Nothing Special   »   [go: up one dir, main page]

Skip to main content

Optimization Method of Suspected Electricity Theft Topic Model Based on Chi-square Test and Logistic Regression

  • Conference paper
  • First Online:
Data Science (ICPCSEE 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 902))

Abstract

In recent years, the electricity theft has presented characteristics of high-tech and covert. Therefore, the factors that reflect the existence of stealing electricity become varied and complex. It brings the problems such as low efficiency and poor accuracy for power grid enterprises to identify the customers who had been stealing electricity. In this paper, Chi-square test and logistic regression are used to optimize the suspected electricity theft topic model. Chi-square test is used to determine the factors interrelated with the electricity theft firstly, and then the logistic regression algorithm is used to optimize the weights of the interrelated factors, and finally constructed a prediction function that can predict the customers who had been stealing electricity. Experiments show that the method proposed in this paper can help the power grid enterprises to identify the customers who had been stealing electricity, on account of having high accuracy rate, precision rate and recall rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang, J., Meng, Y., Yin, S., Zhang, Y.: The present situation and development trend of anti electric stolen function of power demand information acquisition system. Power Syst. Technol. 12(S2), 177–178 (2008)

    Google Scholar 

  2. Cheng, C., Zhang, H., Jing, Z., Chen, M., Jiao, L., Yang, L.: Study on the anti-electricity stealing based on outlier algorithm and the electricity information acquisition system. Power Syst. Prot. Control 43(17), 69–74 (2015)

    Google Scholar 

  3. Hu, S., Guan, J., Yang, Z., Yu, H.: Research on electricity quantity metrology and acquisition system based on embedded system. Modern Electron. Tech. 39(22), 163–166+170 (2016). https://doi.org/10.16652/j.issn.1004-373x.2016.22.040

  4. Wang, Q., Li, S.: Technology analysis and preventive measures of electric larceny prevention technology based on electric energy data acquisition system. Electr. Meas. Instrum. (2016)

    Google Scholar 

  5. Ren, S.: Strengthen the supervision and management of electric power to combat the theft of electricity. Global Mark. Inf. Guide 45, 156 (2014)

    Google Scholar 

  6. Zhuang, C., Zhang, B., Hu, J., Li, Q., Zeng, R.: Anomaly detection for power consumption patterns based on unsupervised learning. Proc. CSEE 36(2), 379–387 (2016). https://doi.org/10.13334/j.0258-8013.pcsee.2016.02.008

    Article  Google Scholar 

  7. Zhao, L., Luan, W., Wang, Q.: Accurate line loss analysis of LV distribution network using AMI data. Power Syst. Technol. 39(11), 78–83 (2015). https://doi.org/10.13335/j.1000-3673.pst.2015.11.026

    Article  Google Scholar 

  8. Ma, S.: Supervision and management of electricity and measures for preventing electricity theft. Theor. Res. Urban Constr. 11, 2440 (2016)

    Google Scholar 

  9. Xu, C., Lu, G., Ye, Y., Mi, Y.: Cooperative spectrum sensing using Chi-square test for multi-antenna cognitive radio. Chin. High Technol. Lett. 26(7), 650–656 (2016). https://doi.org/10.3772/j.issn.1002-0470.2016.07.005

    Article  Google Scholar 

  10. Wu, D.: Electricity theft identification method based on curve similarity. Electr. Power 50(2), 181–184 (2017). https://doi.org/10.11930/j.issn.1004-9649.2017.02.181.04

    Article  Google Scholar 

  11. Chen, A., Xia, F., Zhong, Y.: A new independence test of four grid table. Stat. Decis. 13, 85–88 (2017). https://doi.org/10.13546/j.cnki.tjyjc.2017.13.020

    Article  Google Scholar 

  12. Xu, J., Su, W., Wu, S., Wu, X.: Modeling user reliability based on logistic regression in micro-blog. Comput. Eng. Des. 3, 772–777 (2015). https://doi.org/10.16208/j.issn1000-7024.2015.03.042

    Article  Google Scholar 

  13. Guo, J., Sun, J., Liang, T., Tan, R.: Evaluation model of disruptive design scheme based on logistic regression. Comput. Integr. Manuf. Syst. 21(6), 1405–1416 (2015). https://doi.org/10.13196/j.cims.2015.06.001

    Article  Google Scholar 

  14. Wang, Z., Liu, K., Zheng, Z., Li, C.: Prediction retweeting of microblog based on logistic regression model. J. Chin. Comput. Syst. 37(8), 1651–1655 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Dou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dou, J., Aliaosha, Y. (2018). Optimization Method of Suspected Electricity Theft Topic Model Based on Chi-square Test and Logistic Regression. In: Zhou, Q., Miao, Q., Wang, H., Xie, W., Wang, Y., Lu, Z. (eds) Data Science. ICPCSEE 2018. Communications in Computer and Information Science, vol 902. Springer, Singapore. https://doi.org/10.1007/978-981-13-2206-8_32

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2206-8_32

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2205-1

  • Online ISBN: 978-981-13-2206-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics