Improving Performance of the Convolutional Neural Networks for Electricity Theft Detection by using Cheetah Optimization Algorithm

سال انتشار: 1401
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 204

فایل این مقاله در 13 صفحه با فرمت PDF قابل دریافت می باشد

این مقاله در بخشهای موضوعی زیر دسته بندی شده است:

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_MJEE-16-4_008

تاریخ نمایه سازی: 25 بهمن 1401

چکیده مقاله:

Today, electricity theft is one of the main challenges for energy distribution and transmission companies around the world. Early detection of abnormal consumers can prevent security and financial losses. Extensive research studies have been done to detect electricity theft by analyzing customer consumption patterns. Today, one of the most widely used methods is convolutional neural networks (CNNs). These networks contain a large number of hyper-parameters.  The accuracy of these networks is low in most studies due to the lack of attention to the adjustment of these hyper-parameters.  Network accuracy and achieving a robust learning model are influenced by the optimal adjusting of these hyper-parameters, which requires exploring a complex and large search space. Meta-heuristic-based search methods are suitable for solving these problems. Therefore, the main contribution of this paper is to use the high ability of the cheetah optimization algorithm (CHOA) to optimally extract CNN hyper-parameters. In this paper, in order to balance the dataset, abnormal samples are created using artificial attacks and added to the dataset. Also, in order to increase the accuracy of the network, abnormal data are clustered using the CHOA algorithm. ISSDA dataset is used to test and evaluate the results. Based on the results obtained and comparing them with the other works, it was proved that the proposed framework with high accuracy identifies abnormal consumers.

کلیدواژه ها:

Data mining ، Classification ، Electricity Theft Detection ، convolutional neural network (CNN)

نویسندگان

hassan ghaedi

Department of Computer, Neyshabur Branch, Islamic Azad University, Neyshabur, Iran

Seyed Reza Kamel Tabbakh

Department of Computer, Mashhad Branch, Islamic Azad University, Mashhad, Iran

reza ghaemi

Department of Computer, Quchan Branch, Islamic Azad University, Quchan, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Jokar, N. Arianpoo, and V. C. M. Leung, “Electricity theft ...
  • Ghaedi, S. R. K. Tabbakh, and R. Ghaemi, “Improving Electricity ...
  • Askarzadeh, “A novel metaheuristic method for solving constrained engineering optimization ...
  • Razavi, A. Gharipour, M. Fleury, and I. J. Akpan, “A ...
  • Feng, J. Huang, W. H. Tang, and M. Shahidehpour, “Data ...
  • Ghaedi, S. R. Kamel Tabbakh Farizani, and R. Gaemi, “A ...
  • Ullah, N. Javaid, A. S. Yahaya, T. Sultana, F. A. ...
  • M. Ibrahim, S. T. F. Al-Janabi, and B. Al-Khateeb, “Electricity-theft ...
  • Nazmul Hasan, R. N. Toma, A. Al Nahid, M. M. ...
  • Li, Y. Han, X. Yao, S. Yingchen, J. Wang, and ...
  • Kocaman and V. Tümen, “Detection of electricity theft using data ...
  • M. Rouzbahani, H. Karimipour, and L. Lei, “An Ensemble Deep ...
  • Zheng, Y. Yang, X. Niu, H. N. Dai, and Y. ...
  • Chandel and T. Thakur, “Smart Meter Data Analysis for Electricity ...
  • Feng et al., “A novel electricity theft detection scheme based ...
  • Maamar and K. Benahmed, “A Hybrid Model for Anomalies Detection ...
  • Fouad, M. Alfonse, M. Roushdy, and A. B. M. Salem, ...
  • Bacanin, T. Bezdan, E. Tuba, I. Strumberger, and M. Tuba, ...
  • Brodzicki, M. Piekarski, and J. Jaworek-Korjakowska, “The whale optimization algorithm ...
  • Han, A. Tan, and J. Zhong, “Application of Particle Swarm ...
  • H. Kim, Z. W. Geem, and G. T. Han, “Hyperparameter ...
  • Serizawa and H. Fujita, “Optimization of Convolutional Neural Network Using ...
  • Li et al., “Genetic Algorithm based hyper-parameters optimization for transfer ...
  • C. Yeh, Y.-P. Lin, Y.-C. Liang, C.-M. Lai, and X.-Z. ...
  • Zhou, “Heuristic Hyperparameter Optimization for Convolutional Neural Networks using Genetic ...
  • Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale ...
  • [X. Kan et al., “A novel PSO-based optimized lightweight convolution ...
  • Johnson, A. Valderrama, C. Valle, B. Crawford, R. Soto, and ...
  • M. Aszemi and P. D. D. Dominic, “Hyperparameter optimization in ...
  • Yamashita, M. Nishio, R. K. G. Do, and K. Togashi, ...
  • Khan, H. Rahmani, S. A. A. Shah, M. Bennamoun, G. ...
  • Raitoharju, “Chapter ۳ - Convolutional neural networks,” A. Iosifidis and ...
  • H. Lopez Pinaya, S. Vieira, R. Garcia-Dias, and A. Mechelli, ...
  • Tian, “Artificial Intelligence Image Recognition Method Based on Convolutional Neural ...
  • Kotu and B. Deshpande, “Chapter ۱۰ - Deep Learning,” V. ...
  • “Irish Social Science Data Archive,” ۲۰۱۲. https://www.ucd.ie/issda/data/commissionforenergyregulationcer/ ...
  • Das, A. Abraham, and A. Konar, “Automatic clustering using an ...
  • L. Davies and D. W. Bouldin, “A Cluster Separation Measure,” ...
  • نمایش کامل مراجع