The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications
2. A HYBRID LEARNING ALGORITHM IN AUTOMATED TEXT
CATEGORIZATION OF LEGACY DATA
Dali Wang1
, Ying Bai2
, and David Hamblin1
1
Christopher Newport University, Newport News, VA, USA
2
Johnson C. Smith University, Charlotte, NC, USA
ABSTRACT
The goal of this research is to develop an algorithm to automatically classify measurement
types from NASA’s airborne measurement data archive. The product has to meet specific
metrics in term of accuracy, robustness and usability, as the initial decision-tree based
development has shown limited applicability due to its resource intensive characteristics. We
have developed an innovative solution that is much more efficient while offering comparable
performance. Similar to many industrial applications, the data available are noisy and
correlated; and there is a wide range of features that are associated with the type of
measurement to be identified. The proposed algorithm uses a decision tree to select features
and determine their weights. A weighted Naive Bayes is used due to the presence of highly
correlated inputs. The development has been successfully deployed in an industrial scale, and
the results show that the development is well-balanced in term of performance and resource
requirements.
KEYWORDS
Classification, machine learning, atmospheric measurement.
For More Details: http://aircconline.com/ijaia/V10N5/10519ijaia04.pdf
Volume Link: http://airccse.org/journal/ijaia/current2019.html
3. REFERENCES
[1] A. Aknan, G. Chen, J. Crawford, and E. Williams, ICARTT File Format Standards V1.1,
International Consortium for Atmospheric Research on Transport and Transformation, 2013
[2] Matthew Rutherford, Nathan Typanski, Dali Wang and Gao Chen, “Processing of ICARTT data
files using fuzzy matching and parser combinators”, 2014 International Conference on Artificial
Intelligence (ICAI’14), pp. 217-220, Las Vegas, July 2014
[3] Surajit Chaudhuri, Kris Ganjam, Venkatesh Ganti and Rajeev Motwani, “Robust and Efficient
Fuzzy Match for Online Data Cleaning”, Proceedings of the 2003 ACM SIGMOD
International Conference on Management of Data, June 2003, San Diego, CA, Pages 313 – 324.
[4] B. G. Buchanan and E. H. Shortliffe, “Rule Based Expert Systems: The MycinExperiments of
the Stanford Heuristic Programming Project”, Boston: MA, 1984.
[5] S.B. Kotsiantis, “Supervised Machine Learning: A Review of Classification Techniques”,
Informatica, Vol. 31, 2007, Pages 249-268
[6] L. Breiman, J. H. Friedman, R. Olshen, and C. J. Stone, Classification and Regression Trees
(Wadsworth, Belmont, CA, 1984).
[7] W. Y. Loh, “Classification and regression trees,” WIREs Data Mining Knowl Discovery (2011).
[8] David Hamblin, Dali Wang, Gao Chen and Ying Bai, “Investigation of Machine Learning
Algorithms for the Classification of Atmospheric Measurements”, Proceedings of the 2017
International Conference on Artificial Intelligence, page 115-119, Las Vegas, 2017
[9] Tjen-Sien Lim, Wei-Yin Loh, Yu-Shan Shih,“A Comparison of Prediction Accuracy,
Complexity, and Training Time of Thirty-Three Old and New Classification
Algorithms”,Machine Learning Vol. 40, 2000, Pages 203–228.
[10] Zijian Zheng, Geoffrey Webb, Lazy learning of Bayesian rules, MachineLearning 41, 2000, 53–
84.
[11] Jia Wu and Zhihua Cai, “Attribute Weighting via Differential Evolution Algorithm for Attribute
Weighted Naive Bayes”, Journal of Computational Information Systems, Vol. 7, Issue 5, 2011,
Pages 1672-1679
[12] JiZhu, Hui Zou, Saharon Rosset and Trevor Hastie, “Multi-class AdaBoost” Statistics and Its
Interface Volume 2 (2009) 349–360
[13] E. Alfaro, M. Gamez, and N. Garcia, “Adabag: An R Package for Classification with Boosting
and Bagging,” Journal of Statistical Softare, Volume 54, Issue 2 (2013).
4. AN APPLICATION OF CONVOLUTIONAL NEURAL
NETWORKS ON HUMAN INTENTION PREDICTION
Lin Zhang1
, Shengchao Li2
, Hao Xiong2
, Xiumin Diao2
and Ou Ma1
1
Department of Aerospace Engineering and Engineering Mechanics, University of
Cincinnati, Cincinnati, Ohio, USA
2
School of Engineering Technology, Purdue University, West Lafayette, Indiana, USA
ABSTRACT
Due to the rapidly increasing need of human-robot interaction (HRI), more intelligent robots
are in demand. However, the vast majority of robots can only follow strict instructions, which
seriously restricts their flexibility and versatility. A critical fact that strongly negates the
experience of HRI is that robots cannot understand human intentions. This study aims at
improving the robotic intelligence by training it to understand human intentions. Different
from previous studies that recognizing human intentions from distinctive actions, this paper
introduces a method to predict human intentions before a single action is completed. The
experiment of throwing a ball towards designated targets are conducted to verify the
effectiveness of the method. The proposed deep learning based method proves the feasibility
of applying convolutional neural networks (CNN) under a novel circumstance. Experiment
results show that the proposed CNN-vote method out competes three traditional machine
learning techniques. In current context, the CNN-vote predictor achieves the highest testing
accuracy with relatively less data needed.
KEYWORDS
Human-robot Interaction; Intentions Prediction; Convolutional Neural Networks;
For More Details: http://aircconline.com/ijaia/V10N5/10519ijaia01.pdf
Volume Link: http://airccse.org/journal/ijaia/current2019.html
5. REFERENCES
[1] J. Forlizzi and C. DiSalvo, “Service robots in the domestic environment,” in Proceeding of the
1st ACM SIGCHI/SIGART conference on Human-robot interaction - HRI ’06, 2006, p. 258.
[2] J. Bodner, H. Wykypiel, G. Wetscher, and T. Schmid, “First experiences with the da VinciTM
operating robot in thoracic surgery☆,” Eur. J. Cardio-Thoracic Surg., vol. 25, no. 5, pp. 844–
851, May 2004.
[3] M. J. Micire, “Evolution and field performance of a rescue robot,” J. F. Robot., vol. 25, no. 1–2,
pp. 17–30, Jan. 2008.
[4] F. Mondada et al., “The e-puck , a Robot Designed for Education in Engineering,” in
Robotics, 2009, vol. 1, no. 1, pp. 59–65.
[5] K. Wakita, J. Huang, P. Di, K. Sekiyama, and T. Fukuda, “Human-Walking-Intention-Based
Motion Control of an Omnidirectional-Type Cane Robot,” IEEE/ASME Trans. Mechatronics,
vol. 18, no. 1, pp. 285–296, Feb. 2013.
[6] K. Sakita, K. Ogawam, S. Murakami, K. Kawamura, and K. Ikeuchi, “Flexible cooperation
between human and robot by interpreting human intention from gaze information,” in 2004
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (IEEE Cat.
No.04CH37566), 2004, vol. 1, pp. 846–851.
[7] Z. Wang, A. Peer, and M. Buss, “An HMM approach to realistic haptic human-robot
interaction,” in World Haptics 2009 - Third Joint EuroHaptics conference and Symposium on
Haptic Interfaces for Virtual Environment and Teleoperator Systems, 2009, pp. 374–379.
[8] S. Kim, Z. Yu, J. Kim, A. Ojha, and M. Lee, “Human-Robot Interaction Using Intention
Recognition,” in Proceedings of the 3rd International Conference on Human-Agent Interaction,
2015, pp. 299–302.
[9] D. Song et al., “Predicting human intention in visual observations of hand/object interactions,” in
2013 IEEE International Conference on Robotics and Automation, 2013, pp. 1608–1615.
[10] D. Vasquez, T. Fraichard, O. Aycard, and C. Laugier, “Intentional motion on-line learning
and prediction,” Mach. Vis. Appl., vol. 19, no. 5–6, pp. 411–425, Oct. 2008.
[11] B. Ziebart, A. Dey, and J. A. Bagnell, “Probabilistic pointing target prediction via inverse
optimal control,” in Proceedings of the 2012 ACM international conference on Intelligent User
Interfaces - IUI ’12, 2012, p. 1.
6. [12] Z. Wang et al., “Probabilistic movement modeling for intention inference in human–robot
interaction,” Int. J. Rob. Res., vol. 32, no. 7, pp. 841–858, 201
[13] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, p. 436, 2015
[14] A. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar, and L. Fei-Fei, “Large-Scale
Video Classification with Convolutional Neural Networks,” in 2014 IEEE Conference on
Computer Vision and Pattern Recognition, 2014, pp. 1725–1732.
[15] X. Wang, L. Gao, P. Wang, X. Sun, and X. Liu, “Two-Stream 3-D convNet Fusion for Action
Recognition in Videos With Arbitrary Size and Length,” IEEE Trans. Multimed., vol. 20, no. 3,
pp. 634–644, Mar. 2018.
[16] P. Barros, C. Weber, and S. Wermter, “Emotional expression recognition with a cross-channel
convolutional neural network for human-robot interaction,” in 2015 IEEE-RAS 15th
International Conference on Humanoid Robots (Humanoids), 2015, pp. 582–587.
[17] A. H. Qureshi, Y. Nakamura, Y. Yoshikawa, and H. Ishiguro, “Show, attend and interact:
Perceivable human-robot social interaction through neural attention Q-network,” in 2017 IEEE
International Conference on Robotics and Automation (ICRA), 2017, pp. 1639–1645.
[18] L. Zhang, X. Diao, and O. Ma, “A Preliminary Study on a Robot’s Prediction of Human
Intention,” 7th Annu. IEEE Int. Conf. CYBER Technol. Autom. Control. Intell. Syst., pp. 1446–
1450, 2017.
[19] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet Classification with Deep
Convolutional Neural Networks,” Adv. Neural Inf. Process. Syst. (NIPS 2012), p. 4, 2012.
[20] J. Shotton et al., “Real-time human pose recognition in parts from single depth images,” in
CVPR 2011, 2011, vol. 411, pp. 1297–1304.
[21] F. Pedregosa et al., “Scikit-learn: Machine Learning in Pythons,” J. Mach. Learn. Res., vol.
12, no. 6, pp. 2825–2830, May 2011.
[22] M. Abadi et al., “TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed
Systems,” 2016.
[23] S. Li, L. Zhang, and X. Diao, “Improving Human Intention Prediction Using Data
Augmentation,” in HRI 2018 WORKSHOP ON SOCIAL HUMAN ROBOT INTERACTION
OF HUMAN-CARE SERVICE ROBOTS, 2018.
7. [24] J. Donahue et al., “Long-term recurrent convolutional networks for visual recognition and
description,” in Proceedings of the IEEE conference on computer vision and pattern
recognition, 2015, pp. 2625–2634.
[25] K. Simonyan and A. Zisserman, “Very Deep Convolutional Networks for Large-Scale Image
Recognition,” Inf. Softw. Technol., vol. 51, no. 4, pp. 769–784, Sep. 2014.
[26] C. Szegedy, S. Ioffe, V. Vanhoucke, and A. Alemi, “Inception-v4, Inception-ResNet and the
Impact of Residual Connections on Learning,” Pattern Recognit. Lett., vol. 42, pp. 11–24,
Feb. 2016
[27] P. Munya, C. A. Ntuen, E. H. Park, and J. H. Kim, “A BAYESIAN ABDUCTION MODEL
FOR EXTRACTING THE MOST PROBABLE EVIDENCE TO SUPPORT SENSEMAKING,”
Int. J. Artif. Intell. Appl., vol. 6, no. 1, p. 1, 2015.
[28] J. A. Morales and D. Akopian, “Human activity tracking by mobile phones through hebbian
learning,” Int. J. Artif. Intell. Appl., vol. 7, no. 6, pp. 1–16, 2016.
[29] C. Lee and M. Jung, “PREDICTING MOVIE SUCCESS FROM SEARCH QUERY USING
SUPPORT VECTOR REGRESSION METHOD,” Int. J. Artif. Intell. Appl. (IJAIA)., vol. 7,
no. 1,2016.
8. A SURVEY ON DIFFERENT MACHINE LEARNING
ALGORITHMS AND WEAK CLASSIFIERS BASED ON KDD
AND NSL-KDD DATASETS
Rama Devi Ravipati1
and Munther Abualkibash2
1
Graduate student in the Department of Computer Science, Eastern Michigan University,
Ypsilanti, Michigan
2
School of Information Security and Applied Computing, Eastern Michigan University,
Ypsilanti, Michigan
ABSTRACT
Network intrusion detection often finds a difficulty in creating classifiers that could handle
unequal distributed attack categories. Generally, attacks such as Remote to Local (R2L) and
User to Root (U2R) attacks are very rare attacks and even in KDD dataset, these attacks are
only 2% of overall datasets. So, these result in model not able to efficiently learn the
characteristics of rare categories and this will result in poor detection rates of rare attack
categories like R2L and U2R attacks. We even compared the accuracy of KDD and NSL-
KDD datasets using different classifiers in WEKA.
KEYWORDS
KDD, NSL-KDD, WEKA, AdaBoost, KNN, Detection rate, False alarm rate.
For More Details: http://aircconline.com/ijaia/V10N3/10319ijaia01.pdf
Volume Link: http://airccse.org/journal/ijaia/current2019.html
9. REFERENCES
[1] Brandon Lokesak (December 4, 2008). "A Comparison Between Signature Based and Anomaly
Based Intrusion Detection Systems" (PPT). www.iup.edu. Douligeris, Christos; Serpanos,
Dimitrios N. (2007-02-09). Network Security: Current Status and Future Directions. John Wiley
& Sons. ISBN 9780470099735.
[2] Rowayda, A. Sadek; M Sami, Soliman; Hagar, S Elsayed (November 2013). "Effective
anomaly intrusion detection system based on neural network with indicator variable and
rough set reduction". International Journal of Computer Science Issues (IJCSI). 10 (6).
[3] M. A. Maloof, Machine learning and data mining for computer security: Springer, 2006.
[4] J. M. Bonifacio, Jr., A. M. Cansian, A. C. P. L. F. De Carvalho, and E. S. Moreira, “Neural
networks applied in intrusion detection systems,” in Proc. IEEE Int. Joint Conf. Neural Netw.,
1998, vol. 1, pp. 205–210.
[5] Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, TzongWann Kao, Rong-Jian Chen, Jui-Lin
Lai, Citra Dwi Perkasa, A novel intrusion detection system based on hierarchical clustering
and support vector machines, Journal of Expert systems with Applications, Vol. 38, 2011, 306-
313
[6] Cheng Xiang, Png Chin Yong, Lim Swee Meng, Design of multiple-level hybrid classifier for
intrusion detection system using Bayesian clustering and decision trees, Journal of Pattern
Recognition Letters, Vol. 29, 2008, 918-924.
[7] Weiming Hu, Steve Maybank, “AdaBoost-Based Algorithm for Network Intrusion Detection”.
In IEEE transaction on systems, MAN, and CYBERNETICS, APRIL 2008.
[8] S. Sung, A.H. Mukkamala. “Identifying important features for intrusion detection using support
vector machines and neural networks”. In Proceedings of the Symposium on Applications and
the Internet (SAINT), pp. 209–216. IEEE .
[9] H. Kayacik, A. Zincir-Heywood and M. Heywood. “Selecting features for intrusion detection:
A feature relevance analysis on KDD 99 intrusion detection datasets”. In Proceedings of the
Third Annual Conference on Privacy, Security and Trust (PST). 2005.
[10] C. Lee, S. Shin and J. Chung. “Network intrusion detection through genetic feature selection”.
In Seventh ACIS International Conference on Software Engineering, Artificial Intelligence,
Networking, and Parallel/Distributed Computing (SNPD), pp. 109–114. IEEE Computer
Society,2006.
10. [11] M. Panda, M.R. Patra, “Semi-Naïve Bayesian method for network intrusion detection system”,
Neural information processing, Lecture Notes in Computer Science (Springer Link) 5863 (2009)
614–621.
[12] Sandeep Gurung, Mirnal Kanti Ghose, Aroj Subedi,"Deep Learning Approach on Network
Intrusion Detection System using NSL-KDD Dataset", International Journal of Computer
Network and Information Security(IJCNIS), Vol.11, No.3, pp.8-14, 2019.DOI:
10.5815/ijcnis.2019.03.02.
[13] Jawhar, M. M. T., & Mehrotra, M. (2010). Design network intrusion detection system using
hybrid fuzzy neural network. International JournalofComputerScience and Security, 4(3), 285-
294.
[14] Souza, P. V. C. (2018). Regularized Fuzzy Neural Networks for Pattern Classification
Problems. International Journal of Applied Engineering Research, 13(5), 2985-2991.
11. ADAPTIVE LEARNING EXPERT SYSTEM FOR DIAGNOSIS
AND MANAGEMENT OF VIRAL HEPATITIS
Henok Yared Agizew
Department of Management Information System, Mettu University, Mettu, Ethiopia.
ABSTRACT
Viral hepatitis is the regularly found health problem throughout the world among other easily
transmitted diseases, such as tuberculosis, human immune virus, malaria and so on. Among all
hepatitis viruses, the uppermost numbers of deaths are result from the long-lasting hepatitis C
infection or long-lasting hepatitis B. In order to develop this system, the knowledge is acquired using
both structured and semi-structured interviews from internists of St.Paul Hospital. Once the
knowledge is acquired, it is modeled and represented using rule based reasoning techniques. Both
forward and backward chaining is used to infer the rules and provide appropriate advices in the
developed expert system. For the purpose of developing the prototype expert system SWI-prolog
editor also used. The proposed system has the ability to adapt with dynamic knowledge by
generalizing rules and discover new rules through learning the newly arrived knowledge from domain
experts adaptively without any help from the knowledge engineer.
KEYWORDS
Expert System, Diagnosis and Management of Viral Hepatitis, Adaptive Learning, Discovery and
Generalization Mechanism.
For More Details: http://aircconline.com/ijaia/V10N2/10219ijaia04.pdf
Volume Link: http://airccse.org/journal/ijaia/current2019.html
12. REFERENCES
[1] Amanuel, A. (2016).”Self Learning Computer Troubleshooting Expert System.”
International Journal of Artificial Intelligence & Applications (IJAIA). 7(1), pp.45-58.
[2] Blaxton, T.A & Kushner, B.G. (1986). “An Organizational Framework for Comparing Adaptive
Artificial Intelligence Systems.” ACM Fall Joint Computer Conference, 3(2):190-199
[3] Clair, D. C., Bond, W. E., Flachsbart, B. B., and Vigland, A. R. (1987). “An Architecture for
Adaptive Learning in Rule-Based Diagnostic Expert Systems.” Proceedings of the Fall Joint
Computer Conference, IEEE Computer Society. pp. 678-685.
[4] Dhiman, RK. (2018). National Guidelines for Diagnosis & Management of Viral Hepatitis,
National Health Mission, India.
[5] Dipanwita, Biswas, Sagar Bairagi, Neelam Panse & Nirmala Shinde. (2011). Disease Diagnosis
System. International Journal of Computer Science & Informatics, 1(2):48-51.
[6] Durkin. J. (1996). Expert Systems: A View of the Future. IEEE Expert, University of Akron, 56-
63.
[7] Heijst.(2006).“Conceptual Modelling for Knowledge-Based Systems.” Encyclopedia of
Computer Science and Technology, Marce Dekker Inc., New York.
[8] Malhotra.(june, 2015) “Evolution of Knowledge Representation and Retrieval Techniques.”
I.J. Intelligent Systems and Applications. [online]. 2015 (7), pp. 18-28.
[9] Paulo,V and Augusto,J. (2018). “Using fuzzy neural networks for improving the prediction of
children with autism through mobile devices.” ISCC 2018 Workshops - ICTS4eHealth
1570446039. Available: https://www.researchgate.net/publication/329033556.[Nov., 2018].
[10] Sajja, P., & Akerkar, R. (2010). Knowledge-Based Systems for Development. In P. Sajja, & R.
Akerkar, Advanced Knowledge Based Systems: Model, Applications & Research, 1(1):1 – 11.
[11] Seblewongel, E. (2011). “Prototype knowledge based system for anxiety mental disorder
diagnosis.” Master’s Thesis, Addis Abeba University, Addis Abeba, Ethiopia.
13. [12] Solomon, G. (2013). “A self-learning knowledge based system for diagnosis and treatment of
diabetes.” Master’s Thesis, Addis Abeba University, Addis Abeba, Ethiopia.
[13] Tesfamariam, M. A. (2015). Integrating Data Mining Results with the Knowledge Based for
Diagnosis and Treatment of Visceral Leishmaniasis. Master’s Thesis, University of Gonder,
Gonder, Ethiopia.
[14] World Health Organization,(2013). Global health impact report of viral hepatitis.
[15] World Health Organization,(2017). “Prevention, Care and Treatment of Viral Hepatitis in the
African Region: Framework for Action,2016-2020 Regional Office for Africa.”
14. EFFICIENT POWER THEFT DETECTION FOR RESIDENTIAL
CONSUMERS USING MEAN SHIFT DATA MINING
KNOWLEDGE DISCOVERY PROCESS
Blazakis Konstantinos1
and Stavrakakis Georgios2
1
School of Electrical and Computer Engineering, Technical University of Crete, Greece
2
School of Electrical and Computer Engineering, Technical University of Crete, Greece
ABSTRACT
Energy theft constitutes an issue of great importance for electricity operators. The attempt to detect
and reduce non-technical losses is a challenging task due to insufficient inspection methods. With the
evolution of advanced metering infrastructure (AMI) in smart grids, a more complicated status quo in
energy theft has emerged and many new technologies are being adopted to solve the problem. In order
to identify illegal residential consumers, a computational method of analyzing and identifying
electricity consumption patterns of consumers based on data mining techniques has been presented.
Combining principal component analysis (PCA) with mean shift algorithm for different power theft
scenarios, we can now cope with the power theft detection problem sufficiently. The overall research
has shown encouraging results in residential consumers power theft detection that will help utilities to
improve the reliability, security and operation of power network.
KEYWORDS
Data mining, Mean Shift clustering algorithm, Principal Component Analysis (PCA), Density-Based
Spatial Clustering of Applications with Noise (DBSCAN), Non-Technical Losses (NTLs), power
theft, smart grid, smart electricity metering
For More Details: http://aircconline.com/ijaia/V10N1/10119ijaia06.pdf
Volume Link: http://airccse.org/journal/ijaia/current2019.html
15. REFERENCES
[1] A. K. Gupta, A. Mukherjee, A. Routray and R. Biswas, "A novel power theft detection algorithm
for low voltage distribution network," IECON 2017 - 43rd Annual Conference of the IEEE
Industrial Electronics Society, Beijing, 2017, pp. 3603-3608. Doi:
10.1109/IECON.2017.8216611.
[2] Jokar, Paria, Nasim Arianpoo, and Victor CM Leung. "Electricity theft detection in AMI using
customers’ consumption patterns." IEEE Trans. on Smart Grid Vol. 7, No. 1, January 2016.
[3] Nunoo, Solomon, and joseph c. Attachie. "A methodology for the design of an electricity theft
monitoring system." journal of theoretical & applied information technology 26.2 (2011).
[4] Jiang, R., Lu, R., Wang, Y., Luo, J., Shen, C., & Shen, X. S. (2014). Energy-theft detection
issues for advanced metering infrastructure in smart grid. Tsinghua Science and Technology, pp
105-120 Volume 19, Number 2, April 2014.
[5] Blazakis, K., Davarzani, S., Stavrakakis, G., & Pisica, I. (2016). Lessons learnt from mining
meter data of residential consumers. Periodica Polytechnica. Electrical Engineering and
Computer Science, 60(4), 266.
[6] LEWIS, Fabian B. Costly ‘Throw-Ups’: Electricity Theft and Power Disruptions. The
Electricity Journal, 2015, 28.7: 118-135.
[7] P. Antmann, Reducing technical and non-technical losses in the power sector,in: Background
Paper for the WBG Energy Strategy, Tech. Rep., Washington,DC, USA: The World Bank, 2009,
n.d.
[8] Depuru, Soma Shekara Sreenadh Reddy. Modeling, detection, and prevention of electricity theft
for enhanced performance and security of power grid. The University of Toledo, 2012.
[9] Prasad, Jagdish, and Ravi Samikannu. "Overview, issues and prevention of energy theft in smart
grids and virtual power plants in Indian context." Energy Policy 110 (2017): 365-374.
[10] Nunoo, Solomon, and Joseph C. Attachie. "A methodology for the design of an electricity
theft monitoring system." Journal of Theoretical & Applied Information Technology 26.2
(2011).
[11] Carreira-Perpinán, Miguel A. "A review of mean-shift algorithms for clustering." arXiv
preprint arXiv:1503.00687 (2015).
[12] Isqeel, Abdullateef Ayodele, Salami Momoh-Jimoh Eyiomika, and Tijani Bayo Ismaeel.
"Consumer Load Prediction Based on NARX for Electricity Theft Detection." Computer and
Communication Engineering (ICCCE), 2016 International Conference on. IEEE, 2016.
16. [13] A. Nizar, Z. Y. Dong, and P. Zhang, “Detection rules for non technical losses analysis in power
utilities,” in Proc. IEEE PowerEnergy Soc.Gen. Meeting, 2008, pp. 1–8.
[14] J. Cabral, J. Pinto, and A. Pinto, “Fraud detection system for highand low voltage electricity
consumers based on data mining,” in Proc. Power Energy Soc. Gen. Meeting, Jul. 2009, pp. 1–
5.
[15] Chandel, Priyamvada, et al. "Power theft: Major cause of non technical losses in Indian
distribution sector." Power India International Conference (PIICON), 2016 IEEE 7th. IEEE,
2016.
[16] Nagi, J., Yap, K. S., Tiong, S. K., Ahmed, S. K., & Mohamad, M. (2010). Nontechnical loss
detection for metered customers in power utility using support vector machines. IEEE
transactions on Power Delivery, 25(2), 1162-1171.
[17] Viegas, Joaquim L., et al. "Solutions for detection of non-technical losses in the electricity
grid: A review." Renewable and Sustainable Energy Reviews 80 (2017): 1256-1268.
[18] Messinis, George M., and Nikos D. Hatziargyriou. "Review of non-technical loss detection
methods." Electric Power Systems Research 158 (2018): 250-266.
[19] P. Glauner, J. Meira, P. Valtchev, R. State and F. Bettinger, "The Challenge of Non-Technical
Loss Detection using Artificial Intelligence: A Survey", International Journal of
Computational Intelligence Systems (IJCIS), vol. 10, issue 1, pp. 760-775, 2017.
[20] P. Glauner, N. Dahringer, O. Puhachov, J. Meira, P. Valtchev, R. State and D. Duarte,
"Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial
Visualizations", Proceedings of the 17th IEEE International Conference on Data Mining
Workshops (ICDMW 2017), New Orleans, USA, 2017.
[21] Nagi, J., Yap, K. S., Tiong, S. K., Ahmed, S. K., & Mohammad, A. M. (2008, November).
Detection of abnormalities and electricity theft using genetic support vector machines. In
TENCON 2008-2008 IEEE Region 10 Conference (pp. 1-6). IEEE.
[22] Nagi, J., Mohammad, A. M., Yap, K. S., Tiong, S. K., & Ahmed, S. K. (2008, December).
Nontechnical loss analysis for detection of electricity theft using support vector machines. In
Power and Energy Conference, 2008. PECon 2008. IEEE 2nd International (pp. 907-912). IEEE.
17. [23] Buzau, Madalina-Mihaela, et al. "Detection of Non-Technical Losses Using Smart Meter Data
and Supervised Learning." IEEE Transactions on Smart Grid (2018).
[24] Cheng, J., Ren, R., Wang, L., & Zhan, J. (2017). Deep Convolutional Neural Networks for
Anomaly Event Classification on Distributed Systems. arXiv preprint arXiv:1710.09052.
[25] Monedero, Iñigo, et al. "Detection of frauds and other non-technical losses in a power utility
using Pearson coefficient, Bayesian networks and decision trees." International Journal of
Electrical Power & Energy Systems 34.1 (2012): 90-98.
[26] Nizar, A. H., Z. Y. Dong, and Y. Wang. "Power utility nontechnical loss analysis with extreme
learning machine method." IEEE Transactions on Power Systems 23.3 (2008): 946-955.
[27] Ramos, C. C. O., de Sousa, A. N., Papa, J. P., & Falcao, A. X. (2011). A new approach for
nontechnical losses detection based on optimum-path forest. IEEE Transactions on Power
Systems, 26(1), 181-189.
[28] Angelos, E. W. S., Saavedra, O. R., Cortés, O. A. C., & de Souza, A. N. (2011). Detection and
identification of abnormalities in customer consumptions in power distribution systems. IEEE
Transactions on Power Delivery, 26(4), 2436-2442.
[29] Rossoni, A., Braunstein, S. H., Trevizan, R. D., Bretas, A. S., & Bretas, N. G. (2016, July).
Smart distribution power losses estimation: A hybrid state estimation approach. In Power and
Energy Society General Meeting (PESGM), 2016 (pp. 1-5). IEEE.
[30] Bhat, R. R., Trevizan, R. D., Sengupta, R., Li, X., & Bretas, A. (2016, December). Identifying
Nontechnical Power Loss via Spatial and Temporal Deep Learning. In Machine Learning and
Applications (ICMLA), 2016 15th IEEE International Conference on (pp. 272-279). IEEE.
[31] Zheng, Zibin, et al. "Wide & Deep Convolutional Neural Networks for Electricity-Theft
Detection to Secure Smart Grids." IEEE Transactions on Vehicular Technology 99 (2018): 1-1.
[32] Wang, Yi, et al. "Deep Learning-Based Socio-demographic Information Identification from
Smart Meter Data." IEEE Transactions on Smart Grid, Doi 10.1109/TSG.2018.2805723 (2018).
[33] Jardini, J. A., Tahan, C. M., Gouvea, M. R., Ahn, S. U., & Figueiredo, F. M. (2000). Daily load
profiles for residential, commercial and industrial low voltage consumers. IEEE Transactions on
power delivery, 15(1), 375-380.
18. [34] Gerbec, D., et al. "An approach to customers daily load profile determination" IEEE Power
Engineering Society Summer Meeting, Chicago-USA, 21-25 July 2002, Vol.1.
[35] Carreira-Perpinán, M. A. (2015). "A review of mean-shift algorithms for clustering". CRC
Handbook of Cluster Analysis, edited by Roberto Rocci, Fionn Murtagh, Marina Meila and
Christian Hennig.
[36] Krishna, Varun Badrinath, Gabriel A. Weaver, and William H. Sanders. "PCA-based method
for detecting integrity attacks on advanced metering infrastructure." International
Conference on Quantitative Evaluation of Systems. Springer, Cham, 2015.
[37] Krishna, Varun Badrinath, Carl Gunter, and William H. Sanders. "Evaluating Detectors on
Optimal Attack Vectors that enable Electricity Theft and DER Fraud." IEEE Journal of Selected
Topics in Signal Processing Vol. 12, No. 4, August 2018.
[38] Krishna, Varun Badrinath, et al. "F-DETA: A framework for detecting electricity theft attacks in
smart grids." Dependable Systems and Networks (DSN), 46th Annual IEEE/IFIP International
Conference on. IEEE, 2016.
[39] Costa, Breno C., et al. "Fraud detection in electric power distribution networks using an
ANNbased knowledge-discovery process." International Journal of Artificial Intelligence &
Applications, Vol. 4, No. 6, November 2013.
[40] Jardini, J. A., Tahan, C. M., Gouvea, M. R., Ahn, S. U., & Figueiredo, F. M. (2000). Daily load
profiles for residential, commercial and industrial low voltage consumers. IEEE Transactions on
power delivery, 15(1), 375-380.
[41] Capasso, A., Grattieri, W., Lamedica, R., & Prudenzi, A. (1994). A bottom-up approach to
residential load modeling. IEEE Transactions on Power Systems, 9(2), 957-964.
[42] Smith, Lindsay I. "A tutorial on principal components analysis", Cornell University, USA
51.52 (2002): 65.
[43] Abdullah, Manal, Majda Wazzan, and Sahar Bo-Saeed. "Optimizing face recognition using
PCA", International Journal of Artificial Intelligence & Applications (IJAIA), Vol.3, No.2,
March 2012.
19. [44] Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters
in large spatial databases with noise. In: Proceedings of KDD’96. vol. 96, pp. 226-231 (1996)
[45] Al-khurayji, Raed, and Ahmed Sameh. "An Effective Arabic Text Classification Approach
Based on Kernel Naive Bayes Classifier." International Journal of Artificial Intelligence
Applications, Vol.8, No.6, November 2017.
[46] Ali Akbar Ghasemi, Mohsen Gitizadeh. "Detection of illegal consumers using pattern
classification approach combined with Levenberg-Marquardt method in smart grid", Electrical
Power and Energy Systems 99 (2018) 363–375.
AUTHORS
Blazakis Konstantinos: Received his BSc degree in Applied Mathematical and Physical
Sciences from N.T.U.A. (National Technical University of Athens) in 2010 and his MSc
degree in Electrical and Computer Engineering from Technical University of Crete, Chania,
Greece in 2015. Currently, he is a PhD candidate at Technical University of Crete. His areas
of research include data mining, machine learning, smart grids, distributed electricity
networks, renewable energy
Stavrakakis Georgios: Received his first degree Diploma in Electrical Engineering from the
N.T.U.A. (National Technical University of Athens), Athens, in 1980. His D.E.A. in
Automatic Control and Systems Engineering was obtained from I.N.S.A., Toulouse, in 1981
and his Ph.D. in the same area was obtained from “Paul Sabatier-Toulouse III” University,
Toulouse-France, in 1984. He has worked as a Research Fellow in the Robotics Laboratory of
N.T.U.A. (1985-1988), and as a Visiting Scientist at the Institute for Systems Engineering
and Informatics/Components Diagnostics & Reliability Sector of the Joint Research Center-
EEC at Ispra, Italy (1989-1990). He was Vice President of the Hellenic Center for Renewable
Energy Sources (CRES), Pikermi, Athens-Greece (2000-2002). He is currently a Full
Professor at the Technical University of Crete, Chania, Greece.