CN117556369A - Power theft detection method and system for dynamically generated residual error graph convolution neural network - Google Patents
Power theft detection method and system for dynamically generated residual error graph convolution neural network Download PDFInfo
- Publication number
- CN117556369A CN117556369A CN202410046231.XA CN202410046231A CN117556369A CN 117556369 A CN117556369 A CN 117556369A CN 202410046231 A CN202410046231 A CN 202410046231A CN 117556369 A CN117556369 A CN 117556369A
- Authority
- CN
- China
- Prior art keywords
- neural network
- data
- matrix
- residual
- graph
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013528 artificial neural network Methods 0.000 title claims abstract description 34
- 238000001514 detection method Methods 0.000 title claims abstract description 25
- 239000011159 matrix material Substances 0.000 claims abstract description 62
- 238000000034 method Methods 0.000 claims abstract description 48
- 230000005611 electricity Effects 0.000 claims abstract description 45
- 238000012549 training Methods 0.000 claims abstract description 31
- 238000012360 testing method Methods 0.000 claims abstract description 14
- 238000011176 pooling Methods 0.000 claims abstract description 13
- 238000012795 verification Methods 0.000 claims abstract description 11
- 238000012545 processing Methods 0.000 claims abstract description 7
- 239000013589 supplement Substances 0.000 claims abstract description 7
- 230000001502 supplementing effect Effects 0.000 claims abstract description 4
- 230000001131 transforming effect Effects 0.000 claims abstract description 4
- 238000004590 computer program Methods 0.000 claims description 11
- 230000006870 function Effects 0.000 claims description 9
- 239000013598 vector Substances 0.000 claims description 9
- 238000005259 measurement Methods 0.000 claims description 8
- 238000013527 convolutional neural network Methods 0.000 claims description 6
- 230000002159 abnormal effect Effects 0.000 claims description 3
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000012217 deletion Methods 0.000 claims description 3
- 230000037430 deletion Effects 0.000 claims description 3
- 238000001914 filtration Methods 0.000 claims description 3
- 238000013507 mapping Methods 0.000 claims description 3
- 238000010606 normalization Methods 0.000 claims description 3
- 230000010355 oscillation Effects 0.000 claims description 3
- 230000000694 effects Effects 0.000 description 10
- 238000011156 evaluation Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 2
- 230000007423 decrease Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000010801 machine learning Methods 0.000 description 2
- 230000001537 neural effect Effects 0.000 description 2
- 201000004569 Blindness Diseases 0.000 description 1
- 230000001174 ascending effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000013210 evaluation model Methods 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/243—Classification techniques relating to the number of classes
- G06F18/2433—Single-class perspective, e.g. one-against-all classification; Novelty detection; Outlier detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/213—Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/042—Knowledge-based neural networks; Logical representations of neural networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/0464—Convolutional networks [CNN, ConvNet]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/048—Activation functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Evolutionary Computation (AREA)
- Molecular Biology (AREA)
- Computational Linguistics (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Evolutionary Biology (AREA)
- Bioinformatics & Computational Biology (AREA)
- Image Analysis (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a power theft detection method of a dynamically generated residual map convolution neural network, which comprises the following steps of: (1) Collecting user power consumption original data in a power system; (2) Performing missing supplement and outlier processing on the original data, and dividing a training set, a verification set and a test set; (3) Transforming the preprocessed one-dimensional power load curve into a two-dimensional power load characteristic matrix to input a graph convolution neural network; (4) Obtaining optimal parameters through training to obtain an adjacency matrix A which can most represent the data relationship; (5) The feature matrix X and the adjacent matrix A are sent into a residual map convolution neural network to extract potential features, and final classification is obtained through a pooling layer and a full-connection layer; the invention improves the accuracy of the electricity larceny detection field by dynamically learning the deep time dependency relationship, the period mode and the potential characteristics among the electricity consumption periods of the users. The adopted data supplementing method effectively relieves the problem of data unbalance in the real world.
Description
Technical Field
The invention relates to the technical field of electricity theft detection, in particular to an electricity theft detection method and system of a dynamically generated residual error graph convolution neural network.
Background
The power industry is one of important pillar industries supporting national strategic development, and the healthy and stable development thereof is related to the smooth operation of society. The electric energy loss in the power transmission and distribution process has great influence on the safety and economic benefits of the power system, and mainly comprises technical loss and non-technical loss. In recent years, more and more researches are carried out on electricity larceny detection technology, and the traditional method has blindness, randomness and low inspection efficiency and is also influenced by the defects of professional technology and detection experience of electricity consumption detection personnel. At present, a smart power grid is continuously developed, an advanced measurement system (AMI) is increasingly perfected, a smart electric meter is used as an important component of the advanced measurement system, a large amount of electricity load data is collected at high frequency, and a power theft detection method is gradually evolved from a traditional method of on-site inspection, evidence collection and the like by workers to a machine learning-based method.
However, most of machine learning models proposed in the prior art directly model a single power load curve, and cannot fully capture time dependence, space dependence and potential dependence under the period of power consumption data. Moreover, in actual situations, the number of normal electricity consumers is far greater than that of electricity stealing consumers, and most methods cannot effectively analyze consumption habits of the electricity stealing consumers, so that the application effect is poor and cannot be popularized to actual enterprises.
Disclosure of Invention
The invention aims to: the invention aims to provide a method and a system for detecting electricity larceny of a dynamically generated residual error graph convolution neural network, which accurately identify the electricity larceny behavior of a user.
The technical scheme is as follows: the invention discloses a method for detecting electricity theft of a dynamically generated residual error graph convolution neural network, which comprises the following steps:
(1) Collecting user power consumption original data in a power system;
(2) Performing missing supplement and outlier processing on the original data, and dividing a training set, a verification set and a test set;
(3) Transforming the preprocessed one-dimensional power load curve into a two-dimensional power load characteristic matrix X so as to input a graph convolution neural network;
(4) Calculating the correlation among nodes by taking each period of data as a node and adopting a dynamic topological graph generation method, and obtaining optimal parameters through training to obtain an adjacent matrix A which can most represent the data relationship;
(5) And (3) sending the feature matrix X and the adjacent matrix A into a residual map convolution neural network to extract potential features, and obtaining final classification through a pooling layer and a full connection layer.
Further, the step (1) specifically comprises the following steps: the raw data is a daily electricity record of 42372 users produced in 1035 days. The data format of a single user is a time series of 1x 1035.
Further, the step (2) includes the following steps:
(21) And (3) deleting the power consumption data with the missing part, namely deleting the users with the consumption data missing more than 50%, otherwise, supplementing the missing data by adopting a linear interpolation method, respectively taking out three values before and after the missing value, and dividing the six taken out data into a group if the three values are directly discarded in the absence or the null state; calculating to obtain a filling value by using an interpolation formula; the specific operation is as follows:
;
wherein,a value representing the day i electricity data, if empty, as NaN;
(22) Outliers are where individual values in a sample deviate significantly from the rest of the observations; the abnormal value is defined by adopting the three sigma law, and the specific formula is as follows:
;
wherein,mean value of single sample, +.>Is the standard deviation;
(23) Carrying out standardization treatment by adopting a normalization method, and mapping all data into a [0-1] interval;
(24) Dividing the processed data set into a training set, a verification set and a test set, wherein the proportion is 6:2:2.
further, the step (3) specifically includes the following steps: setting the one-dimensional power load curve after pretreatment asComprises N sample users, electricity consumption data for each day +.>Will->Restructuring to +.>Together with the adjacent matrix as input to the picture convolution module, i.e +.>。
Further, the step (4) adaptively learns the graph adjacency matrix according to a dynamic topological graph generating method to capture an implicit connection relation between data, and the method comprises the following steps:
(41) Randomly generating n node vectorsInitializing a weight parameter W and an offset parameter b, and generating an initial relation measure between nodes by the following formula:
;
wherein,to activate the function +.>Controlling the oscillation size of the preliminary relation measurement for the super parameter; v (V) n V for implicit representation of node vector En i ,V j Representing the i, j-th vector in the sequence;
(42) Sorting the initial relation measurement according to rows and columns respectively, selecting k maximum values, setting the maximum values as 1, setting the rest values as 0, and obtaining an adjacent matrix A; where k is a super parameter set to [20, 25, 30, 35, 40, …,80].
Further, the residual map convolution neural network in the step (5) includes: the 1X1 convolution module and the residual MixHop graph convolution module specifically comprise the following steps:
(51) The number of channels of the feature matrix X is increased through a 1X1 convolution module;
(52) Extracting time and space characteristics and potential characteristics among user power curves through a residual MixHop graph convolution module; the residual MixHop graph convolution module consists of a plurality of graph convolution GC layers, each GC layer is formed by overlapping two MixHop modules, residual connection is adopted between the GC layers, and the formula is as follows:
given the adjacency matrix a, then:
;
wherein,;
wherein,the node representing the K layer is obtained through graph convolution operation; />Is a hyper-parameter controlling the ratio of the original state of the reserved root node; />Representing the input hidden state of the first layer, and multiplying the adjacent matrix by the feature matrix;the hidden state of the upper layer is the node characteristic of the upper layer;
adding the normalized result of the identity matrix I to the matrix A; />The degree matrix is the degree of which the diagonal line element is a node; />An inverse of the degree matrix;
;
where k is the propagation depth,for model weight parameters, +.>Representing an output hidden state of the current layer;
(53) Filtering redundant information in the network by adopting a maximum pooling layer; selecting the maximum value in each rectangular subarea to enter the full connection layer; the formula is as follows:
;
wherein,representing the result after the maximum pooling operation; />A value representing a certain rectangular subregion in the input feature map;
(54) Converting the extracted model node characteristics into predictive scores to obtain a final classification detection result; the formula is as follows:
;
wherein,is a SoftMax function; w, B is a model parameter of the full connection layer;
(55) Updating each parameter in the model through gradient descent, wherein binary cross entropy is adopted as a loss function, and the formula is as follows:
;
wherein Y is the actual class number, namely 0 or 1, representing one of the classes; p is the prediction probability of the model, and represents the probability that the sample belongs to the first class;
(56) Training is ended when the model's loss over the training set no longer drops significantly.
The invention relates to a power theft detection system of a dynamically generated residual error graph convolution neural network, which comprises:
and a collection module: the system is used for collecting user power consumption original data in the power system;
and a pretreatment module: the method comprises the steps of performing deletion supplement on original data, performing outlier processing and dividing a training set, a verification set and a test set;
and a conversion module: the method comprises the steps of converting a preprocessed one-dimensional power load curve into a two-dimensional power load characteristic matrix to input a graph convolution neural network;
a neighbor matrix module: each period for data is a node, the correlation among the nodes is calculated by adopting a dynamic topological graph generation method, and the optimal parameters are found through training to obtain an adjacent matrix A which can most represent the data relationship;
and a classification module: and the method is used for sending the feature matrix X and the adjacent matrix A into a residual graph convolution neural network to extract potential features, and obtaining final classification through a pooling layer and a full connection layer.
The device of the invention comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the computer program realizes the electricity larceny detection method of the dynamically generated residual graph convolution neural network when being loaded to the processor.
A storage medium according to the present invention stores a computer program which, when executed by a processor, implements a method for detecting theft of a dynamically generated residual map convolution neural network according to any one of the above.
The beneficial effects are that: compared with the prior art, the invention has the following remarkable advantages: providing fewer parameters while providing more accurate node relationships; a MixHop graph convolutional network is adopted to conveniently extract deep time dependency relationship, periodic pattern and potential characteristics in the user power consumption data. By adding residual connection, the depth of the network is increased, and the problem of gradient explosion in the training process is effectively relieved, so that the robustness of the model is enhanced.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
FIG. 2 is a graphical illustration of a dynamically generated residual map convolutional neural network constructed in accordance with the present invention;
FIG. 3 is a graphical illustration of a residual map convolution neural module in accordance with the present invention;
FIG. 4 is a convergence diagram of training and verifying loss values during the training process of the present invention;
FIG. 5 is a graph comparing effects of the present invention at different convolution layers;
fig. 6 is a graph comparing effects of the present invention at different residual convolution layers.
FIG. 7 is a graph showing the comparison of the effects of the present invention at different ratios of electricity theft.
Description of the embodiments
The technical scheme of the invention is further described below with reference to the accompanying drawings.
As shown in fig. 1, an embodiment of the present invention provides a method for detecting electricity theft of a dynamically generated residual graph convolution neural network, including the following steps:
(1) Collecting user power consumption original data in a power system; the data set adopts 42372 which is recorded by a national electric network (SGCC) from 2014 to 2016 and is true electricity consumption data of 1035 days of users, wherein the number of electricity stealing users is 3615, and the number of normal users is 38757. The data format of a single user is a time series of 1x 1035.
(2) Performing missing supplement and outlier processing on the original data, and dividing a training set, a verification set and a test set; the method comprises the following steps:
(21) And (3) deleting the power consumption data with the missing part, namely deleting the users with the consumption data missing more than 50%, otherwise, supplementing the missing data by adopting a linear interpolation method, respectively taking out three values before and after the missing value, and dividing the six taken out data into a group if the three values are directly discarded in the absence or the null state; calculating to obtain a filling value by using an interpolation formula; the specific operation is as follows:
;
wherein,a value representing the day i electricity data, if empty, as NaN;
(22) Outliers are where individual values in a sample deviate significantly from the rest of the observations; the abnormal value is defined by adopting the three sigma law, and the specific formula is as follows:
;
wherein,mean value of single sample, +.>Is the standard deviation;
(23) Carrying out standardization treatment by adopting a normalization method, and mapping all data into a [0-1] interval; the processed data is presented in table 1.
(24) Dividing the processed data set into a training set, a verification set and a test set, wherein the proportion is 6:2:2.
(3) Transforming the preprocessed one-dimensional power load curve into a two-dimensional power load characteristic matrix X so as to input a graph convolution neural network; the method comprises the following steps: setting the one-dimensional power load curve after pretreatment asComprises N sample users, electricity consumption data for each day +.>Will->Restructuring to +.>Is used together with the adjacent matrix as a graphThe input of the convolution module is->。
(4) Calculating the correlation among nodes by taking each period of data as a node and adopting a dynamic topological graph generation method, and finding out the optimal parameters through training to obtain an adjacent matrix A which can most represent the data relationship; adaptively learning graph adjacency matrices to capture implicit connection relationships between data according to a dynamic topology graph generation method, comprising the steps of:
(41) Randomly generating n node vectorsInitializing a weight parameter W and an offset parameter b, and generating an initial relation measure between nodes by the following formula:
;
wherein,to activate the function +.>Controlling the oscillation size of the preliminary relation measurement for the super parameter; v (V) n V for implicit representation of node vector En i ,V j Representing the i, j-th vector in the sequence;
(42) Sorting the initial relation measurement according to rows and columns respectively, selecting k maximum values, setting the maximum values as 1, setting the rest values as 0, and obtaining an adjacent matrix A; where k is a super parameter set to [20, 25, 30, 35, 40, …,80].
(5) The feature matrix X and the adjacent matrix A are sent into a residual map convolution neural network to extract potential features, and final classification is obtained through a pooling layer and a full-connection layer; the residual graph convolution neural network includes: the 1X1 convolution module and the residual MixHop graph convolution module specifically comprise the following steps:
(51) The number of channels of the feature matrix X is increased through a 1X1 convolution module;
(52) Extracting time and space characteristics and potential characteristics among user power curves through a residual MixHop graph convolution module; the residual MixHop graph convolution module consists of a plurality of graph convolution GC layers, each GC layer is formed by overlapping two MixHop modules, residual connection is adopted between the GC layers, and the formula is as follows:
given the adjacency matrix a, then:
;
wherein,;
wherein,the node representing the K layer is obtained through graph convolution operation; />Is a hyper-parameter controlling the ratio of the original state of the reserved root node; />Representing the input hidden state of the first layer, and multiplying the adjacent matrix by the feature matrix;the hidden state of the upper layer is the node characteristic of the upper layer;
adding the normalized result of the identity matrix I to the matrix A; />The degree matrix is the degree of which the diagonal line element is a node; />An inverse of the degree matrix;
;
where k is the propagation depth,for model weight parameters, +.>Representing an output hidden state of the current layer;
as shown in fig. 3, the MixHop convolution operation steps are demonstrated. Information is first propagated laterally and then selected longitudinally. The information dissemination step recursively disseminates node information according to a given graph structure. In the propagation process, the original state of a certain proportion of nodes is reserved. The process of the GCN module is shown in more detail in fig. 3 than the description of the module in fig. 2.
(53) Filtering redundant information in the network by adopting a maximum pooling layer; selecting the maximum value in each rectangular subarea to enter the full connection layer; the formula is as follows:
;
wherein,representing the result after the maximum pooling operation; />A value representing a certain rectangular subregion in the input feature map;
(54) Converting the extracted model node characteristics into predictive scores to obtain a final classification detection result; the formula is as follows:
;
wherein,is a SoftMax function; w, B is a full-connection layer mouldA profile parameter;
(55) Updating each parameter in the model through gradient descent, wherein binary cross entropy is adopted as a loss function, and the formula is as follows:
;
wherein Y is the actual class number, namely 0 or 1, representing one of the classes; p is the prediction probability of the model, and represents the probability that the sample belongs to the first class;
(56) Training is ended when the model's loss over the training set no longer drops significantly.
According to the invention, the electricity stealing detection is used as a two-class task for detecting whether a user generates electricity stealing behavior, a single accuracy evaluation index can not objectively evaluate the advantages of a model under the condition of unbalanced data, particularly extremely biased data, and the advantages of the model compared with other existing models are presented through multiple index evaluation models. The invention adopts the Area Under Curve (AUC) and average precision (MAP) which are commonly used in the field of electricity larceny detection as model evaluation indexes, and the detailed explanation is shown in table 2.
TABLE 2 introduction of evaluation index
The calculation method of each index is as follows:
wherein,representing the rank value of sample i, M represents a normal user sample, N represents a steal user sample, and the samples are scored in ascending order of positive samples.
Prior to MAP evaluation, the tags of the test set need to be ranked according to test score, and in the field of electricity theft detection, the first 100 and 200 tags are typically selected to evaluate performance.
First, the precision at k (denoted P@k) is defined:
wherein,representing the number of correctly predicted thieves before location k, then map@k (where k is in the range of [100,200 ]]) The average of all P@k cases is shown, as follows,
where r is the number of power theft in the first N tags,is the location where electricity theft occurs.
The index pairs of the test set of the embodiment of the invention and other models are shown in table 3:
TABLE 3 comparison of effects with mainstream models
As can be seen from Table 3, the AUC of the present model on the test set was 0.932, MAP@100 was 0.959, and MAP@200 was 0.967 higher than the existing model.
As shown in fig. 4, the convergence process of 100 rounds of the method at a training rate of 60% is shown. The horizontal axis represents the number of training rounds and the vertical axis represents the loss value. As training proceeds, both training and validation losses are significantly reduced. In particular, between 35 and 50 rounds, the verification loss exhibits small amplitude fluctuations, which may be due to data noise, and after 60 rounds the loss value tends to stabilize.
And determining the final layer number to be 6 by comparing the effects of different layers of the picture convolution in model training.
Figures 5 and 6 show the effect of different number of convolution layers on the model effect without and with the addition of residual connections, respectively.
Fig. 5 shows the results of a graph convolution module experiment without residual connection. When the number of layers is increased within a certain range, the performance of the model is improved, and after the threshold value is exceeded, the performance of the model is reduced. For example, the model performance increases more when the number of layers is 1 to 3, and the model performance decreases significantly after exceeding 3 layers. This is because, at the beginning, the number of iterations of the parameters can be increased by deepening the number of model layers, but the complex operation in the graph convolution causes the model to appear over-fitting after exceeding three layers, and the performance cannot be improved.
Fig. 6 shows experimental results under a residual graph convolution neural module. Also, model performance is improved when the number of layers can be increased over a range. In contrast, when the number of model layers under residual connection reaches 6, the model performance begins to decrease. This is because the residual connection makes the lower model retain node information of the upper model when the convolution operation is performed, so that the model layer number is deepened.
Meanwhile, the optimal performance of the model added with the residual connection is higher than that of the original model. For example, when the number of layers is 6, the optimal AUC for the model with residual connections added is 0.865, which is 0.12 higher than the model without residual connections added. This fully illustrates the validity of residual connection in the model of the present invention and fully ensures the initial information of the nodes in the process of graph convolution operation.
As shown in fig. 7, a comparison graph of the model detection effect at different electricity theft ratios is shown. In the data set adopted in the experiment, the proportion of electricity stealing users is 8%, and in order to show the effect of the model under different electricity stealing proportions, the proportion of the electricity stealing users is increased by reducing the number of normal users. It can be seen that the detection accuracy of the invention is higher with the increase of the electricity stealing proportion. It should be noted that the present invention requires a certain amount of marked electricity larceny user data, and too few electricity larceny users cannot provide sufficient features, for example, at a electricity larceny proportion of 2%,4%, the model cannot sufficiently extract the time correlation and periodicity in the electricity larceny data, resulting in poor accuracy.
The embodiment of the invention also provides a system for detecting electricity theft of the residual error graph convolution neural network, which comprises the following steps:
and a collection module: the system is used for collecting user power consumption original data in the power system;
and a pretreatment module: the method comprises the steps of performing deletion supplement on original data, performing outlier processing and dividing a training set, a verification set and a test set;
and a conversion module: the method comprises the steps of converting a preprocessed one-dimensional power load curve into a two-dimensional power load characteristic matrix to input a graph convolution neural network;
a neighbor matrix module: each period for data is a node, the correlation among the nodes is calculated by adopting a dynamic topological graph generation method, and the optimal parameters are found through training to obtain an adjacent matrix A which can most represent the data relationship;
and a classification module: and the method is used for sending the feature matrix X and the adjacent matrix A into a residual graph convolution neural network to extract potential features, and obtaining final classification through a pooling layer and a full connection layer.
The embodiment of the invention also provides equipment, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the computer program realizes the electricity larceny detection method of the dynamically generated residual error graph convolution neural network when being loaded to the processor.
The embodiment of the invention also provides a storage medium, which stores a computer program, and the computer program realizes the electricity theft detection method of the dynamically generated residual graph convolution neural network when being executed by a processor.
Claims (9)
1. The electricity stealing detection method of the residual map convolution neural network is characterized by comprising the following steps of:
(1) Collecting user power consumption original data in a power system;
(2) Performing missing supplement and outlier processing on the original data, and dividing a training set, a verification set and a test set;
(3) Transforming the preprocessed one-dimensional power load curve into a two-dimensional power load characteristic matrix X so as to input a graph convolution neural network;
(4) Calculating the correlation among nodes by taking each period of data as a node and adopting a dynamic topological graph generation method, and obtaining optimal parameters through training to obtain an adjacent matrix A which can most represent the data relationship;
(5) And (3) sending the feature matrix X and the adjacent matrix A into a residual map convolution neural network to extract potential features, and obtaining final classification through a pooling layer and a full connection layer.
2. The method for detecting theft of a dynamically generated residual convolution neural network according to claim 1, wherein the step (1) is specifically as follows: the original data is a daily electricity record generated by 42372 users in 1035 days; the data format of a single user is a time series of 1x 1035.
3. The method for detecting theft of a dynamically generated residual convolution neural network according to claim 1, wherein said step (2) comprises the steps of:
(21) And (3) deleting the power consumption data with the missing part, namely deleting the users with the consumption data missing more than 50%, otherwise, supplementing the missing data by adopting a linear interpolation method, respectively taking out three values before and after the missing value, and dividing the six taken out data into a group if the three values are directly discarded in the absence or the null state; calculating to obtain a filling value by using an interpolation formula; the specific operation is as follows:
;
wherein,a value representing the day i electricity data, if empty, as NaN;
(22) Outliers are where individual values in a sample deviate significantly from the rest of the observations; the abnormal value is defined by adopting the three sigma law, and the specific formula is as follows:
;
wherein,mean value of single sample, +.>Is the standard deviation;
(23) Carrying out standardization treatment by adopting a normalization method, and mapping all data into a [0-1] interval;
(24) Dividing the processed data set into a training set, a verification set and a test set, wherein the proportion is 6:2:2.
4. the method for detecting theft of a dynamically generated residual convolution neural network according to claim 1, wherein the step (3) is specifically as follows: setting the one-dimensional power load curve after pretreatment asComprises N sample users, electricity consumption data for each day +.>Will->Restructuring to +.>Together with the adjacent matrix as input to the picture convolution module, i.e +.>。
5. The method for detecting electricity theft of a dynamically generated residual graph convolutional neural network of claim 1, wherein said step (4) adaptively learns graph adjacency matrices to capture implicit connection relations between data according to a dynamic topology graph generation method, comprising the steps of:
(41) Randomly generating n node vectorsInitializing a weight parameter W and an offset parameter b, and generating an initial relation measure between nodes by the following formula:
;
wherein,to activate the function +.>Controlling the oscillation size of the preliminary relation measurement for the super parameter; v (V) n V for implicit representation of node vector En i ,V j Representing the i, j-th vector in the sequence;
(42) Sorting the initial relation measurement according to rows and columns respectively, selecting k maximum values, setting the maximum values as 1, setting the rest values as 0, and obtaining an adjacent matrix A; where k is a super parameter set to [20, 25, 30, 35, 40, …,80].
6. The method for detecting theft of a dynamically generated residual convolutional neural network of claim 1, wherein said step (5) residual convolutional neural network comprises: the 1X1 convolution module and the residual MixHop graph convolution module specifically comprise the following steps:
(51) The number of channels of the feature matrix X is increased through a 1X1 convolution module;
(52) Extracting time and space characteristics and potential characteristics among user power curves through a residual MixHop graph convolution module; the residual MixHop graph convolution module consists of a plurality of graph convolution GC layers, each GC layer is formed by overlapping two MixHop modules, residual connection is adopted between the GC layers, and the formula is as follows:
given the adjacency matrix a, then:
;
wherein,;
wherein,the node representing the K layer is obtained through graph convolution operation; />Is a hyper-parameter controlling the ratio of the original state of the reserved root node; />Representing the input hidden state of the first layer, and multiplying the adjacent matrix by the feature matrix; />The hidden state of the upper layer is the node characteristic of the upper layer;
adding the normalized result of the identity matrix I to the matrix A; />The degree matrix is the degree of which the diagonal line element is a node; />An inverse of the degree matrix;
;
where k is the propagation depth,for model weight parameters, +.>Representing an output hidden state of the current layer;
(53) Filtering redundant information in the network by adopting a maximum pooling layer; selecting the maximum value in each rectangular subarea to enter the full connection layer; the formula is as follows:
;
wherein,representing the result after the maximum pooling operation; />A value representing a certain rectangular subregion in the input feature map;
(54) Converting the extracted model node characteristics into predictive scores to obtain a final classification detection result; the formula is as follows:
;
wherein,is a SoftMax function; w, B is a model parameter of the full connection layer;
(55) Updating each parameter in the model through gradient descent, wherein binary cross entropy is adopted as a loss function, and the formula is as follows:
;
wherein Y is the actual class number, namely 0 or 1, representing one of the classes; p is the prediction probability of the model, and represents the probability that the sample belongs to the first class;
(56) Training is ended when the model's loss over the training set no longer drops significantly.
7. A dynamically generated residual map convolutional neural network power theft detection system, comprising:
and a collection module: the system is used for collecting user power consumption original data in the power system;
and a pretreatment module: the method comprises the steps of performing deletion supplement on original data, performing outlier processing and dividing a training set, a verification set and a test set;
and a conversion module: the method comprises the steps of converting a preprocessed one-dimensional power load curve into a two-dimensional power load characteristic matrix to input a graph convolution neural network;
a neighbor matrix module: each period for data is a node, the correlation among the nodes is calculated by adopting a dynamic topological graph generation method, and the optimal parameters are found through training to obtain an adjacent matrix A which can most represent the data relationship;
and a classification module: and the method is used for sending the feature matrix X and the adjacent matrix A into a residual graph convolution neural network to extract potential features, and obtaining final classification through a pooling layer and a full connection layer.
8. An apparatus comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the computer program when loaded into the processor implements a method of detecting theft of a dynamically generated residual graph convolutional neural network according to any one of claims 1-6.
9. A storage medium storing a computer program, wherein the computer program when executed by a processor implements a dynamically generated residual convolution neural network theft detection method according to any one of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410046231.XA CN117556369B (en) | 2024-01-12 | 2024-01-12 | Power theft detection method and system for dynamically generated residual error graph convolution neural network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410046231.XA CN117556369B (en) | 2024-01-12 | 2024-01-12 | Power theft detection method and system for dynamically generated residual error graph convolution neural network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117556369A true CN117556369A (en) | 2024-02-13 |
CN117556369B CN117556369B (en) | 2024-04-19 |
Family
ID=89817108
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410046231.XA Active CN117556369B (en) | 2024-01-12 | 2024-01-12 | Power theft detection method and system for dynamically generated residual error graph convolution neural network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117556369B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117808175A (en) * | 2024-03-01 | 2024-04-02 | 南京信息工程大学 | Short-term multi-energy load prediction method based on DTformer |
CN118035811A (en) * | 2024-04-18 | 2024-05-14 | 中科南京信息高铁研究院 | State sensing method, control server and medium of electric equipment based on graph convolution neural network |
CN118194092A (en) * | 2024-03-20 | 2024-06-14 | 河南舒皓科技有限公司 | State detection method and system for power module |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170242932A1 (en) * | 2016-02-24 | 2017-08-24 | International Business Machines Corporation | Theft detection via adaptive lexical similarity analysis of social media data streams |
CN111343029A (en) * | 2020-03-17 | 2020-06-26 | 上海英方软件股份有限公司 | Monitoring platform and method based on data forwarding node topology monitoring |
CN112990721A (en) * | 2021-03-24 | 2021-06-18 | 山西大学 | Electric power user value analysis method and system based on payment behaviors |
CN113141008A (en) * | 2021-04-23 | 2021-07-20 | 国网陕西省电力公司电力科学研究院 | Data-driven power distribution network distributed new energy consumption capacity assessment method |
CN113657171A (en) * | 2021-07-20 | 2021-11-16 | 国网上海市电力公司 | Low-voltage distribution network platform region topology identification method based on graph wavelet neural network |
CN114595773A (en) * | 2022-03-10 | 2022-06-07 | 广东泰云泽科技有限公司 | Multi-source heterogeneous twin data fusion method and system based on factory production process |
CN115293046A (en) * | 2022-08-15 | 2022-11-04 | 国网四川省电力公司营销服务中心 | Short-term power load prediction method, device, equipment and medium |
CN115580446A (en) * | 2022-09-22 | 2023-01-06 | 南京富尔登科技发展有限公司 | Non-intrusive load detection method based on decentralized federal learning |
CN115983448A (en) * | 2022-12-14 | 2023-04-18 | 南京信息工程大学 | Multi-energy load prediction method based on space-time diagram neural network |
CN116226748A (en) * | 2022-09-27 | 2023-06-06 | 中国电力科学研究院有限公司 | Multi-label co-occurrence network discrimination-based electricity stealing type detection method and system |
CN116366134A (en) * | 2023-04-07 | 2023-06-30 | 军事科学院系统工程研究院系统总体研究所 | Space-based Internet of things multi-star collaborative strategy construction method based on element space-time expansion diagram |
CN117034179A (en) * | 2023-10-10 | 2023-11-10 | 国网山东省电力公司营销服务中心(计量中心) | Abnormal electric quantity identification and tracing method and system based on graph neural network |
CN117076997A (en) * | 2023-06-30 | 2023-11-17 | 国网辽宁省电力有限公司锦州供电公司 | User electricity larceny detection method and system |
CN117237678A (en) * | 2023-11-16 | 2023-12-15 | 邯郸欣和电力建设有限公司 | Method, device, equipment and storage medium for detecting abnormal electricity utilization behavior |
-
2024
- 2024-01-12 CN CN202410046231.XA patent/CN117556369B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170242932A1 (en) * | 2016-02-24 | 2017-08-24 | International Business Machines Corporation | Theft detection via adaptive lexical similarity analysis of social media data streams |
CN111343029A (en) * | 2020-03-17 | 2020-06-26 | 上海英方软件股份有限公司 | Monitoring platform and method based on data forwarding node topology monitoring |
CN112990721A (en) * | 2021-03-24 | 2021-06-18 | 山西大学 | Electric power user value analysis method and system based on payment behaviors |
CN113141008A (en) * | 2021-04-23 | 2021-07-20 | 国网陕西省电力公司电力科学研究院 | Data-driven power distribution network distributed new energy consumption capacity assessment method |
CN113657171A (en) * | 2021-07-20 | 2021-11-16 | 国网上海市电力公司 | Low-voltage distribution network platform region topology identification method based on graph wavelet neural network |
CN114595773A (en) * | 2022-03-10 | 2022-06-07 | 广东泰云泽科技有限公司 | Multi-source heterogeneous twin data fusion method and system based on factory production process |
CN115293046A (en) * | 2022-08-15 | 2022-11-04 | 国网四川省电力公司营销服务中心 | Short-term power load prediction method, device, equipment and medium |
CN115580446A (en) * | 2022-09-22 | 2023-01-06 | 南京富尔登科技发展有限公司 | Non-intrusive load detection method based on decentralized federal learning |
CN116226748A (en) * | 2022-09-27 | 2023-06-06 | 中国电力科学研究院有限公司 | Multi-label co-occurrence network discrimination-based electricity stealing type detection method and system |
CN115983448A (en) * | 2022-12-14 | 2023-04-18 | 南京信息工程大学 | Multi-energy load prediction method based on space-time diagram neural network |
CN116366134A (en) * | 2023-04-07 | 2023-06-30 | 军事科学院系统工程研究院系统总体研究所 | Space-based Internet of things multi-star collaborative strategy construction method based on element space-time expansion diagram |
CN117076997A (en) * | 2023-06-30 | 2023-11-17 | 国网辽宁省电力有限公司锦州供电公司 | User electricity larceny detection method and system |
CN117034179A (en) * | 2023-10-10 | 2023-11-10 | 国网山东省电力公司营销服务中心(计量中心) | Abnormal electric quantity identification and tracing method and system based on graph neural network |
CN117237678A (en) * | 2023-11-16 | 2023-12-15 | 邯郸欣和电力建设有限公司 | Method, device, equipment and storage medium for detecting abnormal electricity utilization behavior |
Non-Patent Citations (5)
Title |
---|
WENLONG LIAO等: "Electricity Theft Detection Using Dynamic GraphConstruction and Graph Attention Network", 《IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS》, 20 November 2023 (2023-11-20), pages 1 - 13 * |
WENLONG LIAO等: "Electricity Theft Detection Using Euclidean and Graph Convolutional Neural Networks", 《IEEE TRANSACTIONS ON POWER SYSTEMS》, vol. 38, no. 4, 31 July 2023 (2023-07-31), pages 3514 - 3527 * |
张祥钦等: "基于深度学习的窃电检测方法综述", 《辽宁工业大学学报(自然科学版)》, vol. 43, no. 5, 31 October 2023 (2023-10-31), pages 296 - 302 * |
李程鸿等: "面向半监督节点分类的双通道图随机卷积网络", 《小型微型计算机系统》, vol. 44, no. 8, 31 August 2023 (2023-08-31), pages 1656 - 1664 * |
赵果: "基于动态图卷积网络的轻量化行为识别模型研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》, no. 02, 15 February 2023 (2023-02-15), pages 138 - 1502 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117808175A (en) * | 2024-03-01 | 2024-04-02 | 南京信息工程大学 | Short-term multi-energy load prediction method based on DTformer |
CN117808175B (en) * | 2024-03-01 | 2024-05-17 | 南京信息工程大学 | DTformer-based short-term multi-energy load prediction method |
CN118194092A (en) * | 2024-03-20 | 2024-06-14 | 河南舒皓科技有限公司 | State detection method and system for power module |
CN118194092B (en) * | 2024-03-20 | 2024-09-24 | 内蒙古广源电气技术有限公司 | State detection method and system for power module |
CN118035811A (en) * | 2024-04-18 | 2024-05-14 | 中科南京信息高铁研究院 | State sensing method, control server and medium of electric equipment based on graph convolution neural network |
Also Published As
Publication number | Publication date |
---|---|
CN117556369B (en) | 2024-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN117556369B (en) | Power theft detection method and system for dynamically generated residual error graph convolution neural network | |
CN106709035B (en) | A kind of pretreatment system of electric power multidimensional panoramic view data | |
Lu et al. | An MDL approach to the climate segmentation problem | |
CN104408667B (en) | Method and system for comprehensively evaluating power quality | |
CN109635010B (en) | User characteristic and characteristic factor extraction and query method and system | |
CN117078048B (en) | Digital twinning-based intelligent city resource management method and system | |
CN101105841A (en) | Method for constructing gene controlled subnetwork by large scale gene chip expression profile data | |
CN116169670A (en) | Short-term non-resident load prediction method and system based on improved neural network | |
CN103440275A (en) | Prim-based K-means clustering method | |
CN115563477B (en) | Harmonic data identification method, device, computer equipment and storage medium | |
CN115170874A (en) | Self-distillation implementation method based on decoupling distillation loss | |
CN113809365B (en) | Method and system for determining voltage decay of hydrogen fuel cell system and electronic equipment | |
CN113094448B (en) | Analysis method and analysis device for residence empty state and electronic equipment | |
CN105590167A (en) | Method and device for analyzing electric field multivariate operating data | |
CN110472659A (en) | Data processing method, device, computer readable storage medium and computer equipment | |
CN112418504A (en) | Wind speed prediction method based on mixed variable selection optimization deep belief network | |
CN117972604A (en) | Ocean observation data anomaly detection method based on adjacent site space-time correlation | |
CN117725437A (en) | Machine learning-based data accurate matching analysis method | |
CN114596445B (en) | Method for improving fault diagnosis precision of oil extraction machine | |
CN116011564A (en) | Entity relationship completion method, system and application for power equipment | |
CN116467631A (en) | Power fingerprint identification model training method, power fingerprint identification method and device | |
CN115018007A (en) | Sensitive data classification method based on improved ID3 decision tree | |
CN116010831A (en) | Combined clustering scene reduction method and system based on potential decision result | |
CN113111588A (en) | NO of gas turbineXEmission concentration prediction method and device | |
Ramathulasi et al. | Enhanced PMF model to predict user interest for web API recommendation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |