CN116047223A - Electricity larceny distinguishing method based on real-time electricity consumption and big data analysis - Google Patents

Electricity larceny distinguishing method based on real-time electricity consumption and big data analysis Download PDF

Info

Publication number
CN116047223A
CN116047223A CN202211698772.8A CN202211698772A CN116047223A CN 116047223 A CN116047223 A CN 116047223A CN 202211698772 A CN202211698772 A CN 202211698772A CN 116047223 A CN116047223 A CN 116047223A
Authority
CN
China
Prior art keywords
user
line loss
electricity
potential
identified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211698772.8A
Other languages
Chinese (zh)
Inventor
孟慧平
李东
张洋
刘越
谢波
安致嫄
郭少勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Power Investment Group Henan Electric Power Co ltd
State Grid Corp of China SGCC
Beijing University of Posts and Telecommunications
Information and Telecommunication Branch of State Grid Henan Electric Power Co Ltd
Original Assignee
State Power Investment Group Henan Electric Power Co ltd
State Grid Corp of China SGCC
Beijing University of Posts and Telecommunications
Information and Telecommunication Branch of State Grid Henan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Power Investment Group Henan Electric Power Co ltd, State Grid Corp of China SGCC, Beijing University of Posts and Telecommunications, Information and Telecommunication Branch of State Grid Henan Electric Power Co Ltd filed Critical State Power Investment Group Henan Electric Power Co ltd
Priority to CN202211698772.8A priority Critical patent/CN116047223A/en
Publication of CN116047223A publication Critical patent/CN116047223A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/08Locating faults in cables, transmission lines, or networks
    • G01R31/088Aspects of digital computing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Economics (AREA)
  • Molecular Biology (AREA)
  • Artificial Intelligence (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a method for judging electricity larceny based on real-time electricity information and big data analysis, which belongs to the technical field of power systems and specifically comprises the following steps: acquiring a line loss threshold value of a user based on a line loss prediction model of the LA-GSA-GRU algorithm based on real-time electricity utilization data, weather temperature and resistivity of a power transmission line material of the user; when the line loss rate of the user is larger than the line loss threshold value of the user, the user is identified as a potential abnormal client, and the ratio of the line loss rate to the line loss threshold value is used as the line loss ratio; when the number of times that the user is identified as the potential line loss user in the next month is larger than the first threshold value, determining the line loss abnormality degree of the potential line loss user based on the number of times that the user is identified as the potential abnormal line loss user, the average value of the line loss ratios when all the users are identified as the potential abnormal line loss users and the maximum value of the line loss ratios when the users are identified as the potential abnormal line loss users, and judging the electricity stealing behavior based on the line loss abnormality degree, so that the efficiency and the accuracy of electricity stealing judgment are further improved.

Description

Electricity larceny distinguishing method based on real-time electricity consumption and big data analysis
Technical Field
The invention belongs to the technical field of power systems, and particularly relates to a method for judging fraudulent use of electricity based on real-time electricity information and big data analysis.
Background
In order to realize accurate identification of electricity larceny by adopting big data, the invention patent publication No. CN111521868B (a method and a device for screening electricity larceny users based on metering big data) obtains metering big data, wherein the metering big data comprises electricity consumption, electric quantity lost in a station area and line loss rate; determining the electricity stealing behavior characteristics according to the metering big data; calculating a related parameter threshold value of the electricity larceny by using a preset algorithm according to the characteristics of the electricity larceny; calculating relevant parameters of electricity stealing behaviors of users in the target platform region by using a preset algorithm according to the metering big data of the target platform region; comparing the electricity larceny related parameter with an electricity larceny related parameter threshold; according to the comparison result, the suspected electricity larceny users in the target platform area are screened, the working efficiency of screening the electricity larceny users is improved, but the following technical problems exist:
1. the influence of the temperature, the electricity consumption and the resistivity of the power transmission line material on the threshold value is ignored, the core of the line loss is generated by the impedance value of the line, and the impedance value of the line can be influenced by different temperatures, the electricity consumption and the resistivity of the power transmission line material, so that a fixed impedance value mode is adopted, the accuracy is not high, and the false identification of a power stealing user can be possibly caused.
2. The error probability of the identification result adopted only once is high, and the error identification of the electricity stealing behavior of the electricity consumer is caused due to the occurrence of abnormal conditions such as replacement of the electric equipment or short circuit, so that the error identification of the electricity stealing consumer is possibly caused if the identification is not carried out for a plurality of times within a certain time threshold.
Aiming at the technical problems, the invention provides a method for judging electricity larceny based on real-time electricity consumption information and big data analysis.
Disclosure of Invention
In order to achieve the purpose of the invention, the invention adopts the following technical scheme:
according to one aspect of the invention, a method for discriminating electricity theft based on real-time electricity information and big data analysis is provided.
A method for discriminating electricity larceny based on real-time electricity consumption and big data analysis is characterized by comprising the following steps:
s11, determining an abnormal threshold value of the power consumption data of the user based on the historical power consumption data of the user, judging whether the real-time power consumption data of the user is larger than the abnormal threshold value of the power consumption data or not based on the real-time power consumption data of the user, if so, entering a step S12, and if not, judging that the user does not have the power stealing behavior;
s12, acquiring a line loss threshold value of the user by adopting a line loss prediction model based on an LA-GSA-GRU algorithm based on real-time power consumption data, weather temperature and resistivity of a power transmission line material of the user;
s13, judging whether the line loss rate of the user is larger than the line loss threshold of the user, if so, identifying the user as a potential abnormal client, taking the ratio of the line loss rate of the user to the line loss threshold as a line loss ratio, and entering a step S14, if not, judging that the user does not have electricity stealing behavior;
and S14, when the number of times that the user is identified as the potential line loss user is larger than a first threshold value in the last month, determining the line loss anomaly degree of the potential line loss user by adopting a prediction model based on a machine learning algorithm based on the number of times that the user is identified as the potential abnormal line loss user, the average value of the line loss ratios when all the users are identified as the potential abnormal line loss users and the maximum value of the line loss ratios when the users are identified as the potential abnormal line loss users, and judging the electricity stealing behavior based on the line loss anomaly degree of the potential line loss user.
The line loss threshold value of the user is obtained based on the real-time power consumption data, the weather temperature and the resistivity of the power transmission line material of the user, so that the determination of the line loss threshold value is combined with the real-time power consumption data, the weather temperature and the resistivity of the power transmission line material of the user, the original technical problems of inaccuracy and poor flexibility of adopting the fixed line loss threshold value are avoided, and the reliability and the accuracy of judgment are further promoted.
By adopting a line loss prediction model based on the LA-GSA-GRU algorithm and automatically adjusting initial gravitation in the GSA based on a learning automaton, the GSA algorithm has better optimizing performance and faster convergence rate, and simultaneously, in order to avoid the problems that the GRU algorithm cannot automatically select in structure, random initial parameters directly influence the calculation process of the GRU algorithm, the convergence rate is slow and the like, the network layer number of an implicit layer of the GRU algorithm and the optimizing of node numbers of each layer are realized by adopting the LA-GSA algorithm, so that the convergence rate and the convergence precision are further improved.
Through the judgment of potential abnormal clients and the setting of the first threshold value, the judgment of the electricity stealing behavior of the user is not only dependent on single data or single potential abnormal conditions, but also the judgment of the line loss anomaly degree is realized by combining a prediction model adopting a machine learning algorithm, so that the accuracy and the reliability of the judgment are obviously improved, and the reliability of the line loss judgment is further ensured.
The further technical scheme is that the abnormal threshold value of the electricity consumption data of the user is determined according to the maximum value of the electricity consumption data of the user in the last year.
The further technical scheme is that the specific steps of line loss threshold construction are as follows:
s21, judging whether the real-time electricity consumption data of the user is larger than the maximum value of the historical electricity consumption data of the user at the same moment in the last week, if so, entering a step S22; if not, the user does not have the abnormal line loss condition, and the judgment of the line loss threshold value is not needed;
s22, obtaining a real-time electricity utilization ratio based on the ratio of the real-time electricity utilization data of the user to the average value of the historical electricity utilization data of the user at the same moment in the last week;
s23, acquiring a basic line loss threshold value of the user by adopting a line loss prediction model based on an LA-GSA-GRU algorithm based on the real-time power utilization ratio, the weather temperature and the resistivity of the power transmission line material;
and S24, correcting the basic line loss threshold value of the user based on the number of times that the user is identified as the potential line loss user in the last month to obtain the line loss threshold value of the user.
By judging the historical electricity consumption data, unnecessary calculation and establishment of a prediction model are avoided, the efficiency of the system is further improved, and the basic line loss threshold value of the user is further corrected by combining the number of times that the user is identified as a potential line loss user in the last month, so that the accuracy and reliability of the judgment of the final line loss threshold value are obviously improved.
Through the judgment of the real-time electricity utilization ratio, not only is the real-time electricity utilization data combined, but also the real-time electricity utilization data is combined with the electricity utilization data in the near week, so that the reliability and consistency of the finally judged data are further improved.
The further technical scheme is that the calculation formula of the line loss threshold value of the user is as follows:
Figure BDA0004023211540000031
wherein T is limit For the threshold number of times, T is generally taken between 3 and 5 times 1 D, for the number of times the user is identified as potential line loss user in the last month 1 As the basic line loss threshold, K 1 Is constant and has a value ranging from 0 to 0.05.
The further technical scheme is that the first threshold is determined according to the historical electricity fee arrearages of the potential line loss users and the historical electricity fee arrearages, wherein the more the historical electricity fee arrearages of the potential line loss users are, the more the historical electricity fee arrearages are, and the smaller the first threshold is.
The further technical scheme is that when the number of times of the user identified as the potential line loss user in the last month is larger than a second threshold value and the maximum value of the line loss ratio values of the users identified as the potential abnormal line loss users in the last month is larger than a first ratio value threshold value, the user is identified to have electricity stealing behavior, wherein the second threshold value is larger than the first threshold value.
The further technical proposal is that the specific steps of line loss abnormality degree construction are as follows:
s31, judging whether the number of times that the user is identified as a potential line loss user in the last month is larger than a third threshold value, if so, identifying that the user has electricity stealing behavior, and if not, entering step S32;
s32, judging whether the average value of line loss ratios of all users identified as potential abnormal line loss users is larger than a first average value threshold value and the number of times of identifying the users as potential line loss users in the last month is larger than a second threshold value, if so, identifying that the users have electricity stealing behaviors, and if not, entering step S33;
s33, determining the line loss anomaly degree of the potential line loss user by adopting a prediction model based on a BP neural network algorithm based on the number of times the user is identified as the potential abnormal line loss user, the average value of the line loss ratio when the user is identified as the potential abnormal line loss user and the maximum value of the line loss ratio when the user is identified as the potential abnormal line loss user.
By further combining the third threshold value, the second threshold value and the first average threshold value, abnormal users can be accurately identified, excessive computing resources occupied by partial users with larger abnormal degrees are avoided, judging efficiency is improved, and judging accuracy is improved for users with smaller abnormal degrees.
When the line loss anomaly degree of the potential line loss user is larger than a first anomaly degree threshold value, determining that the user has electricity stealing behavior; and when the line loss anomaly degree of the potential line loss user is larger than a second anomaly degree threshold value and the number of times that the user is identified as the potential line loss user is larger than a second threshold value, identifying that the user has electricity stealing behavior.
On the other hand, the invention provides a terminal device, which comprises a memory, a processor and a program stored on the memory and capable of running on the processor, wherein when the processor executes the program, the method for judging electricity theft based on real-time electricity information and big data analysis is realized.
In another aspect, the present invention provides a computer storage medium having a computer program stored thereon, which when executed in a computer causes the computer to perform the above-described electricity theft judging method based on real-time electricity consumption and big data analysis.
Additional features and advantages will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The above and other features and advantages of the present invention will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings.
Fig. 1 is a flowchart of a method for discriminating electricity theft based on real-time electricity consumption and big data analysis according to embodiment 1.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments can be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar structures, and thus detailed descriptions thereof will be omitted.
The terms "a," "an," "the," and "said" are used to indicate the presence of one or more elements/components/etc.; the terms "comprising" and "having" are intended to be inclusive and mean that there may be additional elements/components/etc. in addition to the listed elements/components/etc.
Example 1
In order to solve the above problems, according to one aspect of the present invention, as shown in fig. 1, there is provided a method for determining fraudulent use of electricity based on real-time electricity consumption and big data analysis, comprising:
s11, determining an abnormal threshold value of the power consumption data of the user based on the historical power consumption data of the user, judging whether the real-time power consumption data of the user is larger than the abnormal threshold value of the power consumption data or not based on the real-time power consumption data of the user, if so, entering a step S12, and if not, judging that the user does not have the power stealing behavior;
it should be noted that the electricity consumption data abnormality threshold is determined according to the maximum value of the electricity consumption data of the user in the last year.
S12, acquiring a line loss threshold value of the user by adopting a line loss prediction model based on an LA-GSA-GRU algorithm based on real-time power consumption data, weather temperature and resistivity of a power transmission line material of the user;
it should be further noted that, the formula of calculating the gravitational constant of the GSA algorithm is:
Figure BDA0004023211540000051
wherein G is 0 For initial attraction, T is the maximum iteration number, T is the current iteration number, rand (0, 1) is a random number with a value ranging from 0 to 1, K2 is a constant, the value is between 0.9 and 1, α is the attenuation coefficient.
S13, judging whether the line loss rate of the user is larger than the line loss threshold of the user, if so, identifying the user as a potential abnormal client, taking the ratio of the line loss rate of the user to the line loss threshold as a line loss ratio, and entering a step S14, if not, judging that the user does not have electricity stealing behavior;
and S14, when the number of times that the user is identified as the potential line loss user is larger than a first threshold value in the last month, determining the line loss anomaly degree of the potential line loss user by adopting a prediction model based on a machine learning algorithm based on the number of times that the user is identified as the potential abnormal line loss user, the average value of the line loss ratios when all the users are identified as the potential abnormal line loss users and the maximum value of the line loss ratios when the users are identified as the potential abnormal line loss users, and judging the electricity stealing behavior based on the line loss anomaly degree of the potential line loss user.
For example, if the number of times the user is identified as a potential abnormal line loss user is 4, the line loss ratio values when the user is identified as a potential abnormal line loss user are 1.2,1.3,1.5,2.0, respectively, the average value is 1.5, and the maximum value of the line loss ratio values when the user is identified as a potential abnormal line loss user is 2.0.
The line loss threshold value of the user is obtained based on the real-time power consumption data, the weather temperature and the resistivity of the power transmission line material of the user, so that the determination of the line loss threshold value is combined with the real-time power consumption data, the weather temperature and the resistivity of the power transmission line material of the user, the original technical problems of inaccuracy and poor flexibility of adopting the fixed line loss threshold value are avoided, and the reliability and the accuracy of judgment are further promoted.
By adopting a line loss prediction model based on the LA-GSA-GRU algorithm and automatically adjusting initial gravitation in the GSA based on a learning automaton, the GSA algorithm has better optimizing performance and faster convergence rate, and simultaneously, in order to avoid the problems that the GRU algorithm cannot automatically select in structure, random initial parameters directly influence the calculation process of the GRU algorithm, the convergence rate is slow and the like, the network layer number of an implicit layer of the GRU algorithm and the optimizing of node numbers of each layer are realized by adopting the LA-GSA algorithm, so that the convergence rate and the convergence precision are further improved.
Through the judgment of potential abnormal clients and the setting of the first threshold value, the judgment of the electricity stealing behavior of the user is not only dependent on single data or single potential abnormal conditions, but also the judgment of the line loss anomaly degree is realized by combining a prediction model adopting a machine learning algorithm, so that the accuracy and the reliability of the judgment are obviously improved, and the reliability of the line loss judgment is further ensured.
In another possible embodiment, the user's electricity consumption data anomaly threshold is determined from a maximum value of electricity consumption data of the user over a recent year.
In another possible embodiment, the specific steps of constructing the line loss threshold value are as follows:
s21, judging whether the real-time electricity consumption data of the user is larger than the maximum value of the historical electricity consumption data of the user at the same moment in the last week, if so, entering a step S22; if not, the user does not have the abnormal line loss condition, and the judgment of the line loss threshold value is not needed;
s22, obtaining a real-time electricity utilization ratio based on the ratio of the real-time electricity utilization data of the user to the average value of the historical electricity utilization data of the user at the same moment in the last week;
s23, acquiring a basic line loss threshold value of the user by adopting a line loss prediction model based on an LA-GSA-GRU algorithm based on the real-time power utilization ratio, the weather temperature and the resistivity of the power transmission line material;
and S24, correcting the basic line loss threshold value of the user based on the number of times that the user is identified as the potential line loss user in the last month to obtain the line loss threshold value of the user.
By judging the historical electricity consumption data, unnecessary calculation and establishment of a prediction model are avoided, the efficiency of the system is further improved, and the basic line loss threshold value of the user is further corrected by combining the number of times that the user is identified as a potential line loss user in the last month, so that the accuracy and reliability of the judgment of the final line loss threshold value are obviously improved.
Through the judgment of the real-time electricity utilization ratio, not only is the real-time electricity utilization data combined, but also the real-time electricity utilization data is combined with the electricity utilization data in the near week, so that the reliability and consistency of the finally judged data are further improved.
In another possible embodiment, the calculation formula of the line loss threshold value of the user is:
Figure BDA0004023211540000071
wherein T is limit For the threshold number of times, T is generally taken between 3 and 5 times 1 D, for the number of times the user is identified as potential line loss user in the last month 1 As the basic line loss threshold, K 1 Is constant and has a value ranging from 0 to 0.05.
In another possible embodiment, the first threshold is determined according to the historical electricity fee owed times and the historical electricity fee owed amount of the potential line loss user, wherein the more the historical electricity fee owed times and the more the historical electricity fee owed amount of the potential line loss user are, the smaller the first threshold is.
In another possible embodiment, when the number of times the user is identified as a potential line loss user in the last month is greater than a second threshold and the maximum value of the line loss ratio values when the user is identified as a potential abnormal line loss user in the last month is greater than a first threshold, the user is identified as having electricity theft behavior, wherein the second threshold is greater than the first threshold.
In another possible embodiment, the specific steps of line loss anomaly construction are as follows:
s31, judging whether the number of times that the user is identified as a potential line loss user in the last month is larger than a third threshold value, if so, identifying that the user has electricity stealing behavior, and if not, entering step S32;
s32, judging whether the average value of line loss ratios of all users identified as potential abnormal line loss users is larger than a first average value threshold value and the number of times of identifying the users as potential line loss users in the last month is larger than a second threshold value, if so, identifying that the users have electricity stealing behaviors, and if not, entering step S33;
s33, determining the line loss anomaly degree of the potential line loss user by adopting a prediction model based on a BP neural network algorithm based on the number of times the user is identified as the potential abnormal line loss user, the average value of the line loss ratio when the user is identified as the potential abnormal line loss user and the maximum value of the line loss ratio when the user is identified as the potential abnormal line loss user.
By further combining the third threshold value, the second threshold value and the first average threshold value, abnormal users can be accurately identified, excessive computing resources occupied by partial users with larger abnormal degrees are avoided, judging efficiency is improved, and judging accuracy is improved for users with smaller abnormal degrees.
In another possible embodiment, when the line loss anomaly degree of the potential line loss user is greater than a first anomaly degree threshold value, determining that the user has electricity stealing behavior; and when the line loss anomaly degree of the potential line loss user is larger than a second anomaly degree threshold value and the number of times that the user is identified as the potential line loss user is larger than a second threshold value, identifying that the user has electricity stealing behavior.
Example 2
The invention provides a terminal device, which comprises a memory, a processor and a program stored on the memory and capable of running on the processor, wherein the processor realizes the electricity larceny judging method based on real-time electricity information and big data analysis when executing the program.
Example 3
The invention provides a computer storage medium, on which a computer program is stored, which when executed in a computer, causes the computer to execute the above-mentioned electricity stealing judging method based on real-time electricity consumption and big data analysis.
In the several embodiments provided in this application, it should be understood that the disclosed systems and methods may be implemented in other ways as well. The system embodiments described above are merely illustrative, for example, of the flowcharts and block diagrams in the figures that illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present invention may be integrated together to form a single part, or each module may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored on a computer readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method of the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
With the above-described preferred embodiments according to the present invention as an illustration, the above-described descriptions can be used by persons skilled in the relevant art to make various changes and modifications without departing from the scope of the technical idea of the present invention. The technical scope of the present invention is not limited to the description, but must be determined according to the scope of claims.

Claims (10)

1. A method for discriminating electricity larceny based on real-time electricity consumption and big data analysis is characterized by comprising the following steps:
s11, determining an abnormal threshold value of the power consumption data of the user based on the historical power consumption data of the user, judging whether the real-time power consumption data of the user is larger than the abnormal threshold value of the power consumption data or not based on the real-time power consumption data of the user, if so, entering a step S12, and if not, judging that the user does not have the power stealing behavior;
s12, acquiring a line loss threshold value of the user by adopting a line loss prediction model based on an LA-GSA-GRU algorithm based on real-time power consumption data, weather temperature and resistivity of a power transmission line material of the user;
s13, judging whether the line loss rate of the user is larger than the line loss threshold of the user, if so, identifying the user as a potential abnormal client, taking the ratio of the line loss rate of the user to the line loss threshold as a line loss ratio, and entering a step S14, if not, judging that the user does not have electricity stealing behavior;
and S14, when the number of times that the user is identified as the potential line loss user is larger than a first threshold value in the last month, determining the line loss anomaly degree of the potential line loss user by adopting a prediction model based on a machine learning algorithm based on the number of times that the user is identified as the potential abnormal line loss user, the average value of the line loss ratios when all the users are identified as the potential abnormal line loss users and the maximum value of the line loss ratios when the users are identified as the potential abnormal line loss users, and judging the electricity stealing behavior based on the line loss anomaly degree of the potential line loss user.
2. The electricity theft judging method according to claim 1, wherein the electricity consumption data abnormality threshold of the user is determined based on a maximum value of electricity consumption data of the user in the last year.
3. The method for distinguishing the electricity theft according to claim 1, wherein the specific steps of constructing the line loss threshold value are as follows:
s21, judging whether the real-time electricity consumption data of the user is larger than the maximum value of the historical electricity consumption data of the user at the same moment in the last week, if so, entering a step S22; if not, the user does not have the abnormal line loss condition, and the judgment of the line loss threshold value is not needed;
s22, obtaining a real-time electricity utilization ratio based on the ratio of the real-time electricity utilization data of the user to the average value of the historical electricity utilization data of the user at the same moment in the last week;
s23, acquiring a basic line loss threshold value of the user by adopting a line loss prediction model based on an LA-GSA-GRU algorithm based on the real-time power utilization ratio, the weather temperature and the resistivity of the power transmission line material;
and S24, correcting the basic line loss threshold value of the user based on the number of times that the user is identified as the potential line loss user in the last month to obtain the line loss threshold value of the user.
4. The electricity theft judging method according to claim 3, wherein the calculation formula of the line loss threshold value of the user is:
Figure FDA0004023211530000021
wherein T is limit For the threshold number of times, T is generally taken between 3 and 5 times 1 D, for the number of times the user is identified as potential line loss user in the last month 1 As the basic line loss threshold, K 1 Is constant and has a value ranging from 0 to 0.05.
5. The method for determining the electricity theft according to claim 1, wherein the first threshold is determined according to the number of times of arrearages of the historical electric charges and the amount of arrearages of the historical electric charges of the potential line loss user, and wherein the larger the number of times of arrearages of the historical electric charges and the larger the amount of arrearages of the historical electric charges of the potential line loss user, the smaller the first threshold.
6. The method of claim 1, wherein the user is deemed to have fraudulent activity when the number of times the user was identified as a potential line loss user in the last month is greater than a second threshold and the maximum value of the line loss ratio values when the user was identified as a potential abnormal line loss user in the last month is greater than a first threshold, wherein the second threshold is greater than the first threshold.
7. The method for distinguishing electricity theft according to claim 1, wherein the specific steps of constructing the line loss anomaly are:
s31, judging whether the number of times that the user is identified as a potential line loss user in the last month is larger than a third threshold value, if so, identifying that the user has electricity stealing behavior, and if not, entering step S32;
s32, judging whether the average value of line loss ratios of all users identified as potential abnormal line loss users is larger than a first average value threshold value and the number of times of identifying the users as potential line loss users in the last month is larger than a second threshold value, if so, identifying that the users have electricity stealing behaviors, and if not, entering step S33;
s33, determining the line loss anomaly degree of the potential line loss user by adopting a prediction model based on a BP neural network algorithm based on the number of times the user is identified as the potential abnormal line loss user, the average value of the line loss ratio when the user is identified as the potential abnormal line loss user and the maximum value of the line loss ratio when the user is identified as the potential abnormal line loss user.
8. The method of claim 7, wherein when the line loss anomaly of the potential line loss user is greater than a first anomaly threshold, then recognizing that the user has electricity theft behavior; and when the line loss anomaly degree of the potential line loss user is larger than a second anomaly degree threshold value and the number of times that the user is identified as the potential line loss user is larger than a second threshold value, identifying that the user has electricity stealing behavior.
9. A terminal device comprising a memory, a processor and a program stored on the memory and executable on the processor, wherein the processor implements a method for determining theft of electricity based on real-time electricity information and big data analysis as claimed in any one of claims 1 to 8 when executing the program.
10. A computer storage medium having stored thereon a computer program which, when executed in a computer, causes the computer to perform a method of determining theft of electricity based on real-time electricity usage information and big data analysis as claimed in any one of claims 1 to 8.
CN202211698772.8A 2022-12-28 2022-12-28 Electricity larceny distinguishing method based on real-time electricity consumption and big data analysis Pending CN116047223A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211698772.8A CN116047223A (en) 2022-12-28 2022-12-28 Electricity larceny distinguishing method based on real-time electricity consumption and big data analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211698772.8A CN116047223A (en) 2022-12-28 2022-12-28 Electricity larceny distinguishing method based on real-time electricity consumption and big data analysis

Publications (1)

Publication Number Publication Date
CN116047223A true CN116047223A (en) 2023-05-02

Family

ID=86129071

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211698772.8A Pending CN116047223A (en) 2022-12-28 2022-12-28 Electricity larceny distinguishing method based on real-time electricity consumption and big data analysis

Country Status (1)

Country Link
CN (1) CN116047223A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117147958A (en) * 2023-08-23 2023-12-01 广东电网有限责任公司佛山供电局 Method and device for discriminating electricity larceny based on real-time electricity utilization monitoring

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117147958A (en) * 2023-08-23 2023-12-01 广东电网有限责任公司佛山供电局 Method and device for discriminating electricity larceny based on real-time electricity utilization monitoring

Similar Documents

Publication Publication Date Title
CN111652496B (en) Running risk assessment method and device based on network security situation awareness system
CN106933650A (en) load management method and system of cloud application system
CN110166344B (en) Identity identification method, device and related equipment
CN109377218B (en) Method, server and mobile terminal for suppressing false sensing attack
CN113342474B (en) Method, equipment and storage medium for predicting customer flow and training model
CN110874381A (en) User side load data abnormal value identification method based on space density clustering
CN111181923A (en) Flow detection method and device, electronic equipment and storage medium
CN117078048A (en) Digital twinning-based intelligent city resource management method and system
CN116047223A (en) Electricity larceny distinguishing method based on real-time electricity consumption and big data analysis
CN111784173B (en) AB experiment data processing method, device, server and medium
CN112529432B (en) Voltage sag severity assessment method and device and electronic equipment
CN117150508B (en) Cloud platform-based risk assessment method and system for terminal of Internet of things
CN113487326A (en) Transaction limiting parameter setting method and device based on intelligent contract
CN109800085A (en) Detection method, device, storage medium and the electronic equipment of resource distribution
CN108197498A (en) Obtain the method and device of data
CN117010483A (en) Federal learning security aggregation method and system for distributed load prediction
CN116861312A (en) Residual error network-based fault diagnosis method for electric power metering equipment
CN111783487A (en) Fault early warning method and device for card reader equipment
CN109547236A (en) Electronic data uploads storage method, readable storage medium storing program for executing and terminal
CN115393100A (en) Resource recommendation method and device
CN113609990A (en) Method and device for determining construction progress of target building and server
Irissappane et al. A case-based reasoning framework to choose trust models for different E-marketplace environments
CN111598390A (en) Server high availability evaluation method, device, equipment and readable storage medium
CN114189381B (en) Method for identifying malicious exit relay node of Tor anonymous communication network
CN113934616B (en) Method for judging abnormal user based on user operation time sequence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination