skip to main content
10.1145/3452940.3453495acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
research-article

A Study on The Portrait and Investigation Method of Stealing Electricity

Published: 17 May 2021 Publication History

Abstract

in this paper, we extract the data of the knowledge base, marketing business system, power information collection system, integrated power quantity and line loss management system, decompose the data dimension and extract the characteristics of electricity theft, draw the portrait of electricity theft behavior, construct the identification database of electricity theft behavior.

References

[1]
Wang Yilin. Realization and Application of Telecommunication User Portrait System Based on Big Data Technology [D].]1 Beijing: Beijing University of posts and Telecommunications.
[2]
Wang Chengliang, Zheng Haiyan. Portrait of electricity behavior pattern of electric power customers based on fuzzy clustering [J]. ]1 Electrical Measurement and Instrumentation (18):77--88.
[3]
Chen Chao. Research on Dynamic Multi-objective Optimization Algorithm Based on Prediction Model [D].]; and Changsha: Hunan University.
[4]
Pan Feng. Study on Feature Extraction and Feature Selection Technology Changsha: Nanjing University of Aeronautics and Astronautics.
[5]
Chen Qixin, Zheng Kedi, Kang Chongqing, et al. Detection methods of abnormal electricity consumption: review and Prospect [J]. ].1 Power System Automation, 2018, 42(17):189--199.
[6]
Hu Xin. Study on Fault Feature Selection and Extraction Technology in Rotor Condition Monitoring [D].]; and Harbin: Harbin Engineering University.
[7]
Zhao Lei, Luan Wenpeng, Wang Qian. Accurate Line Loss Analysis of Low Voltage Distribution Network with AMI data [J]. ].10 Power Grid Technology 39(11):3189--3194.

Index Terms

  1. A Study on The Portrait and Investigation Method of Stealing Electricity
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICITEE '20: Proceedings of the 3rd International Conference on Information Technologies and Electrical Engineering
        December 2020
        687 pages
        ISBN:9781450388665
        DOI:10.1145/3452940
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 17 May 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Electricity Stealing
        2. Feasibility
        3. Multi-dimensional

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        • the science and technology project of State Grid Corporation of China

        Conference

        ICITEE2020

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 14
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 28 Feb 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media