A novel meta-heuristic framework for solving power theft detection problem: Cheetah optimization algorithm

H Ghaedi, SR Kamel Tabbakh Farizani… - International Journal of …, 2022 - ieco.usb.ac.ir
In this paper, a two-level stacking technique with feature selection is used to detect power
theft. The first level of this technique uses base classifiers such as support vector machine …

Application of machine learning algorithm in managing deviant consumer behaviors and enhancing public service.

S Dubey, P Salwan, NK Agarwal - Journal of Global Information …, 2021 - igi-global.com
Consumer-deviant behavior costs global utility firms USD 96 billion yearly, attributable to
Non-Technical Losses (NTLs). NTLs affect the operations of power systems by overloading …

Analysis of Public Interest in Telkomsel Cards Using the Decision Tree Method

PT Cantika, GJ Yanris… - Sinkron: jurnal dan …, 2023 - jurnal.polgan.ac.id
Abstract SIM card (Subscriber Identification Module) card is a physical electronic device that
is the integrated circuit of the internet. Sim cards are used by the public as a place to store …