Electric Power Scam Prediction Using Machine Learning Techniques
Electric Power Scam Prediction Using Machine Learning Techniques
Learning Techniques
Aditya Kumar Mishra Mahendra Vishnoi
Computer Science and Computer Science and
Engineering Engineering
SRM Institute of Science and SRM Institute of Science and
Technology, Technology,
Kattankulathur, Kattankulathur,
Chengalpattu, Chengalpattu,
Tamil Nadu, India Tamil Nadu, India
[email protected] [email protected]
Dataset
Preprocessing
Data
Cleansing
Test DataSet
Classification Model
Predict
A. Feature Selection
Each new boundary presents another The prescient modeling measure. Feature selection
measurement that makes the modeled relationship
is valuable on an assortment of fronts. It is the best
more perplexing and the resultant model bound to
weapon against the scourge of dimensionality. Itcan
be overfitting the information that exists. There are
two sorts of multicollinearity: underlying and lessen by and large preparing times, and it is a
information based. Underlying multicollinearity ground-breaking guard against overfitting,
happens when the formation of new features, for expanding model speculation.
example, feature f1 from feature f, makes various
V. EXPERIMENT RESULTS
features that might be profoundly corresponded
with each other. Information based The prediction probabilities is shown in the
multicollinearity will in general happen when two below table.
This examination applies random forest in the
forecast of the energy utilization of buildings.We
exhibit presentation model of this in broad trials,
addressing different circumstances, like
single/numerous structures, power/locale warming
utilizations, little/huge sets of training and far
away/close of the testing and training profiles.
Random forest show a very high speculation
capacity and strength in these kinds of tests.
Declarations
Funding:
All sources of funding for the research work and
their role in the design of the study and collection,
analysis, interpretation of data, and in writing the
manuscript should be declared.
Conflict of Interest:
The authors declare that they have no conflict of
The receiver operating characteristic (ROC)
interest. The manuscript was written through
curve is the machine learning metrics which is
contributions of all authors. All authors have given
nothing but a curve which is capable of plotting the
approval to the final version of the manuscript.
TP true positive rate vs FP (FPR) false positive
Availability of data and material: Not
rate. Note that specificity is also known as TNR
Applicable.
(true negative rate). The ROC curve is shown in
below graph: VII. REFERENCES
[1] H. Wang et al., "Optimization of Clustering
VI.CONCLUSION Analysis of Residential Electricity
We examined their standards and applications. Consumption Behavior," 2019 14th IEEE
The two of them have various variations, from Conference on Industrial Electronics and
basic model to highly complicated model of Applications (ICIEA), Xi'an, China, 2019, pp.
significant model levels, and shows the high 418-423, doi: 10.1109/ICIEA.2019
capacity to take care of direct and non linear issues.
[2] M. N. Iqbal, L. Kütt and A. Rosin,
"Complexities associated with modeling of
residential electricity consumption," 2018
IEEE 59th International Scientific Conference
on Power and Electrical Engineering of Riga
Technical University (RTUCON), Riga,
Latvia, 2018, pp. 1-6, doi:
10.1109/RTUCON.2018
[3] X. M. Zhang, K. Grolinger, M. A. M. 2014.
Capretz and L. Seewald, "Forecasting [9] P. Glauner, A. Boechat, L. Dolberg, R.
Residential Energy Consumption: Single State, F.
Bettinger,Y.Rangoni,andD.Duarte,“Large-
Household Perspective," 2018 17th IEEE scale detection of non-technical losses in
International Conference on Machine imbalanced data sets,” in Innovative Smart
Learning and Applications (ICMLA), Grid Technologies Conference (ISGT),
2016 IEEE Power & Energy Society.
Orlando, FL, 2018, pp. 110-117, doi: IEEE, 2016, pp.1–5.
10.1109/ICMLA.2018 [10] P. Glauner, J. Meira, P. Valtchev, R. State,
and F. Bettinger, “The challenge of non-
[4] Y. Yu, B. Wang, Z. Wang, F. Wang and L. technical loss detection using artificial
Liu, "Wrapper feature selection based intelligence: A survey,”
multiple logistic regression model for InternationalJournalofComputationalIntelli
gence Systems 10.1 (2017): 760-775.,2017.
determinants analysis of residential
[11] G. M. Messinis and N. D. Hatziargyriou,
electricity consumption," 2017 Asian “Review of non-technical loss detection
Conference on Energy, Power and methods,” Electric Power Systems
Transportation Electrification (ACEPT), Research, vol. 158, pp. 250– 266, 2018.
[12] R. D. Trevizan, A. S. Bretas, and A.
Singapore, 2017, pp. 1-8, doi:
Rossoni. Nontechnical losses detection: A
10.1109/ACEPT.2017 discrete cosine transform and optimum-
[5] C. C. O. Ramos et al. (2012) “New path forest based approach. In North
Insights on Nontechnical Losses American Power Symposium (NAPS),
Characterization Through Evolutionary- 2015, pages 1–6, Oct 2015
Based Feature Selection”, IEEE [13] J. V. Spiric, M. B. Doi, and S. S. Stankovi.
transactions on Power Delivery, Vol. 27, Fraud detection in registered ´ electricity
N.1, Jan 2012. time series. International Journal of
Electrical Power & Energy Systems, 71:42
[6] J. P. Kosut, F. Santomauro, A. Jorysz, A.
– 50, 2015.
Fern´andez, F. Lecumberry, and F. Rodr [14] J. V. Spiric, S. S. Stankovi ´ c, M. B. Do ´
´ıguez, “Abnormal consumption analysis for ciˇ c, and T. D. Popovi ´ c. Using ´ the
fraud detection: Uteudelar joint efforts,” in rough set theory to detect fraud committed
by electricity customers. International
Innovative Smart Grid Technologies Latin Journal of Electrical Power & Energy
America (ISGT LATAM), 2015 IEEE PES. Systems, 62:727 – 734, 2014.
IEEE, 2015, pp. 887– 892. [15] S. S. S. R. Depuru, L. Wang, V.
Devabhaktuni, and R. C. Green, “High
[7] A. Cardenas, S. Amin, G. Schwartz, R. performance computing for detection of
Dong, and S. Sastry. A game ´ theory electricity theft,” International Journal of
model for electricity theft detection and Electrical Power & Energy Systems, vol.
privacy-aware control in ami systems. In 47, pp. 21–30, 2013.
Communication, Control, and Computing [16] C. O. Ramos, A. N. de Souza, A. X.
(Allerton), 2012 50th Annual Allerton Falcao, and J. P. Papa. New insights on
Conference on, pages 1830–1837, Oct nontechnical losses characterization
2012. through evolutionary based feature
[8] J. I. Guerrero, C. Leon, I. Monedero, F. selection. IEEE Transactions on Power
Biscarri, and J. Biscarri. Improv- ´ ing Delivery, 27(1):140–146, Jan 2012.
knowledge-based systems with statistical [17] J. Nagi, K. S. Yap, S. K. Tiong, S. K.
techniques, text mining, and neural Ahmed, and F. Nagi, “Improving
networks for non-technical loss detection. svmbased nontechnical loss detection in
Knowledge-Based Systems, 71:376 – 388,
power utility using the fuzzy inference
system,” IEEE Transactions on power
delivery, vol. 26, no. 2, pp. 1284– 1285,
2011.