4.0 Article

Rule-based classification of energy theft and anomalies in consumers load demand profile

期刊

IET SMART GRID
卷 2, 期 4, 页码 612-624

出版社

WILEY
DOI: 10.1049/iet-stg.2019.0081

关键词

pattern classification; power consumption; data mining; security of data; learning (artificial intelligence); fraud; power system management; power engineering computing; data privacy; metering; power meters; knowledge based systems; meta data; classification block; rule-based classification; energy theft; consumers load demand profile; advanced metering infrastructure; AMI; consumers consumption patterns; power utilities; fraud detection methodology; data mining techniques; consumer consumption patterns; rule-base learning; validation technique; energy anomalies; abnormality type classification; validation block; privacy preservation; metadata

资金

  1. Department of Science and Technology (DST), Government of India [DST/INT/UK/P-138/2016]

向作者/读者索取更多资源

The invent of advanced metering infrastructure (AMI) opens the door for a comprehensive analysis of consumers consumption patterns including energy theft studies, which were not possible beforehand. This study proposes a fraud detection methodology using data mining techniques such as hierarchical clustering and decision tree classification to identify abnormalities in consumer consumption patterns and further classify the abnormality type into the anomaly, fraud, high or low power consumption based on rule-based learning. The proposed algorithm uses real-time dataset of Nana Kajaliyala village, Gujarat, India. The focus has been on generalizing the algorithm for varied practical cases to make it adaptive towards non-malicious changes in consumer profile. Simultaneously, this study proposes a novel validation technique used for validation, which utilizes predicted profiles to ensure accurate bifurcation between anomaly and theft targets. The result exhibits high detection ratio and low false-positive ratio due to the application of appropriate validation block. The proposed methodology is also investigated from point of view of privacy preservation and is found to be relatively secure owing to low-sampling rates, minimal usage of metadata and communication layer. The proposed algorithm has an edge over state-of-the-art theft detection algorithms in detection accuracy and robustness towards outliers.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.0
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据