1,765 research outputs found

    Support Vector Machine Approach for Non-Technical Losses Identification in Power Distribution Systems

    Get PDF
    Electricity consumer fraud is a problem faced by all power utilities. Finding efficient measurements for detecting fraudulent electricity consumption has been an active research area in recent years. In this paper,the approach towards nontechnical loss (NTL) detection in power utilities using an artificial intelligence based technique, Support Vector Machine (SVM), are presented. This approach provides a method of data mining, which involves feature extraction from past consumption data. This SVM based approach uses customer load profile information and additional attributes to expose abnormal behavior that is known to be highly correlated with NTL activities. Some key advantages of SVM in data clustering, among which is the easy way of using them to fit the data of a wide range of features are discussed here. Finally, some major weakness of using SVM in clustering for NTL identification are identified, which leads to motivate for the scope of Optimum-Path Forest, a new model of NTL identification

    Review of Non-Technical Losses Identification Techniques

    Get PDF
    Illegally consumption of electric power, termed as non-technical losses for the distribution companies is one of the dominant factors all over the world for many years. Although there are some conventional methods to identify these irregularities, such as physical inspection of meters at the consumer premises etc, but it requires large number of manpower and time; then also it does not seem to be adequate. Now a days there are various methods and algorithms have been developed that are proposed in different research papers, to detect non-technical losses. In this paper these methods are reviewed, their important features are highlighted and also the limitations are identified. Finally, the qualitative comparison of various non-technical losses identification algorithms is presented based on their performance, costs, data handling, quality control and execution times. It can be concluded that the graph-based classifier, Optimum-Path Forest algorithm that have both supervised and unsupervised variants, yields the most accurate result to detect non-technical losses

    Solutions for detection of non-technical losses in the electricity grid: a review

    Get PDF
    This paper is a review of literature with an analysis on a selection of scienti c studies for detection of non-technical losses. Non-technical losses occurring in the electric grid at level of transmission or of distribution have negative impact on economies, affecting utilities, paying consumers and states. The paper is concerned with the lines of research pursued, the main techniques used and the limitations on current solutions. Also, a typology for the categorization of solutions for detection of non-technical losses is proposed and the sources and possible attack/vulnerability points are identifi ed. The selected literature covers a wide range of solutions associated with non-technical losses. Of the 103 selected studies, 6 are theoretical, 25 propose hardware solutions and 72 propose non-hardware solutions. Data based classi cation models and data from consumption with high resolution are respectively required in about 47% and 35% of the reported solutions. Available solutions cover a wide range of cases, with the main limitation found being the lack of an uni ed solution, which enables the detection of all kinds of non-technical losses

    Improving power theft detection using efficient clustering and ensemble classification

    Get PDF
    One of the main concerns of power generation systems around the world is power theft. This research proposes a framework that merges clustering and classification together in order to power theft detection. Due to the fact that most datasets do not have abnormal samples or are few, we have added abnormal samples to the original datasets using artificial attacks to create balance in the datasets and increase the correct detection rate. We improved the crow search algorithm (CSA) and used the weight feature of Crows to improve performance of clustering phase. Also, to create balance between diversification and intensification, we calculated the awareness probability parameter (AP) dynamically at iterations of the algorithm. To evaluate the performance, we used the cross validation technique have used the stacking technique in its training phase. The results of extensive experiments on three reference datasets showed high performance to detect power theft. The evaluation results showed that if the data is collected correctly and sufficiently, this framework can effectively detect power theft in any actual power grid. Also, for new attacks, if their patterns can be detected from the data, it is easily possible to implement these types of attacks

    From Intrusion Detection to Attacker Attribution: A Comprehensive Survey of Unsupervised Methods

    Get PDF
    Over the last five years there has been an increase in the frequency and diversity of network attacks. This holds true, as more and more organisations admit compromises on a daily basis. Many misuse and anomaly based Intrusion Detection Systems (IDSs) that rely on either signatures, supervised or statistical methods have been proposed in the literature, but their trustworthiness is debatable. Moreover, as this work uncovers, the current IDSs are based on obsolete attack classes that do not reflect the current attack trends. For these reasons, this paper provides a comprehensive overview of unsupervised and hybrid methods for intrusion detection, discussing their potential in the domain. We also present and highlight the importance of feature engineering techniques that have been proposed for intrusion detection. Furthermore, we discuss that current IDSs should evolve from simple detection to correlation and attribution. We descant how IDS data could be used to reconstruct and correlate attacks to identify attackers, with the use of advanced data analytics techniques. Finally, we argue how the present IDS attack classes can be extended to match the modern attacks and propose three new classes regarding the outgoing network communicatio

    Detection of Non-Technical Losses: The Project MIDAS

    Get PDF
    The MIDAS project began in 2006 as collaboration between Endesa, Sadiel, and the University of Seville. The objective of the MIDAS project is the detection of Non-Technical Losses (NTLs) on power utilities. The NTLs represent the non-billed energy due to faults or illegal manipulations in clients’ fa cilities. Initially, research lines study the application of techniques of data mining and neural networks. After several researches, the studies are expanded to other research fields: expert systems, text mining, statistical techniques, pattern recognition, etc. These techniques have provided an automated system for detection of NTLs on company databases. This system is in the test phase, and it is applied in real cases in company databases
    • …
    corecore