TY - GEN
T1 - Predicting energy theft under uncertainty conditions
T2 - 6th International Conference on Soft Computing and Machine Intelligence, ISCMI 2019
AU - Ighravwe, Desmond Eseoghene
AU - Mashao, Daniel
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/11
Y1 - 2019/11
N2 - Several studies have called the attentions of utility firms to the possibility of using mathematical models to measure and monitor energy theft. Unfortunately, these studies have decoupled the contributions of government policies, such as social, technical and economic policies, from their evaluation process. To address this knowledge gaps, this article modelled energy theft using soft computing approach: fuzzy cognitive map (FCM) and swarm algorithm. Fuzzy logic was used to design cognitive maps for energy theft parameters; second, and swarm algorithm was used to determine the weights and concepts values. The practicality of the swarm-based model was tested using experts' judgements. This model performance was compared with evolutionary-based FCM and it was observed that it performed better than the evolutionary-based model. And when the swarm-based model performance was compared with experts' judgements, it performed satisfactorily.
AB - Several studies have called the attentions of utility firms to the possibility of using mathematical models to measure and monitor energy theft. Unfortunately, these studies have decoupled the contributions of government policies, such as social, technical and economic policies, from their evaluation process. To address this knowledge gaps, this article modelled energy theft using soft computing approach: fuzzy cognitive map (FCM) and swarm algorithm. Fuzzy logic was used to design cognitive maps for energy theft parameters; second, and swarm algorithm was used to determine the weights and concepts values. The practicality of the swarm-based model was tested using experts' judgements. This model performance was compared with evolutionary-based FCM and it was observed that it performed better than the evolutionary-based model. And when the swarm-based model performance was compared with experts' judgements, it performed satisfactorily.
KW - Energy theft
KW - Fuzzy cognitive maps
KW - Swarm algorithm
UR - http://www.scopus.com/inward/record.url?scp=85081584934&partnerID=8YFLogxK
U2 - 10.1109/ISCMI47871.2019.9004344
DO - 10.1109/ISCMI47871.2019.9004344
M3 - Conference contribution
AN - SCOPUS:85081584934
T3 - 2019 6th International Conference on Soft Computing and Machine Intelligence, ISCMI 2019
SP - 83
EP - 89
BT - 2019 6th International Conference on Soft Computing and Machine Intelligence, ISCMI 2019
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 19 November 2019 through 20 November 2019
ER -