Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power consumption data anomaly detection method and system based on big data analysis

A technology of electricity consumption data and anomaly detection, applied in data processing applications, electrical digital data processing, information technology support systems, etc., can solve problems such as breaking the normal order of electricity consumption, affecting the safety of power grid operation, and damage to power equipment such as transformers. Achieve the effects of reducing the number and the scope of electric stealing detection, reducing the difficulty of investigation, and improving work efficiency

Pending Publication Date: 2022-07-08
深圳微言科技有限责任公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Stealing electricity breaks the normal order of electricity consumption, seriously affects the safety of power grid operation, threatens the safety of personal property, and damages transformers and other electrical equipment and personal electric shock accidents caused by stealing electricity occur from time to time, bringing great economic benefits to power supply companies and society. loss
[0003] Traditional electricity stealing user investigation is mainly through manual door-to-door inspection of station areas with high line loss, which is time-consuming and laborious, with a huge workload, more personnel required for on-site inspection, and higher labor costs
Moreover, the investigation work lacks pertinence, and the single-household inspection takes a long time, which is prone to false reports. It often requires staff to go to the site for investigation many times, and the efficiency is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power consumption data anomaly detection method and system based on big data analysis
  • Power consumption data anomaly detection method and system based on big data analysis
  • Power consumption data anomaly detection method and system based on big data analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0038] Electricity theft and fraudulent use of electricity have caused great economic losses to electric power enterprises. Although electric power enterprises have invested a lot of manpower and material resources to carry out detection and positioning, due to the various means of electric theft and the continuous updating of technical means, electric power enterprises can locate and detect electricity theft. brings great difficultie...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electricity consumption data anomaly detection method and system based on big data analysis, and belongs to the field of electric power safety detection. The method comprises the following steps: integrating historical electricity stealing behaviors, obtaining historical electricity stealing data, and constructing an electricity stealing accurate identification and electricity stealing feedback data analysis model; measuring the accuracy of the electric power stealing accurate identification and electric power stealing feedback data analysis model through the standardized covariance, and correcting the electric power stealing accurate identification and electric power stealing feedback data analysis model by using a loss function; and collecting real-time power utilization data, and inputting the real-time power utilization data into the accurate identification and electricity stealing feedback data analysis model to obtain whether an electricity stealing phenomenon exists or not and line loss data. The user electricity larceny analysis method based on the big data is beneficial to efficient investigation of electricity larceny behaviors, can analyze the electricity larceny behaviors, and is beneficial to line loss treatment of a power supply company.

Description

technical field [0001] The invention relates to the field of power safety detection, and more particularly to a method and system for abnormality detection of power consumption data based on big data analysis. Background technique [0002] In recent years, with the continuous development of my country's economy, the scale of the power grid, the scope of power supply, and the number of users have continued to expand, and the power consumption of users has also increased. It is inevitable that illegal electricity theft will occur. Electricity theft breaks the normal order of electricity consumption, seriously affects the safety of power grid operation, and threatens the safety of personal and property. The damage to power equipment such as transformers and personal electric shock accidents caused by electricity theft often occur, bringing greater economic benefits to power supply enterprises and society. loss. [0003] The traditional power-stealing user investigation is main...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F30/27G06Q50/06G06F119/02
CPCG06F30/27G06Q50/06G06F2119/02Y02D10/00
Inventor 吴叶国韩彧
Owner 深圳微言科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products