Usually, the fraud detection method in utility companies uses the consumption information, the economic activity, the geographic location, the active/reactive ration and the contracted power. This paper proposes a com...
详细信息
ISBN:
(纸本)9781424457939
Usually, the fraud detection method in utility companies uses the consumption information, the economic activity, the geographic location, the active/reactive ration and the contracted power. This paper proposes a combined text mining and neural networks to increase the efficiency in Non-Technical Losses (NTLs) detection methods which was previously applied. This proposed framework proposes to collect all the information that normally cannot be treated with traditional methods. This framework is part of a research project. This project is done in collaboration with Endesa, one of the most important power distribution companies of Europe. Currently, the proposed framework is in the test stage and it uses real cases.
The problem of selecting the patterns to be learned by any model is usually not considered by the time of designing the concrete model but as a preprocessing step. Information theory provides a robust theoretical fram...
详细信息
ISBN:
(纸本)2930307099
The problem of selecting the patterns to be learned by any model is usually not considered by the time of designing the concrete model but as a preprocessing step. Information theory provides a robust theoretical framework for performing input variable selection thanks to the concept of mutual information. Recently the computation of the mutual information for regression tasks has been proposed so this paper presents a new application of the concept of mutual information not to select the variables but to decide which prototypes should belong to the training data set in regression problems. The proposed methodology consists in deciding if a prototype should belong or not to the training set using as criteria the estimation of the mutual information between the variables. The novelty of the approach is to focus in prototype selection for regression problems instead of classification as the majority of the literature deals only with the last one. Other element that distinguishes this work from others is that it is not proposed as an outlier identificator but as an algorithm that determines the best subset of input vectors by the time of building a model to approximate it. As the experiment section shows, this new method is able to identify a high percentage of the real data set when it is applied to a highly distorted data sets.
This paper presents a methodology named Optimally Pruned K-Nearest Neighbors (OP-KNNs) which has the advantage of competing with state-of-the-art methods while remaining fast. It builds a one hidden-layer feedforward ...
This paper presents a methodology named Optimally Pruned K-Nearest Neighbors (OP-KNNs) which has the advantage of competing with state-of-the-art methods while remaining fast. It builds a one hidden-layer feedforward neural network using K-Nearest Neighbors as kernels to perform regression. Multiresponse Sparse Regression (MRSR) is used in order to rank each k th nearest neighbor and finally Leave-One-Out estimation is used to select the optimal number of neighbors and to estimate the generalization performances. Since computational time of this method is small, this paper presents a strategy using OP-KNN to perform Variable Selection which is tested successfully on eight real-life data sets from different application fields. In summary, the most significant characteristic of this method is that it provides good performance and a comparatively simple model at extremely high-learning speed.
This year, the 3rd ACM International Workshop on Context-Awareness for Self-Managing Systems (Devices, Applications and Networks) (CASEMANS 2009) is organized in Nara, Japan. This article summarizes the objectives of ...
ISBN:
(纸本)9781605584393
This year, the 3rd ACM International Workshop on Context-Awareness for Self-Managing Systems (Devices, Applications and Networks) (CASEMANS 2009) is organized in Nara, Japan. This article summarizes the objectives of the CASE-MANS 2009 workshop and gives an overview of the papers that are selected for presentation and publication. Copyright 2009 ACM.
The development of intelligent environments is considered an important step toward the realization of the ambient intelligence vision. Intelligent environments are technologically augmented everyday spaces that intuit...
详细信息
In this paper, we propose a new synthetic aperture radar (SAR) image segmentation scheme. Firstly, the SAR image is over-segmented using the mean shift (MS) algorithm while the original image discontinuity characteris...
详细信息
When the strain tensor, the scalar damage quantity and the Laplacian thereof serve as the state variables of Helmholtz free energy, the general expressions of elasticity-gradient damage constitutive equations are deri...
详细信息
Advances in FPGA technologies allow designing highly complex systems using on-chip FPGA resources and intellectual property (IP) cores. Furthermore, it is possible to build multiprocessor systems using hard-core or so...
详细信息
Advances in FPGA technologies allow designing highly complex systems using on-chip FPGA resources and intellectual property (IP) cores. Furthermore, it is possible to build multiprocessor systems using hard-core or soft-core processors, increasing the range of applications that can be implemented on an FPGA. In this paper we propose a symmetric multiprocessor architecture using the Microblace soft-core processor, and the operating system support needed for running multithreaded applications. Four systems with different shared memory configurations have been implemented on FPGA and tested with parallel applications to show its performance.
Video-on-demand (VOD) is a service that allows users to view any video program from a server at the time of their choice, such kind of services are expected to be popular in future ubiquitous computing environment. Lo...
详细信息
To scale with the on-chip wire delay, the inside of a processor will further be partitioned into more small banks. As the amount of data cache bank scales, the load routing latency will contribute a considerable porti...
详细信息
To scale with the on-chip wire delay, the inside of a processor will further be partitioned into more small banks. As the amount of data cache bank scales, the load routing latency will contribute a considerable portion to program executing time. In a tiled processor like T-Flex, we observed that the average load routing latency (hit in data cache) can be largely reduced (by 72.1%) when data is perfectly placed in where the load issues. To reduce the long routing latency of critical loads, we give out a solution for localizing load execution at issuing side in this paper. However, this method will induce overhead of data copies and extra communications to maintain coherence and memory order. We explore the design space for localizing data access, with special respect to maximizing benefits at expense of relatively small overhead. We observed the access frequency and load store behaviors for different copies vary largely, with large amount of successive load accesses concentrating on small amount of data blocks. Our experiments show that with special replication and data copy invalidation strategies, copying overhead will be controlled while maintaining considerable performance profits.
暂无评论