SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 834
POWER THEFT DETECTION USING PROBABILISTIC NEURAL NETWORK
CLASSIFIER
Kirankumar T 1, Sri Madhu G N 2
1PG Student, Department of Electrical and Electronics Engineering, University of B.D.T. College of Engineering,
Davanagere-577004, India.
2 Associate Professor, Department of Electrical and Electronics Engineering, University of B.D.T. College of
Engineering, Davanagere-577004, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The power theft has become a major problem in
India. The power system consistsofgeneration, transmission&
distribution. The powertheftishappeningonlyintransmission
& distribution side. In order to reduce thepowertheft, somany
methods have been proposed. But the case of directhooking to
distribution line is more difficult to find out. This project
presents this type of theft detection inpowersystem. Thereare
many technical losses present in transmission & distribution
but at the same time loss due to power theft is more. Hence lot
of loss for the utility. We propose the detection of power theft
using probabilistic neural network classifier in power system
Key Words: Electrical Power Theft, Non-Technical Losses,
Power Theft, Location, Probabilistic Neural Network.
1. INTRODUCTION
Generation, distribution and transmissionwill constitutethe
power system. Major amount of power theft occurs in
distribution system. There two type losses, one is Technical
loss and another one is non-technical loss occur at the
transmission and distribution side. Power theft is one such
non-technical loss. In non-technical loss stealing of
electricity is done by direct hooking to distribution line, in
the meter injecting the foreign materialsanddrillingholes in
electromechanical energy meter or resetting the meter, etc.
Meter tampering can be minimized by place LDC circuits
inside the meter, So it send the warm signals in to the
substation, therefore these kind of power theftisnota major
problem, But in the case of direct rigging to distribution line
is major problem for detecting the power theft. In this
project we propose detection of power theft in the
distribution line. We are detecting these type problem by
using probabilistic neural network control classifier.
2. PROBABILISTIC NEURAL NETWORKS
The feed-forward neural networks such as probabilistic
neural networksfindswideapplicationinpatternrecognition
and classification problems. Probabilistic neural network
algorithm uses non-parametric function and parzen window
to approximate each class of parent probability distribution
function. By the use of probability distribution function of
each class, the probability class can be computed for new
data inputs .The new data inputs are allocated with highest
posterior probability class by the use of Bayes rule. Thus the
probability of mis-classification will be reduced by using this
method. By using Bayesian network, probabilistic neural
network can be derived. In 1966 D.F,.Specht introduced the
statistical algorithm known as kernel fisher discriminant
analysis.
Figure 1. Architecture of Probabilistic neural network
In probabilistic neural networkstheoperationcanbedivided
into multilayer feed-forward network consisting of four
layers.
i. INPUT LAYER
In input layer, each neuron present will indicate predictor
variable N-1 neurons are present in categorial variables,
where N represents the category number. The median is
subtracted and it is divided interquartile range as a result
the range of values will be standardized.
ii. PATTERN LAYER
Pattern layer consists of training data set. Here for each
case one neuron will be present together with the target
values, value of the predictor variables for the case are
stored. In this layer the neuron hidden will compute.
iii. SUMMATION LAYER
The each category of target variable of PNN network consist
of one pattern neuron. With each hidden neuron, the real
target category of each training cases will be stored zero
hidden neurons, the weighted value will be carried out. And
value will be fed to the pattern neuron.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 835
iv. OUTPUT LAYER
Here the weighted votes for each target category present in
pattern layer will be compared. The target category is
predicted by the use of target vote.
3. DESIGN & IMPLEMENTATION
i. METHODOLOGY
Figure 2. Over all block diagram of the concept
The project concept we can find out the power theft
detection in the distribution line. first wemakePNN training
data for normal customer that is y1 and PNN training data
for fraud customer, that is y2.then the conditiony1>y2,ifitis
YES then there is no fraud occurred,otherwisetheftcase will
occurred
3.1 ALGORITHM FOR THEFT LOCATION
In this Project (medium voltage) overhead power
distribution system is taken into consideration. The system
consists of source present at remote end and main line with
load taps.
Figure 3. The block diagram for the theft location
algorithm.
The theft location algorithm is shown fig.3, by using
MATLAB/SIMULINK software the algorithm is simulated. By
considering the effects of current transformer, voltage
transformers and effects of analogue interface such as
quantization and anti-aliasing filters, the theft location is
developed. Therefore the location of theft determinedwillbe
closed real life situation.
For theft location methods using PNN, and a single PNN
cannot be used for locating theft for different systems and
different loading conditions. Because in order to train PNN
large amount of data is needed and also accuracy of location
of theft detected will be unsatisfactory. The PNN algorithm
can be split into two section.The input pattern consists ofsix
frequency parameters foreachcurrentwaveformsandphase
voltages for particular theft point. Thetheftclassificationand
location can obtained by applying the frequency parameters
to PNN. At first, a single PNN will be used to classify the
overhead power distributionlines,regardlessofexacttotheft
location. Secondarily, after classification of the theft,thenthe
PNN should be used for locating theft. The PNN’s is trained
for the type of theft. Separate set of PNN are trained and
designed for each theft for power theft detection.
4. DISCUSSION OF RESULTS & SUBSTITUTING FOR
FUTURE WORK.
The design, development and performance of neural
networks for the purpose of theft location are discussed in
this section.
4.1. THEFT LOCATION DETECTION PROCESSES
Steps involved in fault location.
 Data Creation.
 Training of probabilistic Neural Network for the
Desire Data.
 Design of main algorithm for theft Detection.
4.1.1. Data Creation
In this project first we create the data for the normal
customer and fraud customer. For the detection ofthepower
theft in the distribution line.
4.1.2. Training of probabilistic Neural Network
Feed forward back – propagation algorithm was once again
used for the purpose of theft detection in transmission lines.
The reason for doing so, as already mentioned is that these
networks perform very efficiently when there is availability
of sufficiently large training data set. For the training the
neural network, several theft places have been simulated on
the modeled transmission line.
4.1.3 Main algorithm for theft Detection
Now that the probabilistic neural network is trained for
the next step is to analyze the performance of the network is
called testing. The methods and means by which this neural
network has been tested are discussed here in this section. It
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 836
can be noted that both the average and the maximum error
percentages in accurately determining the location of the
theft in acceptable level and the network’s performance is
satisfactory.
4.2. MATLAB SIMULINK MODEL
a) Case 1: Theft at 0.2km Condition;
The below figure consists of a three phase transformer of
rating 11kV/400V.and normal loads are connected for a
particular distance. In each block we place three-phase VI
measurement block. The block can output the voltages and
currents. In below figure theftloadisplacedat0.2kmthenwe
run the system.
Figure 4. Simulink model
Output Theft at 0.2km Condition
After running the system the output shows the, theft
location occurred at 0.2km as shown in below diagram.
Figure 5. Output of simulink model
b) Case 2: No Theft Condition;
The below figure consists of a three phase transformer of
rating 11kV/400V.and normal loads are connected for a
particular distance. In each block we place three-phase VI
measurement block. The block can output the voltages and
currents. In below figure we doesn’t place theft load to
system, then we run the system.
Figure 6. Simulink model
Output at No Theft Condition;
After running the system the output shows the, there is no
theft occurred in distribution system as shown in below
diagram
Figure 7. Output of simulink model
c) Case 3: Theft at 0.4km Condition;
The below figure consists of a three phasetransformerof
rating 11kV/400V.and normal loads are connected for a
particular distance. In each block we place three-phase VI
measurement block. The block can output the voltages and
currents. In below figure theft load is placed at 0.4km then
we run the system.
Figure 8. Simulink model
Output Theft at 0.4km Condition;
After running the system the output shows the, theft
location occurred at 0.4km as shown in below diagram
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 837
Figure 9. Output of Simulink model
d) Case 4: Theft at 0.6km Condition;
The below figure consists of a three phasetransformerof
rating 11kV/400V.and normal loads are connected for a
particular distance. In each block we place three-phase VI
measurement block. The block can output the voltages and
currents. In below figure theft load is placed at 0.6km then
we run the system.
Figure 10. Simulink model
Output Theft at 0.6km Condition;
After running the system the output shows the, theft
location occurred at 0.6km as shown in below diagram.
Figure 11. Output of simulink model
e) Case 5: Theft at 0.8km Condition;
The below figure consists of a three phasetransformerof
rating 11kV/400V.and normal loads are connected for a
particular distance. In each block we place three-phase VI
measurement block. The block can output the voltages and
currents. In below figure theft load is placed at 0.8km then
we run the system.
Figure 12. Simulink model
Output Theft at 0.8km Condition;
After running the system the output shows the, theft
location occurred at 0.8km as shown in below diagram.
Figure 13. Output of simulink model
f) Case 6: Theft at 1km Condition;
The below figure consists of a three phasetransformer of
rating 11kV/400V.and normal loads are connected for a
particular distance. In each block we place three-phase VI
measurement block. The block can output the voltages and
currents. In below figure theft load is placed at 1km then we
run the system.
Figure 14. Simulink model
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 838
Output Theft at 1km Condition;
After running the system the output shows the, theft
location occurred at 0.8km as shown in below diagram.
Figure 15. Output of simulink model
5. CONCLUSION
In this project neural networks are used alternately for
detection of power theft, location of theft can be detected on
the basis of transmission and distribution lines. The
technique used will make use of phase currents and phase
voltages as input for neural networks. Each neural network
discussed in the project is belongs to back-propagation
neural network architecture. The theft location method is
used in the transmission right from the detection of theft on
the line to theft location stage has been devised successfully
but utilizing probabilistic neural network.
REFERENCES
[1] Srihari Mandava., Vanishree J,RameshV.“Automationof
Power Theft Detection Using PNN Classifier”.
[2] Vineetha Paruchuri ,Sitanshu Dubey “An Approach to
Determine Non-Technical Energy Losses in India”, Feb.
19~22, 2012 ICACT2012.
[3] An ANN-Based High ImpedanceFaultDetectionScheme
Design and Implementation. International Journal of
Emerging Electric Power Systems Research, vol.4,no.2,
pp. 1- 14.
[4] Alwin Vinifred Christopher, Guhesh Swaminathan,
Maheedar Subramanian & PravinThangaraj.
“Distribution Line Monitoring System for the Detection
of Power Theft using Power Line Communication”
[5] Jawad Nagi, Keem Siah Yap, Sieh Kiong Tiong, Syed
Khaleel Ahmed and Malik Mahamad, "Non-Technical
Loss Detection for Metered Consumers using Support
Vector Machines,” IEEETransactionsonPowerDelivery,
vol0.25, April 2010, PP.1162-1171.
[6] Amarendar Singh Kahar, Pilla Naresh Babu, Athi
Manideep, P Jaya Raj, Vidya Sagar, International Journal
of Scientific Engineering and Technology Research,
“power theft identification system in distribution lines
using differential power measurement,” vol. 4, issue 9,
April 2015, PP. 1651-1655.
[7] Amin S. Mehmood, T. Choudhry, M.A. Hanif, “A
Reviewing the Technical Issues for the Effective
Construction of Automatic Meter-Reading System” in
International Conference on Microelectronics, 2005
IEEE.
[8] Bharath P, Ananth N, Vijetha S,JyothiPrakashK.V.2008.
“Wireless Automated Digital Energy Meter”. IEEE
International Conference on Sustainable Energy
Technologies, pp: 564-567.
[9] GSM Based Electricity Theft Identification in
Distribution Systems
Kalaivani.R1,Gowthami.M1,Savitha.S1,Karthick.N1,
Mohanvel.S2 Student, EEE, Knowledge Institute of
Technology, Salem, India Assistant professor, EEE,
Knowledge Institute of Technology, Salem, India
[10] A.J. Dick, “Theft of Electricity – how UK Electricity
companies Detect and Deter” ,Proc. European
Convention Security and Detection, Brighton, U.K., May
1995, pp. 90–95.
[11] T.B. Smith, “Electricity theft- comparative analysis
”,Energy Policy, vol. 32, pp. 2067–2076, Aug. 2003.
[12] “Overview of power distribution” Ministry of Power,
Govt. of India,
[13] R. Cespedes, H. Duran, H Hernandez, and A. Rodriguez,
“Assessment of electrical energylossesintheColombian
power system”, IEEE Trans. on Power Apparatus and
Systems, vol. 102, pp. 3509–3515, Nov. 1983.
[14] J. Nagi K.S. Yap, F. Nagi “NTL Detection of Electricity
Theft and Abnormalities for Large Power Consumers In
TNB Malaysia”, Proceedings of 2010 IEEE Student
Conference on Research and Development (SCOReD
2010), 13 - 14 Dec 2010, Putrajaya, Malaysia
[15] Vineetha Paruchuri ,Sitanshu Dubey “An Approach to
Determine Non-Technical Energy Losses in India”, Feb.
19~22, 2012 ICACT2012
[16] Soma Shekara Sreenadh ReddyDepuru,LingfengWang,
and Vijay Devabhaktuni,“SupportVectorMachineBased
Data Classification for Detection of Electricity Theft”,
978-1-61284-788-7/11/2011 IEEE .
[17] Jawad Nagi, Keem Siah Yap, Sieh Kiong Tiong, Member,
IEEE, Syed Khaleel Ahmed, Member, IEEE, and Malik
Mohamad, “Nontechnical Loss Detection for Metered
Customers in Power Utility Using Support Vector
Machines” IEEE Transactions on Power Delivery, VOL.
25, NO. 2, April 2010.

More Related Content

What's hot

An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
 
Selecting number of forwarding reports
Selecting number of forwarding reportsSelecting number of forwarding reports
Selecting number of forwarding reportsijasa
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Precision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsnPrecision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsnGaurang Rathod
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
Developmental Mega Sample: Exploring Inter-Individual Variation
Developmental Mega Sample: Exploring Inter-Individual VariationDevelopmental Mega Sample: Exploring Inter-Individual Variation
Developmental Mega Sample: Exploring Inter-Individual VariationSaigeRutherford
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
 
Fault detection and diagnosis ingears using wavelet enveloped power spectrum ...
Fault detection and diagnosis ingears using wavelet enveloped power spectrum ...Fault detection and diagnosis ingears using wavelet enveloped power spectrum ...
Fault detection and diagnosis ingears using wavelet enveloped power spectrum ...eSAT Journals
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
 
Phasor State Estimation Weighting Coefficients for AC and Hybrid Networks wit...
Phasor State Estimation Weighting Coefficients for AC and Hybrid Networks wit...Phasor State Estimation Weighting Coefficients for AC and Hybrid Networks wit...
Phasor State Estimation Weighting Coefficients for AC and Hybrid Networks wit...Luigi Vanfretti
 
False Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor NetworkFalse Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor NetworkRadita Apriana
 
Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Editor IJCATR
 
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORKSENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORKijwmn
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 

What's hot (20)

An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
Selecting number of forwarding reports
Selecting number of forwarding reportsSelecting number of forwarding reports
Selecting number of forwarding reports
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
K010326568
K010326568K010326568
K010326568
 
Precision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsnPrecision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsn
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
Developmental Mega Sample: Exploring Inter-Individual Variation
Developmental Mega Sample: Exploring Inter-Individual VariationDevelopmental Mega Sample: Exploring Inter-Individual Variation
Developmental Mega Sample: Exploring Inter-Individual Variation
 
Y4502158163
Y4502158163Y4502158163
Y4502158163
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
 
M.sc. m kamel
M.sc. m kamelM.sc. m kamel
M.sc. m kamel
 
Fault detection and diagnosis ingears using wavelet enveloped power spectrum ...
Fault detection and diagnosis ingears using wavelet enveloped power spectrum ...Fault detection and diagnosis ingears using wavelet enveloped power spectrum ...
Fault detection and diagnosis ingears using wavelet enveloped power spectrum ...
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Phasor State Estimation Weighting Coefficients for AC and Hybrid Networks wit...
Phasor State Estimation Weighting Coefficients for AC and Hybrid Networks wit...Phasor State Estimation Weighting Coefficients for AC and Hybrid Networks wit...
Phasor State Estimation Weighting Coefficients for AC and Hybrid Networks wit...
 
False Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor NetworkFalse Node Recovery Algorithm for a Wireless Sensor Network
False Node Recovery Algorithm for a Wireless Sensor Network
 
Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...
 
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORKSENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 

Similar to IRJET- Power Theft Detection using Probabilistic Neural Network Classifier

IRJET- Three Phase Line Fault Detection using Artificial Neural Network
IRJET- Three Phase Line Fault Detection using Artificial Neural NetworkIRJET- Three Phase Line Fault Detection using Artificial Neural Network
IRJET- Three Phase Line Fault Detection using Artificial Neural NetworkIRJET Journal
 
IRJET- Wavelet Decomposition along with ANN used for Fault Detection
IRJET- Wavelet Decomposition along with ANN used for Fault DetectionIRJET- Wavelet Decomposition along with ANN used for Fault Detection
IRJET- Wavelet Decomposition along with ANN used for Fault DetectionIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Analysis of Electromagnetic Pollution Monitoring using Wireless Sensor Network
Analysis of Electromagnetic Pollution Monitoring using Wireless Sensor NetworkAnalysis of Electromagnetic Pollution Monitoring using Wireless Sensor Network
Analysis of Electromagnetic Pollution Monitoring using Wireless Sensor NetworkIRJET Journal
 
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...IRJET Journal
 
Electricity Theft: Reason and Solution
Electricity Theft: Reason and SolutionElectricity Theft: Reason and Solution
Electricity Theft: Reason and SolutionIRJET Journal
 
IRJET- Overhead Line Protection with Automatic Switch by using PLC Automation
IRJET- Overhead Line Protection with Automatic Switch by using PLC AutomationIRJET- Overhead Line Protection with Automatic Switch by using PLC Automation
IRJET- Overhead Line Protection with Automatic Switch by using PLC AutomationIRJET Journal
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOTPSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOTIRJET Journal
 
Design and Detection of Underground Cable Fault Using Raspberry Pi and IoT Sy...
Design and Detection of Underground Cable Fault Using Raspberry Pi and IoT Sy...Design and Detection of Underground Cable Fault Using Raspberry Pi and IoT Sy...
Design and Detection of Underground Cable Fault Using Raspberry Pi and IoT Sy...ijtsrd
 
IRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault DetectionIRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault DetectionIRJET Journal
 
IRJET- A Unique Methodology for Transmission Line Breakage Detection and ...
IRJET-  	  A Unique Methodology for Transmission Line Breakage Detection and ...IRJET-  	  A Unique Methodology for Transmission Line Breakage Detection and ...
IRJET- A Unique Methodology for Transmission Line Breakage Detection and ...IRJET Journal
 
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...ijcsit
 
IRJET- A Simple Approach to Identify Power System Transmission Line Faults us...
IRJET- A Simple Approach to Identify Power System Transmission Line Faults us...IRJET- A Simple Approach to Identify Power System Transmission Line Faults us...
IRJET- A Simple Approach to Identify Power System Transmission Line Faults us...IRJET Journal
 
IRJET- Arduino based Smart Grid Power Monitoring and Control by using IoT
IRJET-  	  Arduino based Smart Grid Power Monitoring and Control by using IoTIRJET-  	  Arduino based Smart Grid Power Monitoring and Control by using IoT
IRJET- Arduino based Smart Grid Power Monitoring and Control by using IoTIRJET Journal
 
MRA Analysis for Faults Indentification in Multilevel Inverter
MRA Analysis for Faults Indentification in Multilevel InverterMRA Analysis for Faults Indentification in Multilevel Inverter
MRA Analysis for Faults Indentification in Multilevel InverterIRJET Journal
 
ANN Approach for Fault Classification in Induction Motors using Current and V...
ANN Approach for Fault Classification in Induction Motors using Current and V...ANN Approach for Fault Classification in Induction Motors using Current and V...
ANN Approach for Fault Classification in Induction Motors using Current and V...IRJET Journal
 

Similar to IRJET- Power Theft Detection using Probabilistic Neural Network Classifier (20)

IRJET- Three Phase Line Fault Detection using Artificial Neural Network
IRJET- Three Phase Line Fault Detection using Artificial Neural NetworkIRJET- Three Phase Line Fault Detection using Artificial Neural Network
IRJET- Three Phase Line Fault Detection using Artificial Neural Network
 
IRJET- Wavelet Decomposition along with ANN used for Fault Detection
IRJET- Wavelet Decomposition along with ANN used for Fault DetectionIRJET- Wavelet Decomposition along with ANN used for Fault Detection
IRJET- Wavelet Decomposition along with ANN used for Fault Detection
 
Irjet v7 i3475
Irjet v7 i3475Irjet v7 i3475
Irjet v7 i3475
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Analysis of Electromagnetic Pollution Monitoring using Wireless Sensor Network
Analysis of Electromagnetic Pollution Monitoring using Wireless Sensor NetworkAnalysis of Electromagnetic Pollution Monitoring using Wireless Sensor Network
Analysis of Electromagnetic Pollution Monitoring using Wireless Sensor Network
 
Singh2017
Singh2017Singh2017
Singh2017
 
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...IRJET -  	  Securing Computers from Remote Access Trojans using Deep Learning...
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...
 
Electricity Theft: Reason and Solution
Electricity Theft: Reason and SolutionElectricity Theft: Reason and Solution
Electricity Theft: Reason and Solution
 
IRJET- Overhead Line Protection with Automatic Switch by using PLC Automation
IRJET- Overhead Line Protection with Automatic Switch by using PLC AutomationIRJET- Overhead Line Protection with Automatic Switch by using PLC Automation
IRJET- Overhead Line Protection with Automatic Switch by using PLC Automation
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOTPSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
 
Implementation of NN controlled DVR for Enhancing The Power Quality By Mitiga...
Implementation of NN controlled DVR for Enhancing The Power Quality By Mitiga...Implementation of NN controlled DVR for Enhancing The Power Quality By Mitiga...
Implementation of NN controlled DVR for Enhancing The Power Quality By Mitiga...
 
Design and Detection of Underground Cable Fault Using Raspberry Pi and IoT Sy...
Design and Detection of Underground Cable Fault Using Raspberry Pi and IoT Sy...Design and Detection of Underground Cable Fault Using Raspberry Pi and IoT Sy...
Design and Detection of Underground Cable Fault Using Raspberry Pi and IoT Sy...
 
IRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault DetectionIRJET- Iot Based Underground Cable Line Fault Detection
IRJET- Iot Based Underground Cable Line Fault Detection
 
IRJET- A Unique Methodology for Transmission Line Breakage Detection and ...
IRJET-  	  A Unique Methodology for Transmission Line Breakage Detection and ...IRJET-  	  A Unique Methodology for Transmission Line Breakage Detection and ...
IRJET- A Unique Methodology for Transmission Line Breakage Detection and ...
 
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...
COMPARATIVE STUDY OF BACKPROPAGATION ALGORITHMS IN NEURAL NETWORK BASED IDENT...
 
IRJET- A Simple Approach to Identify Power System Transmission Line Faults us...
IRJET- A Simple Approach to Identify Power System Transmission Line Faults us...IRJET- A Simple Approach to Identify Power System Transmission Line Faults us...
IRJET- A Simple Approach to Identify Power System Transmission Line Faults us...
 
IRJET- Arduino based Smart Grid Power Monitoring and Control by using IoT
IRJET-  	  Arduino based Smart Grid Power Monitoring and Control by using IoTIRJET-  	  Arduino based Smart Grid Power Monitoring and Control by using IoT
IRJET- Arduino based Smart Grid Power Monitoring and Control by using IoT
 
MRA Analysis for Faults Indentification in Multilevel Inverter
MRA Analysis for Faults Indentification in Multilevel InverterMRA Analysis for Faults Indentification in Multilevel Inverter
MRA Analysis for Faults Indentification in Multilevel Inverter
 
ANN Approach for Fault Classification in Induction Motors using Current and V...
ANN Approach for Fault Classification in Induction Motors using Current and V...ANN Approach for Fault Classification in Induction Motors using Current and V...
ANN Approach for Fault Classification in Induction Motors using Current and V...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

IRJET- Power Theft Detection using Probabilistic Neural Network Classifier

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 834 POWER THEFT DETECTION USING PROBABILISTIC NEURAL NETWORK CLASSIFIER Kirankumar T 1, Sri Madhu G N 2 1PG Student, Department of Electrical and Electronics Engineering, University of B.D.T. College of Engineering, Davanagere-577004, India. 2 Associate Professor, Department of Electrical and Electronics Engineering, University of B.D.T. College of Engineering, Davanagere-577004, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The power theft has become a major problem in India. The power system consistsofgeneration, transmission& distribution. The powertheftishappeningonlyintransmission & distribution side. In order to reduce thepowertheft, somany methods have been proposed. But the case of directhooking to distribution line is more difficult to find out. This project presents this type of theft detection inpowersystem. Thereare many technical losses present in transmission & distribution but at the same time loss due to power theft is more. Hence lot of loss for the utility. We propose the detection of power theft using probabilistic neural network classifier in power system Key Words: Electrical Power Theft, Non-Technical Losses, Power Theft, Location, Probabilistic Neural Network. 1. INTRODUCTION Generation, distribution and transmissionwill constitutethe power system. Major amount of power theft occurs in distribution system. There two type losses, one is Technical loss and another one is non-technical loss occur at the transmission and distribution side. Power theft is one such non-technical loss. In non-technical loss stealing of electricity is done by direct hooking to distribution line, in the meter injecting the foreign materialsanddrillingholes in electromechanical energy meter or resetting the meter, etc. Meter tampering can be minimized by place LDC circuits inside the meter, So it send the warm signals in to the substation, therefore these kind of power theftisnota major problem, But in the case of direct rigging to distribution line is major problem for detecting the power theft. In this project we propose detection of power theft in the distribution line. We are detecting these type problem by using probabilistic neural network control classifier. 2. PROBABILISTIC NEURAL NETWORKS The feed-forward neural networks such as probabilistic neural networksfindswideapplicationinpatternrecognition and classification problems. Probabilistic neural network algorithm uses non-parametric function and parzen window to approximate each class of parent probability distribution function. By the use of probability distribution function of each class, the probability class can be computed for new data inputs .The new data inputs are allocated with highest posterior probability class by the use of Bayes rule. Thus the probability of mis-classification will be reduced by using this method. By using Bayesian network, probabilistic neural network can be derived. In 1966 D.F,.Specht introduced the statistical algorithm known as kernel fisher discriminant analysis. Figure 1. Architecture of Probabilistic neural network In probabilistic neural networkstheoperationcanbedivided into multilayer feed-forward network consisting of four layers. i. INPUT LAYER In input layer, each neuron present will indicate predictor variable N-1 neurons are present in categorial variables, where N represents the category number. The median is subtracted and it is divided interquartile range as a result the range of values will be standardized. ii. PATTERN LAYER Pattern layer consists of training data set. Here for each case one neuron will be present together with the target values, value of the predictor variables for the case are stored. In this layer the neuron hidden will compute. iii. SUMMATION LAYER The each category of target variable of PNN network consist of one pattern neuron. With each hidden neuron, the real target category of each training cases will be stored zero hidden neurons, the weighted value will be carried out. And value will be fed to the pattern neuron.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 835 iv. OUTPUT LAYER Here the weighted votes for each target category present in pattern layer will be compared. The target category is predicted by the use of target vote. 3. DESIGN & IMPLEMENTATION i. METHODOLOGY Figure 2. Over all block diagram of the concept The project concept we can find out the power theft detection in the distribution line. first wemakePNN training data for normal customer that is y1 and PNN training data for fraud customer, that is y2.then the conditiony1>y2,ifitis YES then there is no fraud occurred,otherwisetheftcase will occurred 3.1 ALGORITHM FOR THEFT LOCATION In this Project (medium voltage) overhead power distribution system is taken into consideration. The system consists of source present at remote end and main line with load taps. Figure 3. The block diagram for the theft location algorithm. The theft location algorithm is shown fig.3, by using MATLAB/SIMULINK software the algorithm is simulated. By considering the effects of current transformer, voltage transformers and effects of analogue interface such as quantization and anti-aliasing filters, the theft location is developed. Therefore the location of theft determinedwillbe closed real life situation. For theft location methods using PNN, and a single PNN cannot be used for locating theft for different systems and different loading conditions. Because in order to train PNN large amount of data is needed and also accuracy of location of theft detected will be unsatisfactory. The PNN algorithm can be split into two section.The input pattern consists ofsix frequency parameters foreachcurrentwaveformsandphase voltages for particular theft point. Thetheftclassificationand location can obtained by applying the frequency parameters to PNN. At first, a single PNN will be used to classify the overhead power distributionlines,regardlessofexacttotheft location. Secondarily, after classification of the theft,thenthe PNN should be used for locating theft. The PNN’s is trained for the type of theft. Separate set of PNN are trained and designed for each theft for power theft detection. 4. DISCUSSION OF RESULTS & SUBSTITUTING FOR FUTURE WORK. The design, development and performance of neural networks for the purpose of theft location are discussed in this section. 4.1. THEFT LOCATION DETECTION PROCESSES Steps involved in fault location.  Data Creation.  Training of probabilistic Neural Network for the Desire Data.  Design of main algorithm for theft Detection. 4.1.1. Data Creation In this project first we create the data for the normal customer and fraud customer. For the detection ofthepower theft in the distribution line. 4.1.2. Training of probabilistic Neural Network Feed forward back – propagation algorithm was once again used for the purpose of theft detection in transmission lines. The reason for doing so, as already mentioned is that these networks perform very efficiently when there is availability of sufficiently large training data set. For the training the neural network, several theft places have been simulated on the modeled transmission line. 4.1.3 Main algorithm for theft Detection Now that the probabilistic neural network is trained for the next step is to analyze the performance of the network is called testing. The methods and means by which this neural network has been tested are discussed here in this section. It
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 836 can be noted that both the average and the maximum error percentages in accurately determining the location of the theft in acceptable level and the network’s performance is satisfactory. 4.2. MATLAB SIMULINK MODEL a) Case 1: Theft at 0.2km Condition; The below figure consists of a three phase transformer of rating 11kV/400V.and normal loads are connected for a particular distance. In each block we place three-phase VI measurement block. The block can output the voltages and currents. In below figure theftloadisplacedat0.2kmthenwe run the system. Figure 4. Simulink model Output Theft at 0.2km Condition After running the system the output shows the, theft location occurred at 0.2km as shown in below diagram. Figure 5. Output of simulink model b) Case 2: No Theft Condition; The below figure consists of a three phase transformer of rating 11kV/400V.and normal loads are connected for a particular distance. In each block we place three-phase VI measurement block. The block can output the voltages and currents. In below figure we doesn’t place theft load to system, then we run the system. Figure 6. Simulink model Output at No Theft Condition; After running the system the output shows the, there is no theft occurred in distribution system as shown in below diagram Figure 7. Output of simulink model c) Case 3: Theft at 0.4km Condition; The below figure consists of a three phasetransformerof rating 11kV/400V.and normal loads are connected for a particular distance. In each block we place three-phase VI measurement block. The block can output the voltages and currents. In below figure theft load is placed at 0.4km then we run the system. Figure 8. Simulink model Output Theft at 0.4km Condition; After running the system the output shows the, theft location occurred at 0.4km as shown in below diagram
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 837 Figure 9. Output of Simulink model d) Case 4: Theft at 0.6km Condition; The below figure consists of a three phasetransformerof rating 11kV/400V.and normal loads are connected for a particular distance. In each block we place three-phase VI measurement block. The block can output the voltages and currents. In below figure theft load is placed at 0.6km then we run the system. Figure 10. Simulink model Output Theft at 0.6km Condition; After running the system the output shows the, theft location occurred at 0.6km as shown in below diagram. Figure 11. Output of simulink model e) Case 5: Theft at 0.8km Condition; The below figure consists of a three phasetransformerof rating 11kV/400V.and normal loads are connected for a particular distance. In each block we place three-phase VI measurement block. The block can output the voltages and currents. In below figure theft load is placed at 0.8km then we run the system. Figure 12. Simulink model Output Theft at 0.8km Condition; After running the system the output shows the, theft location occurred at 0.8km as shown in below diagram. Figure 13. Output of simulink model f) Case 6: Theft at 1km Condition; The below figure consists of a three phasetransformer of rating 11kV/400V.and normal loads are connected for a particular distance. In each block we place three-phase VI measurement block. The block can output the voltages and currents. In below figure theft load is placed at 1km then we run the system. Figure 14. Simulink model
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 838 Output Theft at 1km Condition; After running the system the output shows the, theft location occurred at 0.8km as shown in below diagram. Figure 15. Output of simulink model 5. CONCLUSION In this project neural networks are used alternately for detection of power theft, location of theft can be detected on the basis of transmission and distribution lines. The technique used will make use of phase currents and phase voltages as input for neural networks. Each neural network discussed in the project is belongs to back-propagation neural network architecture. The theft location method is used in the transmission right from the detection of theft on the line to theft location stage has been devised successfully but utilizing probabilistic neural network. REFERENCES [1] Srihari Mandava., Vanishree J,RameshV.“Automationof Power Theft Detection Using PNN Classifier”. [2] Vineetha Paruchuri ,Sitanshu Dubey “An Approach to Determine Non-Technical Energy Losses in India”, Feb. 19~22, 2012 ICACT2012. [3] An ANN-Based High ImpedanceFaultDetectionScheme Design and Implementation. International Journal of Emerging Electric Power Systems Research, vol.4,no.2, pp. 1- 14. [4] Alwin Vinifred Christopher, Guhesh Swaminathan, Maheedar Subramanian & PravinThangaraj. “Distribution Line Monitoring System for the Detection of Power Theft using Power Line Communication” [5] Jawad Nagi, Keem Siah Yap, Sieh Kiong Tiong, Syed Khaleel Ahmed and Malik Mahamad, "Non-Technical Loss Detection for Metered Consumers using Support Vector Machines,” IEEETransactionsonPowerDelivery, vol0.25, April 2010, PP.1162-1171. [6] Amarendar Singh Kahar, Pilla Naresh Babu, Athi Manideep, P Jaya Raj, Vidya Sagar, International Journal of Scientific Engineering and Technology Research, “power theft identification system in distribution lines using differential power measurement,” vol. 4, issue 9, April 2015, PP. 1651-1655. [7] Amin S. Mehmood, T. Choudhry, M.A. Hanif, “A Reviewing the Technical Issues for the Effective Construction of Automatic Meter-Reading System” in International Conference on Microelectronics, 2005 IEEE. [8] Bharath P, Ananth N, Vijetha S,JyothiPrakashK.V.2008. “Wireless Automated Digital Energy Meter”. IEEE International Conference on Sustainable Energy Technologies, pp: 564-567. [9] GSM Based Electricity Theft Identification in Distribution Systems Kalaivani.R1,Gowthami.M1,Savitha.S1,Karthick.N1, Mohanvel.S2 Student, EEE, Knowledge Institute of Technology, Salem, India Assistant professor, EEE, Knowledge Institute of Technology, Salem, India [10] A.J. Dick, “Theft of Electricity – how UK Electricity companies Detect and Deter” ,Proc. European Convention Security and Detection, Brighton, U.K., May 1995, pp. 90–95. [11] T.B. Smith, “Electricity theft- comparative analysis ”,Energy Policy, vol. 32, pp. 2067–2076, Aug. 2003. [12] “Overview of power distribution” Ministry of Power, Govt. of India, [13] R. Cespedes, H. Duran, H Hernandez, and A. Rodriguez, “Assessment of electrical energylossesintheColombian power system”, IEEE Trans. on Power Apparatus and Systems, vol. 102, pp. 3509–3515, Nov. 1983. [14] J. Nagi K.S. Yap, F. Nagi “NTL Detection of Electricity Theft and Abnormalities for Large Power Consumers In TNB Malaysia”, Proceedings of 2010 IEEE Student Conference on Research and Development (SCOReD 2010), 13 - 14 Dec 2010, Putrajaya, Malaysia [15] Vineetha Paruchuri ,Sitanshu Dubey “An Approach to Determine Non-Technical Energy Losses in India”, Feb. 19~22, 2012 ICACT2012 [16] Soma Shekara Sreenadh ReddyDepuru,LingfengWang, and Vijay Devabhaktuni,“SupportVectorMachineBased Data Classification for Detection of Electricity Theft”, 978-1-61284-788-7/11/2011 IEEE . [17] Jawad Nagi, Keem Siah Yap, Sieh Kiong Tiong, Member, IEEE, Syed Khaleel Ahmed, Member, IEEE, and Malik Mohamad, “Nontechnical Loss Detection for Metered Customers in Power Utility Using Support Vector Machines” IEEE Transactions on Power Delivery, VOL. 25, NO. 2, April 2010.