期刊文献+
共找到1,875篇文章
< 1 2 94 >
每页显示 20 50 100
Electricity Theft and Its Impact on Quality of Service in Lubumbashi,DR Congo
1
作者 David Milambo Kasumba Guy Nkulu Wa Ngoie +3 位作者 Hyacinthe Tungadio Diambomba Matthieu Kayembe Wa Kayembe Flory Kiseya Tshikala Bonaventure Banza Wa Banza 《Energy Engineering》 2025年第6期2401-2416,共16页
Electricity theft significantly impacts the reliability and sustainability of electricity services,particularly in developing regions.However,the socio-economic,infrastructural,and institutional drivers of theft remai... Electricity theft significantly impacts the reliability and sustainability of electricity services,particularly in developing regions.However,the socio-economic,infrastructural,and institutional drivers of theft remain inadequately explored.Here we examine electricity theft in Lubumbashi,Democratic Republic of Congo,focusing on its patterns,causes,and impacts on service quality.Theft rates exceeded 75%in peripheral municipalities like Katuba and Kampemba,driven by poverty,weak law enforcement,and poor infrastructure dominated by above-ground networks.In contrast,central areas like Kamalondo and Lubumbashi reported lower theft rates due to better urban planning and underground systems.We found that electricity theft directly correlates with frequent voltage fluctuations,prolonged outages,and grid overloads.Socio-economic factors,including high connection fees and poverty,emerged as primary drivers,while institutional weaknesses such as corruption and ineffective enforcement perpetuate theft.Addressing theft requires a holistic approach integrating infrastructure modernization,socio-economic reforms,and institutional strengthening.Transitioning to underground networks,providing affordable electricity access,and adopting advanced metering systems are crucial.Overall,this study highlights the systemic nature of electricity theft and provides actionable insights for improving electricity service delivery and equity in urban settings. 展开更多
关键词 Electricity theft service quality infrastructure disparities socio-economic drivers Lubumbashi
在线阅读 下载PDF
A Fog-Based Approach for Theft Detection and Zero-Day Attack Prevention in Smart Grid Systems
2
作者 Remah Younisse Mouhammd AlKasassbeh Amjad Aldweesh 《Computers, Materials & Continua》 2025年第12期4921-4941,共21页
Smart grid systems are advancing electrical services,making them more compatible with Internet of Things(IoT)technologies.The deployment of smart grids is facing many difficulties,requiring immediate solutions to enha... Smart grid systems are advancing electrical services,making them more compatible with Internet of Things(IoT)technologies.The deployment of smart grids is facing many difficulties,requiring immediate solutions to enhance their practicality.Data privacy and security are widely discussed,and many solutions are proposed in this area.Energy theft attacks by greedy customers are another difficulty demanding immediate solutions to decrease the economic losses caused by these attacks.The tremendous amount of data generated in smart grid systems is also considered a struggle in these systems,which is commonly solved via fog computing.This work proposes an energytheft detection method for smart grid systems employed in a fog-based network infrastructure.This work also proposes and analyzes Zero-day energy theft attack detection through a multi-layered approach.The detection process occurs at fog nodes via five machine-learning classification models.The performance of the classifiers is measured,validated,and reported for all models at fog nodes,as well as the required training and testing time.Finally,the measured results are compared to when the detection process occurs at a central processing unit(cloud server)to investigate and compare the performance metrics’goodness.The results show comparable accuracy,precision,recall,and F1-measure performance.Meanwhile,the measured execution time has decreased significantly in the case of the fog-based network infrastructure.The fog-based model achieved an accuracy and recall of 98%,F1 score of 99%,and reduced detection time up to around 85%compared to the cloud-based approach. 展开更多
关键词 Smart grid security fog computing energy theft detection zero-day attack prevention machine learning in IoT
在线阅读 下载PDF
建立Cookie Theft测验的中国常模 被引量:3
3
作者 韩晓春 张硕丰 +4 位作者 王际菲 谭勇 宋鲁平 韩在柱 毕彦超 《中国康复理论与实践》 CSCD 北大核心 2012年第8期743-747,共5页
目的建立Cookie Theft测验的中国常模。方法 29名正常被试,17例脑卒中患者完成Cookie Theft测验,在错误表述(IS)、不流畅表述(DF)、支持结构(PS)、重复内容(RP)、图片有效信息(CU)、解释图片有效信息(EC)和不相关字词(IR)7个维度上对语... 目的建立Cookie Theft测验的中国常模。方法 29名正常被试,17例脑卒中患者完成Cookie Theft测验,在错误表述(IS)、不流畅表述(DF)、支持结构(PS)、重复内容(RP)、图片有效信息(CU)、解释图片有效信息(EC)和不相关字词(IR)7个维度上对语言样本进行分析。结果 7个维度上的重测信度值分别为r(IS)=0.92;r(DF)=0.89;r(PS)=0.98;r(RP)=0.84;r(CU)=0.96;r(EC)=0.88和r(IR)=0.99。17例脑卒中患者中,12例(70.6%)被诊断出。结论该常模具有良好的信效度,具有临床和科研应用价值。 展开更多
关键词 COOKIE theft测验 中国常模 认知沟通损伤
暂未订购
基于Cookie Theft测验的脑小血管病患者认知沟通能力数字化测评 被引量:1
4
作者 冯鑫 郁磊 +2 位作者 许斐 李阳 靳祯 《云南师范大学学报(自然科学版)》 2020年第5期21-24,共4页
为了克服传统Cookie Theft测验费时费力、评测结果受主观影响等不足,提出了一种数字化测评方法.首先,将Cookie Theft测验转化成总分为28分的数字化量表;接着,分析对比了脑小血管病组和健康组分别在无提示语和有提示语条件下的表现差异情... 为了克服传统Cookie Theft测验费时费力、评测结果受主观影响等不足,提出了一种数字化测评方法.首先,将Cookie Theft测验转化成总分为28分的数字化量表;接着,分析对比了脑小血管病组和健康组分别在无提示语和有提示语条件下的表现差异情况;最后,综合语音相关特征及信息量相关特征,利用随机森林方法建立了脑小血管病智能诊断模型.实验结果显示,综合使用测试过程中记录的语音相关特征和信息量相关特征,脑小血管病智能诊断模型的识别准确率可达82.4%. 展开更多
关键词 脑小血管病 认知沟通能力 数字化测评 Cookie theft测验
在线阅读 下载PDF
Adaptive electricity theft detection method based on load shape dictionary of customers 被引量:2
5
作者 Chunjiang Yan Feng Ma +4 位作者 Weigang Nie Xiaokun Han Xiaotao Hai Yuejie Xu Yanlin Peng 《Global Energy Interconnection》 EI CAS CSCD 2022年第1期108-117,共10页
With the application of the advanced measurement infrastructure in power grids,data driven electricity theft detection methods become the primary stream for pinpointing electricity thieves.However,owing to anomaly sub... With the application of the advanced measurement infrastructure in power grids,data driven electricity theft detection methods become the primary stream for pinpointing electricity thieves.However,owing to anomaly submergence,which shows that the usage patterns of electricity thieves may not always deviate from those of normal users,the performance of the existing usage-pattern-based method could be affected.In addition,the detection results of some unsupervised learning algorithm models are abnormal degrees rather than“0-1”to ascertain whether electricity theft has occurred.The detection with fixed threshold value may lead to deviation and would not be sufficiently flexible to handle the detection for different scenes and users.To address these issues,this study proposes a new electricity theft detection method based on load shape dictionary of users.A corresponding strategy for tunable threshold is proposed to optimize the detection effect of electricity theft,and the efficacy and applicability of the proposed adaptive electricity theft detection method were verified from numerical experiments. 展开更多
关键词 Electricity theft detection K-means Load shape dictionary Data mining
在线阅读 下载PDF
Energy Theft Identification Using Adaboost Ensembler in the Smart Grids 被引量:2
6
作者 Muhammad Irfan Nasir Ayub +10 位作者 Faisal Althobiani Zain Ali Muhammad Idrees Saeed Ullah Saifur Rahman Abdullah Saeed Alwadie Saleh Mohammed Ghonaim Hesham Abdushkour Fahad Salem Alkahtani Samar Alqhtani Piotr Gas 《Computers, Materials & Continua》 SCIE EI 2022年第7期2141-2158,共18页
One of the major concerns for the utilities in the Smart Grid(SG)is electricity theft.With the implementation of smart meters,the frequency of energy usage and data collection from smart homes has increased,which make... One of the major concerns for the utilities in the Smart Grid(SG)is electricity theft.With the implementation of smart meters,the frequency of energy usage and data collection from smart homes has increased,which makes it possible for advanced data analysis that was not previously possible.For this purpose,we have taken historical data of energy thieves and normal users.To avoid imbalance observation,biased estimates,we applied the interpolation method.Furthermore,the data unbalancing issue is resolved in this paper by Nearmiss undersampling technique and makes the data suitable for further processing.By proposing an improved version of Zeiler and Fergus Net(ZFNet)as a feature extraction approach,we had able to reduce the model’s time complexity.To minimize the overfitting issues,increase the training accuracy and reduce the training loss,we have proposed an enhanced method by merging Adaptive Boosting(AdaBoost)classifier with Coronavirus Herd Immunity Optimizer(CHIO)and Forensic based Investigation Optimizer(FBIO).In terms of low computational complexity,minimized over-fitting problems on a large quantity of data,reduced training time and training loss and increased training accuracy,our model outperforms the benchmark scheme.Our proposed algorithms Ada-CHIO andAda-FBIO,have the low MeanAverage Percentage Error(MAPE)value of error,i.e.,6.8%and 9.5%,respectively.Furthermore,due to the stability of our model our proposed algorithms Ada-CHIO and Ada-FBIO have achieved the accuracy of 93%and 90%.Statistical analysis shows that the hypothesis we proved using statistics is authentic for the proposed technique against benchmark algorithms,which also depicts the superiority of our proposed techniques. 展开更多
关键词 Smart grids and meters electricity theft detection machine learning ADABOOST optimization techniques
在线阅读 下载PDF
Energy Theft Detection in Smart Grids:Taxonomy,Comparative Analysis,Challenges,and Future Research Directions 被引量:1
7
作者 Mohsin Ahmed Abid Khan +4 位作者 Mansoor Ahmed Mouzna Tahir Gwanggil Jeon Giancarlo Fortino Francesco Piccialli 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第4期578-600,共23页
Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new ... Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new energy theft detection(ETD)techniques have been proposed by utilising different data mining(DM)techniques,state&network(S&N)based techniques,and game theory(GT)techniques.Here,a detailed survey is presented where many state-of-the-art ETD techniques are studied and analysed for their strengths and limitations.Three levels of taxonomy are presented to classify state-of-the-art ETD techniques.Different types and ways of energy theft and their consequences are studied and summarised and different parameters to benchmark the performance of proposed techniques are extracted from literature.The challenges of different ETD techniques and their mitigation are suggested for future work.It is observed that the literature on ETD lacks knowledge management techniques that can be more effective,not only for ETD but also for theft tracking.This can help in the prevention of energy theft,in the future,as well as for ETD. 展开更多
关键词 CHALLENGES comparative analysis energy theft detection future research directions smart grid TAXONOMY
在线阅读 下载PDF
Optimization Method of Suspected Electricity Theft Topic Model Based on Chi-square Test and Logistic Regression 被引量:1
8
作者 Jian Dou Ye Aliaosha 《国际计算机前沿大会会议论文集》 2018年第2期32-32,共1页
关键词 Anti-electricity theft CHI-SQUARE test LOGISTIC regressionPower consumption inspection
在线阅读 下载PDF
Spatial Analysis Applied for Gas Theft Modelling in Tabriz City, Iran
9
作者 Seyed Reza Rahnamay Touhidi Ismael Davoudi 《Journal of Geoscience and Environment Protection》 2018年第2期1-19,共19页
Unauthorized use of energy is the major source of the non-technical losses of the energy in developing countries. Gas theft as a kind of energy theft is an increasing issue in a number of countries particularly in dev... Unauthorized use of energy is the major source of the non-technical losses of the energy in developing countries. Gas theft as a kind of energy theft is an increasing issue in a number of countries particularly in developing countries. This study is an attempt to address the issue of gas theft through the deployment of Geographic Information System (GIS) capabilities (Spatial Analysis) to import external factors into the current gas theft detection methods, improve data mining processes, and offer some management solutions. To achieve the intended goals in the study, two types of data sources were collected and analyzed: internal data such as reported instances of gas theft, and some customer properties, and external data such as some demographic data. In order to analyze and modeling the gas theft and the relationships between variables we used Hotspot analysis, Ordinary Least Squares regression (OLS) and Geographically Weighted Regression (GWR) analysis with ArcGIS tools. The results from clustering test indicated that the gas theft is not a random phenomenon in all areas of Tabriz and there are underlying factors. Mapping clusters by the hotspot techniques suggested the locations of clusters and areas at risk. The results of the regression analysis illustrated the importance of external factors clearly. According to the results, we recommend a conceptual GIS framework to select high risk areas as a subset data for a meter data analysis. Results of this research are of great importance for GIS based spatial analysis and can be used as base of future researches. 展开更多
关键词 GIS GAS theft Spatial STATISTICS PROACTIVE ANALYTICS Tabriz CITY
暂未订购
Comparing the Similarities and Differences between All Versions of Grand Theft Auto
10
作者 Cagri Baris Kasap 《Journal of Software Engineering and Applications》 2018年第2期89-109,共21页
The article investigates the similarities and differences between all versions of Grand Theft Auto as an adventure game with the widest popularity in the last decade. The game is a story collection, a frame for perfor... The article investigates the similarities and differences between all versions of Grand Theft Auto as an adventure game with the widest popularity in the last decade. The game is a story collection, a frame for performance, a virtual museum of vernacular culture and a widely circulated pop culture artifact whose double-voiced aesthetic has given rise to diverse interpretive communities. The aim of comparing the differences and similarities between different versions of the game is to be able to evaluate the game from the user’s point of view. With this aim, whether with the verisimilitude that the different versions offer makes GTA a product of an iterative design process or not will be displayed. 展开更多
关键词 GRAND theft AUTO (GTA) Iterative Design ADVENTURE Game VERNACULAR Culture
暂未订购
An Analysis of the Female Images in Theft from the Perspective of Feminism
11
作者 DU Yan 《Journal of Literature and Art Studies》 2021年第1期21-25,共5页
In the field of vision of American Literature in the 20th century,Katherine Anne Porter is highly praised by many readers for her flexible artistic style,accurate and vivid description of characters,profound connotati... In the field of vision of American Literature in the 20th century,Katherine Anne Porter is highly praised by many readers for her flexible artistic style,accurate and vivid description of characters,profound connotation of her works.As a female writer,Porter is good at creating female characters from a unique female perspective,and reveals the inner activities of female characters in self-development and the female individual consciousness and independent consciousness pursued by women through her works.Although she doesn’t consciously involve feminism,we can see that the heroine’s female consciousness is gradually awakening from her portrayal of female characters and her exploration of female inner world.This paper takes Porter’s short story Theft published in the 1990s as an example to analyze the feminist consciousness in her works from the perspective of feminism. 展开更多
关键词 theft gender role female image feminist consciousness
在线阅读 下载PDF
Improving Supply Chain Strategies towards Mitigating the Effect of Crude Oil Theft and Pipeline Vandalism in the Nigerian Oil and Gas Industry: A Case Study of the Nigerian National Petroleum Corporation (NNPC)
12
作者 Ruth Agwom Panle 《Open Journal of Yangtze Oil and Gas》 2024年第3期75-93,共19页
Generically, SCM may be said to include all activities carried out to ensure proper functioning of the supply chain. The activities included in proper management of a supply chain broadly include logistics activities,... Generically, SCM may be said to include all activities carried out to ensure proper functioning of the supply chain. The activities included in proper management of a supply chain broadly include logistics activities, planning and control of the flow of information and materials in a firm, management of relationships with other organizations and government intervention, However, crude oil theft and pipeline vandalism are established products supply chain disruptors in Nigeria which are rendering the task of running an efficient petroleum supply chain onerous. This paper aims to establish the importance of effective supply chain strategies for companies in the oil and gas industry with special focus on the Nigerian oil and gas sector and the strategies by which the state oil and gas corporation in this sector may mitigate disruptions to its supply chain. This study investigates the enhancement of supply chain strategies towards meeting the challenge of crude oil theft and pipeline vandalism, using the Nigerian National Corporation (NNPC) as a case study. Based on this study, data were collected from two sources: A summary of incident reports obtained from NNPC and an interview with personnel in the PPMC Department. Incident report refers to a report produced when accidents such as equipment failure, injury, loss of life, or fire occur at the work site. Content analysis is utilized to evaluate data obtained from interview responses, CBN financial stability reports, NDIC annual reports, circulars, banking supervision reports and implementation guidelines. The study found out that NNPC should endeavor to sustain its value chain and ward of pipeline vandals and crude oil thieves by engaging in community partnership, detailing security outfits to ensure its pipelines’ right of way and bridging. Concluded that the oil supply chain of the Nigerian National Petroleum Corporation has been plagued by disruptions in the form of crude oil theft and pipeline vandalism which has had debilitating effects on its value. 展开更多
关键词 Supply Chain Strategies Management Production Crude Oil theft Pipeline Vandalism Information Technology Operations
在线阅读 下载PDF
Alternative Solutions to Mitigate Problems due to Neutral Conductors Theft in MV (Medium Voltage) Power Distribution Systems
13
作者 Fabio Romero Alden Uehara Antunes +5 位作者 Fernando Locks Lange Dario Takahata Andre Meffe Carlos Cesar Barioni de Oliveira Hamilton Bueno de Souza 《Journal of Energy and Power Engineering》 2014年第12期2074-2079,共6页
This paper aims at analyzing the impact of the neutral conductor absence at specific sections over the performance of the power distribution lines, and proposing alternative solutions to mitigate the problems caused b... This paper aims at analyzing the impact of the neutral conductor absence at specific sections over the performance of the power distribution lines, and proposing alternative solutions to mitigate the problems caused by the neutral conductor theft. Simulations are made by the software lnterplan and show that the absence of neutral conductor at specific sections of power distribution lines may increase the neutral-to-ground voltages, which compromises the system's safety. The solution developed keeps the technical performance of the power distribution system at satisfactory levels, regarding the voltage profile, or, at least, close to the level before the neutral conductor's theft. 展开更多
关键词 Power distribution systems conductor theft system safety neutral-to-ground voltages grounding.
在线阅读 下载PDF
位居次席:备选对员工主动担责和时间窃取行为的影响机制
14
作者 占小军 吴可盈 +3 位作者 王涛 马君 祝养浩 周雯珺 《心理学报》 北大核心 2026年第4期683-697,共15页
备选是指最终被组织安排承担某项任务或角色,但并非该任务或角色首选的员工,近年来逐渐受到学者关注。然而现有研究却忽视了任务分配情境下备选对员工自身态度和行为的影响。本研究基于社会信息加工理论和联想命题评价理论,采用情境实验... 备选是指最终被组织安排承担某项任务或角色,但并非该任务或角色首选的员工,近年来逐渐受到学者关注。然而现有研究却忽视了任务分配情境下备选对员工自身态度和行为的影响。本研究基于社会信息加工理论和联想命题评价理论,采用情境实验(研究1)和三阶段问卷调查(研究2),探讨了任务分配情境下备选对员工行为的“双刃剑”效应及边界条件。研究结果表明,当上级发展性反馈水平高时,备选会激发和谐型激情,进而引发主动担责行为;当上级发展性反馈水平低时,备选会引起工作拖延倾向,进而发生时间窃取行为。研究结论为大众更加客观、辩证地认识备选提供参考和借鉴。 展开更多
关键词 备选 和谐型激情 工作拖延倾向 主动担责行为 时间窃取行为 上级发展性反馈
在线阅读 下载PDF
一种利用轻量级多通道注意力融合网络的窃电检测边缘计算方法
15
作者 金涛 王万豪 +1 位作者 黄钦瑜 刘宇龙 《中国电机工程学报》 北大核心 2026年第6期2420-2433,I0020,共15页
智能电表的大规模部署产生了海量的用电数据,为基于数据驱动的窃电检测方法提供了研究基础。神经网络作为一种常用的检测模型,随着网络深度和宽度的增加,中央云基础设施面临巨大的计算负担。为了减少参数量并降低计算负担,提出一种利用... 智能电表的大规模部署产生了海量的用电数据,为基于数据驱动的窃电检测方法提供了研究基础。神经网络作为一种常用的检测模型,随着网络深度和宽度的增加,中央云基础设施面临巨大的计算负担。为了减少参数量并降低计算负担,提出一种利用轻量级多通道注意力融合网络的窃电检测边缘计算方法。该方法利用交替方向乘子法修复具有缺失值的数据矩阵。模型训练在计算中心完成,而边缘计算设备则用于检测由边缘设备收集的数据。通过在各种缺失数据情况下进行的消融实验和比较研究,验证了所提模型的有效性。结果表明,所提方法在所有评估指标上都表现出卓越的性能,与其他方法相比,展示了其在稳定性和有效性方面的优势。此外,通过硬件实验验证了所提方法在边缘设备上的时效性和有效性。 展开更多
关键词 窃电检测 轻量级网络 矩阵补全 注意力机制 边缘计算
原文传递
一种城市地下综合管廊安全监测系统
16
作者 吴如樵 戚玉强 张浩南 《科学技术创新》 2026年第5期200-204,共5页
城市地下综合管廊,是指在城市地下建造的一个隧道空间,将供水、供电、供气及通信等各种工程管线设施集成在一起,在保障城市运行中发挥重要的作用。文章构建了一种城市地下综合管廊系统,以八路4G物联网控制器为核心,对管廊设施中的水压... 城市地下综合管廊,是指在城市地下建造的一个隧道空间,将供水、供电、供气及通信等各种工程管线设施集成在一起,在保障城市运行中发挥重要的作用。文章构建了一种城市地下综合管廊系统,以八路4G物联网控制器为核心,对管廊设施中的水压、危险气体浓度及电流数值等参数进行监控,如实际运行参数超出监控范围时,控制器将通过WIFI模块向维护人员手机终端发送报警信息,此外,还考虑了窨井盖防盗报警功能,当窨井盖被盗时,系统除向手机终端发出报警信息外,还会从管道内部升出闪烁警灯,提醒车辆及行人及时避让。 展开更多
关键词 综合管廊 物联网控制器 防盗报警 数据采集
在线阅读 下载PDF
基于两阶段自注意力权重融合模型的窃电检测缺失数据填补方法
17
作者 黄钦瑜 杨明发 +3 位作者 王万豪 刘宇龙 陈煌滨 金涛 《电网技术》 北大核心 2026年第1期411-421,I0182-I0186,共16页
用电数据缺失会影响窃电检测模型的性能,而传统插值填补方法难以保留关键特征,限制模型检测性能。该文提出了一种基于两阶段自注意力权重融合(two-stage self-attention weight fusion,TS-SAWF)模型的窃电检测缺失数据填补方法。该模型... 用电数据缺失会影响窃电检测模型的性能,而传统插值填补方法难以保留关键特征,限制模型检测性能。该文提出了一种基于两阶段自注意力权重融合(two-stage self-attention weight fusion,TS-SAWF)模型的窃电检测缺失数据填补方法。该模型利用双阶段卷积增强对角掩码多头自注意力模块,捕捉数据之间的相关性与特征,并融合两阶段的注意力权重,提高缺失数据填补的准确性。在中国国家电网公司两个真实用户电表采集数据集上的实验结果表明,与对照模型相比,TS-SAWF模型在不同随机缺失率和不同连续缺失天数下均能提升填补性能。同时,基于TS-SAWF模型填补后的数据有效地提升了窃电检测模型的性能,进一步证明其有效性。 展开更多
关键词 缺失数据填补 窃电检测 自注意力机制 深度学习
原文传递
基于互信息图与邻接特征的非高损线路窃电检测方法
18
作者 周文晴 杨茂涛 +2 位作者 苏盛 赵斌 李彬 《仪器仪表学报》 北大核心 2026年第2期368-380,共13页
现有窃电检测方法多聚焦于日线损率异常突出的高损线路,而非高损线路中的潜在短时、间歇性窃电行为易被负荷波动、计量误差与运行方式变化掩盖,难以有效辨识。为此,提出了一种基于互信息差值动态图与邻接特征的非高损线路窃电检测方法... 现有窃电检测方法多聚焦于日线损率异常突出的高损线路,而非高损线路中的潜在短时、间歇性窃电行为易被负荷波动、计量误差与运行方式变化掩盖,难以有效辨识。为此,提出了一种基于互信息差值动态图与邻接特征的非高损线路窃电检测方法。首先,在小时尺度下采用滑动窗口计算用户用电量与线损电量的互信息,构建互信息差值动态图序列;并引入逐窗口自适应阈值以刻画用户用电量与线损之间随时间演化的非线性依赖关系,从而避免固定阈值导致的图结构不稳定。其次,设计融合图自编码器与动态权重平衡机制的特征提取方法:基于跨窗口的邻接关系重构任务,捕捉用户在群体网络中连接模式的时序演变,提取反映用户与群体依赖关系稳健性的邻接特征;同时采用动态权重加权损失,抑制正负样本不均衡引起的训练偏置,防止图重构学习发生退化。最后,采用主成分分析对嵌入特征降维优选,并结合K-Means++聚类实现无监督异常识别。仿真算例与真实数据实验表明,所提方法能够在非高损场景下有效识别窃电用户,验证了方法的可行性与有效性。该方法从群体关系演化视角刻画用户用电行为与线损之间的动态依赖关系,将窃电检测问题转化为图异常检测问题,为中压线路窃电检测提供了一种有效且具工程实用性的技术路径。 展开更多
关键词 非高损线路 窃电检测 数据驱动 互信息 图自编码器
原文传递
Energy-Theft Detection Issues for Advanced Metering Infrastructure in Smart Grid 被引量:24
19
作者 Rong Jiang Rongxing Lu +3 位作者 Ye Wang Jun Luo Changxiang Shen Xuemin(Sherman) Shen 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第2期105-120,共16页
With the proliferation of smart grid research, the Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique characteristics of AMI, such as comp... With the proliferation of smart grid research, the Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique characteristics of AMI, such as complex network structure, resource-constrained smart meter, and privacy-sensitive data, it is an especially challenging issue to make AMI secure. Energy theft is one of the most important concerns related to the smart grid implementation. It is estimated that utility companies lose more than S25 billion every year due to energy theft around the world. To address this challenge, in this paper, we discuss the background of AMI and identify major security requirements that AMI should meet. Specifically, an attack tree based threat model is first presented to illustrate the energy-theft behaviors in AMI. Then, we summarize the current AMI energy-theft detection schemes into three categories, i.e., classification-based, state estimation-based, and game theory-based ones, and make extensive comparisons and discussions on them. In order to provide a deep understanding of security vulnerabilities and solutions in AMI and shed light on future research directions, we also explore some open challenges and potential solutions for energy-theft detection. 展开更多
关键词 smart grid Advanced Metering Infrastructure (AMI) SECURITY energy-theft detection
原文传递
基于用电周期分析的通信基站窃电检测方法
20
作者 孙文强 曾竞 +2 位作者 彭赞 张征 苏盛 《电力科学与工程》 2026年第1期23-30,共8页
通讯基站的供电系统相对独立,其运维主要依靠远程监控和人工定期巡检。偏远地区基站供电线路安防能力薄弱,非法搭接窃电通常会被基站电力负荷时序波动所掩盖。基于基站窃电行为通常会引发负荷异常抬升并伴随日周期强度同步衰减的特性,... 通讯基站的供电系统相对独立,其运维主要依靠远程监控和人工定期巡检。偏远地区基站供电线路安防能力薄弱,非法搭接窃电通常会被基站电力负荷时序波动所掩盖。基于基站窃电行为通常会引发负荷异常抬升并伴随日周期强度同步衰减的特性,提出一种基于用电周期分析的通信基站窃电检测方法。首先采用滑动窗口构建时序特征矩阵作为网络输入,同时结合贝叶斯优化对长短期记忆(long short-term memory,LSTM)神经网络超参数进行全局寻优;其次通过设计均方误差与日周期强度的双维评价体系,利用核密度估计方法确定动态阈值,有效区分窃电异常与正常负荷波动;最后,基于某地区基站运行数据验证。仿真实验结果表明,该方法在复杂工况下仍能保持优越的窃电定位精度,与传统检测方法相比具有更低的误报率。 展开更多
关键词 用电周期 通信基站 窃电检测 贝叶斯优化 长短期记忆神经网络
在线阅读 下载PDF
上一页 1 2 94 下一页 到第
使用帮助 返回顶部