SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
TTOOPP 55 MMOOSSTT VVIIEEWWEEDD
AARRTTIICCLLEESS FFRROOMM AACCAADDEEMMIIAA
IINN 22001199
International Journal of Artificial
Intelligence & Applications (IJAIA)
ISSN: 0975-900X (Online); 0976-2191 (Print)
http://www.airccse.org/journal/ijaia/ijaia.html
A HYBRID LEARNING ALGORITHM IN AUTOMATED TEXT
CATEGORIZATION OF LEGACY DATA
Dali Wang1
, Ying Bai2
, and David Hamblin1
1
Christopher Newport University, Newport News, VA, USA
2
Johnson C. Smith University, Charlotte, NC, USA
ABSTRACT
The goal of this research is to develop an algorithm to automatically classify measurement
types from NASA’s airborne measurement data archive. The product has to meet specific
metrics in term of accuracy, robustness and usability, as the initial decision-tree based
development has shown limited applicability due to its resource intensive characteristics. We
have developed an innovative solution that is much more efficient while offering comparable
performance. Similar to many industrial applications, the data available are noisy and
correlated; and there is a wide range of features that are associated with the type of
measurement to be identified. The proposed algorithm uses a decision tree to select features
and determine their weights. A weighted Naive Bayes is used due to the presence of highly
correlated inputs. The development has been successfully deployed in an industrial scale, and
the results show that the development is well-balanced in term of performance and resource
requirements.
KEYWORDS
Classification, machine learning, atmospheric measurement.
For More Details: http://aircconline.com/ijaia/V10N5/10519ijaia04.pdf
Volume Link: http://airccse.org/journal/ijaia/current2019.html
REFERENCES
[1] A. Aknan, G. Chen, J. Crawford, and E. Williams, ICARTT File Format Standards V1.1,
International Consortium for Atmospheric Research on Transport and Transformation, 2013
[2] Matthew Rutherford, Nathan Typanski, Dali Wang and Gao Chen, “Processing of ICARTT data
files using fuzzy matching and parser combinators”, 2014 International Conference on Artificial
Intelligence (ICAI’14), pp. 217-220, Las Vegas, July 2014
[3] Surajit Chaudhuri, Kris Ganjam, Venkatesh Ganti and Rajeev Motwani, “Robust and Efficient
Fuzzy Match for Online Data Cleaning”, Proceedings of the 2003 ACM SIGMOD
International Conference on Management of Data, June 2003, San Diego, CA, Pages 313 – 324.
[4] B. G. Buchanan and E. H. Shortliffe, “Rule Based Expert Systems: The MycinExperiments of
the Stanford Heuristic Programming Project”, Boston: MA, 1984.
[5] S.B. Kotsiantis, “Supervised Machine Learning: A Review of Classification Techniques”,
Informatica, Vol. 31, 2007, Pages 249-268
[6] L. Breiman, J. H. Friedman, R. Olshen, and C. J. Stone, Classification and Regression Trees
(Wadsworth, Belmont, CA, 1984).
[7] W. Y. Loh, “Classification and regression trees,” WIREs Data Mining Knowl Discovery (2011).
[8] David Hamblin, Dali Wang, Gao Chen and Ying Bai, “Investigation of Machine Learning
Algorithms for the Classification of Atmospheric Measurements”, Proceedings of the 2017
International Conference on Artificial Intelligence, page 115-119, Las Vegas, 2017
[9] Tjen-Sien Lim, Wei-Yin Loh, Yu-Shan Shih,“A Comparison of Prediction Accuracy,
Complexity, and Training Time of Thirty-Three Old and New Classification
Algorithms”,Machine Learning Vol. 40, 2000, Pages 203–228.
[10] Zijian Zheng, Geoffrey Webb, Lazy learning of Bayesian rules, MachineLearning 41, 2000, 53–
84.
[11] Jia Wu and Zhihua Cai, “Attribute Weighting via Differential Evolution Algorithm for Attribute
Weighted Naive Bayes”, Journal of Computational Information Systems, Vol. 7, Issue 5, 2011,
Pages 1672-1679
[12] JiZhu, Hui Zou, Saharon Rosset and Trevor Hastie, “Multi-class AdaBoost” Statistics and Its
Interface Volume 2 (2009) 349–360
[13] E. Alfaro, M. Gamez, and N. Garcia, “Adabag: An R Package for Classification with Boosting
and Bagging,” Journal of Statistical Softare, Volume 54, Issue 2 (2013).
AN APPLICATION OF CONVOLUTIONAL NEURAL
NETWORKS ON HUMAN INTENTION PREDICTION
Lin Zhang1
, Shengchao Li2
, Hao Xiong2
, Xiumin Diao2
and Ou Ma1
1
Department of Aerospace Engineering and Engineering Mechanics, University of
Cincinnati, Cincinnati, Ohio, USA
2
School of Engineering Technology, Purdue University, West Lafayette, Indiana, USA
ABSTRACT
Due to the rapidly increasing need of human-robot interaction (HRI), more intelligent robots
are in demand. However, the vast majority of robots can only follow strict instructions, which
seriously restricts their flexibility and versatility. A critical fact that strongly negates the
experience of HRI is that robots cannot understand human intentions. This study aims at
improving the robotic intelligence by training it to understand human intentions. Different
from previous studies that recognizing human intentions from distinctive actions, this paper
introduces a method to predict human intentions before a single action is completed. The
experiment of throwing a ball towards designated targets are conducted to verify the
effectiveness of the method. The proposed deep learning based method proves the feasibility
of applying convolutional neural networks (CNN) under a novel circumstance. Experiment
results show that the proposed CNN-vote method out competes three traditional machine
learning techniques. In current context, the CNN-vote predictor achieves the highest testing
accuracy with relatively less data needed.
KEYWORDS
Human-robot Interaction; Intentions Prediction; Convolutional Neural Networks;
For More Details: http://aircconline.com/ijaia/V10N5/10519ijaia01.pdf
Volume Link: http://airccse.org/journal/ijaia/current2019.html
REFERENCES
[1] J. Forlizzi and C. DiSalvo, “Service robots in the domestic environment,” in Proceeding of the
1st ACM SIGCHI/SIGART conference on Human-robot interaction - HRI ’06, 2006, p. 258.
[2] J. Bodner, H. Wykypiel, G. Wetscher, and T. Schmid, “First experiences with the da VinciTM
operating robot in thoracic surgery☆,” Eur. J. Cardio-Thoracic Surg., vol. 25, no. 5, pp. 844–
851, May 2004.
[3] M. J. Micire, “Evolution and field performance of a rescue robot,” J. F. Robot., vol. 25, no. 1–2,
pp. 17–30, Jan. 2008.
[4] F. Mondada et al., “The e-puck , a Robot Designed for Education in Engineering,” in
Robotics, 2009, vol. 1, no. 1, pp. 59–65.
[5] K. Wakita, J. Huang, P. Di, K. Sekiyama, and T. Fukuda, “Human-Walking-Intention-Based
Motion Control of an Omnidirectional-Type Cane Robot,” IEEE/ASME Trans. Mechatronics,
vol. 18, no. 1, pp. 285–296, Feb. 2013.
[6] K. Sakita, K. Ogawam, S. Murakami, K. Kawamura, and K. Ikeuchi, “Flexible cooperation
between human and robot by interpreting human intention from gaze information,” in 2004
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (IEEE Cat.
No.04CH37566), 2004, vol. 1, pp. 846–851.
[7] Z. Wang, A. Peer, and M. Buss, “An HMM approach to realistic haptic human-robot
interaction,” in World Haptics 2009 - Third Joint EuroHaptics conference and Symposium on
Haptic Interfaces for Virtual Environment and Teleoperator Systems, 2009, pp. 374–379.
[8] S. Kim, Z. Yu, J. Kim, A. Ojha, and M. Lee, “Human-Robot Interaction Using Intention
Recognition,” in Proceedings of the 3rd International Conference on Human-Agent Interaction,
2015, pp. 299–302.
[9] D. Song et al., “Predicting human intention in visual observations of hand/object interactions,” in
2013 IEEE International Conference on Robotics and Automation, 2013, pp. 1608–1615.
[10] D. Vasquez, T. Fraichard, O. Aycard, and C. Laugier, “Intentional motion on-line learning
and prediction,” Mach. Vis. Appl., vol. 19, no. 5–6, pp. 411–425, Oct. 2008.
[11] B. Ziebart, A. Dey, and J. A. Bagnell, “Probabilistic pointing target prediction via inverse
optimal control,” in Proceedings of the 2012 ACM international conference on Intelligent User
Interfaces - IUI ’12, 2012, p. 1.
[12] Z. Wang et al., “Probabilistic movement modeling for intention inference in human–robot
interaction,” Int. J. Rob. Res., vol. 32, no. 7, pp. 841–858, 201
[13] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, p. 436, 2015
[14] A. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar, and L. Fei-Fei, “Large-Scale
Video Classification with Convolutional Neural Networks,” in 2014 IEEE Conference on
Computer Vision and Pattern Recognition, 2014, pp. 1725–1732.
[15] X. Wang, L. Gao, P. Wang, X. Sun, and X. Liu, “Two-Stream 3-D convNet Fusion for Action
Recognition in Videos With Arbitrary Size and Length,” IEEE Trans. Multimed., vol. 20, no. 3,
pp. 634–644, Mar. 2018.
[16] P. Barros, C. Weber, and S. Wermter, “Emotional expression recognition with a cross-channel
convolutional neural network for human-robot interaction,” in 2015 IEEE-RAS 15th
International Conference on Humanoid Robots (Humanoids), 2015, pp. 582–587.
[17] A. H. Qureshi, Y. Nakamura, Y. Yoshikawa, and H. Ishiguro, “Show, attend and interact:
Perceivable human-robot social interaction through neural attention Q-network,” in 2017 IEEE
International Conference on Robotics and Automation (ICRA), 2017, pp. 1639–1645.
[18] L. Zhang, X. Diao, and O. Ma, “A Preliminary Study on a Robot’s Prediction of Human
Intention,” 7th Annu. IEEE Int. Conf. CYBER Technol. Autom. Control. Intell. Syst., pp. 1446–
1450, 2017.
[19] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet Classification with Deep
Convolutional Neural Networks,” Adv. Neural Inf. Process. Syst. (NIPS 2012), p. 4, 2012.
[20] J. Shotton et al., “Real-time human pose recognition in parts from single depth images,” in
CVPR 2011, 2011, vol. 411, pp. 1297–1304.
[21] F. Pedregosa et al., “Scikit-learn: Machine Learning in Pythons,” J. Mach. Learn. Res., vol.
12, no. 6, pp. 2825–2830, May 2011.
[22] M. Abadi et al., “TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed
Systems,” 2016.
[23] S. Li, L. Zhang, and X. Diao, “Improving Human Intention Prediction Using Data
Augmentation,” in HRI 2018 WORKSHOP ON SOCIAL HUMAN ROBOT INTERACTION
OF HUMAN-CARE SERVICE ROBOTS, 2018.
[24] J. Donahue et al., “Long-term recurrent convolutional networks for visual recognition and
description,” in Proceedings of the IEEE conference on computer vision and pattern
recognition, 2015, pp. 2625–2634.
[25] K. Simonyan and A. Zisserman, “Very Deep Convolutional Networks for Large-Scale Image
Recognition,” Inf. Softw. Technol., vol. 51, no. 4, pp. 769–784, Sep. 2014.
[26] C. Szegedy, S. Ioffe, V. Vanhoucke, and A. Alemi, “Inception-v4, Inception-ResNet and the
Impact of Residual Connections on Learning,” Pattern Recognit. Lett., vol. 42, pp. 11–24,
Feb. 2016
[27] P. Munya, C. A. Ntuen, E. H. Park, and J. H. Kim, “A BAYESIAN ABDUCTION MODEL
FOR EXTRACTING THE MOST PROBABLE EVIDENCE TO SUPPORT SENSEMAKING,”
Int. J. Artif. Intell. Appl., vol. 6, no. 1, p. 1, 2015.
[28] J. A. Morales and D. Akopian, “Human activity tracking by mobile phones through hebbian
learning,” Int. J. Artif. Intell. Appl., vol. 7, no. 6, pp. 1–16, 2016.
[29] C. Lee and M. Jung, “PREDICTING MOVIE SUCCESS FROM SEARCH QUERY USING
SUPPORT VECTOR REGRESSION METHOD,” Int. J. Artif. Intell. Appl. (IJAIA)., vol. 7,
no. 1,2016.
A SURVEY ON DIFFERENT MACHINE LEARNING
ALGORITHMS AND WEAK CLASSIFIERS BASED ON KDD
AND NSL-KDD DATASETS
Rama Devi Ravipati1
and Munther Abualkibash2
1
Graduate student in the Department of Computer Science, Eastern Michigan University,
Ypsilanti, Michigan
2
School of Information Security and Applied Computing, Eastern Michigan University,
Ypsilanti, Michigan
ABSTRACT
Network intrusion detection often finds a difficulty in creating classifiers that could handle
unequal distributed attack categories. Generally, attacks such as Remote to Local (R2L) and
User to Root (U2R) attacks are very rare attacks and even in KDD dataset, these attacks are
only 2% of overall datasets. So, these result in model not able to efficiently learn the
characteristics of rare categories and this will result in poor detection rates of rare attack
categories like R2L and U2R attacks. We even compared the accuracy of KDD and NSL-
KDD datasets using different classifiers in WEKA.
KEYWORDS
KDD, NSL-KDD, WEKA, AdaBoost, KNN, Detection rate, False alarm rate.
For More Details: http://aircconline.com/ijaia/V10N3/10319ijaia01.pdf
Volume Link: http://airccse.org/journal/ijaia/current2019.html
REFERENCES
[1] Brandon Lokesak (December 4, 2008). "A Comparison Between Signature Based and Anomaly
Based Intrusion Detection Systems" (PPT). www.iup.edu. Douligeris, Christos; Serpanos,
Dimitrios N. (2007-02-09). Network Security: Current Status and Future Directions. John Wiley
& Sons. ISBN 9780470099735.
[2] Rowayda, A. Sadek; M Sami, Soliman; Hagar, S Elsayed (November 2013). "Effective
anomaly intrusion detection system based on neural network with indicator variable and
rough set reduction". International Journal of Computer Science Issues (IJCSI). 10 (6).
[3] M. A. Maloof, Machine learning and data mining for computer security: Springer, 2006.
[4] J. M. Bonifacio, Jr., A. M. Cansian, A. C. P. L. F. De Carvalho, and E. S. Moreira, “Neural
networks applied in intrusion detection systems,” in Proc. IEEE Int. Joint Conf. Neural Netw.,
1998, vol. 1, pp. 205–210.
[5] Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, TzongWann Kao, Rong-Jian Chen, Jui-Lin
Lai, Citra Dwi Perkasa, A novel intrusion detection system based on hierarchical clustering
and support vector machines, Journal of Expert systems with Applications, Vol. 38, 2011, 306-
313
[6] Cheng Xiang, Png Chin Yong, Lim Swee Meng, Design of multiple-level hybrid classifier for
intrusion detection system using Bayesian clustering and decision trees, Journal of Pattern
Recognition Letters, Vol. 29, 2008, 918-924.
[7] Weiming Hu, Steve Maybank, “AdaBoost-Based Algorithm for Network Intrusion Detection”.
In IEEE transaction on systems, MAN, and CYBERNETICS, APRIL 2008.
[8] S. Sung, A.H. Mukkamala. “Identifying important features for intrusion detection using support
vector machines and neural networks”. In Proceedings of the Symposium on Applications and
the Internet (SAINT), pp. 209–216. IEEE .
[9] H. Kayacik, A. Zincir-Heywood and M. Heywood. “Selecting features for intrusion detection:
A feature relevance analysis on KDD 99 intrusion detection datasets”. In Proceedings of the
Third Annual Conference on Privacy, Security and Trust (PST). 2005.
[10] C. Lee, S. Shin and J. Chung. “Network intrusion detection through genetic feature selection”.
In Seventh ACIS International Conference on Software Engineering, Artificial Intelligence,
Networking, and Parallel/Distributed Computing (SNPD), pp. 109–114. IEEE Computer
Society,2006.
[11] M. Panda, M.R. Patra, “Semi-Naïve Bayesian method for network intrusion detection system”,
Neural information processing, Lecture Notes in Computer Science (Springer Link) 5863 (2009)
614–621.
[12] Sandeep Gurung, Mirnal Kanti Ghose, Aroj Subedi,"Deep Learning Approach on Network
Intrusion Detection System using NSL-KDD Dataset", International Journal of Computer
Network and Information Security(IJCNIS), Vol.11, No.3, pp.8-14, 2019.DOI:
10.5815/ijcnis.2019.03.02.
[13] Jawhar, M. M. T., & Mehrotra, M. (2010). Design network intrusion detection system using
hybrid fuzzy neural network. International JournalofComputerScience and Security, 4(3), 285-
294.
[14] Souza, P. V. C. (2018). Regularized Fuzzy Neural Networks for Pattern Classification
Problems. International Journal of Applied Engineering Research, 13(5), 2985-2991.
ADAPTIVE LEARNING EXPERT SYSTEM FOR DIAGNOSIS
AND MANAGEMENT OF VIRAL HEPATITIS
Henok Yared Agizew
Department of Management Information System, Mettu University, Mettu, Ethiopia.
ABSTRACT
Viral hepatitis is the regularly found health problem throughout the world among other easily
transmitted diseases, such as tuberculosis, human immune virus, malaria and so on. Among all
hepatitis viruses, the uppermost numbers of deaths are result from the long-lasting hepatitis C
infection or long-lasting hepatitis B. In order to develop this system, the knowledge is acquired using
both structured and semi-structured interviews from internists of St.Paul Hospital. Once the
knowledge is acquired, it is modeled and represented using rule based reasoning techniques. Both
forward and backward chaining is used to infer the rules and provide appropriate advices in the
developed expert system. For the purpose of developing the prototype expert system SWI-prolog
editor also used. The proposed system has the ability to adapt with dynamic knowledge by
generalizing rules and discover new rules through learning the newly arrived knowledge from domain
experts adaptively without any help from the knowledge engineer.
KEYWORDS
Expert System, Diagnosis and Management of Viral Hepatitis, Adaptive Learning, Discovery and
Generalization Mechanism.
For More Details: http://aircconline.com/ijaia/V10N2/10219ijaia04.pdf
Volume Link: http://airccse.org/journal/ijaia/current2019.html
REFERENCES
[1] Amanuel, A. (2016).”Self Learning Computer Troubleshooting Expert System.”
International Journal of Artificial Intelligence & Applications (IJAIA). 7(1), pp.45-58.
[2] Blaxton, T.A & Kushner, B.G. (1986). “An Organizational Framework for Comparing Adaptive
Artificial Intelligence Systems.” ACM Fall Joint Computer Conference, 3(2):190-199
[3] Clair, D. C., Bond, W. E., Flachsbart, B. B., and Vigland, A. R. (1987). “An Architecture for
Adaptive Learning in Rule-Based Diagnostic Expert Systems.” Proceedings of the Fall Joint
Computer Conference, IEEE Computer Society. pp. 678-685.
[4] Dhiman, RK. (2018). National Guidelines for Diagnosis & Management of Viral Hepatitis,
National Health Mission, India.
[5] Dipanwita, Biswas, Sagar Bairagi, Neelam Panse & Nirmala Shinde. (2011). Disease Diagnosis
System. International Journal of Computer Science & Informatics, 1(2):48-51.
[6] Durkin. J. (1996). Expert Systems: A View of the Future. IEEE Expert, University of Akron, 56-
63.
[7] Heijst.(2006).“Conceptual Modelling for Knowledge-Based Systems.” Encyclopedia of
Computer Science and Technology, Marce Dekker Inc., New York.
[8] Malhotra.(june, 2015) “Evolution of Knowledge Representation and Retrieval Techniques.”
I.J. Intelligent Systems and Applications. [online]. 2015 (7), pp. 18-28.
[9] Paulo,V and Augusto,J. (2018). “Using fuzzy neural networks for improving the prediction of
children with autism through mobile devices.” ISCC 2018 Workshops - ICTS4eHealth
1570446039. Available: https://www.researchgate.net/publication/329033556.[Nov., 2018].
[10] Sajja, P., & Akerkar, R. (2010). Knowledge-Based Systems for Development. In P. Sajja, & R.
Akerkar, Advanced Knowledge Based Systems: Model, Applications & Research, 1(1):1 – 11.
[11] Seblewongel, E. (2011). “Prototype knowledge based system for anxiety mental disorder
diagnosis.” Master’s Thesis, Addis Abeba University, Addis Abeba, Ethiopia.
[12] Solomon, G. (2013). “A self-learning knowledge based system for diagnosis and treatment of
diabetes.” Master’s Thesis, Addis Abeba University, Addis Abeba, Ethiopia.
[13] Tesfamariam, M. A. (2015). Integrating Data Mining Results with the Knowledge Based for
Diagnosis and Treatment of Visceral Leishmaniasis. Master’s Thesis, University of Gonder,
Gonder, Ethiopia.
[14] World Health Organization,(2013). Global health impact report of viral hepatitis.
[15] World Health Organization,(2017). “Prevention, Care and Treatment of Viral Hepatitis in the
African Region: Framework for Action,2016-2020 Regional Office for Africa.”
EFFICIENT POWER THEFT DETECTION FOR RESIDENTIAL
CONSUMERS USING MEAN SHIFT DATA MINING
KNOWLEDGE DISCOVERY PROCESS
Blazakis Konstantinos1
and Stavrakakis Georgios2
1
School of Electrical and Computer Engineering, Technical University of Crete, Greece
2
School of Electrical and Computer Engineering, Technical University of Crete, Greece
ABSTRACT
Energy theft constitutes an issue of great importance for electricity operators. The attempt to detect
and reduce non-technical losses is a challenging task due to insufficient inspection methods. With the
evolution of advanced metering infrastructure (AMI) in smart grids, a more complicated status quo in
energy theft has emerged and many new technologies are being adopted to solve the problem. In order
to identify illegal residential consumers, a computational method of analyzing and identifying
electricity consumption patterns of consumers based on data mining techniques has been presented.
Combining principal component analysis (PCA) with mean shift algorithm for different power theft
scenarios, we can now cope with the power theft detection problem sufficiently. The overall research
has shown encouraging results in residential consumers power theft detection that will help utilities to
improve the reliability, security and operation of power network.
KEYWORDS
Data mining, Mean Shift clustering algorithm, Principal Component Analysis (PCA), Density-Based
Spatial Clustering of Applications with Noise (DBSCAN), Non-Technical Losses (NTLs), power
theft, smart grid, smart electricity metering
For More Details: http://aircconline.com/ijaia/V10N1/10119ijaia06.pdf
Volume Link: http://airccse.org/journal/ijaia/current2019.html
REFERENCES
[1] A. K. Gupta, A. Mukherjee, A. Routray and R. Biswas, "A novel power theft detection algorithm
for low voltage distribution network," IECON 2017 - 43rd Annual Conference of the IEEE
Industrial Electronics Society, Beijing, 2017, pp. 3603-3608. Doi:
10.1109/IECON.2017.8216611.
[2] Jokar, Paria, Nasim Arianpoo, and Victor CM Leung. "Electricity theft detection in AMI using
customers’ consumption patterns." IEEE Trans. on Smart Grid Vol. 7, No. 1, January 2016.
[3] Nunoo, Solomon, and joseph c. Attachie. "A methodology for the design of an electricity theft
monitoring system." journal of theoretical & applied information technology 26.2 (2011).
[4] Jiang, R., Lu, R., Wang, Y., Luo, J., Shen, C., & Shen, X. S. (2014). Energy-theft detection
issues for advanced metering infrastructure in smart grid. Tsinghua Science and Technology, pp
105-120 Volume 19, Number 2, April 2014.
[5] Blazakis, K., Davarzani, S., Stavrakakis, G., & Pisica, I. (2016). Lessons learnt from mining
meter data of residential consumers. Periodica Polytechnica. Electrical Engineering and
Computer Science, 60(4), 266.
[6] LEWIS, Fabian B. Costly ‘Throw-Ups’: Electricity Theft and Power Disruptions. The
Electricity Journal, 2015, 28.7: 118-135.
[7] P. Antmann, Reducing technical and non-technical losses in the power sector,in: Background
Paper for the WBG Energy Strategy, Tech. Rep., Washington,DC, USA: The World Bank, 2009,
n.d.
[8] Depuru, Soma Shekara Sreenadh Reddy. Modeling, detection, and prevention of electricity theft
for enhanced performance and security of power grid. The University of Toledo, 2012.
[9] Prasad, Jagdish, and Ravi Samikannu. "Overview, issues and prevention of energy theft in smart
grids and virtual power plants in Indian context." Energy Policy 110 (2017): 365-374.
[10] Nunoo, Solomon, and Joseph C. Attachie. "A methodology for the design of an electricity
theft monitoring system." Journal of Theoretical & Applied Information Technology 26.2
(2011).
[11] Carreira-Perpinán, Miguel A. "A review of mean-shift algorithms for clustering." arXiv
preprint arXiv:1503.00687 (2015).
[12] Isqeel, Abdullateef Ayodele, Salami Momoh-Jimoh Eyiomika, and Tijani Bayo Ismaeel.
"Consumer Load Prediction Based on NARX for Electricity Theft Detection." Computer and
Communication Engineering (ICCCE), 2016 International Conference on. IEEE, 2016.
[13] A. Nizar, Z. Y. Dong, and P. Zhang, “Detection rules for non technical losses analysis in power
utilities,” in Proc. IEEE PowerEnergy Soc.Gen. Meeting, 2008, pp. 1–8.
[14] J. Cabral, J. Pinto, and A. Pinto, “Fraud detection system for highand low voltage electricity
consumers based on data mining,” in Proc. Power Energy Soc. Gen. Meeting, Jul. 2009, pp. 1–
5.
[15] Chandel, Priyamvada, et al. "Power theft: Major cause of non technical losses in Indian
distribution sector." Power India International Conference (PIICON), 2016 IEEE 7th. IEEE,
2016.
[16] Nagi, J., Yap, K. S., Tiong, S. K., Ahmed, S. K., & Mohamad, M. (2010). Nontechnical loss
detection for metered customers in power utility using support vector machines. IEEE
transactions on Power Delivery, 25(2), 1162-1171.
[17] Viegas, Joaquim L., et al. "Solutions for detection of non-technical losses in the electricity
grid: A review." Renewable and Sustainable Energy Reviews 80 (2017): 1256-1268.
[18] Messinis, George M., and Nikos D. Hatziargyriou. "Review of non-technical loss detection
methods." Electric Power Systems Research 158 (2018): 250-266.
[19] P. Glauner, J. Meira, P. Valtchev, R. State and F. Bettinger, "The Challenge of Non-Technical
Loss Detection using Artificial Intelligence: A Survey", International Journal of
Computational Intelligence Systems (IJCIS), vol. 10, issue 1, pp. 760-775, 2017.
[20] P. Glauner, N. Dahringer, O. Puhachov, J. Meira, P. Valtchev, R. State and D. Duarte,
"Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial
Visualizations", Proceedings of the 17th IEEE International Conference on Data Mining
Workshops (ICDMW 2017), New Orleans, USA, 2017.
[21] Nagi, J., Yap, K. S., Tiong, S. K., Ahmed, S. K., & Mohammad, A. M. (2008, November).
Detection of abnormalities and electricity theft using genetic support vector machines. In
TENCON 2008-2008 IEEE Region 10 Conference (pp. 1-6). IEEE.
[22] Nagi, J., Mohammad, A. M., Yap, K. S., Tiong, S. K., & Ahmed, S. K. (2008, December).
Nontechnical loss analysis for detection of electricity theft using support vector machines. In
Power and Energy Conference, 2008. PECon 2008. IEEE 2nd International (pp. 907-912). IEEE.
[23] Buzau, Madalina-Mihaela, et al. "Detection of Non-Technical Losses Using Smart Meter Data
and Supervised Learning." IEEE Transactions on Smart Grid (2018).
[24] Cheng, J., Ren, R., Wang, L., & Zhan, J. (2017). Deep Convolutional Neural Networks for
Anomaly Event Classification on Distributed Systems. arXiv preprint arXiv:1710.09052.
[25] Monedero, Iñigo, et al. "Detection of frauds and other non-technical losses in a power utility
using Pearson coefficient, Bayesian networks and decision trees." International Journal of
Electrical Power & Energy Systems 34.1 (2012): 90-98.
[26] Nizar, A. H., Z. Y. Dong, and Y. Wang. "Power utility nontechnical loss analysis with extreme
learning machine method." IEEE Transactions on Power Systems 23.3 (2008): 946-955.
[27] Ramos, C. C. O., de Sousa, A. N., Papa, J. P., & Falcao, A. X. (2011). A new approach for
nontechnical losses detection based on optimum-path forest. IEEE Transactions on Power
Systems, 26(1), 181-189.
[28] Angelos, E. W. S., Saavedra, O. R., Cortés, O. A. C., & de Souza, A. N. (2011). Detection and
identification of abnormalities in customer consumptions in power distribution systems. IEEE
Transactions on Power Delivery, 26(4), 2436-2442.
[29] Rossoni, A., Braunstein, S. H., Trevizan, R. D., Bretas, A. S., & Bretas, N. G. (2016, July).
Smart distribution power losses estimation: A hybrid state estimation approach. In Power and
Energy Society General Meeting (PESGM), 2016 (pp. 1-5). IEEE.
[30] Bhat, R. R., Trevizan, R. D., Sengupta, R., Li, X., & Bretas, A. (2016, December). Identifying
Nontechnical Power Loss via Spatial and Temporal Deep Learning. In Machine Learning and
Applications (ICMLA), 2016 15th IEEE International Conference on (pp. 272-279). IEEE.
[31] Zheng, Zibin, et al. "Wide & Deep Convolutional Neural Networks for Electricity-Theft
Detection to Secure Smart Grids." IEEE Transactions on Vehicular Technology 99 (2018): 1-1.
[32] Wang, Yi, et al. "Deep Learning-Based Socio-demographic Information Identification from
Smart Meter Data." IEEE Transactions on Smart Grid, Doi 10.1109/TSG.2018.2805723 (2018).
[33] Jardini, J. A., Tahan, C. M., Gouvea, M. R., Ahn, S. U., & Figueiredo, F. M. (2000). Daily load
profiles for residential, commercial and industrial low voltage consumers. IEEE Transactions on
power delivery, 15(1), 375-380.
[34] Gerbec, D., et al. "An approach to customers daily load profile determination" IEEE Power
Engineering Society Summer Meeting, Chicago-USA, 21-25 July 2002, Vol.1.
[35] Carreira-Perpinán, M. A. (2015). "A review of mean-shift algorithms for clustering". CRC
Handbook of Cluster Analysis, edited by Roberto Rocci, Fionn Murtagh, Marina Meila and
Christian Hennig.
[36] Krishna, Varun Badrinath, Gabriel A. Weaver, and William H. Sanders. "PCA-based method
for detecting integrity attacks on advanced metering infrastructure." International
Conference on Quantitative Evaluation of Systems. Springer, Cham, 2015.
[37] Krishna, Varun Badrinath, Carl Gunter, and William H. Sanders. "Evaluating Detectors on
Optimal Attack Vectors that enable Electricity Theft and DER Fraud." IEEE Journal of Selected
Topics in Signal Processing Vol. 12, No. 4, August 2018.
[38] Krishna, Varun Badrinath, et al. "F-DETA: A framework for detecting electricity theft attacks in
smart grids." Dependable Systems and Networks (DSN), 46th Annual IEEE/IFIP International
Conference on. IEEE, 2016.
[39] Costa, Breno C., et al. "Fraud detection in electric power distribution networks using an
ANNbased knowledge-discovery process." International Journal of Artificial Intelligence &
Applications, Vol. 4, No. 6, November 2013.
[40] Jardini, J. A., Tahan, C. M., Gouvea, M. R., Ahn, S. U., & Figueiredo, F. M. (2000). Daily load
profiles for residential, commercial and industrial low voltage consumers. IEEE Transactions on
power delivery, 15(1), 375-380.
[41] Capasso, A., Grattieri, W., Lamedica, R., & Prudenzi, A. (1994). A bottom-up approach to
residential load modeling. IEEE Transactions on Power Systems, 9(2), 957-964.
[42] Smith, Lindsay I. "A tutorial on principal components analysis", Cornell University, USA
51.52 (2002): 65.
[43] Abdullah, Manal, Majda Wazzan, and Sahar Bo-Saeed. "Optimizing face recognition using
PCA", International Journal of Artificial Intelligence & Applications (IJAIA), Vol.3, No.2,
March 2012.
[44] Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters
in large spatial databases with noise. In: Proceedings of KDD’96. vol. 96, pp. 226-231 (1996)
[45] Al-khurayji, Raed, and Ahmed Sameh. "An Effective Arabic Text Classification Approach
Based on Kernel Naive Bayes Classifier." International Journal of Artificial Intelligence
Applications, Vol.8, No.6, November 2017.
[46] Ali Akbar Ghasemi, Mohsen Gitizadeh. "Detection of illegal consumers using pattern
classification approach combined with Levenberg-Marquardt method in smart grid", Electrical
Power and Energy Systems 99 (2018) 363–375.
AUTHORS
Blazakis Konstantinos: Received his BSc degree in Applied Mathematical and Physical
Sciences from N.T.U.A. (National Technical University of Athens) in 2010 and his MSc
degree in Electrical and Computer Engineering from Technical University of Crete, Chania,
Greece in 2015. Currently, he is a PhD candidate at Technical University of Crete. His areas
of research include data mining, machine learning, smart grids, distributed electricity
networks, renewable energy
Stavrakakis Georgios: Received his first degree Diploma in Electrical Engineering from the
N.T.U.A. (National Technical University of Athens), Athens, in 1980. His D.E.A. in
Automatic Control and Systems Engineering was obtained from I.N.S.A., Toulouse, in 1981
and his Ph.D. in the same area was obtained from “Paul Sabatier-Toulouse III” University,
Toulouse-France, in 1984. He has worked as a Research Fellow in the Robotics Laboratory of
N.T.U.A. (1985-1988), and as a Visiting Scientist at the Institute for Systems Engineering
and Informatics/Components Diagnostics & Reliability Sector of the Joint Research Center-
EEC at Ispra, Italy (1989-1990). He was Vice President of the Hellenic Center for Renewable
Energy Sources (CRES), Pikermi, Athens-Greece (2000-2002). He is currently a Full
Professor at the Technical University of Crete, Chania, Greece.

Más contenido relacionado

La actualidad más candente

International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)ijwscjournal
 
Publication list
Publication listPublication list
Publication listdrcgdethe
 
ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...
ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...
ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...ieijjournal
 
Top 10 neural networks
Top 10 neural networksTop 10 neural networks
Top 10 neural networksijsc
 
June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing  June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing ijsc
 
A Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine PerceptionA Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine PerceptionCory Andrew Henson
 
Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Zac Darcy
 
Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021AIRCC Publishing Corporation
 
Extracting City Traffic Events from Social Streams
 Extracting City Traffic Events from Social Streams Extracting City Traffic Events from Social Streams
Extracting City Traffic Events from Social StreamsPramod Anantharam
 
Literature Review: Application of Artificial Neural Network in Civil Engineering
Literature Review: Application of Artificial Neural Network in Civil EngineeringLiterature Review: Application of Artificial Neural Network in Civil Engineering
Literature Review: Application of Artificial Neural Network in Civil EngineeringBid4Papers
 
Complexity Neural Networks for Estimating Flood Process in Internet-of-Things...
Complexity Neural Networks for Estimating Flood Process in Internet-of-Things...Complexity Neural Networks for Estimating Flood Process in Internet-of-Things...
Complexity Neural Networks for Estimating Flood Process in Internet-of-Things...Dr. Amarjeet Singh
 
Trends of machine learning in 2020 - International Journal of Artificial Inte...
Trends of machine learning in 2020 - International Journal of Artificial Inte...Trends of machine learning in 2020 - International Journal of Artificial Inte...
Trends of machine learning in 2020 - International Journal of Artificial Inte...gerogepatton
 
Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...nexgentechnology
 
Pocket Data Mining: The Next Generation in Predictive Analytics
Pocket Data Mining: The Next Generation in Predictive AnalyticsPocket Data Mining: The Next Generation in Predictive Analytics
Pocket Data Mining: The Next Generation in Predictive AnalyticsMohamed Medhat Gaber
 

La actualidad más candente (19)

International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
Publication list
Publication listPublication list
Publication list
 
ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...
ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...
ADAPTIVE MODELING OF URBAN DYNAMICS DURING EPHEMERAL EVENT VIA MOBILE PHONE T...
 
AI for Science
AI for ScienceAI for Science
AI for Science
 
Top 10 neural networks
Top 10 neural networksTop 10 neural networks
Top 10 neural networks
 
June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing  June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing
 
A Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine PerceptionA Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine Perception
 
Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...
 
Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021
 
CV-KS-Jun2015
CV-KS-Jun2015CV-KS-Jun2015
CV-KS-Jun2015
 
Extracting City Traffic Events from Social Streams
 Extracting City Traffic Events from Social Streams Extracting City Traffic Events from Social Streams
Extracting City Traffic Events from Social Streams
 
Literature Review: Application of Artificial Neural Network in Civil Engineering
Literature Review: Application of Artificial Neural Network in Civil EngineeringLiterature Review: Application of Artificial Neural Network in Civil Engineering
Literature Review: Application of Artificial Neural Network in Civil Engineering
 
Complexity Neural Networks for Estimating Flood Process in Internet-of-Things...
Complexity Neural Networks for Estimating Flood Process in Internet-of-Things...Complexity Neural Networks for Estimating Flood Process in Internet-of-Things...
Complexity Neural Networks for Estimating Flood Process in Internet-of-Things...
 
Avinash_CV_long
Avinash_CV_longAvinash_CV_long
Avinash_CV_long
 
Understanding City Traffic Dynamics Utilizing Sensor and Textual Observations
Understanding City Traffic Dynamics Utilizing Sensor and Textual ObservationsUnderstanding City Traffic Dynamics Utilizing Sensor and Textual Observations
Understanding City Traffic Dynamics Utilizing Sensor and Textual Observations
 
Ijciet 10 01_036
Ijciet 10 01_036Ijciet 10 01_036
Ijciet 10 01_036
 
Trends of machine learning in 2020 - International Journal of Artificial Inte...
Trends of machine learning in 2020 - International Journal of Artificial Inte...Trends of machine learning in 2020 - International Journal of Artificial Inte...
Trends of machine learning in 2020 - International Journal of Artificial Inte...
 
Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...
 
Pocket Data Mining: The Next Generation in Predictive Analytics
Pocket Data Mining: The Next Generation in Predictive AnalyticsPocket Data Mining: The Next Generation in Predictive Analytics
Pocket Data Mining: The Next Generation in Predictive Analytics
 

Similar a Top 5 Most Viewed Articles From Academia in 2019

Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...gerogepatton
 
New Research Articles 2019 September Issue International Journal of Artificia...
New Research Articles 2019 September Issue International Journal of Artificia...New Research Articles 2019 September Issue International Journal of Artificia...
New Research Articles 2019 September Issue International Journal of Artificia...gerogepatton
 
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...ijujournal
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...AIRCC Publishing Corporation
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
 
March 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyMarch 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticأحلام انصارى
 
New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...gerogepatton
 
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...aciijournal
 
Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Natalia Díaz Rodríguez
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligenceaciijournal
 
New research articles 2020 october issue international journal of multimedi...
New research articles 2020 october  issue  international journal of multimedi...New research articles 2020 october  issue  international journal of multimedi...
New research articles 2020 october issue international journal of multimedi...ijma
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018ijesajournal
 
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...IJNSA Journal
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
January 2024 : Top 10 Downloaded Articles in Computer Science & Information ...
January 2024 :  Top 10 Downloaded Articles in Computer Science & Information ...January 2024 :  Top 10 Downloaded Articles in Computer Science & Information ...
January 2024 : Top 10 Downloaded Articles in Computer Science & Information ...AIRCC Publishing Corporation
 
(Crestani et al., 2004) The proliferation of mobile devices and th
(Crestani et al., 2004) The proliferation of mobile devices and th(Crestani et al., 2004) The proliferation of mobile devices and th
(Crestani et al., 2004) The proliferation of mobile devices and thMargaritoWhitt221
 
SCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial IntelligenceSCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial Intelligencevivatechijri
 
FACT - A New Way to Get News
FACT - A New Way to Get NewsFACT - A New Way to Get News
FACT - A New Way to Get NewsPurdue RCODI
 

Similar a Top 5 Most Viewed Articles From Academia in 2019 (20)

Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...
 
New Research Articles 2019 September Issue International Journal of Artificia...
New Research Articles 2019 September Issue International Journal of Artificia...New Research Articles 2019 September Issue International Journal of Artificia...
New Research Articles 2019 September Issue International Journal of Artificia...
 
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
 
March 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyMarch 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information Technology
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...
 
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
 
Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligence
 
New research articles 2020 october issue international journal of multimedi...
New research articles 2020 october  issue  international journal of multimedi...New research articles 2020 october  issue  international journal of multimedi...
New research articles 2020 october issue international journal of multimedi...
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018
 
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
Top Cited Papers In 2018 - International Journal of Network Security & Its Ap...
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information Technology
 
Contextual Analysis
Contextual AnalysisContextual Analysis
Contextual Analysis
 
January 2024 : Top 10 Downloaded Articles in Computer Science & Information ...
January 2024 :  Top 10 Downloaded Articles in Computer Science & Information ...January 2024 :  Top 10 Downloaded Articles in Computer Science & Information ...
January 2024 : Top 10 Downloaded Articles in Computer Science & Information ...
 
(Crestani et al., 2004) The proliferation of mobile devices and th
(Crestani et al., 2004) The proliferation of mobile devices and th(Crestani et al., 2004) The proliferation of mobile devices and th
(Crestani et al., 2004) The proliferation of mobile devices and th
 
SCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial IntelligenceSCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial Intelligence
 
FACT - A New Way to Get News
FACT - A New Way to Get NewsFACT - A New Way to Get News
FACT - A New Way to Get News
 

Más de gerogepatton

THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...gerogepatton
 
13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATIONAN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATIONgerogepatton
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)gerogepatton
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...gerogepatton
 
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATIONWAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATIONgerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...gerogepatton
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...gerogepatton
 
The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer ArchitectureFoundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecturegerogepatton
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...gerogepatton
 

Más de gerogepatton (20)

THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
 
13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATIONAN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
 
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATIONWAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)
 
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer ArchitectureFoundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...
Website URL:https://www.airccse.org/journal/ijaia/ijaia.html Review of AI Mat...
 

Último

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Último (20)

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

Top 5 Most Viewed Articles From Academia in 2019

  • 1. TTOOPP 55 MMOOSSTT VVIIEEWWEEDD AARRTTIICCLLEESS FFRROOMM AACCAADDEEMMIIAA IINN 22001199 International Journal of Artificial Intelligence & Applications (IJAIA) ISSN: 0975-900X (Online); 0976-2191 (Print) http://www.airccse.org/journal/ijaia/ijaia.html
  • 2. A HYBRID LEARNING ALGORITHM IN AUTOMATED TEXT CATEGORIZATION OF LEGACY DATA Dali Wang1 , Ying Bai2 , and David Hamblin1 1 Christopher Newport University, Newport News, VA, USA 2 Johnson C. Smith University, Charlotte, NC, USA ABSTRACT The goal of this research is to develop an algorithm to automatically classify measurement types from NASA’s airborne measurement data archive. The product has to meet specific metrics in term of accuracy, robustness and usability, as the initial decision-tree based development has shown limited applicability due to its resource intensive characteristics. We have developed an innovative solution that is much more efficient while offering comparable performance. Similar to many industrial applications, the data available are noisy and correlated; and there is a wide range of features that are associated with the type of measurement to be identified. The proposed algorithm uses a decision tree to select features and determine their weights. A weighted Naive Bayes is used due to the presence of highly correlated inputs. The development has been successfully deployed in an industrial scale, and the results show that the development is well-balanced in term of performance and resource requirements. KEYWORDS Classification, machine learning, atmospheric measurement. For More Details: http://aircconline.com/ijaia/V10N5/10519ijaia04.pdf Volume Link: http://airccse.org/journal/ijaia/current2019.html
  • 3. REFERENCES [1] A. Aknan, G. Chen, J. Crawford, and E. Williams, ICARTT File Format Standards V1.1, International Consortium for Atmospheric Research on Transport and Transformation, 2013 [2] Matthew Rutherford, Nathan Typanski, Dali Wang and Gao Chen, “Processing of ICARTT data files using fuzzy matching and parser combinators”, 2014 International Conference on Artificial Intelligence (ICAI’14), pp. 217-220, Las Vegas, July 2014 [3] Surajit Chaudhuri, Kris Ganjam, Venkatesh Ganti and Rajeev Motwani, “Robust and Efficient Fuzzy Match for Online Data Cleaning”, Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, June 2003, San Diego, CA, Pages 313 – 324. [4] B. G. Buchanan and E. H. Shortliffe, “Rule Based Expert Systems: The MycinExperiments of the Stanford Heuristic Programming Project”, Boston: MA, 1984. [5] S.B. Kotsiantis, “Supervised Machine Learning: A Review of Classification Techniques”, Informatica, Vol. 31, 2007, Pages 249-268 [6] L. Breiman, J. H. Friedman, R. Olshen, and C. J. Stone, Classification and Regression Trees (Wadsworth, Belmont, CA, 1984). [7] W. Y. Loh, “Classification and regression trees,” WIREs Data Mining Knowl Discovery (2011). [8] David Hamblin, Dali Wang, Gao Chen and Ying Bai, “Investigation of Machine Learning Algorithms for the Classification of Atmospheric Measurements”, Proceedings of the 2017 International Conference on Artificial Intelligence, page 115-119, Las Vegas, 2017 [9] Tjen-Sien Lim, Wei-Yin Loh, Yu-Shan Shih,“A Comparison of Prediction Accuracy, Complexity, and Training Time of Thirty-Three Old and New Classification Algorithms”,Machine Learning Vol. 40, 2000, Pages 203–228. [10] Zijian Zheng, Geoffrey Webb, Lazy learning of Bayesian rules, MachineLearning 41, 2000, 53– 84. [11] Jia Wu and Zhihua Cai, “Attribute Weighting via Differential Evolution Algorithm for Attribute Weighted Naive Bayes”, Journal of Computational Information Systems, Vol. 7, Issue 5, 2011, Pages 1672-1679 [12] JiZhu, Hui Zou, Saharon Rosset and Trevor Hastie, “Multi-class AdaBoost” Statistics and Its Interface Volume 2 (2009) 349–360 [13] E. Alfaro, M. Gamez, and N. Garcia, “Adabag: An R Package for Classification with Boosting and Bagging,” Journal of Statistical Softare, Volume 54, Issue 2 (2013).
  • 4. AN APPLICATION OF CONVOLUTIONAL NEURAL NETWORKS ON HUMAN INTENTION PREDICTION Lin Zhang1 , Shengchao Li2 , Hao Xiong2 , Xiumin Diao2 and Ou Ma1 1 Department of Aerospace Engineering and Engineering Mechanics, University of Cincinnati, Cincinnati, Ohio, USA 2 School of Engineering Technology, Purdue University, West Lafayette, Indiana, USA ABSTRACT Due to the rapidly increasing need of human-robot interaction (HRI), more intelligent robots are in demand. However, the vast majority of robots can only follow strict instructions, which seriously restricts their flexibility and versatility. A critical fact that strongly negates the experience of HRI is that robots cannot understand human intentions. This study aims at improving the robotic intelligence by training it to understand human intentions. Different from previous studies that recognizing human intentions from distinctive actions, this paper introduces a method to predict human intentions before a single action is completed. The experiment of throwing a ball towards designated targets are conducted to verify the effectiveness of the method. The proposed deep learning based method proves the feasibility of applying convolutional neural networks (CNN) under a novel circumstance. Experiment results show that the proposed CNN-vote method out competes three traditional machine learning techniques. In current context, the CNN-vote predictor achieves the highest testing accuracy with relatively less data needed. KEYWORDS Human-robot Interaction; Intentions Prediction; Convolutional Neural Networks; For More Details: http://aircconline.com/ijaia/V10N5/10519ijaia01.pdf Volume Link: http://airccse.org/journal/ijaia/current2019.html
  • 5. REFERENCES [1] J. Forlizzi and C. DiSalvo, “Service robots in the domestic environment,” in Proceeding of the 1st ACM SIGCHI/SIGART conference on Human-robot interaction - HRI ’06, 2006, p. 258. [2] J. Bodner, H. Wykypiel, G. Wetscher, and T. Schmid, “First experiences with the da VinciTM operating robot in thoracic surgery☆,” Eur. J. Cardio-Thoracic Surg., vol. 25, no. 5, pp. 844– 851, May 2004. [3] M. J. Micire, “Evolution and field performance of a rescue robot,” J. F. Robot., vol. 25, no. 1–2, pp. 17–30, Jan. 2008. [4] F. Mondada et al., “The e-puck , a Robot Designed for Education in Engineering,” in Robotics, 2009, vol. 1, no. 1, pp. 59–65. [5] K. Wakita, J. Huang, P. Di, K. Sekiyama, and T. Fukuda, “Human-Walking-Intention-Based Motion Control of an Omnidirectional-Type Cane Robot,” IEEE/ASME Trans. Mechatronics, vol. 18, no. 1, pp. 285–296, Feb. 2013. [6] K. Sakita, K. Ogawam, S. Murakami, K. Kawamura, and K. Ikeuchi, “Flexible cooperation between human and robot by interpreting human intention from gaze information,” in 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (IEEE Cat. No.04CH37566), 2004, vol. 1, pp. 846–851. [7] Z. Wang, A. Peer, and M. Buss, “An HMM approach to realistic haptic human-robot interaction,” in World Haptics 2009 - Third Joint EuroHaptics conference and Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, 2009, pp. 374–379. [8] S. Kim, Z. Yu, J. Kim, A. Ojha, and M. Lee, “Human-Robot Interaction Using Intention Recognition,” in Proceedings of the 3rd International Conference on Human-Agent Interaction, 2015, pp. 299–302. [9] D. Song et al., “Predicting human intention in visual observations of hand/object interactions,” in 2013 IEEE International Conference on Robotics and Automation, 2013, pp. 1608–1615. [10] D. Vasquez, T. Fraichard, O. Aycard, and C. Laugier, “Intentional motion on-line learning and prediction,” Mach. Vis. Appl., vol. 19, no. 5–6, pp. 411–425, Oct. 2008. [11] B. Ziebart, A. Dey, and J. A. Bagnell, “Probabilistic pointing target prediction via inverse optimal control,” in Proceedings of the 2012 ACM international conference on Intelligent User Interfaces - IUI ’12, 2012, p. 1.
  • 6. [12] Z. Wang et al., “Probabilistic movement modeling for intention inference in human–robot interaction,” Int. J. Rob. Res., vol. 32, no. 7, pp. 841–858, 201 [13] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, p. 436, 2015 [14] A. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar, and L. Fei-Fei, “Large-Scale Video Classification with Convolutional Neural Networks,” in 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014, pp. 1725–1732. [15] X. Wang, L. Gao, P. Wang, X. Sun, and X. Liu, “Two-Stream 3-D convNet Fusion for Action Recognition in Videos With Arbitrary Size and Length,” IEEE Trans. Multimed., vol. 20, no. 3, pp. 634–644, Mar. 2018. [16] P. Barros, C. Weber, and S. Wermter, “Emotional expression recognition with a cross-channel convolutional neural network for human-robot interaction,” in 2015 IEEE-RAS 15th International Conference on Humanoid Robots (Humanoids), 2015, pp. 582–587. [17] A. H. Qureshi, Y. Nakamura, Y. Yoshikawa, and H. Ishiguro, “Show, attend and interact: Perceivable human-robot social interaction through neural attention Q-network,” in 2017 IEEE International Conference on Robotics and Automation (ICRA), 2017, pp. 1639–1645. [18] L. Zhang, X. Diao, and O. Ma, “A Preliminary Study on a Robot’s Prediction of Human Intention,” 7th Annu. IEEE Int. Conf. CYBER Technol. Autom. Control. Intell. Syst., pp. 1446– 1450, 2017. [19] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet Classification with Deep Convolutional Neural Networks,” Adv. Neural Inf. Process. Syst. (NIPS 2012), p. 4, 2012. [20] J. Shotton et al., “Real-time human pose recognition in parts from single depth images,” in CVPR 2011, 2011, vol. 411, pp. 1297–1304. [21] F. Pedregosa et al., “Scikit-learn: Machine Learning in Pythons,” J. Mach. Learn. Res., vol. 12, no. 6, pp. 2825–2830, May 2011. [22] M. Abadi et al., “TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems,” 2016. [23] S. Li, L. Zhang, and X. Diao, “Improving Human Intention Prediction Using Data Augmentation,” in HRI 2018 WORKSHOP ON SOCIAL HUMAN ROBOT INTERACTION OF HUMAN-CARE SERVICE ROBOTS, 2018.
  • 7. [24] J. Donahue et al., “Long-term recurrent convolutional networks for visual recognition and description,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 2625–2634. [25] K. Simonyan and A. Zisserman, “Very Deep Convolutional Networks for Large-Scale Image Recognition,” Inf. Softw. Technol., vol. 51, no. 4, pp. 769–784, Sep. 2014. [26] C. Szegedy, S. Ioffe, V. Vanhoucke, and A. Alemi, “Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning,” Pattern Recognit. Lett., vol. 42, pp. 11–24, Feb. 2016 [27] P. Munya, C. A. Ntuen, E. H. Park, and J. H. Kim, “A BAYESIAN ABDUCTION MODEL FOR EXTRACTING THE MOST PROBABLE EVIDENCE TO SUPPORT SENSEMAKING,” Int. J. Artif. Intell. Appl., vol. 6, no. 1, p. 1, 2015. [28] J. A. Morales and D. Akopian, “Human activity tracking by mobile phones through hebbian learning,” Int. J. Artif. Intell. Appl., vol. 7, no. 6, pp. 1–16, 2016. [29] C. Lee and M. Jung, “PREDICTING MOVIE SUCCESS FROM SEARCH QUERY USING SUPPORT VECTOR REGRESSION METHOD,” Int. J. Artif. Intell. Appl. (IJAIA)., vol. 7, no. 1,2016.
  • 8. A SURVEY ON DIFFERENT MACHINE LEARNING ALGORITHMS AND WEAK CLASSIFIERS BASED ON KDD AND NSL-KDD DATASETS Rama Devi Ravipati1 and Munther Abualkibash2 1 Graduate student in the Department of Computer Science, Eastern Michigan University, Ypsilanti, Michigan 2 School of Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan ABSTRACT Network intrusion detection often finds a difficulty in creating classifiers that could handle unequal distributed attack categories. Generally, attacks such as Remote to Local (R2L) and User to Root (U2R) attacks are very rare attacks and even in KDD dataset, these attacks are only 2% of overall datasets. So, these result in model not able to efficiently learn the characteristics of rare categories and this will result in poor detection rates of rare attack categories like R2L and U2R attacks. We even compared the accuracy of KDD and NSL- KDD datasets using different classifiers in WEKA. KEYWORDS KDD, NSL-KDD, WEKA, AdaBoost, KNN, Detection rate, False alarm rate. For More Details: http://aircconline.com/ijaia/V10N3/10319ijaia01.pdf Volume Link: http://airccse.org/journal/ijaia/current2019.html
  • 9. REFERENCES [1] Brandon Lokesak (December 4, 2008). "A Comparison Between Signature Based and Anomaly Based Intrusion Detection Systems" (PPT). www.iup.edu. Douligeris, Christos; Serpanos, Dimitrios N. (2007-02-09). Network Security: Current Status and Future Directions. John Wiley & Sons. ISBN 9780470099735. [2] Rowayda, A. Sadek; M Sami, Soliman; Hagar, S Elsayed (November 2013). "Effective anomaly intrusion detection system based on neural network with indicator variable and rough set reduction". International Journal of Computer Science Issues (IJCSI). 10 (6). [3] M. A. Maloof, Machine learning and data mining for computer security: Springer, 2006. [4] J. M. Bonifacio, Jr., A. M. Cansian, A. C. P. L. F. De Carvalho, and E. S. Moreira, “Neural networks applied in intrusion detection systems,” in Proc. IEEE Int. Joint Conf. Neural Netw., 1998, vol. 1, pp. 205–210. [5] Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, TzongWann Kao, Rong-Jian Chen, Jui-Lin Lai, Citra Dwi Perkasa, A novel intrusion detection system based on hierarchical clustering and support vector machines, Journal of Expert systems with Applications, Vol. 38, 2011, 306- 313 [6] Cheng Xiang, Png Chin Yong, Lim Swee Meng, Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees, Journal of Pattern Recognition Letters, Vol. 29, 2008, 918-924. [7] Weiming Hu, Steve Maybank, “AdaBoost-Based Algorithm for Network Intrusion Detection”. In IEEE transaction on systems, MAN, and CYBERNETICS, APRIL 2008. [8] S. Sung, A.H. Mukkamala. “Identifying important features for intrusion detection using support vector machines and neural networks”. In Proceedings of the Symposium on Applications and the Internet (SAINT), pp. 209–216. IEEE . [9] H. Kayacik, A. Zincir-Heywood and M. Heywood. “Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets”. In Proceedings of the Third Annual Conference on Privacy, Security and Trust (PST). 2005. [10] C. Lee, S. Shin and J. Chung. “Network intrusion detection through genetic feature selection”. In Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD), pp. 109–114. IEEE Computer Society,2006.
  • 10. [11] M. Panda, M.R. Patra, “Semi-Naïve Bayesian method for network intrusion detection system”, Neural information processing, Lecture Notes in Computer Science (Springer Link) 5863 (2009) 614–621. [12] Sandeep Gurung, Mirnal Kanti Ghose, Aroj Subedi,"Deep Learning Approach on Network Intrusion Detection System using NSL-KDD Dataset", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.3, pp.8-14, 2019.DOI: 10.5815/ijcnis.2019.03.02. [13] Jawhar, M. M. T., & Mehrotra, M. (2010). Design network intrusion detection system using hybrid fuzzy neural network. International JournalofComputerScience and Security, 4(3), 285- 294. [14] Souza, P. V. C. (2018). Regularized Fuzzy Neural Networks for Pattern Classification Problems. International Journal of Applied Engineering Research, 13(5), 2985-2991.
  • 11. ADAPTIVE LEARNING EXPERT SYSTEM FOR DIAGNOSIS AND MANAGEMENT OF VIRAL HEPATITIS Henok Yared Agizew Department of Management Information System, Mettu University, Mettu, Ethiopia. ABSTRACT Viral hepatitis is the regularly found health problem throughout the world among other easily transmitted diseases, such as tuberculosis, human immune virus, malaria and so on. Among all hepatitis viruses, the uppermost numbers of deaths are result from the long-lasting hepatitis C infection or long-lasting hepatitis B. In order to develop this system, the knowledge is acquired using both structured and semi-structured interviews from internists of St.Paul Hospital. Once the knowledge is acquired, it is modeled and represented using rule based reasoning techniques. Both forward and backward chaining is used to infer the rules and provide appropriate advices in the developed expert system. For the purpose of developing the prototype expert system SWI-prolog editor also used. The proposed system has the ability to adapt with dynamic knowledge by generalizing rules and discover new rules through learning the newly arrived knowledge from domain experts adaptively without any help from the knowledge engineer. KEYWORDS Expert System, Diagnosis and Management of Viral Hepatitis, Adaptive Learning, Discovery and Generalization Mechanism. For More Details: http://aircconline.com/ijaia/V10N2/10219ijaia04.pdf Volume Link: http://airccse.org/journal/ijaia/current2019.html
  • 12. REFERENCES [1] Amanuel, A. (2016).”Self Learning Computer Troubleshooting Expert System.” International Journal of Artificial Intelligence & Applications (IJAIA). 7(1), pp.45-58. [2] Blaxton, T.A & Kushner, B.G. (1986). “An Organizational Framework for Comparing Adaptive Artificial Intelligence Systems.” ACM Fall Joint Computer Conference, 3(2):190-199 [3] Clair, D. C., Bond, W. E., Flachsbart, B. B., and Vigland, A. R. (1987). “An Architecture for Adaptive Learning in Rule-Based Diagnostic Expert Systems.” Proceedings of the Fall Joint Computer Conference, IEEE Computer Society. pp. 678-685. [4] Dhiman, RK. (2018). National Guidelines for Diagnosis & Management of Viral Hepatitis, National Health Mission, India. [5] Dipanwita, Biswas, Sagar Bairagi, Neelam Panse & Nirmala Shinde. (2011). Disease Diagnosis System. International Journal of Computer Science & Informatics, 1(2):48-51. [6] Durkin. J. (1996). Expert Systems: A View of the Future. IEEE Expert, University of Akron, 56- 63. [7] Heijst.(2006).“Conceptual Modelling for Knowledge-Based Systems.” Encyclopedia of Computer Science and Technology, Marce Dekker Inc., New York. [8] Malhotra.(june, 2015) “Evolution of Knowledge Representation and Retrieval Techniques.” I.J. Intelligent Systems and Applications. [online]. 2015 (7), pp. 18-28. [9] Paulo,V and Augusto,J. (2018). “Using fuzzy neural networks for improving the prediction of children with autism through mobile devices.” ISCC 2018 Workshops - ICTS4eHealth 1570446039. Available: https://www.researchgate.net/publication/329033556.[Nov., 2018]. [10] Sajja, P., & Akerkar, R. (2010). Knowledge-Based Systems for Development. In P. Sajja, & R. Akerkar, Advanced Knowledge Based Systems: Model, Applications & Research, 1(1):1 – 11. [11] Seblewongel, E. (2011). “Prototype knowledge based system for anxiety mental disorder diagnosis.” Master’s Thesis, Addis Abeba University, Addis Abeba, Ethiopia.
  • 13. [12] Solomon, G. (2013). “A self-learning knowledge based system for diagnosis and treatment of diabetes.” Master’s Thesis, Addis Abeba University, Addis Abeba, Ethiopia. [13] Tesfamariam, M. A. (2015). Integrating Data Mining Results with the Knowledge Based for Diagnosis and Treatment of Visceral Leishmaniasis. Master’s Thesis, University of Gonder, Gonder, Ethiopia. [14] World Health Organization,(2013). Global health impact report of viral hepatitis. [15] World Health Organization,(2017). “Prevention, Care and Treatment of Viral Hepatitis in the African Region: Framework for Action,2016-2020 Regional Office for Africa.”
  • 14. EFFICIENT POWER THEFT DETECTION FOR RESIDENTIAL CONSUMERS USING MEAN SHIFT DATA MINING KNOWLEDGE DISCOVERY PROCESS Blazakis Konstantinos1 and Stavrakakis Georgios2 1 School of Electrical and Computer Engineering, Technical University of Crete, Greece 2 School of Electrical and Computer Engineering, Technical University of Crete, Greece ABSTRACT Energy theft constitutes an issue of great importance for electricity operators. The attempt to detect and reduce non-technical losses is a challenging task due to insufficient inspection methods. With the evolution of advanced metering infrastructure (AMI) in smart grids, a more complicated status quo in energy theft has emerged and many new technologies are being adopted to solve the problem. In order to identify illegal residential consumers, a computational method of analyzing and identifying electricity consumption patterns of consumers based on data mining techniques has been presented. Combining principal component analysis (PCA) with mean shift algorithm for different power theft scenarios, we can now cope with the power theft detection problem sufficiently. The overall research has shown encouraging results in residential consumers power theft detection that will help utilities to improve the reliability, security and operation of power network. KEYWORDS Data mining, Mean Shift clustering algorithm, Principal Component Analysis (PCA), Density-Based Spatial Clustering of Applications with Noise (DBSCAN), Non-Technical Losses (NTLs), power theft, smart grid, smart electricity metering For More Details: http://aircconline.com/ijaia/V10N1/10119ijaia06.pdf Volume Link: http://airccse.org/journal/ijaia/current2019.html
  • 15. REFERENCES [1] A. K. Gupta, A. Mukherjee, A. Routray and R. Biswas, "A novel power theft detection algorithm for low voltage distribution network," IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, 2017, pp. 3603-3608. Doi: 10.1109/IECON.2017.8216611. [2] Jokar, Paria, Nasim Arianpoo, and Victor CM Leung. "Electricity theft detection in AMI using customers’ consumption patterns." IEEE Trans. on Smart Grid Vol. 7, No. 1, January 2016. [3] Nunoo, Solomon, and joseph c. Attachie. "A methodology for the design of an electricity theft monitoring system." journal of theoretical & applied information technology 26.2 (2011). [4] Jiang, R., Lu, R., Wang, Y., Luo, J., Shen, C., & Shen, X. S. (2014). Energy-theft detection issues for advanced metering infrastructure in smart grid. Tsinghua Science and Technology, pp 105-120 Volume 19, Number 2, April 2014. [5] Blazakis, K., Davarzani, S., Stavrakakis, G., & Pisica, I. (2016). Lessons learnt from mining meter data of residential consumers. Periodica Polytechnica. Electrical Engineering and Computer Science, 60(4), 266. [6] LEWIS, Fabian B. Costly ‘Throw-Ups’: Electricity Theft and Power Disruptions. The Electricity Journal, 2015, 28.7: 118-135. [7] P. Antmann, Reducing technical and non-technical losses in the power sector,in: Background Paper for the WBG Energy Strategy, Tech. Rep., Washington,DC, USA: The World Bank, 2009, n.d. [8] Depuru, Soma Shekara Sreenadh Reddy. Modeling, detection, and prevention of electricity theft for enhanced performance and security of power grid. The University of Toledo, 2012. [9] Prasad, Jagdish, and Ravi Samikannu. "Overview, issues and prevention of energy theft in smart grids and virtual power plants in Indian context." Energy Policy 110 (2017): 365-374. [10] Nunoo, Solomon, and Joseph C. Attachie. "A methodology for the design of an electricity theft monitoring system." Journal of Theoretical & Applied Information Technology 26.2 (2011). [11] Carreira-Perpinán, Miguel A. "A review of mean-shift algorithms for clustering." arXiv preprint arXiv:1503.00687 (2015). [12] Isqeel, Abdullateef Ayodele, Salami Momoh-Jimoh Eyiomika, and Tijani Bayo Ismaeel. "Consumer Load Prediction Based on NARX for Electricity Theft Detection." Computer and Communication Engineering (ICCCE), 2016 International Conference on. IEEE, 2016.
  • 16. [13] A. Nizar, Z. Y. Dong, and P. Zhang, “Detection rules for non technical losses analysis in power utilities,” in Proc. IEEE PowerEnergy Soc.Gen. Meeting, 2008, pp. 1–8. [14] J. Cabral, J. Pinto, and A. Pinto, “Fraud detection system for highand low voltage electricity consumers based on data mining,” in Proc. Power Energy Soc. Gen. Meeting, Jul. 2009, pp. 1– 5. [15] Chandel, Priyamvada, et al. "Power theft: Major cause of non technical losses in Indian distribution sector." Power India International Conference (PIICON), 2016 IEEE 7th. IEEE, 2016. [16] Nagi, J., Yap, K. S., Tiong, S. K., Ahmed, S. K., & Mohamad, M. (2010). Nontechnical loss detection for metered customers in power utility using support vector machines. IEEE transactions on Power Delivery, 25(2), 1162-1171. [17] Viegas, Joaquim L., et al. "Solutions for detection of non-technical losses in the electricity grid: A review." Renewable and Sustainable Energy Reviews 80 (2017): 1256-1268. [18] Messinis, George M., and Nikos D. Hatziargyriou. "Review of non-technical loss detection methods." Electric Power Systems Research 158 (2018): 250-266. [19] P. Glauner, J. Meira, P. Valtchev, R. State and F. Bettinger, "The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey", International Journal of Computational Intelligence Systems (IJCIS), vol. 10, issue 1, pp. 760-775, 2017. [20] P. Glauner, N. Dahringer, O. Puhachov, J. Meira, P. Valtchev, R. State and D. Duarte, "Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations", Proceedings of the 17th IEEE International Conference on Data Mining Workshops (ICDMW 2017), New Orleans, USA, 2017. [21] Nagi, J., Yap, K. S., Tiong, S. K., Ahmed, S. K., & Mohammad, A. M. (2008, November). Detection of abnormalities and electricity theft using genetic support vector machines. In TENCON 2008-2008 IEEE Region 10 Conference (pp. 1-6). IEEE. [22] Nagi, J., Mohammad, A. M., Yap, K. S., Tiong, S. K., & Ahmed, S. K. (2008, December). Nontechnical loss analysis for detection of electricity theft using support vector machines. In Power and Energy Conference, 2008. PECon 2008. IEEE 2nd International (pp. 907-912). IEEE.
  • 17. [23] Buzau, Madalina-Mihaela, et al. "Detection of Non-Technical Losses Using Smart Meter Data and Supervised Learning." IEEE Transactions on Smart Grid (2018). [24] Cheng, J., Ren, R., Wang, L., & Zhan, J. (2017). Deep Convolutional Neural Networks for Anomaly Event Classification on Distributed Systems. arXiv preprint arXiv:1710.09052. [25] Monedero, Iñigo, et al. "Detection of frauds and other non-technical losses in a power utility using Pearson coefficient, Bayesian networks and decision trees." International Journal of Electrical Power & Energy Systems 34.1 (2012): 90-98. [26] Nizar, A. H., Z. Y. Dong, and Y. Wang. "Power utility nontechnical loss analysis with extreme learning machine method." IEEE Transactions on Power Systems 23.3 (2008): 946-955. [27] Ramos, C. C. O., de Sousa, A. N., Papa, J. P., & Falcao, A. X. (2011). A new approach for nontechnical losses detection based on optimum-path forest. IEEE Transactions on Power Systems, 26(1), 181-189. [28] Angelos, E. W. S., Saavedra, O. R., Cortés, O. A. C., & de Souza, A. N. (2011). Detection and identification of abnormalities in customer consumptions in power distribution systems. IEEE Transactions on Power Delivery, 26(4), 2436-2442. [29] Rossoni, A., Braunstein, S. H., Trevizan, R. D., Bretas, A. S., & Bretas, N. G. (2016, July). Smart distribution power losses estimation: A hybrid state estimation approach. In Power and Energy Society General Meeting (PESGM), 2016 (pp. 1-5). IEEE. [30] Bhat, R. R., Trevizan, R. D., Sengupta, R., Li, X., & Bretas, A. (2016, December). Identifying Nontechnical Power Loss via Spatial and Temporal Deep Learning. In Machine Learning and Applications (ICMLA), 2016 15th IEEE International Conference on (pp. 272-279). IEEE. [31] Zheng, Zibin, et al. "Wide & Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids." IEEE Transactions on Vehicular Technology 99 (2018): 1-1. [32] Wang, Yi, et al. "Deep Learning-Based Socio-demographic Information Identification from Smart Meter Data." IEEE Transactions on Smart Grid, Doi 10.1109/TSG.2018.2805723 (2018). [33] Jardini, J. A., Tahan, C. M., Gouvea, M. R., Ahn, S. U., & Figueiredo, F. M. (2000). Daily load profiles for residential, commercial and industrial low voltage consumers. IEEE Transactions on power delivery, 15(1), 375-380.
  • 18. [34] Gerbec, D., et al. "An approach to customers daily load profile determination" IEEE Power Engineering Society Summer Meeting, Chicago-USA, 21-25 July 2002, Vol.1. [35] Carreira-Perpinán, M. A. (2015). "A review of mean-shift algorithms for clustering". CRC Handbook of Cluster Analysis, edited by Roberto Rocci, Fionn Murtagh, Marina Meila and Christian Hennig. [36] Krishna, Varun Badrinath, Gabriel A. Weaver, and William H. Sanders. "PCA-based method for detecting integrity attacks on advanced metering infrastructure." International Conference on Quantitative Evaluation of Systems. Springer, Cham, 2015. [37] Krishna, Varun Badrinath, Carl Gunter, and William H. Sanders. "Evaluating Detectors on Optimal Attack Vectors that enable Electricity Theft and DER Fraud." IEEE Journal of Selected Topics in Signal Processing Vol. 12, No. 4, August 2018. [38] Krishna, Varun Badrinath, et al. "F-DETA: A framework for detecting electricity theft attacks in smart grids." Dependable Systems and Networks (DSN), 46th Annual IEEE/IFIP International Conference on. IEEE, 2016. [39] Costa, Breno C., et al. "Fraud detection in electric power distribution networks using an ANNbased knowledge-discovery process." International Journal of Artificial Intelligence & Applications, Vol. 4, No. 6, November 2013. [40] Jardini, J. A., Tahan, C. M., Gouvea, M. R., Ahn, S. U., & Figueiredo, F. M. (2000). Daily load profiles for residential, commercial and industrial low voltage consumers. IEEE Transactions on power delivery, 15(1), 375-380. [41] Capasso, A., Grattieri, W., Lamedica, R., & Prudenzi, A. (1994). A bottom-up approach to residential load modeling. IEEE Transactions on Power Systems, 9(2), 957-964. [42] Smith, Lindsay I. "A tutorial on principal components analysis", Cornell University, USA 51.52 (2002): 65. [43] Abdullah, Manal, Majda Wazzan, and Sahar Bo-Saeed. "Optimizing face recognition using PCA", International Journal of Artificial Intelligence & Applications (IJAIA), Vol.3, No.2, March 2012.
  • 19. [44] Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of KDD’96. vol. 96, pp. 226-231 (1996) [45] Al-khurayji, Raed, and Ahmed Sameh. "An Effective Arabic Text Classification Approach Based on Kernel Naive Bayes Classifier." International Journal of Artificial Intelligence Applications, Vol.8, No.6, November 2017. [46] Ali Akbar Ghasemi, Mohsen Gitizadeh. "Detection of illegal consumers using pattern classification approach combined with Levenberg-Marquardt method in smart grid", Electrical Power and Energy Systems 99 (2018) 363–375. AUTHORS Blazakis Konstantinos: Received his BSc degree in Applied Mathematical and Physical Sciences from N.T.U.A. (National Technical University of Athens) in 2010 and his MSc degree in Electrical and Computer Engineering from Technical University of Crete, Chania, Greece in 2015. Currently, he is a PhD candidate at Technical University of Crete. His areas of research include data mining, machine learning, smart grids, distributed electricity networks, renewable energy Stavrakakis Georgios: Received his first degree Diploma in Electrical Engineering from the N.T.U.A. (National Technical University of Athens), Athens, in 1980. His D.E.A. in Automatic Control and Systems Engineering was obtained from I.N.S.A., Toulouse, in 1981 and his Ph.D. in the same area was obtained from “Paul Sabatier-Toulouse III” University, Toulouse-France, in 1984. He has worked as a Research Fellow in the Robotics Laboratory of N.T.U.A. (1985-1988), and as a Visiting Scientist at the Institute for Systems Engineering and Informatics/Components Diagnostics & Reliability Sector of the Joint Research Center- EEC at Ispra, Italy (1989-1990). He was Vice President of the Hellenic Center for Renewable Energy Sources (CRES), Pikermi, Athens-Greece (2000-2002). He is currently a Full Professor at the Technical University of Crete, Chania, Greece.