All papers submitted to IJMRR are subject to a double-blind peer review process. Organizational Behavior, Technology, and Operations Management, Production & Operation Management, The journal publishes original works with practical significance and academic value. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management.
Electricity-theft detection in smart grids based on deep learningjournalBEEI
lectricity theft is a major concern for utilities. The smart grid (SG) infrastructure generates a massive amount of data, including the power consumption of individual users. Utilizing this data, machine learning, and deep learning techniques can accurately identify electricity theft users. A convolutional neural network (CNN) model for automatic electricity theft detection is presented. This work considers experimentation to find the best configuration of the sequential model (SM) for classifying and identifying electricity theft. The best performance has been obtained in two layers with the first layer consists of 128 nodes and the second layer is 64 nodes. The accuracy reached up to 0.92. This enables the design of high-performance electricity signal classifiers that can be used in several applications. Designing electricity signals classifiers has been achieved using a CNN and the data extracted from the electricity consumption dataset using an SM. In addition, the blue monkey (BM) algorithm is used to reduce the features in the dataset. In this respect, the focusing of this work is to reduce the features in the dataset to obtain high-performance electricity signals classifier models.
EFFICIENT POWER THEFT DETECTION FOR RESIDENTIAL CONSUMERS USING MEAN SHIFT DA...ijaia
Energy theft constitutes an issue of great importance for electricity operators. The attempt to detect and reduce non-technical losses is a challenging task due to insufficient inspection methods. With the evolution of advanced metering infrastructure (AMI) in smart grids, a more complicated status quo in energy theft has emerged and many new technologies are being adopted to solve the problem. In order to identify illegal residential consumers, a computational method of analyzing and identifying electricity consumption patterns of consumers based on data mining techniques has been presented. Combining principal component analysis (PCA) with mean shift algorithm for different power theft scenarios, we can now cope with the power theft detection problem sufficiently. The overall research has shown encouraging results in residential consumers power theft detection that will help utilities to improve the reliability, security and operation of power network.
DISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGYecij
The Distributed transformer meter is located in all user building blocks and a server is preserved from the facility contributor. The electricity is major part for consuming the energy level with cost and obtaining the energy used by customers can be maintain in every sequence of manual process is very difficult to identify. There are some common techniques that are used by customers for theft and leakage of power in one particular transformer and these robberies are detected using GSM. These meters provide the automatic readings data with help of Apriori algorithm. It will reduce the labor task and financial expenditure by adopting the automatic meter reading is to provide the bill entry process. This is very useful and helps to
households consumers.
Machine learning-based electricity theft detection using support vector machinesIJECEIAES
Electricity theft is a serious issue that many nations face, especially in developing areas where non-technical losses can make up a significant percentage of the overall losses sustained by utilities. Electricity theft detection (ETD) is a very challenging task because it frequently introduces irregularities in customer electricity consumption patterns. In recent times, machine learning (ML) techniques have been investigated as a potential solution for ETD. In this research, author propose electricity theft detection based on four kernel functions of support vector machines (SVM). The proposed method analyzes the electricity consumption patterns and then predicts the category of the user. The kernel functions utilized includes polynomial, sigmoid, radial basis function (RBF) and linear kernel function. For experimentation and model training, a dataset of Pakistani utility company is used, which contains the electricity consumption information. The results highlight SVM method works well for accurate ETD. The detection accuracy of the various kernel functions of SVM is 83%, 79%, 80%, and 76% for RBF, polynomial, sigmoid, and linear kernel functions, respectively, demonstrating the effectiveness of the proposed SVM-based method for theft detection. By leveraging these ML-based methods, utility companies can strengthen their ability to detect and prevent electricity theft, leading to improved revenue management and dependability of services.
Anomalies detection for smart-home energy forecasting using moving averageIJECEIAES
In the past few years, the increase in the relation between the physical and digital world over the internet was witnessed. Even though the applications can enhance smart home systems, it is still early stages and challenges in the field of internet of things (IoT). An extreme level of data quality (DQ) system management is essential to produce a meaningful vision. However, in most home energy management system has no straightforward process of removing abnormal data. Hence, the research aims to propose and validate the model of anomaly detection for power consumption in real-time. The moving average (MA) approach identifies and removes abnormal energy consumption data. The results obtained from the forecasting time series auto regressive integrated moving average (ARIMA) model demonstrated that the proposed heuristics effectively enhanced energy usage forecasting. The selection of optimum parameter values for the MA was comprehended for time-series forecasting error minimization by comparing mean squared error (MSE). These outcomes proved the effectiveness of the existing technique and precision of choice of the appropriate. Therefore, the method can effectively route the cleaned sequence data streams in a real-time environment, which is valuable for spotting the anomalies and eliminating for enhancing energy usage time series.
A Review of anomaly detection techniques in advanced metering infrastructurejournalBEEI
Advanced Metering Infrastructure (AMI) is a component of electrical networks that combines the energy and telecommunication infrastructure to collect, measure and analyze consumer energy consumptions. One of the main elements of AMI is a smart meter that used to manage electricity generation and distribution to end-user. The rapid implementation of AMI raises the need to deliver better maintenance performance and monitoring more efficiently while keeping consumers informed on their consumption habits. The convergence from analog to digital has made AMI tend to inherit the current vulnerabilities of digital devices that prone to cyber-attack, where attackers can manipulate the consumer energy consumption for their benefit. A huge amount of data generated in AMI allows attackers to manipulate the consumer energy consumption to their benefit once they manage to hack into the AMI environment. Anomalies detection is a technique can be used to identify any rare event such as data manipulation that happens in AMI based on the data collected from the smart meter. The purpose of this study is to review existing studies on anomalies techniques used to detect data manipulation in AMI and smart grid systems. Furthermore, several measurement methods and approaches used by existing studies will be addressed.
Electricity-theft detection in smart grids based on deep learningjournalBEEI
lectricity theft is a major concern for utilities. The smart grid (SG) infrastructure generates a massive amount of data, including the power consumption of individual users. Utilizing this data, machine learning, and deep learning techniques can accurately identify electricity theft users. A convolutional neural network (CNN) model for automatic electricity theft detection is presented. This work considers experimentation to find the best configuration of the sequential model (SM) for classifying and identifying electricity theft. The best performance has been obtained in two layers with the first layer consists of 128 nodes and the second layer is 64 nodes. The accuracy reached up to 0.92. This enables the design of high-performance electricity signal classifiers that can be used in several applications. Designing electricity signals classifiers has been achieved using a CNN and the data extracted from the electricity consumption dataset using an SM. In addition, the blue monkey (BM) algorithm is used to reduce the features in the dataset. In this respect, the focusing of this work is to reduce the features in the dataset to obtain high-performance electricity signals classifier models.
EFFICIENT POWER THEFT DETECTION FOR RESIDENTIAL CONSUMERS USING MEAN SHIFT DA...ijaia
Energy theft constitutes an issue of great importance for electricity operators. The attempt to detect and reduce non-technical losses is a challenging task due to insufficient inspection methods. With the evolution of advanced metering infrastructure (AMI) in smart grids, a more complicated status quo in energy theft has emerged and many new technologies are being adopted to solve the problem. In order to identify illegal residential consumers, a computational method of analyzing and identifying electricity consumption patterns of consumers based on data mining techniques has been presented. Combining principal component analysis (PCA) with mean shift algorithm for different power theft scenarios, we can now cope with the power theft detection problem sufficiently. The overall research has shown encouraging results in residential consumers power theft detection that will help utilities to improve the reliability, security and operation of power network.
DISTRIBUTED TRANSFORMER ENERGY METER USING GSM TECHNOLOGYecij
The Distributed transformer meter is located in all user building blocks and a server is preserved from the facility contributor. The electricity is major part for consuming the energy level with cost and obtaining the energy used by customers can be maintain in every sequence of manual process is very difficult to identify. There are some common techniques that are used by customers for theft and leakage of power in one particular transformer and these robberies are detected using GSM. These meters provide the automatic readings data with help of Apriori algorithm. It will reduce the labor task and financial expenditure by adopting the automatic meter reading is to provide the bill entry process. This is very useful and helps to
households consumers.
Machine learning-based electricity theft detection using support vector machinesIJECEIAES
Electricity theft is a serious issue that many nations face, especially in developing areas where non-technical losses can make up a significant percentage of the overall losses sustained by utilities. Electricity theft detection (ETD) is a very challenging task because it frequently introduces irregularities in customer electricity consumption patterns. In recent times, machine learning (ML) techniques have been investigated as a potential solution for ETD. In this research, author propose electricity theft detection based on four kernel functions of support vector machines (SVM). The proposed method analyzes the electricity consumption patterns and then predicts the category of the user. The kernel functions utilized includes polynomial, sigmoid, radial basis function (RBF) and linear kernel function. For experimentation and model training, a dataset of Pakistani utility company is used, which contains the electricity consumption information. The results highlight SVM method works well for accurate ETD. The detection accuracy of the various kernel functions of SVM is 83%, 79%, 80%, and 76% for RBF, polynomial, sigmoid, and linear kernel functions, respectively, demonstrating the effectiveness of the proposed SVM-based method for theft detection. By leveraging these ML-based methods, utility companies can strengthen their ability to detect and prevent electricity theft, leading to improved revenue management and dependability of services.
Anomalies detection for smart-home energy forecasting using moving averageIJECEIAES
In the past few years, the increase in the relation between the physical and digital world over the internet was witnessed. Even though the applications can enhance smart home systems, it is still early stages and challenges in the field of internet of things (IoT). An extreme level of data quality (DQ) system management is essential to produce a meaningful vision. However, in most home energy management system has no straightforward process of removing abnormal data. Hence, the research aims to propose and validate the model of anomaly detection for power consumption in real-time. The moving average (MA) approach identifies and removes abnormal energy consumption data. The results obtained from the forecasting time series auto regressive integrated moving average (ARIMA) model demonstrated that the proposed heuristics effectively enhanced energy usage forecasting. The selection of optimum parameter values for the MA was comprehended for time-series forecasting error minimization by comparing mean squared error (MSE). These outcomes proved the effectiveness of the existing technique and precision of choice of the appropriate. Therefore, the method can effectively route the cleaned sequence data streams in a real-time environment, which is valuable for spotting the anomalies and eliminating for enhancing energy usage time series.
A Review of anomaly detection techniques in advanced metering infrastructurejournalBEEI
Advanced Metering Infrastructure (AMI) is a component of electrical networks that combines the energy and telecommunication infrastructure to collect, measure and analyze consumer energy consumptions. One of the main elements of AMI is a smart meter that used to manage electricity generation and distribution to end-user. The rapid implementation of AMI raises the need to deliver better maintenance performance and monitoring more efficiently while keeping consumers informed on their consumption habits. The convergence from analog to digital has made AMI tend to inherit the current vulnerabilities of digital devices that prone to cyber-attack, where attackers can manipulate the consumer energy consumption for their benefit. A huge amount of data generated in AMI allows attackers to manipulate the consumer energy consumption to their benefit once they manage to hack into the AMI environment. Anomalies detection is a technique can be used to identify any rare event such as data manipulation that happens in AMI based on the data collected from the smart meter. The purpose of this study is to review existing studies on anomalies techniques used to detect data manipulation in AMI and smart grid systems. Furthermore, several measurement methods and approaches used by existing studies will be addressed.
Neural computing is now one of the most promising technologies in all fields of engineering,
resulting in the development of a number of Artificial Neural Networks (ANN). Double circuit transmission lines
are being employed in the distribution of power to consumers and have become more widespread than single
transmission line, as they increase the electric power transmission capacity and the reliability of an electrical
system. Losses along transmission lines occur due to faults. Possible faults on the transmission line were
predicted using Artificial Neutral Network. In this work, the simulation of fault on a 132kV double circuit
transmission lines using MATLAB was undertaken. Parameters considered during the simulation were the input
of the network which is the fault current value at each fault location while the output of the network is the fault
location. The efficiency of the neural network was tested and verified. This approach provided satisfactory
results with accuracy of 95% or higher.
IRJET-A Novel Approach for Automatic Monitoring of Power Consumption using S...IRJET Journal
In Smart Grid, the smart meters are versatile role with intelligent capabilities in order to meet the consumer's demands and their each objective. Smart meter can measure and communicate detailed real time electricity usage, facilitate remote real time monitoring and control power consumptions and consumers are provided with real time pricing and analyzed usage information, which is a technical data to be transmitted to the grid, who are utility providers. More detailed feedback on each appliance to the user.This paper gives an overview of the security issues regarding power grids. It is targeted to use case scenarios, namely smart metering, and home gateway for applications like electric cars and home multimedia contents distribution over the power grid.
ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors, in consultation with the Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal.
Alinteri Journal of Agriculture Sciences The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the field of agriculture, fisheries, veterinary, biology, and closely related disciplines. We adopt the policy of providing open access to readers who may be interested in recent developments. Is being published online biannually as of 2007.
Neural computing is now one of the most promising technologies in all fields of engineering,
resulting in the development of a number of Artificial Neural Networks (ANN). Double circuit transmission lines
are being employed in the distribution of power to consumers and have become more widespread than single
transmission line, as they increase the electric power transmission capacity and the reliability of an electrical
system. Losses along transmission lines occur due to faults. Possible faults on the transmission line were
predicted using Artificial Neutral Network. In this work, the simulation of fault on a 132kV double circuit
transmission lines using MATLAB was undertaken. Parameters considered during the simulation were the input
of the network which is the fault current value at each fault location while the output of the network is the fault
location. The efficiency of the neural network was tested and verified. This approach provided satisfactory
results with accuracy of 95% or higher.
IRJET-A Novel Approach for Automatic Monitoring of Power Consumption using S...IRJET Journal
In Smart Grid, the smart meters are versatile role with intelligent capabilities in order to meet the consumer's demands and their each objective. Smart meter can measure and communicate detailed real time electricity usage, facilitate remote real time monitoring and control power consumptions and consumers are provided with real time pricing and analyzed usage information, which is a technical data to be transmitted to the grid, who are utility providers. More detailed feedback on each appliance to the user.This paper gives an overview of the security issues regarding power grids. It is targeted to use case scenarios, namely smart metering, and home gateway for applications like electric cars and home multimedia contents distribution over the power grid.
ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors, in consultation with the Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal.
Alinteri Journal of Agriculture Sciences The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the field of agriculture, fisheries, veterinary, biology, and closely related disciplines. We adopt the policy of providing open access to readers who may be interested in recent developments. Is being published online biannually as of 2007.
Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management. IJMRR is an international forum for research that advances the theory and practice of management. The journal publishes original works with practical significance and academic value.
ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors, in consultation with the Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal.
IJMRR is an international forum for research that advances the theory and practice of management. All papers submitted to IJMRR are subject to a double-blind peer review process. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management.
Alinteri Journal of Agriculture Sciences aims to create an environment for researchers to introduce, share, read, and discuss recent scientific progress. We adopt the policy of providing open access to readers who may be interested in recent developments.
Alinteri Journal of Agriculture Sciences is being published online biannually as of 2007. The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the fields of agriculture, fisheries, veterinary, biology, and closely related disciplines. Alinteri Journal of Agriculture Sciences aims to create an environment for researchers to introduce, share, read, and discuss recent scientific progress. We adopt the policy of providing open access to readers who may be interested in recent developments.
Alinteri Journal of Agriculture Sciences aims to create an environment for researchers to introduce, share, read, and discuss recent scientific progress. We adopt the policy of providing open access to readers who may be interested in recent developments. Alinteri Journal of Agriculture Sciences is being published online biannually as of 2007. The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the fields of agriculture, fisheries, veterinary, biology, and closely related disciplines.
IJERST offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors, in consultation with the Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal.
ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors.
The journal publishes original works with practical significance and academic value. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management.
All papers submitted to IJMRR are subject to a double-blind peer review process. IJMRR is an international forum for research that advances the theory and practice of management. The journal publishes original works with practical significance and academic value. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management.
ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process. Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal. International Journal of Engineering Research and Science & Technology (IJERST) is an international online journal in English published Quarterly. All submitted research articles are subjected to immediate rapid screening by the editors.
The journal publishes original works with practical significance and academic value. All papers submitted to IJMRR are subject to a double-blind peer review process. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management.
Alinteri Journal of Agriculture Sciences is being published online biannually as of 2007. Alinteri Journal of Agriculture Sciences aims to create an environment for researchers to introduce, share, read, and discuss recent scientific progress. The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the fields of agriculture, fisheries, veterinary, biology, and closely related disciplines. We adopt the policy of providing open access to readers who may be interested in recent developments.
All submitted research articles are subjected to immediate rapid screening by the editors, in consultation with the Editorial Board or others working in the field as appropriate, to ensure they are likely to be of the level of interest and importance appropriate for the journal. ijerst offers a fast publication schedule whilst maintaining rigorous peer review; the use of recommended electronic formats for article delivery expedites the process.
The journal publishes original works with practical significance and academic value. All papers submitted to IJMRR are subject to a double-blind Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, public sector management. peer review process. IJMRR is an international forum for research that advances the theory and practice of management.
All papers submitted to IJMRR are subject to a double-blind peer review process. The journal publishes original works with practical significance and academic value. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management. IJMRR is an international forum for research that advances the theory and practice of management.
The journal publishes original works with practical significance and academic value. Authors are invited to submit theoretical or empirical papers in all aspects of management, including strategy, human resources, marketing, operations, technology, information systems, finance and accounting, business economics, and public sector management. IJMRR is an international forum for research that advances the theory and practice of management. All papers submitted to IJMRR are subject to a double-blind peer review process.
Alinteri Journal of Agriculture Sciences aims to create an environment for researchers to introduce, share, read, and discuss recent scientific progress. We adopt the policy of providing open access to readers who may be interested in recent developments. The journal is an open access, international, double-blind peer-reviewed journal publishing research articles, Invited reviews, short communications, and letters to the Editor in the field of agriculture, fisheries, veterinary, biology, and closely related disciplines. Alinteri Journal of Agriculture Sciences is being published online biannually as of 2007.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Home assignment II on Spectroscopy 2024 Answers.pdf
journal about operation management
1. ISSN: 2249-7196
IJMRR/July 2023/ Volume 13/Issue 3/01-11
Mrs. CH. Harshini/ International Journal of Management Research & Review
ELECTRICITY THEFT DETECTION IN POWER GRIDS WITH
DEEP LEARNING AND RANDOM FORESTS
Mrs.CH Harshini, G. Deepthi, G. Akshaya Reddy, G. Vijaya Laxmi, G. Rajasree
Associate professor,Scholar2
,Scholar3
, Scholar4
, Scholar5
Department of Computer Science and Engineering, Malla Reddy Engineering College for Women,
Hyderabad, India.
chikkaharshini@gmail.com, gattudeepthi06@gmail.com , gudaakshayareddy2501@gmail.com ,
vijayalaxmig219@gmail.com ,gurralarajasree@gmail.com
ABSTRACT:
As one of the major factors of the nontechnical losses (NTLs) in distribution networks, the
electricity theft causes significant harm to power grids, which influences power supply quality and
reduces operating profits. In order to help utility companies solve the problems of inefficient
electricity inspection and irregular power consumption, a novel hybrid convolutional neural
network-random forest (CNN-RF) model for automatic electricity theft detection is presented in
this paper. In this model, a convolutional neural network (CNN) firstly is designed to learn the
features between different hours of the day and different days from massive and varying smart
meter data by the operations of convolution and down sampling. In addition, a dropout layer is
added to retard the risk of over fitting, and the back propagation algorithm is applied to update
network parameters in the training phase. And then, the random forest (RF) is trained based on the
obtained features to detect whether the consumer steals electricity. To build the RF in the hybrid
model, the grid search algorithm is adopted to determine optimal parameters. Finally, experiments
are conducted based on real energy consumption data, and the results show that the proposed
detection model outperforms other methods in terms of accuracy and efficiency.
Keywords: CNN, RF, NTL, hybrid model, electricity model.
2. Mrs. CH. Harshini / International Journal of Management Research & Review
1. INTRODUCTION:
The loss of energy in electricity transmission and distribution is an important problem faced by
power companies all over the world. The energy losses are usually classified into technical losses (TLs)
and nontechnical losses (NTLs) [1]. The TL is inherent to the transportation of electricity, which is
caused by internal actions in the power system components such as the transmission liner and
transformers [2]; the NTL is defined as the difference between total losses and TLs, which is primarily
caused by electricity theft. Actually, the electricity theft occurs mostly through physical attacks like line
tapping, meter breaking, or meter reading tampering [3]. These electricity fraud behaviours may bring
about the revenue loss of power companies. As an example, the losses caused by electricity theft are
estimated as about
$4.5 billion every year in the United States (US) [4]. And it is estimated that utility companies
worldwide lose more than 20 billion every year in the form of electricity theft [5]. In addition, electricity
theft behaviours can also affect the power system safety. For instance, the heavy load of electrical
systems caused by electricity theft may lead to fires, which threaten the public safety.
Therefore, accurate electricity theft detection is crucial for power grid safety and stableness.
With the implementation of the advanced metering infrastructure (AMI) in smart grids, power utilities
obtained massive amounts of electricityconsumption data at a high frequency from smart meters, which
is helpful for us to detect electricity theft [6, 7]. However, every coin has two sides; the AMI network
opens the door for some new electricity theft attacks. These attacks in the AMI can be launched by
various means such as digital tools and cyber attacks. The primary means of electricity theft detection
include humanly examining unauthorized line diversions, comparing malicious meter records with the
benign ones, and checking problematic equipment or hardware. However, these methods are extremely
time-consuming and costly during full verification of all meters in a system. Besides, these manual
approaches cannot avoid cyber attacks. In order to solve the problems mentioned above, many
approaches have been put forward in the past years. These methods are mainly categorized into state-
based, game-theory-based, and artificial-intelligence-based models [
The key idea of state-based detection [9–11] is based on special devices such as wireless sensors and
distribution transformers [12]. These methods could detect electricity theft but rely on the real- time
acquisition of system topology and additional physical measurements, which is sometimes unattainable.
Game-based detection schemes formulate a game between electricity utility and theft, and then
different distributions of normal and abnormal behaviours can be derived from the game equilibrium.
As detailed in [13], they can achieve a low cost and reasonable result for
3. Mrs. CH. Harshini / International Journal of Management Research & Review
reducing energy theft. Yet formulating the utility function of all players (e.g., distributors, regulators,
and thieves) is still a challenge. Artificial-intelligence-based methods include machine learning and deep
learning methods. Existing machine learning solutions can be further categorized into classification and
clustering models, as is presented in [14–17]. Although aforementioned machine learning detection
methods are innovative and remarkable, their performances are still not satisfactory enough for practice.
For example, most of these approaches require manual feature extraction, which partlyresults from their
limited ability to handle high- dimensional data. Indeed, traditional hand- designed features include the
mean, standard deviation, maximum, and minimum of consumption data. The process of manual feature
extraction is a tedious and time-consuming task and cannot capture the 2D features from smart meter
data
Deep learning techniques for electricity theft detection are studied in [18], where the authors present a
comparison between different deep learning architectures such as convolutional neuralnetworks (CNNs),
long-short-term memory (LSTM) recurrent neural networks (RNNs), and stacked autoencoders.
However, the performance of the detectors is investigated using synthetic data, which does not allow a
reliable assessment of the detector‟s performance compared with shallow architectures. Moreover, the
authors in [19] proposed a deep neural network- (DNN-) based customer-specific detector that can
efficiently thwart such cyber attacks. In recent years, the CNN has been applied to generate useful and
discriminative features from raw data and has wide applications in different areas [20–22]. These
applications motivate the CNN applied for feature extraction from high-resolution smart meter data in
electricity theft detection. In [23], a wide and deep convolutional neural network (CNN) model was
developed and applied to analyse the electricity theft in smart grids.
In a plain CNN, the softmax classifier layer is the same as a general single hidden layer feedforward
neural network (SLFN) and trained through the backpropagation algorithm [24]. On the one hand, the
SLFN is likely to be overtrained leading to degradation of its generalization performance when it
performs the backpropagation algorithm. On the other hand, the backpropagation algorithm is based on
empirical risk minimization, which is sensitive to local minima of training errors. As mentioned above,
because of the shortcoming of the softmax classifier, the CNN is not always optimal for classification,
although it has shown great advantages in the feature extraction process. Therefore, it is urgent to find a
better classifier which not only owns the similar ability as the softmax classifier but also can make full
use of theobtained features. In most classifiers, the random
4. Mrs. CH. Harshini / International Journal of Management Research & Review
forest (RF) classifier takes advantage of two powerful machine learning techniques including bagging
and random feature selection which could overcome the limitation of the softmax classifier. Inspired by
these particular works, a novel convolutional neural network-random forest (CNN-RF) model is adopted
for electricity theft detection. The CNN is proposed to automatically capture various features of
customers‟ consumption behaviours from smart meter data, which is one of the key factors in the success
of the electricity theft detection model. To improve detection performance, the RF is used to replace the
softmax classifier detecting the patterns of consumers based on extracted features. This model has been
trained and tested with real data from allthe customers of electricity utility in Ireland and London.
2. LITERATURE SURVEY
In this paper author is using combination of CNN (Convolution Neural Networks) and Random
Forest to detect theft from electricity power grid as this theft will cause huge financial loss and
disturbance in power supply. To efficiently detect theft from power grid author combining CNN and
Random Forest Algorithms and after combining we are getting better prediction accuracy compare to
normal algorithms. In power consumption if there is huge consumption in certain period then in dataset
we will get value as 1 which indicates energy theft else we will have 0 as class label which means
normal energy usage.
The main aim of the methodology described in this paper is to provide the utilities with a ranked
list of their customers, according totheir probability of having an anomaly in their electricity meter.
As shown in Figure 1, the electricity theft detection system is divided into three main stages as
follows:(i)Data analysis and preprocess: to explain the reason of applying a CNN for feature extraction,
we firstly analyse the factors that affectthe behaviours of electricity consumers. For the data preprocess,
we consider several tasks such as data cleaning (resolving outliers), missing value imputation, and data
transformation (normalization).(ii)Generation of train and test datasets: to evaluate the performance of
the methodology described in this paper, the preprocessed dataset is split into the train dataset and test
dataset by the cross-validation algorithm. The train dataset is used to train the parameters of our model,
whilst the test dataset is used to assess how well the model generalizes to new, unseen customer
samples. Given that electricity theft consumers remarkably outnumber nonfraudulent ones, the
imbalanced nature of the dataset can have a major negative impact on the performance of supervised
machine learning methods. To reduce
5. Mrs. CH. Harshini / International Journal of Management Research & Review
this bias, the synthetic minority oversampling technique (SMOT) algorithm is used to make the number
of electricity thefts and nonfraudulent consumers equal in the train dataset.(iii)Classification using the
CNN-RF model: in the proposed CNN-RF model, the CNN firstly is designed to learn the features
between different hours of the day and different days from massive and varying smart meter data by the
operations of convolution and downsampling. Andthen, RF classification is trained based on theobtained
features to detect whether the consumer steals electricity. Finally, the confusion matrix and receiver-
operating characteristic (ROC) curves areused to evaluate the accuracy of the CNN-RFmodel on the test
dataset.
3. METHODOLOGYMODULES:
Agreeable means peoples who use words such as „am, will have and this words also refers as
ARTICLES or AUXILIARY VERBS‟ etc will come in this category. MRC dictionary contains allwords
of this categories and by applying this dictionary on user‟s tweets we can predict person category as
agreeable.
Neuroticism means peoples in this category is consider as sentiment or emotion, peoples who
use words such as „ugly, nasty, sad‟ etc will come under this category. By looking for such words in
tweets we can predict score of this category.
Extroversion means peoples of this category are friendly and person who has many number of
friends or followers or following in twitter profile will comes under this category.
Conscientious means peoples who express hard working ideas in their post will come under this
category.
So by analysing above 5 features O (openness), C (Conscientious), E (Extroversion), A
(Agreeable), N (Neuroticism) from twitter profile and post we can predict personality of a person.
We will find average of each features from tweets and then apply Pearson Correlation formulato
get score for all five features. If score > 0.1 for any feature then person belongs to that category. If
person has 0.1 value for more than 1 features then that person personality belongs to that many
categories. For example same person can be predicted as openness and conscientious etc.
All features values we will apply using SVM, Random Forest, Naïve Bayes & Logistic
Regression algorithms to calculate accuracy ofdataset and algorithms.
6. Mrs. CH. Harshini / International Journal of Management Research & Review
In above screen with CNN-RF we got 100% accuracy and now click on „CNN with SVM‟button to train
dataset with CNN and SVM
In above screen with CNN-SVM we got 99% accuracy and now click on „Run Random Forest‟ button to
train alone RF on dataset
In above screen with alone Random Forest we got 94% accuracy and now click on „Run SVM
Algorithm‟ button to train alone SVM with abovedataset
7. Mrs. CH. Harshini / International Journal of Management Research & Review
In above screen with alone SVM we got 96% accuracy and now click on „Predict Electricity Theft‟
button to upload test data
In above screen selecting and uploading „test.csv‟ file and then click on „Open‟ button to load test data
and to get below prediction result
In above screen in square brackets we can see test data and after square bracket we can see prediction
result as „record detected as ENERGY THEFT‟ or„record NOT detected as ENERGY THEFT‟. Now
8. Mrs. CH. Harshini / International Journal of Management Research & Review
click on „Comparison Graph‟ button to get below graph
In above graph x-axis represents algorithm names and y-axis represents precision, recall, FSCORE and
Accuracy for each algorithm and in all algorithms CNN-RF is giving 100% accuracy.
CONCLUSION
In this paper, a novel CNN-RF model is presented to detect electricity theft. In this model, the CNN is
similar to an automatic feature extractor in investigating smart meter data and the RF is the output
classifier. Because a large number of parameters must be optimized that increase the risk of overfitting,
a fully connected layer with a dropout rate of 0.4 is designed during the training phase. In addition, the
SMOT algorithm is adoptedto overcome the problem of data imbalance. Somemachine learning and deep
learning methods such as SVM, RF, GBDT, and LR are applied to the same problem as a benchmark,
and all those methods have been conducted on SEAI and LCL datasets. The results indicate that the
proposed
CNN-RF model is quite a promising classificationmethod in the electricity theft detection field because
of two properties: The first is that featurescan be automatically extracted by the hybrid model, while the
success of most other traditional classifiers relies largely on the retrieval of good hand-designed features
which is a laborious and time-consuming task. The second lies in that the hybrid model combines the
advantages of the RF and CNN, as both are the most popular and successful classifiers in the electricity
theft detection field. Since the detection of electricity theft affects the privacy of consumers, the future
work will focus on investigating how the granularity and duration of smart meter data might affect this
privacy. Extending the proposed hybridCNN-RF model to other applications (e.g., load forecasting) is a
task worth investigating.
9. Mrs. CH. Harshini / International Journal of Management Research & Review
REFERANCES
1. S. S. S. R. Depuru, L. Wang, and V. Devabhaktuni, “Electricity theft: overview, issues,
prevention and a smart meter based approach to control theft,” Energy Policy, vol. 39, no. 2,
pp. 1007–1015, 2011.View at: Publisher Site | Google Scholar
2. J. P. Navani, N. K. Sharma, and S. Sapra, “Technical and non-technical losses in power system
and its economic consequence in Indianeconomy,” International Journal of
Electronics and Computer Science Engineering, vol. 1, no. 2, pp. 757–761, 2012.View at:
Google Scholar
3. S. McLaughlin, B. Holbert, A. Fawaz, R. Berthier, and S. Zonouz, “A multi-sensor energy theft
detection framework for advanced metering infrastructures,” IEEE Journal on Selected Areas in
Communications, vol. 31, no. 7, pp. 1319–1330, 2013.View at: Publisher Site | Google
Scholar
4. P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE
Security & Privacy Magazine,vol. 7, no. 3, pp. 75–77, 2009.Viewat: Publisher Site | Google
Scholar
5. T. B. Smith, “Electricity theft: a comparative analysis,” Energy Policy, vol. 32, no. 1, pp.
2067–2076, 2004.View at: Publisher Site | Google Scholar
6. J. I. Guerrero, C. León, I. Monedero, F. Biscarri, and J. Biscarri, “Improving knowledge-based
systems with statistical techniques, text mining, and neural networks for non-technical loss
detection,” Knowledge-Based Systems, vol. 71, no. 4, pp. 376–388, 2014.View at: Publisher
Site | Google Scholar
7. C. C. O. Ramos, A. N. Souza, G. Chiachia,
A. X. Falcão, and J. P. Papa, “A novel algorithm for feature selection using harmony search and
its application for non-technical losses
detection,” Computers & Electrical Engineering, vol. 37, no. 6, pp. 886–894, 2011.View at:
Publisher Site | Google Scholar
8. P. Glauner, J. A. Meira, P. Valtchev, R. State, and F. Bettinger, “The challenge of non-technical
loss detection using artificial intelligence: a surveyficial intelligence: a survey,” International
Journal of Computational Intelligence Systems, vol. 10, no. 1, pp. 760–775, 2017.View at:
Publisher Site | Google Scholar
10. Mrs. CH. Harshini / International Journal of Management Research & Review
9. S.-C. Huang, Y.-L. Lo, and C.-N. Lu, “Non-technical loss detection using state estimation and
analysis of variance,” IEEETransactions on Power Systems, vol. 28, no. 3, pp. 2959–2966,
2013.View at: Publisher Site | Google Scholar
10. O. Rahmati, H. R. Pourghasemi, and A. M. Melesse, “Application of GIS-based data driven
random forest and maximum entropy models for groundwater potential mapping: a case study at
Mehran region, Iran,” CATENA, vol. 137, pp. 360–372, 2016.View at: Publisher Site |
GoogleScholar