[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zhang et al., 2020 - Google Patents

Energy theft detection in an edge data center using threshold-based abnormality detector

Zhang et al., 2020

Document ID
5280541656707184938
Author
Zhang Y
Ai Q
Wang H
Li Z
Zhou X
Publication year
Publication venue
International Journal of Electrical Power & Energy Systems

External Links

Snippet

With the fast development of industrial Internet of Things (IoT) for smart energy, data processing and storing are closer to the end used side. Edge data center, an intermediate platform between end data source and centralized data center, can reduce the data …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Similar Documents

Publication Publication Date Title
Zhang et al. Energy theft detection in an edge data center using threshold-based abnormality detector
Avila et al. NTL detection in electric distribution systems using the maximal overlap discrete wavelet-packet transform and random undersampling boosting
Araya et al. An ensemble learning framework for anomaly detection in building energy consumption
Corizzo et al. Anomaly detection and repair for accurate predictions in geo-distributed big data
Zhou et al. Partial knowledge data-driven event detection for power distribution networks
Gilanifar et al. Multitask Bayesian spatiotemporal Gaussian processes for short-term load forecasting
Maamar et al. Machine learning techniques for energy theft detection in AMI
He et al. MTAD‐TF: Multivariate Time Series Anomaly Detection Using the Combination of Temporal Pattern and Feature Pattern
Shukla et al. Power quality disturbances classification based on Gramian angular summation field method and convolutional neural networks
Xia et al. An attention-based wide and deep CNN with dilated convolutions for detecting electricity theft considering imbalanced data
Zhu et al. Adversarial training of LSTM-ED based anomaly detection for complex time-series in cyber-physical-social systems
Shi et al. A novel approach to detect electricity theft based on conv-attentional Transformer Neural Network
Wang et al. Real-time detection of electrical load anomalies through hyperdimensional computing
Cook et al. Solar panel identification via deep semi-supervised learning and deep one-class classification
Shahzadi et al. A novel data driven approach for combating energy theft in urbanized smart grids using artificial intelligence
Qin et al. CSCAD: Correlation structure-based collective anomaly detection in complex system
Zhang et al. An effective transformation-encoding-attention framework for multivariate time series anomaly detection in iot environment
Gao et al. A data mining method using deep learning for anomaly detection in cloud computing environment
Cheng et al. Diagnosing the variance shifts signal in multivariate process control using ensemble classifiers
Zhang et al. Market-Level Integrated Detection Against Cyber Attacks in Real-Time Market Operations By Self-Supervised Learning
Zhu et al. Auto-starting semisupervised-learning-based identification of synchrophasor data anomalies
Huo et al. Traffic anomaly detection method based on improved GRU and EFMS-Kmeans clustering
Mangat et al. Power theft detection using deep neural networks
Liu et al. A electricity theft detection method through contrastive learning in smart grid
Zhang et al. Hybrid Time‐Series Prediction Method Based on Entropy Fusion Feature