Detection of electricity theft using data processing and LSTM method in distribution systems

被引:23
作者
Kocaman, Behcet [1 ]
Tumen, Vedat [2 ]
机构
[1] Bitlis Eren Univ, Dept Elect & Elect Engn, Bitlis, Turkey
[2] Bitlis Eren Univ, Dept Comp Engn, Bitlis, Turkey
来源
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES | 2020年 / 45卷 / 01期
关键词
Electricity theft; non‐ technical loss; long short term memory; ENERGY THEFT; FRAMEWORK;
D O I
10.1007/s12046-020-01512-0
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Electricity theft is a big problem faced by all energy distribution services and continues to rising. Therefore, studies on electricity theft detection techniques have increased in recent years. Unsuitable calibration and illegal calibration of energy meters during production may cause non-technical losses. Non-technical losses have been a major concern for the resulting security risks and the immeasurable loss of income. In most of the meter tampered locations, damaged meter terminals and/or illegal applications cannot be distinguishable during checking. In fact, electric distribution companies will never be able to eliminate electricity theft. But it is possible to take measure to detect, prevent and reduce it. In this paper, we developed by using deep learning methods on real daily electricity consumption data (Electricity consumption dataset of State Grid Corporation of China). Data reduction has been made by developing a new method to make the dataset more usable and to extract meaningful results. A Long Short-Term Memory (LSTM) based deep learning method has been developed for the dataset to be able to recognize the actual daily electricity consumption data of 2016. In order to evaluate the performance of the proposed method, the accuracy, prediction and recall metric was used by considering the five cross-fold technique. Performance of the proposed methods were found to be better than previously reported results.
引用
收藏
页数:10
相关论文
共 25 条
[1]   LSTM and Bat-Based RUSBoost Approach for Electricity Theft Detection [J].
Adil, Muhammad ;
Javaid, Nadeem ;
Qasim, Umar ;
Ullah, Ibrar ;
Shafiq, Muhammad ;
Choi, Jin-Ghoo .
APPLIED SCIENCES-BASEL, 2020, 10 (12)
[2]  
[Anonymous], 2016, 2016 IEEE POW EN
[3]  
[Anonymous], 2019, KAYIP KACAK DURUMU
[4]  
Bhattacharyya S. C., 2005, Utilities Policy, V13, P260, DOI 10.1016/j.jup.2004.08.001
[5]  
Costa B.C., 2013, International Journal of Artificial Intelligence & Applications, V4, P17, DOI DOI 10.5121/IJAIA.2013.4602
[6]   Detection and identification of energy theft in advanced metering infrastructures [J].
de Souza, Matheus Alberto ;
Pereira, Jose L. R. ;
Alves, Guilherme de O. ;
de Oliveira, Braulio C. ;
Melo, Igor D. ;
Garcia, Paulo A. N. .
ELECTRIC POWER SYSTEMS RESEARCH, 2020, 182
[7]   High performance computing for detection of electricity theft [J].
Depuru, Soma Shekara Sreenadh Reddy ;
Wang, Lingfeng ;
Devabhaktuni, Vijay ;
Green, Robert C. .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2013, 47 :21-30
[8]  
Depuru SSSR., 2011, POWER SYSTEMS C EXPO, P1
[9]   The determinants of electricity theft: An empirical analysis of Indian states [J].
Gaur, Vasundhara ;
Gupta, Eshita .
ENERGY POLICY, 2016, 93 :127-136
[10]   Learning precise timing with LSTM recurrent networks [J].
Gers, FA ;
Schraudolph, NN ;
Schmidhuber, J .
JOURNAL OF MACHINE LEARNING RESEARCH, 2003, 3 (01) :115-143