{"title":"Solar Power Prediction in IoT Devices using Environmental and Location Factors","authors":"Arnan Mindang, P. Siripongwutikorn","doi":"10.1145/3409073.3409086","DOIUrl":"https://doi.org/10.1145/3409073.3409086","url":null,"abstract":"Energy-harvesting IoT nodes need to conserve their energy to remain operating without interrupting. By predicting input power supply, IoT nodes could appropriately schedule or adjust data transmission interval to match available energy for lasting operations. In this work, we explore the effectiveness of using environmental and location factors, including light intensity, temperature, humidity, facing directions of a solar panel, as well as historical input power data to help predicting the solar input power of IoT nodes. Various time series and machine learning models including EWMA, WCMA, SARIMAX, and LSTM are fitted, tuned, and compared to determine significant factors and best-performing model. Our results reveal that the facing direction has a significant impact on the input power generated and model hyperparameters. Among the models investigated, SARIMAX yields the lowest prediction errors around 11% - 26%.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126524165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Rasheed, Wei Xiong, Gaoxiang Cong, Hongxun Niu, Jianxiong Wan, Yongsheng Wang, Lixiao Li
{"title":"Performance Evaluation and Machine Learning based Thermal Modeling of Tilted Active Tiles in Data Centers","authors":"Z. Rasheed, Wei Xiong, Gaoxiang Cong, Hongxun Niu, Jianxiong Wan, Yongsheng Wang, Lixiao Li","doi":"10.1145/3409073.3409085","DOIUrl":"https://doi.org/10.1145/3409073.3409085","url":null,"abstract":"Thermal management system of data center continuously face a lot of challenges, because data center industry has seen a boom growth in power density. In this paper we proposed the Tilted Active Tiles (TATs) to improve the local cold air supply and prevent the air flow blow over the rack. In traditional active tiles, fans are placed horizontally which cause the airflow blows over the rack, rather than into, the racks. To solve this issue, we adjusted the angle of the active tile to direct the airflow into the rack. We further introduced ANN based thermal models to predict the thermal performance of TATs. To train the ANN models, we adopted the data set obtained from a data center of Inner Mongolia Meteorology Information Center. The prediction accuracy of the model was extensively compared and analyzed, and the prediction accuracy and overhead of different neural network structures, i.e., BP and LSTM, were evaluated. Experimental results show that the rack with blanking panels has better thermal performance, and the temperature distribution at bottom, middle and top of the rack were same under smaller PWM. Thermal efficiency model was established by BP and LSTM, in this experiment single output model and multi output model were analyzed. The single output model can predict the temperature at different heights on the rack. In single output model the predicted effect of BP model is better than LSTM. The average prediction error is 0.57. The multi-output model can only predict the temperature at a fixed height of the rack. In multi output model LSTM model is better than BP. LSTM prediction error is less than BP. The average prediction error is 0.07.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114390994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The use of machine learning methods for fast estimation of CO2-brine interfacial tension: A comparative study","authors":"Jiyuan Zhang, Q. Feng, Xianmin Zhang","doi":"10.1145/3409073.3409095","DOIUrl":"https://doi.org/10.1145/3409073.3409095","url":null,"abstract":"The CO2-brine interfacial tension (IFT) is key to designing the CO2 injection into underground saline aquifers in order to reduce CO2 and slow global temperature increase. Laboratory measurement of CO2-brine IFT is usually time-consuming and requires an expensive experimental apparatus and sophisticated interpretation procedures. This paper presents comprehensive comparisons of nine state-of-the-art machine learning methods for fast estimation of CO2-brine IFT. Results show that: i) the extreme gradient boosting (XGBoost) and gradient boosting decision tree (GBDT) exhibit the strongest robustness and generalization capability, which can be applied for accurate and fast estimation of CO2-brine IFT in practice; ii) the Gaussian process regression (GPR) is associated with the issue of overfitting and therefore may not be reliable for further application; and iii) the other six methods (support vector machine, multi-player perception, kernel ridge regression, classifier and regression tree, random forest, Adaboost) have comparable accuracies in predicting the \"unseen\" data although noticeable variations in the correlation accuracies are observed for different methods in the training stage.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124064491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An artificial immune based dynamic forensics model for distributed anonymous network","authors":"H. Deng, Tao Yang","doi":"10.1145/3409073.3409088","DOIUrl":"https://doi.org/10.1145/3409073.3409088","url":null,"abstract":"The success of blockchain technology makes more and more applications begin to use distributed anonymous network. However, the decentralized, anonymous, and distributed features of the distributed anonymous network also create conditions for many illegal activities, such as fraud, illegal transactions, money theft and money laundering. The traditional computer forensics models work under a static and passive way which not suitable for the distributed anonymous network. In this case, this paper introduces a new dynamic computer forensics model based on artificial immune (DCFMAI). In DCFMAI, the antigen, antibody and the formal of the evidence data are defined, and the evolutionary process of immune tolerance, antibody memory, antibody expansion and dynamic forensics are established. By generating immune antibodies, DCFMAI can dynamically collet evidence data during an attack or abnormal transaction. And then, by utilizing the immune response information between the peers, DCFMAI can reconstruct the evidence chain and trace the illegal users' real IP address.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128182820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Application of Computer War Chess Technology in the Support of Military Supplies","authors":"Chenggong Zhai, Yong Kang, Min Luo","doi":"10.1145/3409073.3409081","DOIUrl":"https://doi.org/10.1145/3409073.3409081","url":null,"abstract":"This paper introduces the concept of computer war chess system and the JTLS war chess system of the U.S. Army. Starting from the application of the current war chess system in the military demand, it puts forward the concept of the war chess simulation system of material support in the battlefield. It provides decision-making tools and data support for decision-makers to prepare for military struggle and non war military operations, and provides useful support for improving the effect of military supply support.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115247421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Meta Learning for Few-Shot Joint Intent Detection and Slot-Filling","authors":"H. S. Bhathiya, Uthayasanker Thayasivam","doi":"10.1145/3409073.3409090","DOIUrl":"https://doi.org/10.1145/3409073.3409090","url":null,"abstract":"Intent detection and slot filling are the two main tasks in natural language understanding module in goal oriented conversational agents. Models which optimize these two objectives simultaneously within a single network (joint models) have proven themselves to be superior to mono-objective networks. However, these data-intensive deep learning approaches have not been successful in catering the demand of the industry for adaptable, multilingual dialogue systems. To this end, we cast joint intent detection as an n-way k-shot classification problem and establish it within meta learning setup. Our approach is motivated by the success of meta learning on few-shot image classification tasks. We empirically demonstrate that, our approach can meta-learn a prior from similar tasks under highly resource constrained settings which enable rapid inference on target tasks. First, we show the adaptability of proposed approach by meta learning n-way k-shot joint intent detection using set of intents and evaluating on a completely new set of intents. Second, we exemplify the cross-lingual adaptability by learning a prior, utilizing English utterances and evaluating on Spanish and Thai utterances. Compared to random initialization, our method significantly improves the accuracy in both intent detection and slot-filling.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125771251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Competence of Graph Convolutional Networks for Anti-Money Laundering in Bitcoin Blockchain","authors":"Ismail Alarab, S. Prakoonwit, Mohamed Ikbal Nacer","doi":"10.1145/3409073.3409080","DOIUrl":"https://doi.org/10.1145/3409073.3409080","url":null,"abstract":"Graph networks are extensively used as an essential framework to analyse the interconnections between transactions and capture illicit behaviour in Bitcoin blockchain. Due to the complexity of Bitcoin transaction graph, the prediction of illicit transactions has become a challenging problem to unveil illicit services over the network. Graph Convolutional Network, a graph neural network based spectral approach, has recently emerged and gained much attention regarding graph-structured data. Previous research has highlighted the degraded performance of the latter approach to predict illicit transactions using, a Bitcoin transaction graph, so-called Elliptic data derived from Bitcoin blockchain. Motivated by the previous work, we seek to explore graph convolutions in a novel way. For this purpose, we present a novel approach that is modelled using the existing Graph Convolutional Network intertwined with linear layers. Concisely, we concatenate node embeddings obtained from graph convolutional layers with a single hidden layer derived from the linear transformation of the node feature matrix and followed by Multi-layer Perceptron. Our approach is evaluated using Elliptic data, wherein efficient accuracy is yielded. The proposed approach outperforms the original work of same data set.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122080849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of virtual machine in Quartermaster training","authors":"Chenggong Zhai, Zhaofan Yang, X. Lin","doi":"10.1145/3409073.3409082","DOIUrl":"https://doi.org/10.1145/3409073.3409082","url":null,"abstract":"With the progress and development of technology, virtual machine gradually appears in people's vision and is widely used in various fields. Based on the analysis of a series of problems in Quartermaster training, this paper puts forward a comprehensive application of virtual machine technology in Quartermaster training, and puts forward some matters needing attention in application.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129592426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method for Detecting Android Malware Based on Ensemble Learning","authors":"Deng Congyi, S. Guangshun","doi":"10.1145/3409073.3409084","DOIUrl":"https://doi.org/10.1145/3409073.3409084","url":null,"abstract":"In recent years, we have become increasingly dependent on smart devices. Android is an operating system mainly used on mobile devices, where hundreds of millions of users can download various apps through many application stores. Under these circumstances, a large number of malicious apps can be put into the application stores by developers to achieve the purpose of attacking, controlling user devices, and even stealing user information and property. Therefore, it is necessary to identify malwares in mass apps through analysis and detection to remind users. We propose an idea of detecting and discriminating Android malware based on an ensemble learning method. Firstly, a static analysis of AndroidManifest file in APK is performed to extract features such as permission calls, component calls, and intents in system. Then we use XGBoost method, an implementation of ensemble learning, to detect malicious applications. The conclusion is that this system performs very well in Android malware detection.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132273102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trajectory-based Deep Sequential Method for Customer Churn Prediction","authors":"B. Zhu, Cheng Qian, Xin Pan, Hao Chen","doi":"10.1145/3409073.3409083","DOIUrl":"https://doi.org/10.1145/3409073.3409083","url":null,"abstract":"Customer churn prediction is a pivotal issue in business marketing. Many researches have been pursuing more efficient features and techniques for it. Rapid growth of mobile Internet devices has generated large amounts of customer trajectory data, which contains abundant customer behavior patterns and contributes to many business actions. In this paper we propose a trajectory-based deep sequential method called TR-LSTM for customer churn prediction to mining the customer behavior pattern behind trajectory data. The method extracts three types of trajectory-based features and applied the long short-term memory neural network (LSTM) to conduct sequential modeling. Experimental results on real-world customer trajectory data sets demonstrate that the proposed TR-LSTM obtains better performance than all baseline methods. Our method provides a new tool of churn prediction for both academics and practitioners.","PeriodicalId":229746,"journal":{"name":"Proceedings of the 2020 5th International Conference on Machine Learning Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130256021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}