SlideShare a Scribd company logo
1 of 29
Dr.D.Y.Patil Institute of Technology Pimpri,Pune-411018
Department of Computer Engineering
2019-2020
PROJECT REPORT ON
Electricity Theft Detection using Machine
Learning Algorithm
Submitted by :
BCOB23 Anwar Patel
BCOB24 Onkar Yadav
BCOB25 Ankush Maratkar
BCOB26 Nilesh Maher
Project Guide:
Prof. Rajesh Bharati
Contents
 Abstract
 Introduction
 Motivation
 Existing System
 Mathematical Model
 Advantage and Disadvantage
 Proposed System
 Goals and Objective
 System Architecture & Explanation
 Literature Review
 Hardware requirement and Software requirement
 Conclusion
 References
Abstract
Electricity theft is one of the major problems of electric utilities .Such
electricity theft produces financial loss to the utility companies. It is not
possible to inspect manually such theft in large amount of data. For
detecting such electricity theft introduces OCR(Optical Character
Recognition) algorithm which covert the any image to text data and we
also use some mathematical formulas . In this we apply preprocessing on
meter data then do feature selection. It detects theft using anomaly
behavior of user. Electricity Data of different society and commercial
users is given to find the thefts.
Introduction
 Many electric utilities have financial loss due to electricity theft. Here are
various types of electrical power theft, including Tapping a line or
bypassing the energy meter.
 According to a study 80% of worldwide theft occurs in private dwellings
and 20% on commercial and industrial premises. If we try to detect the theft
manually then it’s not possible as large amount of data will be there.
 To improve the accuracy of input data we are using Google-OCR image
processing algorithm. Image processing includes images of meter, in short
we are using meter images to get the exact reading of user.
 We implement a supervised ML-based theft detection model that identifies
whether an abnormal/fraudulent usage pattern has occurred in the meter.
 Here we use s meter image data to detect the theft. Using electricity
consumption data we detect theft from available all societies. Here we used
the ensemble technique that is boosting which required less time and gives
more accuracy.
Motivation
 Many electric utilities have financial loss due to electricity theft .The
theft is detected from the dataset using user ID or meter unit image
which is converted into text file using Google-OCR. To recover the loss
of electricity utilities.
 Here are various types of electrical power theft , including Tapping a
line or bypassing the energy meter .
 Honest consumers , poor people and those without connections , who
bear the burden of high tariffs, system inefficiencies ,and inadequate
and unreliable power supply.
Existing System
 In existing system utilities have to send their employee to check the
smart meter of Society and Commercial Industries users.
 When employee goes to check the meter and that time if he get any
users meter is off then only they get the theft otherwise peoples are
doing the electricity theft .
 To minimize the electricity theft we developing a project and
overcoming the existing system problems.
Mathematical Model
 Mathematical model
 Let S be the Whole system which consists:
 S= {Dataset }.
 Where,
 Meter data is the input of the system.
 OP is the output is as Fraud and trustworthy in our system.
Input:
 IP={ I }
 Where, I is set of dataset provided as an input.
Procedure:
 Step1:- Dataset with user id, meter image.
 Step2:- Convert the meter image to text data.
 Step3:- We propose preprocessing with given data.
 Step4:- Use Average calculation formula for finding average meter
reading of twelve month the user
 Step5:- As per comparison show result.
Output:
Getting the theft available or not in dataset as output result.
Advantage
 We detect electricity theft to avoid financial loss of electric utilities.
 It improve the analysis and prediction accuracy.
 Google-OCR Algorithm used for meter image processing.
 Reducing manpower and Increasing automation system.
 Reduce Time Complexity for detecting the theft.
Disadvantage
 Applicable for large data.
 As machine learning project comes accuracy factor comes there is no
100% accuracy.
 Data must contain variations.
Proposed System
• The Highest electricity theft done by India $16.2 billion in this world.
Second highest electricity theft doing in Brazil $10.5 billion.
• In India maximum theft is happening in Maharashtra which include in
Mumbai alone $2.8 billion.
• In this proposed system we use dataset having electricity usage of a
Smart meter and industrial meter usage.
• Using this dataset we does feature selection and preprocessing on
dataset. As we use feature selection it gives us more accuracy.
• Then we perform the preprocessing on that data. After that we use
Google-OCR algorithm over other ML algorithms detect the theft.
Goal and Objective
 The main goal of this project is to detect electricity theft.
 Power theft is one of the most prevalent issues which not only cause
economic losses but also irregular supply of electricity utilities.
 To reduce the electricity theft in the society and commercial industries.
This project is increase the data accuracy using Machine Learning and
Automation System.
System Architecture
Image Processing Architecture:
Use Case Diagram
Activity Diagram
E-R Diagram
Literature Review
Sr.N
o
Authors Name Title of the
Paper
Advantage Advantage we used
in our project
1 Jeyaranjani J,
Devaraj D D
Machine
Learning
Algorithm for
Efficient Power
Theft
Detection.
The trustworthiness of
customers is verified and is
selected for theft program.
This analysis is carried out
by tweaking the actual Smart
Meter data to create
fraudulent data.
Use neural network
which gives high
accuracy.
2 P. Jokar, N.
Arianpoo, and
V. C. M. Leung
Electricity theft
detection in AMI
using customers’
consumption
patterns..
we present a novel
consumption pattern-based
energy theft detector, which
leverages the predictability
property of customers'
normal and malicious
consumption patterns.
Application of
appropriate
classification and
clustering
techniques, as well
as concurrent use of
transformer meters
and anomaly
detectors.
Sr.N
o.
Author’s Name Title of the Paper Advantage Advantage we used
in our project
3 Buzau, J.
Aguilera, P.
Romero, and
A. Exposito
Detection of Non-
Technical Losses
Using Smart Meter
Data and Supervised
Learning.
It can obtain an in-
depth analysis of the
customer's
consumption behavior
It can obtain an in-
depth analysis of the
customer's
consumption
behavior.
Explanation
Image preprocessing:- Google-OCR.
Average Calculation:-Mathematical Formulas.
Dataset:- Detecting theft using meter reading images.
What is OCR ?
 Machine replication of human functions, like reading, is an ancient
dream. However, over the last five decades, machine reading has grown
from a dream to reality.
 Optical character recognition has become one of the most successful
applications of technology in the field of pattern recognition and
artificial intelligence.
Baseline Fitting: -
 In the event that the contents lines found at that point baselines are
absolutely fitted utilizing quadratic spline. That’s nothing but another to
begin with for an OCR framework and empowered Tesseract to handle
pages with bended baselines which are a common antique in scanning.
 The baselines are fitted by dividing the blobs into sensible and
continuous displacement of the first straight baseline. A quadratic spline
is fitted to the foremost crowded segment by a slightest squares fit.
More conventional cubic spline might work better. Speaks to an
illustration of a line of content with a fitted pattern, slid line too cruel
line and ascender line.
 All these lines are parallel and somewhat bended. The ascender line is
light dark and the dark line lover it in straight organize. The near
assessment appears that the cyan line is bended to the straight dark line.
Line Finding:-
 Tesseract is an open source OCR engine is created by HP in 1994. The
line finding calculation is one of step of Tesseract that has been
distributed. The line finding algorithm is utilized for a skewed page that
can be recognized without having de-skewed, consequently by sparing
misfortune of picture quality. The key parts of the line finding are blob
sifting and line construction.
 On suspicion of examination of content locales and straightforward
percentile tallness channel expels drop cap and vertically touch the
character, the middle stature approximate the measure of content within
the locale subsequently it is secure to channel the blobs which are littler
than the division being most accentuation, clamor and diacritical marks.
 The sifted blobs fit the show of non-overlapping, parallel and inclining
lines. Sorting and preparing of the blobs by x-coordinate allocates the
blob to a one of a kind content line and track that incline over the page.
Once the sifted blobs are doled out to lines a slightest middle of squares
fit and it is utilized to assess.
Fixed Pitch Detection and Chopping:-
 Tesseract tests the content lines and decides whether they are settled
pitch or not. It finds settle pitch and after that Tesseract chops the words
into characters by utilizing the debilitates and pitch. i.e. for the word
acknowledgment step.
Proportional Word Finding:-
 The non-fixed pitch (relatives content dividing) is exceedingly non-trivial
errand. The crevice between the tens and units inexact Twelve percent is
comparable estimate to the common space and it is certainly bigger than
the kerned space between garbage and aerated.
 There’s no flat crevice display in between the bounding boxes of money
related and of. Tesseract unravel these issue. By measuring crevices in a
restricted vertical extend between the pattern and cruel line the issue is to
be get unraveled. Spaces that are closer to the threshold since the ultimate
choice can be made after the acknowledgment of word.
Hardware Requirement:
System Processors : Core i3,i5,i7.
Speed : 2.4 GHz
Ram : 2 GB
Hard Disk : 500 GB
Software Requirement:
Operating system : 64-bit Windows 7,8,10.
Coding Language: Python
Design constraints : Spyder and Pycharm.
Conclusion
This proposed system detects the electricity theft using Google-OCR
machine learning method and basic mathematical formulae. This system
helps to electricity utilities to detect electricity theft and they will not have
to financial loss. It hampers functioning of industries and factories, due to
shortage of power supplied to them.
References
 Tripathi, Bhasker (26 March 2018). "Now, India is the third largest
electricity producer ahead of Russia, Japan". Business Standard India.
Retrieved 27 September 2019.
 "One Nation-One Grid". Power Grid Corporation of India. Retrieved 2
December 2016.
 P. Jokar, N. Arianpoo, and V. C. M. Leung, “Electricity theft detection
in AMI using customers’ consumption patterns,” IEEE Trans. Smart
Grid, vol. 7, no. 1, pp. 216-226, Jan. 2016
 M. Buzau, J. Aguilera, P. Romero, and A. Expósito, “Detection of Non-
Technical Losses Using Smart Meter Data and Supervised Learning,”
IEEE Trans. Smart Grid, Feb. 2018. [DOI:
10.1109/TSG.2018.2807925]
 P. Jokar, N. Arianpoo, and V. C. M. Leung, IEEE Trans. Smart Grid,
vol. 7. (Jan. 2016)
 P. J. Rousseeuw, A. M. Leroy, Robust Regression and Outlier
Detection. (Wiley- IEEE, 2003)
Electricity theft detection using image processing

More Related Content

What's hot

Fault Location of Overhead Transmission Line
Fault Location of Overhead Transmission LineFault Location of Overhead Transmission Line
Fault Location of Overhead Transmission LineCHIRANJEEB DASH
 
Power theft detection
Power theft detectionPower theft detection
Power theft detectionbishow kandel
 
RATION DISTRIBUTON -RAJIV GANDHI INSTITUTE OF TECHNOLOGY
RATION DISTRIBUTON -RAJIV GANDHI INSTITUTE OF TECHNOLOGYRATION DISTRIBUTON -RAJIV GANDHI INSTITUTE OF TECHNOLOGY
RATION DISTRIBUTON -RAJIV GANDHI INSTITUTE OF TECHNOLOGYMOHAMMED AZEEZULLA
 
Wireless power theft monitoring
Wireless power theft monitoring Wireless power theft monitoring
Wireless power theft monitoring Naqeeb Ullah Kakar
 
Fault Location Of Transmission Line
Fault Location Of Transmission LineFault Location Of Transmission Line
Fault Location Of Transmission LineCHIRANJEEB DASH
 
automatic meter reading
automatic meter readingautomatic meter reading
automatic meter readingmsubashece001
 
ppt on summer training on uppcl
ppt on summer training on uppclppt on summer training on uppcl
ppt on summer training on uppclSunny Daksh
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring systemVikram Purohit
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
Wireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptWireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptArjit Rajwal
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face RecognitionIRJET Journal
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationranjeet1990
 
MPPT using fuzzy logic
MPPT using fuzzy logicMPPT using fuzzy logic
MPPT using fuzzy logicmazirabbas
 

What's hot (20)

Fault Location of Overhead Transmission Line
Fault Location of Overhead Transmission LineFault Location of Overhead Transmission Line
Fault Location of Overhead Transmission Line
 
Power theft detection
Power theft detectionPower theft detection
Power theft detection
 
Tech seminar
Tech seminarTech seminar
Tech seminar
 
RATION DISTRIBUTON -RAJIV GANDHI INSTITUTE OF TECHNOLOGY
RATION DISTRIBUTON -RAJIV GANDHI INSTITUTE OF TECHNOLOGYRATION DISTRIBUTON -RAJIV GANDHI INSTITUTE OF TECHNOLOGY
RATION DISTRIBUTON -RAJIV GANDHI INSTITUTE OF TECHNOLOGY
 
Wireless power theft monitoring
Wireless power theft monitoring Wireless power theft monitoring
Wireless power theft monitoring
 
Fault Location Of Transmission Line
Fault Location Of Transmission LineFault Location Of Transmission Line
Fault Location Of Transmission Line
 
automatic meter reading
automatic meter readingautomatic meter reading
automatic meter reading
 
Smart Meters
Smart MetersSmart Meters
Smart Meters
 
Smart meters
Smart metersSmart meters
Smart meters
 
Facts
FactsFacts
Facts
 
ppt on summer training on uppcl
ppt on summer training on uppclppt on summer training on uppcl
ppt on summer training on uppcl
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Wireless power-theft-monitering-ppt
Wireless power-theft-monitering-pptWireless power-theft-monitering-ppt
Wireless power-theft-monitering-ppt
 
movie ticket pricing prediction
movie ticket pricing prediction movie ticket pricing prediction
movie ticket pricing prediction
 
Smart meter
Smart meterSmart meter
Smart meter
 
Witricity PPT
Witricity PPTWitricity PPT
Witricity PPT
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face Recognition
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identification
 
MPPT using fuzzy logic
MPPT using fuzzy logicMPPT using fuzzy logic
MPPT using fuzzy logic
 

Similar to Electricity theft detection using image processing

a hybrid approach to power theft detection
a hybrid approach to power theft detectiona hybrid approach to power theft detection
a hybrid approach to power theft detectionINFOGAIN PUBLICATION
 
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN... BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN...
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...Nexgen Technology
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET Journal
 
IRJET- IoT based Smart Electricity Meter and Billing System
IRJET- IoT based Smart Electricity Meter and Billing SystemIRJET- IoT based Smart Electricity Meter and Billing System
IRJET- IoT based Smart Electricity Meter and Billing SystemIRJET Journal
 
A Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft DetectionA Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft DetectionCamella Taylor
 
journal about operation management
journal about operation managementjournal about operation management
journal about operation managementgraphicdesigner79
 
CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION K Srinivas Rao
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdfSarita30844
 
Simulation of Smart Meter Using Proteus software for Smart Grid
Simulation of Smart Meter Using Proteus software for Smart GridSimulation of Smart Meter Using Proteus software for Smart Grid
Simulation of Smart Meter Using Proteus software for Smart GridIRJET Journal
 
IRJET-Simulation of Smart Meter Using Proteus software for Smart Grid
IRJET-Simulation of Smart Meter Using Proteus software for Smart GridIRJET-Simulation of Smart Meter Using Proteus software for Smart Grid
IRJET-Simulation of Smart Meter Using Proteus software for Smart GridIRJET Journal
 
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesAnalysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesIRJET Journal
 
Power Theft Identification System Using Iot
Power Theft Identification System Using IotPower Theft Identification System Using Iot
Power Theft Identification System Using Iotsakru naik
 
IRJET- Power Theft Detection using Probabilistic Neural Network Classifier
IRJET- Power Theft Detection using Probabilistic Neural Network ClassifierIRJET- Power Theft Detection using Probabilistic Neural Network Classifier
IRJET- Power Theft Detection using Probabilistic Neural Network ClassifierIRJET Journal
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
22CS339- Electricity Theft Final Updated PPT (2).pptx
22CS339- Electricity Theft Final Updated PPT (2).pptx22CS339- Electricity Theft Final Updated PPT (2).pptx
22CS339- Electricity Theft Final Updated PPT (2).pptxUnknownUnknown252665
 
IRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET Journal
 
IRJET- Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET-  	  Predicting Outcome of Judicial Cases and Analysis using Machine Le...IRJET-  	  Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET- Predicting Outcome of Judicial Cases and Analysis using Machine Le...IRJET Journal
 
IRJET- An IoT based Tamper Prevention System for Electricity Meter
IRJET- An IoT based Tamper Prevention System for Electricity MeterIRJET- An IoT based Tamper Prevention System for Electricity Meter
IRJET- An IoT based Tamper Prevention System for Electricity MeterIRJET Journal
 

Similar to Electricity theft detection using image processing (20)

a hybrid approach to power theft detection
a hybrid approach to power theft detectiona hybrid approach to power theft detection
a hybrid approach to power theft detection
 
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN... BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN...
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
 
IRJET- IoT based Smart Electricity Meter and Billing System
IRJET- IoT based Smart Electricity Meter and Billing SystemIRJET- IoT based Smart Electricity Meter and Billing System
IRJET- IoT based Smart Electricity Meter and Billing System
 
A Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft DetectionA Hybrid Theory Of Power Theft Detection
A Hybrid Theory Of Power Theft Detection
 
journal about operation management
journal about operation managementjournal about operation management
journal about operation management
 
CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
 
Ijariie1172
Ijariie1172Ijariie1172
Ijariie1172
 
Simulation of Smart Meter Using Proteus software for Smart Grid
Simulation of Smart Meter Using Proteus software for Smart GridSimulation of Smart Meter Using Proteus software for Smart Grid
Simulation of Smart Meter Using Proteus software for Smart Grid
 
IRJET-Simulation of Smart Meter Using Proteus software for Smart Grid
IRJET-Simulation of Smart Meter Using Proteus software for Smart GridIRJET-Simulation of Smart Meter Using Proteus software for Smart Grid
IRJET-Simulation of Smart Meter Using Proteus software for Smart Grid
 
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesAnalysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
 
Power Theft Identification System Using Iot
Power Theft Identification System Using IotPower Theft Identification System Using Iot
Power Theft Identification System Using Iot
 
IRJET- Power Theft Detection using Probabilistic Neural Network Classifier
IRJET- Power Theft Detection using Probabilistic Neural Network ClassifierIRJET- Power Theft Detection using Probabilistic Neural Network Classifier
IRJET- Power Theft Detection using Probabilistic Neural Network Classifier
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
22CS339- Electricity Theft Final Updated PPT (2).pptx
22CS339- Electricity Theft Final Updated PPT (2).pptx22CS339- Electricity Theft Final Updated PPT (2).pptx
22CS339- Electricity Theft Final Updated PPT (2).pptx
 
IRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection Analysis
 
IRJET- Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET-  	  Predicting Outcome of Judicial Cases and Analysis using Machine Le...IRJET-  	  Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET- Predicting Outcome of Judicial Cases and Analysis using Machine Le...
 
IRJET- An IoT based Tamper Prevention System for Electricity Meter
IRJET- An IoT based Tamper Prevention System for Electricity MeterIRJET- An IoT based Tamper Prevention System for Electricity Meter
IRJET- An IoT based Tamper Prevention System for Electricity Meter
 

Recently uploaded

dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 

Recently uploaded (20)

dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 

Electricity theft detection using image processing

  • 1. Dr.D.Y.Patil Institute of Technology Pimpri,Pune-411018 Department of Computer Engineering 2019-2020 PROJECT REPORT ON Electricity Theft Detection using Machine Learning Algorithm Submitted by : BCOB23 Anwar Patel BCOB24 Onkar Yadav BCOB25 Ankush Maratkar BCOB26 Nilesh Maher Project Guide: Prof. Rajesh Bharati
  • 2. Contents  Abstract  Introduction  Motivation  Existing System  Mathematical Model  Advantage and Disadvantage  Proposed System  Goals and Objective  System Architecture & Explanation  Literature Review  Hardware requirement and Software requirement  Conclusion  References
  • 3. Abstract Electricity theft is one of the major problems of electric utilities .Such electricity theft produces financial loss to the utility companies. It is not possible to inspect manually such theft in large amount of data. For detecting such electricity theft introduces OCR(Optical Character Recognition) algorithm which covert the any image to text data and we also use some mathematical formulas . In this we apply preprocessing on meter data then do feature selection. It detects theft using anomaly behavior of user. Electricity Data of different society and commercial users is given to find the thefts.
  • 4. Introduction  Many electric utilities have financial loss due to electricity theft. Here are various types of electrical power theft, including Tapping a line or bypassing the energy meter.  According to a study 80% of worldwide theft occurs in private dwellings and 20% on commercial and industrial premises. If we try to detect the theft manually then it’s not possible as large amount of data will be there.  To improve the accuracy of input data we are using Google-OCR image processing algorithm. Image processing includes images of meter, in short we are using meter images to get the exact reading of user.  We implement a supervised ML-based theft detection model that identifies whether an abnormal/fraudulent usage pattern has occurred in the meter.  Here we use s meter image data to detect the theft. Using electricity consumption data we detect theft from available all societies. Here we used the ensemble technique that is boosting which required less time and gives more accuracy.
  • 5. Motivation  Many electric utilities have financial loss due to electricity theft .The theft is detected from the dataset using user ID or meter unit image which is converted into text file using Google-OCR. To recover the loss of electricity utilities.  Here are various types of electrical power theft , including Tapping a line or bypassing the energy meter .  Honest consumers , poor people and those without connections , who bear the burden of high tariffs, system inefficiencies ,and inadequate and unreliable power supply.
  • 6. Existing System  In existing system utilities have to send their employee to check the smart meter of Society and Commercial Industries users.  When employee goes to check the meter and that time if he get any users meter is off then only they get the theft otherwise peoples are doing the electricity theft .  To minimize the electricity theft we developing a project and overcoming the existing system problems.
  • 7. Mathematical Model  Mathematical model  Let S be the Whole system which consists:  S= {Dataset }.  Where,  Meter data is the input of the system.  OP is the output is as Fraud and trustworthy in our system.
  • 8. Input:  IP={ I }  Where, I is set of dataset provided as an input. Procedure:  Step1:- Dataset with user id, meter image.  Step2:- Convert the meter image to text data.  Step3:- We propose preprocessing with given data.  Step4:- Use Average calculation formula for finding average meter reading of twelve month the user  Step5:- As per comparison show result. Output: Getting the theft available or not in dataset as output result.
  • 9. Advantage  We detect electricity theft to avoid financial loss of electric utilities.  It improve the analysis and prediction accuracy.  Google-OCR Algorithm used for meter image processing.  Reducing manpower and Increasing automation system.  Reduce Time Complexity for detecting the theft.
  • 10. Disadvantage  Applicable for large data.  As machine learning project comes accuracy factor comes there is no 100% accuracy.  Data must contain variations.
  • 11. Proposed System • The Highest electricity theft done by India $16.2 billion in this world. Second highest electricity theft doing in Brazil $10.5 billion. • In India maximum theft is happening in Maharashtra which include in Mumbai alone $2.8 billion. • In this proposed system we use dataset having electricity usage of a Smart meter and industrial meter usage. • Using this dataset we does feature selection and preprocessing on dataset. As we use feature selection it gives us more accuracy. • Then we perform the preprocessing on that data. After that we use Google-OCR algorithm over other ML algorithms detect the theft.
  • 12. Goal and Objective  The main goal of this project is to detect electricity theft.  Power theft is one of the most prevalent issues which not only cause economic losses but also irregular supply of electricity utilities.  To reduce the electricity theft in the society and commercial industries. This project is increase the data accuracy using Machine Learning and Automation System.
  • 18. Literature Review Sr.N o Authors Name Title of the Paper Advantage Advantage we used in our project 1 Jeyaranjani J, Devaraj D D Machine Learning Algorithm for Efficient Power Theft Detection. The trustworthiness of customers is verified and is selected for theft program. This analysis is carried out by tweaking the actual Smart Meter data to create fraudulent data. Use neural network which gives high accuracy. 2 P. Jokar, N. Arianpoo, and V. C. M. Leung Electricity theft detection in AMI using customers’ consumption patterns.. we present a novel consumption pattern-based energy theft detector, which leverages the predictability property of customers' normal and malicious consumption patterns. Application of appropriate classification and clustering techniques, as well as concurrent use of transformer meters and anomaly detectors.
  • 19. Sr.N o. Author’s Name Title of the Paper Advantage Advantage we used in our project 3 Buzau, J. Aguilera, P. Romero, and A. Exposito Detection of Non- Technical Losses Using Smart Meter Data and Supervised Learning. It can obtain an in- depth analysis of the customer's consumption behavior It can obtain an in- depth analysis of the customer's consumption behavior.
  • 20. Explanation Image preprocessing:- Google-OCR. Average Calculation:-Mathematical Formulas. Dataset:- Detecting theft using meter reading images.
  • 21. What is OCR ?  Machine replication of human functions, like reading, is an ancient dream. However, over the last five decades, machine reading has grown from a dream to reality.  Optical character recognition has become one of the most successful applications of technology in the field of pattern recognition and artificial intelligence.
  • 22. Baseline Fitting: -  In the event that the contents lines found at that point baselines are absolutely fitted utilizing quadratic spline. That’s nothing but another to begin with for an OCR framework and empowered Tesseract to handle pages with bended baselines which are a common antique in scanning.  The baselines are fitted by dividing the blobs into sensible and continuous displacement of the first straight baseline. A quadratic spline is fitted to the foremost crowded segment by a slightest squares fit. More conventional cubic spline might work better. Speaks to an illustration of a line of content with a fitted pattern, slid line too cruel line and ascender line.  All these lines are parallel and somewhat bended. The ascender line is light dark and the dark line lover it in straight organize. The near assessment appears that the cyan line is bended to the straight dark line.
  • 23. Line Finding:-  Tesseract is an open source OCR engine is created by HP in 1994. The line finding calculation is one of step of Tesseract that has been distributed. The line finding algorithm is utilized for a skewed page that can be recognized without having de-skewed, consequently by sparing misfortune of picture quality. The key parts of the line finding are blob sifting and line construction.  On suspicion of examination of content locales and straightforward percentile tallness channel expels drop cap and vertically touch the character, the middle stature approximate the measure of content within the locale subsequently it is secure to channel the blobs which are littler than the division being most accentuation, clamor and diacritical marks.  The sifted blobs fit the show of non-overlapping, parallel and inclining lines. Sorting and preparing of the blobs by x-coordinate allocates the blob to a one of a kind content line and track that incline over the page. Once the sifted blobs are doled out to lines a slightest middle of squares fit and it is utilized to assess.
  • 24. Fixed Pitch Detection and Chopping:-  Tesseract tests the content lines and decides whether they are settled pitch or not. It finds settle pitch and after that Tesseract chops the words into characters by utilizing the debilitates and pitch. i.e. for the word acknowledgment step.
  • 25. Proportional Word Finding:-  The non-fixed pitch (relatives content dividing) is exceedingly non-trivial errand. The crevice between the tens and units inexact Twelve percent is comparable estimate to the common space and it is certainly bigger than the kerned space between garbage and aerated.  There’s no flat crevice display in between the bounding boxes of money related and of. Tesseract unravel these issue. By measuring crevices in a restricted vertical extend between the pattern and cruel line the issue is to be get unraveled. Spaces that are closer to the threshold since the ultimate choice can be made after the acknowledgment of word.
  • 26. Hardware Requirement: System Processors : Core i3,i5,i7. Speed : 2.4 GHz Ram : 2 GB Hard Disk : 500 GB Software Requirement: Operating system : 64-bit Windows 7,8,10. Coding Language: Python Design constraints : Spyder and Pycharm.
  • 27. Conclusion This proposed system detects the electricity theft using Google-OCR machine learning method and basic mathematical formulae. This system helps to electricity utilities to detect electricity theft and they will not have to financial loss. It hampers functioning of industries and factories, due to shortage of power supplied to them.
  • 28. References  Tripathi, Bhasker (26 March 2018). "Now, India is the third largest electricity producer ahead of Russia, Japan". Business Standard India. Retrieved 27 September 2019.  "One Nation-One Grid". Power Grid Corporation of India. Retrieved 2 December 2016.  P. Jokar, N. Arianpoo, and V. C. M. Leung, “Electricity theft detection in AMI using customers’ consumption patterns,” IEEE Trans. Smart Grid, vol. 7, no. 1, pp. 216-226, Jan. 2016  M. Buzau, J. Aguilera, P. Romero, and A. Expósito, “Detection of Non- Technical Losses Using Smart Meter Data and Supervised Learning,” IEEE Trans. Smart Grid, Feb. 2018. [DOI: 10.1109/TSG.2018.2807925]  P. Jokar, N. Arianpoo, and V. C. M. Leung, IEEE Trans. Smart Grid, vol. 7. (Jan. 2016)  P. J. Rousseeuw, A. M. Leroy, Robust Regression and Outlier Detection. (Wiley- IEEE, 2003)