0% found this document useful (0 votes)
56 views8 pages

Electric Power Scam Prediction Using Machine Learning Techniques

This document discusses using machine learning techniques to predict electric power theft. It proposes using an ensemble machine learning approach including random forest and support vector machine models. It discusses training models on labeled electricity consumption data and then applying the models to unlabeled data to detect potential theft. The goal is to reduce electricity losses for power companies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views8 pages

Electric Power Scam Prediction Using Machine Learning Techniques

This document discusses using machine learning techniques to predict electric power theft. It proposes using an ensemble machine learning approach including random forest and support vector machine models. It discusses training models on labeled electricity consumption data and then applying the models to unlabeled data to detect potential theft. The goal is to reduce electricity losses for power companies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Electric Power Scam Prediction using Machine

Learning Techniques
Aditya Kumar Mishra Mahendra Vishnoi
Computer Science and Computer Science and
Engineering Engineering
SRM Institute of Science and SRM Institute of Science and
Technology, Technology,
Kattankulathur, Kattankulathur,
Chengalpattu, Chengalpattu,
Tamil Nadu, India Tamil Nadu, India
[email protected] [email protected]

Abstract— Electricity fraud is causing


in the exhibition of different frames and make a
huge losses in both the public and private
sectors. The proposition of this paper prediction of theft in another building. Two kinds
uses a temporarily controlled learning of energy, energy theft and warming interest, will
program to include potential theft data be used utilized as the objectives in the trials.
from non-specific data on the existence of
multiple sample theft. There are two basic Moreover, we’ll take a closer look at the vigor of
applications, one anticipating the use of this model by considering different
power and the other to create a broken circumstances and attempt the best delivery
application and analysis space. Both are
scenario. For this reason, we are planning three
rushing for power protection in creating
configuration, redesign and functionality. analytical arrangements that differ in data
Because of the significant costs of energy selection, at the same time investigating the
acquisition, as a restricted measure of
model presentation pattern. Power theft is one of
energy assets, the efficient and effective
use of energy assets is an important part the primary driver of non-specialized losses and
of social and financial development in any its discovery is significant for power dispersion
country. This work introduces two organizations to stay away from income loss. The
accounting frameworks for the detection
of theft of high and low power consumers flexibility of standard frames on light lattices
who rely on machine learning. allows data transmission and dual power to
enable continuous on-board, charging and
Keywords— ResNet-20, decision-level
fusion, Machine Learning, Prediction loading views.

I. A GENERAL SYSTEM II. MACHINE LEARNING


A. Ensemble Methods
In the main program, we will test the SVR Ensemble procedures have become a principal
model demonstration in predicting future power some portion of the information researcher's toolset.
consumption based onreported behavior. At the The utilization of ensembles has become regular
same time, we are trying to differentiate the models practice in serious AI settings, and ensembles are
presently viewed as a vital device in numerous
specific situations. With regards to AI, an ensemble random subset of the features.
is a bunch of models that is utilized to take care of a A variation of random forests, called incredibly
common issue. An ensemble is comprised of two randomized trees, utilizes similar random subset of
components: a bunch of models and a bunch of features strategy in choosing the best split at each
choice standards that oversee how the consequences branch in the tree. Notwithstanding, it likewise
of those models are joined into a solitary output. randomizes the separation edge; where a choice tree
typically picks the best split between classes,
Ensembles empower more noteworthy adaptability
ExtraTrees split at a random worth.
by they way one takes care of for a given issue, in
that they empower the information researcher to test Gini file is the expense work used to assess parts
in the dataset. At whatever point we utilize the word
various pieces of an answer and resolve issues
split, it has a place with the hub, so each split has
explicit to subsets of the input information or parts
two significant perspectives; the first is
of the models being used, without totally retuning characteristic and the second is property estimation,
the entiremodel. which will isolate our information into
In this paper, we propose a machine-based twogatherings.
response to the detection of energy theft in a Giniscore can be utilized to know the
perimeter meter. The proposed layout uses a vector debasement of our dataset simply like the datagain
support mechanism to differentiate the talent of the quality. However, here, it works a piece in an
movement by exploiting the consensus profile of unexpected way; Giniscore proposes how well the
customer theft. Examination of the proposed system dataset can be isolated.
exhibition on real power theft data shows a high C. Linear Regression
level of scale and a low level of deception The straight forward Linear Regression Model
compared to related activities. The structure begins can be denoted as follows:
by training random forest segregation in labeled y=β ₀+ β ₁ x +ε
data. Thereafter, data that is not labeled model that I
can describe with great certainty can be
The y indicates the dependent variable.
systematically heard in the order of the sample
samples, which increases the data available for The x indicates the independent variable.
model training. The ₀ indicates the y intercept point.
B. Random Forests The ₁ indicates the slope of the simple linear
An elective arrangement of averaging ensemble regression line.
procedures is alluded to by and large as random
Regression error is the sum by which a
forests. Maybe the best ensemble procedure utilized
perception from its normal worth; the last is based
by serious information researchers, random forests
in general populace from which the factual unit was
create equal arrangements of choice tree classifiers.
picked randomly. The normal worth, the normal of
By presenting two fundamental wellsprings of
the whole populace, is regularly undetectable.
randomness to the classifier development, thewoods
winds up containing different trees. The information D. Multiple Linear Regression
that is utilized to construct each tree is examined Regression methods have become an
with substitution from the preparation set, while the indispensable part of any information examination
tree creation measure no longer uses the best split worried about depicting the connection between a
from all features, rather picking the best split from a reaction variable and at least one illustrative
variables. Frequently the result variable is discrete, begin utilizing Naive Bayesclassifiers.
taking on at least two potential qualities. The F. Support Vector Machine SVM
strategic regression model is the most every now
SVMs target taking care of order issues by
and again utilized regression model for the
discovering great decision limits between two
investigation of these information.
arrangements of focuses having a place with two
π ( x)
g ( x )=ln
(
1 − π (x ) )
= ₀₁ x₁ + ₂x ₂ + … + p x unique classifications. A decision limit can be
considered as a line or surface isolating your
p
preparation information into two spaces comparing
where,for the multiple logistic regression to two classifications. To arrange new information
model focuses, you simply need to check which side of the
decision limit they fallon.
e g (x)
π (x )= g (x) The information is planned to another high-
1+e
dimensional portrayal where the decision limit can
be communicated as a hyperplane.
In the event that a portion of the independent
A decent decision limitis registered by
variables are discrete, ostensible scale variables like
attempting to expand the distance between the
race, sex, treatment gathering, etc, it is unseemly to
hyperplane and the nearest information focuses
remember them for the model as though they were
from each class, a stage called boosting the edge.
span scale variables. The numbers used to address
This
the different levels of these ostensible scale
variables are simply identifiers, and have no
numeric importance. In the present circumstance,
the technique for decision is to utilize an assortment
of plan variables (orshamvariables). Assume, for
instance, that one of the independent variables is
race, which has been coded as "white," "dark," and permits the limit to sum up well to new examples
"other." For this situation, two plan variables outside of the preparation dataset.
arefundamental. G. Time Series Analysis
E. Probabilistic Modeling This is a model of statistical that evaluates a
Probabilistic modelling is the use of the serial set of data points.
standards of measurements to information
investigation. It was perhaps the most punctual type III. LITERATURE SURVEY
of AI, it's still generally used right up 'til today.
In a controlled learning hypothesis, analysis can
Outstanding amongst other known calculations in
this classification is the Naive Bayes calculation. be divided into two categories, training and
Naive Bayes is a kind of Artificial Intelligence foresight. Similarly, to test a model [7], the database
classifier dependent on applying Bayes' hypothesis is separated in two sets, one of which is used for the
while expecting that the highlights in the input training,we consider it as a training set and another
information are generally autonomous . This type of one is for the foreseeing, which is called as a testing
information examination originates before system set [1]. An optional model is gotten in a training set
and was applied by hand a long time before its first
that relies on a set of training for demonstrating
system execution. Bayes' hypothesis and the
objective reliability in factors. In the anticipation
establishments of measurements date back to the
eighteenth century, and these are all you need to step, the prescribed model is used in a pre-set test to
identify objective attributes [14] concerning new have various dissimilar properties, like various
features. By contrasting the anticipated objective directions[3,8], various volumes, overcrowding and
and actual objective in the experiments set by other restrictions.We took data for the initial properties of
measurable methods,it’s feasible to assess forecast 99 as data for training and the final builing dataset
execution of model [2,4,8]. as test setup.The maximum quantity is 28 for
features.The quantity of samples of training is
The goal is the same as being promoted to
358776 and quantity of testing samples[6,8].
another. In addition, test data should be measured
with the same measurement volume [6] in relation The wrapper method provides a basic and
to the training set. Accordingly, it is possible that unbelievable way to deal with the problem of
rated assessment scores could be another way to flexible choice, with little regard for the chosen
achieve that of a training degree [8]. reading machine. Truth be told, the reading machine
can be considered a proper black box and method is
equivalent to use dozens of programs of machine
The size of the training database influences the learning. In it’s most comprehensive system [3],
presentation of the model. In past segment, main folding method consisting of using a given reading
model is trained in some months data(i.e. 5), machine prediction to test [11] the overall
though following model is trained in a year’s worth usefulness of the substrate. Over time, we need to
of data, we see that subsequent forecast is fitting mark: how to look at the space for all possible
more compared to primary expectations [3,9,14]. subset; a method of evaluating the performance of a
However, in the next training scale, test data are learning machine predicting the pursuit of
randomly drawn across the entire database, completion [2]; and which guide to choose. For the
indicating that the test sample quality is very near most part, a complete search can be made, because
to samples of the training. Conversely, in a large the quantity of the material is not very high.
degree the training, as the test and the data of the
Hunting similarly turns out to be uncontrollable by
training data are varied, are very different in
computers [10,12]. As a result, in addressing this
symptoms [5,6].
issue, a large range for search of processes are
The learning measures depend on energy proposed, including the branch, first, best and
utilization of one solitary structure and model binding, which mimic the consolidation and
testing to determine the uncertain future [14] in the calculation of assets. Analysis of their exhibitions is
same structure. Practically speaking, it is very usually done using the permission given or with the
valuable to anticipate how much energy is needed wrong approval. As shown here, well-known
in a totally new structure. Along these lines, in indicators include selected trees, innocent bayes,
subsequent analyzes, we attempted to familiarize precise square indicators and supporting vector
ourselves with a power-based model in which equipment [6,8,11].
structures are installed [4,7,13]. In other words, we
trained the model from the use of a few structures, IV.DETAILS OF PROPOSED
OPERATIONS
at which time we used the model to anticipate the
creation of a completely unexpected structure. In Resampling is a strategy to change over the
this study, 100 structures are recreated in warming time sensitive noticed information into an alternate
season.They are in similar climatic conditions yet stretch. As such, it is utilized to change the time
recurrence into some other time-recurrence design.
variables are influenced by a similar
causativefactor.
Feature selection is the way toward narrowing
down a subset of features, or traits, to be utilized in

Dataset
Preprocessing

Feature Binary Vector Process Class


Generation Space Creation Imbalance

Data
Cleansing
Test DataSet

Classification Model

Predict

A. Feature Selection
Each new boundary presents another The prescient modeling measure. Feature selection
measurement that makes the modeled relationship
is valuable on an assortment of fronts. It is the best
more perplexing and the resultant model bound to
weapon against the scourge of dimensionality. Itcan
be overfitting the information that exists. There are
two sorts of multicollinearity: underlying and lessen by and large preparing times, and it is a
information based. Underlying multicollinearity ground-breaking guard against overfitting,
happens when the formation of new features, for expanding model speculation.
example, feature f1 from feature f, makes various
V. EXPERIMENT RESULTS
features that might be profoundly corresponded
with each other. Information based The prediction probabilities is shown in the
multicollinearity will in general happen when two below table.
This examination applies random forest in the
forecast of the energy utilization of buildings.We
exhibit presentation model of this in broad trials,
addressing different circumstances, like
single/numerous structures, power/locale warming
utilizations, little/huge sets of training and far
away/close of the testing and training profiles.
Random forest show a very high speculation
capacity and strength in these kinds of tests.
Declarations
Funding:
All sources of funding for the research work and
their role in the design of the study and collection,
analysis, interpretation of data, and in writing the
manuscript should be declared.
Conflict of Interest:
The authors declare that they have no conflict of
The receiver operating characteristic (ROC)
interest. The manuscript was written through
curve is the machine learning metrics which is
contributions of all authors. All authors have given
nothing but a curve which is capable of plotting the
approval to the final version of the manuscript.
TP true positive rate vs FP (FPR) false positive
Availability of data and material: Not
rate. Note that specificity is also known as TNR
Applicable.
(true negative rate). The ROC curve is shown in
below graph: VII. REFERENCES
[1] H. Wang et al., "Optimization of Clustering
VI.CONCLUSION Analysis of Residential Electricity
We examined their standards and applications. Consumption Behavior," 2019 14th IEEE
The two of them have various variations, from Conference on Industrial Electronics and
basic model to highly complicated model of Applications (ICIEA), Xi'an, China, 2019, pp.
significant model levels, and shows the high 418-423, doi: 10.1109/ICIEA.2019
capacity to take care of direct and non linear issues.
[2] M. N. Iqbal, L. Kütt and A. Rosin,
"Complexities associated with modeling of
residential electricity consumption," 2018
IEEE 59th International Scientific Conference
on Power and Electrical Engineering of Riga
Technical University (RTUCON), Riga,
Latvia, 2018, pp. 1-6, doi:
10.1109/RTUCON.2018
[3] X. M. Zhang, K. Grolinger, M. A. M. 2014.
Capretz and L. Seewald, "Forecasting [9] P. Glauner, A. Boechat, L. Dolberg, R.
Residential Energy Consumption: Single State, F.
Bettinger,Y.Rangoni,andD.Duarte,“Large-
Household Perspective," 2018 17th IEEE scale detection of non-technical losses in
International Conference on Machine imbalanced data sets,” in Innovative Smart
Learning and Applications (ICMLA), Grid Technologies Conference (ISGT),
2016 IEEE Power & Energy Society.
Orlando, FL, 2018, pp. 110-117, doi: IEEE, 2016, pp.1–5.
10.1109/ICMLA.2018 [10] P. Glauner, J. Meira, P. Valtchev, R. State,
and F. Bettinger, “The challenge of non-
[4] Y. Yu, B. Wang, Z. Wang, F. Wang and L. technical loss detection using artificial
Liu, "Wrapper feature selection based intelligence: A survey,”
multiple logistic regression model for InternationalJournalofComputationalIntelli
gence Systems 10.1 (2017): 760-775.,2017.
determinants analysis of residential
[11] G. M. Messinis and N. D. Hatziargyriou,
electricity consumption," 2017 Asian “Review of non-technical loss detection
Conference on Energy, Power and methods,” Electric Power Systems
Transportation Electrification (ACEPT), Research, vol. 158, pp. 250– 266, 2018.
[12] R. D. Trevizan, A. S. Bretas, and A.
Singapore, 2017, pp. 1-8, doi:
Rossoni. Nontechnical losses detection: A
10.1109/ACEPT.2017 discrete cosine transform and optimum-
[5] C. C. O. Ramos et al. (2012) “New path forest based approach. In North
Insights on Nontechnical Losses American Power Symposium (NAPS),
Characterization Through Evolutionary- 2015, pages 1–6, Oct 2015
Based Feature Selection”, IEEE [13] J. V. Spiric, M. B. Doi, and S. S. Stankovi.
transactions on Power Delivery, Vol. 27, Fraud detection in registered ´ electricity
N.1, Jan 2012. time series. International Journal of
Electrical Power & Energy Systems, 71:42
[6] J. P. Kosut, F. Santomauro, A. Jorysz, A.
– 50, 2015.
Fern´andez, F. Lecumberry, and F. Rodr [14] J. V. Spiric, S. S. Stankovi ´ c, M. B. Do ´
´ıguez, “Abnormal consumption analysis for ciˇ c, and T. D. Popovi ´ c. Using ´ the
fraud detection: Uteudelar joint efforts,” in rough set theory to detect fraud committed
by electricity customers. International
Innovative Smart Grid Technologies Latin Journal of Electrical Power & Energy
America (ISGT LATAM), 2015 IEEE PES. Systems, 62:727 – 734, 2014.
IEEE, 2015, pp. 887– 892. [15] S. S. S. R. Depuru, L. Wang, V.
Devabhaktuni, and R. C. Green, “High
[7] A. Cardenas, S. Amin, G. Schwartz, R. performance computing for detection of
Dong, and S. Sastry. A game ´ theory electricity theft,” International Journal of
model for electricity theft detection and Electrical Power & Energy Systems, vol.
privacy-aware control in ami systems. In 47, pp. 21–30, 2013.
Communication, Control, and Computing [16] C. O. Ramos, A. N. de Souza, A. X.
(Allerton), 2012 50th Annual Allerton Falcao, and J. P. Papa. New insights on
Conference on, pages 1830–1837, Oct nontechnical losses characterization
2012. through evolutionary based feature
[8] J. I. Guerrero, C. Leon, I. Monedero, F. selection. IEEE Transactions on Power
Biscarri, and J. Biscarri. Improv- ´ ing Delivery, 27(1):140–146, Jan 2012.
knowledge-based systems with statistical [17] J. Nagi, K. S. Yap, S. K. Tiong, S. K.
techniques, text mining, and neural Ahmed, and F. Nagi, “Improving
networks for non-technical loss detection. svmbased nontechnical loss detection in
Knowledge-Based Systems, 71:376 – 388,
power utility using the fuzzy inference
system,” IEEE Transactions on power
delivery, vol. 26, no. 2, pp. 1284– 1285,
2011.

You might also like