access icon free Conditional abnormality detection based on AMI data mining

As advanced metering infrastructure (AMI) is deployed, the AMI data is used to detect an energy fraud. Along with context analysis of AMI data such as detection of an unreasonably low consumption AMI data mining is a primary solution for detecting abnormalities that cannot be detected using simple context analysis. Traditionally, abnormality detection based on AMI data mining compares a load profile with predefined normal prototypes. However, since a load profile can be normal in one condition and abnormal in another, the condition associated with the load profile should be considered as determining the normality. However, existing methods do not connect the normality of a prototype and a specific condition. In this study, the authors propose a mechanism that incorporates the conditional probability into determination of the normality of the prototype for comparison. The novelty of their study is its generating a two-dimensional space using similarity and conditional probability, so that several multi-dimensional classification methods can be applied. They compare the proposed mechanism with best-fit and average prototype-based abnormality detection methods. In conclusion, the proposed mechanism can distinguish fraud data with a higher precision than the traditional methods. They also explore the accuracy of the mechanism with various parameters.

Inspec keywords: power meters; power engineering computing; data mining; pattern classification; probability

Other keywords: abnormal energy consumption detection; load profile; similarity probability; AMI data mining; conditional abnormality detection; conditional probability; prototype normality determination; multidimensional classification methods; 2D space generation; advanced metering infrastructure

Subjects: Other topics in statistics; Data handling techniques; Knowledge engineering techniques; Power system measurement and metering; Power engineering computing; Other topics in statistics

References

    1. 1)
      • 15. Han, J., Kamber, M.: ‘Data mining: concepts and techniques’ (Morgan Klishers, Waltham, MA, USA, 2001), pp. 299302.
    2. 2)
      • 9. Nizar, A.H., Dong, Z.Y., Jalaluddin, M., et al: ‘Load profiling method in detecting non-technical loss activities in a power utility’. Power and Energy Conf., 2006. PECon ‘06. IEEE Int., November 2006, pp. 8287, 2829.
    3. 3)
      • 2. Dangar, B., Joshi, S.K.: ‘Electricity theft detection techniques for metered power consumer in GUVNL, GUJARAT, INDIA’. Power Systems Conf. (PSC), 2015 Clemson University, March 2015, pp. 16, 1013.
    4. 4)
      • 11. Schliep, K., Hechenbichler, K.: ‘Package KKNN’. Available at http://www.cran.r-project.org/web/packages/kknn/kknn.pdf.
    5. 5)
    6. 6)
      • 5. Gerbec, G., Gašperič, S., Šmon, I., et al: ‘An approach to customers daily load profile determination’. Power Engineering Society Summer Meeting, IEEE, July 2002, vol. 1, pp. 587591.
    7. 7)
    8. 8)
      • 12. Meyer, D.: ‘Support vector machines: the interface to LIBSVM in package e1071’. Available at http://www.cran.r-project.org/web/packages/e1071/ vignettes/svmdoc.pdf.
    9. 9)
    10. 10)
      • 3. Babu, T.V., Murthy, T.S., Sivaiah, B.: ‘Detecting unusual customer consumption profiles in power distribution systems – APSPDCL’. 2013 IEEE Int. Conf. on Computational Intelligence and Computing Research (ICCIC), December 2013, pp. 15, 2628.
    11. 11)
      • 8. Depuru, S.S.S.R., Wangn, L., Devabhaktuni, V., et al: ‘A hybrid neural network model and encoding technique for enhanced classification of energy consumption data’. Power and Energy Society Green Meeting, IEEE, July 2011, pp. 18.
    12. 12)
    13. 13)
      • 10. Everitt, B.S., Hothorn, T.: ‘A handbook of statistical analyses using R’ (Chapman & Hall/CRC, London, UK, 2013). Available at https://www.cran.r-project.org/web/packages/HSAUR/vignettes/.
    14. 14)
    15. 15)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-gtd.2016.0048
Loading

Related content

content/journals/10.1049/iet-gtd.2016.0048
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading