Deep learning-based electricity theft prediction in non-smart grid environments

Sheikh Muhammad Saqib, Tehseen Mazhar, Muhammad Iqbal, Tariq Shahazad, Ahmad Almogren, Khmaies Ouahada, Habib Hamam

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

In developing countries, smart grids are nonexistent, and electricity theft significantly hampers power supply. This research introduces a lightweight deep-learning model using monthly customer readings as input data. By employing careful direct and indirect feature engineering techniques, including Principal Component Analysis (PCA), t-distributed Stochastic Neighbor Embedding (t-SNE), UMAP (Uniform Manifold Approximation and Projection), and resampling methods such as Random-Under-Sampler (RUS), Synthetic Minority Over-sampling Technique (SMOTE), and Random-Over-Sampler (ROS), an effective solution is proposed. Previous studies indicate that models achieve high precision, recall, and F1 score for the non-theft (0) class, but perform poorly, even achieving 0 %, for the theft (1) class. Through parameter tuning and employing Random-Over-Sampler (ROS), significant improvements in accuracy, precision (89 %), recall (94 %), and F1 score (91 %) for the theft (1) class are achieved. The results demonstrate that the proposed model outperforms existing methods, showcasing its efficacy in detecting electricity theft in non-smart grid environments.

Original languageEnglish
Article numbere35167
JournalHeliyon
Volume10
Issue number15
DOIs
Publication statusPublished - 15 Aug 2024

Keywords

  • Deep learning
  • Feature engineering
  • Principal Component Analysis (PCA)
  • Random-Over-Sampler (ROS)
  • Random-Under-Sampler (RUS)
  • Synthetic Minority Over-Sampling Technique (SMOTE)
  • t-distributed Stochastic Neighbor Embedding (t-SNE)

ASJC Scopus subject areas

  • Multidisciplinary

Fingerprint

Dive into the research topics of 'Deep learning-based electricity theft prediction in non-smart grid environments'. Together they form a unique fingerprint.

Cite this