Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new ...Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new energy theft detection(ETD)techniques have been proposed by utilising different data mining(DM)techniques,state&network(S&N)based techniques,and game theory(GT)techniques.Here,a detailed survey is presented where many state-of-the-art ETD techniques are studied and analysed for their strengths and limitations.Three levels of taxonomy are presented to classify state-of-the-art ETD techniques.Different types and ways of energy theft and their consequences are studied and summarised and different parameters to benchmark the performance of proposed techniques are extracted from literature.The challenges of different ETD techniques and their mitigation are suggested for future work.It is observed that the literature on ETD lacks knowledge management techniques that can be more effective,not only for ETD but also for theft tracking.This can help in the prevention of energy theft,in the future,as well as for ETD.展开更多
With the application of the advanced measurement infrastructure in power grids,data driven electricity theft detection methods become the primary stream for pinpointing electricity thieves.However,owing to anomaly sub...With the application of the advanced measurement infrastructure in power grids,data driven electricity theft detection methods become the primary stream for pinpointing electricity thieves.However,owing to anomaly submergence,which shows that the usage patterns of electricity thieves may not always deviate from those of normal users,the performance of the existing usage-pattern-based method could be affected.In addition,the detection results of some unsupervised learning algorithm models are abnormal degrees rather than“0-1”to ascertain whether electricity theft has occurred.The detection with fixed threshold value may lead to deviation and would not be sufficiently flexible to handle the detection for different scenes and users.To address these issues,this study proposes a new electricity theft detection method based on load shape dictionary of users.A corresponding strategy for tunable threshold is proposed to optimize the detection effect of electricity theft,and the efficacy and applicability of the proposed adaptive electricity theft detection method were verified from numerical experiments.展开更多
One of the major concerns for the utilities in the Smart Grid(SG)is electricity theft.With the implementation of smart meters,the frequency of energy usage and data collection from smart homes has increased,which make...One of the major concerns for the utilities in the Smart Grid(SG)is electricity theft.With the implementation of smart meters,the frequency of energy usage and data collection from smart homes has increased,which makes it possible for advanced data analysis that was not previously possible.For this purpose,we have taken historical data of energy thieves and normal users.To avoid imbalance observation,biased estimates,we applied the interpolation method.Furthermore,the data unbalancing issue is resolved in this paper by Nearmiss undersampling technique and makes the data suitable for further processing.By proposing an improved version of Zeiler and Fergus Net(ZFNet)as a feature extraction approach,we had able to reduce the model’s time complexity.To minimize the overfitting issues,increase the training accuracy and reduce the training loss,we have proposed an enhanced method by merging Adaptive Boosting(AdaBoost)classifier with Coronavirus Herd Immunity Optimizer(CHIO)and Forensic based Investigation Optimizer(FBIO).In terms of low computational complexity,minimized over-fitting problems on a large quantity of data,reduced training time and training loss and increased training accuracy,our model outperforms the benchmark scheme.Our proposed algorithms Ada-CHIO andAda-FBIO,have the low MeanAverage Percentage Error(MAPE)value of error,i.e.,6.8%and 9.5%,respectively.Furthermore,due to the stability of our model our proposed algorithms Ada-CHIO and Ada-FBIO have achieved the accuracy of 93%and 90%.Statistical analysis shows that the hypothesis we proved using statistics is authentic for the proposed technique against benchmark algorithms,which also depicts the superiority of our proposed techniques.展开更多
Unauthorized use of energy is the major source of the non-technical losses of the energy in developing countries. Gas theft as a kind of energy theft is an increasing issue in a number of countries particularly in dev...Unauthorized use of energy is the major source of the non-technical losses of the energy in developing countries. Gas theft as a kind of energy theft is an increasing issue in a number of countries particularly in developing countries. This study is an attempt to address the issue of gas theft through the deployment of Geographic Information System (GIS) capabilities (Spatial Analysis) to import external factors into the current gas theft detection methods, improve data mining processes, and offer some management solutions. To achieve the intended goals in the study, two types of data sources were collected and analyzed: internal data such as reported instances of gas theft, and some customer properties, and external data such as some demographic data. In order to analyze and modeling the gas theft and the relationships between variables we used Hotspot analysis, Ordinary Least Squares regression (OLS) and Geographically Weighted Regression (GWR) analysis with ArcGIS tools. The results from clustering test indicated that the gas theft is not a random phenomenon in all areas of Tabriz and there are underlying factors. Mapping clusters by the hotspot techniques suggested the locations of clusters and areas at risk. The results of the regression analysis illustrated the importance of external factors clearly. According to the results, we recommend a conceptual GIS framework to select high risk areas as a subset data for a meter data analysis. Results of this research are of great importance for GIS based spatial analysis and can be used as base of future researches.展开更多
The article investigates the similarities and differences between all versions of Grand Theft Auto as an adventure game with the widest popularity in the last decade. The game is a story collection, a frame for perfor...The article investigates the similarities and differences between all versions of Grand Theft Auto as an adventure game with the widest popularity in the last decade. The game is a story collection, a frame for performance, a virtual museum of vernacular culture and a widely circulated pop culture artifact whose double-voiced aesthetic has given rise to diverse interpretive communities. The aim of comparing the differences and similarities between different versions of the game is to be able to evaluate the game from the user’s point of view. With this aim, whether with the verisimilitude that the different versions offer makes GTA a product of an iterative design process or not will be displayed.展开更多
In the field of vision of American Literature in the 20th century,Katherine Anne Porter is highly praised by many readers for her flexible artistic style,accurate and vivid description of characters,profound connotati...In the field of vision of American Literature in the 20th century,Katherine Anne Porter is highly praised by many readers for her flexible artistic style,accurate and vivid description of characters,profound connotation of her works.As a female writer,Porter is good at creating female characters from a unique female perspective,and reveals the inner activities of female characters in self-development and the female individual consciousness and independent consciousness pursued by women through her works.Although she doesn’t consciously involve feminism,we can see that the heroine’s female consciousness is gradually awakening from her portrayal of female characters and her exploration of female inner world.This paper takes Porter’s short story Theft published in the 1990s as an example to analyze the feminist consciousness in her works from the perspective of feminism.展开更多
This paper proposes a novel bidirect i o nal anti-theft alarm scheme through detecting the magnetic field.The theoretical background and analysis of the approach of anti-theft alarm are pre sented.The circuit of burgl...This paper proposes a novel bidirect i o nal anti-theft alarm scheme through detecting the magnetic field.The theoretical background and analysis of the approach of anti-theft alarm are pre sented.The circuit of burglar alarm is designed,fabricated and tested,and C language program is implemented and debugged.Feasibility of the de veloped scheme is proved by the experiments.展开更多
With the development of advanced metering infrastructure(AMI),large amounts of electricity consumption data can be collected for electricity theft detection.However,the imbalance of electricity consumption data is vio...With the development of advanced metering infrastructure(AMI),large amounts of electricity consumption data can be collected for electricity theft detection.However,the imbalance of electricity consumption data is violent,which makes the training of detection model challenging.In this case,this paper proposes an electricity theft detection method based on ensemble learning and prototype learning,which has great performance on imbalanced dataset and abnormal data with different abnormal level.In this paper,convolutional neural network(CNN)and long short-term memory(LSTM)are employed to obtain abstract feature from electricity consumption data.After calculating the means of the abstract feature,the prototype per class is obtained,which is used to predict the labels of unknown samples.In the meanwhile,through training the network by different balanced subsets of training set,the prototype is representative.Compared with some mainstream methods including CNN,random forest(RF)and so on,the proposed method has been proved to effectively deal with the electricity theft detection when abnormal data only account for 2.5%and 1.25%of normal data.The results show that the proposed method outperforms other state-of-the-art methods.展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
With the proliferation of smart grid research, the Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique characteristics of AMI, such as comp...With the proliferation of smart grid research, the Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique characteristics of AMI, such as complex network structure, resource-constrained smart meter, and privacy-sensitive data, it is an especially challenging issue to make AMI secure. Energy theft is one of the most important concerns related to the smart grid implementation. It is estimated that utility companies lose more than S25 billion every year due to energy theft around the world. To address this challenge, in this paper, we discuss the background of AMI and identify major security requirements that AMI should meet. Specifically, an attack tree based threat model is first presented to illustrate the energy-theft behaviors in AMI. Then, we summarize the current AMI energy-theft detection schemes into three categories, i.e., classification-based, state estimation-based, and game theory-based ones, and make extensive comparisons and discussions on them. In order to provide a deep understanding of security vulnerabilities and solutions in AMI and shed light on future research directions, we also explore some open challenges and potential solutions for energy-theft detection.展开更多
基金supported by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Sk?odowska-Curie Grant Agreement(801522)Science Foundation Ireland and co-funded by the European Regional Development Fund through the ADAPT Centre for Digital Content Technology(13/RC/2106_P2)。
文摘Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new energy theft detection(ETD)techniques have been proposed by utilising different data mining(DM)techniques,state&network(S&N)based techniques,and game theory(GT)techniques.Here,a detailed survey is presented where many state-of-the-art ETD techniques are studied and analysed for their strengths and limitations.Three levels of taxonomy are presented to classify state-of-the-art ETD techniques.Different types and ways of energy theft and their consequences are studied and summarised and different parameters to benchmark the performance of proposed techniques are extracted from literature.The challenges of different ETD techniques and their mitigation are suggested for future work.It is observed that the literature on ETD lacks knowledge management techniques that can be more effective,not only for ETD but also for theft tracking.This can help in the prevention of energy theft,in the future,as well as for ETD.
基金supported by the National Natural Science Foundation of China(U1766210).
文摘With the application of the advanced measurement infrastructure in power grids,data driven electricity theft detection methods become the primary stream for pinpointing electricity thieves.However,owing to anomaly submergence,which shows that the usage patterns of electricity thieves may not always deviate from those of normal users,the performance of the existing usage-pattern-based method could be affected.In addition,the detection results of some unsupervised learning algorithm models are abnormal degrees rather than“0-1”to ascertain whether electricity theft has occurred.The detection with fixed threshold value may lead to deviation and would not be sufficiently flexible to handle the detection for different scenes and users.To address these issues,this study proposes a new electricity theft detection method based on load shape dictionary of users.A corresponding strategy for tunable threshold is proposed to optimize the detection effect of electricity theft,and the efficacy and applicability of the proposed adaptive electricity theft detection method were verified from numerical experiments.
文摘One of the major concerns for the utilities in the Smart Grid(SG)is electricity theft.With the implementation of smart meters,the frequency of energy usage and data collection from smart homes has increased,which makes it possible for advanced data analysis that was not previously possible.For this purpose,we have taken historical data of energy thieves and normal users.To avoid imbalance observation,biased estimates,we applied the interpolation method.Furthermore,the data unbalancing issue is resolved in this paper by Nearmiss undersampling technique and makes the data suitable for further processing.By proposing an improved version of Zeiler and Fergus Net(ZFNet)as a feature extraction approach,we had able to reduce the model’s time complexity.To minimize the overfitting issues,increase the training accuracy and reduce the training loss,we have proposed an enhanced method by merging Adaptive Boosting(AdaBoost)classifier with Coronavirus Herd Immunity Optimizer(CHIO)and Forensic based Investigation Optimizer(FBIO).In terms of low computational complexity,minimized over-fitting problems on a large quantity of data,reduced training time and training loss and increased training accuracy,our model outperforms the benchmark scheme.Our proposed algorithms Ada-CHIO andAda-FBIO,have the low MeanAverage Percentage Error(MAPE)value of error,i.e.,6.8%and 9.5%,respectively.Furthermore,due to the stability of our model our proposed algorithms Ada-CHIO and Ada-FBIO have achieved the accuracy of 93%and 90%.Statistical analysis shows that the hypothesis we proved using statistics is authentic for the proposed technique against benchmark algorithms,which also depicts the superiority of our proposed techniques.
文摘Unauthorized use of energy is the major source of the non-technical losses of the energy in developing countries. Gas theft as a kind of energy theft is an increasing issue in a number of countries particularly in developing countries. This study is an attempt to address the issue of gas theft through the deployment of Geographic Information System (GIS) capabilities (Spatial Analysis) to import external factors into the current gas theft detection methods, improve data mining processes, and offer some management solutions. To achieve the intended goals in the study, two types of data sources were collected and analyzed: internal data such as reported instances of gas theft, and some customer properties, and external data such as some demographic data. In order to analyze and modeling the gas theft and the relationships between variables we used Hotspot analysis, Ordinary Least Squares regression (OLS) and Geographically Weighted Regression (GWR) analysis with ArcGIS tools. The results from clustering test indicated that the gas theft is not a random phenomenon in all areas of Tabriz and there are underlying factors. Mapping clusters by the hotspot techniques suggested the locations of clusters and areas at risk. The results of the regression analysis illustrated the importance of external factors clearly. According to the results, we recommend a conceptual GIS framework to select high risk areas as a subset data for a meter data analysis. Results of this research are of great importance for GIS based spatial analysis and can be used as base of future researches.
文摘The article investigates the similarities and differences between all versions of Grand Theft Auto as an adventure game with the widest popularity in the last decade. The game is a story collection, a frame for performance, a virtual museum of vernacular culture and a widely circulated pop culture artifact whose double-voiced aesthetic has given rise to diverse interpretive communities. The aim of comparing the differences and similarities between different versions of the game is to be able to evaluate the game from the user’s point of view. With this aim, whether with the verisimilitude that the different versions offer makes GTA a product of an iterative design process or not will be displayed.
文摘In the field of vision of American Literature in the 20th century,Katherine Anne Porter is highly praised by many readers for her flexible artistic style,accurate and vivid description of characters,profound connotation of her works.As a female writer,Porter is good at creating female characters from a unique female perspective,and reveals the inner activities of female characters in self-development and the female individual consciousness and independent consciousness pursued by women through her works.Although she doesn’t consciously involve feminism,we can see that the heroine’s female consciousness is gradually awakening from her portrayal of female characters and her exploration of female inner world.This paper takes Porter’s short story Theft published in the 1990s as an example to analyze the feminist consciousness in her works from the perspective of feminism.
基金National Natural Science Foundation of China (No.51105267, No.91123036)China Postdoctoral Science Foundation(No.2011M500542, No.2012T50248)+2 种基金National Research Foundation for the Doctoral Program of Higher Education of China(No.20111402120007)Shanxi Provincial Foundation for Returned Scholars (No.2011x10)863 Project (No.2011AA040404, No.2013AA041109)
文摘This paper proposes a novel bidirect i o nal anti-theft alarm scheme through detecting the magnetic field.The theoretical background and analysis of the approach of anti-theft alarm are pre sented.The circuit of burglar alarm is designed,fabricated and tested,and C language program is implemented and debugged.Feasibility of the de veloped scheme is proved by the experiments.
基金supported by National Natural Science Foundation of China(No.52277083).
文摘With the development of advanced metering infrastructure(AMI),large amounts of electricity consumption data can be collected for electricity theft detection.However,the imbalance of electricity consumption data is violent,which makes the training of detection model challenging.In this case,this paper proposes an electricity theft detection method based on ensemble learning and prototype learning,which has great performance on imbalanced dataset and abnormal data with different abnormal level.In this paper,convolutional neural network(CNN)and long short-term memory(LSTM)are employed to obtain abstract feature from electricity consumption data.After calculating the means of the abstract feature,the prototype per class is obtained,which is used to predict the labels of unknown samples.In the meanwhile,through training the network by different balanced subsets of training set,the prototype is representative.Compared with some mainstream methods including CNN,random forest(RF)and so on,the proposed method has been proved to effectively deal with the electricity theft detection when abnormal data only account for 2.5%and 1.25%of normal data.The results show that the proposed method outperforms other state-of-the-art methods.
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.
基金supported by China Scholarship Councilthe National Natural Science Foundation of China (Nos. 61170261 and 61202369)NSERC,Canada
文摘With the proliferation of smart grid research, the Advanced Metering Infrastructure (AMI) has become the first ubiquitous and fixed computing platform. However, due to the unique characteristics of AMI, such as complex network structure, resource-constrained smart meter, and privacy-sensitive data, it is an especially challenging issue to make AMI secure. Energy theft is one of the most important concerns related to the smart grid implementation. It is estimated that utility companies lose more than S25 billion every year due to energy theft around the world. To address this challenge, in this paper, we discuss the background of AMI and identify major security requirements that AMI should meet. Specifically, an attack tree based threat model is first presented to illustrate the energy-theft behaviors in AMI. Then, we summarize the current AMI energy-theft detection schemes into three categories, i.e., classification-based, state estimation-based, and game theory-based ones, and make extensive comparisons and discussions on them. In order to provide a deep understanding of security vulnerabilities and solutions in AMI and shed light on future research directions, we also explore some open challenges and potential solutions for energy-theft detection.