期刊文献+
共找到1,824篇文章
< 1 2 92 >
每页显示 20 50 100
Electricity Theft and Its Impact on Quality of Service in Lubumbashi,DR Congo
1
作者 David Milambo Kasumba Guy Nkulu Wa Ngoie +3 位作者 Hyacinthe Tungadio Diambomba Matthieu Kayembe Wa Kayembe Flory Kiseya Tshikala Bonaventure Banza Wa Banza 《Energy Engineering》 2025年第6期2401-2416,共16页
Electricity theft significantly impacts the reliability and sustainability of electricity services,particularly in developing regions.However,the socio-economic,infrastructural,and institutional drivers of theft remai... Electricity theft significantly impacts the reliability and sustainability of electricity services,particularly in developing regions.However,the socio-economic,infrastructural,and institutional drivers of theft remain inadequately explored.Here we examine electricity theft in Lubumbashi,Democratic Republic of Congo,focusing on its patterns,causes,and impacts on service quality.Theft rates exceeded 75%in peripheral municipalities like Katuba and Kampemba,driven by poverty,weak law enforcement,and poor infrastructure dominated by above-ground networks.In contrast,central areas like Kamalondo and Lubumbashi reported lower theft rates due to better urban planning and underground systems.We found that electricity theft directly correlates with frequent voltage fluctuations,prolonged outages,and grid overloads.Socio-economic factors,including high connection fees and poverty,emerged as primary drivers,while institutional weaknesses such as corruption and ineffective enforcement perpetuate theft.Addressing theft requires a holistic approach integrating infrastructure modernization,socio-economic reforms,and institutional strengthening.Transitioning to underground networks,providing affordable electricity access,and adopting advanced metering systems are crucial.Overall,this study highlights the systemic nature of electricity theft and provides actionable insights for improving electricity service delivery and equity in urban settings. 展开更多
关键词 Electricity theft service quality infrastructure disparities socio-economic drivers Lubumbashi
在线阅读 下载PDF
Improving Supply Chain Strategies towards Mitigating the Effect of Crude Oil Theft and Pipeline Vandalism in the Nigerian Oil and Gas Industry: A Case Study of the Nigerian National Petroleum Corporation (NNPC)
2
作者 Ruth Agwom Panle 《Open Journal of Yangtze Oil and Gas》 2024年第3期75-93,共19页
Generically, SCM may be said to include all activities carried out to ensure proper functioning of the supply chain. The activities included in proper management of a supply chain broadly include logistics activities,... Generically, SCM may be said to include all activities carried out to ensure proper functioning of the supply chain. The activities included in proper management of a supply chain broadly include logistics activities, planning and control of the flow of information and materials in a firm, management of relationships with other organizations and government intervention, However, crude oil theft and pipeline vandalism are established products supply chain disruptors in Nigeria which are rendering the task of running an efficient petroleum supply chain onerous. This paper aims to establish the importance of effective supply chain strategies for companies in the oil and gas industry with special focus on the Nigerian oil and gas sector and the strategies by which the state oil and gas corporation in this sector may mitigate disruptions to its supply chain. This study investigates the enhancement of supply chain strategies towards meeting the challenge of crude oil theft and pipeline vandalism, using the Nigerian National Corporation (NNPC) as a case study. Based on this study, data were collected from two sources: A summary of incident reports obtained from NNPC and an interview with personnel in the PPMC Department. Incident report refers to a report produced when accidents such as equipment failure, injury, loss of life, or fire occur at the work site. Content analysis is utilized to evaluate data obtained from interview responses, CBN financial stability reports, NDIC annual reports, circulars, banking supervision reports and implementation guidelines. The study found out that NNPC should endeavor to sustain its value chain and ward of pipeline vandals and crude oil thieves by engaging in community partnership, detailing security outfits to ensure its pipelines’ right of way and bridging. Concluded that the oil supply chain of the Nigerian National Petroleum Corporation has been plagued by disruptions in the form of crude oil theft and pipeline vandalism which has had debilitating effects on its value. 展开更多
关键词 Supply Chain Strategies Management Production Crude Oil theft Pipeline Vandalism Information Technology Operations
在线阅读 下载PDF
建立Cookie Theft测验的中国常模 被引量:3
3
作者 韩晓春 张硕丰 +4 位作者 王际菲 谭勇 宋鲁平 韩在柱 毕彦超 《中国康复理论与实践》 CSCD 北大核心 2012年第8期743-747,共5页
目的建立Cookie Theft测验的中国常模。方法 29名正常被试,17例脑卒中患者完成Cookie Theft测验,在错误表述(IS)、不流畅表述(DF)、支持结构(PS)、重复内容(RP)、图片有效信息(CU)、解释图片有效信息(EC)和不相关字词(IR)7个维度上对语... 目的建立Cookie Theft测验的中国常模。方法 29名正常被试,17例脑卒中患者完成Cookie Theft测验,在错误表述(IS)、不流畅表述(DF)、支持结构(PS)、重复内容(RP)、图片有效信息(CU)、解释图片有效信息(EC)和不相关字词(IR)7个维度上对语言样本进行分析。结果 7个维度上的重测信度值分别为r(IS)=0.92;r(DF)=0.89;r(PS)=0.98;r(RP)=0.84;r(CU)=0.96;r(EC)=0.88和r(IR)=0.99。17例脑卒中患者中,12例(70.6%)被诊断出。结论该常模具有良好的信效度,具有临床和科研应用价值。 展开更多
关键词 COOKIE theft测验 中国常模 认知沟通损伤
暂未订购
基于Cookie Theft测验的脑小血管病患者认知沟通能力数字化测评 被引量:1
4
作者 冯鑫 郁磊 +2 位作者 许斐 李阳 靳祯 《云南师范大学学报(自然科学版)》 2020年第5期21-24,共4页
为了克服传统Cookie Theft测验费时费力、评测结果受主观影响等不足,提出了一种数字化测评方法.首先,将Cookie Theft测验转化成总分为28分的数字化量表;接着,分析对比了脑小血管病组和健康组分别在无提示语和有提示语条件下的表现差异情... 为了克服传统Cookie Theft测验费时费力、评测结果受主观影响等不足,提出了一种数字化测评方法.首先,将Cookie Theft测验转化成总分为28分的数字化量表;接着,分析对比了脑小血管病组和健康组分别在无提示语和有提示语条件下的表现差异情况;最后,综合语音相关特征及信息量相关特征,利用随机森林方法建立了脑小血管病智能诊断模型.实验结果显示,综合使用测试过程中记录的语音相关特征和信息量相关特征,脑小血管病智能诊断模型的识别准确率可达82.4%. 展开更多
关键词 脑小血管病 认知沟通能力 数字化测评 Cookie theft测验
在线阅读 下载PDF
Adaptive electricity theft detection method based on load shape dictionary of customers 被引量:2
5
作者 Chunjiang Yan Feng Ma +4 位作者 Weigang Nie Xiaokun Han Xiaotao Hai Yuejie Xu Yanlin Peng 《Global Energy Interconnection》 EI CAS CSCD 2022年第1期108-117,共10页
With the application of the advanced measurement infrastructure in power grids,data driven electricity theft detection methods become the primary stream for pinpointing electricity thieves.However,owing to anomaly sub... With the application of the advanced measurement infrastructure in power grids,data driven electricity theft detection methods become the primary stream for pinpointing electricity thieves.However,owing to anomaly submergence,which shows that the usage patterns of electricity thieves may not always deviate from those of normal users,the performance of the existing usage-pattern-based method could be affected.In addition,the detection results of some unsupervised learning algorithm models are abnormal degrees rather than“0-1”to ascertain whether electricity theft has occurred.The detection with fixed threshold value may lead to deviation and would not be sufficiently flexible to handle the detection for different scenes and users.To address these issues,this study proposes a new electricity theft detection method based on load shape dictionary of users.A corresponding strategy for tunable threshold is proposed to optimize the detection effect of electricity theft,and the efficacy and applicability of the proposed adaptive electricity theft detection method were verified from numerical experiments. 展开更多
关键词 Electricity theft detection K-means Load shape dictionary Data mining
在线阅读 下载PDF
Energy Theft Identification Using Adaboost Ensembler in the Smart Grids 被引量:2
6
作者 Muhammad Irfan Nasir Ayub +10 位作者 Faisal Althobiani Zain Ali Muhammad Idrees Saeed Ullah Saifur Rahman Abdullah Saeed Alwadie Saleh Mohammed Ghonaim Hesham Abdushkour Fahad Salem Alkahtani Samar Alqhtani Piotr Gas 《Computers, Materials & Continua》 SCIE EI 2022年第7期2141-2158,共18页
One of the major concerns for the utilities in the Smart Grid(SG)is electricity theft.With the implementation of smart meters,the frequency of energy usage and data collection from smart homes has increased,which make... One of the major concerns for the utilities in the Smart Grid(SG)is electricity theft.With the implementation of smart meters,the frequency of energy usage and data collection from smart homes has increased,which makes it possible for advanced data analysis that was not previously possible.For this purpose,we have taken historical data of energy thieves and normal users.To avoid imbalance observation,biased estimates,we applied the interpolation method.Furthermore,the data unbalancing issue is resolved in this paper by Nearmiss undersampling technique and makes the data suitable for further processing.By proposing an improved version of Zeiler and Fergus Net(ZFNet)as a feature extraction approach,we had able to reduce the model’s time complexity.To minimize the overfitting issues,increase the training accuracy and reduce the training loss,we have proposed an enhanced method by merging Adaptive Boosting(AdaBoost)classifier with Coronavirus Herd Immunity Optimizer(CHIO)and Forensic based Investigation Optimizer(FBIO).In terms of low computational complexity,minimized over-fitting problems on a large quantity of data,reduced training time and training loss and increased training accuracy,our model outperforms the benchmark scheme.Our proposed algorithms Ada-CHIO andAda-FBIO,have the low MeanAverage Percentage Error(MAPE)value of error,i.e.,6.8%and 9.5%,respectively.Furthermore,due to the stability of our model our proposed algorithms Ada-CHIO and Ada-FBIO have achieved the accuracy of 93%and 90%.Statistical analysis shows that the hypothesis we proved using statistics is authentic for the proposed technique against benchmark algorithms,which also depicts the superiority of our proposed techniques. 展开更多
关键词 Smart grids and meters electricity theft detection machine learning ADABOOST optimization techniques
在线阅读 下载PDF
Energy Theft Detection in Smart Grids:Taxonomy,Comparative Analysis,Challenges,and Future Research Directions 被引量:1
7
作者 Mohsin Ahmed Abid Khan +4 位作者 Mansoor Ahmed Mouzna Tahir Gwanggil Jeon Giancarlo Fortino Francesco Piccialli 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第4期578-600,共23页
Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new ... Electricity theft is one of the major issues in developing countries which is affecting their economy badly.Especially with the introduction of emerging technologies,this issue became more complicated.Though many new energy theft detection(ETD)techniques have been proposed by utilising different data mining(DM)techniques,state&network(S&N)based techniques,and game theory(GT)techniques.Here,a detailed survey is presented where many state-of-the-art ETD techniques are studied and analysed for their strengths and limitations.Three levels of taxonomy are presented to classify state-of-the-art ETD techniques.Different types and ways of energy theft and their consequences are studied and summarised and different parameters to benchmark the performance of proposed techniques are extracted from literature.The challenges of different ETD techniques and their mitigation are suggested for future work.It is observed that the literature on ETD lacks knowledge management techniques that can be more effective,not only for ETD but also for theft tracking.This can help in the prevention of energy theft,in the future,as well as for ETD. 展开更多
关键词 CHALLENGES comparative analysis energy theft detection future research directions smart grid TAXONOMY
在线阅读 下载PDF
Optimization Method of Suspected Electricity Theft Topic Model Based on Chi-square Test and Logistic Regression 被引量:1
8
作者 Jian Dou Ye Aliaosha 《国际计算机前沿大会会议论文集》 2018年第2期32-32,共1页
关键词 Anti-electricity theft CHI-SQUARE test LOGISTIC regressionPower consumption inspection
在线阅读 下载PDF
Spatial Analysis Applied for Gas Theft Modelling in Tabriz City, Iran
9
作者 Seyed Reza Rahnamay Touhidi Ismael Davoudi 《Journal of Geoscience and Environment Protection》 2018年第2期1-19,共19页
Unauthorized use of energy is the major source of the non-technical losses of the energy in developing countries. Gas theft as a kind of energy theft is an increasing issue in a number of countries particularly in dev... Unauthorized use of energy is the major source of the non-technical losses of the energy in developing countries. Gas theft as a kind of energy theft is an increasing issue in a number of countries particularly in developing countries. This study is an attempt to address the issue of gas theft through the deployment of Geographic Information System (GIS) capabilities (Spatial Analysis) to import external factors into the current gas theft detection methods, improve data mining processes, and offer some management solutions. To achieve the intended goals in the study, two types of data sources were collected and analyzed: internal data such as reported instances of gas theft, and some customer properties, and external data such as some demographic data. In order to analyze and modeling the gas theft and the relationships between variables we used Hotspot analysis, Ordinary Least Squares regression (OLS) and Geographically Weighted Regression (GWR) analysis with ArcGIS tools. The results from clustering test indicated that the gas theft is not a random phenomenon in all areas of Tabriz and there are underlying factors. Mapping clusters by the hotspot techniques suggested the locations of clusters and areas at risk. The results of the regression analysis illustrated the importance of external factors clearly. According to the results, we recommend a conceptual GIS framework to select high risk areas as a subset data for a meter data analysis. Results of this research are of great importance for GIS based spatial analysis and can be used as base of future researches. 展开更多
关键词 GIS GAS theft Spatial STATISTICS PROACTIVE ANALYTICS Tabriz CITY
暂未订购
Comparing the Similarities and Differences between All Versions of Grand Theft Auto
10
作者 Cagri Baris Kasap 《Journal of Software Engineering and Applications》 2018年第2期89-109,共21页
The article investigates the similarities and differences between all versions of Grand Theft Auto as an adventure game with the widest popularity in the last decade. The game is a story collection, a frame for perfor... The article investigates the similarities and differences between all versions of Grand Theft Auto as an adventure game with the widest popularity in the last decade. The game is a story collection, a frame for performance, a virtual museum of vernacular culture and a widely circulated pop culture artifact whose double-voiced aesthetic has given rise to diverse interpretive communities. The aim of comparing the differences and similarities between different versions of the game is to be able to evaluate the game from the user’s point of view. With this aim, whether with the verisimilitude that the different versions offer makes GTA a product of an iterative design process or not will be displayed. 展开更多
关键词 GRAND theft AUTO (GTA) Iterative Design ADVENTURE Game VERNACULAR Culture
暂未订购
An Analysis of the Female Images in Theft from the Perspective of Feminism
11
作者 DU Yan 《Journal of Literature and Art Studies》 2021年第1期21-25,共5页
In the field of vision of American Literature in the 20th century,Katherine Anne Porter is highly praised by many readers for her flexible artistic style,accurate and vivid description of characters,profound connotati... In the field of vision of American Literature in the 20th century,Katherine Anne Porter is highly praised by many readers for her flexible artistic style,accurate and vivid description of characters,profound connotation of her works.As a female writer,Porter is good at creating female characters from a unique female perspective,and reveals the inner activities of female characters in self-development and the female individual consciousness and independent consciousness pursued by women through her works.Although she doesn’t consciously involve feminism,we can see that the heroine’s female consciousness is gradually awakening from her portrayal of female characters and her exploration of female inner world.This paper takes Porter’s short story Theft published in the 1990s as an example to analyze the feminist consciousness in her works from the perspective of feminism. 展开更多
关键词 theft gender role female image feminist consciousness
在线阅读 下载PDF
Alternative Solutions to Mitigate Problems due to Neutral Conductors Theft in MV (Medium Voltage) Power Distribution Systems
12
作者 Fabio Romero Alden Uehara Antunes +5 位作者 Fernando Locks Lange Dario Takahata Andre Meffe Carlos Cesar Barioni de Oliveira Hamilton Bueno de Souza 《Journal of Energy and Power Engineering》 2014年第12期2074-2079,共6页
This paper aims at analyzing the impact of the neutral conductor absence at specific sections over the performance of the power distribution lines, and proposing alternative solutions to mitigate the problems caused b... This paper aims at analyzing the impact of the neutral conductor absence at specific sections over the performance of the power distribution lines, and proposing alternative solutions to mitigate the problems caused by the neutral conductor theft. Simulations are made by the software lnterplan and show that the absence of neutral conductor at specific sections of power distribution lines may increase the neutral-to-ground voltages, which compromises the system's safety. The solution developed keeps the technical performance of the power distribution system at satisfactory levels, regarding the voltage profile, or, at least, close to the level before the neutral conductor's theft. 展开更多
关键词 Power distribution systems conductor theft system safety neutral-to-ground voltages grounding.
在线阅读 下载PDF
A Fog-Based Approach for Theft Detection and Zero-Day Attack Prevention in Smart Grid Systems
13
作者 Remah Younisse Mouhammd AlKasassbeh Amjad Aldweesh 《Computers, Materials & Continua》 2025年第12期4921-4941,共21页
Smart grid systems are advancing electrical services,making them more compatible with Internet of Things(IoT)technologies.The deployment of smart grids is facing many difficulties,requiring immediate solutions to enha... Smart grid systems are advancing electrical services,making them more compatible with Internet of Things(IoT)technologies.The deployment of smart grids is facing many difficulties,requiring immediate solutions to enhance their practicality.Data privacy and security are widely discussed,and many solutions are proposed in this area.Energy theft attacks by greedy customers are another difficulty demanding immediate solutions to decrease the economic losses caused by these attacks.The tremendous amount of data generated in smart grid systems is also considered a struggle in these systems,which is commonly solved via fog computing.This work proposes an energytheft detection method for smart grid systems employed in a fog-based network infrastructure.This work also proposes and analyzes Zero-day energy theft attack detection through a multi-layered approach.The detection process occurs at fog nodes via five machine-learning classification models.The performance of the classifiers is measured,validated,and reported for all models at fog nodes,as well as the required training and testing time.Finally,the measured results are compared to when the detection process occurs at a central processing unit(cloud server)to investigate and compare the performance metrics’goodness.The results show comparable accuracy,precision,recall,and F1-measure performance.Meanwhile,the measured execution time has decreased significantly in the case of the fog-based network infrastructure.The fog-based model achieved an accuracy and recall of 98%,F1 score of 99%,and reduced detection time up to around 85%compared to the cloud-based approach. 展开更多
关键词 Smart grid security fog computing energy theft detection zero-day attack prevention machine learning in IoT
在线阅读 下载PDF
Electricity Theft Detection Method Based on Ensemble Learning and Prototype Learning
14
作者 Xinwu Sun Jiaxiang Hu +4 位作者 Zhenyuan Zhang Di Cao Qi Huang Zhe Chen Weihao Hu 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第1期213-224,共12页
With the development of advanced metering infrastructure(AMI),large amounts of electricity consumption data can be collected for electricity theft detection.However,the imbalance of electricity consumption data is vio... With the development of advanced metering infrastructure(AMI),large amounts of electricity consumption data can be collected for electricity theft detection.However,the imbalance of electricity consumption data is violent,which makes the training of detection model challenging.In this case,this paper proposes an electricity theft detection method based on ensemble learning and prototype learning,which has great performance on imbalanced dataset and abnormal data with different abnormal level.In this paper,convolutional neural network(CNN)and long short-term memory(LSTM)are employed to obtain abstract feature from electricity consumption data.After calculating the means of the abstract feature,the prototype per class is obtained,which is used to predict the labels of unknown samples.In the meanwhile,through training the network by different balanced subsets of training set,the prototype is representative.Compared with some mainstream methods including CNN,random forest(RF)and so on,the proposed method has been proved to effectively deal with the electricity theft detection when abnormal data only account for 2.5%and 1.25%of normal data.The results show that the proposed method outperforms other state-of-the-art methods. 展开更多
关键词 Electricity theft detection ensemble learning prototype learning imbalanced dataset deep learning abnormal level
原文传递
“摸鱼”如何带来创新?恢复体验曲线中介效应的情景实验与调查证据 被引量:1
15
作者 徐世勇 杨春梦 +1 位作者 李超平 李海蓉 《心理学报》 北大核心 2025年第1期135-151,共17页
基于资源保存理论,文章探索了时间窃取行为的过犹不及效应,分析其如何通过恢复体验对创新行为产生影响,以及正念的调节作用。通过对情景回顾实验的182份样本和三轮问卷调研的503份领导−员工配对数据进行统计检验,结果发现:(1)时间窃取... 基于资源保存理论,文章探索了时间窃取行为的过犹不及效应,分析其如何通过恢复体验对创新行为产生影响,以及正念的调节作用。通过对情景回顾实验的182份样本和三轮问卷调研的503份领导−员工配对数据进行统计检验,结果发现:(1)时间窃取与恢复体验呈倒U型关系,并进一步对创新行为产生影响;(2)正念调节了时间窃取通过恢复体验对创新行为的影响,即员工的正念水平越高,时间窃取对恢复体验的影响以及通过恢复体验对创新行为的间接作用越强。文章发现时间窃取可以作为一种工作内恢复形式影响员工的恢复体验和创新行为,这一观点丰富了时间窃取相关文献,拓展了工作内恢复的效果和机制研究,同时也为管理员工“摸鱼”提供了实践启示。 展开更多
关键词 时间窃取 恢复体验 正念 创新行为
在线阅读 下载PDF
人工智能时代新型财产犯罪的刑法规制
16
作者 刘宪权 《政法论丛》 北大核心 2025年第5期33-45,共13页
人工智能时代的新质生产力的发展必然会引发新型财产的出现,重塑财产权刑法保护的体系构造十分迫切。算力和数据是人工智能技术的重要支撑要素。算力是具有管理可能性、移转可能性与经济价值性的无体物,属于刑法上的财物。可通过交易方... 人工智能时代的新质生产力的发展必然会引发新型财产的出现,重塑财产权刑法保护的体系构造十分迫切。算力和数据是人工智能技术的重要支撑要素。算力是具有管理可能性、移转可能性与经济价值性的无体物,属于刑法上的财物。可通过交易方式实现经济利益,并通过数据的占有转移实现利益的具体化、确定化的数据资产,属于刑法所保护的财产性利益。算力和数据资产都具有集合性特征,且算力具有非即时消耗性特征,数据资产具有非竞争性和非排他性特征。应有限承认盗用行为的可罚性,以解决盗用算力行为法律规制缺位的难题。数据持有与刑法占有本质上都是排他性控制。数据的更改、删除或增加是竞争性的,这种竞争性利益也可以成为侵犯财产犯罪中占有的对象。应当通过司法解释对盗用算力以及盗窃数据资产行为的性质予以明确。对于新型财产的取得型犯罪,需要造成他人财产损失才可构成犯罪既遂。人工智能时代取得计算机信息系统控制权的行为与占有新型财产的行为之间完全可能构成手段与目的的关系,应依照牵连犯择一重罪论处。 展开更多
关键词 人工智能 新型财产 财产权 算力 数据资产 盗用
在线阅读 下载PDF
基于基准模型和门控循环单元的电力盗窃检测研究
17
作者 王艳芹 妙红英 +2 位作者 周凤华 张海宁 王禹霖 《微型电脑应用》 2025年第5期138-142,共5页
探讨高级计量基础设施(AMI)中的电力盗窃问题,确保能源管理和计费的正常进行。针对变化传输方法(CAT-AMI)提出一种有效的读数收集方法,但同时也注意了CAT-AMI易受到恶意消费者攻击的风险。采用机器学习模型进行虚假读数检测可能危及消... 探讨高级计量基础设施(AMI)中的电力盗窃问题,确保能源管理和计费的正常进行。针对变化传输方法(CAT-AMI)提出一种有效的读数收集方法,但同时也注意了CAT-AMI易受到恶意消费者攻击的风险。采用机器学习模型进行虚假读数检测可能危及消费者的隐私。因此,在保护消费者隐私的前提下,研究CAT-AMI中的电力盗窃检测问题。为此开发实际读数数据集生成良性数据集,并提出针对CAT-AMI的新网络攻击以生成恶意样本。随后,训练2种深度学习检测器,即基准模型(CNN)和卷积神经网络—门控循环单元(CNN-GRU)模型,来检测CAT-AMI中的电力盗窃行为。为了保护消费者的隐私,提出一种方法,使电力公用事业能够使用加密数据评估检测器,而无法学习读数。研究结果表明,采用CNN-GRU模型在保护消费者隐私的同时能够准确识别恶意消费者,并具有可接受的开销。为CAT-AMI系统提供了安全、隐私保护的电力盗窃检测方案。 展开更多
关键词 高级计量基础设施 电力盗窃检测 变化传输方法 隐私保护 门控循环单元
在线阅读 下载PDF
Methodology for Detecting Non-Technical Energy Losses Using an Ensemble of Machine Learning Algorithms
18
作者 Irbek Morgoev Roman Klyuev Angelika Morgoeva 《Computer Modeling in Engineering & Sciences》 2025年第5期1381-1399,共19页
Non-technical losses(NTL)of electric power are a serious problem for electric distribution companies.The solution determines the cost,stability,reliability,and quality of the supplied electricity.The widespread use of... Non-technical losses(NTL)of electric power are a serious problem for electric distribution companies.The solution determines the cost,stability,reliability,and quality of the supplied electricity.The widespread use of advanced metering infrastructure(AMI)and Smart Grid allows all participants in the distribution grid to store and track electricity consumption.During the research,a machine learning model is developed that allows analyzing and predicting the probability of NTL for each consumer of the distribution grid based on daily electricity consumption readings.This model is an ensemble meta-algorithm(stacking)that generalizes the algorithms of random forest,LightGBM,and a homogeneous ensemble of artificial neural networks.The best accuracy of the proposed meta-algorithm in comparison to basic classifiers is experimentally confirmed on the test sample.Such a model,due to good accuracy indicators(ROC-AUC-0.88),can be used as a methodological basis for a decision support system,the purpose of which is to form a sample of suspected NTL sources.The use of such a sample will allow the top management of electric distribution companies to increase the efficiency of raids by performers,making them targeted and accurate,which should contribute to the fight against NTL and the sustainable development of the electric power industry. 展开更多
关键词 Non-technical losses smart grid machine learning electricity theft FRAUD ensemble algorithm hybrid method forecasting classification supervised learning
在线阅读 下载PDF
基于STC89C52单片机的主动式汽车防盗系统设计与仿真
19
作者 袁永超 陈锦烁 +2 位作者 邹权华 周乐凯 梁腾方 《专用汽车》 2025年第8期107-109,共3页
针对传统汽车防盗系统难以应对车主疏忽导致的安全隐患,设计了一种基于STC89C52单片机的主动式汽车防盗系统,通过整合振动/红外传感器、GPS/GSM模块及限位开关,实现入侵检测与车窗状态监测。系统在识别异常振动或人员靠近时触发声光报... 针对传统汽车防盗系统难以应对车主疏忽导致的安全隐患,设计了一种基于STC89C52单片机的主动式汽车防盗系统,通过整合振动/红外传感器、GPS/GSM模块及限位开关,实现入侵检测与车窗状态监测。系统在识别异常振动或人员靠近时触发声光报警并推送定位信息至车主手机;若车窗未关则主动提醒处理。基于Proteus的硬件仿真验证了多模块协同运行的可靠性,实验证明其可有效降低因车主疏忽引发的盗窃风险,兼具低成本与高实用性,为智能防盗技术提供了创新性解决方案。 展开更多
关键词 STC89C52单片机 主动式防盗系统 PROTEUS仿真
在线阅读 下载PDF
基于多维度IncDBSCAN的打孔盗油车辆预警方法探讨
20
作者 卢兴亚 卢传钊 何建民 《管道保护》 2025年第4期75-81,共7页
打孔盗油事件不但给国家造成巨大经济损失,还可能危害国家能源安全、生态安全和公共安全,对打孔盗油须防患于未然,以避免危害结果的发生。通过深入分析打孔盗油嫌疑车辆的行为特征,引入多维度增量式DBSCAN算法(increment Density-Based ... 打孔盗油事件不但给国家造成巨大经济损失,还可能危害国家能源安全、生态安全和公共安全,对打孔盗油须防患于未然,以避免危害结果的发生。通过深入分析打孔盗油嫌疑车辆的行为特征,引入多维度增量式DBSCAN算法(increment Density-Based Spatial Clustering of Applications with Noise,IncDBSCAN),挖掘公安视频监控车辆抓拍数据中的潜在规律,可有效识别在管道保护区内活动的涉嫌盗油异常车辆。在与传统的支持向量机(Support Vector Machine,SVM)、基于密度带有噪声的空间聚类算法(Density-Based Spatial Clustering of Applications with Noise,DBSCAN)、K均值聚类算法(K-Means Clustering Algorithm,K-Means)的对比试验中,多维度IncDBSCAN模型具有更好的检测效果,其精确率为85%,召回率为82%,F1值为83.4%,均优于其他模型。该方法为输油管道打孔盗油视频智能预警提供了一种新的思路和手段。 展开更多
关键词 打孔盗油 增量聚类 车辆异常检测 预警模型 管道安全
在线阅读 下载PDF
上一页 1 2 92 下一页 到第
使用帮助 返回顶部