Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Low voltage network electricity theft detection method based on AMI data

A technology of a low-voltage distribution network and a detection method, which is applied in the field of electricity stealing detection, can solve the problem that an electronic electric energy meter cannot effectively solve the problem of bypassing electricity stealing of a low-voltage distribution network and the like.

Inactive Publication Date: 2017-02-15
CHINA ELECTRIC POWER RES INST +2
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the electronic watt-hour meter still cannot effectively solve the problem of bypass power theft in the low-voltage distribution network. Electricity theft problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Low voltage network electricity theft detection method based on AMI data
  • Low voltage network electricity theft detection method based on AMI data
  • Low voltage network electricity theft detection method based on AMI data

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0048] Let N be the number of nodes in the low-voltage distribution network under study. arr is an array of node numbers sorted by network topology from bottom to top, user nodes first and then non-user nodes. up is an array of upper-level node numbers. The basic process of using the voltage difference method to detect power theft in low-voltage distribution networks is as follows:

[0049] (1) Processing of user nodes;

[0050] 1) Each time a user node is selected in order from the arr array, and its number is set to k; the upper node number m of node k is obtained through the up array.

[0051] 2) Obtain the phase W (W ∈ {A, B, C}) of user node k.

[0052] 3) Calculate the W-phase voltage U of node m through node k pc .

[0053] 4) Put U PC Stored in the W-phase voltage storage matrix of node m.

[0054] 5) Add the current at node k to the W-phase current at node m.

[0055] attached figure 1It is a local topological diagram of a typical low-voltage distribution net...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a low voltage network electricity theft detection method based on the AMI data. The method comprises steps that a phase voltage corresponding to a common point is calculated, and whether a user of a phase corresponding to the common point has electricity theft behaviors is determined. According to the method, an intelligent meter is utilized to measure the data, in combination with a low voltage network topology structure and line parameters, the user position of the three-phase low voltage network having bypass electricity theft behaviors and electricity theft time segments can be effectively detected, electricity theft quantity is estimated, and thereby an electricity theft problem is solved with pertinency .

Description

technical field [0001] The invention relates to a method for detecting electricity theft, in particular to a method for detecting electricity theft in a low-voltage distribution network based on AMI data. Background technique [0002] With the economic development and the increase of social electricity consumption, the problem of stealing electricity has become more and more prominent, and there are more and more methods of stealing electricity. The electricity stealing methods mainly include bypass electricity stealing (privately connecting external lines, bypassing the meter) and tampering with the meter. Most of the stealing phenomenon occurs in the low-voltage distribution network. Limited by the acquisition of high-density measurement data, there are few studies on electricity theft detection for ordinary users in low-voltage distribution networks, especially bypass electricity theft and its power estimation, usually mainly relying on manual inspection to fulfill. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G01R31/00
CPCG01R31/00
Inventor 栾文鹏赵磊余贻鑫王鹏苏雪源王倩郭志民周宁郭屾
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products