Zhang et al., 2020 - Google Patents
Energy theft detection in an edge data center using threshold-based abnormality detectorZhang et al., 2020
- Document ID
- 5280541656707184938
- Author
- Zhang Y
- Ai Q
- Wang H
- Li Z
- Zhou X
- Publication year
- Publication venue
- International Journal of Electrical Power & Energy Systems
External Links
Snippet
With the fast development of industrial Internet of Things (IoT) for smart energy, data processing and storing are closer to the end used side. Edge data center, an intermediate platform between end data source and centralized data center, can reduce the data …
- 238000001514 detection method 0 title abstract description 56
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Energy theft detection in an edge data center using threshold-based abnormality detector | |
Avila et al. | NTL detection in electric distribution systems using the maximal overlap discrete wavelet-packet transform and random undersampling boosting | |
Araya et al. | An ensemble learning framework for anomaly detection in building energy consumption | |
Corizzo et al. | Anomaly detection and repair for accurate predictions in geo-distributed big data | |
Zhou et al. | Partial knowledge data-driven event detection for power distribution networks | |
Gilanifar et al. | Multitask Bayesian spatiotemporal Gaussian processes for short-term load forecasting | |
Maamar et al. | Machine learning techniques for energy theft detection in AMI | |
He et al. | MTAD‐TF: Multivariate Time Series Anomaly Detection Using the Combination of Temporal Pattern and Feature Pattern | |
Shukla et al. | Power quality disturbances classification based on Gramian angular summation field method and convolutional neural networks | |
Xia et al. | An attention-based wide and deep CNN with dilated convolutions for detecting electricity theft considering imbalanced data | |
Zhu et al. | Adversarial training of LSTM-ED based anomaly detection for complex time-series in cyber-physical-social systems | |
Shi et al. | A novel approach to detect electricity theft based on conv-attentional Transformer Neural Network | |
Wang et al. | Real-time detection of electrical load anomalies through hyperdimensional computing | |
Cook et al. | Solar panel identification via deep semi-supervised learning and deep one-class classification | |
Shahzadi et al. | A novel data driven approach for combating energy theft in urbanized smart grids using artificial intelligence | |
Qin et al. | CSCAD: Correlation structure-based collective anomaly detection in complex system | |
Zhang et al. | An effective transformation-encoding-attention framework for multivariate time series anomaly detection in iot environment | |
Gao et al. | A data mining method using deep learning for anomaly detection in cloud computing environment | |
Cheng et al. | Diagnosing the variance shifts signal in multivariate process control using ensemble classifiers | |
Zhang et al. | Market-Level Integrated Detection Against Cyber Attacks in Real-Time Market Operations By Self-Supervised Learning | |
Zhu et al. | Auto-starting semisupervised-learning-based identification of synchrophasor data anomalies | |
Huo et al. | Traffic anomaly detection method based on improved GRU and EFMS-Kmeans clustering | |
Mangat et al. | Power theft detection using deep neural networks | |
Liu et al. | A electricity theft detection method through contrastive learning in smart grid | |
Zhang et al. | Hybrid Time‐Series Prediction Method Based on Entropy Fusion Feature |