{"id":1757,"date":"2015-12-29T16:53:10","date_gmt":"2015-12-29T16:53:10","guid":{"rendered":"http:\/\/www.iic.uam.es\/\/?page_id=1757"},"modified":"2016-02-24T07:47:33","modified_gmt":"2016-02-24T07:47:33","slug":"energy-fraud-detection","status":"publish","type":"page","link":"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/","title":{"rendered":"Energy Fraud Detection"},"content":{"rendered":"[vc_row type=&#8221;full_width_section&#8221; top_padding=&#8221;-10&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text]\n<div id=\"rev_slider_57_1_wrapper\" class=\"rev_slider_wrapper fullwidthbanner-container\" style=\"margin:0px auto;background-color:transparent;padding:0px;margin-top:0px;margin-bottom:0px;\">\n<!-- START REVOLUTION SLIDER 5.0.9 fullwidth mode -->\n\t<div id=\"rev_slider_57_1\" class=\"rev_slider fullwidthabanner\" style=\"display:none;\" data-version=\"5.0.9\">\n<ul>\t<!-- SLIDE  -->\n\t<li data-index=\"rs-80\" data-transition=\"fade\" data-slotamount=\"default\"  data-easein=\"default\" data-easeout=\"default\" data-masterspeed=\"default\"  data-rotate=\"0\"  data-saveperformance=\"off\"  data-title=\"Slide\" data-description=\"\">\n\t\t<!-- MAIN IMAGE -->\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.iic.uam.es\/wp-content\/uploads\/2015\/12\/cabecera_-deteccion-de-frau.jpg\"  alt=\"\"  width=\"1903\" height=\"300\" data-bgposition=\"center center\" data-bgfit=\"cover\" data-bgrepeat=\"no-repeat\" class=\"rev-slidebg\" data-no-retina>\n\t\t<!-- LAYERS -->\n\n\t\t<!-- LAYER NR. 1 -->\n\t\t<div class=\"tp-caption Fashion-BigDisplay   tp-resizeme\" \n\t\t\t id=\"slide-80-layer-1\" \n\t\t\t data-x=\"center\" data-hoffset=\"-1\" \n\t\t\t data-y=\"center\" data-voffset=\"-54\" \n\t\t\t\t\t\tdata-width=\"['880']\"\n\t\t\tdata-height=\"['70']\"\n\t\t\tdata-transform_idle=\"o:1;\"\n \n\t\t\t data-transform_in=\"opacity:0;s:300;e:Power2.easeInOut;\" \n\t\t\t data-transform_out=\"opacity:0;s:300;s:300;\" \n\t\t\tdata-start=\"500\" \n\t\t\tdata-splitin=\"none\" \n\t\t\tdata-splitout=\"none\" \n\t\t\tdata-responsive_offset=\"on\" \n\n\t\t\t\n\t\t\tstyle=\"z-index: 5; min-width: 880px; max-width: 880px; max-width: 70px; max-width: 70px; white-space: nowrap; font-size: 22px; line-height: 20px; font-weight: 700; color: rgba(255, 255, 255, 1.00);font-family:OPEN SANS;text-align:center;\">ENERGY FRAUD DETECTION \n\t\t<\/div>\n\n\t\t<!-- LAYER NR. 2 -->\n\t\t<div class=\"tp-caption Fashion-BigDisplay   tp-resizeme\" \n\t\t\t id=\"slide-80-layer-2\" \n\t\t\t data-x=\"center\" data-hoffset=\"-3\" \n\t\t\t data-y=\"center\" data-voffset=\"30\" \n\t\t\t\t\t\tdata-width=\"['1200']\"\n\t\t\tdata-height=\"['140']\"\n\t\t\tdata-transform_idle=\"o:1;\"\n \n\t\t\t data-transform_in=\"opacity:0;s:300;e:Power2.easeInOut;\" \n\t\t\t data-transform_out=\"opacity:0;s:300;s:300;\" \n\t\t\tdata-start=\"500\" \n\t\t\tdata-splitin=\"none\" \n\t\t\tdata-splitout=\"none\" \n\t\t\tdata-responsive_offset=\"on\" \n\n\t\t\t\n\t\t\tstyle=\"z-index: 6; min-width: 1200px; max-width: 1200px; max-width: 140px; max-width: 140px; white-space: normal; font-size: 22px; line-height: 30px; font-weight: 100; color: rgba(255, 255, 255, 1.00);font-family:OPEN SANS;text-align:center;\">The energy fraud detection system can identify fraud patterns out of data from consumers. \n\t\t<\/div>\n\t<\/li>\n<\/ul>\n<div class=\"tp-bannertimer tp-bottom\" style=\"visibility: hidden !important;\"><\/div>\t<\/div>\n<script>var htmlDiv = document.getElementById(\"rs-plugin-settings-inline-css\"); var htmlDivCss=\".tp-caption.Fashion-BigDisplay,.Fashion-BigDisplay{color:rgba(0,0,0,1.00);font-size:60px;line-height:60px;font-weight:900;font-style:normal;font-family:Raleway;padding:0px 0px 0px 0px;text-decoration:none;background-color:transparent;border-color:transparent;border-style:none;border-width:0px;border-radius:0px 0px 0px 0px;letter-spacing:2px}\";\r\n\t\t\t\tif(htmlDiv) {\r\n\t\t\t\t\thtmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss;\r\n\t\t\t\t}\r\n\t\t\t\telse{\r\n\t\t\t\t\tvar htmlDiv = document.createElement(\"div\");\r\n\t\t\t\t\thtmlDiv.innerHTML = \"<style>\" + htmlDivCss + \"<\/style>\";\r\n\t\t\t\t\tdocument.getElementsByTagName(\"head\")[0].appendChild(htmlDiv.childNodes[0]);\r\n\t\t\t\t}\r\n\t\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\r\n\t\t\t\t\t\t\/******************************************\r\n\t\t\t\t-\tPREPARE PLACEHOLDER FOR SLIDER\t-\r\n\t\t\t******************************************\/\r\n\r\n\t\t\tvar setREVStartSize=function(){\r\n\t\t\t\ttry{var e=new Object,i=jQuery(window).width(),t=9999,r=0,n=0,l=0,f=0,s=0,h=0;\r\n\t\t\t\t\te.c = jQuery('#rev_slider_57_1');\r\n\t\t\t\t\te.gridwidth = [1240];\r\n\t\t\t\t\te.gridheight = [300];\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\te.sliderLayout = \"fullwidth\";\r\n\t\t\t\t\tif(e.responsiveLevels&&(jQuery.each(e.responsiveLevels,function(e,f){f>i&&(t=r=f,l=e),i>f&&f>r&&(r=f,n=e)}),t>r&&(l=n)),f=e.gridheight[l]||e.gridheight[0]||e.gridheight,s=e.gridwidth[l]||e.gridwidth[0]||e.gridwidth,h=i\/s,h=h>1?1:h,f=Math.round(h*f),\"fullscreen\"==e.sliderLayout){var u=(e.c.width(),jQuery(window).height());if(void 0!=e.fullScreenOffsetContainer){var c=e.fullScreenOffsetContainer.split(\",\");if (c) jQuery.each(c,function(e,i){u=jQuery(i).length>0?u-jQuery(i).outerHeight(!0):u}),e.fullScreenOffset.split(\"%\").length>1&&void 0!=e.fullScreenOffset&&e.fullScreenOffset.length>0?u-=jQuery(window).height()*parseInt(e.fullScreenOffset,0)\/100:void 0!=e.fullScreenOffset&&e.fullScreenOffset.length>0&&(u-=parseInt(e.fullScreenOffset,0))}f=u}else void 0!=e.minHeight&&f<e.minHeight&&(f=e.minHeight);e.c.closest(\".rev_slider_wrapper\").css({height:f})\r\n\t\t\t\t}catch(d){console.log(\"Failure at Presize of Slider:\"+d)}\r\n\t\t\t};\r\n\t\t\t\t\t\t\r\n\t\t\t\t\r\n\t\t\tsetREVStartSize();\r\n\t\t\tfunction revslider_showDoubleJqueryError(sliderID) {\r\n\t\t\t\t\tvar errorMessage = \"Revolution Slider Error: You have some jquery.js library include that comes after the revolution files js include.\";\r\n\t\t\t\t\terrorMessage += \"<br> This includes make eliminates the revolution slider libraries, and make it not work.\";\r\n\t\t\t\t\terrorMessage += \"<br><br> To fix it you can:<br>&nbsp;&nbsp;&nbsp; 1. In the Slider Settings -> Troubleshooting set option:  <strong><b>Put JS Includes To Body<\/b><\/strong> option to true.\";\r\n\t\t\t\t\terrorMessage += \"<br>&nbsp;&nbsp;&nbsp; 2. Find the double jquery.js include and remove it.\";\r\n\t\t\t\t\terrorMessage = \"<span style='font-size:16px;color:#BC0C06;'>\" + errorMessage + \"<\/span>\"\r\n\t\t\t\t\t\tjQuery(sliderID).show().html(errorMessage);\r\n\t\t\t\t}\r\n\t\t\t\t\t\tvar tpj=jQuery;\r\n\t\t\t\r\n\t\t\tvar revapi57;\r\n\t\t\ttpj(document).ready(function() {\n\t\t\t\tif(tpj(\"#rev_slider_57_1\").revolution == undefined){\n\t\t\t\t\trevslider_showDoubleJqueryError(\"#rev_slider_57_1\");\n\t\t\t\t}else{\n\t\t\t\t\trevapi57 = tpj(\"#rev_slider_57_1\").show().revolution({\n\t\t\t\t\t\tsliderType:\"standard\",\n\t\t\t\t\t\tjsFileLocation:\"https:\/\/www.iic.uam.es\/wp-content\/plugins\/revslider\/public\/assets\/js\/\",\n\t\t\t\t\t\tsliderLayout:\"fullwidth\",\n\t\t\t\t\t\tdottedOverlay:\"none\",\n\t\t\t\t\t\tdelay:9000,\n\t\t\t\t\t\tnavigation: {\n\t\t\t\t\t\t\tonHoverStop:\"off\",\n\t\t\t\t\t\t},\n\t\t\t\t\t\tgridwidth:1240,\n\t\t\t\t\t\tgridheight:300,\n\t\t\t\t\t\tlazyType:\"none\",\n\t\t\t\t\t\tshadow:0,\n\t\t\t\t\t\tspinner:\"spinner0\",\n\t\t\t\t\t\tstopLoop:\"off\",\n\t\t\t\t\t\tstopAfterLoops:-1,\n\t\t\t\t\t\tstopAtSlide:-1,\n\t\t\t\t\t\tshuffle:\"off\",\n\t\t\t\t\t\tautoHeight:\"off\",\n\t\t\t\t\t\tdisableProgressBar:\"on\",\n\t\t\t\t\t\thideThumbsOnMobile:\"off\",\n\t\t\t\t\t\thideSliderAtLimit:0,\n\t\t\t\t\t\thideCaptionAtLimit:0,\n\t\t\t\t\t\thideAllCaptionAtLilmit:0,\n\t\t\t\t\t\tdebugMode:false,\n\t\t\t\t\t\tfallbacks: {\n\t\t\t\t\t\t\tsimplifyAll:\"off\",\n\t\t\t\t\t\t\tnextSlideOnWindowFocus:\"off\",\n\t\t\t\t\t\t\tdisableFocusListener:false,\n\t\t\t\t\t\t}\n\t\t\t\t\t});\n\t\t\t\t}\n\t\t\t});\t\/*ready*\/\n\t\t<\/script>\r\n\t\t<\/div><!-- END REVOLUTION SLIDER -->[\/vc_column_text][\/vc_column][\/vc_row][vc_row top_padding=&#8221;30&#8243; bottom_padding=&#8221;30&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text]\n<h3 style=\"text-align: center;\"><span style=\"color: #9f1700;\">Energy Fraud Detection<\/span><\/h3>\n[\/vc_column_text][vc_column_text]\n<p style=\"text-align: center;\">According to researches made by the Spanish National Commission of Energy (CNE), fraud has increased substantially in gas, electricity and water distribution systems over the last few years. <strong>Detecting energy fraud<\/strong> is particularly complicated as it tends to adapt to changes. In order to minimize its effects and <strong>reduce economic impact<\/strong>, it is essential to employ automatic and intelligent methods.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row bg_color=&#8221;#f1f1f1&#8243; top_padding=&#8221;40&#8243; bottom_padding=&#8221;40&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text]\n<h3 style=\"text-align: center;\"><span style=\"color: #9f1700;\">What is Energy Fraud Detection about?<\/span><\/h3>\n[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<p style=\"text-align: justify;\">Fraud detection services may be applied to different types of distribution, such as <strong>electricity or gas.<\/strong> With the aim of <strong>identifying irregularities or fraud <\/strong>on the installations, information provided by companies about users is analysed thoroughly: consumptions, meter locations, types of rates, etc.<\/p>\n<p style=\"text-align: justify;\">For this analysis, predictive models and <strong>advanced techniques of variables selection and generation <\/strong>are used, and the most relevant techniques regarding the problem raised are identified using correlations, statistic indicators, relations among clients, QPFS or mRMR, among others. Then <strong>classification techniques <\/strong>are applied using historical data both from clients\u2019 behaviour and structural data.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<p style=\"text-align: justify;\">On the basis of this data, the system updates information about clients periodically \u2014according to the needs of the <strong>distribution company<\/strong>\u2014, and provides a ranking including the score assigned to every client. Besides, the information contained on the data, and possible interpretations, may be <strong>represented graphically <\/strong>to understand it better. Thus after the analysis is performed, a group of clients that might be committing fraud against the company is selected and shown.<\/p>\n<p style=\"text-align: justify;\">A company may use this information to organise <strong>visual checks <\/strong>of the installations, the result of which will also permit training predictive models again.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row bg_color=&#8221;#ffffff&#8221; top_padding=&#8221;40&#8243; bottom_padding=&#8221;40&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text]\n<h3 style=\"text-align: center;\"><span style=\"color: #9f1700;\">Why invest is Energy Fraud Detection Services?<\/span><\/h3>\n[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<p style=\"text-align: justify;\">Detecting fraud among users early allows energy distribution companies <strong>to reduce losses associated with fraudulent use <\/strong>of resources. Besides, results from analyses permit <strong>optimising the number of checks.<\/strong> This way, investment on the service may be <strong>redeemed on the short term<\/strong>, avoiding costs incurred by unnecessary checks.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]\n<p style=\"text-align: justify;\"><strong>IIC team of experts <\/strong>uses\u00a0<strong>own technology <\/strong>that can be adapted, enhanced and renewed according to specific needs for every problem. Thus, <strong>the system can be adapted <\/strong>to several kinds of energy distribution and different geographical areas inside and outside Spain, always guaranteeing <strong>the best model of fraud detection <\/strong>depending on particular needs of every client.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row bg_color=&#8221;#2b99cc&#8221; text_color=&#8221;light&#8221; top_padding=&#8221;15&#8243; bottom_padding=&#8221;15&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_raw_html]JTNDcCUyMHN0eWxlJTNEJTIybGluZS1oZWlnaHQlM0ElMjAyOHB4JTNCJTIwZm9udC13ZWlnaHQlM0ElMjAxMDAlM0IlMjBmb250LWZhbWlseSUzQSUyME9wZW4lMjBTYW5zJTNCJTIwZm9udC1zaXplJTNBJTIwMjBweCUzQiUyMHRleHQtYWxpZ24lM0ElMjBjZW50ZXIlM0IlMjIlM0VXZSUyMGlkZW50aWZ5JTIwaXJyZWd1bGFyaXRpZXMlMjBvciUyMGZyYXVkJTIwb24lMjB0aGUlMjBpbnN0YWxsYXRpb25zJTIwdXNpbmclMjBwcmVkaWN0aXZlJTIwbW9kZWxzLiUzQyUyRnAlM0U=[\/vc_raw_html][\/vc_column][\/vc_row][vc_row bg_image=&#8221;2082&#8243; top_padding=&#8221;40&#8243; bottom_padding=&#8221;40&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text]\n<p style=\"text-align: center;\"><a href=\"\/en\/more-information\/\" target=\"_self\" class=\"button color-8 large \" style=\"border-radius: 2px;\">MORE INFORMATION<\/a>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;full_width_section&#8221; top_padding=&#8221;-10&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][vc_row top_padding=&#8221;30&#8243; bottom_padding=&#8221;30&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text] Energy Fraud Detection [\/vc_column_text][vc_column_text] According to researches made by the Spanish National Commission of Energy (CNE), fraud has increased substantially in gas, electricity and water distribution systems over the last few years. Detecting energy fraud is particularly complicated as it tends to adapt to changes. In order to minimize its effects and reduce economic impact, it is essential to employ automatic and intelligent methods. [\/vc_column_text][\/vc_column][\/vc_row][vc_row bg_color=&#8221;#f1f1f1&#8243; top_padding=&#8221;40&#8243; bottom_padding=&#8221;40&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text] What is Energy Fraud Detection about? [\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text] Fraud detection services may be applied to different types of distribution, such as electricity or gas. With the aim of identifying irregularities or fraud on the installations, information provided by companies about users is analysed thoroughly: consumptions, meter locations, types of rates, etc. For this analysis, predictive models and advanced techniques of variables selection and generation are used, and the most relevant techniques regarding the problem raised are identified using correlations, statistic indicators, relations among clients, QPFS or mRMR, among others. Then classification techniques are applied using historical data both from clients\u2019 behaviour and structural data. [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text] On the basis of this data, the system updates information about clients periodically \u2014according to the needs of [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":2513,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1757","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Energy Fraud Detection - IIC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Energy Fraud Detection - IIC\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=&#8221;full_width_section&#8221; top_padding=&#8221;-10&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][vc_row top_padding=&#8221;30&#8243; bottom_padding=&#8221;30&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text] Energy Fraud Detection [\/vc_column_text][vc_column_text] According to researches made by the Spanish National Commission of Energy (CNE), fraud has increased substantially in gas, electricity and water distribution systems over the last few years. Detecting energy fraud is particularly complicated as it tends to adapt to changes. In order to minimize its effects and reduce economic impact, it is essential to employ automatic and intelligent methods. [\/vc_column_text][\/vc_column][\/vc_row][vc_row bg_color=&#8221;#f1f1f1&#8243; top_padding=&#8221;40&#8243; bottom_padding=&#8221;40&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text] What is Energy Fraud Detection about? [\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text] Fraud detection services may be applied to different types of distribution, such as electricity or gas. With the aim of identifying irregularities or fraud on the installations, information provided by companies about users is analysed thoroughly: consumptions, meter locations, types of rates, etc. For this analysis, predictive models and advanced techniques of variables selection and generation are used, and the most relevant techniques regarding the problem raised are identified using correlations, statistic indicators, relations among clients, QPFS or mRMR, among others. Then classification techniques are applied using historical data both from clients\u2019 behaviour and structural data. [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text] On the basis of this data, the system updates information about clients periodically \u2014according to the needs of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"Instituto de Ingenier\u00eda del Conocimiento\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-24T07:47:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@iiconocimiento\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/\",\"url\":\"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/\",\"name\":\"Energy Fraud Detection - IIC\",\"isPartOf\":{\"@id\":\"https:\/\/www.iic.uam.es\/#website\"},\"datePublished\":\"2015-12-29T16:53:10+00:00\",\"dateModified\":\"2016-02-24T07:47:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.iic.uam.es\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Big Data Services\",\"item\":\"https:\/\/www.iic.uam.es\/en\/big-data-services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Energy Environment\",\"item\":\"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Energy Fraud Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iic.uam.es\/#website\",\"url\":\"https:\/\/www.iic.uam.es\/\",\"name\":\"Instituto de Ingenier\u00eda del Conocimiento\",\"description\":\"IIC\",\"publisher\":{\"@id\":\"https:\/\/www.iic.uam.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iic.uam.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iic.uam.es\/#organization\",\"name\":\"Instituto de Ingenier\u00eda del Conocimiento\",\"url\":\"https:\/\/www.iic.uam.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iic.uam.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iic.uam.es\/wp-content\/uploads\/2017\/12\/IIC_logoP.png\",\"contentUrl\":\"https:\/\/www.iic.uam.es\/wp-content\/uploads\/2017\/12\/IIC_logoP.png\",\"width\":400,\"height\":283,\"caption\":\"Instituto de Ingenier\u00eda del Conocimiento\"},\"image\":{\"@id\":\"https:\/\/www.iic.uam.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/iiconocimiento\",\"https:\/\/www.linkedin.com\/company\/instituto-de-ingenieria-del-conocimiento-iic\",\"https:\/\/www.youtube.com\/IIConocimiento\",\"https:\/\/es.wikipedia.org\/wiki\/Instituto_de_Ingeniera_del_Conocimiento\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Energy Fraud Detection - IIC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/","og_locale":"en_US","og_type":"article","og_title":"Energy Fraud Detection - IIC","og_description":"[vc_row type=&#8221;full_width_section&#8221; top_padding=&#8221;-10&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][vc_row top_padding=&#8221;30&#8243; bottom_padding=&#8221;30&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text] Energy Fraud Detection [\/vc_column_text][vc_column_text] According to researches made by the Spanish National Commission of Energy (CNE), fraud has increased substantially in gas, electricity and water distribution systems over the last few years. Detecting energy fraud is particularly complicated as it tends to adapt to changes. In order to minimize its effects and reduce economic impact, it is essential to employ automatic and intelligent methods. [\/vc_column_text][\/vc_column][\/vc_row][vc_row bg_color=&#8221;#f1f1f1&#8243; top_padding=&#8221;40&#8243; bottom_padding=&#8221;40&#8243;][vc_column width=&#8221;1\/1&#8243;][vc_column_text] What is Energy Fraud Detection about? [\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text] Fraud detection services may be applied to different types of distribution, such as electricity or gas. With the aim of identifying irregularities or fraud on the installations, information provided by companies about users is analysed thoroughly: consumptions, meter locations, types of rates, etc. For this analysis, predictive models and advanced techniques of variables selection and generation are used, and the most relevant techniques regarding the problem raised are identified using correlations, statistic indicators, relations among clients, QPFS or mRMR, among others. Then classification techniques are applied using historical data both from clients\u2019 behaviour and structural data. [\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text] On the basis of this data, the system updates information about clients periodically \u2014according to the needs of [&hellip;]","og_url":"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/","og_site_name":"Instituto de Ingenier\u00eda del Conocimiento","article_modified_time":"2016-02-24T07:47:33+00:00","twitter_card":"summary_large_image","twitter_site":"@iiconocimiento","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/","url":"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/","name":"Energy Fraud Detection - IIC","isPartOf":{"@id":"https:\/\/www.iic.uam.es\/#website"},"datePublished":"2015-12-29T16:53:10+00:00","dateModified":"2016-02-24T07:47:33+00:00","breadcrumb":{"@id":"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/energy-fraud-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.iic.uam.es\/en\/"},{"@type":"ListItem","position":2,"name":"Big Data Services","item":"https:\/\/www.iic.uam.es\/en\/big-data-services\/"},{"@type":"ListItem","position":3,"name":"Energy Environment","item":"https:\/\/www.iic.uam.es\/en\/big-data-services\/energy-environment\/"},{"@type":"ListItem","position":4,"name":"Energy Fraud Detection"}]},{"@type":"WebSite","@id":"https:\/\/www.iic.uam.es\/#website","url":"https:\/\/www.iic.uam.es\/","name":"Instituto de Ingenier\u00eda del Conocimiento","description":"IIC","publisher":{"@id":"https:\/\/www.iic.uam.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iic.uam.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iic.uam.es\/#organization","name":"Instituto de Ingenier\u00eda del Conocimiento","url":"https:\/\/www.iic.uam.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iic.uam.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.iic.uam.es\/wp-content\/uploads\/2017\/12\/IIC_logoP.png","contentUrl":"https:\/\/www.iic.uam.es\/wp-content\/uploads\/2017\/12\/IIC_logoP.png","width":400,"height":283,"caption":"Instituto de Ingenier\u00eda del Conocimiento"},"image":{"@id":"https:\/\/www.iic.uam.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/iiconocimiento","https:\/\/www.linkedin.com\/company\/instituto-de-ingenieria-del-conocimiento-iic","https:\/\/www.youtube.com\/IIConocimiento","https:\/\/es.wikipedia.org\/wiki\/Instituto_de_Ingeniera_del_Conocimiento"]}]}},"_links":{"self":[{"href":"https:\/\/www.iic.uam.es\/en\/wp-json\/wp\/v2\/pages\/1757"}],"collection":[{"href":"https:\/\/www.iic.uam.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.iic.uam.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.iic.uam.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iic.uam.es\/en\/wp-json\/wp\/v2\/comments?post=1757"}],"version-history":[{"count":0,"href":"https:\/\/www.iic.uam.es\/en\/wp-json\/wp\/v2\/pages\/1757\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.iic.uam.es\/en\/wp-json\/wp\/v2\/pages\/2513"}],"wp:attachment":[{"href":"https:\/\/www.iic.uam.es\/en\/wp-json\/wp\/v2\/media?parent=1757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}