Developing and Implementing an Artificial Intelligence (AI)-Driven System For Electricity Theft Detection

Main Article Content

Nwamaka Georgenia Ezeji
Kingsley Ifeanyi Chibueze
Nnenna Harmony Nwobodo-Nzeribe

Abstract

Electricity theft is a significant challenge for utility companies worldwide, leading to substantial economic losses and inefficiencies in power distribution. Traditional methods of detecting electricity theft, such as manual inspections and routine audits, are often inefficient and ineffective. To address this issue, this study aims to develop and implement an artificial intelligence (AI)-driven system for electricity theft detection. Methodology used are data collection, data analysis, feature selection with Chi-Square, feature transformation with Principal Component Analysis (PCA), Support Vector Machine (SVM) and model for electricity theft detection.   To achieve this, a Particle Swarm Optimization Algorithm (PSO) was applied to improve training performance of the SVM, using data of meter recharge information collected from Enugu Electricity Distribution Company (EEDC). The system effectiveness is validated through extensive testing using real-world data from various regions and scenarios, demonstrating its robustness and adaptability. The system result considering FDR reported that 0.11 was achieved for the particle swarm based SVM model. When TPR was considered for analysis, it was observed that particle swarm based SVM attained a score of 0.89. In addition, Particle swarm based SVM attained PPV of 0.895. In terms of accuracy, the particle swarm based SVM reported an accuracy of 0.857.  The result showed that the particle swarm based SVM performed better from the system validation achieved through comparative analysis, hence it is recommended for use to develop the new software for energy theft investigation. The implementation of this AI-driven solution offers numerous benefits, including enhanced detection accuracy, reduced operational costs, and improved overall efficiency of power distribution networks. Moreover, it enables utility companies to take proactive measures to prevent theft, ensuring a more reliable and secure electricity supply for consumers.

Article Details

How to Cite
[1]
N. G. Ezeji, K. I. Chibueze, and N. H. Nwobodo-Nzeribe, “Developing and Implementing an Artificial Intelligence (AI)-Driven System For Electricity Theft Detection”, AJERD, vol. 7, no. 2, pp. 317-328, Sep. 2024.
Section
Articles

References

[1] Gbenga, Y. (2023). The crime of electricity theft and punishment for offenders. Retrieved from https://tribuneonlineng.com/the-crime-of-electricity-theft-and-punishment-for-offenders/
[2] Gbolahan, O. O. (2017). Electricity theft and power quality in Nigeria. International Journal of Engineering Research & Technology (IJERT), 6(6), 1180-.1184.
[3] Ebole, A. F. (2020). Electricity power theft detection using wireless prepaid meter. International Journal of Computer Science and Information Security (IJCSIS), 18(5), 36-78. http://sites.google.com/site/ijcsis/
[4] Glauner, P. (2019). Artificial intelligence for the detection of electricity theft and irregular power usage in emerging markets. Doctoral dissertation. University of Luxembourg.
[5] Javaid, P., Almogren, A., Adil, M., Javed, M., & Zuair, M. (2022). RFE based feature selection and KNNOR based data balancing for electricity theft detection using BiLSTM-LogitBoost stacking ensemble model. IEEE Access, 10, 112948-112963. https://doi.org/10.1109/ACCESS.2022.3215532
[6] Mhaske, D., Satam, R., Londhe, S., Kohad, T., & Kadam, S. (2022). An efficient electricity theft detection using XGBoost. International Journal of Engineering Applied Sciences and Technology, 6(10), 282-287.
[7] Onibonoje, M. (2021). An IoT design approach to residual energy metering, billing, and protection. 2021 IEEE International IoT, Electronics, and Mechatronics Conference (EMTRONICS). 614-617 https://doi.org/10.1109/IEMTRONICS52119.2021.9422580
[8] Reshma, R., Suryalakshmi, S., Josephin, S., Athira, A., & Sruthy, E. (2022). Electricity theft detection using machine learning. International Journal of Engineering Research & Technology (IJERT), 10(4), 101-104.
[9] Bohani, F., Suliman, A., Saripuddin, M., Sameon, S., Salleh, S., & Nazeri, S. (2021). A comprehensive analysis of supervised learning techniques for electricity theft detection. Journal of Electrical and Computer Engineering, Article ID 9136206. https://doi.org/10.1155/2021/9136206
[10] Nwobodo-Nzeribe, H. N., Ozoemena, P. C., & Odo. (2022). Modeling of an intelligent cooking gas leakage detection system using convolutional neural network. American Journal of Applied Sciences and Engineering, 3(5), 13-23.
[11] Tyryshkina, Y., & Tumkovskiy, S. (2022). Method for accelerating the joining of distributed datasets by a given criterion. Journal of Automation and Information Sciences, 54(5), 2-11. https://doi.org/10.31799/1684-8853-2022-5-2-11
[12] Johnson, R. E., Grove, A., & Clarke, A. (2019). Pillar integration process: A joint display technique to integrate data in mixed methods research. Journal of Mixed Methods Research, 13(3), 301-320.
[13] Mengash H, Lal Hussain, Hany Mahgoub, A. Al-Qarafi, Mohamed K. Nour, Radwa Marzouk, S. A. Qureshi, & A. Hilal. (2022). Smart Cities-Based Improving Atmospheric Particulate Matters Prediction Using Chi-Square Feature Selection Methods by Employing Machine Learning Techniques. Applied Artificial Intelligence, 36(4), 303-324.
[14] Assegie, T. A., Tulasi, R., & Elanangai, V. (2022). Exploring the performance of feature selection method using breast cancer dataset. International Journal of Electrical and Computer Engineering (IJECE), 25(1), 232-237. https://doi.org/10.11591/ijeecs.v25.i1.pp232-237
[15] Goyal, N., Vempala, S., & Xiao, Y. (2013). Fourier PCA and robust tensor decomposition. Proceedings of the 46th Annual ACM Symposium on Theory of Computing, 46(1), 584-593. https://doi.org/10.1145/2591796.2591875
[16] Basna, S. H., & Abdulazeez, A. (2021). A review of principal component analysis algorithm for dimensionality reduction. Journal of Soft Computing and Decision Support Systems, 2(1), 3-10. https://doi.org/10.30880/JSCDM.2021.02.01.003
[17] Wang, D., Tan, D., & Liu, L. (2018). Particle swarm optimization algorithm: An overview. Soft Computing, 22(2), 387-408. https://doi.org/10.1007/s00500-016-2474-6
[18] Chen, Y., Hua, G., Feng, D., Zang, H., Wei, Z., & Sun, G. (2020). Electricity theft detection model for smart meter based on residual neural network. IEEE Access, 8, 182651-182664. https://doi.org/10.1109/ACCESS.2020.3026441
[19] Liu, Y., Zeng, Z., & Dong, S. (2020). FPETD: Fault-tolerant and privacy-preserving electricity theft detection. IEEE Transactions on Smart Grid, 12(1), 745-756. https://doi.org/10.1109/TSG.2020.3021518
[20] Madhure, R., Raman, R., & Singh, S. (2020). CNN-LSTM Based Electricity Theft Detector in Advanced Metering Infrastructure. 2020 IEEE International Conference on Computing, Power, and Communication Technologies (GUCON), 845-850. https://doi.org/10.1109/GUCON48875.2020.9231172.
[21] Ullah, A., Javaid, N., Yahaya, A., Sultana, T., Al-Zahrani, F., & Zaman, F. (2021). A hybrid deep neural network for electricity theft detection using intelligent antenna-based smart meters. Wireless Communications and Mobile Computing, Article ID 9933111. https://doi.org/10.1155/2021/9933111
[22] Ayub, N., Aurangzeb, K., Awais, M., & Ali, U. (2020). Electricity theft detection using CNN-GRU and manta ray foraging optimization algorithm. 2020 IEEE 23rd International Multitopic Conference (INMIC), 1-6. https://doi.org/10.1109/INMIC50486.2020.9318196
[23] Syed, D., Abu-Rub, H., Refaat, S., & Xie, L. (2020). Detection of energy theft in smart grids using electricity consumption patterns. 2020 IEEE International Conference on Big Data (Big Data) 4059-4063. https://doi.org/10.1109/BigData50022.2020.9378190
[24] Nabil, M., Ismail, M., Mahmoud, M., Shahin, M., Qaraqe, K., & Serpedin, E. (2018). Deep recurrent electricity theft detection in AMI networks with random tuning of hyper-parameters. 2018 24th International Conference on Pattern Recognition (ICPR) 740-745. https://doi.org/10.1109/ICPR.2018.8545788.