Adaptive binary search algorithm for malicious user positioning in smart grid neighboring network

A binary search algorithm and malicious user technology, applied in the field of adaptive binary search algorithm, can solve the problems of high deployment cost and long detection time, and achieve the effect of shortening the detection time

Active Publication Date: 2019-06-25
SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problems of high deployment cost and long detection time of the existing malicious user detection method based on power measurement, the present invention proposes an adaptive binary search method for locating malicious users in the smart grid neighborhood area network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adaptive binary search algorithm for malicious user positioning in smart grid neighboring network
  • Adaptive binary search algorithm for malicious user positioning in smart grid neighboring network
  • Adaptive binary search algorithm for malicious user positioning in smart grid neighboring network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described in detail below in conjunction with the embodiments.

[0040] The main feature of this method is to first estimate the maximum value of malicious users in the neighborhood network; in the search process, the detector adaptively adapts to the relationship between the number of malicious users that have been detected and the total number of users still to be detected. Adjust the search strategy. Its search strategy includes one-by-one search strategy and binary search strategy. When the one-by-one search strategy is adopted, the detector detects only one user at a time; when the binary search strategy is adopted, the detector detects multiple users at the same time, and the number of detected users is determined by the number of malicious users that have been detected and the users that still need to be detected. The number is decided together.

[0041] An adaptive binary search algorithm for locating malicious users in smart g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a smart grid technology, and in particular relates to an adaptive binary search algorithm for malicious user positioning in a smart grid neighboring network. The method comprises the steps that first the maximum value of malicious users in the neighboring network is estimated; in a searching process, a detector adaptively adjusts a search strategy according to the relationship between the number of detected malicious users and the total number of users still needing to be detected; when a one-by-one search strategy is used, the detector detects only one user at a time;when a binary search strategy is adopted, the detector detects multiple users at the same time; and the number of detected users is determined by the number of detected malicious users and the numberof users still needing to be detected together. According to the invention, the adaptive binary search method for malicious user positioning in the smart grid neighboring network is proposed under the premise of reducing the deployment cost of detectors; and the algorithm can adaptively adjust the search strategy during a detection process and shorten the detection time of malicious users.

Description

Technical field [0001] The invention relates to smart grid technology, in particular to a self-adaptive binary search algorithm for locating malicious users in a neighborhood network of a smart grid. Background technique [0002] For a long time, the problem of electricity theft has plagued the development of power companies, and has also seriously affected the country's economic development and social stability. In recent years, with the significant increase in electricity demand, the problem of electricity theft has become particularly prominent. According to incomplete statistics, the current annual economic loss due to electricity theft is as high as 89.3 billion US dollars worldwide. There are many reasons for the phenomenon of electricity theft. It is related to users' legal concepts, moral concepts, socio-economic development level, electricity prices and user affordability, the anti-theft reliability of electric energy metering equipment, the level of electricity marketi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G01R31/00
Inventor 梁炜夏小芳郑萌肖杨夏晔李世明
Owner SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products