Electricity theft detection in Power utilities using Bagged CHAID-Based classification Trees

Publish Year: 1401
نوع سند: مقاله ژورنالی
زبان: English
View: 143

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JOIE-15-2_005

تاریخ نمایه سازی: 9 مهر 1401

Abstract:

Electricity theft and fraud in billing are the primary concerns for Distribution System Operators (DSO). It is estimated that billions of dollars are lost each year due to these illegal activities. DSOs around the world, especially in underdeveloped countries, are still utilizing conventional time consuming and inefficient methods for Non-Technical Loss (NTL) detection. This research work attempts to solve the mentioned problems by developing an efficient energy theft detection model to identify the fraudster customers in a power distribution system. The key motivation for the current study is to assist the DSOs for their campaign against energy theft. The proposed method initially utilizes the monthly consumption data of energy customers, obtained from Multan Electric Power Company (MEPCO) Pakistan, to segregate the honest and the fraudulent customers. The Bagged Chi-square Automatic Interaction Detection (CHAID) Decision Tree (DT) algorithm is used to classify the honest and fraudster consumers. Furthermore, based on the mentioned metrics, the performance superiority of the Bagged CHAID-based NTL detection method is validated by comparing its efficacy with that of few well-known state-of-the-art machine learning algorithms such as Support Vector Machine (SVM), Artificial Neural Network (ANN) Logistic Regression (LR), Bayesian Network (BN) and Discriminant Analysis. The proposed NTL detection method provides an Accuracy of ۸۶.۳۵% and Area Under Curve (AUC) of ۰.۹۲۷, respectively, which are significantly higher than that of the same for the mentioned algorithms.

Keywords:

Electricity theft , fraud billing , Non-Technical Loss , Chi-square Automatic Interaction Detection

Authors

Muhammad Saeed

School of Electrical Engineering, University Technology Malaysia, Skudai, Johor Bahru ۸۱۳۱۰, Malaysia

Mohd. Wazir Mustafa

School of Electrical Engineering, University Technology Malaysia, Skudai, Johor Bahru ۸۱۳۱۰, Malaysia

Usman Sheikh

School of Electrical Engineering, University Technology Malaysia, Skudai, Johor Bahru ۸۱۳۱۰, Malaysia

Attaullah Khidrani

School of Electrical Engineering, University Technology Malaysia, Skudai, Johor Bahru ۸۱۳۱۰, Malaysia

Mohd Norzali Haji Mohd

School of Electrical Engineering, University Technology Malaysia, Skudai, Johor Bahru ۸۱۳۱۰, Malaysia

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Angelos, E. W. S., Saavedra, O. R., Cortés, O. A. ...
  • Antonelo, E. A., & State, R. (۲۰۱۹, October). On importance ...
  • Baskar, P., Joseph, M. A., Narayanan, N., & Loya, R. ...
  • Belloli, M., Melzi, S., Negrini, S., & Squicciarini, G. (۲۰۱۰). ...
  • Bonte, C., & Vercauteren, F. (۲۰۱۸). Privacy-preserving logistic regression training. ...
  • Bradley, A. P. (۱۹۹۷). The use of the area under ...
  • Cárdenas, A. A., Amin, S., Schwartz, G., Dong, R., & ...
  • Costa, B. C., Alberto, B. L., Portela, A. M., Maduro, ...
  • Depuru, S. S. S. R., Wang, L., Devabhaktuni, V., & ...
  • Ford, V., Siraj, A., & Eberle, W. (۲۰۱۴, December). Smart ...
  • Ghori, K. M., Abbasi, R. A., Awais, M., Imran, M., ...
  • Hosseini, S., & Barker, K. (۲۰۱۶). Modeling infrastructure resilience using ...
  • Jain, M. B., Srinivas, M. B., & Jain, A. (۲۰۰۸, ...
  • Jamil, F., & Ahmad, E. (۲۰۱۹). Policy considerations for limiting ...
  • Jiang, R., Lu, R., Wang, Y., Luo, J., Shen, C., ...
  • Jokar, P. (۲۰۱۵). Detection of malicious activities against advanced metering ...
  • Jokar, P., Arianpoo, N., & Leung, V. C. (۲۰۱۵). Electricity ...
  • Kessides, I. N. (۲۰۱۳). Chaos in power: Pakistan's electricity crisis. ...
  • Kim, J., Caire, G., & Molisch, A. F. (۲۰۱۵). Quality-aware ...
  • Liu, Y., & Hu, S. (۲۰۱۵). Cyberthreat analysis and detection ...
  • McLaughlin, S., Holbert, B., Fawaz, A., Berthier, R., & Zonouz, ...
  • Messinis, G. M., Rigas, A. E., & Hatziargyriou, N. D. ...
  • Micheli, G., Soda, E., Vespucci, M. T., Gobbi, M., & ...
  • Mohammad, N., Barua, A., & Arafat, M. A. (۲۰۱۳, February). ...
  • Nagi, J., Yap, K. S., Tiong, S. K., Ahmed, S. ...
  • Navani, J. P., Sharma, N. K., & Sapra, S. (۲۰۱۲). ...
  • Otuoze, A. O., Mustafa, M. W., Mohammed, O. O., Saeed, ...
  • Ramos, C. C. O., de Sousa, A. N., Papa, J. ...
  • Saeed, M. S., Mustafa, M. W., Hamadneh, N. N., Alshammari, ...
  • Saeed, M. S., Mustafa, M. W., Sheikh, U. U., Jumani, ...
  • Saeed, M. S., Mustafa, M. W., Sheikh, U. U., Khidrani, ...
  • Saeed, M. S., Mustafa, M., Bin, W., Sheikh, U. U., ...
  • Salman Saeed, M., Mustafa, M. W., Sheikh, U. U., Jumani, ...
  • Singh, S. K., Bose, R., & Joshi, A. (۲۰۱۸). Entropy-based ...
  • Singh, S. K., Bose, R., & Joshi, A. (۲۰۱۸, February). ...
  • Singh, S. K., Bose, R., & Joshi, A. (۲۰۱۸, February). ...
  • Stamenković, M., Steinwall, E., Nilsson, A. K., & Wulff, A. ...
  • Tso, G. K., & Yau, K. K. (۲۰۰۷). Predicting electricity ...
  • Yip, S. C., Tan, W. N., Tan, C., Gan, M. ...
  • Yip, S. C., Wong, K., Hew, W. P., Gan, M. ...
  • Zhang, X. P., & Cheng, X. M. (۲۰۰۹). Energy consumption, ...
  • Zheng, K., Chen, Q., Wang, Y., Kang, C., & Xia, ...
  • نمایش کامل مراجع