Proceedings of the 2020 5th International Conference on Machine Learning Technologies最新文献

筛选
英文 中文
Solar Power Prediction in IoT Devices using Environmental and Location Factors 使用环境和位置因素的物联网设备中的太阳能预测
Arnan Mindang, P. Siripongwutikorn
{"title":"Solar Power Prediction in IoT Devices using Environmental and Location Factors","authors":"Arnan Mindang, P. Siripongwutikorn","doi":"10.1145/3409073.3409086","DOIUrl":"https://doi.org/10.1145/3409073.3409086","url":null,"abstract":"Energy-harvesting IoT nodes need to conserve their energy to remain operating without interrupting. By predicting input power supply, IoT nodes could appropriately schedule or adjust data transmission interval to match available energy for lasting operations. In this work, we explore the effectiveness of using environmental and location factors, including light intensity, temperature, humidity, facing directions of a solar panel, as well as historical input power data to help predicting the solar input power of IoT nodes. Various time series and machine learning models including EWMA, WCMA, SARIMAX, and LSTM are fitted, tuned, and compared to determine significant factors and best-performing model. Our results reveal that the facing direction has a significant impact on the input power generated and model hyperparameters. Among the models investigated, SARIMAX yields the lowest prediction errors around 11% - 26%.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126524165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation and Machine Learning based Thermal Modeling of Tilted Active Tiles in Data Centers 数据中心倾斜活动瓷砖的性能评估和基于机器学习的热建模
Z. Rasheed, Wei Xiong, Gaoxiang Cong, Hongxun Niu, Jianxiong Wan, Yongsheng Wang, Lixiao Li
{"title":"Performance Evaluation and Machine Learning based Thermal Modeling of Tilted Active Tiles in Data Centers","authors":"Z. Rasheed, Wei Xiong, Gaoxiang Cong, Hongxun Niu, Jianxiong Wan, Yongsheng Wang, Lixiao Li","doi":"10.1145/3409073.3409085","DOIUrl":"https://doi.org/10.1145/3409073.3409085","url":null,"abstract":"Thermal management system of data center continuously face a lot of challenges, because data center industry has seen a boom growth in power density. In this paper we proposed the Tilted Active Tiles (TATs) to improve the local cold air supply and prevent the air flow blow over the rack. In traditional active tiles, fans are placed horizontally which cause the airflow blows over the rack, rather than into, the racks. To solve this issue, we adjusted the angle of the active tile to direct the airflow into the rack. We further introduced ANN based thermal models to predict the thermal performance of TATs. To train the ANN models, we adopted the data set obtained from a data center of Inner Mongolia Meteorology Information Center. The prediction accuracy of the model was extensively compared and analyzed, and the prediction accuracy and overhead of different neural network structures, i.e., BP and LSTM, were evaluated. Experimental results show that the rack with blanking panels has better thermal performance, and the temperature distribution at bottom, middle and top of the rack were same under smaller PWM. Thermal efficiency model was established by BP and LSTM, in this experiment single output model and multi output model were analyzed. The single output model can predict the temperature at different heights on the rack. In single output model the predicted effect of BP model is better than LSTM. The average prediction error is 0.57. The multi-output model can only predict the temperature at a fixed height of the rack. In multi output model LSTM model is better than BP. LSTM prediction error is less than BP. The average prediction error is 0.07.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114390994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The use of machine learning methods for fast estimation of CO2-brine interfacial tension: A comparative study 使用机器学习方法快速估计co2 -盐水界面张力:比较研究
Jiyuan Zhang, Q. Feng, Xianmin Zhang
{"title":"The use of machine learning methods for fast estimation of CO2-brine interfacial tension: A comparative study","authors":"Jiyuan Zhang, Q. Feng, Xianmin Zhang","doi":"10.1145/3409073.3409095","DOIUrl":"https://doi.org/10.1145/3409073.3409095","url":null,"abstract":"The CO2-brine interfacial tension (IFT) is key to designing the CO2 injection into underground saline aquifers in order to reduce CO2 and slow global temperature increase. Laboratory measurement of CO2-brine IFT is usually time-consuming and requires an expensive experimental apparatus and sophisticated interpretation procedures. This paper presents comprehensive comparisons of nine state-of-the-art machine learning methods for fast estimation of CO2-brine IFT. Results show that: i) the extreme gradient boosting (XGBoost) and gradient boosting decision tree (GBDT) exhibit the strongest robustness and generalization capability, which can be applied for accurate and fast estimation of CO2-brine IFT in practice; ii) the Gaussian process regression (GPR) is associated with the issue of overfitting and therefore may not be reliable for further application; and iii) the other six methods (support vector machine, multi-player perception, kernel ridge regression, classifier and regression tree, random forest, Adaboost) have comparable accuracies in predicting the \"unseen\" data although noticeable variations in the correlation accuracies are observed for different methods in the training stage.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124064491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An artificial immune based dynamic forensics model for distributed anonymous network 基于人工免疫的分布式匿名网络动态取证模型
H. Deng, Tao Yang
{"title":"An artificial immune based dynamic forensics model for distributed anonymous network","authors":"H. Deng, Tao Yang","doi":"10.1145/3409073.3409088","DOIUrl":"https://doi.org/10.1145/3409073.3409088","url":null,"abstract":"The success of blockchain technology makes more and more applications begin to use distributed anonymous network. However, the decentralized, anonymous, and distributed features of the distributed anonymous network also create conditions for many illegal activities, such as fraud, illegal transactions, money theft and money laundering. The traditional computer forensics models work under a static and passive way which not suitable for the distributed anonymous network. In this case, this paper introduces a new dynamic computer forensics model based on artificial immune (DCFMAI). In DCFMAI, the antigen, antibody and the formal of the evidence data are defined, and the evolutionary process of immune tolerance, antibody memory, antibody expansion and dynamic forensics are established. By generating immune antibodies, DCFMAI can dynamically collet evidence data during an attack or abnormal transaction. And then, by utilizing the immune response information between the peers, DCFMAI can reconstruct the evidence chain and trace the illegal users' real IP address.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128182820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Application of Computer War Chess Technology in the Support of Military Supplies 论计算机战棋技术在军品保障中的应用
Chenggong Zhai, Yong Kang, Min Luo
{"title":"On the Application of Computer War Chess Technology in the Support of Military Supplies","authors":"Chenggong Zhai, Yong Kang, Min Luo","doi":"10.1145/3409073.3409081","DOIUrl":"https://doi.org/10.1145/3409073.3409081","url":null,"abstract":"This paper introduces the concept of computer war chess system and the JTLS war chess system of the U.S. Army. Starting from the application of the current war chess system in the military demand, it puts forward the concept of the war chess simulation system of material support in the battlefield. It provides decision-making tools and data support for decision-makers to prepare for military struggle and non war military operations, and provides useful support for improving the effect of military supply support.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115247421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meta Learning for Few-Shot Joint Intent Detection and Slot-Filling 基于元学习的少射联合意图检测和缝隙填充
H. S. Bhathiya, Uthayasanker Thayasivam
{"title":"Meta Learning for Few-Shot Joint Intent Detection and Slot-Filling","authors":"H. S. Bhathiya, Uthayasanker Thayasivam","doi":"10.1145/3409073.3409090","DOIUrl":"https://doi.org/10.1145/3409073.3409090","url":null,"abstract":"Intent detection and slot filling are the two main tasks in natural language understanding module in goal oriented conversational agents. Models which optimize these two objectives simultaneously within a single network (joint models) have proven themselves to be superior to mono-objective networks. However, these data-intensive deep learning approaches have not been successful in catering the demand of the industry for adaptable, multilingual dialogue systems. To this end, we cast joint intent detection as an n-way k-shot classification problem and establish it within meta learning setup. Our approach is motivated by the success of meta learning on few-shot image classification tasks. We empirically demonstrate that, our approach can meta-learn a prior from similar tasks under highly resource constrained settings which enable rapid inference on target tasks. First, we show the adaptability of proposed approach by meta learning n-way k-shot joint intent detection using set of intents and evaluating on a completely new set of intents. Second, we exemplify the cross-lingual adaptability by learning a prior, utilizing English utterances and evaluating on Spanish and Thai utterances. Compared to random initialization, our method significantly improves the accuracy in both intent detection and slot-filling.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125771251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Competence of Graph Convolutional Networks for Anti-Money Laundering in Bitcoin Blockchain 图卷积网络在比特币区块链反洗钱中的能力
Ismail Alarab, S. Prakoonwit, Mohamed Ikbal Nacer
{"title":"Competence of Graph Convolutional Networks for Anti-Money Laundering in Bitcoin Blockchain","authors":"Ismail Alarab, S. Prakoonwit, Mohamed Ikbal Nacer","doi":"10.1145/3409073.3409080","DOIUrl":"https://doi.org/10.1145/3409073.3409080","url":null,"abstract":"Graph networks are extensively used as an essential framework to analyse the interconnections between transactions and capture illicit behaviour in Bitcoin blockchain. Due to the complexity of Bitcoin transaction graph, the prediction of illicit transactions has become a challenging problem to unveil illicit services over the network. Graph Convolutional Network, a graph neural network based spectral approach, has recently emerged and gained much attention regarding graph-structured data. Previous research has highlighted the degraded performance of the latter approach to predict illicit transactions using, a Bitcoin transaction graph, so-called Elliptic data derived from Bitcoin blockchain. Motivated by the previous work, we seek to explore graph convolutions in a novel way. For this purpose, we present a novel approach that is modelled using the existing Graph Convolutional Network intertwined with linear layers. Concisely, we concatenate node embeddings obtained from graph convolutional layers with a single hidden layer derived from the linear transformation of the node feature matrix and followed by Multi-layer Perceptron. Our approach is evaluated using Elliptic data, wherein efficient accuracy is yielded. The proposed approach outperforms the original work of same data set.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122080849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Application of virtual machine in Quartermaster training 虚拟机在军需官训练中的应用
Chenggong Zhai, Zhaofan Yang, X. Lin
{"title":"Application of virtual machine in Quartermaster training","authors":"Chenggong Zhai, Zhaofan Yang, X. Lin","doi":"10.1145/3409073.3409082","DOIUrl":"https://doi.org/10.1145/3409073.3409082","url":null,"abstract":"With the progress and development of technology, virtual machine gradually appears in people's vision and is widely used in various fields. Based on the analysis of a series of problems in Quartermaster training, this paper puts forward a comprehensive application of virtual machine technology in Quartermaster training, and puts forward some matters needing attention in application.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129592426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method for Detecting Android Malware Based on Ensemble Learning 基于集成学习的Android恶意软件检测方法
Deng Congyi, S. Guangshun
{"title":"Method for Detecting Android Malware Based on Ensemble Learning","authors":"Deng Congyi, S. Guangshun","doi":"10.1145/3409073.3409084","DOIUrl":"https://doi.org/10.1145/3409073.3409084","url":null,"abstract":"In recent years, we have become increasingly dependent on smart devices. Android is an operating system mainly used on mobile devices, where hundreds of millions of users can download various apps through many application stores. Under these circumstances, a large number of malicious apps can be put into the application stores by developers to achieve the purpose of attacking, controlling user devices, and even stealing user information and property. Therefore, it is necessary to identify malwares in mass apps through analysis and detection to remind users. We propose an idea of detecting and discriminating Android malware based on an ensemble learning method. Firstly, a static analysis of AndroidManifest file in APK is performed to extract features such as permission calls, component calls, and intents in system. Then we use XGBoost method, an implementation of ensemble learning, to detect malicious applications. The conclusion is that this system performs very well in Android malware detection.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132273102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Trajectory-based Deep Sequential Method for Customer Churn Prediction 基于轨迹的客户流失深度序列预测方法
B. Zhu, Cheng Qian, Xin Pan, Hao Chen
{"title":"A Trajectory-based Deep Sequential Method for Customer Churn Prediction","authors":"B. Zhu, Cheng Qian, Xin Pan, Hao Chen","doi":"10.1145/3409073.3409083","DOIUrl":"https://doi.org/10.1145/3409073.3409083","url":null,"abstract":"Customer churn prediction is a pivotal issue in business marketing. Many researches have been pursuing more efficient features and techniques for it. Rapid growth of mobile Internet devices has generated large amounts of customer trajectory data, which contains abundant customer behavior patterns and contributes to many business actions. In this paper we propose a trajectory-based deep sequential method called TR-LSTM for customer churn prediction to mining the customer behavior pattern behind trajectory data. The method extracts three types of trajectory-based features and applied the long short-term memory neural network (LSTM) to conduct sequential modeling. Experimental results on real-world customer trajectory data sets demonstrate that the proposed TR-LSTM obtains better performance than all baseline methods. Our method provides a new tool of churn prediction for both academics and practitioners.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130256021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信