnd predicted target YpredAnd if the error between the training iterations is smaller than a set error threshold value or the training iteration number reaches a preset threshold value, completing model training.
The invention also discloses an anti-electricity-stealing behavior identification system, which comprises:
the data acquisition module is used for acquiring historical user power utilization evaluation index parameter data;
the model building module is used for building and training a suspected electricity stealing user identification model based on the historical electricity utilization evaluation index parameter data of the user;
the identification module is used for identifying suspected electricity stealing users on the basis of the suspected electricity stealing user identification model;
and the verification module is used for verifying suspected electricity stealing users by combining the transverse data of the user electricity utilization evaluation index parameters and determining the electricity stealing users.
The beneficial effect that this application reached:
this application can be according to electric wire netting historical data, under the condition that power line does not appear the hardware damage, according to the user power consumption evaluation index parameter data preliminary judgement user's power consumption state that electric wire netting data platform gathered, the prediction user steals electric action, carries out many-sided branch institute to the power consumption user to reduce search range, improve anti-electricity-stealing work efficiency.
Drawings
FIG. 1 is a flow chart of an anti-electricity-stealing behavior identification method of the present invention;
fig. 2 is a diagram of a suspected electricity stealing user identification model in the embodiment of the present invention.
Detailed Description
The present application is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present application is not limited thereby.
As shown in fig. 1, the method for identifying electricity stealing prevention of the present invention is characterized in that:
the method comprises the following steps:
step 1: and acquiring historical power utilization evaluation index parameter data of the user, wherein the historical power utilization evaluation index parameter data comprise power consumption, power consumption factors, three-phase voltage unbalance rates, three-phase current unbalance rates, meter types and flag bits of whether power is stolen or not of the power stealing user and a normal user.
Step 2: based on the historical power utilization evaluation index parameter data of the user, a suspected power-stealing user identification model is constructed and trained, and the method specifically comprises the following steps:
step 2.1: normalizing the historical power utilization evaluation index parameter data of the user;
the raw data is linearly transformed by dispersion Normalization (Min-Max Normalization) to map the results between [0-1], with the following transfer function:
Figure BDA0002901237480000041
wherein x is historical power utilization evaluation index parameter data of the user, x is a processed value, max is the maximum value of the sample data, and min is the minimum value of the sample data.
Step 2.2: and (3) constructing and training a suspected electricity stealing user identification model, randomly disordering dimensionality reduction data before training the BP neural network model each time, selecting 80% of the dimensionality reduction data as training samples, using the rest 20% of the dimensionality reduction data as test samples, and enabling the iteration times to be 5000 times.
As shown in fig. 2, in the embodiment of the present invention, a suspected electricity-stealing user identification model is constructed based on a BP neural network:
Figure BDA0002901237480000042
θ2=θ2+β·(Ypred-Yreal)·Ypred·(1-Ypred)
Figure BDA0002901237480000043
Figure BDA0002901237480000044
wherein α and β are learning rates; a is a constant generally selected from 1-10;
Figure BDA0002901237480000045
a threshold for the jth neuron of the hidden layer;
Figure BDA0002901237480000046
the connection weight value from the ith neuron to the jth neuron of the hidden layer; theta2Is the bias value of the output layer node;
Figure BDA0002901237480000047
the bias value of the output layer where the jth neuron is located; hjAnd IiOutputting a vector for a sample of the hidden layer;
and the results of all layers are output by mapping layer by layer among the three layers of the input layer, the hidden layer and the output layer and adjusting by a weight matrix among the layers.
In the training process, obtaining the target output of the BP neural network: real electricity consumption Yreal
If the target output YrealAnd predicted target YpredThe error between the training iteration times is less than the set error threshold value or the training iteration times reachAnd finishing model training by a preset threshold value.
And step 3: inputting the data in the step 1 by adopting a suspected electricity stealing user identification model, and outputting the real electricity consumption YrealIf the error is larger, a suspected electricity stealing user is identified;
and 4, step 4: and verifying suspected electricity stealing users by combining the transverse data of the user electricity utilization evaluation index parameters, namely the data of the users with the same electricity utilization type in the same area, and determining the electricity stealing users.
The specific embodiment of the present invention may further include: and 5: and issuing a checking list of the electricity stealing users for manual checking.
And storing the data of each step by adopting an Excel database management system, inputting the read Excel target file and displaying the data on an interface of a software platform so as to facilitate user query and retraining of a suspected electricity stealing user identification model.
The invention relates to an anti-electricity-stealing behavior identification system, which comprises:
the data acquisition module is used for acquiring historical user power utilization evaluation index parameter data;
the model building module is used for building and training a suspected electricity stealing user identification model based on the historical electricity utilization evaluation index parameter data of the user;
the identification module is used for identifying suspected electricity stealing users on the basis of the suspected electricity stealing user identification model;
and the verification module is used for verifying suspected electricity stealing users by combining the transverse data of the user electricity utilization evaluation index parameters and determining the electricity stealing users.
This application can be according to electric wire netting historical data, under the condition that power line does not appear the hardware damage, according to the user power consumption evaluation index parameter data preliminary judgement user's power consumption state that electric wire netting data platform gathered, the prediction user steals electric action, carries out many-sided branch institute to the power consumption user to reduce search range, improve anti-electricity-stealing work efficiency.
The present applicant has described and illustrated embodiments of the present invention in detail with reference to the accompanying drawings, but it should be understood by those skilled in the art that the above embodiments are merely preferred embodiments of the present invention, and the detailed description is only for the purpose of helping the reader to better understand the spirit of the present invention, and not for limiting the scope of the present invention, and on the contrary, any improvement or modification made based on the spirit of the present invention should fall within the scope of the present invention.

Claims (8)

1. An anti-electricity-stealing behavior identification method is characterized in that:
the method comprises the following steps:
step 1: acquiring historical power utilization evaluation index parameter data of a user;
step 2: establishing and training a suspected electricity stealing user identification model based on the historical electricity utilization evaluation index parameter data of the user;
and step 3: adopting a suspected electricity stealing user identification model to identify suspected electricity stealing users;
and 4, step 4: and verifying suspected electricity stealing users by combining the transverse data of the user electricity utilization evaluation index parameters to determine the electricity stealing users.
2. The electricity stealing behavior identification method according to claim 1, wherein:
the user historical electricity utilization evaluation index parameter data obtained in the step 1 comprise electricity consumption, power consumption factors, three-phase voltage unbalance rates, three-phase current unbalance rates, meter types and flag bits of whether electricity is stolen or not of electricity stealing users and normal users.
3. The electricity stealing behavior identification method according to claim 1, wherein:
further comprising: and 5: and issuing a checking list of the electricity stealing users for manual checking.
4. The electricity stealing behavior identification method according to claim 1, wherein:
further comprising: and storing and displaying the data of each step so as to facilitate the user query and retraining of the suspected electricity stealing user identification model.
5. The electricity stealing behavior identification method according to claim 1, wherein:
the step 2 specifically comprises the following steps:
step 2.1: normalizing the historical power utilization evaluation index parameter data of the user:
the raw data is linearly transformed by dispersion normalization, so that the result is mapped between [0-1], and the conversion function is as follows:
Figure FDA0002901237470000011
wherein x is historical power utilization evaluation index parameter data of the user, x is a processed value, max is the maximum value of the sample data, and min is the minimum value of the sample data;
step 2.2: and constructing and training a suspected electricity stealing user identification model.
6. An electricity stealing behavior recognition method according to claim 5, characterized in that:
in step 2.2, a suspected electricity stealing user identification model is constructed based on the BP neural network:
Figure FDA0002901237470000021
θ2=θ2+β·(Ypred-Yreal)·Ypred·(1-Ypred)
Figure FDA0002901237470000022
Figure FDA0002901237470000023
wherein α and β are learning rates; a is a constant;
Figure FDA0002901237470000024
a threshold for the jth neuron of the hidden layer;
Figure FDA0002901237470000025
the connection weight value from the ith neuron to the jth neuron of the hidden layer; hjAnd IiOutputting a vector for a sample of the hidden layer; theta2Is the bias value of the output layer node;
Figure FDA0002901237470000026
the bias value of the output layer where the jth neuron is located; y ispred、YrealThe predicted target and the target are output respectively.
7. An electricity stealing behavior recognition method according to claim 6, characterized in that:
in step 2.2, in the training process, the target output of the BP neural network is obtained: real electricity consumption Yreal
If the target output YrealAnd predicted target YpredAnd if the error between the training iterations is smaller than a set error threshold value or the training iteration number reaches a preset threshold value, completing model training.
8. An electric larceny behavior recognizing system of an electric larceny behavior recognizing method according to any one of claims 1 to 7, characterized in that:
the system comprises:
the data acquisition module is used for acquiring historical user power utilization evaluation index parameter data;
the model building module is used for building and training a suspected electricity stealing user identification model based on the historical electricity utilization evaluation index parameter data of the user;
the identification module is used for identifying suspected electricity stealing users on the basis of the suspected electricity stealing user identification model;
and the verification module is used for verifying suspected electricity stealing users by combining the transverse data of the user electricity utilization evaluation index parameters and determining the electricity stealing users.
CN202110057744.7A 2021-03-17 2021-03-17 Electricity stealing prevention behavior identification method and system Active CN112733456B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110057744.7A CN112733456B (en) 2021-03-17 2021-03-17 Electricity stealing prevention behavior identification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110057744.7A CN112733456B (en) 2021-03-17 2021-03-17 Electricity stealing prevention behavior identification method and system

Publications (2)

Publication Number Publication Date
CN112733456A true CN112733456A (en) 2021-04-30
CN112733456B CN112733456B (en) 2022-10-14

Family

ID=75591739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110057744.7A Active CN112733456B (en) 2021-03-17 2021-03-17 Electricity stealing prevention behavior identification method and system

Country Status (1)

Country Link
CN (1) CN112733456B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114154999A (en) * 2021-10-27 2022-03-08 国网河北省电力有限公司营销服务中心 Electricity stealing prevention method, device, terminal and storage medium
CN116701947A (en) * 2023-08-02 2023-09-05 成都汉度科技有限公司 Method and system for detecting electricity stealing behavior

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7460149B1 (en) * 2007-05-28 2008-12-02 Kd Secure, Llc Video data storage, search, and retrieval using meta-data and attribute data in a video surveillance system
RU149834U1 (en) * 2014-07-04 2015-01-20 Мисак Оганесович Хидирян ALARM SYSTEM WITH ALARM FUNCTION FUNCTION ON A COMPUTERIZED USER DEVICE
CN105573997A (en) * 2014-10-09 2016-05-11 普华讯光(北京)科技有限公司 Method and device for determining electric larceny suspect user
CN107966600A (en) * 2017-09-30 2018-04-27 国家电网公司 A kind of electricity anti-theft system and its electricity anti-theft method based on deep learning algorithm
CN109214464A (en) * 2018-09-28 2019-01-15 国网江苏省电力有限公司常州供电分公司 A kind of doubtful stealing customer identification device and recognition methods based on big data
CN110223196A (en) * 2019-06-04 2019-09-10 国网浙江省电力有限公司电力科学研究院 Analysis method of opposing electricity-stealing based on typical industry feature database and sample database of opposing electricity-stealing
WO2019181313A1 (en) * 2018-03-23 2019-09-26 日本電気株式会社 Combination search system, information processing device, method, and program
CN111126820A (en) * 2019-12-17 2020-05-08 国网山东省电力公司电力科学研究院 Electricity stealing prevention method and system
CN111191909A (en) * 2019-12-26 2020-05-22 中国电力科学研究院有限公司 Electricity stealing identification system based on data analysis of typical electricity stealing industry and historical electricity stealing sample library

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7460149B1 (en) * 2007-05-28 2008-12-02 Kd Secure, Llc Video data storage, search, and retrieval using meta-data and attribute data in a video surveillance system
RU149834U1 (en) * 2014-07-04 2015-01-20 Мисак Оганесович Хидирян ALARM SYSTEM WITH ALARM FUNCTION FUNCTION ON A COMPUTERIZED USER DEVICE
CN105573997A (en) * 2014-10-09 2016-05-11 普华讯光(北京)科技有限公司 Method and device for determining electric larceny suspect user
CN107966600A (en) * 2017-09-30 2018-04-27 国家电网公司 A kind of electricity anti-theft system and its electricity anti-theft method based on deep learning algorithm
WO2019181313A1 (en) * 2018-03-23 2019-09-26 日本電気株式会社 Combination search system, information processing device, method, and program
CN109214464A (en) * 2018-09-28 2019-01-15 国网江苏省电力有限公司常州供电分公司 A kind of doubtful stealing customer identification device and recognition methods based on big data
CN110223196A (en) * 2019-06-04 2019-09-10 国网浙江省电力有限公司电力科学研究院 Analysis method of opposing electricity-stealing based on typical industry feature database and sample database of opposing electricity-stealing
CN111126820A (en) * 2019-12-17 2020-05-08 国网山东省电力公司电力科学研究院 Electricity stealing prevention method and system
CN111191909A (en) * 2019-12-26 2020-05-22 中国电力科学研究院有限公司 Electricity stealing identification system based on data analysis of typical electricity stealing industry and historical electricity stealing sample library

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曹峥等: "《BP 神经网络在反窃电系统中的研究与应用》", 《水电能源科学》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114154999A (en) * 2021-10-27 2022-03-08 国网河北省电力有限公司营销服务中心 Electricity stealing prevention method, device, terminal and storage medium
CN116701947A (en) * 2023-08-02 2023-09-05 成都汉度科技有限公司 Method and system for detecting electricity stealing behavior
CN116701947B (en) * 2023-08-02 2023-11-03 成都汉度科技有限公司 Method and system for detecting electricity stealing behavior

Also Published As

Publication number Publication date
CN112733456B (en) 2022-10-14

Similar Documents

Publication Publication Date Title
CN110108914B (en) Intelligent decision-making method, system, equipment and medium for preventing electricity stealing
CN112733456B (en) Electricity stealing prevention behavior identification method and system
Zhang et al. Power consumption predicting and anomaly detection based on transformer and K-means
CN112836738B (en) BP neural network-based electricity stealing behavior detection method
CN111092897B (en) Active immune attack recognition method and charging device
CN115378699A (en) Power grid state topology collaborative false data attack defense method
CN115891741A (en) Remote fault early warning method and device suitable for electric vehicle charging process
CN115049410A (en) Electricity stealing behavior identification method and device, electronic equipment and computer readable storage medium
CN117347796B (en) Intelligent gateway-based switching equipment partial discharge diagnosis system and method
CN116776209A (en) Method, system, equipment and medium for identifying operation state of gateway metering device
CN111060755A (en) Electromagnetic interference diagnosis method and device
CN114167837B (en) Intelligent fault diagnosis method and system for railway signal system
CN116609671A (en) Battery capacity prediction method, device, equipment and storage medium
CN116488914A (en) Dynamic authority access control method based on GCN-BiLSTM
CN115146735A (en) User power utilization anomaly identification
Pan et al. Study on intelligent anti–electricity stealing early-warning technology based on convolutional neural networks
CN114936703A (en) Marketing company financial violation prediction method based on improved Transformer model
Poudel et al. Artificial intelligence for energy fraud detection: a review
CN113076217A (en) Disk fault prediction method based on domestic platform
CN112884000A (en) Power utilization inspection intelligent diagnosis method and diagnosis system based on data mining
CN110658373A (en) Power distribution network electricity stealing monitoring method based on multi-algorithm fusion, model and readable storage medium
CN110837932A (en) Thermal power prediction method of solar heat collection system based on DBN-GA model
CN110826690A (en) Equipment state identification method and system and computer readable storage medium
CN117061255B (en) Intrusion detection method, model training method and device of power information system
CN117591942B (en) Power load data anomaly detection method, system, medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant