A novel unsupervised feature-based approach for electricity theft detection using robustPCAand outlier removal clustering algorithm

被引:15
作者
Hussain, Saddam [1 ]
Mustafa, Mohd Wazir [1 ]
Jumani, Touqeer Ahmed [1 ,2 ]
Baloch, Shadi Khan [3 ]
Saeed, Muhammad Salman [1 ,4 ]
机构
[1] Univ Technol Malaysia, Sch Elect Engn, Skudai, Malaysia
[2] Mehran Univ Engn & Technol, Dept Elect Engn, Khairpur, Pakistan
[3] Mehran Univ Engn & Technol, Dept Mechatron Engn, Jamshoro, Pakistan
[4] Multan Elect Power Co MEPCO, Multan, Pakistan
关键词
electrical power theft; non-technical losses; outlier removal clustering; robust PCA algorithm; unsupervised machine learning; ENERGY THEFT; CLASSIFICATION; CONSUMERS; PCA;
D O I
10.1002/2050-7038.12572
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a novel data-oriented unsupervised machine learning-based theft detection approach for efficiently identifying the fraudster consumers. It accomplishes the above-mentioned objective by exploiting the intelligence of the robust principal component analysis (ROBPCA) algorithm in conjunction with the outlier removal clustering (ORC) algorithm. To avoid the irregularities in acquired consumers' data from a power utility, the statistical features are extracted from each consumer's consumption patterns using an anomalous time series extension. Based on the extracted features, the consumers with most similar features are initially grouped into two categories using the ROBPCA algorithm. In order to evade any overlapping between the two newly formed groups, the ORC algorithm is utilized to categorize the consumers distinctly as "suspicious" and "non-suspicious". Finally, a very selective onsite inspection is proposed, thus, saving the considerable time, resources, and overall cost of the utilities. The effectiveness of the proposed theft detection method is validated by comparing its performance with nine most widely used outlier detection methods on the basis of seven of the most prominent performance metrics. The accuracy and detection rate of the proposed technique are found as 94.34% and 92.52%, respectively, which is significantly higher than that of other studied conventional methods.
引用
收藏
页数:18
相关论文
共 30 条
[1]  
Ahmad F. J., 2013, INT C EN REG INT SOC
[2]  
[Anonymous], 2019, ELECTRONICS-SWITZ, DOI DOI 10.3390/electronics8080860
[3]  
Dike D.O., 2015, American Journal of Engineering Research (AJER), V4, P59
[4]  
Dineshkumar K, 2015, 2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015)
[5]   Detection and Identification of Abnormalities in Customer Consumptions in Power Distribution Systems [J].
dos Angelos, Eduardo Werley S. ;
Saavedra, Osvaldo R. ;
Carmona Cortes, Omar A. ;
de Souza, Andre Nunes .
IEEE TRANSACTIONS ON POWER DELIVERY, 2011, 26 (04) :2436-2442
[6]   Robustness of Chi-square and Canberra distance metrics for computer intrusion detection [J].
Emran, SM ;
Ye, N .
QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2002, 18 (01) :19-28
[7]   Conditional abnormality detection based on AMI data mining [J].
Han, Seon Yeong ;
No, JaeGoo ;
Shin, Jin-Ho ;
Joo, YongJae .
IET GENERATION TRANSMISSION & DISTRIBUTION, 2016, 10 (12) :3010-3016
[8]  
Hautamäki V, 2005, LECT NOTES COMPUT SC, V3540, P978
[9]  
Hossin M., 2015, INT J DATA MIN KNOWL, V5, P1, DOI DOI 10.5121/IJDKP.2015.5201
[10]   ROBPCA: A new approach to robust principal component analysis [J].
Hubert, M ;
Rousseeuw, PJ ;
Vanden Branden, K .
TECHNOMETRICS, 2005, 47 (01) :64-79