CN114722722A - Power consumption data anomaly detection method and system based on big data analysis - Google Patents

Power consumption data anomaly detection method and system based on big data analysis Download PDF

Info

Publication number
CN114722722A
CN114722722A CN202210451077.5A CN202210451077A CN114722722A CN 114722722 A CN114722722 A CN 114722722A CN 202210451077 A CN202210451077 A CN 202210451077A CN 114722722 A CN114722722 A CN 114722722A
Authority
CN
China
Prior art keywords
data
stealing
electricity
electricity stealing
data analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210451077.5A
Other languages
Chinese (zh)
Inventor
吴叶国
韩彧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Weiyan Technology Co ltd
Original Assignee
Shenzhen Weiyan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Weiyan Technology Co ltd filed Critical Shenzhen Weiyan Technology Co ltd
Priority to CN202210451077.5A priority Critical patent/CN114722722A/en
Publication of CN114722722A publication Critical patent/CN114722722A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • G06F30/27Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2119/00Details relating to the type or aim of the analysis or the optimisation
    • G06F2119/02Reliability analysis or reliability optimisation; Failure analysis, e.g. worst case scenario performance, failure mode and effects analysis [FMEA]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a big data analysis-based power consumption data anomaly detection method and system, and belongs to the field of power safety detection. The invention comprises the following steps: the method comprises the steps of integrating historical electricity stealing behaviors, obtaining historical electricity stealing data, and constructing an accurate electric electricity stealing identification and electricity stealing feedback data analysis model; measuring the accuracy of the accurate electric power stealing identification and electric power stealing feedback data analysis model through the covariance of standardized processing, and correcting the accurate identification and electric power stealing feedback data analysis model by using a loss function; and acquiring real-time power utilization data, and inputting the real-time power utilization data into an accurate identification and electricity stealing feedback data analysis model to obtain whether electricity stealing phenomena and line loss data exist. The user electricity stealing analysis method based on the big data is beneficial to efficient investigation and treatment of electricity stealing behaviors, and meanwhile, the analysis can be carried out on the electricity stealing behaviors, so that the line loss management of a power supply company is facilitated.

Description

Power consumption data anomaly detection method and system based on big data analysis
Technical Field
The invention relates to the field of electric power safety detection, in particular to a power utilization data abnormity detection method and system based on big data analysis.
Background
In recent years, along with the continuous development of economy in China, the scale of a power grid, the power supply range and the number of users are continuously enlarged, the power consumption of the users is also increased day by day, and illegal electricity stealing behaviors are difficult to avoid. The electricity stealing breaks the normal electricity utilization order, seriously affects the operation safety of a power grid, threatens the personal and property safety, and causes great economic loss to power supply enterprises and society due to the damage of power equipment such as a transformer and the like caused by electricity stealing and personal electric shock accidents.
The traditional investigation of electricity stealing users is mainly through carrying out manual person-by-person inspection on the transformer area with higher loss, thereby wasting time and labor, having huge workload, requiring more personnel for field inspection and having higher labor cost. Moreover, the checking work is lack of pertinence, the checking time of a single household is long, the report omission easily occurs, the workers are often required to go to the site for checking for many times, and the efficiency is low. Therefore, how to solve the above problems needs to be studied by those skilled in the art.
Disclosure of Invention
In view of this, the present invention provides a method and a system for detecting abnormal electricity consumption data based on big data analysis, so as to solve the problems existing in the background art.
In order to achieve the purpose, the invention adopts the following technical scheme:
a power utilization data anomaly detection method based on big data analysis comprises the following steps:
the method comprises the steps of integrating historical electricity stealing behaviors, obtaining historical electricity stealing data, and constructing an accurate electric electricity stealing identification and electricity stealing feedback data analysis model;
measuring the accuracy of the accurate electric power stealing identification and electric power stealing feedback data analysis model through the covariance of standardized processing, and correcting the accurate identification and electric power stealing feedback data analysis model by using a loss function;
and collecting real-time power utilization data, and inputting the real-time power utilization data into an accurate identification and electricity stealing feedback data analysis model to obtain whether an electricity stealing phenomenon exists and line loss data.
Optionally, the power stealing position is positioned by using a Bayesian algorithm according to the line loss data.
Optionally, according to the line loss data, statistics is carried out on whether the user i belongs to the line loss set C within M dayssusNumber of times MiDefining the expression of the suspicion degree of the user as;
λi=Mi/M;
finally according to suspicion degree lambdaiThe sizes are arranged in descending order to obtain the suspicion degree ranking p of the user to be detectedi(ii) a And finally, selecting a plurality of users with the top ranking for field inspection.
Optionally, collecting real-time power consumption, and using an A/D collecting circuit to collect power consumption data of a suspicious user by setting sampling frequency and input voltage; the acquisition and conversion of real-time electricity utilization data are completed through the A/D conversion chip.
Optionally, the method further comprises the step of eliminating line loss data caused by circuit reasons:
reading all line loss data, sequencing the line loss data from large to small, and extracting the first 5 percent;
judging the service life of the line, wherein the longer the service life of the line is, the higher the line loss is possibly;
judging power supply radius, and rejecting if the power supply radius exceeds the power supply radius
And judging whether the wire diameter is reasonable or not, and rejecting if the wire diameter is unreasonable.
Optionally, the power stealing position is located by using a bayesian algorithm, which specifically comprises the following steps:
Figure BDA0003618634590000021
wherein P (B)i) For subscriber B in lineiProbability of occurrence of power stealing, P (A) is probability of high line loss, P (A | B)i) For user BiThe probability of power theft and line loss is high.
Optionally, the historical electricity stealing data includes sudden change of electricity, abnormal current and strong magnetic interference events.
Optionally, the real-time power consumption data comprise zero line current, live line current, strong magnetic interference time, power consumption, voltage and transformer area line loss.
An electricity consumption data abnormity detection system based on big data analysis comprises
A model building module: the method is used for integrating historical electricity stealing behaviors, obtaining historical electricity stealing data and constructing an electric power electricity stealing accurate identification and electricity stealing feedback data analysis model;
a model correction module: the method is used for measuring the accuracy of the electric power stealing accurate identification and electric power stealing feedback data analysis model through the covariance of standardized processing, and correcting the accurate identification and electric power stealing feedback data analysis model by using a loss function;
the electricity stealing analysis module: the real-time power utilization data are input into the accurate identification and electricity stealing feedback data analysis model, and whether electricity stealing phenomena and line loss data exist or not are obtained.
Optionally, the system further comprises an electricity stealing positioning module: and the method is used for positioning the electricity stealing position by utilizing a Bayesian algorithm according to the line loss data.
Compared with the prior art, the invention discloses and provides the electricity consumption data anomaly detection method and system based on big data analysis, and the method and system have the following beneficial effects:
1. the user electricity stealing analysis method based on the big data is beneficial to efficient investigation and treatment of electricity stealing behaviors, and meanwhile, the analysis can be carried out on the electricity stealing behaviors, so that the line loss management of a power supply company is facilitated.
2. Through the real power consumption data of the analysis actual power consumer, adopt big data mining technology to realize anti-electricity-stealing identification analysis, discover electricity-stealing suspected user, reduce electricity-stealing suspected user's quantity and electricity-stealing investigation scope, improve anti-electricity-stealing work efficiency to based on the accurate discernment of establishing and electricity-stealing feedback data analysis model, can confirm electricity-stealing suspected user crowd, make things convenient for follow-up investigation to confirm actual electricity-stealing user from suspected user crowd.
3. The Bayesian algorithm is utilized to realize the electricity stealing positioning of the user, the troubleshooting difficulty is reduced, and the working efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a schematic flow diagram of the present invention;
fig. 2 is a schematic structural diagram of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The actions of electricity stealing, fraudulent use of electricity and the like cause great economic loss to electric power enterprises, although the electric power enterprises invest a large amount of manpower and material resources to carry out detection and positioning, the electric power enterprises are positioned and detected to be difficult due to various electricity stealing means and continuous updating of the used technical means, so the embodiment of the invention discloses an electricity consumption data anomaly detection method based on big data analysis, which comprises the following steps as shown in figure 1:
s1: the method comprises the steps of integrating historical electricity stealing behaviors, obtaining historical electricity stealing data, and constructing an accurate electric electricity stealing identification and electricity stealing feedback data analysis model;
s2: measuring the accuracy of the accurate electric power stealing identification and electric power stealing feedback data analysis model through the covariance of standardized processing, and correcting the accurate identification and electric power stealing feedback data analysis model by using a loss function;
s3: and acquiring real-time power utilization data, and inputting the real-time power utilization data into an accurate identification and electricity stealing feedback data analysis model to obtain whether electricity stealing phenomena and line loss data exist.
In S3, it is counted that user i belongs to the line loss set C within M days based on the line loss datasusNumber of times MiDefining the expression of the suspicion degree of the user as;
λi=Mi/M;
finally according to suspicion degree lambdaiThe sizes are arranged in descending order to obtain the suspicion degree ranking p of the user to be detectedi(ii) a And finally, selecting a plurality of users with the top ranking for field inspection.
Collecting real-time power consumption, and realizing power consumption data collection of a suspicious user by setting sampling frequency and input voltage by using an A/D (analog/digital) collection circuit; the acquisition and conversion of real-time electricity utilization data are completed through the A/D conversion chip.
Due to accidental factors such as weather and meter errors, parameters such as a strong magnetic interference event, a zero live current value and meter voltage in a certain day have certain randomness, and therefore the accuracy of judging electricity stealing only through data of one day is not high. In order to prevent the abnormality such as strong magnetic interference events caused by accidental factors such as weather and meter errors, the result accuracy can be obviously improved by adopting continuous multi-day data comprehensive analysis.
The electric energy information of non-technical loss is contained in the line loss, but the factor that influences the line loss condition is various, for net rack factors such as power supply radius, line footpath, steal the electric incident for effectively utilizing line loss data location:
(1) reading all data from a line loss system, sorting the data from large to small, extracting the top 5%, and considering that the higher the line loss, the higher the possibility of electricity stealing exists.
(2) And judging the service life of the line, wherein the longer the service life of the line is, the higher the line loss is possibly.
(3) And judging the power supply radius, and rejecting the part of data if the power supply radius is exceeded.
(4) And judging whether the wire diameter is reasonable or not, and rejecting if the wire diameter is unreasonable.
Through the steps, the line loss rate caused by the system can be effectively eliminated.
S4: according to the line loss data, the power stealing position is positioned by using a Bayesian algorithm, and the method specifically comprises the following steps:
Figure BDA0003618634590000051
wherein P (B)i) For subscriber B in lineiProbability of occurrence of power stealing, P (A) is probability of high line loss, P (A | B)i) For user BiThe probability of power theft and line loss is high.
The historical electricity stealing data comprise electric quantity mutation, current abnormity and strong magnetic interference events. The real-time electricity consumption data comprise zero line current, live wire current, strong magnetic interference time, electricity consumption, voltage and transformer area line loss.
In the embodiment, a power consumption data anomaly detection system based on big data analysis is also disclosed, as shown in fig. 2, including
A model building module: the method is used for integrating historical electricity stealing behaviors, acquiring historical electricity stealing data and constructing an electric power electricity stealing accurate identification and electricity stealing feedback data analysis model;
a model correction module: the method is used for measuring the accuracy of the electric power electricity stealing accurate identification and electricity stealing feedback data analysis model through the covariance of standardized processing, and correcting the accurate identification and electricity stealing feedback data analysis model by using a loss function;
the electricity stealing analysis module: the real-time power utilization data are input into the accurate identification and electricity stealing feedback data analysis model, and whether electricity stealing phenomena and line loss data exist or not are obtained.
In addition, still include the electricity stealing orientation module: and the method is used for positioning the electricity stealing position by utilizing a Bayesian algorithm according to the line loss data.
In another embodiment, the method further comprises monitoring the sensitive transformer area, and determining the electricity stealing behavior judgment index from the four aspects of current, voltage, power factor and electric quantity in the electricity stealing prevention monitoring process of the sensitive transformer area. When a user steals electricity by changing current, abnormity such as current imbalance or current loss can be found through analysis of current metering data; when a user steals electricity by changing voltage, the recorded value of the voltage exceeds a normal range, so that the problems of voltage phase loss, voltage unbalance and the like are caused; if the user realizes the electricity stealing by the phase shifting method, the power factor is abnormal, because under the normal condition, the power factor only changes within a certain range, and when the electricity stealing action occurs, the power factor exceeds the normal range; because the change of the electric quantity is related to the current, the voltage and the power factor, when the three parameters are abnormal, the electric quantity also has certain abnormality, and if the electric quantity data has the condition of sudden rise, sudden fall or continuous electricity consumption of 0, electricity stealing behavior can exist.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A power utilization data anomaly detection method based on big data analysis is characterized by comprising the following steps:
the method comprises the steps of integrating historical electricity stealing behaviors, obtaining historical electricity stealing data, and constructing an electric power electricity stealing accurate identification and electricity stealing feedback data analysis model;
measuring the accuracy of the accurate electric power stealing identification and electric power stealing feedback data analysis model through the covariance of standardized processing, and correcting the accurate identification and electric power stealing feedback data analysis model by using a loss function;
and acquiring real-time power utilization data, and inputting the real-time power utilization data into an accurate identification and electricity stealing feedback data analysis model to obtain whether electricity stealing phenomena and line loss data exist.
2. The electricity data anomaly detection method based on big data analysis according to claim 1, characterized in that according to line loss data, a Bayesian algorithm is used to locate electricity stealing positions.
3. The electricity consumption data anomaly detection method based on big data analysis according to claim 1, wherein according to line loss data, statistics is carried out on whether a user i belongs to a line loss set C within M dayssusNumber of times MiDefining the expression of the suspicion of the user as follows;
λi=Mi/M;
finally according to suspicion degree lambdaiThe sizes are arranged in descending order to obtain the suspicion degree ranking p of the user to be detectedi(ii) a And finally, selecting a plurality of users with the top ranking for field inspection.
4. The power consumption data anomaly detection method based on big data analysis according to claim 1, characterized in that real-time power consumption is collected, and an A/D collection circuit is used to realize power consumption data collection of a suspicious user by setting sampling frequency and input voltage; the acquisition and conversion of real-time electricity utilization data are completed through the A/D conversion chip.
5. The electricity consumption data anomaly detection method based on big data analysis according to claim 1, characterized by further comprising the step of rejecting line loss data due to circuit reasons:
reading all line loss data, sorting the line loss data from large to small, and extracting the first 5 percent;
judging the service life of the line, wherein the longer the service life of the line is, the higher the line loss is possibly;
judging power supply radius, and rejecting if the power supply radius exceeds the power supply radius
And judging whether the wire diameter is reasonable or not, and rejecting if the wire diameter is unreasonable.
6. The electricity consumption data anomaly detection method based on big data analysis according to claim 2, characterized in that a Bayesian algorithm is used to locate electricity stealing positions, specifically as follows:
Figure FDA0003618634580000021
wherein P (B)i) For subscriber B in lineiProbability of occurrence of power stealing, P (A) is the probability of high line loss of the line, P (A | B)i) For user BiThe probability of power theft and line loss is high.
7. The big data analysis-based power consumption data anomaly detection method according to claim 1, wherein the historical power stealing data comprises sudden changes in power, current anomalies, and strong magnetic interference events.
8. The electricity data anomaly detection method based on big data analysis according to claim 1, wherein the real-time electricity data comprises zero line current, live line current, strong magnetic interference time, electricity consumption, voltage and transformer area line loss.
9. An electricity consumption data abnormity detection system based on big data analysis is characterized by comprising
A model building module: the method is used for integrating historical electricity stealing behaviors, acquiring historical electricity stealing data and constructing an electric power electricity stealing accurate identification and electricity stealing feedback data analysis model;
a model correction module: the method is used for measuring the accuracy of the electric power electricity stealing accurate identification and electricity stealing feedback data analysis model through the covariance of standardized processing, and correcting the accurate identification and electricity stealing feedback data analysis model by using a loss function;
the electricity stealing analysis module: the real-time power utilization data acquisition module is used for acquiring real-time power utilization data and inputting the real-time power utilization data into the accurate identification and power stealing feedback data analysis model to obtain whether a power stealing phenomenon exists and line loss data.
10. The electricity data anomaly detection system based on big data analysis according to claim 9, further comprising an electricity stealing positioning module: and the method is used for positioning the electricity stealing position by utilizing a Bayesian algorithm according to the line loss data.
CN202210451077.5A 2022-04-24 2022-04-24 Power consumption data anomaly detection method and system based on big data analysis Pending CN114722722A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210451077.5A CN114722722A (en) 2022-04-24 2022-04-24 Power consumption data anomaly detection method and system based on big data analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210451077.5A CN114722722A (en) 2022-04-24 2022-04-24 Power consumption data anomaly detection method and system based on big data analysis

Publications (1)

Publication Number Publication Date
CN114722722A true CN114722722A (en) 2022-07-08

Family

ID=82245354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210451077.5A Pending CN114722722A (en) 2022-04-24 2022-04-24 Power consumption data anomaly detection method and system based on big data analysis

Country Status (1)

Country Link
CN (1) CN114722722A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115826909A (en) * 2023-02-24 2023-03-21 国网山东省电力公司枣庄供电公司 Electricity stealing detection system based on big data analysis
CN116562653A (en) * 2023-06-28 2023-08-08 广东电网有限责任公司 Distributed energy station area line loss monitoring method and system
CN116701947A (en) * 2023-08-02 2023-09-05 成都汉度科技有限公司 Method and system for detecting electricity stealing behavior

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115826909A (en) * 2023-02-24 2023-03-21 国网山东省电力公司枣庄供电公司 Electricity stealing detection system based on big data analysis
CN115826909B (en) * 2023-02-24 2023-05-12 国网山东省电力公司枣庄供电公司 Big data analysis-based electricity larceny detection system
CN116562653A (en) * 2023-06-28 2023-08-08 广东电网有限责任公司 Distributed energy station area line loss monitoring method and system
CN116562653B (en) * 2023-06-28 2023-11-28 广东电网有限责任公司 Distributed energy station area line loss monitoring method and system
CN116701947A (en) * 2023-08-02 2023-09-05 成都汉度科技有限公司 Method and system for detecting electricity stealing behavior
CN116701947B (en) * 2023-08-02 2023-11-03 成都汉度科技有限公司 Method and system for detecting electricity stealing behavior

Similar Documents

Publication Publication Date Title
CN114722722A (en) Power consumption data anomaly detection method and system based on big data analysis
CN109583680B (en) Power stealing identification method based on support vector machine
CN102170124B (en) Early warning method of stable-state index of power quality
CN107039970B (en) Public affairs become taiwan area line loss per unit abnormal cause detection method and system
CN103455855B (en) A kind of intermittent electricity stealing prevention detection method based on power information data analysis
CN101557111B (en) Intelligent screening processing system for electricity consumption gathering data
CN109918364B (en) Data cleaning method based on two-dimensional probability density estimation and quartile method
CN213750303U (en) Electric energy metering abnormity diagnosis system based on electricity consumption information acquisition system
CN110703009A (en) Abnormal analysis and processing method for line loss rate of transformer area
CN109298227B (en) Method for detecting abnormal electric quantity of user
CN111724060A (en) Integrated analysis monitoring system and analysis method for transformer area line loss
CN110763886A (en) Single-phase user electricity stealing judgment and positioning method
CN111861786A (en) Special transformer electricity stealing identification method based on feature selection and isolated random forest
CN110837532A (en) Method for detecting electricity stealing behavior of charging pile based on big data platform
CN111768022A (en) Equipment detection method and device for coal machine production equipment
CN111612054B (en) User electricity stealing behavior identification method based on nonnegative matrix factorization and density clustering
CN109946640B (en) Special transformer terminal voltage and current loss judgment method based on metering automation system data
CN109443395B (en) Method and system for judging whether energy consumption intensity multipoint measurement difference value exceeds limit value
CN115730962A (en) Big data-based electric power marketing inspection analysis system and method
CN114839462A (en) Intelligent anti-electricity-stealing monitoring method and system
CN114295880A (en) Accurate location of electric power stealing and unusual power consumption behavior detection analysis model
CN114362134A (en) Medium-voltage line loss reduction method based on line loss qualified rate
CN112557745A (en) Power superposition comparison system and method for line loss monitoring
Feng et al. Technology and application of multidimensional remote monitoring system for electric energy meter based on decision tree group
CN111781554A (en) Metering device fault determination method and system based on four-quadrant electric energy data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination