Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User load electricity stealing model mining system and method based on complex user behavior analysis

A technology of behavior analysis and model mining, applied in information technology support systems, electronic digital data processing, character and pattern recognition, etc., can solve problems such as consuming manpower and material resources

Active Publication Date: 2020-06-26
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the past, it generally relied on manual investigation and analysis of users suspected of stealing electricity, which consumed a lot of manpower and material resources. At present, the State Grid Corporation of China and various equipment manufacturers are actively exploring the use of real-time data such as metering automation systems to provide information for anti-stealing work. The means of modernization and intelligence can effectively combat the behavior of stealing electricity, which shows that the work of anti-stealing electricity is of great significance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User load electricity stealing model mining system and method based on complex user behavior analysis
  • User load electricity stealing model mining system and method based on complex user behavior analysis
  • User load electricity stealing model mining system and method based on complex user behavior analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] In order to deepen the understanding of the present invention, the present invention will be further described below in conjunction with examples, which are only used to explain the present invention and do not constitute a limitation to the protection scope of the present invention.

[0097] Such as Figure 1-2 As shown, this example provides a user load stealing power model mining system based on complex user behavior analysis, including a data processor, a power stealing suspect user discoverer, a user load curve generator and a power stealing user diagnostic device, the data The processor is connected with the electricity-stealing suspected user finder, the electricity-stealing suspected user finder is connected with the user load curve generator, and the user load curve generator is connected with the electricity-stealing user diagnostic device.

[0098] This example also provides a method for mining electricity stealing model of user load based on complex user beh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user load electricity stealing model mining system and method based on complex user behavior analysis. The system comprises a data processor, an electricity larceny suspect user discovering device, a user load curve generator and an electricity larceny user diagnosing device, the data processor is connected with the electricity larceny suspect user discovering device, theelectricity larceny suspect user discovering device is connected with the user load curve generator, and the user load curve generator is connected with the electricity larceny user diagnosing device.The DBSCAN density clustering algorithm is used for searching abnormal electricity users, then the fuzzy C-means algorithm is applied to generating a user load curve, and finally electricity stealingusers are detected through curve similarity comparison. Complex user load data are fully utilized to analyze user electricity consumption behaviors, and electricity stealing users can be well detected.

Description

technical field [0001] The invention relates to the field of data mining, in particular to a user load stealing power model mining system and method based on complex user behavior analysis. Background technique [0002] With the rapid development of my country's economy and the improvement of people's living standards, people's production and life are increasingly inseparable from electric energy, and the demand for electricity is also increasing. At the same time, the quality and reliability of electric energy are increasingly demanding. The user's electricity demand presents a diversified development trend. At present, my country has entered the era of fully building a smart grid. The data recorded by the electric energy metering automation system is growing exponentially, with a huge amount of data and a variety of structure types. Relevant data, such as current, voltage, and load, among which load data is the most widely used in the analysis of user electricity consumptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62G06F16/2458G06F16/215
CPCG06F16/215G06F16/2465G06F18/2321Y04S10/50
Inventor 邓松蔡清媛董霞岳东袁新雅陈福林祝展望张建堂
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products