Application of Data Mining Technology in Anti Electricity Theft System
Abstract
References
Index Terms
- Application of Data Mining Technology in Anti Electricity Theft System
Recommendations
Modelling the weekly electricity demand caused by electric cars
The travel demand model mobiTopp is used to analyse the effects of an increasing fleet of electric vehicles on the electricity demand. For this purpose mobiTopp has been extended to support EVs. These extensions comprise an EV ownership model, different ...
Impact of technology uptake on an Australian electricity distribution-network
This paper presents simulation results for future electricity grids using an agent-based model developed with MODAM (MODular Agent-based Model). MODAM is introduced and its use demonstrated through four simulations based on a scenario that expects a ...
Farm electricity system simulator (FESS): A platform for simulating electricity utilisation on dairy farms
Highlights- Model which simulates dairy farm electricity use in 15-min intervals.
- Validated on 3 dairy farms of varying size.
- Suitable for studying renewable energy integration and demand side management.
- Reliable tool for decision support ...
AbstractThe objective of this paper was to define, validate and demonstrate a model capable of accurately simulating dairy farm electricity consumption across varying herd and parlour sizes, to facilitate research investigating renewable energy systems (...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 13Total Downloads
- Downloads (Last 12 months)13
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format