CN115170003A - Electricity stealing monitoring method and system, storage medium and terminal - Google Patents

Electricity stealing monitoring method and system, storage medium and terminal Download PDF

Info

Publication number
CN115170003A
CN115170003A CN202211092378.XA CN202211092378A CN115170003A CN 115170003 A CN115170003 A CN 115170003A CN 202211092378 A CN202211092378 A CN 202211092378A CN 115170003 A CN115170003 A CN 115170003A
Authority
CN
China
Prior art keywords
verification
user
data
power
stealing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211092378.XA
Other languages
Chinese (zh)
Inventor
孙鹏
秦怀志
杨传辉
刘玉洁
张乐
王艺琛
贾伟
田笑
赵烨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Shandong Electric Power Co Lanling County Power Supply Co
Original Assignee
State Grid Shandong Electric Power Co Lanling County Power Supply Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Shandong Electric Power Co Lanling County Power Supply Co filed Critical State Grid Shandong Electric Power Co Lanling County Power Supply Co
Priority to CN202211092378.XA priority Critical patent/CN115170003A/en
Publication of CN115170003A publication Critical patent/CN115170003A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply

Abstract

The invention discloses a method and a system for monitoring electricity stealing, a storage medium and a terminal, relates to the technical field of electric power systems, and mainly aims to solve the problem of low efficiency of monitoring electricity stealing in the existing electric power system. The method comprises the following steps: acquiring first current data obtained by counting the electrical data acquired by a plurality of user electrical data acquisition devices and second current data acquired by branch line node electrical data acquisition devices; if the difference value between the first current data and the second current data does not accord with the preset current loss range, determining the electricity stealing verification user and electricity stealing verification time corresponding to the electricity stealing verification user, and sending a verification request to a client associated with the electricity stealing verification user when the electricity stealing verification time is up; acquiring verification electric data in user electric data acquisition equipment after the power-off operation is finished, and detecting and classifying the verification electric data according to the power-off characteristics; and if the electricity stealing verification user is determined to be in the on-site electricity stealing state, sending electricity stealing alarm information to the electricity stealing verification user.

Description

Electricity stealing monitoring method and system, storage medium and terminal
Technical Field
The invention relates to the technical field of power systems, in particular to a method and a system for monitoring electricity stealing, a storage medium and a terminal.
Background
With the increasing monitoring demand of the power system, monitoring the electricity stealing situation in the power system also becomes the focus of the internal attention of the industry.
At present, the existing monitoring for electricity stealing usually adopts the comparison between power supply data and actually used electricity quantity data to determine, but because the electricity stealing modes are continuously increased, the power supply data contains line loss, the difference value between the power supply data and the actually used electricity quantity data is small, whether the electricity stealing situation exists or not can not be accurately judged, and the effectiveness of monitoring of an electric power system is greatly reduced, so that an electricity stealing monitoring method is urgently needed to solve the problems.
Disclosure of Invention
In view of this, the present invention provides a method and a system for monitoring power stealing, a storage medium, and a terminal, and mainly aims to solve the problem of low power stealing monitoring efficiency in the existing power system.
According to an aspect of the present invention, there is provided a power stealing monitoring method, including:
acquiring first current data obtained by counting the electrical data acquired by the plurality of user electrical data acquisition devices and second current data acquired by branch line node electrical data acquisition devices;
if the difference value between the first current data and the second current data does not accord with a preset current loss range, determining a power stealing verification user and power stealing verification time corresponding to the power stealing verification user, and sending a verification request to a client associated with the power stealing verification user when the power stealing verification user is in the power stealing verification time so that the power stealing verification user performs power-off operation based on the verification request;
acquiring verification electric data in the user electric data acquisition equipment after the power-off operation is finished, and detecting and classifying the verification electric data according to power-off characteristics to obtain a detection and classification result;
and if the electricity stealing verification user is determined to be in an on-site electricity stealing state according to the detection classification result, sending electricity stealing alarm information to the electricity stealing verification user.
Further, the electricity data includes voltage data, current data, and the determining a power stealing verification user and a power stealing verification time corresponding to the power stealing verification user includes:
acquiring all user information corresponding to the user electrical data acquisition equipment, and performing statistics on the electrical data acquired by the user electrical data acquisition equipment to obtain voltage data;
selecting a power stealing verification user from all the user information according to the difference value between the voltage data and a preset voltage gain range;
sending a power stealing verification time request instruction to a client associated with the power stealing verification user, wherein the power stealing verification time request instruction comprises at least two power stealing verification times to be selected so as to indicate the power stealing verification user to select;
and receiving the electricity stealing verification time selected by the electricity stealing verification user so as to carry out electricity stealing verification based on the electricity stealing verification time.
Further, the selecting a power stealing verification user from the all user information according to the difference between the voltage data and a preset voltage gain range includes:
if the difference value between the voltage data and the preset voltage gain range is smaller than a first preset difference value threshold, searching user information corresponding to target electricity data larger than the first electricity data threshold from the electricity data, and determining the user as an electricity stealing verification user;
and if the difference value between the voltage data and the preset voltage gain range is greater than or equal to a second preset difference value threshold value, searching user information corresponding to target electric data which is greater than the second electric data threshold value and is a preset multiple of the first electric data threshold value from the electric data, and determining the user information as an electricity stealing verification user.
Further, the detecting and classifying the verification electrical data according to the power-off characteristics to obtain a detection and classification result includes:
acquiring power-off characteristics matched with the electricity stealing verification time, wherein the power-off characteristics comprise equipment detection power-off state parameters and electric data fluctuation values;
analyzing the verification state of the verification electrical data under the condition that the equipment detects the power-off state parameters and the electrical data fluctuation numerical values, wherein the verification state is used for representing the change state of the verification electrical data;
and classifying the verification states according to preset detection categories to obtain detection classification results.
Further, the analyzing the verification state of the verification electrical data when the device detects the power-off state parameter and the electrical data fluctuation value comprises:
and classifying the verification electric data according to a verification state classification model which is trained by the model to obtain the verification state of the verification electric data, wherein the verification state classification model is obtained by training based on a verification state training sample set, and the verification state training sample set comprises verification electric data samples which are subjected to verification state marking under different equipment detection power-off state parameters and different electric data fluctuation values.
Further, before the obtaining the first current data obtained by counting the electrical data collected by the plurality of user electrical data collecting devices, the method further includes:
acquiring model information and equipment service life information of different user electrical data acquisition equipment;
determining a statistical ratio and a statistical function corresponding to each user electrical data acquisition device according to the model information and the device life information;
and counting first current data corresponding to the electrical data according to the counting ratio and the counting function.
Further, the method further comprises:
if the initial electricity data collected by the user electricity data collecting equipment is matched with a preset electricity stealing monitoring threshold value, reporting user information corresponding to the user electricity data collecting equipment to determine the user information as an early warning user;
if the number of the early warning users is larger than the preset number of the early warning users, generating a power supply equipment verification instruction for the early warning users, and sending a power supply equipment inspection terminal to enable the power supply equipment inspection terminal to inspect the user electrical data acquisition equipment of the early warning users.
According to another aspect of the present invention, there is provided a power theft monitoring system including:
the acquisition module is used for acquiring first current data obtained by counting the electrical data acquired by the plurality of user electrical data acquisition devices and second current data acquired by the branch line node electrical data acquisition devices;
the determining module is used for determining a power stealing verification user and power stealing verification time corresponding to the power stealing verification user if the difference value between the first current data and the second current data does not accord with a preset current loss range, and sending a verification request to a client associated with the power stealing verification user when the power stealing verification time is up so that the power stealing verification user can perform power-off operation based on the verification request;
the detection module is used for collecting verification electric data in the user electric data collection equipment after the power-off operation is finished, and detecting and classifying the verification electric data according to the power-off characteristics to obtain a detection and classification result;
and the sending module is used for sending electricity stealing alarm information to the electricity stealing verification user if the electricity stealing verification user is determined to be in-place electricity stealing state according to the detection classification result.
Further, the electrical data includes voltage data, current data,
the determining module is specifically configured to acquire all user information corresponding to the user electrical data acquisition device, and perform statistics on the electrical data acquired by the user electrical data acquisition device to obtain voltage data; selecting a power stealing verification user from all the user information according to the difference value between the voltage data and a preset voltage gain range; sending a power stealing verification time request instruction to a client associated with the power stealing verification user, wherein the power stealing verification time request instruction comprises at least two power stealing verification times to be selected so as to indicate the power stealing verification user to select; and receiving the electricity stealing verification time selected by the electricity stealing verification user so as to carry out electricity stealing verification based on the electricity stealing verification time.
Further, the determining module is specifically configured to, if the difference between the voltage data and the preset voltage gain range is smaller than a first preset difference threshold, search, from the electrical data, user information corresponding to target electrical data that is larger than the first electrical data threshold, and determine that the target electrical data is an electricity stealing verification user; and if the difference value between the voltage data and the preset voltage gain range is greater than or equal to a second preset difference value threshold value, searching user information corresponding to target electric data which is greater than the second electric data threshold value and is a preset multiple of the first electric data threshold value from the electric data, and determining the user information as an electricity stealing verification user.
Further, the detection module is specifically configured to obtain a power-off characteristic matched with the electricity stealing verification time, where the power-off characteristic includes a power-off state parameter detected by the device and an electricity data fluctuation value; analyzing the verification state of the verification electrical data under the condition that the equipment detects the power-off state parameters and the electrical data fluctuation numerical values, wherein the verification state is used for representing the change state of the verification electrical data; and classifying the verification states according to preset detection categories to obtain detection classification results.
The detection module is specifically configured to classify the verification electrical data according to a verification state classification model that has been trained by the model, so as to obtain a verification state of the verification electrical data, where the verification state classification model is obtained by training based on a verification state training sample set, and the verification state training sample set includes verification electrical data samples labeled in verification states under different device detection power-off state parameters and different electrical data fluctuation values.
Further, the apparatus further comprises: a statistical module for calculating the statistical time of the data,
the acquisition module is also used for acquiring model information and service life information of different user electrical data acquisition equipment;
the determining module is further configured to determine a statistical proportion and a statistical function corresponding to each piece of the user electrical data acquisition equipment according to the model information and the equipment life information;
and the statistical module is used for counting the first current data corresponding to the electrical data according to the statistical ratio and the statistical function.
Further, the apparatus further comprises:
the reporting module is used for reporting the user information corresponding to the user electricity data acquisition equipment to determine the user as an early warning user if the initial electricity data acquired by the user electricity data acquisition equipment matches a preset electricity stealing monitoring threshold value;
and the generation module is used for generating a power supply equipment verification instruction of the early warning users and sending a power supply equipment inspection terminal if the number of the early warning users is determined to be greater than the preset early warning number, so that the power supply equipment inspection terminal inspects the user electrical data acquisition equipment of the early warning users.
According to still another aspect of the present invention, there is provided a storage medium having at least one executable instruction stored therein, the executable instruction causing a processor to perform operations corresponding to the above power stealing monitoring method.
According to still another aspect of the present invention, there is provided a terminal including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction enables the processor to execute the operation corresponding to the electricity stealing monitoring method.
By means of the technical scheme, the technical scheme provided by the embodiment of the invention at least has the following advantages:
compared with the prior art, the embodiment of the invention obtains first current data obtained by counting the electric data collected by a plurality of user electric data collecting devices and second current data collected by branch line node electric data collecting devices; if the difference value between the first current data and the second current data does not accord with a preset current loss range, determining a power stealing verification user and power stealing verification time corresponding to the power stealing verification user, and sending a verification request to a client associated with the power stealing verification user when the power stealing verification user is in the power stealing verification time, so that the power stealing verification user performs power-off operation based on the verification request; acquiring verification electric data in the user electric data acquisition equipment after the power-off operation is finished, and detecting and classifying the verification electric data according to power-off characteristics to obtain a detection and classification result; and if the electricity stealing verification user is determined to be in-place electricity stealing state according to the detection classification result, sending electricity stealing alarm information to the electricity stealing verification user to accurately monitor electricity stealing, avoiding frequent generation of electricity stealing behaviors and power resource loss, greatly improving the effectiveness of monitoring of the power system and avoiding excessive economic loss caused by multiple electricity stealing behaviors.
The above description is only an overview of the technical solutions of the present invention, and the present invention can be implemented in accordance with the content of the description so as to make the technical means of the present invention more clearly understood, and the above and other objects, features, and advantages of the present invention will be more clearly understood.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 shows a flow chart of a method for monitoring electricity stealing according to an embodiment of the present invention;
FIG. 2 is a flow chart of another method for monitoring electricity stealing according to an embodiment of the present invention;
FIG. 3 is a flow chart of another electricity stealing monitoring method provided by the embodiment of the invention;
FIG. 4 is a block diagram illustrating a power stealing monitoring system according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
In view of the above, the present invention provides a method for monitoring electricity stealing, which is shown in fig. 1, and includes the following steps:
101. the method comprises the steps of obtaining first current data obtained by counting electrical data collected by a plurality of user electrical data collection devices and second current data collected by branch line node electrical data collection devices.
In the embodiment of the present invention, the electrical data acquisition device includes, but is not limited to, a detection device having a function of acquiring current and voltage simultaneously or separately, for example, an intelligent electric energy meter, and the current execution end performs data communication with each electrical data acquisition device to acquire acquired electrical data, where the electrical data includes voltage data and current data. Each user electrical data acquisition device is installed in a user home, and therefore each user electrical data acquisition device is used for acquiring electrical data used by each user. Meanwhile, a plurality of users are divided into areas, a branch line node electric data acquisition device is installed at a power supply node of each area, and electric data of all the users in the area are acquired through the branch line node electric data acquisition device.
It should be noted that, when performing the electricity stealing monitoring in the embodiment of the present invention, in order to determine whether the electricity stealing behavior occurs at the front execution end, first current data of the electricity data collected by each user electricity data collection device and second current data of the electricity data collected by the straight line node data collection device are respectively counted, so as to determine whether the electricity stealing behavior occurs through comparison of the currents.
102. If the difference value between the first current data and the second current data does not accord with a preset current loss range, determining a power stealing verification user and power stealing verification time corresponding to the power stealing verification user, and sending a verification request to a client associated with the power stealing verification user when the power stealing verification time is up.
In the embodiment of the invention, after the first current data and the second current data are determined, difference value operation is carried out, and if the difference value does not accord with the preset current loss range, the current execution end determines that electricity stealing behavior is generated. The preset current loss range is a preset normal current loss range of the electric wire in the process of supplying power to a plurality of users in one area, and can be configured according to different power supply environments, and the embodiment of the invention is not particularly limited. After the current execution end determines that the electricity stealing behavior is generated, at least one electricity stealing verification user and electricity stealing verification time are determined from the area, and in the electricity stealing verification time, a verification request is sent to a client end associated with the electricity stealing user, so that the electricity stealing verification user conducts power-off operation based on the verification request.
It should be noted that, in the embodiment of the present invention, the electricity stealing verification time may be a fixed time period of a specified time, for example, 12 pm to 1 pm, 21 pm to 22 pm, and the like, so that the current execution end sends the verification request to the client in this time period. The user using the user electricity data acquisition equipment installs an electricity stealing verification application program on a client of intelligent terminal equipment such as a mobile phone and a tablet computer in advance, so that after the user is determined to be an electricity stealing verification user, the user is instructed to perform power-off operation within electricity stealing verification time based on a transmitted verification request. The power-off operation is to cut off the user's home-entry switch, so that the electricity stealing verification user is in a non-power-supply state in the period. The verification request may be content showing electricity stealing verification time on the client, for example, "you are selected as electricity stealing verification users, please perform power-off operation within electricity stealing verification time xx-xx, thank you for help" and the like, so as to indicate the user to power off.
103. And acquiring verification electric data in the user electric data acquisition equipment after the power-off operation is finished, and detecting and classifying the verification electric data according to the power-off characteristics to obtain a detection and classification result.
In the embodiment of the invention, the electricity stealing verification user powers off in the electricity stealing verification time content, and the verification electricity data in the user electricity data acquisition equipment terminal of the user after the power-off operation is further acquired, so that the verification electricity data is detected and classified based on the power-off characteristics, and the detection classification result is determined. The power-off characteristics comprise equipment detection power-off state parameters and power data fluctuation values, namely the power-off state parameters and the power data fluctuation values can be detected through the equipment, verification point data collected after power-off operation is detected, for example, if the equipment detection power-off state parameters collected under the power-off condition are 1 and the power data fluctuation values are not 0, the fact that the electricity stealing verification user is stolen is indicated, and therefore the detection classification result is that the verification is abnormal and the electricity is stolen.
It should be noted that the device detection power-off state parameter is used to represent a state parameter of the electrical data sent by the intelligent electric energy meter to the current execution end (service platform) under the power-off operation, if the power supply data received by the intelligent electric energy meter when the user is powered off in the current service platform is changing, if the power supply value is increasing continuously, the device detection power-off state parameter is 1 (possibly in power stealing or abnormal to the electric energy meter), and if the power supply data received by the intelligent electric energy meter when the user is powered off in the current service end platform is unchanged, the device detection power-off state parameter is 0 (normal power supply condition). The intelligent electric energy meter determines the specific numerical value of the electric data by converting an analog signal for supplying power into a digital signal, so that the electric data fluctuation numerical value is used for representing the numerical value whether the fluctuation change of the electric data is normal or not detected by the intelligent electric energy meter in a power-off state, if the fluctuation of the electric data exists in the electric energy meter through a digital-to-analog converter, and the electric data uploaded to a service platform by the electric energy meter after the fluctuation of the electric data is less than the normally detected electric data (at this moment, the electric energy meter is normally used and the electricity consumption of people is normally detected), the electric data fluctuation numerical value is not 0, and is the specific numerical value of the electric data, namely, the electricity stealing occurs; if the digital-to-analog converter in the electric energy meter cannot detect the electric data fluctuation, at the moment, the electric data fluctuation value is 0, and the electric energy meter still uploads the electric data to the service platform, namely the electric energy meter is determined to be damaged. The electric data fluctuation value in the digital-to-analog converter and the converted electric data in the electric energy meter are uploaded to the service platform together, and then the electric data are classified according to the power failure characteristics, so that which detection classification the electricity stealing verification user is in is determined, such as on-site electricity stealing, on-site normal state, damage to the electric energy meter and the like.
104. And if the electricity stealing verification user is determined to be in-place electricity stealing state according to the detection classification result, sending electricity stealing warning information to the electricity stealing verification user.
In the embodiment of the invention, the situation that the authenticated user is stolen is indicated if the electricity stealing verification user is determined to be in an on-site electricity stealing state according to the detection classification result, so that electricity stealing alarm information is sent to the client of the authenticated user, and the user reports detection alarm measures.
In another embodiment of the present invention, for further explanation and limitation, as shown in fig. 2, the step of determining the electricity stealing verification user and the electricity stealing verification time corresponding to the electricity stealing verification user includes:
201. acquiring all user information corresponding to the user electrical data acquisition equipment, and performing statistics on the electrical data acquired by the user electrical data acquisition equipment to obtain voltage data;
202. selecting a power stealing verification user from all the user information according to the difference value between the voltage data and a preset voltage gain range;
203. sending a power stealing verification time request indication to a client associated with the power stealing verification user;
204. and receiving the electricity stealing verification time selected by the electricity stealing verification user so as to carry out electricity stealing verification based on the electricity stealing verification time.
In order to accurately determine the electricity stealing verification user and the electricity stealing verification time and indicate the electricity stealing verification user to perform power-off operation at the electricity stealing verification time, specifically, all user information corresponding to the user electricity data acquisition equipment, namely all user identity information or account information and the like of the intelligent electric meter are acquired. At the moment, the voltage data is counted according to the electric data corresponding to each user acquired by the user point data acquisition equipment, namely, the average value of the voltage data in the power supply process of all the users is calculated and compared with the preset voltage gain range. The voltage gain range is a maximum range of voltage distortion in the power supply process, and includes an increased maximum value and a decreased minimum value, and the voltage gain range may be configured in advance by using conditions of the power supply region, line loss, and the like. Furthermore, after selecting a power stealing verification user from all user information according to the difference between the voltage data and the preset voltage gain range, sending a power stealing verification request instruction to a client associated with the power stealing verification user, wherein the power stealing verification time request instruction comprises at least two power stealing verification times to be selected so as to indicate the power stealing verification user to select, for example, the request instruction comprises "power stealing verification time 1: 12-13 o' clock in the noon, or electricity stealing verification time 2: at night 21-22 o' clock, please select, thank you for coordination ", to instruct the user to make the selection. After the user selects the electricity stealing verification time through the client, the current execution end receives the electricity stealing verification time selected by the electricity stealing verification user so as to carry out electricity stealing verification based on the electricity stealing verification time.
In another embodiment of the present invention, for further explanation and limitation, the step of selecting the electricity stealing verification user from all the user information according to the difference between the voltage data and the preset voltage gain range comprises:
if the difference value between the voltage data and the preset voltage gain range is smaller than a first preset difference value threshold, searching user information corresponding to target electricity data larger than the first electricity data threshold from the electricity data, and determining the user as an electricity stealing verification user;
and if the difference value between the voltage data and the preset voltage gain range is greater than or equal to a second preset difference value threshold value, searching user information corresponding to target electric data which is greater than the second electric data threshold value and is a preset multiple of the first electric data threshold value from the electric data, and determining the user information as an electricity stealing verification user.
In order to accurately select the electricity stealing verification user to improve the electricity stealing checking accuracy, after the comparison is carried out based on the difference value between the voltage data and the preset voltage gain range, if the difference value between the voltage data and the preset voltage gain range is smaller than a first preset difference value threshold, user information corresponding to target electricity data larger than a first point data threshold is searched from the electricity data, and the electricity stealing verification user is determined. The first electricity data threshold is a preset electricity data threshold and is used for screening electricity data suspected of generating electricity stealing behaviors, so that user information corresponding to target electricity data larger than the first electricity data threshold is searched from all the electricity data and serves as an electricity stealing verification user. And if the difference value between the voltage data and the preset voltage gain range is larger than or equal to a second preset difference value threshold, searching target electric data which is larger than the second electric data threshold and is equal to a preset multiple of the first electric data threshold from the electric data, and further determining the corresponding user as an electricity stealing verification user. The second electricity data threshold is a preset threshold of electricity data, and is also used for screening electricity data suspected of generating electricity stealing behavior, so that target electricity data which is larger than the second electricity data threshold and is a preset multiple of the first electricity data threshold is searched from all the electricity data, and at this time, the preset multiple can be configured in advance based on the multiple of the increase of the electricity data generated after electricity stealing behavior is generated, and the embodiment of the invention is not limited specifically. In addition, in embodiments of the present invention, the first electrical data threshold is less than the second electrical data threshold.
In another embodiment of the present invention, for further explanation and limitation, as shown in fig. 3, the step of performing detection classification on the verification electrical data according to the power-off characteristics includes:
301. acquiring power failure characteristics matched with the electricity stealing verification time;
302. analyzing the verification state of the verification electrical data under the condition that the equipment detects the power-off state parameters and the electrical data fluctuation numerical values;
303. and classifying the verification states according to preset detection categories to obtain detection classification results.
In order to accurately monitor the electricity stealing behavior and improve the detection precision of the electricity stealing behavior, when the verification electricity data are detected and classified based on the electricity outage characteristics, the electricity outage characteristics specifically comprise equipment detection outage state parameters and electricity data fluctuation numerical values. The equipment detection power-off state parameter is used for representing whether the intelligent electric energy meter detects the state parameter of the electric data or not in the power-off operation, the electric data fluctuation value is used for representing whether the intelligent electric energy meter detects the fluctuation change of the electric data in the power-off state or not, and at the moment, the equipment detection power-off state parameter and the electric data fluctuation value corresponding to different power stealing verification time are recorded in the current execution end, and the embodiment of the invention is not specifically limited. Furthermore, the verification state of the verification electrical data is analyzed under the condition that the equipment detects the power-off state parameters and the electrical data fluctuation numerical values, namely the change state of the verification electrical data is judged through the equipment detecting the power-off state parameters and the electrical data fluctuation numerical values, wherein the verification state is used for representing the change state of the verification electrical data. For example, if the device detects that the power-off state parameter is 1 and the electrical data fluctuation value is a specific value, it indicates that the power-supplied electrical data is changed normally, and the electric energy meter can still detect the electrical data and the fluctuated electrical data is less than the normally detected electrical data, so that the verification state is an abnormal change state, and the verification state is classified as an on-site electricity stealing state, that is, as a detection classification result.
In another embodiment of the present invention, for further explanation and limitation, the step of analyzing the verification status of the verification electrical data when the device detects the power-off status parameter and the electrical data fluctuation value includes:
and classifying the verification electric data according to a verification state classification model which is trained by the model to obtain the verification state of the verification electric data, wherein the verification state classification model is obtained by training based on a verification state training sample set, and the verification state training sample set comprises verification electric data samples which are subjected to verification state marking under different equipment detection power-off state parameters and different electric data fluctuation values.
In order to realize intelligent and efficient analysis of the verification state, the verification state classification model is used for classifying the verification electric data, and at the moment, the verification state classification model is a machine learning algorithm trained on the basis of a verification state training sample set. Specifically, the verification state classification model in the embodiment of the present invention may be a neural network model, a support vector machine module, a forest tree decision algorithm, and the like, and is based on a verification point data sample including different device detection power-off state parameters and different electrical data fluctuation values for performing verification state labeling. The verification state flag includes a normal change state, an abnormal change state, and a non-change state, and at this time, the flag may be made based on human or based on an intelligent algorithm, and the embodiment of the present invention is not particularly limited. And when the detection and classification are carried out, the normal change state is determined to be normal in place, the abnormal change state is determined to be electricity stealing in place, and the non-change state is determined to be damage of the electric energy meter.
In another embodiment of the present invention, for further explanation and limitation, before the step of obtaining first current data obtained by counting electrical data collected by a plurality of user electrical data collection devices, the method further comprises:
acquiring model information and equipment service life information of different user electrical data acquisition equipment;
determining a statistical ratio and a statistical function corresponding to each user electrical data acquisition device according to the model information and the device life information;
and counting first current data corresponding to the electrical data according to the counting ratio and the counting function.
In order to judge whether the large loss condition exists or not based on the current data so as to reduce the error of electricity stealing monitoring, firstly, model information and equipment service life information of different user electricity data acquisition are acquired, and then the statistical proportion and the statistical function of the user data acquisition equipment are determined based on the model information and the equipment service life information so as to perform statistics on the current data. The statistical proportion is used for representing the proportion of the user point data acquisition equipment when the first current data is counted, for example, the intelligent electric energy meter with the longer service life and the older model is smaller in statistical proportion when the current data is counted. The statistical function is a summation function obtained by adding different statistical proportions to a basic summation formula, and preferably, in the embodiment of the present invention, the summation is performed after the current data obtained by all the user electrical data acquisition devices are combined with the statistical proportions, so as to obtain the first current data. Similarly, the second current data may be obtained by statistics based on the same method, and the embodiment of the present invention is not limited specifically.
In another embodiment of the present invention, for further explanation and limitation, the steps further comprise:
if the initial electricity data collected by the user electricity data collecting equipment is matched with a preset electricity stealing monitoring threshold value, reporting user information corresponding to the user electricity data collecting equipment to determine the user information as an early warning user;
and if the number of the early warning users is determined to be larger than the preset number of the early warning users, generating a power supply equipment verification instruction for the early warning users, and sending a power supply equipment inspection terminal so that the power supply equipment inspection terminal can inspect the user electrical data acquisition equipment of the early warning users.
In order to realize timely processing of electricity stealing users and reduce the occurrence of electricity stealing behaviors, if initial electricity data collected by user electricity data collection equipment is matched with a preset electricity stealing monitoring threshold value, user information corresponding to the user electricity data collection equipment is directly reported so as to be determined as an early warning user, and offline monitoring is carried out. The preset electricity stealing monitoring threshold is a preset electricity stealing extreme value, namely the maximum range of the independent power supply of the normal user, and can be configured based on the historical power supply electric quantity and the regional average power supply electric quantity, and the embodiment of the invention is not particularly limited.
In addition, if the number of the early warning users is larger than the preset number of the early warning users, the suspicious users who generate electricity stealing behaviors are too many, so that a power supply equipment verification instruction is generated and sent to a power supply equipment inspection terminal, so that offline inspection of the user electricity data acquisition equipment of the early warning users can be conveniently carried out, at the moment, the preset number of the early warning users is preferably 10, and the frequent occurrence of the electricity stealing behaviors is reduced.
Compared with the prior art, the embodiment of the invention provides an electricity stealing monitoring method, which comprises the steps of obtaining first current data obtained by counting electricity data collected by a plurality of user electricity data collecting devices and second current data collected by branch line node electricity data collecting devices; if the difference value between the first current data and the second current data does not accord with a preset current loss range, determining a power stealing verification user and power stealing verification time corresponding to the power stealing verification user, and sending a verification request to a client associated with the power stealing verification user when the power stealing verification user is in the power stealing verification time so that the power stealing verification user performs power-off operation based on the verification request; acquiring verification electric data in the user electric data acquisition equipment after the power-off operation is finished, and detecting and classifying the verification electric data according to power-off characteristics to obtain a detection and classification result; and if the electricity stealing verification user is determined to be in-place electricity stealing state according to the detection classification result, sending electricity stealing alarm information to the electricity stealing verification user to accurately monitor electricity stealing, avoiding frequent generation of electricity stealing behaviors and power resource loss, greatly improving the effectiveness of monitoring of the power system and avoiding excessive economic loss caused by multiple electricity stealing behaviors.
Further, as an implementation of the method shown in fig. 1, an embodiment of the present invention provides an electricity larceny monitoring system, as shown in fig. 4, where the system includes:
the acquisition module 41 is configured to acquire first current data obtained by counting electrical data acquired by a plurality of user electrical data acquisition devices, and second current data acquired by branch line node electrical data acquisition devices;
a determining module 42, configured to determine, if a difference between the first current data and the second current data does not conform to a preset current loss range, a power stealing verification user and power stealing verification time corresponding to the power stealing verification user, and send a verification request to a client associated with the power stealing verification user when the power stealing verification time is up, so that the power stealing verification user performs a power outage operation based on the verification request;
the detection module 43 is configured to collect the verification electrical data in the user electrical data collection device after the power-off operation is completed, and detect and classify the verification electrical data according to the power-off characteristics to obtain a detection and classification result;
and the sending module 44 is configured to send power stealing alarm information to the power stealing verification user if the power stealing verification user is determined to be in the in-place power stealing state according to the detection classification result.
Further, the electrical data includes voltage data, current data,
the determining module is specifically configured to acquire all user information corresponding to the user electrical data acquisition device, and perform statistics on the electrical data acquired by the user electrical data acquisition device to obtain voltage data; selecting a power stealing verification user from all the user information according to the difference value between the voltage data and a preset voltage gain range; sending a power stealing verification time request instruction to a client associated with the power stealing verification user, wherein the power stealing verification time request instruction comprises at least two power stealing verification times to be selected so as to indicate the power stealing verification user to select; and receiving the electricity stealing verification time selected by the electricity stealing verification user so as to carry out electricity stealing verification based on the electricity stealing verification time.
Further, the determining module is specifically configured to search, if the difference between the voltage data and a preset voltage gain range is smaller than a first preset difference threshold, user information corresponding to target electrical data larger than the first electrical data threshold from the electrical data, and determine that the user is a power stealing verification user; and if the difference value between the voltage data and the preset voltage gain range is greater than or equal to a second preset difference value threshold value, searching user information corresponding to target electric data which is greater than the second electric data threshold value and is a preset multiple of the first electric data threshold value from the electric data, and determining the user information as an electricity stealing verification user.
Further, the detection module is specifically configured to obtain a power-off characteristic matched with the electricity stealing verification time, where the power-off characteristic includes a power-off state parameter detected by the device and an electricity data fluctuation value; analyzing the verification state of the verification electrical data under the condition that the equipment detects the power-off state parameters and the electrical data fluctuation numerical values, wherein the verification state is used for representing the change state of the verification electrical data; and classifying the verification states according to preset detection categories to obtain detection classification results.
The detection module is specifically configured to classify the verification electrical data according to a verification state classification model that has been trained by the model, so as to obtain a verification state of the verification electrical data, where the verification state classification model is obtained by training based on a verification state training sample set, and the verification state training sample set includes verification electrical data samples labeled in verification states under different device detection power-off state parameters and different electrical data fluctuation values.
Further, the apparatus further comprises: a statistical module for calculating the statistical time of the data,
the acquisition module is also used for acquiring model information and service life information of different user electrical data acquisition equipment;
the determining module is further configured to determine a statistical proportion and a statistical function corresponding to each piece of the user electrical data acquisition equipment according to the model information and the equipment life information;
and the statistical module is used for counting the first current data corresponding to the electrical data according to the statistical ratio and the statistical function.
Further, the apparatus further comprises:
the reporting module is used for reporting the user information corresponding to the user electricity data acquisition equipment to determine the user information as an early warning user if the initial electricity data acquired by the user electricity data acquisition equipment matches a preset electricity stealing monitoring threshold;
and the generation module is used for generating a power supply equipment verification instruction of the early warning users and sending a power supply equipment inspection terminal if the number of the early warning users is determined to be greater than the preset early warning number, so that the power supply equipment inspection terminal inspects the user electrical data acquisition equipment of the early warning users.
Compared with the prior art, the embodiment of the invention provides an electricity stealing monitoring system, which is characterized in that first current data obtained by counting electricity data collected by a plurality of user electricity data collecting devices and second current data collected by branch line node electricity data collecting devices are obtained; if the difference value between the first current data and the second current data does not accord with a preset current loss range, determining a power stealing verification user and power stealing verification time corresponding to the power stealing verification user, and sending a verification request to a client associated with the power stealing verification user when the power stealing verification user is in the power stealing verification time so that the power stealing verification user performs power-off operation based on the verification request; acquiring verification electric data in the user electric data acquisition equipment after the power-off operation is finished, and detecting and classifying the verification electric data according to power-off characteristics to obtain a detection and classification result; if the electricity stealing verification user is determined to be in-place electricity stealing state according to the detection classification result, electricity stealing alarm information is sent to the electricity stealing verification user, the purpose of accurately monitoring electricity stealing is achieved, frequent generation of electricity stealing behaviors and power resource loss are avoided, the effectiveness of monitoring of an electric power system is greatly improved, and excessive economic loss caused by multiple electricity stealing behaviors is avoided.
According to an embodiment of the present invention, a storage medium is provided, the storage medium storing at least one executable instruction, and the computer executable instruction can execute the electricity larceny monitoring method in any of the above method embodiments.
Fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the terminal.
As shown in fig. 5, the terminal may include: a processor (processor) 502, a Communications Interface (Communications Interface) 504, a memory 506, and a communication bus 508.
Wherein: the processor 502, communication interface 504, and memory 506 communicate with each other via a communication bus 508.
A communication interface 504 for communicating with network elements of other devices, such as clients or other servers.
The processor 502 is configured to execute the program 510, and may specifically execute the relevant steps in the above-described embodiment of the electricity larceny monitoring method.
In particular, program 510 may include program code that includes computer operating instructions.
The processor 502 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement an embodiment of the invention. The terminal comprises one or more processors, which can be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 506 for storing a program 510. The memory 506 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 510 may be specifically configured to cause the processor 502 to perform the following operations:
acquiring first current data obtained by counting the electrical data acquired by a plurality of user electrical data acquisition devices and second current data acquired by branch line node electrical data acquisition devices;
if the difference value between the first current data and the second current data does not accord with a preset current loss range, determining a power stealing verification user and power stealing verification time corresponding to the power stealing verification user, and sending a verification request to a client associated with the power stealing verification user when the power stealing verification user is in the power stealing verification time, so that the power stealing verification user performs power-off operation based on the verification request;
acquiring verification electric data in the user electric data acquisition equipment after the power-off operation is finished, and detecting and classifying the verification electric data according to power-off characteristics to obtain a detection and classification result;
and if the electricity stealing verification user is determined to be in-place electricity stealing state according to the detection classification result, sending electricity stealing warning information to the electricity stealing verification user.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method of monitoring for electricity theft, comprising:
acquiring first current data obtained by counting the electrical data acquired by a plurality of user electrical data acquisition devices and second current data acquired by branch line node electrical data acquisition devices;
if the difference value between the first current data and the second current data does not accord with a preset current loss range, determining a power stealing verification user and power stealing verification time corresponding to the power stealing verification user, and sending a verification request to a client associated with the power stealing verification user when the power stealing verification user is in the power stealing verification time so that the power stealing verification user performs power-off operation based on the verification request;
acquiring verification electric data in the user electric data acquisition equipment after the power-off operation is finished, and detecting and classifying the verification electric data according to power-off characteristics to obtain a detection and classification result;
and if the electricity stealing verification user is determined to be in-place electricity stealing state according to the detection classification result, sending electricity stealing warning information to the electricity stealing verification user.
2. The method of claim 1, wherein the electricity data comprises voltage data, current data, and wherein determining the electricity stealing verification user and the electricity stealing verification time corresponding to the electricity stealing verification user comprises:
acquiring all user information corresponding to the user electrical data acquisition equipment, and counting based on the electrical data acquired by the user electrical data acquisition equipment to obtain voltage data;
selecting a power stealing verification user from all the user information according to the difference value between the voltage data and a preset voltage gain range;
sending a power stealing verification time request instruction to a client associated with the power stealing verification user, wherein the power stealing verification time request instruction comprises at least two power stealing verification times to be selected so as to indicate the power stealing verification user to select;
and receiving the electricity stealing verification time selected by the electricity stealing verification user so as to carry out electricity stealing verification based on the electricity stealing verification time.
3. The method of claim 2, wherein the selecting a steal verification user from the total user information according to the difference between the voltage data and a preset voltage gain range comprises:
if the difference value between the voltage data and the preset voltage gain range is smaller than a first preset difference value threshold, searching user information corresponding to target electricity data larger than the first electricity data threshold from the electricity data, and determining the user as an electricity stealing verification user;
and if the difference value between the voltage data and the preset voltage gain range is greater than or equal to a second preset difference value threshold value, searching user information corresponding to target electric data which is greater than the second electric data threshold value and is a preset multiple of the first electric data threshold value from the electric data, and determining the user information as an electricity stealing verification user.
4. The method of claim 1, wherein the detection classification of the verification electrical data according to the power-off characteristic comprises:
acquiring power-off characteristics matched with the electricity stealing verification time, wherein the power-off characteristics comprise equipment detection power-off state parameters and electric data fluctuation values;
analyzing the verification state of the verification electrical data under the condition that the equipment detects the power-off state parameters and the electrical data fluctuation numerical values, wherein the verification state is used for representing the change state of the verification electrical data;
and classifying the verification states according to preset detection categories to obtain detection classification results.
5. The method of claim 4, wherein resolving the validation state of the validation electrical data upon the device detecting a power-off state parameter, the electrical data fluctuation value comprises:
and classifying the verification electric data according to a verification state classification model which is trained by the model to obtain the verification state of the verification electric data, wherein the verification state classification model is obtained by training based on a verification state training sample set, and the verification state training sample set comprises verification electric data samples which are subjected to verification state marking under different equipment detection power-off state parameters and different electric data fluctuation values.
6. The method of claim 1, wherein prior to obtaining the first current data statistically derived from the electrical data collected by the plurality of consumer electrical data collection devices, the method further comprises:
acquiring model information and equipment service life information of different user electrical data acquisition equipment;
determining a statistical proportion and a statistical function corresponding to each user electrical data acquisition device according to the model information and the device service life information;
and counting first current data corresponding to the electrical data according to the counting ratio and the counting function.
7. The method of any one of claims 1-6, further comprising:
if the initial electricity data collected by the user electricity data collecting equipment is matched with a preset electricity stealing monitoring threshold value, reporting user information corresponding to the user electricity data collecting equipment to determine the user information as an early warning user;
and if the number of the early warning users is determined to be larger than the preset number of the early warning users, generating a power supply equipment verification instruction for the early warning users, and sending a power supply equipment inspection terminal so that the power supply equipment inspection terminal can inspect the user electrical data acquisition equipment of the early warning users.
8. An electricity theft monitoring system, comprising:
the acquisition module is used for acquiring first current data obtained by counting the electrical data acquired by the plurality of user electrical data acquisition devices and second current data acquired by the branch line node electrical data acquisition devices;
the determining module is used for determining a power stealing verification user and power stealing verification time corresponding to the power stealing verification user if the difference value between the first current data and the second current data does not accord with a preset current loss range, and sending a verification request to a client associated with the power stealing verification user when the power stealing verification time is up so that the power stealing verification user can perform power-off operation based on the verification request;
the detection module is used for collecting the verification electric data in the user electric data collection equipment after the power-off operation is finished, and detecting and classifying the verification electric data according to the power-off characteristics to obtain a detection and classification result;
and the sending module is used for sending electricity stealing warning information to the electricity stealing verification user if the electricity stealing verification user is determined to be in-place electricity stealing state according to the detection classification result.
9. A storage medium having stored therein at least one executable instruction that causes a processor to perform operations corresponding to the electricity theft monitoring method of any one of claims 1-7.
10. A terminal, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the electricity stealing monitoring method according to any one of claims 1 to 7.
CN202211092378.XA 2022-09-08 2022-09-08 Electricity stealing monitoring method and system, storage medium and terminal Pending CN115170003A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211092378.XA CN115170003A (en) 2022-09-08 2022-09-08 Electricity stealing monitoring method and system, storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211092378.XA CN115170003A (en) 2022-09-08 2022-09-08 Electricity stealing monitoring method and system, storage medium and terminal

Publications (1)

Publication Number Publication Date
CN115170003A true CN115170003A (en) 2022-10-11

Family

ID=83480923

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211092378.XA Pending CN115170003A (en) 2022-09-08 2022-09-08 Electricity stealing monitoring method and system, storage medium and terminal

Country Status (1)

Country Link
CN (1) CN115170003A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106779069A (en) * 2016-12-08 2017-05-31 国家电网公司 A kind of abnormal electricity consumption detection method based on neutral net
CN111126727A (en) * 2018-10-30 2020-05-08 广州供电局有限公司 Electric power charging distributed parallel anomaly detection method
CN111612651A (en) * 2020-05-27 2020-09-01 福州大学 Abnormal electric quantity data detection method based on long-term and short-term memory network
CN112101635A (en) * 2020-08-25 2020-12-18 南方电网深圳数字电网研究院有限公司 Method and system for monitoring electricity utilization abnormity
CN112730938A (en) * 2020-12-15 2021-04-30 北京科东电力控制系统有限责任公司 Electricity stealing user judgment method based on electricity utilization collection big data
CN114094705A (en) * 2021-11-18 2022-02-25 贵州电网有限责任公司 Low-voltage distribution room electricity stealing monitoring system based on line loss and user electricity consumption

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106779069A (en) * 2016-12-08 2017-05-31 国家电网公司 A kind of abnormal electricity consumption detection method based on neutral net
CN111126727A (en) * 2018-10-30 2020-05-08 广州供电局有限公司 Electric power charging distributed parallel anomaly detection method
CN111612651A (en) * 2020-05-27 2020-09-01 福州大学 Abnormal electric quantity data detection method based on long-term and short-term memory network
CN112101635A (en) * 2020-08-25 2020-12-18 南方电网深圳数字电网研究院有限公司 Method and system for monitoring electricity utilization abnormity
CN112730938A (en) * 2020-12-15 2021-04-30 北京科东电力控制系统有限责任公司 Electricity stealing user judgment method based on electricity utilization collection big data
CN114094705A (en) * 2021-11-18 2022-02-25 贵州电网有限责任公司 Low-voltage distribution room electricity stealing monitoring system based on line loss and user electricity consumption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张瑞: "基于用电信息数据挖掘的智能反窃电研究与应用", 《价值工程》 *

Similar Documents

Publication Publication Date Title
CN111353911A (en) Power equipment operation and maintenance method, system, equipment and storage medium
CN108198408B (en) Self-adaptive anti-electricity-stealing monitoring method and system based on electricity information acquisition system
CN112327100B (en) Power failure detection method and system based on Internet of things
CN115170000A (en) Remote monitoring method and system based on electric energy meter communication module
CN112461289A (en) Ring main unit fault monitoring method, system, terminal and storage medium
CN115685050B (en) Electric energy meter fault detection method and system
CN112417763A (en) Defect diagnosis method, device and equipment for power transmission line and storage medium
CN115865649A (en) Intelligent operation and maintenance management control method, system and storage medium
CN116739829B (en) Big data-based power data analysis method, system and medium
KR102315580B1 (en) Fire predictive analysis device and method of building
CN117110794A (en) Intelligent diagnosis system and method for cable faults
CN116714469A (en) Charging pile health monitoring method, device, terminal and storage medium
CN115170003A (en) Electricity stealing monitoring method and system, storage medium and terminal
CN112885049B (en) Intelligent cable early warning system, method and device based on operation data
CN110321527B (en) Data validity judging method based on multi-element basic information fusion
CN114818234A (en) Intelligent comprehensive operation health identification management method and system for power equipment
CN113129160A (en) Electric power communication network inspection method based on equipment state perception and intellectualization
CN117554737B (en) Health condition detection method and system of vehicle-mounted charger
CN212965187U (en) Electronic equipment monitoring system
US20230069206A1 (en) Recovery judgment apparatus, recovery judgment method and program
CN117318614A (en) Photovoltaic inverter fault prediction method
CN113570002A (en) Method, system, storage medium and device for establishing electricity stealing user prediction model
CN114740282A (en) Method and system for identifying power failure event of low-voltage line
CN117455028A (en) Enterprise operation and maintenance management system and monitoring method thereof
CN117723818A (en) Voltage detection system based on server test

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20221011