2016
DOI: 10.1016/j.compeleceng.2015.11.001
|View full text |Cite
|
Sign up to set email alerts
|

Social-Spider Optimization-based Support Vector Machines applied for energy theft detection

Abstract: The problem of Support Vector Machines (SVM) tuning parameters (i.e., model selection) has been paramount in the last years, mainly because of the high computational burden for SVM training step. In this paper, we address this problem by introducing a recently developed evolutionary-based algorithm called Social-Spider Optimization (SSO), as well as we introduce SSO for feature selection purposes. The model selection task has been handled in three distinct scenarios: (i) feature selection, (ii) tuning paramete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 55 publications
(26 citation statements)
references
References 13 publications
0
26
0
Order By: Relevance
“…In order to study the behavior of P-OPF under different scenarios, we used three synthetic datasets (synhetic0, synhetic2, synhetic3), two datasets concerning energy theft detection (comercial and industrial) [17], as well as nine public benchmarking datasets 2 . These datasets have been frequently used in the evaluation of different classification methods.…”
Section: Methodsmentioning
confidence: 99%
“…In order to study the behavior of P-OPF under different scenarios, we used three synthetic datasets (synhetic0, synhetic2, synhetic3), two datasets concerning energy theft detection (comercial and industrial) [17], as well as nine public benchmarking datasets 2 . These datasets have been frequently used in the evaluation of different classification methods.…”
Section: Methodsmentioning
confidence: 99%
“…The detection of irregular users through computational intelligence has been treated by many authors with several approaches. The development of intelligent systems has been an alternative and such systems have included techniques as artificial neural networks (ANNs) (Markoč, Hlupić, & Basch, 2011;Zheng, Yang, Niu, Dai, & Zhou, 2018), principle component analysis (PCA) (Singh, Bose, & Joshi, 2017), fuzzy models (Viegas, & Viera, 2017;Nagi et al, 2011), data mining (Chen et al, 2014) and support vector machines (SVMs) (Nagi J. et al, 2010;Pereira et al, 2016).…”
Section: Uparela Gonzalez Jimenez and Quinteromentioning
confidence: 99%
“…Unlike other popular algorithms as Particle Swarm Optimization (PSO) [4], Genetic Algorithm (GA) [5], Cuckoo Search (CS) [6], Artificial Bee Colony (ABC) [7], Harmony Search (HS) [8], and Social Network Optimization (SNO) [9], it evades the concentration of particles in the best positions, preventing critical faults as premature convergence to suboptimal solutions or a limited balance between exploration and exploitation. These characteristics have motivated the use of the SSO algorithm to solve a wide variety of engineering applications in diverse areas including machine learning: Artificial Neural Networks Training [10,11] and Support Vector Machine Parameter Tuning [12,13]; control: Fractional Controller Design [14][15][16] and frequency controllers [17]; image processing: Image Multilevel Thresholding [18], Image Contrast Enhancement [19], and Image Template Matching [20], and energy: Distribution of Renewable Energy [21], Congestion Management [22], and Anti-Islanding Protection [23].…”
Section: Introductionmentioning
confidence: 99%