[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2661829.2661860acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

An Appliance-Driven Approach to Detection of Corrupted Load Curve Data

Published: 03 November 2014 Publication History

Abstract

Load curve data in power systems refers to users' electrical energy consumption data periodically collected with meters. It has become one of the most important assets for modern power systems. Many operational decisions are made based on the information discovered in the data. Load curve data, however, usually suffers from corruptions caused by various factors, such as data transmission errors or malfunctioning meters. To solve the problem, tremendous research efforts have been made on load curve data cleansing. Most existing approaches apply outlier detection methods from the supply side (i.e., electricity service providers), which may only have aggregated load data. In this paper, we propose to seek aid from the demand side (i.e., electricity service users). With the help of readily available knowledge on consumers' appliances, we present an appliance-driven approach to load curve data cleansing. This approach utilizes data generation rules and a Sequential Local Optimization Algorithm (SLOA) to solve the Corrupted Data Identification Problem (CDIP). We evaluate the performance of SLOA with real-world trace data and synthetic data. The results indicate that, comparing to existing load data cleansing methods, such as B-spline smoothing, our approach has an overall better performance and can effectively identify consecutive corrupted data. Experimental results also show that our method is robust in various tests.

References

[1]
B. Abraham and A. Chuang. Outlier detection and time series modeling. Technometrics, 31(2):241--248, 1989.
[2]
B. Abraham and N. Yatawara. A score test for detection of time series outliers. Journal of time series analysis, 9(2):109--119, 1988.
[3]
C. C. Aggarwal. Outlier Analysis. Springer, 2013.
[4]
R. J. Bolton, D. J. Hand, et al. Unsupervised profiling methods for fraud detection. Credit Scoring and Credit Control VII, pages 235--255, 2001.
[5]
J. Chen, W. Li, A. Lau, J. Cao, and K. Wang. Automated load curve data cleansing in power systems. IEEE Transactions on Smart Grid, 1(2):213--221, 2010.
[6]
S.-y. Chen, S.-f. Song, L. Li, and J. Shen. Survey on smart grid technology. Power System Technology, 33(8):1--7, 2009.
[7]
C. Cost. Current cost products - envir. http://www.currentcost.com/product-envir.html/, accessed in Feb. 2014.
[8]
CVX. Matlab software for disciplined convex programming. cvxr.com/cvx, accessed in Jul. 2013.
[9]
H. David. Robust estimation in the presence of outliers. Robustness in statistics, 1:61--74, 1979.
[10]
L. Davies and U. Gather. The identification of multiple outliers. Journal of the American Statistical Association, 88(423):782--792, 1993.
[11]
D. L. Donoho. For most large underdetermined systems of linear equations the minimal l1 norm solution is also the sparsest solution. Communications on pure and applied mathematics, 59(6):797--829, 2006.
[12]
EIA. Electric power annual 2012. http://www.eia.gov/electricity/annual/?src=Electricity-f4, accessed in Jan. 2014.
[13]
EPA. A tool of home product finder. http://www.energystar.gov/productfinder/, accessed in Dec. 2013.
[14]
H. Farhangi. The path of the smart grid. Power and Energy Magazine, IEEE, 8(1):18--28, 2010.
[15]
U. Gather. Testing for multisource contamination in location/scale families. Communications in Statistics-Theory and Methods, 18(1):1--34, 1989.
[16]
K. Inc. Belkin energy disaggregation competition. https://www.kaggle.com/c/belkin-energy-disaggregation-competition, accessed in Jul. 2013.
[17]
M. Jahn, M. Jentsch, C. R. Prause, F. Pramudianto, A. Al-Akkad, and R. Reiners. The energy aware smart home. In Future Information Technology (FutureTech), 2010 5th International Conference on, pages 1--8. IEEE, 2010.
[18]
H.-P. Kriegel and M. Pfeifle. Density-based clustering of uncertain data. In Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, pages 672--677. ACM, 2005.
[19]
L. Laboratory. Standby power summary table. http://standby.lbl.gov/summary-table.html, accessed in Feb. 2014.
[20]
J. Lang. A bad case of smart meter regret. http://www.cloverdalereporter.com/news/189923521.html, accessed in Jan. 2014.
[21]
G. M. Ljung. On outlier detection in time series. Journal of the Royal Statistical Society. Series B (Methodological), pages 559--567, 1993.
[22]
G. Mateos and G. B. Giannakis. Robust nonparametric regression via sparsity control with application to load curve data cleansing. IEEE Transactions on Signal Processing, 60(4):1571--1584, 2012.
[23]
J. McMahon. Big data from smart grid tells utilities more than they want to know. Forbes, September 2013.
[24]
S. Moneo. BC hydro pulls smart meters for testing. http://www.theglobeandmail.com/news/british-columbia/bc-hydro-pulls-smart-meters-for-testing/article534384/, accessed in Jan. 2014.
[25]
C. News. BC Hydro outlines smart meter refusal cost. September 13, 2013.
[26]
T. A. Nguyen and M. Aiello. Energy intelligent buildings based on user activity: A survey. Energy and buildings, 56:244--257, 2013.
[27]
PlotWatt. https://plotwatt.com/, accessed in Jan. 2014.
[28]
PlugWise. http://www.plugwise.com/, accessed in Jan. 2014.
[29]
S. Ramaswamy, R. Rastogi, and K. Shim. Efficient algorithms for mining outliers from large data sets. In ACM SIGMOD Record, pages 427--438. ACM, 2000.
[30]
J. Stragier, L. Hauttekeete, and L. De Marez. Introducing smart grids in residential contexts: Consumers' perception of smart household appliances. In Innovative Technologies for an Efficient and Reliable Electricity Supply (CITRES), 2010 IEEE Conference on, pages 135--142, 2010.
[31]
J. W. Tukey. Exploratory data analysis. Reading, MA, 231, 1977.

Index Terms

  1. An Appliance-Driven Approach to Detection of Corrupted Load Curve Data

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CIKM '14: Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management
    November 2014
    2152 pages
    ISBN:9781450325981
    DOI:10.1145/2661829
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 November 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. corrupted data identification
    2. data analysis
    3. optimization

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CIKM '14
    Sponsor:

    Acceptance Rates

    CIKM '14 Paper Acceptance Rate 175 of 838 submissions, 21%;
    Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

    Upcoming Conference

    CIKM '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 127
      Total Downloads
    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media