CN114416753B - Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data - Google Patents

Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data Download PDF

Info

Publication number
CN114416753B
CN114416753B CN202210336495.XA CN202210336495A CN114416753B CN 114416753 B CN114416753 B CN 114416753B CN 202210336495 A CN202210336495 A CN 202210336495A CN 114416753 B CN114416753 B CN 114416753B
Authority
CN
China
Prior art keywords
data
evidence
event window
quantized
dynamic event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210336495.XA
Other languages
Chinese (zh)
Other versions
CN114416753A (en
Inventor
王清
任志航
荆臻
代燕杰
张志�
李琮琮
杜艳
王平欣
朱红霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuji Group Co Ltd
Marketing Service Center of State Grid Shandong Electric Power Co Ltd
Original Assignee
Xuji Group Co Ltd
Marketing Service Center of State Grid Shandong Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuji Group Co Ltd, Marketing Service Center of State Grid Shandong Electric Power Co Ltd filed Critical Xuji Group Co Ltd
Priority to CN202210336495.XA priority Critical patent/CN114416753B/en
Publication of CN114416753A publication Critical patent/CN114416753A/en
Application granted granted Critical
Publication of CN114416753B publication Critical patent/CN114416753B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2291User-Defined Types; Storage management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2379Updates performed during online database operations; commit processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • Software Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Supply And Distribution Of Alternating Current (AREA)

Abstract

The invention provides a method and a system for processing electricity stealing evidence data based on space-time vector four-dimensional data, belonging to the technical field of data processing, wherein a preset four-dimensional data model is utilized to decompose data to be processed into time data, spatial position data, quantized data and a data carrier; reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window; adding a trusted timestamp signature to the reconstructed data to obtain final electricity stealing evidence key data; according to the invention, a space-time vector four-dimensional evidence chain processing mechanism is established, original data, field detection evidence and field image evidence are refined into four dimensions of time, position space, quantized data and data carriers, the relevance among the evidences (time, place and same equipment acquisition) is strengthened, and the authenticity, integrity and effectiveness of evidence data are improved.

Description

Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data
Technical Field
The invention relates to the technical field of data processing, in particular to a method and a system for processing electricity stealing evidence data based on space-time vector four-dimensional data.
Background
The statements in this section merely provide background information related to the present disclosure and may not constitute prior art.
Electric energy is widely used in various fields of national economy and production and life of people as clean energy. Because the electric energy cost accounts for a large proportion of the cost of enterprises, illegal operators and individual private owners earn violence and steal national electric energy by means. The legal rights and interests of enterprises and individuals are seriously damaged by the electricity stealing behavior, the normal power supply and utilization order is disturbed, the development of the electric power industry is hindered, and the serious threat is brought to the safe power utilization.
At present, an electric power worker is generally adopted to investigate related parties and witnesses, and 5 measures such as making an investigation record, looking up and copying related data, collecting evidence of electricity stealing by means of video recording, photography and the like, sealing an electricity stealing device, applying for evidence security and the like are adopted to obtain the evidence.
The inventor finds that the above mode of obtaining evidence has the following defects:
(1) the evidence obtained by each measure is insufficient; in order to ensure comprehensive and sufficient evidence obtaining, various analysis data and field detection data are used as part of evidence in the prior art, but the traditional computer electronic material evidence obtaining technology cannot solve the problem of reliable solidification of electronic material evidence and has adverse effects on the proving ability of the electronic material evidence;
(2) the evidences obtained by various measures are insufficient in mutual relevance, and the obtained evidences cannot be effectively proved to be obtained by aiming at the same electricity stealing user.
Disclosure of Invention
In order to solve the defects of the prior art, the invention provides a method and a system for processing electricity stealing evidence data based on space-time vector four-dimensional data, a space-time vector four-dimensional evidence chain processing mechanism is established, original data, field detection evidence and field image evidence are refined into four dimensions of time, position space, quantized data and a data carrier, the relevance among the evidence (the time, the place and the same equipment are obtained) is strengthened, and the authenticity, the integrity and the effectiveness of the evidence data are improved.
In order to achieve the purpose, the invention adopts the following technical scheme:
the invention provides a method for processing electricity stealing evidence data based on space-time vector four-dimensional data.
A method for processing electricity stealing evidence data based on space-time vector four-dimensional data comprises the following steps:
acquiring power utilization data, field detection data and field image data of user power utilization;
generating a first dynamic event window according to the change of the electricity utilization data before and after electricity stealing; generating a second dynamic event window according to field detection data in the electricity stealing process; generating a third dynamic event window according to the field image data in the electricity stealing process; generating a fourth dynamic event window according to the change of the power utilization data in and after the power stealing recovery; generating a fifth dynamic event window according to the change of the user electricity consumption data before electricity stealing occurs and after electricity stealing recovery;
the method comprises the steps that a first dynamic event window, a second dynamic event window, a third dynamic event window, a fourth dynamic event window and a fifth dynamic event window form data to be processed, and the data to be processed are decomposed into time data, spatial position data, quantitative data and a data carrier by utilizing a preset four-dimensional data model;
reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window;
and adding a trusted timestamp signature to the reconstructed data to obtain final key data of the electricity stealing evidence.
Furthermore, the electricity consumption data comprises electric quantity data, voltage data, current data and power data.
Further, reconstructing the time data, the spatial position data, the quantization data and the data carrier based on the D-S evidence theory, comprising:
the product of the confidence level of the quantized data evidence and the fusion degree of the quantized data evidence is greater than zero, and the larger the product is, the higher the priority of the quantized data is.
Further, quantifying data evidence confidence, comprising:
when the variation of the electric quantity data, the current data, the voltage data and the power data of the user in the first event window and the fourth event window is larger than a first preset value and the duration is larger than a second preset value, judging that the reliability of the quantized data evidence is 1, otherwise, judging that the reliability of the quantized data evidence is 0;
recovering the electric quantity data, the current data, the voltage data and the power data in the fifth event window, judging that the evidence reliability of the quantized data is 1 if no obvious change exists in the preset time, and otherwise, judging that the evidence reliability of the quantized data is 0;
in the second event window, when a suspected electricity stealing point is detected on site, the reliability of the quantized data evidence is judged to be 1, otherwise, the reliability of the quantized data evidence is judged to be 0.
Furthermore, if the quantized data evidence occurs and other three types of evidence simultaneously occur, determining that the quantized data evidence fusion degree is a first value;
if the quantized data evidence occurs and two types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a second numerical value;
if the quantized data evidence occurs and simultaneously accompanies a type of evidence to occur simultaneously, judging that the quantized data evidence fusion degree is a third numerical value;
if the quantized data evidence occurs and no accompanying evidence occurs simultaneously, judging that the quantized data evidence fusion degree is a fourth numerical value;
the first, second, third and fourth values decrease in sequence.
The invention provides a power stealing evidence data processing system based on space-time vector four-dimensional data.
A system for processing electricity stealing evidence data based on space-time vector four-dimensional data, comprising:
a data acquisition module configured to: acquiring power utilization data, field detection data and field image data of user power utilization;
an event windowing module configured to: generating a first dynamic event window according to the change of the electricity utilization data before and after electricity stealing; generating a second dynamic event window according to field detection data in the electricity stealing process; generating a third dynamic event window according to the field image data in the electricity stealing process; generating a fourth dynamic event window according to the change of the power utilization data in and after the power stealing recovery; generating a fifth dynamic event window according to the change of the electricity utilization data of the user before electricity stealing occurs and after electricity stealing recovery;
a data decomposition module configured to: the method comprises the steps that a first dynamic event window, a second dynamic event window, a third dynamic event window, a fourth dynamic event window and a fifth dynamic event window form data to be processed, and the data to be processed are decomposed into time data, spatial position data, quantitative data and a data carrier by utilizing a preset four-dimensional data model;
a data reconstruction module configured to: reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window;
a data signing module configured to: and adding a trusted timestamp signature to the reconstructed data to obtain final key data of the electricity stealing evidence.
Furthermore, the electricity consumption data comprises electric quantity data, voltage data, current data and power data.
Further, reconstructing the time data, the spatial position data, the quantization data and the data carrier based on the D-S evidence theory, comprising:
the product of the confidence level of the quantized data evidence and the fusion degree of the quantized data evidence is greater than zero, and the larger the product is, the higher the priority of the quantized data is.
Further, quantifying data evidence confidence, comprising:
when the variation of the electric quantity data, the current data, the voltage data and the power data of the user in the first event window and the fourth event window is larger than a first preset value and the duration is larger than a second preset value, judging that the reliability of the quantized data evidence is 1, otherwise, judging that the reliability of the quantized data evidence is 0;
recovering the electric quantity data, the current data, the voltage data and the power data in the fifth event window, judging that the evidence reliability of the quantized data is 1 if no obvious change exists in the preset time, and otherwise, judging that the evidence reliability of the quantized data is 0;
in the second event window, when a suspected electricity stealing point is detected on site, the reliability of the quantized data evidence is judged to be 1, otherwise, the reliability of the quantized data evidence is judged to be 0.
Furthermore, if the quantized data evidence occurs and other three types of evidence simultaneously occur, determining that the quantized data evidence fusion degree is a first value;
if the quantized data evidence occurs and two types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a second numerical value;
if the quantized data evidence occurs and simultaneously accompanies a type of evidence to occur simultaneously, judging that the quantized data evidence fusion degree is a third numerical value;
if the quantized data evidence occurs and no accompanying evidence occurs simultaneously, judging that the quantized data evidence fusion degree is a fourth numerical value;
the first, second, third and fourth values decrease in sequence.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the electricity stealing evidence data processing method and system based on the spatio-temporal vector four-dimensional data, provided by the invention, a spatio-temporal vector four-dimensional evidence chain processing mechanism is established, original data, field detection evidence and field image evidence are refined into four dimensions of time, position space, quantized data and a data carrier, the relevance among the evidences (the time, the place and the same equipment are obtained) is strengthened, and the authenticity, the integrity and the effectiveness of the evidence data are improved.
2. According to the electricity stealing evidence data processing method and system based on the space-time vector four-dimensional data, provided by the invention, a space-time vector four-dimensional data model based on time, space, quantized data and a data carrier is provided for the first time, so that various evidence data can be processed more clearly in the evidence obtaining process, and the reconstruction of subsequent evidence data is facilitated.
3. According to the electricity stealing evidence data processing method and system based on the space-time vector four-dimensional data, provided by the invention, the authenticity, objectivity and relevance of a reconstructed evidence chain are higher based on the D-S evidence theory multi-source information Dempster combination rule and the time logic of evidence organization.
4. According to the electricity stealing evidence data processing method and system based on the space-time vector four-dimensional data, provided by the invention, the credible timestamp signature is carried out on the original evidence chain after the aggregation reconstruction, so that the contents of the evidence chain can be kept complete and cannot be tampered in the migration and use processes, and the non-repudiation and non-repudiation of the evidence chain are improved.
Advantages of additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the invention and together with the description serve to explain the invention and not to limit the invention.
Fig. 1 is a schematic flow chart of a method for processing electricity stealing evidence data based on space-time vector four-dimensional data according to embodiment 1 of the present invention.
Fig. 2 is a schematic diagram of raw data sampling provided in embodiment 1 of the present invention.
Fig. 3 is a schematic diagram of an evidence data aggregation reconfiguration process provided in embodiment 1 of the present invention.
Fig. 4 is an exemplary diagram of an electricity stealing behavior audit report provided in embodiment 1 of the present invention.
Detailed Description
The invention is further described with reference to the following figures and examples.
It is to be understood that the following detailed description is exemplary and is intended to provide further explanation of the invention as claimed. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
The embodiments and features of the embodiments of the present invention may be combined with each other without conflict.
Example 1:
as shown in fig. 1, embodiment 1 of the present invention provides a method for processing electricity stealing evidence data based on space-time vector four-dimensional data, which ensures integrity, objectivity, validity, and non-repudiation of electricity stealing evidence, and includes the following steps:
s1: generating original data;
s2: cleaning and classifying original data;
s3: establishing a space-time vector four-dimensional processing model, and processing original data into a space-time vector four-dimensional data volume;
s4: performing polymerization reconstruction on the generated four-dimensional data body to generate an evidence chain prototype;
s5: and carrying out timestamp signature to generate a formal electricity stealing evidence chain.
In particular, the method comprises the following steps of,
s1 includes:
by utilizing a dynamic event window generation technology, as shown in fig. 2, a first dynamic event window is generated according to changes (i-ii) before and after electricity stealing of user electricity quantity data, voltage, current, function and other load data collected by a system;
generating a fourth dynamic event window according to the changes (II-V) of the load data such as the electric quantity data, the voltage, the current, the functions and the like of the user after the electricity stealing recovery in the electricity stealing process and the electricity stealing recovery;
generating a fifth dynamic event window according to the changes (i-v) of load data such as user electric quantity data, voltage, current, functions and the like before electricity stealing occurs and after electricity stealing recovery;
in the field detection process, the device is used for rapidly and accurately detecting the field metering device and the loop of the electricity stealing user without power outage (step three-step four), so that a second dynamic event window is generated, and a field detection evidence is generated;
the image recording device worn by the staff automatically records and takes pictures (the third-fourth process), and a third dynamic event window is generated to generate a scene image evidence.
S2 includes:
data cleaning and classification:
processing lost values, boundary-crossing values, inconsistent codes and repeated data of the data from the aspects of accuracy, completeness, consistency, uniqueness, timeliness and effectiveness of the data;
secondly, data are classified: and classifying and aggregating the original analysis data, the field detection data and the field image data according to the classification, sequencing, distance and scaling principles.
S3 includes:
any electricity stealing case occurrence and electricity stealing field detection (detection) process has Time, Space and place, occurrence Data variation and each basic attribute of a Data carrier, a Time-Space vector four-dimensional Data model (Time, Space, Quantitative and Data) TSQD model based on Time, Space, quantized Data and the Data carrier is established according to relevance and objectivity requirements in evidence triparence by combining evidentiary or evidence law, and original Data is decomposed into Time Data, Space position Data, quantized Data and Data carrier information.
The TSQD model comprises a comparison analysis of actual field operation data of user metering equipment, electricity stealing field position information, a time label and an electricity stealing result report, and the detailed model is as follows.
Firstly, the TSQD model is utilized to preliminarily analyze and screen the metering abnormality of the user metering equipmentAnd checking the approximate time point of the historical power utilization sudden change of the user, wherein the part is used as an auxiliary result of the power stealing abnormity and not used as actual evidence of the power stealing. If TSQD, as shown in equation (1) 1 If the current time is more than or equal to 30%, judging that electricity stealing behavior is suspected to exist in the month, the quarter or the year; if TSQD 1 And if the data is less than or equal to 30 percent, the data result is not taken as the evidence of suspected electricity stealing behavior.
Figure 259481DEST_PATH_IMAGE001
(1)
Wherein TSQD 1 Metering a historical monthly, quarterly or yearly frozen power usage change rate, DJ, of a device for a user 1 Metering historical month, quarter or year frozen power usage, DJ, of a device for a user 2 Metering the historical freezing power consumption of the equipment for the user in the second month, the second year or the year, and preliminarily analyzing when the user has the electricity stealing behavior by comparing the historical power consumption data of different periods.
Figure 513745DEST_PATH_IMAGE002
(2)
Wherein, EQ 1 The user is metered the accumulated amount of electricity over the time period from t1 to t2,Uis a value of the voltage to be applied,Iis a current value.
Figure 328117DEST_PATH_IMAGE003
(3)
Wherein, EQ 2 For the user to check the accumulated electric quantity value in the time period from t1 to t2 from the same time as the user metering device,Uis a value of the voltage to be applied,Iis a current value.
Figure 150579DEST_PATH_IMAGE004
(4)
Wherein TSQD 2 For relative error, if TSQD 2 If the measurement result is less than or equal to 2%, judging that the user metering equipment is normal; if TSQD 2 ≥2%And judging that the user metering equipment is abnormal and the suspicion of electricity stealing exists. According to the data result, the field inspection equipment issues an abnormal report of the user metering equipment, information such as issuing time, longitude and latitude position information, metering precision abnormal result data and the like is issued on the report content, the name of a third party detection mechanism is issued on the whole report, and the report is uploaded to a specific system in real time.
S4 includes:
and performing aggregation reconstruction on the dispersed and disordered time data, the spatial position data, the quantized data and the data carrier information processed by the space vector four-dimensional model according to the D-S evidence information fusion error correction and the evidence organization time logic, and outputting a true, objective, legal and highly-associated evidence chain, wherein the data aggregation reconstruction process is shown in FIG. 3.
Independent evidence bodies are known in 4 classes: the method comprises the following steps of time evidence, spatial position evidence, quantitative data evidence and data carrier evidence, wherein the quantitative data evidence and other 3 types of evidence in 4 types of evidence have direct association relation. Therefore, the quantized data is selected as a verification main line, whether time evidence, spatial position evidence and data carrier evidence are generated when the quantized data occurs is selected as target information for information verification, and three possibilities of generation of 3 types of evidence, generation of partial evidence and no evidence exist.
According to the D-S evidence theory, the quantitative data evidence fusion steps are as follows:
1) and (3) confirming the credibility E of the quantized data evidence: the quantized data evidence is obtained by analyzing and quantizing the original analysis evidence and the on-site detection evidence, and the change trend of the data in the event window is analyzed by utilizing the first dynamic event window, the second dynamic event window, the fourth dynamic event window and the fifth dynamic event window, so that the following judgment is made:
the electric quantity, the current, the voltage and the power load of the users in the first event window and the fourth event window are obviously and continuously changed (namely, when the change is greater than a first preset value and the duration is greater than a second preset value), the evidence credibility E of the quantized data is judged to be 1, otherwise, the evidence credibility E of the quantized data is 0;
if the user electric quantity, the current, the voltage and the power load are obviously recovered (namely, the third preset value is recovered) in the fifth event window, namely, the persistence has no obvious change (namely, the duration is greater than the fourth preset value), the evidence reliability E of the quantized data is judged to be 1, otherwise, the evidence reliability E of the quantized data is 0;
and in the second event window, if suspected electricity stealing points including electricity stealing equipment and electricity stealing methods are detected on the site, judging that the reliability E of the quantized data evidence is 1, otherwise, judging that the reliability E is 0.
In this embodiment, the first preset value, the second preset value, the third preset value and the fourth preset value are all artificial set values, and those skilled in the art can selectively set the values according to specific working conditions.
2) Quantitative data evidence fusion degree analysis: according to the direct incidence relation between the quantized data and other 3 types of evidences, whether the quantized data have time evidences, spatial position evidences and data carrier evidences when the quantized data occur is selected to generate target information for information verification, and three possibilities of 3 types of evidences, partial evidences and no evidences occur exist.
The determination is as follows:
if the quantized data evidence occurs and other 3 types of evidence occur simultaneously, judging that the quantized data evidence fusion degree R is 1 (namely a first numerical value);
if the quantized data evidence occurs and simultaneously occurs 2 types of evidence, judging that the quantized data evidence fusion degree R is 0.6 (namely a second numerical value);
if the quantized data evidence occurs and simultaneously occurs with 1 type of evidence, judging that the quantized data evidence fusion degree R is 0.3 (namely a third numerical value);
if the quantized data evidence occurs and no accompanying evidence occurs simultaneously, the quantized data evidence fusion degree R is judged to be 0 (namely, a fourth numerical value).
3) Occurrence time logic evidence reconstruction mechanism: and (4) reconstructing the evidence by taking the occurrence time of the evidence as a logic main line, wherein the selectable premise of selecting the evidence is that the product of the evidence credibility E and the evidence fusion degree R is greater than 0, and the higher the value is, the higher the priority is.
It can be understood that the first numerical value, the second numerical value, the third numerical value, and the fourth numerical value may also be selected according to specific working conditions, as long as the first numerical value, the second numerical value, the third numerical value, and the fourth numerical value are ensured to be decreased sequentially.
S5 includes:
the essence of the time stamp service is to bind the data of the user with the current accurate time, sign the data by using a digital certificate of a time stamp system on the basis, generate a time stamp which can be used for legal evidence by means of the authority authorization status of the time stamp system in law, prove the generation time of the data of the user and achieve the aim of 'non-repudiation' or 'anti-repudiation'. Based on the method, the credible timestamp signature is carried out on the original evidence chain after the aggregation reconstruction, so that the content of the data chain is kept complete and is not tampered in the migration and use processes, and the non-repudiation of the evidence chain are ensured.
Example 2:
embodiment 2 of the present invention provides a system for processing electricity stealing evidence data based on space-time vector four-dimensional data, including:
a data acquisition module configured to: acquiring power utilization data, field detection data and field image data of user power utilization;
an event windowing module configured to: generating a first dynamic event window according to the change of the electricity utilization data before and after electricity stealing; generating a second dynamic event window according to field detection data in the electricity stealing process; generating a third dynamic event window according to the field image data in the electricity stealing process; generating a fourth dynamic event window according to the change of the power utilization data in and after the power stealing recovery; generating a fifth dynamic event window according to the change of the electricity utilization data of the user before electricity stealing occurs and after electricity stealing recovery;
a data decomposition module configured to: the method comprises the steps that a first dynamic event window, a second dynamic event window, a third dynamic event window, a fourth dynamic event window and a fifth dynamic event window form data to be processed, and the data to be processed are decomposed into time data, spatial position data, quantitative data and a data carrier by utilizing a preset four-dimensional data model;
a data reconstruction module configured to: reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window;
a data signing module configured to: and adding a trusted timestamp signature to the reconstructed data to obtain final key data of the electricity stealing evidence.
The working method of the system is the same as the electricity stealing evidence data processing method based on the space-time vector four-dimensional data provided in embodiment 1, and details are not repeated here.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (4)

1. A method for processing electricity stealing evidence data based on space-time vector four-dimensional data is characterized by comprising the following steps:
the method comprises the following steps:
acquiring power utilization data, field detection data and field image data of user power utilization;
generating a first dynamic event window according to the change of the electricity utilization data before and after electricity stealing; generating a second dynamic event window according to field detection data in the electricity stealing process; generating a third dynamic event window according to the field image data in the electricity stealing process; generating a fourth dynamic event window according to the change of the power utilization data in and after the power stealing recovery; generating a fifth dynamic event window according to the change of the electricity utilization data of the user before electricity stealing occurs and after electricity stealing recovery;
the method comprises the steps that a first dynamic event window, a second event window, a third event window, a fourth dynamic event window and a fifth dynamic event window form data to be processed, and the data to be processed are decomposed into time data, spatial position data, quantitative data and a data carrier by utilizing a preset four-dimensional data model;
reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window;
adding a trusted timestamp signature to the reconstructed data to obtain final electricity stealing evidence key data;
the electricity consumption data comprises electric quantity data, voltage data, current data and power data;
reconstructing time data, spatial position data, quantization data and a data carrier based on a D-S evidence theory, comprising:
the product of the credibility of the quantized data evidence and the fusion degree of the quantized data evidence is larger than zero, and the higher the product is, the higher the priority of the quantized data is;
quantifying data evidence confidence, including:
when the variation of the electric quantity data, the current data, the voltage data and the power data of the user in the first event window and the fourth event window is larger than a first preset value and the duration is larger than a second preset value, judging that the reliability of the quantized data evidence is 1, otherwise, judging that the reliability of the quantized data evidence is 0;
recovering the electric quantity data, the current data, the voltage data and the power data in the fifth event window, judging that the evidence reliability of the quantized data is 1 if no obvious change exists in the preset time, and otherwise, judging that the evidence reliability of the quantized data is 0;
in the second event window, when a suspected electricity stealing point is detected on site, the reliability of the quantized data evidence is judged to be 1, otherwise, the reliability of the quantized data evidence is judged to be 0.
2. The electricity stealing evidence data processing method based on space-time vector four-dimensional data as claimed in claim 1, wherein:
if the quantized data evidence occurs and other three types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a first numerical value;
if the quantized data evidence occurs and two types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a second numerical value;
if the quantized data evidence occurs and simultaneously accompanies a type of evidence to occur simultaneously, judging that the quantized data evidence fusion degree is a third numerical value;
if the quantized data evidence occurs and no accompanying evidence occurs simultaneously, judging that the quantized data evidence fusion degree is a fourth numerical value;
the first, second, third and fourth values decrease in sequence.
3. A steal electric evidence data processing system based on space-time vector body four-dimensional data, its characterized in that:
the method comprises the following steps:
a data acquisition module configured to: acquiring power utilization data, field detection data and field image data of user power utilization;
an event windowing module configured to: generating a first dynamic event window according to the change of the electricity utilization data before and after electricity stealing; generating a second dynamic event window according to field detection data in the electricity stealing process; generating a third dynamic event window according to the field image data in the electricity stealing process; generating a fourth dynamic event window according to the change of the power utilization data in and after the power stealing recovery; generating a fifth dynamic event window according to the change of the electricity utilization data of the user before electricity stealing occurs and after electricity stealing recovery;
a data decomposition module configured to: forming data to be processed according to the first dynamic event window, the second dynamic event window, the third dynamic event window, the fourth dynamic event window and the fifth dynamic event window, and decomposing the data to be processed into time data, spatial position data, quantitative data and a data carrier by utilizing a preset four-dimensional data model;
a data reconstruction module configured to: reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window;
a data signing module configured to: adding a trusted timestamp signature to the reconstructed data to obtain final electricity stealing evidence key data;
the electricity consumption data comprises electric quantity data, voltage data, current data and power data;
reconstructing time data, spatial position data, quantization data and a data carrier based on a D-S evidence theory, comprising:
the product of the credibility of the quantized data evidence and the fusion degree of the quantized data evidence is larger than zero, and the higher the product is, the higher the priority of the quantized data is;
quantifying data evidence confidence, including:
when the variation of the electric quantity data, the current data, the voltage data and the power data of the user in the first event window and the fourth event window is larger than a first preset value and the duration is larger than a second preset value, judging that the reliability of the quantized data evidence is 1, otherwise, judging that the reliability of the quantized data evidence is 0;
recovering the electric quantity data, the current data, the voltage data and the power data in the fifth event window, judging that the evidence reliability of the quantized data is 1 if no obvious change exists in the preset time, and otherwise, judging that the evidence reliability of the quantized data is 0;
in the second event window, when a suspected electricity stealing point is detected on site, the reliability of the quantized data evidence is judged to be 1, otherwise, the reliability of the quantized data evidence is judged to be 0.
4. The space-time vector volume four-dimensional data-based electricity stealing evidence data processing system of claim 3, wherein:
if the quantized data evidence occurs and other three types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a first numerical value;
if the quantized data evidence occurs and two types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a second numerical value;
if the quantized data evidence occurs and simultaneously accompanies a type of evidence to occur simultaneously, judging that the quantized data evidence fusion degree is a third numerical value;
if the quantized data evidence occurs and no accompanying evidence occurs simultaneously, judging that the quantized data evidence fusion degree is a fourth numerical value;
the first, second, third and fourth values decrease in sequence.
CN202210336495.XA 2022-04-01 2022-04-01 Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data Active CN114416753B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210336495.XA CN114416753B (en) 2022-04-01 2022-04-01 Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210336495.XA CN114416753B (en) 2022-04-01 2022-04-01 Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data

Publications (2)

Publication Number Publication Date
CN114416753A CN114416753A (en) 2022-04-29
CN114416753B true CN114416753B (en) 2022-08-12

Family

ID=81263716

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210336495.XA Active CN114416753B (en) 2022-04-01 2022-04-01 Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data

Country Status (1)

Country Link
CN (1) CN114416753B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114926015B (en) * 2022-05-17 2023-07-21 国网山东省电力公司营销服务中心(计量中心) Intelligent electric energy meter quality state evaluation method and system based on D-S evidence theory

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111861211A (en) * 2020-07-20 2020-10-30 国网信通亿力科技有限责任公司 System with double-layer anti-electricity-stealing model
CN113484572A (en) * 2021-06-01 2021-10-08 国网吉林省电力有限公司信息通信公司 Anti-electricity-stealing monitoring method and system based on electricity utilization big data

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5991881A (en) * 1996-11-08 1999-11-23 Harris Corporation Network surveillance system
CN111652761B (en) * 2020-07-28 2020-12-01 国网江西省电力有限公司供电服务管理中心 Multi-source feature fusion electricity stealing behavior detection method based on evidence theory
CN112003372B (en) * 2020-08-19 2022-08-26 贵州电网有限责任公司 Remote intelligent monitoring method for preventing electricity theft
CN113392173A (en) * 2020-08-28 2021-09-14 郭举 Information push updating method and system based on block chain and cloud service information platform
CN113111053A (en) * 2021-04-13 2021-07-13 国网冀北电力有限公司技能培训中心 Line loss diagnosis and electricity stealing prevention system, method and model based on big data
CN113554529A (en) * 2021-09-18 2021-10-26 中国电力科学研究院有限公司 Anti-electricity-stealing evidence-obtaining key data processing method, device and equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111861211A (en) * 2020-07-20 2020-10-30 国网信通亿力科技有限责任公司 System with double-layer anti-electricity-stealing model
CN113484572A (en) * 2021-06-01 2021-10-08 国网吉林省电力有限公司信息通信公司 Anti-electricity-stealing monitoring method and system based on electricity utilization big data

Also Published As

Publication number Publication date
CN114416753A (en) 2022-04-29

Similar Documents

Publication Publication Date Title
Anbaroğlu et al. Non-recurrent traffic congestion detection on heterogeneous urban road networks
CN106650797B (en) Power distribution network electricity stealing suspicion user intelligent identification method based on integrated ELM
WO2019193583A2 (en) Methods, systems, apparatuses and devices for facilitating provisioning of audit data related to energy consumption, water consumption, water quality, greenhouse gas emissions, and air emissions using blockchain
CN107292501B (en) Method and equipment for evaluating quality of wastewater monitoring data
US7693767B2 (en) Method for generating predictive models for a business problem via supervised learning
CN114416753B (en) Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data
Zhao et al. Impact of data processing on deriving micro-mobility patterns from vehicle availability data
CN116681402B (en) Project information base service management system and method based on Internet of things
CN104244016A (en) H264 video content tampering detection method
Yip et al. Detection of energy theft and metering defects in advanced metering infrastructure using analytics
Altschaffel Computer forensics in cyber-physical systems: applying existing forensic knowledge and procedures from classical IT to automation and automotive
Banik et al. Anomaly detection techniques in smart grid systems: A review
CN110674534A (en) Remote quality detection technology based on Internet of things electronic evidence chain
Abdelgawad et al. Vulnerability analysis of interdependent critical infrastructures upon a cyber-attack
CN110428156A (en) Method, apparatus and electronic equipment for business datum verification
CN114881818A (en) Electronic material evidence data analysis system
CN115310982A (en) Electricity larceny prevention early warning data analysis method
CN113840178A (en) Method for preventing timestamp in monitoring video stream from being tampered
CN117992861B (en) Electric power data accuracy checking method and system
Boldt et al. A statistical method for detecting significant temporal hotspots using LISA statistics
CN117313169B (en) Tamper-resistant method of intelligent monitoring system for circulation data of finished oil
Nanda et al. Anomaly Detection in Smart Grid Networks Using Power Consumption Data
CN113052415B (en) Case analysis-based judge early warning monitoring method and device for judges, electronic equipment and storage medium
CN112150036B (en) Method and device for detecting gas theft of boiler gas user based on data driving
CN111311057A (en) Laboratory metering system based on block chain technology and implementation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant