CN114416753B - Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data - Google Patents
Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data Download PDFInfo
- Publication number
- CN114416753B CN114416753B CN202210336495.XA CN202210336495A CN114416753B CN 114416753 B CN114416753 B CN 114416753B CN 202210336495 A CN202210336495 A CN 202210336495A CN 114416753 B CN114416753 B CN 114416753B
- Authority
- CN
- China
- Prior art keywords
- data
- evidence
- event window
- quantized
- dynamic event
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005611 electricity Effects 0.000 title claims abstract description 95
- 238000003672 processing method Methods 0.000 title claims description 8
- 238000000034 method Methods 0.000 claims abstract description 45
- 238000012545 processing Methods 0.000 claims abstract description 25
- 238000001514 detection method Methods 0.000 claims abstract description 21
- 238000013499 data model Methods 0.000 claims abstract description 8
- 230000004927 fusion Effects 0.000 claims description 28
- 230000008859 change Effects 0.000 claims description 24
- 230000008569 process Effects 0.000 claims description 22
- 238000011084 recovery Methods 0.000 claims description 13
- 238000013139 quantization Methods 0.000 claims description 4
- 238000000354 decomposition reaction Methods 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 abstract description 5
- 239000000969 carrier Substances 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 11
- 238000004590 computer program Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 230000002776 aggregation Effects 0.000 description 5
- 238000004220 aggregation Methods 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 5
- 230000006399 behavior Effects 0.000 description 5
- 238000003860 storage Methods 0.000 description 5
- 230000002159 abnormal effect Effects 0.000 description 3
- 239000012776 electronic material Substances 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000004140 cleaning Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000005012 migration Effects 0.000 description 2
- 238000013508 migration Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 230000004931 aggregating effect Effects 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008014 freezing Effects 0.000 description 1
- 238000007710 freezing Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 238000006116 polymerization reaction Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 238000007711 solidification Methods 0.000 description 1
- 230000008023 solidification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2291—User-Defined Types; Storage management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2379—Updates performed during online database operations; commit processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Public Health (AREA)
- Water Supply & Treatment (AREA)
- Software Systems (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Supply And Distribution Of Alternating Current (AREA)
Abstract
The invention provides a method and a system for processing electricity stealing evidence data based on space-time vector four-dimensional data, belonging to the technical field of data processing, wherein a preset four-dimensional data model is utilized to decompose data to be processed into time data, spatial position data, quantized data and a data carrier; reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window; adding a trusted timestamp signature to the reconstructed data to obtain final electricity stealing evidence key data; according to the invention, a space-time vector four-dimensional evidence chain processing mechanism is established, original data, field detection evidence and field image evidence are refined into four dimensions of time, position space, quantized data and data carriers, the relevance among the evidences (time, place and same equipment acquisition) is strengthened, and the authenticity, integrity and effectiveness of evidence data are improved.
Description
Technical Field
The invention relates to the technical field of data processing, in particular to a method and a system for processing electricity stealing evidence data based on space-time vector four-dimensional data.
Background
The statements in this section merely provide background information related to the present disclosure and may not constitute prior art.
Electric energy is widely used in various fields of national economy and production and life of people as clean energy. Because the electric energy cost accounts for a large proportion of the cost of enterprises, illegal operators and individual private owners earn violence and steal national electric energy by means. The legal rights and interests of enterprises and individuals are seriously damaged by the electricity stealing behavior, the normal power supply and utilization order is disturbed, the development of the electric power industry is hindered, and the serious threat is brought to the safe power utilization.
At present, an electric power worker is generally adopted to investigate related parties and witnesses, and 5 measures such as making an investigation record, looking up and copying related data, collecting evidence of electricity stealing by means of video recording, photography and the like, sealing an electricity stealing device, applying for evidence security and the like are adopted to obtain the evidence.
The inventor finds that the above mode of obtaining evidence has the following defects:
(1) the evidence obtained by each measure is insufficient; in order to ensure comprehensive and sufficient evidence obtaining, various analysis data and field detection data are used as part of evidence in the prior art, but the traditional computer electronic material evidence obtaining technology cannot solve the problem of reliable solidification of electronic material evidence and has adverse effects on the proving ability of the electronic material evidence;
(2) the evidences obtained by various measures are insufficient in mutual relevance, and the obtained evidences cannot be effectively proved to be obtained by aiming at the same electricity stealing user.
Disclosure of Invention
In order to solve the defects of the prior art, the invention provides a method and a system for processing electricity stealing evidence data based on space-time vector four-dimensional data, a space-time vector four-dimensional evidence chain processing mechanism is established, original data, field detection evidence and field image evidence are refined into four dimensions of time, position space, quantized data and a data carrier, the relevance among the evidence (the time, the place and the same equipment are obtained) is strengthened, and the authenticity, the integrity and the effectiveness of the evidence data are improved.
In order to achieve the purpose, the invention adopts the following technical scheme:
the invention provides a method for processing electricity stealing evidence data based on space-time vector four-dimensional data.
A method for processing electricity stealing evidence data based on space-time vector four-dimensional data comprises the following steps:
acquiring power utilization data, field detection data and field image data of user power utilization;
generating a first dynamic event window according to the change of the electricity utilization data before and after electricity stealing; generating a second dynamic event window according to field detection data in the electricity stealing process; generating a third dynamic event window according to the field image data in the electricity stealing process; generating a fourth dynamic event window according to the change of the power utilization data in and after the power stealing recovery; generating a fifth dynamic event window according to the change of the user electricity consumption data before electricity stealing occurs and after electricity stealing recovery;
the method comprises the steps that a first dynamic event window, a second dynamic event window, a third dynamic event window, a fourth dynamic event window and a fifth dynamic event window form data to be processed, and the data to be processed are decomposed into time data, spatial position data, quantitative data and a data carrier by utilizing a preset four-dimensional data model;
reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window;
and adding a trusted timestamp signature to the reconstructed data to obtain final key data of the electricity stealing evidence.
Furthermore, the electricity consumption data comprises electric quantity data, voltage data, current data and power data.
Further, reconstructing the time data, the spatial position data, the quantization data and the data carrier based on the D-S evidence theory, comprising:
the product of the confidence level of the quantized data evidence and the fusion degree of the quantized data evidence is greater than zero, and the larger the product is, the higher the priority of the quantized data is.
Further, quantifying data evidence confidence, comprising:
when the variation of the electric quantity data, the current data, the voltage data and the power data of the user in the first event window and the fourth event window is larger than a first preset value and the duration is larger than a second preset value, judging that the reliability of the quantized data evidence is 1, otherwise, judging that the reliability of the quantized data evidence is 0;
recovering the electric quantity data, the current data, the voltage data and the power data in the fifth event window, judging that the evidence reliability of the quantized data is 1 if no obvious change exists in the preset time, and otherwise, judging that the evidence reliability of the quantized data is 0;
in the second event window, when a suspected electricity stealing point is detected on site, the reliability of the quantized data evidence is judged to be 1, otherwise, the reliability of the quantized data evidence is judged to be 0.
Furthermore, if the quantized data evidence occurs and other three types of evidence simultaneously occur, determining that the quantized data evidence fusion degree is a first value;
if the quantized data evidence occurs and two types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a second numerical value;
if the quantized data evidence occurs and simultaneously accompanies a type of evidence to occur simultaneously, judging that the quantized data evidence fusion degree is a third numerical value;
if the quantized data evidence occurs and no accompanying evidence occurs simultaneously, judging that the quantized data evidence fusion degree is a fourth numerical value;
the first, second, third and fourth values decrease in sequence.
The invention provides a power stealing evidence data processing system based on space-time vector four-dimensional data.
A system for processing electricity stealing evidence data based on space-time vector four-dimensional data, comprising:
a data acquisition module configured to: acquiring power utilization data, field detection data and field image data of user power utilization;
an event windowing module configured to: generating a first dynamic event window according to the change of the electricity utilization data before and after electricity stealing; generating a second dynamic event window according to field detection data in the electricity stealing process; generating a third dynamic event window according to the field image data in the electricity stealing process; generating a fourth dynamic event window according to the change of the power utilization data in and after the power stealing recovery; generating a fifth dynamic event window according to the change of the electricity utilization data of the user before electricity stealing occurs and after electricity stealing recovery;
a data decomposition module configured to: the method comprises the steps that a first dynamic event window, a second dynamic event window, a third dynamic event window, a fourth dynamic event window and a fifth dynamic event window form data to be processed, and the data to be processed are decomposed into time data, spatial position data, quantitative data and a data carrier by utilizing a preset four-dimensional data model;
a data reconstruction module configured to: reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window;
a data signing module configured to: and adding a trusted timestamp signature to the reconstructed data to obtain final key data of the electricity stealing evidence.
Furthermore, the electricity consumption data comprises electric quantity data, voltage data, current data and power data.
Further, reconstructing the time data, the spatial position data, the quantization data and the data carrier based on the D-S evidence theory, comprising:
the product of the confidence level of the quantized data evidence and the fusion degree of the quantized data evidence is greater than zero, and the larger the product is, the higher the priority of the quantized data is.
Further, quantifying data evidence confidence, comprising:
when the variation of the electric quantity data, the current data, the voltage data and the power data of the user in the first event window and the fourth event window is larger than a first preset value and the duration is larger than a second preset value, judging that the reliability of the quantized data evidence is 1, otherwise, judging that the reliability of the quantized data evidence is 0;
recovering the electric quantity data, the current data, the voltage data and the power data in the fifth event window, judging that the evidence reliability of the quantized data is 1 if no obvious change exists in the preset time, and otherwise, judging that the evidence reliability of the quantized data is 0;
in the second event window, when a suspected electricity stealing point is detected on site, the reliability of the quantized data evidence is judged to be 1, otherwise, the reliability of the quantized data evidence is judged to be 0.
Furthermore, if the quantized data evidence occurs and other three types of evidence simultaneously occur, determining that the quantized data evidence fusion degree is a first value;
if the quantized data evidence occurs and two types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a second numerical value;
if the quantized data evidence occurs and simultaneously accompanies a type of evidence to occur simultaneously, judging that the quantized data evidence fusion degree is a third numerical value;
if the quantized data evidence occurs and no accompanying evidence occurs simultaneously, judging that the quantized data evidence fusion degree is a fourth numerical value;
the first, second, third and fourth values decrease in sequence.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the electricity stealing evidence data processing method and system based on the spatio-temporal vector four-dimensional data, provided by the invention, a spatio-temporal vector four-dimensional evidence chain processing mechanism is established, original data, field detection evidence and field image evidence are refined into four dimensions of time, position space, quantized data and a data carrier, the relevance among the evidences (the time, the place and the same equipment are obtained) is strengthened, and the authenticity, the integrity and the effectiveness of the evidence data are improved.
2. According to the electricity stealing evidence data processing method and system based on the space-time vector four-dimensional data, provided by the invention, a space-time vector four-dimensional data model based on time, space, quantized data and a data carrier is provided for the first time, so that various evidence data can be processed more clearly in the evidence obtaining process, and the reconstruction of subsequent evidence data is facilitated.
3. According to the electricity stealing evidence data processing method and system based on the space-time vector four-dimensional data, provided by the invention, the authenticity, objectivity and relevance of a reconstructed evidence chain are higher based on the D-S evidence theory multi-source information Dempster combination rule and the time logic of evidence organization.
4. According to the electricity stealing evidence data processing method and system based on the space-time vector four-dimensional data, provided by the invention, the credible timestamp signature is carried out on the original evidence chain after the aggregation reconstruction, so that the contents of the evidence chain can be kept complete and cannot be tampered in the migration and use processes, and the non-repudiation and non-repudiation of the evidence chain are improved.
Advantages of additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the invention and together with the description serve to explain the invention and not to limit the invention.
Fig. 1 is a schematic flow chart of a method for processing electricity stealing evidence data based on space-time vector four-dimensional data according to embodiment 1 of the present invention.
Fig. 2 is a schematic diagram of raw data sampling provided in embodiment 1 of the present invention.
Fig. 3 is a schematic diagram of an evidence data aggregation reconfiguration process provided in embodiment 1 of the present invention.
Fig. 4 is an exemplary diagram of an electricity stealing behavior audit report provided in embodiment 1 of the present invention.
Detailed Description
The invention is further described with reference to the following figures and examples.
It is to be understood that the following detailed description is exemplary and is intended to provide further explanation of the invention as claimed. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
The embodiments and features of the embodiments of the present invention may be combined with each other without conflict.
Example 1:
as shown in fig. 1, embodiment 1 of the present invention provides a method for processing electricity stealing evidence data based on space-time vector four-dimensional data, which ensures integrity, objectivity, validity, and non-repudiation of electricity stealing evidence, and includes the following steps:
s1: generating original data;
s2: cleaning and classifying original data;
s3: establishing a space-time vector four-dimensional processing model, and processing original data into a space-time vector four-dimensional data volume;
s4: performing polymerization reconstruction on the generated four-dimensional data body to generate an evidence chain prototype;
s5: and carrying out timestamp signature to generate a formal electricity stealing evidence chain.
In particular, the method comprises the following steps of,
s1 includes:
by utilizing a dynamic event window generation technology, as shown in fig. 2, a first dynamic event window is generated according to changes (i-ii) before and after electricity stealing of user electricity quantity data, voltage, current, function and other load data collected by a system;
generating a fourth dynamic event window according to the changes (II-V) of the load data such as the electric quantity data, the voltage, the current, the functions and the like of the user after the electricity stealing recovery in the electricity stealing process and the electricity stealing recovery;
generating a fifth dynamic event window according to the changes (i-v) of load data such as user electric quantity data, voltage, current, functions and the like before electricity stealing occurs and after electricity stealing recovery;
in the field detection process, the device is used for rapidly and accurately detecting the field metering device and the loop of the electricity stealing user without power outage (step three-step four), so that a second dynamic event window is generated, and a field detection evidence is generated;
the image recording device worn by the staff automatically records and takes pictures (the third-fourth process), and a third dynamic event window is generated to generate a scene image evidence.
S2 includes:
data cleaning and classification:
processing lost values, boundary-crossing values, inconsistent codes and repeated data of the data from the aspects of accuracy, completeness, consistency, uniqueness, timeliness and effectiveness of the data;
secondly, data are classified: and classifying and aggregating the original analysis data, the field detection data and the field image data according to the classification, sequencing, distance and scaling principles.
S3 includes:
any electricity stealing case occurrence and electricity stealing field detection (detection) process has Time, Space and place, occurrence Data variation and each basic attribute of a Data carrier, a Time-Space vector four-dimensional Data model (Time, Space, Quantitative and Data) TSQD model based on Time, Space, quantized Data and the Data carrier is established according to relevance and objectivity requirements in evidence triparence by combining evidentiary or evidence law, and original Data is decomposed into Time Data, Space position Data, quantized Data and Data carrier information.
The TSQD model comprises a comparison analysis of actual field operation data of user metering equipment, electricity stealing field position information, a time label and an electricity stealing result report, and the detailed model is as follows.
Firstly, the TSQD model is utilized to preliminarily analyze and screen the metering abnormality of the user metering equipmentAnd checking the approximate time point of the historical power utilization sudden change of the user, wherein the part is used as an auxiliary result of the power stealing abnormity and not used as actual evidence of the power stealing. If TSQD, as shown in equation (1) 1 If the current time is more than or equal to 30%, judging that electricity stealing behavior is suspected to exist in the month, the quarter or the year; if TSQD 1 And if the data is less than or equal to 30 percent, the data result is not taken as the evidence of suspected electricity stealing behavior.
Wherein TSQD 1 Metering a historical monthly, quarterly or yearly frozen power usage change rate, DJ, of a device for a user 1 Metering historical month, quarter or year frozen power usage, DJ, of a device for a user 2 Metering the historical freezing power consumption of the equipment for the user in the second month, the second year or the year, and preliminarily analyzing when the user has the electricity stealing behavior by comparing the historical power consumption data of different periods.
Wherein, EQ 1 The user is metered the accumulated amount of electricity over the time period from t1 to t2,Uis a value of the voltage to be applied,Iis a current value.
Wherein, EQ 2 For the user to check the accumulated electric quantity value in the time period from t1 to t2 from the same time as the user metering device,Uis a value of the voltage to be applied,Iis a current value.
Wherein TSQD 2 For relative error, if TSQD 2 If the measurement result is less than or equal to 2%, judging that the user metering equipment is normal; if TSQD 2 ≥2%And judging that the user metering equipment is abnormal and the suspicion of electricity stealing exists. According to the data result, the field inspection equipment issues an abnormal report of the user metering equipment, information such as issuing time, longitude and latitude position information, metering precision abnormal result data and the like is issued on the report content, the name of a third party detection mechanism is issued on the whole report, and the report is uploaded to a specific system in real time.
S4 includes:
and performing aggregation reconstruction on the dispersed and disordered time data, the spatial position data, the quantized data and the data carrier information processed by the space vector four-dimensional model according to the D-S evidence information fusion error correction and the evidence organization time logic, and outputting a true, objective, legal and highly-associated evidence chain, wherein the data aggregation reconstruction process is shown in FIG. 3.
Independent evidence bodies are known in 4 classes: the method comprises the following steps of time evidence, spatial position evidence, quantitative data evidence and data carrier evidence, wherein the quantitative data evidence and other 3 types of evidence in 4 types of evidence have direct association relation. Therefore, the quantized data is selected as a verification main line, whether time evidence, spatial position evidence and data carrier evidence are generated when the quantized data occurs is selected as target information for information verification, and three possibilities of generation of 3 types of evidence, generation of partial evidence and no evidence exist.
According to the D-S evidence theory, the quantitative data evidence fusion steps are as follows:
1) and (3) confirming the credibility E of the quantized data evidence: the quantized data evidence is obtained by analyzing and quantizing the original analysis evidence and the on-site detection evidence, and the change trend of the data in the event window is analyzed by utilizing the first dynamic event window, the second dynamic event window, the fourth dynamic event window and the fifth dynamic event window, so that the following judgment is made:
the electric quantity, the current, the voltage and the power load of the users in the first event window and the fourth event window are obviously and continuously changed (namely, when the change is greater than a first preset value and the duration is greater than a second preset value), the evidence credibility E of the quantized data is judged to be 1, otherwise, the evidence credibility E of the quantized data is 0;
if the user electric quantity, the current, the voltage and the power load are obviously recovered (namely, the third preset value is recovered) in the fifth event window, namely, the persistence has no obvious change (namely, the duration is greater than the fourth preset value), the evidence reliability E of the quantized data is judged to be 1, otherwise, the evidence reliability E of the quantized data is 0;
and in the second event window, if suspected electricity stealing points including electricity stealing equipment and electricity stealing methods are detected on the site, judging that the reliability E of the quantized data evidence is 1, otherwise, judging that the reliability E is 0.
In this embodiment, the first preset value, the second preset value, the third preset value and the fourth preset value are all artificial set values, and those skilled in the art can selectively set the values according to specific working conditions.
2) Quantitative data evidence fusion degree analysis: according to the direct incidence relation between the quantized data and other 3 types of evidences, whether the quantized data have time evidences, spatial position evidences and data carrier evidences when the quantized data occur is selected to generate target information for information verification, and three possibilities of 3 types of evidences, partial evidences and no evidences occur exist.
The determination is as follows:
if the quantized data evidence occurs and other 3 types of evidence occur simultaneously, judging that the quantized data evidence fusion degree R is 1 (namely a first numerical value);
if the quantized data evidence occurs and simultaneously occurs 2 types of evidence, judging that the quantized data evidence fusion degree R is 0.6 (namely a second numerical value);
if the quantized data evidence occurs and simultaneously occurs with 1 type of evidence, judging that the quantized data evidence fusion degree R is 0.3 (namely a third numerical value);
if the quantized data evidence occurs and no accompanying evidence occurs simultaneously, the quantized data evidence fusion degree R is judged to be 0 (namely, a fourth numerical value).
3) Occurrence time logic evidence reconstruction mechanism: and (4) reconstructing the evidence by taking the occurrence time of the evidence as a logic main line, wherein the selectable premise of selecting the evidence is that the product of the evidence credibility E and the evidence fusion degree R is greater than 0, and the higher the value is, the higher the priority is.
It can be understood that the first numerical value, the second numerical value, the third numerical value, and the fourth numerical value may also be selected according to specific working conditions, as long as the first numerical value, the second numerical value, the third numerical value, and the fourth numerical value are ensured to be decreased sequentially.
S5 includes:
the essence of the time stamp service is to bind the data of the user with the current accurate time, sign the data by using a digital certificate of a time stamp system on the basis, generate a time stamp which can be used for legal evidence by means of the authority authorization status of the time stamp system in law, prove the generation time of the data of the user and achieve the aim of 'non-repudiation' or 'anti-repudiation'. Based on the method, the credible timestamp signature is carried out on the original evidence chain after the aggregation reconstruction, so that the content of the data chain is kept complete and is not tampered in the migration and use processes, and the non-repudiation of the evidence chain are ensured.
Example 2:
a data acquisition module configured to: acquiring power utilization data, field detection data and field image data of user power utilization;
an event windowing module configured to: generating a first dynamic event window according to the change of the electricity utilization data before and after electricity stealing; generating a second dynamic event window according to field detection data in the electricity stealing process; generating a third dynamic event window according to the field image data in the electricity stealing process; generating a fourth dynamic event window according to the change of the power utilization data in and after the power stealing recovery; generating a fifth dynamic event window according to the change of the electricity utilization data of the user before electricity stealing occurs and after electricity stealing recovery;
a data decomposition module configured to: the method comprises the steps that a first dynamic event window, a second dynamic event window, a third dynamic event window, a fourth dynamic event window and a fifth dynamic event window form data to be processed, and the data to be processed are decomposed into time data, spatial position data, quantitative data and a data carrier by utilizing a preset four-dimensional data model;
a data reconstruction module configured to: reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window;
a data signing module configured to: and adding a trusted timestamp signature to the reconstructed data to obtain final key data of the electricity stealing evidence.
The working method of the system is the same as the electricity stealing evidence data processing method based on the space-time vector four-dimensional data provided in embodiment 1, and details are not repeated here.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (4)
1. A method for processing electricity stealing evidence data based on space-time vector four-dimensional data is characterized by comprising the following steps:
the method comprises the following steps:
acquiring power utilization data, field detection data and field image data of user power utilization;
generating a first dynamic event window according to the change of the electricity utilization data before and after electricity stealing; generating a second dynamic event window according to field detection data in the electricity stealing process; generating a third dynamic event window according to the field image data in the electricity stealing process; generating a fourth dynamic event window according to the change of the power utilization data in and after the power stealing recovery; generating a fifth dynamic event window according to the change of the electricity utilization data of the user before electricity stealing occurs and after electricity stealing recovery;
the method comprises the steps that a first dynamic event window, a second event window, a third event window, a fourth dynamic event window and a fifth dynamic event window form data to be processed, and the data to be processed are decomposed into time data, spatial position data, quantitative data and a data carrier by utilizing a preset four-dimensional data model;
reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window;
adding a trusted timestamp signature to the reconstructed data to obtain final electricity stealing evidence key data;
the electricity consumption data comprises electric quantity data, voltage data, current data and power data;
reconstructing time data, spatial position data, quantization data and a data carrier based on a D-S evidence theory, comprising:
the product of the credibility of the quantized data evidence and the fusion degree of the quantized data evidence is larger than zero, and the higher the product is, the higher the priority of the quantized data is;
quantifying data evidence confidence, including:
when the variation of the electric quantity data, the current data, the voltage data and the power data of the user in the first event window and the fourth event window is larger than a first preset value and the duration is larger than a second preset value, judging that the reliability of the quantized data evidence is 1, otherwise, judging that the reliability of the quantized data evidence is 0;
recovering the electric quantity data, the current data, the voltage data and the power data in the fifth event window, judging that the evidence reliability of the quantized data is 1 if no obvious change exists in the preset time, and otherwise, judging that the evidence reliability of the quantized data is 0;
in the second event window, when a suspected electricity stealing point is detected on site, the reliability of the quantized data evidence is judged to be 1, otherwise, the reliability of the quantized data evidence is judged to be 0.
2. The electricity stealing evidence data processing method based on space-time vector four-dimensional data as claimed in claim 1, wherein:
if the quantized data evidence occurs and other three types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a first numerical value;
if the quantized data evidence occurs and two types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a second numerical value;
if the quantized data evidence occurs and simultaneously accompanies a type of evidence to occur simultaneously, judging that the quantized data evidence fusion degree is a third numerical value;
if the quantized data evidence occurs and no accompanying evidence occurs simultaneously, judging that the quantized data evidence fusion degree is a fourth numerical value;
the first, second, third and fourth values decrease in sequence.
3. A steal electric evidence data processing system based on space-time vector body four-dimensional data, its characterized in that:
the method comprises the following steps:
a data acquisition module configured to: acquiring power utilization data, field detection data and field image data of user power utilization;
an event windowing module configured to: generating a first dynamic event window according to the change of the electricity utilization data before and after electricity stealing; generating a second dynamic event window according to field detection data in the electricity stealing process; generating a third dynamic event window according to the field image data in the electricity stealing process; generating a fourth dynamic event window according to the change of the power utilization data in and after the power stealing recovery; generating a fifth dynamic event window according to the change of the electricity utilization data of the user before electricity stealing occurs and after electricity stealing recovery;
a data decomposition module configured to: forming data to be processed according to the first dynamic event window, the second dynamic event window, the third dynamic event window, the fourth dynamic event window and the fifth dynamic event window, and decomposing the data to be processed into time data, spatial position data, quantitative data and a data carrier by utilizing a preset four-dimensional data model;
a data reconstruction module configured to: reconstructing time data, spatial position data, quantized data and a data carrier based on a D-S evidence theory according to a first dynamic event window, a second dynamic event window, a fourth dynamic event window and a fifth dynamic event window;
a data signing module configured to: adding a trusted timestamp signature to the reconstructed data to obtain final electricity stealing evidence key data;
the electricity consumption data comprises electric quantity data, voltage data, current data and power data;
reconstructing time data, spatial position data, quantization data and a data carrier based on a D-S evidence theory, comprising:
the product of the credibility of the quantized data evidence and the fusion degree of the quantized data evidence is larger than zero, and the higher the product is, the higher the priority of the quantized data is;
quantifying data evidence confidence, including:
when the variation of the electric quantity data, the current data, the voltage data and the power data of the user in the first event window and the fourth event window is larger than a first preset value and the duration is larger than a second preset value, judging that the reliability of the quantized data evidence is 1, otherwise, judging that the reliability of the quantized data evidence is 0;
recovering the electric quantity data, the current data, the voltage data and the power data in the fifth event window, judging that the evidence reliability of the quantized data is 1 if no obvious change exists in the preset time, and otherwise, judging that the evidence reliability of the quantized data is 0;
in the second event window, when a suspected electricity stealing point is detected on site, the reliability of the quantized data evidence is judged to be 1, otherwise, the reliability of the quantized data evidence is judged to be 0.
4. The space-time vector volume four-dimensional data-based electricity stealing evidence data processing system of claim 3, wherein:
if the quantized data evidence occurs and other three types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a first numerical value;
if the quantized data evidence occurs and two types of evidence simultaneously occur, judging that the quantized data evidence fusion degree is a second numerical value;
if the quantized data evidence occurs and simultaneously accompanies a type of evidence to occur simultaneously, judging that the quantized data evidence fusion degree is a third numerical value;
if the quantized data evidence occurs and no accompanying evidence occurs simultaneously, judging that the quantized data evidence fusion degree is a fourth numerical value;
the first, second, third and fourth values decrease in sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210336495.XA CN114416753B (en) | 2022-04-01 | 2022-04-01 | Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210336495.XA CN114416753B (en) | 2022-04-01 | 2022-04-01 | Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114416753A CN114416753A (en) | 2022-04-29 |
CN114416753B true CN114416753B (en) | 2022-08-12 |
Family
ID=81263716
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210336495.XA Active CN114416753B (en) | 2022-04-01 | 2022-04-01 | Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114416753B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114926015B (en) * | 2022-05-17 | 2023-07-21 | 国网山东省电力公司营销服务中心(计量中心) | Intelligent electric energy meter quality state evaluation method and system based on D-S evidence theory |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111861211A (en) * | 2020-07-20 | 2020-10-30 | 国网信通亿力科技有限责任公司 | System with double-layer anti-electricity-stealing model |
CN113484572A (en) * | 2021-06-01 | 2021-10-08 | 国网吉林省电力有限公司信息通信公司 | Anti-electricity-stealing monitoring method and system based on electricity utilization big data |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5991881A (en) * | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system |
CN111652761B (en) * | 2020-07-28 | 2020-12-01 | 国网江西省电力有限公司供电服务管理中心 | Multi-source feature fusion electricity stealing behavior detection method based on evidence theory |
CN112003372B (en) * | 2020-08-19 | 2022-08-26 | 贵州电网有限责任公司 | Remote intelligent monitoring method for preventing electricity theft |
CN113392173A (en) * | 2020-08-28 | 2021-09-14 | 郭举 | Information push updating method and system based on block chain and cloud service information platform |
CN113111053A (en) * | 2021-04-13 | 2021-07-13 | 国网冀北电力有限公司技能培训中心 | Line loss diagnosis and electricity stealing prevention system, method and model based on big data |
CN113554529A (en) * | 2021-09-18 | 2021-10-26 | 中国电力科学研究院有限公司 | Anti-electricity-stealing evidence-obtaining key data processing method, device and equipment |
-
2022
- 2022-04-01 CN CN202210336495.XA patent/CN114416753B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111861211A (en) * | 2020-07-20 | 2020-10-30 | 国网信通亿力科技有限责任公司 | System with double-layer anti-electricity-stealing model |
CN113484572A (en) * | 2021-06-01 | 2021-10-08 | 国网吉林省电力有限公司信息通信公司 | Anti-electricity-stealing monitoring method and system based on electricity utilization big data |
Also Published As
Publication number | Publication date |
---|---|
CN114416753A (en) | 2022-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Anbaroğlu et al. | Non-recurrent traffic congestion detection on heterogeneous urban road networks | |
CN106650797B (en) | Power distribution network electricity stealing suspicion user intelligent identification method based on integrated ELM | |
WO2019193583A2 (en) | Methods, systems, apparatuses and devices for facilitating provisioning of audit data related to energy consumption, water consumption, water quality, greenhouse gas emissions, and air emissions using blockchain | |
CN107292501B (en) | Method and equipment for evaluating quality of wastewater monitoring data | |
US7693767B2 (en) | Method for generating predictive models for a business problem via supervised learning | |
CN114416753B (en) | Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data | |
Zhao et al. | Impact of data processing on deriving micro-mobility patterns from vehicle availability data | |
CN116681402B (en) | Project information base service management system and method based on Internet of things | |
CN104244016A (en) | H264 video content tampering detection method | |
Yip et al. | Detection of energy theft and metering defects in advanced metering infrastructure using analytics | |
Altschaffel | Computer forensics in cyber-physical systems: applying existing forensic knowledge and procedures from classical IT to automation and automotive | |
Banik et al. | Anomaly detection techniques in smart grid systems: A review | |
CN110674534A (en) | Remote quality detection technology based on Internet of things electronic evidence chain | |
Abdelgawad et al. | Vulnerability analysis of interdependent critical infrastructures upon a cyber-attack | |
CN110428156A (en) | Method, apparatus and electronic equipment for business datum verification | |
CN114881818A (en) | Electronic material evidence data analysis system | |
CN115310982A (en) | Electricity larceny prevention early warning data analysis method | |
CN113840178A (en) | Method for preventing timestamp in monitoring video stream from being tampered | |
CN117992861B (en) | Electric power data accuracy checking method and system | |
Boldt et al. | A statistical method for detecting significant temporal hotspots using LISA statistics | |
CN117313169B (en) | Tamper-resistant method of intelligent monitoring system for circulation data of finished oil | |
Nanda et al. | Anomaly Detection in Smart Grid Networks Using Power Consumption Data | |
CN113052415B (en) | Case analysis-based judge early warning monitoring method and device for judges, electronic equipment and storage medium | |
CN112150036B (en) | Method and device for detecting gas theft of boiler gas user based on data driving | |
CN111311057A (en) | Laboratory metering system based on block chain technology and implementation method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |