Photovoltaic Power-Stealing Identification Method Based on Similar-Day Clustering and QRLSTM Interval Prediction
Abstract
:1. Introduction
- The principles of four photovoltaic power-stealing methods and the data characteristics after power stealing were investigated, and four groups of power-stealing user data were artificially constructed to fully verify the effect of the proposed method.
- The method of combining similar-day clustering and the QRLSTM network was used to forecast photovoltaic power generation under different types of weather conditions to improve the prediction accuracy. It was considered that the efficiency of photovoltaic power generation in the same weather is similar.
- In order to make the identification result of the final power stealing more stable and accurate, three-layer screening criteria were set from the time scale, which were specifically manifested as short-term, medium-term and long-term.
2. Materials and Methods
2.1. Analysis of Photovoltaic Output Characteristics
2.1.1. Influencing Factors of Photovoltaic Output
2.1.2. Feature Construction and Selection
2.1.3. Similar-Day Clustering
2.2. PV Output Interval Prediction
2.2.1. LSTM Model
2.2.2. Quantile Regression
2.2.3. QRLSTM PV Interval Prediction Model
2.3. Identification of PV Power Stealing Based on Interval Prediction
2.3.1. Judgment of Suspected Short-Term Power Stealing
2.3.2. Judgment of Suspected Medium- and Long-Term Power Stealing
3. Results and Discussion
3.1. Data Preprocessing
3.2. QRLSTM PV Interval Prediction Simulation
3.3. Simulation of PV Power-Stealing Identification Based on Interval Prediction
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Luo, Y.F.; Jiang, C.W.; Li, C.Z.; Xue, X.L. Integrated management method of anti-electricity stealing considering distributed generation. Electr. Energy Manag. Technol. 2015, 59, 49–55. [Google Scholar] [CrossRef]
- Gong, X.J.; Tang, B.; Zhu, R.J.; Liao, W.; Song, L. Data augmentation for electricity theft detection using conditional variational auto-encoder. Energies 2020, 13, 4291. [Google Scholar] [CrossRef]
- Liu, H.Q.; Li, Z.Q.; Li, Y.C. Noise Reduction Power Stealing Detection Model Based on Self-Balanced Data Set. Energies 2020, 13, 1763. [Google Scholar] [CrossRef] [Green Version]
- Kong, X.Y.; Zhao, X.; Liu, C.; Li, Q.; Dong, D.; Li, Y. Electricity theft detection in low-voltage stations based on similarity measure and DT-KSVM. Int. J. Electr. Power Energy Syst. 2021, 125, 106544. [Google Scholar] [CrossRef]
- Huang, Y.F.; Xu, Q.F. Electricity theft detection based on stacked sparse denoising autoencoder. Int. J. Electr. Power Energy Syst. 2021, 125, 106448. [Google Scholar] [CrossRef]
- Yuan, X.D.; Shi, M.M.; Sun, Z.Y. Research status of electricity-stealing identification technology for distributed PV. In Proceedings of the 2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), Changsha, China, 26–29 November 2015; pp. 2031–2034. [Google Scholar] [CrossRef]
- Hu, C.; Sun, C.S.; Liu, J.; Feng, X.; Huaqin, H.; Binpeng, G. PV electricity stealing identification method considering weather type. Distrib. Energy 2017, 2, 13–19. [Google Scholar] [CrossRef]
- Shaaban, M.; Tariq, U.; Ismail, M.; Almadani, N.A.; Ahmed, M. Data-Driven detection of electricity theft cyberattacks in PV generation. IEEE Syst. J. 2022, 16, 3349–3359. [Google Scholar] [CrossRef]
- Zheng, G.D. Research of Short-Term Photovoltaic Power Prediction and Anti-Stealing Electricity Based on Machine Learning. Master’s Thesis, Changsha University of Science and Technology, Changsha, China, 2020. [Google Scholar] [CrossRef]
- Jing, J.; Li, Y. Research on the detection algorithm of HCM photovoltaic power theft in Qinghai. In Proceedings of the 2021 IEEE Sustainable Power and Energy Conference (iSPEC), Nanjing, China, 23–25 December 2021; pp. 55–60. [Google Scholar] [CrossRef]
- Li, J.G.; Rong, N.; Chen, C.Q. A data augmentation method for distributed photovoltaic electricity theft using generative adversarial network. J. Electr. Power Sci. Technol. 2022, 37, 181–190. [Google Scholar] [CrossRef]
- Xue, Y.; Yang, Y.N.; Liao, W.L.; Yang, D. Data augmentation method for distributed photovoltaic electricity theft based on non-linear independent components estimation. Autom. Electr. Power Syst. 2022, 46, 171–179. [Google Scholar]
- Xie, Y.Y.; Yuan, X.D.; Sun, Z.Y.; Shi, M.; Yin, M.; Zou, Y. Feature analysis and detection method research of inflated electricity using PV generation simulator. Power Syst. Technol. 2016, 40, 1703–1708. [Google Scholar] [CrossRef]
- Lu, S.; Peng, S.R.; Yang, Y.H.; Su, S.; Liu, D.; Zhang, H.; Wang, S. Identification method of abnormal photovoltaic users based on mean impact value and heuristic forward searching. Electr. Power Autom. Equip. 2022, 42, 106–111. [Google Scholar] [CrossRef]
- Talaat, M.; Taghreed, S.; Mohamed, A.; Hatata, A. Integrated MFFNN-MVO approach for PV solar power forecasting considering thermal effects and environmental conditions. Int. J. Electr. Power Energy Syst. 2022, 135, 107570. [Google Scholar] [CrossRef]
- Zhang, S.; Dong, L.; Ji, D.Y.; Hao, Y.; Zhang, X. Power forecasting of ultra-short-term photovoltaic station based on NWP similarity analysis. Acta Energy Sol. Sin. 2022, 43, 142–147. [Google Scholar] [CrossRef]
- Mei, F.; Gu, J.Q.; Pei, X.; Zheng, J. Photovoltaic interval prediction based on adaptive rolling matching prediction correction mode. Electr. Power Autom. Equip. 2022, 42, 92–98. [Google Scholar] [CrossRef]
- Wan, C.; Lin, J.; Song, Y.H.; Xu, Z.; Yang, G. Probabilistic Forecasting of Photovoltaic Generation: An Efficient Statistical Approach. IEEE Trans. Power Syst. 2017, 32, 2471–2472. [Google Scholar] [CrossRef] [Green Version]
- Yang, Y. Study on Short-Term Probability Interval Prediction of Photovoltaic Power Based on Wavelet Packet Theory. Master’s Thesis, Northeast Electric Power University, Jilin, China, 2020. [Google Scholar] [CrossRef]
- Zhao, S.Q.; Wang, M.Y.; Hu, Y.Q.; Liu, C. Research on the Prediction of PV Output Based on Uncertainty Theory. Trans. China Electrotech. Soc. 2015, 30, 213–220. [Google Scholar] [CrossRef]
- Zhang, J.; Liu, Y.; Peng, S.R. Photovoltaic power prediction based on feature mining and GRU-A. Res. Explor. Lab. 2020, 39, 25–30, 49. [Google Scholar]
- Song, R.J.; Liu, F.S.; Ma, D.M.; Wang, L. A very short-term prediction model for photovoltaic power based on similar days and wavelet neural network. Electr. Meas. Instrum. 2017, 54, 75–80. [Google Scholar]
- Chen, C.; Huang, G.Y.; Fan, Y.G.; Wu, J.; Wang, X. Short-term load forecasting based on discrete Fréchet distance and LS-SVM. Power Syst. Prot. Control 2014, 42, 142–147. [Google Scholar]
- Rahman, A.S.; Khan, Z.; Rahman, A. Application of independent component analysis in regional flood frequency analysis: Comparison between quantile regression and parameter regression techniques. J. Hydrol. 2020, 581, 124372. [Google Scholar] [CrossRef]
- Pei, Y. Quantile Regression and Its Application. Master’s Thesis, Central China Normal University, Wuhan, China, 2014. [Google Scholar]
- Zheng, Z.; Liu, G.; Zhang, L.J.; Dan, L. Photovoltaic generation three-layer electricity stealing recognition method based on LSSVM. Power Electron. 2017, 51, 30–32, 45. [Google Scholar]
Confidence Levels | Model | PICP (%) | PINAW (KW) |
---|---|---|---|
85% | QRLSTM | 88.05 | 3.35 |
QRNN | 86.49 | 4.57 | |
90% | QRLSTM | 95.18 | 3.76 |
QRNN | 92.58 | 5.02 | |
95% | QRLSTM | 99.67 | 4.29 |
QRNN | 96.43 | 5.63 |
Confidence Levels | Model | PICP (%) | PINAW (KW) |
---|---|---|---|
85% | QRLSTM | 86.05 | 4.71 |
QRNN | 82.11 | 6.37 | |
90% | QRLSTM | 92.18 | 5.16 |
QRNN | 89.58 | 6.94 | |
95% | QRLSTM | 96.67 | 5.78 |
QRNN | 95.00 | 7.53 |
Confidence Levels | Model | PICP (%) | PINAW (KW) |
---|---|---|---|
85% | QRLSTM | 85.05 | 5.86 |
QRNN | 80.11 | 8.37 | |
90% | QRLSTM | 88.18 | 6.43 |
QRNN | 84.58 | 9.08 | |
95% | QRLSTM | 95.00 | 7.19 |
QRNN | 88.43 | 9.83 |
Users | Basis of Identification | Identification Result |
---|---|---|
Constructed user 1 | The first layer, exceeds time in one day, H = 6 | Suspected of power stealing |
Constructed user 2 | The first layer, exceeds time at 6:00–8:00 and 16:00–18:00, H = 3 | Suspected of power stealing |
Constructed user 3 | The second layer, eNAD = 22.6% | Suspected of power stealing |
Constructed user 4 | The second layer, eNAD = 27.1% | Suspected of power stealing |
Users | Monthly Total Suspicion Days | Identification Result |
---|---|---|
2 | 0 | not suspected of power stealing |
3 | 0 | not suspected of power stealing |
4 | 0 | not suspected of power stealing |
5 | 0 | not suspected of power stealing |
6 | 0 | not suspected of power stealing |
7 | 0 | not suspected of power stealing |
8 | 3 days | suspected of mild power stealing |
Constructed user 1 | 10 days | suspected of major power stealing |
Constructed user 2 | 13 days | suspected of major power stealing |
Constructed user 3 | 6 days | suspected of moderate power stealing |
Constructed user 4 | 8 days | suspected of moderate power stealing |
Users | MIV-Heuristic Forward Search Method in Reference [14] | Method Based on Similar-day Clustering and QRLSTM Interval Prediction |
---|---|---|
2 | not suspected of power stealing | not suspected of power stealing |
3 | not suspected of power stealing | not suspected of power stealing |
4 | not suspected of power stealing | not suspected of power stealing |
5 | not suspected of power stealing | not suspected of power stealing |
6 | not suspected of power stealing | not suspected of power stealing |
7 | Suspected of power stealing or out of order | not suspected of power stealing |
8 | Suspected of power stealing or out of order | suspected of mild power stealing |
Constructed user 1 | suspected of power stealing | suspected of major power stealing |
Constructed user 2 | suspected of power stealing | suspected of major power stealing |
Constructed user 3 | suspected of power stealing | suspected of moderate power stealing |
Constructed user 4 | suspected of power stealing | suspected of moderate power stealing |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Peng, S.; Guo, L.; Li, B.; Lu, S.; Chen, H.; Su, S. Photovoltaic Power-Stealing Identification Method Based on Similar-Day Clustering and QRLSTM Interval Prediction. Appl. Sci. 2023, 13, 3506. https://doi.org/10.3390/app13063506
Peng S, Guo L, Li B, Lu S, Chen H, Su S. Photovoltaic Power-Stealing Identification Method Based on Similar-Day Clustering and QRLSTM Interval Prediction. Applied Sciences. 2023; 13(6):3506. https://doi.org/10.3390/app13063506
Chicago/Turabian StylePeng, Shurong, Lijuan Guo, Bin Li, Shuang Lu, Huixia Chen, and Sheng Su. 2023. "Photovoltaic Power-Stealing Identification Method Based on Similar-Day Clustering and QRLSTM Interval Prediction" Applied Sciences 13, no. 6: 3506. https://doi.org/10.3390/app13063506
APA StylePeng, S., Guo, L., Li, B., Lu, S., Chen, H., & Su, S. (2023). Photovoltaic Power-Stealing Identification Method Based on Similar-Day Clustering and QRLSTM Interval Prediction. Applied Sciences, 13(6), 3506. https://doi.org/10.3390/app13063506