Next Article in Journal
Tritium Extraction from Lithium–Lead Eutectic Alloy: Experimental Characterization of a Permeator against Vacuum Mock-Up at 450 °C
Next Article in Special Issue
A Review of Research on Dynamic and Static Economic Dispatching of Hybrid Wind–Thermal Power Microgrids
Previous Article in Journal
Multi-Time-Scale Coordinated Optimum Scheduling Technique for a Multi-Source Complementary Power-Generating System with Uncertainty in the Source-Load
Previous Article in Special Issue
Electric Power Load Forecasting Method Based on a Support Vector Machine Optimized by the Improved Seagull Optimization Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Realizing the Improvement of the Reliability and Efficiency of Intelligent Electricity Inspection: IAOA-BP Algorithm for Anomaly Detection

1
State Grid Tianjin Marketing Service Center, Tianjin 300200, China
2
State Key Laboratory of Reliability and Intelligence of Electrical Equipment, Hebei University of Technology, Tianjin 300401, China
3
Key Laboratory of Electromagnetic Field and Electrical Apparatus Reliability of Hebei Province, Hebei University of Technology, Tianjin 300401, China
*
Author to whom correspondence should be addressed.
Energies 2023, 16(7), 3021; https://doi.org/10.3390/en16073021
Submission received: 16 February 2023 / Revised: 17 March 2023 / Accepted: 20 March 2023 / Published: 25 March 2023
(This article belongs to the Special Issue Novel Developments in Distribution Systems and Microgrids)

Abstract

:
Anomaly detection can improve the service level of the grid, effectively save human resources and reduce the operating cost of a power company. In this study, an improved arithmetic optimization-backpropagation (IAOA-BP) neural algorithm for an anomaly detection model was proposed for electricity inspection. The dynamic boundary strategy of the cosine control factor and the differential evolution operator are introduced into the arithmetic optimization algorithm (AOA) to obtain the improved arithmetic optimization algorithm (IAOA). The algorithm performance test proves that the IAOA has better solving ability and stability compared with the AOA, WOA, SCA, SOA and SSA. The IAOA was subsequently used to obtain the optimal weights and thresholds for BP. In the experimental phase, the proposed model is validated with electricity data provided by a power company. The results reveal that the overall determination accuracy using the IAOA-BP algorithm remains above 96%, and compared with other algorithms, the IAOA-BP has a higher accuracy and can meet the requirements grid supervision. The power load data anomaly detection model proposed in this study has some implications that might suggest how power companies can promote grid business model transformation, improve economic efficiency, enhance management and improve service quality.

1. Introduction

Electricity consumption inspection is an important part of power marketing work, which is of great significance to improving the management level and economic efficiency of enterprises, and regulating the power consumption behavior of customers [1] (Ahir et al., 2022). With the rapid development and progress of the economy and society, the smart grid is developing rapidly [2] (Kim et al., 2021). The smart grid is a grid that realizes panoramic operation information, networked data transmission, dynamic safety assessment, refined dispatching decision, automated operation control, and optimized machine and network coordination, and ensures a safe and reliable, flexible and coordinated, high-quality and efficient, and economically and environmentally friendly grid operation. In existing projects and future plans, various countries have invested significant human and financial resources in the development of smart grids [3] (Alabe et al., 2022). The increased intelligence of the power system has led to the timely and efficient collection of a wide variety of power data from a variety of sources [4] (Gaggero et al., 2022). These data originate from every node of the power supply system and are characterized by high dimensionality, multiple types and large volumes [5] (Chen et al., 2022). There are many sources of power data, which mainly come from power production, generation, transmission, substations, distribution and consumption [6] (Mari et al., 2021). They can be broadly divided into three categories: firstly, power enterprise management data; secondly, power enterprise marketing data; and thirdly, power grid operation and equipment testing data [7] (Moure-Garrido et al., 2022). However, the power network is so large and the operating conditions are so complex that a small power failure problem can lead to a local grid failure [8] (Lee et al., 2022). In addition, abnormal power consumption behavior can cause a chain reaction and threaten the safety of the entire power grid [9] (Lei et al., 2023). Therefore, we must monitor the operational status of the power grid, conduct real-time detection of abnormal users, and conduct timely on-site inspections to eliminate safety hazards when abnormal power usage is detected. Anomaly data detection is an important support for the safe operation of the power grid [10]. In the distribution network, the use of anomaly detection methods can identify various abnormal states affecting electrical energy and identify the source so that losses can be stopped in time [11] (Oh et al., 2022). For equipment monitoring, anomaly detection can help check the operating status of equipment and effectively ensure its stable operation [12] (OpreaBara, 2021). For intelligent power systems, anomaly detection can improve the service level of the grid, effectively saving human resources, reducing operating costs and enabling the grid to operate more economically [13] (Pan et al., 2022).

2. Literature Review

The main causes of outliers in power data are caused by different sources of data, different statistical calibers of data, equipment failures, missing data master attributes, problems such as abnormal power usage behavior and the lack of standardized rules for storing power data [12,14]. Some outliers hide information related to the occurrence of abnormal situations in the system, and these data can be used to identify where the faults in the grid lie and eliminate them in a timely manner, and to provide methods to solve the abnormal situations, such as equipment fault detection and abnormal user behavior [15,16] (Wang et al., 2020; Wang et al., 2019). The data can be used to detect and analyze abnormalities in the grid and to reduce power losses [17] (Y. Peng et al., 2021). The application of effective abnormality detection means that the abnormal state of electrical energy can be monitored, the sources of power quality can be identified and eliminated, the spread of faults can be prevented, and power losses can be reduced. For equipment monitoring, specifically, abnormality detection helps to check the operational status of equipment and ensure stable operation [18,19,20].
The existing research can be broadly categorized into two types of detection methods: (1) traditional detection methods; (2) artificial intelligence-based detection methods [2] (Kim et al., 2021). The traditional power load anomaly data detection methods are generally based on human experience, state estimation, load curve similarity and load change rate [21] (Li et al., 2020). Usually, the experience-based detection method is a means to achieve the identification of abnormal load data by the power staff, using the accumulated relevant knowledge and work experience, among other subjective methods, which is rarely used at present due to low efficiency and many other human factors [6,22] (Maamar et al., 2019; Mari et al., 2021). Artificial intelligence-based detection methods, such as artificial neural networks and support vector machines, have achieved better detection results [23] (OpreaBara, 2021).
With the advent of grid intelligence, load clustering methods are increasingly being explored [24] (Park et al., 2020). The use of clustering algorithms for multiple clustering of loads, the selection of the best model based on the clustering evaluation index and this model’s application are common tools. Leong et al. identified a method using Euclidean distance as a similarity criterion, but it was difficult to identify load curves with similar distances and different shapes [25] (Leong et al., 2016). Panapakidis et al. adopted a fuzzy clustering approach to classify load curves, and used cluster evaluation metrics to determine the optimal number of clusters [26] (Panapakidis et al., 2017). Traditional clustering methods often have some shortcomings and need to be optimized to improve the model, e.g., through optimization algorithms to find the best clustering centers [27,28] (Abul Hasan et al., 2011; Beyan et al., 2015). Based on fuzzy clustering and systematic clustering, some scholars have taken the approach of quadratic clustering and innovated it to explore customer electricity consumption characteristics from different directions [29] (Xiao et al., 2020). Others combine fuzzy C-means with K-means clustering algorithms and add variational modal decomposition algorithms, with significantly improved clustering effects [30,31] (Qi et al., 2022; J.F. Zhang et al., 2021). The above methods all perform clustering in the original space, and as the data collected by smart meters gradually become more detailed, the dimensionality of the data obtained will become higher and higher, and the application of direct clustering will be constrained by the computational efficiency and eventually reduce the performance of clustering.
The detection of electricity anomalies is an important part of electricity inspection. The traditional way of detecting abnormal electricity consumption first requires the installation of equipment, such as metering boxes and smart meters, to prevent abnormal electricity consumption, and when the system detects an abnormality, it requires grid staff to visit the site to make a judgement based on sensor data using their experience, which takes a lot of time, manpower and economic costs [10,32] (Zhao et al., 2019; Zheng et al., 2021). After a long period of research and practice by scholars, artificial intelligence-based methods of detecting anomalies in electricity consumption have now been widely used in practice. Singh et al. proposed a decision tree-based method that feeds decision tree-processed data into a support vector machine classifier as input [33] (Singh et al., 2018). The scheme is capable of detecting and locating power theft at all levels of the transmission and distribution network in real time. Simulation results indicate that the algorithm has some real-time performance and improves the correctness of data anomaly checking to a certain extent. Wang et al. used an artificial neural network for power anomaly detection, and simulation experiments demonstrated that the method could significantly improve the efficiency of anomaly detection and help the company recover the cost of losses [15] (Wang et al., 2020). Pei et al. used a support vector machine (SVM) to collect load information from clients to detect anomalous behavior, and experiments show that its detection performance is superior to traditional methods [34] (Pei et al., 2022). Similarly, Yampikulsakul et al. investigated a least squares SVM approach to wind power system anomaly identification [35] (Yampikulsakul et al., 2014). An SVM-based anomaly detection algorithm is proposed by Wang et al; the results of the actual tests demonstrate the practicality and high accuracy of the proposed algorithm [16] (Wang et al., 2019). Tian et al. used an SVM to identify anomalies based on historical load data [36] (Tian et al., 2022). However, an SVM is only a simple probabilistic classifier, which has some limitations in dealing with complex data. Applying an artificial neural network to abnormal electricity usage detection can successfully extract features from a large amount of data and achieve better detection results.
Applying artificial intelligence technology to the detection of abnormal electricity consumption behavior can be a good way to extract features from a large amount of data and achieve better detection results [37,38] (Hossein Mohammadi Rouzbahani et al., 2021; H.M. Rouzbahani et al., 2023). Peng et al. proposed a network traffic anomaly detection algorithm with a backpropagation (BP) neural network algorithm and a Bayesian network. The results show that the method can not only detect anomalies but also handle them [39] (H. Peng et al., 2019). Zhang et al. proposed an anomaly detection algorithm based on a BP neural network. Simulation results show that the proposed algorithm can detect anomalies more accurately [10] (Y. Zhang et al., 2019). Similarly, Yang et al. proposed a BP neural network-based abnormal load detection model. The simulation results show that the detection model has better recognition accuracy [40] (Yang et al., 2023). Shang et al. proposed a BP neural network-based method for predicting electricity theft behavior. The simulation results verify that the method has certain practicality and effectiveness [41] (Shang et al., 2022).
A BP neural network is a kind of artificial intelligence technology. The gradient descent optimization algorithm is used in the neural network, and when the number of neurons increases, the target error function to be optimized becomes more complex, resulting in a longer error convergence time [21,42,43] (Yan Zhang et al., 2022; Zhong et al., 2014). Therefore, there is an urgent need to improve the parameter optimization process of the neural network and increase the training speed. Based on the above problems, this paper proposes an algorithm for detecting abnormal behavior in electricity consumption based on an improved arithmetic optimization algorithm for optimizing BP neural networks. The meaningful contributions of this study can be summarized as follows.
  • An improved arithmetic optimization algorithm (IAOA) is proposed. Compared with the other algorithm, the IAOA has a stronger solving ability and efficiency.
  • An improved arithmetic optimization algorithm-backpropagation (IAOA-BP) neural algorithm is proposed. The IAOA-BP algorithm is used for power data anomaly detection.
  • The proposed IAOA-BP anomaly detection method maintains a high accuracy rate, which can improve the detection efficiency and reduce the operational cost of the business.
The rest of this study is organized as follows. Section 3 describes the IAOA-BP based anomaly detection method. Section 4 conducts simulation experiments and discusses them. Section 5 describes the contribution of the study and its limitations.

3. Improved Arithmetic Optimization Algorithm-Backpropagation Neural Algorithm

The Arithmetic Optimization Algorithm (AOA) is a new type of heuristic algorithm for solving engineering problems, which can simulate the behavior of a population to optimize numerical problems in an iterative manner. However, similarly to most heuristic algorithms, some improvements to the algorithm are needed to further enhance its solving power and improve its ability to jump out of the local optimum [44]. Therefore, how to improve the optimization ability of the algorithm has become a hot topic of concern for many researchers [45,46] (Ali et al., 2023; AliKamel et al., 2022; AliSalawudeen et al., 2022). The improved AOA (IAOA) is employed for optimizing a BP neural network. Next, this study will detail the IAOA-BP algorithm.

3.1. Arithmetic Optimization Algorithm

The AOA is a novel meta-inspired algorithm proposed by Laith Abualigah [47] (Abualigah et al., 2021). The AOA is inspired by the arithmetic operations add (A), subtract (S), multiply (M) and divide (D) in arithmetic problems. The multiply M and divide D operations allow for highly dispersed data for particle exploration and finding locations close to optimal solutions; the add A and subtract S operations allow for highly dense data for particle development and have the ability to avoid getting trapped in a local optimum and prevent stagnation late in the iteration. The exploration and exploitation operations of the particles in each iteration depend on the value of the mathematically optimized acceleration function (MOA), as follows.
M O A ( i t e r ) = M I N + i t e r × ( M A X M I N ) / M a x _ i t e r
where MAX and MIN are the maximum and minimum values of MOA, respectively; iter denotes the current number of iterations; Max_iter denotes the number of iterations. The mathematical optimization probability (MOP) is the coefficient in the particle position update equation, which can be expressed as follows.
M O P ( i t e r ) = 1 1 / M a x _ i t e r 1 / δ
where δ is a sensitive parameter and is set to 5 in this experiment.
(1)
Initialization
During initialization, we set the maximum iterations, the number of particles, the number of particle dimensions, the upper limit UB and the lower limit LB of the particle positions. We randomly initialize the particle positions, calculate the optimal values and optimal positions and compute MOA and MOP.
(2)
Exploration phase
If r1 > MOA, then the algorithm exploration phase is entered. r1 is a random number between (0,1). The update formula for the particle exploration operation is as follows.
x i , j ( i t e r + 1 ) = b e s t j ÷ ( M O P + ) × w j , r 2 < 0 . 5   b e s t j × M O P × w j ,    o t h e r w i s e
where bestj is the jth dimension of the optimal particle position; r2 is a random number between (0,1); ε is a small positive number.
(3)
Exploitation phase
If r1MOA, the algorithm enters the development phase. The formula for updating the position of an individual is as follows.
x i , j ( i t e r + 1 ) = b e s t j ( M O P + ) × w j , r 3 < 0 . 5   b e s t j + M O P × w j ,    o t h e r w i s e
where r3 is a random number between (0,1). w j can be calculated as follows.
w j = ( ( u b j l b j ) × μ + l b j )
where μ is to adjust the parameters of the search process and is set to 0.5 in this study.

3.2. Improved Arithmetic Optimization Algorithm

The AOA has a highly competitive output when solving simple models. However, it has disadvantages, such as slow convergence and the tendency to fall into localization in the later stages of the optimization search. Therefore, the arithmetic optimization algorithm needs to be improved in order to enhance the optimization-seeking ability and the convergence speed of the algorithm.
(1)
Dynamic boundary strategy with cosine control factor
MOA is an important parameter that balances local optimization with global search. As the number of iterations increases, MOA increases linearly from 0.2 to 1, which makes it difficult to match the reality of the algorithmic optimization during the search. MOA is linearly increasing from 0.2 in the early iteration, resulting in the AOA not being able to explore more search space, and, thus, making the algorithm’s global exploration capability insufficient. MOA assumes large values at the end of iterations, resulting in limited local evolution of the algorithm and slow convergence. In this study, in order to settle the problem, the MOA is reformulated. The reformulated MOA is as follows.
M O A = ( M a x M i n ) × ( cos ( 0.5 π × I t e r M a x _ I t e r ) ) + 0.5 M i n
(2)
Differential evolution strategy
In order to improve the problem of the algorithm relying too heavily on the optimal solution, and to improve the solution accuracy of the algorithm, this paper introduces a differential evolution strategy in the AOA algorithm, which generates new individuals through mutation and crossover, and improves the search ability of the algorithm by comparing the individual fitness values before and after differential evolution. The process of implementation is as follows.
X m ( i t ) = X c 3 ( i t ) + F [ X c 1 ( i t ) X c 2 ( i t ) ]
where X c 1 ( i t ) , X c 2 ( i t ) and X c 3 ( i t ) are three randomly selected individuals; X m ( i t ) is the individual after mutation; F is a random number in the range [0.2, 0.8].
Next, the current individual is crossed with the mutated individual to obtain the new individual, and the crossover expression is as follows.
X c l ( i t ) = X m l ( i t ) r 3 < P c X i l ( i t ) r 3 P c
where X c l ( i t ) is the lth dimensional variable of the current individual; X m l ( i t ) is the lth dimensional variable of the variant individual; Pc is the crossover probability; r3 is a random number in the range [0, 1].
Finally, the optimal individual is selected by comparing the fitness of the individuals before and after the mutation, and the expression of the selection operation is as follows.
X i ( i t ) = X c ( i t ) f ( X c ( i t ) ) < f ( X i ( i t ) ) X i ( i t ) f ( X i ( i t ) ) f ( X c ( i t ) )
where f ( X c ( i t ) ) and f ( X i ( i t ) ) indicate the individual fitness values before and after the mutation, respectively.
The IAOA was obtained by introducing a dynamic boundary strategy with the cosine control factor, and a differential evolution operator, to the AOA. The IAOA optimization process is as follows in Figure 1.

Performance Test of IAOA Algorithm

To improve the performance and stability of the algorithm, the IAOA is obtained by introducing a dynamic boundary strategy with the cosine control factor and a differential evolution operator to the AOA. To verify the convergence performance of the IAOA algorithm, a test of the convergence performance of the proposed IAOA algorithm was carried out on six benchmark functions and the results are compared with the AOA, the Salp Swarm Algorithm (SSA) [48] (Mirjalili et al., 2017), the Sine Cosine Algorithm (SCA) [49] (Mirjalili, 2016), the Seagull Optimization Algorithm (SOA) [50] (Dhiman et al., 2019) and the Whale Optimization Algorithm (WOA) [51] (Mirjalili et al., 2016). Table 1 shows the expressions, the variable intervals and the variable dimensions of the benchmark test functions, in which the f4f6 benchmark test functions are multi-peak test functions and the rest are single-peak test functions. All benchmark test functions have a variable dimension of 30 dimensions, and the variables under each test function take the same range of values. Typical three-dimensional diagrams of the single-peak and multi-peak test functions are presented in Figure 2 and Figure 3. Table 2 displays the relevant parameter settings for the optimization algorithms. The experimental environment in this paper is a computer with Intel (R) Core (TM) i7-4720 HQ CPU, 2.60 GHz, 12 GB of RAM and a 64-bit Windows 10 operating system. The programming language is MATLAB, version R2021a.
A typical three-dimensional diagram of a single-peak test function is displayed in Figure 2. The single-peak test function has only one global optimum solution, and this test function is mainly used to check the convergence performance of the algorithm. For an intelligent optimization algorithm, if its final output differs significantly from the global optimal solution, it indicates that the convergence of the algorithm needs to be improved. Therefore, in this section, three single-peak test functions f1f3 are chosen to perform tests on the IAOA’s optimization-seeking capability.
In this study, the capability of the algorithm to avoid falling into a local optimum is tested using a multi-peak test function, as shown in Figure 3, for a typical multi-peak test function three-dimensional diagram. Under the multi-peak test function, in addition to the global optimal solution, there are also a number of deceptive local optimum solutions, which will increase the optimization difficulty of the test function. If the algorithm is not enough to avoid falling into a local optimum, the algorithm will eventually converge to the local optimum solution. If the convergence capability of the algorithm is not sufficient, the output of the inner optimization model will be less satisfactory and will subsequently cause the model optimization to fail. Therefore, this section adopts a multi-peak test function to carry out a test of the convergence capability of the IAOA.
To avoid chance, all algorithms were run 30 times independently under each benchmark test function and the statistical algorithm output; the standard deviation; and the mean, minimum and maximum values of the optimization results are displayed in Table 3.
As shown in Table 3, the standard deviation, and the mean, minimum and maximum values obtained by the different optimization algorithms for the single-peaked and multi-peaked test functions are presented. For the f1f3 single-peak test functions, the standard deviation and the mean, optimum and maximum values obtained by the IAOA all reach zero, which indicates that the IAOA achieves the global optimum solution, and that the improved arithmetic optimization algorithm achieves an improvement in optimization-seeking ability. Similarly, the standard deviation obtained by the IAOA for the single-peak test functions is 0.00 × 100, which also indicates that the IAOA’s optimization-seeking performance is more stable.
As can be seen from Table 3, for the f4-f6 multi-peak test functions, the standard deviation of the IAOA reaches 0.00 × 100, 0.00 × 100 and 4.23 × 10−7, respectively, which is at least one order of magnitude lower than that of the other algorithms, and proves the stable optimization-seeking ability of the IAOA. In addition, the IAOA’s obtained mean, optimum and maximum values have a significant advantage over those of other algorithms, which demonstrates the IAOA’s better search capability. Therefore, through the above algorithm performance test simulation experiments, the superior performance of the IAOA is verified, and the foundation is laid to use the IAOA to solve the optimal weights and thresholds of the BP neural network.
The single run times for all algorithms are shown in Table 4. There is not much difference between the runtime of the IAOA and the other algorithms.

3.3. Backpropagation Neural Network

BP neural networks are modeled by mimicking the process of receiving, transmitting and storing information from the human brain, with powerful learning and feedback error correction capabilities [52] (Basheer et al., 2000). The output results are obtained by establishing a layer-to-layer weight matrix through the layer-to-layer mapping relationship of the input parameters. The obtained results are compared with the design error, and if they meet the expectation, the settlement is executed, and if not, the implied layer weights are adjusted using the feedback error until the results are met. Considering the huge amount of data existing in the process of grid operation, this paper adopts a three-layer BP neural network with multiple inputs and single outputs as the evaluation model to achieve the mapping of m-dimensional inputs to n-dimensional outputs and to ensure the accuracy of data processing. Figure 4 shows the topology of the three-layer BP neural network.
For the purpose of overcoming the problem of selecting the initial threshold and the initial weights for the BP neural network, the IAOA is used in combination with the BP neural network to optimize the entire algorithmic network. In the optimization process of the BP neural network, the IAOA is employed to search for the optimal threshold and weights of the neural network. As the number of iterations increases, the optimal individual positions are obtained and used as the initial threshold and the initial weights of the BP neural network. The optimization process of IAOA-BP is shown in Figure 5.

4. Implementation of the Proposed Approach

The electricity consumption data of a user in a single place for 5 years from January 2010 to December 2014 was selected to analyze suspected electricity theft. This user had committed electricity theft in October and November 2013 and was found to have paid for the electricity. However, in the four months from February to May 2014, there was another act of electricity theft, and the electricity consumption was normal after being detected. Depending on the customer’s electricity consumption characteristics, electricity consumption parameters such as line loss, current unbalance ratio, power factor and voltage unbalance ratio will change when there are load data anomalies. In this study, these electrical parameters are used as input variables. Using the IAOA-BP neural network algorithm, the final output is expected to be of three types: no suspicion of electricity theft, general suspicion of electricity theft and major suspicion of electricity theft. The final output index is in the range of [0, 0.5] for no suspicion of electricity theft, in the range of [0.5, 0.8] for general suspicion of electricity theft and in the range of [0.8, 1] for major suspicion of electricity theft, which needs to be examined.
To ensure a high convergence rate during training, all the input data are normalized in this study. In this paper, we restrict the data to the interval [0, 1], and the transformation equation used is as follows.
y i = y i y min y max y min
where y i is the input data; y i is the normalized data; y min and y max are the minimum and maximum data of the sample, respectively. The normalized data are shown in Table 5.
Based on the constructed model, a BP neural network model with two implicit layers was built using Matlab and the learning accuracy was set to 10 × 10-5. The input normalized data was iterated until the accuracy requirement was met. The suspected customer electricity consumption after the analysis of the BP neural network algorithm with two hidden layers is shown in Figure 6. The suspected customer electricity theft coefficients for August 2013 to September 2013 and March 2014 to June 2014 are shown in Table 4. The coefficient of suspicion of electricity theft is above 0.9, which suggests a significant suspicion of electricity theft, and is the same as the actual situation; meanwhile, there is no suspicion of electricity theft from customers in all other months, which is also in line with the actual situation.
For the purpose of verifying the reliability and effectiveness of the IAOA-BP algorithm for the detection of abnormal electric load data, the abnormality detection results are compared with the AOA-BP, SCA-BP, SSA-BP, WOA-BP and SOA-BP algorithms. Figure 6 shows the detection results of abnormal load data for the above algorithms. From Figure 6, it can be seen that among the six anomaly detection algorithms, the algorithm proposed in this paper has the highest accuracy in anomaly load data detection with an accuracy of 96.67%, followed by the WOA-BP, SCA-BP and SSA-BP algorithms with an accuracy of 93.33%, and the AOA-BP and SOA-BP algorithms with an accuracy of 91.67%. From the above detection accuracies, it is clear that the IAOA-BP algorithm proposed in this paper performs best in anomaly load detection.
In summary, we can conclude that the proposed IAOA-BP algorithm in this study has high efficiency and reliability in anomaly detection. The efficient and high detection accuracy of the IAOA-BP-based anomaly power usage detection algorithm can accurately extract the important behavioral features from the evaluation index system and add the IAOA as the weight and threshold parameter optimization algorithm to achieve more accurate and faster detection results.

5. Concluding Remarks

Traditional anomaly detection techniques are difficult to implement and are ineffective. With the aim of reducing the workload for detection and improving the effect of anomaly data detection, this study constructs an anomaly detection analysis model based on the IAOA-BP. The IAOA-BP is applied to analyze the information contained in the power consumption data and, thus, calculate the anomaly factor of the customer’s electricity consumption data. On the basis of theoretical research, the effect of the electricity theft suspicion analysis is verified by data examples from a specific place, and the IAOA is found to have a higher accuracy rate compared with other algorithms, which may help to avoid the waste of human, material and financial resources in traditional anomaly detection work. Accordingly, some of the meaningful contributions of this paper can be summarized as follows.
  • The IAOA algorithm with strong convergence ability and solution efficiency is proposed. For both the multi-peak and single-peak test functions, the IAOA’s search results performed well compared to the comparison algorithms, indicating the effectiveness of the improvements made to the AOA in this study.
  • The IAOA-BP algorithm is proposed by combining the IAOA with a BP neural network.
Anomalous data points can be quickly and efficiently identified by the IAOA-BP, which can help the electricity department to effectively flag anomalous users to further determine the cause of the anomaly.
  • Compared to other algorithms, the proposed IAOA-BP algorithm has higher anomaly detection accuracy. The simulation results demonstrate that the overall determination accuracy using the IAOA-BP algorithm remains above 96%.
Some of the original contributions of this study can be summarized as follows. (1) An IAOA with superior solving power and stability is proposed. (2) An IAOA-BP algorithm is proposed. (3) The proposed IAOA-BP anomaly detection method maintains a high accuracy rate. Although the proposed power load anomaly data detection method in this study is able to check the anomalous data in the historical load data more accurately, the actual detection may lead to the reduction of the anomaly data detection speed due to the IAOA’s ability to optimize the thresholds and weights of the BP neural network. Future research will focus on two points: (1) to improve the optimization capability and stability of the algorithm; (2) to further investigate how to improve the efficiency and accuracy of anomaly data detection, resulting in reduced anomaly data detection time and more accurate detection rates.

Author Contributions

Conceptualization, Y.Z. and H.L.; methodology, H.L. and R.W.; software Y.Z. and X.T.; writing—original draft preparation, Y.Z. and H.L.; writing—review and editing, Y.Z. and H.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

This study did not involve humans or animals.

Informed Consent Statement

The study did not involve humans or animals.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ahir, R.K.; Chakraborty, B. Pattern-based and context-aware electricity theft detection in smart grid. Sustain. Energy Grids Netw. 2022, 32, 100833. [Google Scholar] [CrossRef]
  2. Kim, G.; Park, S. Activity Detection from Electricity Consumption and Communication Usage Data for Monitoring Lonely Deaths. Sensors 2021, 21, 3016. [Google Scholar] [CrossRef] [PubMed]
  3. Alabe, L.W.; Kea, K.; Han, Y.; Min, Y.J.; Kim, T. A Deep Learning Approach to Detect Anomalies in an Electric Power Steering System. Sensors 2022, 22, 8981. [Google Scholar] [CrossRef] [PubMed]
  4. Gaggero, G.B.; Caviglia, R.; Armellin, A.; Rossi, M.; Girdinio, P.; Marchese, M. Detecting Cyberattacks on Electrical Storage Systems through Neural Network Based Anomaly Detection Algorithm. Sensors 2022, 22, 3933. [Google Scholar] [CrossRef]
  5. Chen, L.; Lao, K.-W.; Ma, Y.; Zhang, Z. Error Modeling and Anomaly Detection of Smart Electricity Meter Using TSVD plus L Method. IEEE Trans. Instrum. Meas. 2022, 71, 1–14. [Google Scholar] [CrossRef]
  6. Mari, C.; Baldassari, C. Ensemble Methods for Jump-Diffusion Models of Power Prices. Energies 2021, 14, 2084. [Google Scholar] [CrossRef]
  7. Moure-Garrido, M.; Campo, C.; Garcia-Rubio, C. Entropy-Based Anomaly Detection in Household Electricity Consumption. Energies 2022, 15, 1837. [Google Scholar] [CrossRef]
  8. Lee, S.; Nengroo, S.H.; Jin, H.; Doh, Y.; Lee, C.; Heo, T.; Har, D. Anomaly detection of smart metering system for power management with battery storage system/electric vehicle. Etri J. 2022. [Google Scholar] [CrossRef]
  9. Lei, L.; Wu, B.; Fang, X.; Chen, L.; Wu, H.; Liu, W. A dynamic anomaly detection method of building energy consumption based on data mining technology. Energy 2023, 263, 125575. [Google Scholar] [CrossRef]
  10. Zhang, Y.; Zhu, Y.P.; Li, X.Q.; Wang, X.L.; Guo, X.T. Anomaly Detection Based on Mining Six Local Data Features and BP Neural Network. Symmetry 2019, 11, 571. [Google Scholar] [CrossRef] [Green Version]
  11. Oh, S.; Oh, S.; Um, T.-W.; Kim, J.; Jung, Y.A. Methods of Pre-Clustering and Generating Time Series Images for Detecting Anomalies in Electric Power Usage Data. Electronics 2022, 11, 3315. [Google Scholar] [CrossRef]
  12. Oprea, S.-V.; Bara, A. Machine learning classification algorithms and anomaly detection in conventional meters and Tunisian electricity consumption large datasets. Comput. Electr. Eng. 2021, 94, 107329. [Google Scholar] [CrossRef]
  13. Pan, H.; Yin, Z.; Jiang, X. High-Dimensional Energy Consumption Anomaly Detection: A Deep Learning-Based Method for Detecting Anomalies. Energies 2022, 15, 6139. [Google Scholar] [CrossRef]
  14. Nguyen Thi Ngoc, A.; Pham Ngoc Quang, A.; Vu Hoai, T.; Thai, D.V.; Solanki, V.K.; Tuan, D.M. A novel approach for anomaly detection in automatic meter intelligence system using machine learning and pattern recognition. J. Intell. Fuzzy Syst. 2022, 43, 1843–1852. [Google Scholar] [CrossRef]
  15. Wang, X.; Ahn, S.-H. Real-time prediction and anomaly detection of electrical load in a residential community. Appl. Energy 2020, 259, 114145. [Google Scholar] [CrossRef]
  16. Wang, X.; Yang, I.; Ahn, S.-H. Sample Efficient Home Power Anomaly Detection in Real Time Using Semi-Supervised Learning. IEEE Access 2019, 7, 139712–139725. [Google Scholar] [CrossRef]
  17. Peng, Y.; Yang, Y.; Xu, Y.; Xue, Y.; Song, R.N.; Kang, J.P.; Zhao, H.S. Electricity Theft Detection in AMI Based on Clustering and Local Outlier Factor. IEEE Access 2021, 9, 107250–107259. [Google Scholar] [CrossRef]
  18. Branco, P.; Goncalves, F.; Costa, A.C. Tailored Algorithms for Anomaly Detection in Photovoltaic Systems. Energies 2020, 13, 225. [Google Scholar] [CrossRef] [Green Version]
  19. Feng, L.; Xu, S.; Zhang, L.; Wu, J.; Zhang, J.D.; Chu, C.B.; Wang, Z.Y.; Shi, H.Y. Anomaly detection for electricity consumption in cloud computing: Framework, methods, applications, and challenges. Eurasip J. Wirel. Commun. Netw. 2020, 2020, 1–12. [Google Scholar] [CrossRef]
  20. Hock, D.; Kappes, M.; Ghita, B. Using multiple data sources to detect manipulated electricity meter by an entropy-inspired metric. Sustain. Energy Grids Netw. 2020, 21, 100290. [Google Scholar] [CrossRef]
  21. Li, M.; Zhang, K.; Liu, J.; Gong, H.X.; Zhang, Z.J. Blockchain-based anomaly detection of electricity consumption in smart grids. Pattern Recognit. Lett. 2020, 138, 476–482. [Google Scholar] [CrossRef]
  22. Maamar, A.; Benahmed, K. A Hybrid Model for Anomalies Detection in AMI System Combining K-means Clustering and Deep Neural Network. Comput. Mater. Contin. 2019, 60, 15–39. [Google Scholar] [CrossRef] [Green Version]
  23. Oprea, S.-V.; Bara, A.; Puican, F.C.; Puican, F.C.; Radu, I.C. Anomaly Detection with Machine Learning Algorithms and Big Data in Electricity Consumption. Sustainability 2021, 13, 10963. [Google Scholar] [CrossRef]
  24. Park, C.H.; Kim, T. Energy Theft Detection in Advanced Metering Infrastructure Based on Anomaly Pattern Detection. Energies 2020, 13, 3832. [Google Scholar] [CrossRef]
  25. Leong, K.; Leung, C.; Miao, C.; Chen, Y.C. Detection of Anomalies in Activity Patterns of Lone Occupants from Electricity Usage Data. In Proceedings of the IEEE Congress on Evolutionary Computation (CEC) Held as Part of IEEE World Congress on Computational Intelligence (IEEE WCCI), Vancouver, BC, Canada, 24–29 July 2016. [Google Scholar]
  26. Panapakidis, I.; Asimopoulos, N.; Dagoumas, A.; Christoforidis, G.C. An Improved Fuzzy C-Means Algorithm for the Implementation of Demand Side Management Measures. Energies 2017, 10, 1407. [Google Scholar] [CrossRef] [Green Version]
  27. Abul Hasan, M.J.; Ramakrishnan, S. A survey: Hybrid evolutionary algorithms for cluster analysis. Artif. Intell. Rev. 2011, 36, 179–204. [Google Scholar] [CrossRef]
  28. Beyan, C.; Fisher, R. Classifying imbalanced data sets using similarity based hierarchical decomposition. Pattern Recognit. 2015, 48, 1653–1672. [Google Scholar] [CrossRef] [Green Version]
  29. Xiao, J.; Tian, Y.; Xie, L.; Jiang, X.Y.; Huang, J. A Hybrid Classification Framework Based on Clustering. IEEE Trans. Ind. Inform. 2020, 16, 2177–2188. [Google Scholar] [CrossRef]
  30. Qi, R.; Zheng, J.; Luo, Z.R.; Li, Q.Q. A Novel Unsupervised Data-Driven Method for Electricity Theft Detection in AMI Using Observer Meters. IEEE Trans. Instrum. Meas. 2022, 71, 1–10. [Google Scholar] [CrossRef]
  31. Zhang, J.F.; Zhang, H.; Ding, S.; Zhang, X.X. Power Consumption Predicting and Anomaly Detection Based on Transformer and K-Means. Front. Energy Res. 2021, 9, 779587. [Google Scholar] [CrossRef]
  32. Zhao, Y.; Liu, Q.; Li, D.; Kang, D.H.; Lv, Q.; Shang, L. Hierarchical Anomaly Detection and Multimodal Classification in Large-Scale Photovoltaic Systems. IEEE Trans. Sustain. Energy 2019, 10, 1351–1361. [Google Scholar] [CrossRef]
  33. Singh, V.K.; Govindarasu, M. Decision Tree Based Anomaly Detection for Remedial Action Scheme in Smart Grid using PMU Data. In Proceedings of the IEEE-Power-and-Energy-Society General Meeting (PESGM), Portland, OR, USA, 5–10 August 2018. [Google Scholar]
  34. Pei, C.; Zhang, S.; Zeng, X. Research on anomaly detection of wireless data acquisition in power system based on spark. Energy Rep. 2022, 8, 1392–1404. [Google Scholar] [CrossRef]
  35. Yampikulsakul, N.; Byon, E.; Huang, S.; Sheng, S.W.; You, M.D. Condition Monitoring of Wind Power System With Nonparametric Regression Analysis. IEEE Trans. Energy Convers. 2014, 29, 288–299. [Google Scholar] [CrossRef]
  36. Tian, X.; Zou, Y.; Wang, X.; Tseng, M.L.; Li, H.; Zhang, H.J. Improving the Efficiency and Sustainability of Intelligent Electricity Inspection: IMFO-ELM Algorithm for Load Forecasting. Sustainability 2022, 14, 13942. [Google Scholar] [CrossRef]
  37. Rouzbahani, H.M.; Bahrami, A.H.; Karimipour, H. A Snapshot Ensemble Deep Neural Network Model for Attack Detection in Industrial Internet of Things. In AI-Enabled Threat Detection and Security Analysis for Industrial IoT; Karimipour, H., Derakhshan, F., Eds.; Springer International Publishing: Berlin/Heidelberg, Germany, 2021; pp. 181–194. [Google Scholar]
  38. Rouzbahani, H.M.; Karimipour, H.; Lei, L. Multi-layer defense algorithm against deep reinforcement learning-based intruders in smart grids. Int. J. Electr. Power Energy Syst. 2023, 146, 108798. [Google Scholar] [CrossRef]
  39. Peng, H.; Liu, L.; Liu, J.Y.; Lewis, J.R. Network traffic anomaly detection algorithm using mahout classifier. J. Intell. Fuzzy Syst. 2019, 37, 137–144. [Google Scholar] [CrossRef]
  40. Yang, L.; Wang, J.Y.; Zhou, N.A.R.; Wang, Z.X.; Li, C. Electricity Theft Detection Based on ReliefF Feature Selection Algorithm and BP Neural Network. J. Circuits Syst. Comput. 2023, 32, 2350014. [Google Scholar] [CrossRef]
  41. Shang, Y.; Kang, L.Y.; Zhang, M.X.; Liu, X.R.; Li, Y. Z Prediction method of electricity stealing behavior based on multi-dimensional features and BP neural network. Energy Rep. 2022, 8, 523–531. [Google Scholar] [CrossRef]
  42. Zhang, Y.; Wang, Y.-J.; Zhang, Y.; Yu, T. Photovoltaic Fuzzy Logical Control MPPT Based on Adaptive Genetic Simulated Annealing Algorithm-Optimized BP Neural Network. Processes 2022, 10, 1411. [Google Scholar] [CrossRef]
  43. Zhong, Z.; Tan, J.; Zhang, T.; Zhu, L.L. PV Power Short-term Forecasting Model Based on the Data Gathered from Monitoring Network. China Commun. 2014, 11, 61–69. [Google Scholar] [CrossRef]
  44. Ali, M.H.; El-Rifaie, A.M.; Youssef, A.A.F.; Tulsky, V.N.; Tolba, M.A. Techno-Economic Strategy for the Load Dispatch and Power Flow in Power Grids Using Peafowl Optimization Algorithm. Energies 2023, 16, 846. [Google Scholar] [CrossRef]
  45. Ali, M.H.; Kamel, S.; Hassan, M.H.; Tostado-Veliz, M.; Zawbaa, H.M. An improved wild horse optimization algorithm for reliability based optimal DG planning of radial distribution networks. Energy Rep. 2022, 8, 582–604. [Google Scholar] [CrossRef]
  46. Ali, M.H.; Salawudeen, A.T.; Kamel, S.; Salau, H.B.; Habil, M.; Shouran, M. Single- and Multi-Objective Modified Aquila Optimizer for Optimal Multiple Renewable Energy Resources in Distribution Network. Mathematics 2022, 10, 2129. [Google Scholar] [CrossRef]
  47. Abualigah, L.; Diabat, A.; Mirjalili, S.; Elaziz, M.A.; Gandomi, A.H. The Arithmetic Optimization Algorithm. Comput. Methods Appl. Mech. Eng. 2021, 376, 113609. [Google Scholar] [CrossRef]
  48. Mirjalili, S. SCA: A Sine Cosine Algorithm for solving optimization problems. Knowl. Based Syst. 2016, 96, 120–133. [Google Scholar] [CrossRef]
  49. Mirjalili, S.; Gandomi, A.H.; Mirjalili, S.Z.; Saremi, S.; Faris, H.; Mirjalili, S.M. Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 2017, 114, 163–191. [Google Scholar] [CrossRef]
  50. Dhiman, G.; Kumar, V. Seagull optimization algorithm: Theory and its applications for large-scale industrial engineering problems. Knowl. Based Syst. 2019, 165, 169–196. [Google Scholar] [CrossRef]
  51. Mirjalili, S.; Lewis, A. The Whale Optimization Algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  52. Basheer, I.A.; Hajmeer, M. Artificial neural networks: Fundamentals, computing, design, and application. J. Microbiol. Methods 2000, 43, 3–31. [Google Scholar] [CrossRef]
Figure 1. Flow chart of improved arithmetic optimization algorithm.
Figure 1. Flow chart of improved arithmetic optimization algorithm.
Energies 16 03021 g001
Figure 2. Three-dimensional diagram of typical unimodal test function.
Figure 2. Three-dimensional diagram of typical unimodal test function.
Energies 16 03021 g002
Figure 3. Three-dimensional diagram of typical multimodal test function.
Figure 3. Three-dimensional diagram of typical multimodal test function.
Energies 16 03021 g003
Figure 4. BP neural network topology, where xp1, xp2 and xp3 denote input layer neurons; yp1, yp2 and yp3 denote the hidden layer neurons; bp indicates output.
Figure 4. BP neural network topology, where xp1, xp2 and xp3 denote input layer neurons; yp1, yp2 and yp3 denote the hidden layer neurons; bp indicates output.
Energies 16 03021 g004
Figure 5. Specific flow chart of the IAOA-BP algorithm.
Figure 5. Specific flow chart of the IAOA-BP algorithm.
Energies 16 03021 g005
Figure 6. Graph of customer electricity consumption data anomaly factor.
Figure 6. Graph of customer electricity consumption data anomaly factor.
Energies 16 03021 g006
Table 1. Benchmark functions.
Table 1. Benchmark functions.
FunctionDimRange
f 1 = i = 1 D x i 2 30[−100, 100]
f 2 = i = 1 D x i + i = 1 D x i 30[−10, 10]
f 3 = i = 1 D j = 1 i x j 2 30[−100, 100]
f 4 = i = 1 D x i 10 cos ( 2 π x i ) + 10 30[−5.12, 5.12]
f 5 = 20 exp 0.2 1 30 i = 1 D x i 2 + 20 exp 1 30 i = 1 D cos ( 2 π x i ) + e 30[−32, 32]
f 6 = i = 1 D x i 2 4000 i = 1 D cos x i i + 1 30[−600, 600]
Table 2. Optimization algorithm parameter settings.
Table 2. Optimization algorithm parameter settings.
AlgorithmParameters
SSANp = 30
SCANp = 30, Ne = 2
SOANp = 30, fc = 2
WOANp = 30, p = 0.5
AOANp = 30, a = 2, μ = 0.499
IAOANp = 30, a = 2, μ = 0.499
Table 3. Test results of each algorithm.
Table 3. Test results of each algorithm.
FunctionAlgorithmStdMeanMinMax
f1SSA3.88 × 1014.92E × 1015.81 × 1001.76 × 102
SCA6.02 × 10−21.56 × 10−27.24 × 10−73.17 × 10−1
SOA1.73 × 10−21.69 × 10−22.51 × 10−37.75 × 10−2
WOA1.69 × 10−713.65 × 10−729.82 × 10−849.13 × 10−71
AOA1.57 × 10−1122.87 × 10−1130.00 × 1008.62 × 10−112
IAOA0.00 × 1000.00 × 1000.00 × 1000.00 × 100
f2SSA4.02 × 10−19.87 × 10−21.55 × 10−52.18 × 100
SCA8.06 × 10−46.08 × 10−42.12 × 10−63.88 × 10−3
SOA7.06 × 10−31.03 × 10−22.67 × 10−33.28 × 10−2
WOA1.42 × 10−505.66 × 10−512.51 × 10−575.87 × 10−50
AOA1.05 × 10−107.78 × 10−102.24 × 10−96.05 × 10−10
IAOA0.00 × 1000.00 × 1000.00 × 1000.00E × 100
f3SSA1.66 × 1018.32 × 1002.03 × 10−28.28 × 101
SCA3.59 × 1012.11 × 1017.87 × 10−31.43 × 102
SOA6.02 × 1012.98 × 1011.00 × 1003.35 × 102
WOA2.04 × 1048.15 × 1044.57 × 1041.33 × 105
AOA7.09 × 10−101.20 × 10−71.53 × 10−62.88 × 10−7
IAOA0.00 × 1000.00 × 1000.00 × 1000.00 × 100
f4SSA9.13 × 1001.78 × 1016.96 × 1004.38 × 101
SCA1.07 × 1017.56 × 1001.51 × 10−43.57 × 101
SOA1.36 × 1012.28 × 1015.07 × 1006.15 × 101
WOA2.40 × 1004.39 × 10−10.00 × 1001.32 × 101
AOA5.68 × 10−141.93 × 1003.48 × 1016.60 × 100
IAOA0.00 × 1000.00 × 1000.00 × 1000.00 × 100
f5SSA1.13 × 1009.25 × 10−18.00 × 10−63.57 × 100
SCA1.41 × 1003.76 × 10−16.59 × 10−47.47 × 100
SOA1.62 × 10−32.00 × 1012.00 × 1012.00 × 101
WOA1.97 × 10−142.30 × 10−148.88 × 10−161.11 × 10−13
AOA1.32 × 10−81.86 × 1012.00 × 1015.06 × 100
IAOA0.00 × 1008.88 × 10−168.88 × 10−168.88 × 10−16
f6SSA9.00 × 10−21.52 × 10−11.48 × 10−23.27 × 10−1
SCA1.96 × 10−12.53 × 10−17.12 × 10−47.34 × 10−1
SOA1.16 × 10−11.41 × 10−12.78 × 10−34.20 × 10−1
WOA1.03 × 10−11.88 × 10−20.00 × 1005.64 × 10−1
AOA1.11 × 10−151.26 × 10−28.42 × 10−22.25 × 10−2
IAOA4.23 × 10−71.87 × 10−70.00 × 1002.07 × 10−6
Table 4. Running time statistics of the algorithms.
Table 4. Running time statistics of the algorithms.
Algorithmf1f2f3f4f5f6
SSA0.1251320.0781460.0966930.0980190.0910740.084159
SCA0.0975490.0947930.0983770.1072250.0963170.085647
SOA0.1079710.0716330.1436170.1163110.1020760.115546
WOA0.1054320.0846350.1245630.09675650.0967560.104534
AOA0.0980160.0933910.1077630.0916560.0894460.088593
IAOA0.1080160.1032420.1132420.1012430.0943530.090353
Table 5. Normalized customer electricity consumption data.
Table 5. Normalized customer electricity consumption data.
Total
Electricity
Current ValueVoltage ValuePower FactorPhase AngleLine LossCurrent
Unbalance Ratio
Voltage
Unbalance Ratio
0.415020.182010.227290.4160.8300.964210.4080.643
0.341920.254330.138010.0790.8740.947300.3590.182
0.393690.265010.919870.3610.8520.941610.8630.765
0.250050.267990.7410.1820.9500.898410.9780.886
0.869180.724990.039000.9630.0490.053110.7660.511
0.749921.001010.664990.980.070.044500.8670.907
0.818140.915990.024770.6880.0580.035510.9440.704
0.344950.174010.500990.3110.8110.918990.6760.805
0.618990.706010.233550.4700.2700.245100.7340.498
0.134660.384110.292010.0890.5970.708930.4660.594
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zou, Y.; Wu, R.; Tian, X.; Li, H. Realizing the Improvement of the Reliability and Efficiency of Intelligent Electricity Inspection: IAOA-BP Algorithm for Anomaly Detection. Energies 2023, 16, 3021. https://doi.org/10.3390/en16073021

AMA Style

Zou Y, Wu R, Tian X, Li H. Realizing the Improvement of the Reliability and Efficiency of Intelligent Electricity Inspection: IAOA-BP Algorithm for Anomaly Detection. Energies. 2023; 16(7):3021. https://doi.org/10.3390/en16073021

Chicago/Turabian Style

Zou, Yuping, Rui Wu, Xuesong Tian, and Hua Li. 2023. "Realizing the Improvement of the Reliability and Efficiency of Intelligent Electricity Inspection: IAOA-BP Algorithm for Anomaly Detection" Energies 16, no. 7: 3021. https://doi.org/10.3390/en16073021

APA Style

Zou, Y., Wu, R., Tian, X., & Li, H. (2023). Realizing the Improvement of the Reliability and Efficiency of Intelligent Electricity Inspection: IAOA-BP Algorithm for Anomaly Detection. Energies, 16(7), 3021. https://doi.org/10.3390/en16073021

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop