Accurate weekly electricity load prediction is of utmost importance for electricity providers to ensure uninterrupted power supply to customers. This study applies an Artificial Neural Network (ANN) to achieve precise...
Accurate weekly electricity load prediction is of utmost importance for electricity providers to ensure uninterrupted power supply to customers. This study applies an Artificial Neural Network (ANN) to achieve precise weekly electricity load prediction. The dataset used for the ANN model consists of three months’ worth of data, including daily workload profiles, holiday work profiles, temperature, and humidity. For model training, 90% of the data is utilized with the Levenberg-Marquardt algorithm, while the remaining 10% is used for testing. The Mean Average Percentage Error (MAPE) is employed as the error metric. Based on the test results, the weekly load prediction error rate using ANN is determined to be 1.78% based on the MAPE value.
Credit card use is becoming more and more commonplace every day. Financial organizations and credit card customers lose a lot of money because of complicated illegal transactions. Fraudsters constantly stay on top of ...
详细信息
Credit card use is becoming more and more commonplace every day. Financial organizations and credit card customers lose a lot of money because of complicated illegal transactions. Fraudsters constantly stay on top of new technology to quickly perpetrate fraud against customer transaction patterns. We analyze credit card transaction networks and identify suspicious patterns, such as transactions connected to multiple accounts or unusual transaction patterns, transactions made at unusual times, and to monitor credit card transactions in real-time and quickly identify suspicious transactions. TigerGraph is used to analyze data, display results on a dashboard, and send notifications via email. One meth’\ Vc 1``13-od commonly used in anomaly detection is to compare data values against the standard deviation. In this research, we explain the use of TigerGraph as a platform for anomaly detection above the standard deviation, as well as the use of the Louvain algorithm in finding merchant communities used by fraudsters. The data used in this study comes from Sparkov simulation data obtained from Kaggle. Our results show that by using TigerGraph, we managed to achieve a very high accuracy rate of 99.77%, precision 82.84%, recall 72.38%, and f1-score 77,26% in predicting transaction fraud on Sparkov simulation data. This is much better than the results reported in a paper that uses the supervised machine learning method with the AdaBoost algorithm which achieves the highest accuracy of 77%.
Exams are an important component of any educational program, including online education. In any test, there is a possibility of cheating, so its detection and prevention is important. This study aims to conduct an in-...
详细信息
ISBN:
(纸本)9781665474498
Exams are an important component of any educational program, including online education. In any test, there is a possibility of cheating, so its detection and prevention is important. This study aims to conduct an in-depth study of the online exam monitoring model approach based on facial recognition used to detect cheating. Based on the inclusion and exclusion criteria designed, 13 selected studies were obtained. From these studies, we conducted further analysis regarding the Face Detection Method, Face Recognition Method, Initial Feature, Behavior Analysis and Evaluation Metrics used in each study so as to provide answers to research questions. the most frequently used Face detection method was Viola-Jones with a presentation of 20%, then CNN and MTCNN with a total presentation of 21%. The most widely used face recognition method in selected studies is CNN and metrics Accuracy is one of the most frequently used evaluations with a percentage of 33%. While the features that are usually used to detect cheating during online exams include facial motion and head pose which occupies the first position. The second is eye movement, then multiple faces gaze estimation and facial expression is in third place. Other features that also play a role in analyzing cheating behavior are mouth detection, facial vector, landmark location, gesture and posture.
In general, public or private organizations or companies have used information-based technology as a support to improve business performance to be more effective and efficient in order to achieve a company’s business...
详细信息
In general, public or private organizations or companies have used information-based technology as a support to improve business performance to be more effective and efficient in order to achieve a company’s business goals. Given the large contribution of information technology in the application of hotel applications as a supporting information system, it is a vital system that must avoid risks that can hinder and cause harm to the hotel management business processes. Therefore, it is necessary to carry out risk management using the COBIT 5 framework to manage possible risks that may occur based on the APO12 (Manage Risk) domain. From the evaluation results of the data obtained through observation and interviews as well as the calculation of the results of the questionnaire based on 6 APO12 subdomains, the results of the risk management level capability assessment in hotel applications are still at level 3 or have reached the level of established process with the target to be achieved at level 4 resulting in a gap of 1 level. Based on the results obtained, it is necessary to propose recommendations that can be used by hotels in improving the application of information technology risk management so that in the future it can achieve the expected target level so that the APO12 level of capability can increase and become more optimal.
The rapid advancement of AI has led to the rise of Audio Deepfakes (AD), which pose serious ethical and security concerns by accurately mimicking human speech. This research addresses the urgent need for effective AD ...
详细信息
ISBN:
(数字)9798331517601
ISBN:
(纸本)9798331517618
The rapid advancement of AI has led to the rise of Audio Deepfakes (AD), which pose serious ethical and security concerns by accurately mimicking human speech. This research addresses the urgent need for effective AD detection, with a focus on gender bias that can reduce the effectiveness of detection models. We examined how gender affects the performance of both Machine Learning (Support Vector Machine, Random Forest, Logistic Regression, XGBoost) and Deep Learning (Deep Neural Networks, Convolutional Neural Networks) models using the GBAD dataset. Our findings show that models trained on female audio outperform those trained on male audio, likely due to the expressive nature of female voice features and high-pitched artifacts in FAKE audio. This highlights the need for more robust, gender-sensitive detection systems. Future work should focus on developing adaptive models to reduce gender bias, improving security, and creating lightweight models for wider public use.
Rapid development in vehicular technology has caused more automated vehicle control to increase on the roads. Studies showed that driving in mixed traffic with an autonomous vehicle (AV) had a negative impact on the t...
详细信息
Rapid development in vehicular technology has caused more automated vehicle control to increase on the roads. Studies showed that driving in mixed traffic with an autonomous vehicle (AV) had a negative impact on the time headway (THW) of conventional vehicles (CVs) (i.e., driven by humans). To address this issue, there is a need to equip CV with visual advanced driver assistance systems (ADASs) that helps the driver maintain safe headway when driving near AVs. This study examines the perception of drivers using visual ADAS and their associated risk while driving behind the AV at constant and varying speeds. The preliminary results showed that while visual ADAS could help drivers keep the safe THW, it could affect drivers’ ability to react to emergencies. This implies that visual modality alone might not be sufficient and therefore requires some other feedback or intelligent transport systems to help drivers maintain safe driving in a mixed-traffic condition.
As the integration of Variable Renewable Energy (VRE) generators into power systems increases, there is a potential decrease in overall system reliability, particularly in terms of stability. This research suggests th...
As the integration of Variable Renewable Energy (VRE) generators into power systems increases, there is a potential decrease in overall system reliability, particularly in terms of stability. This research suggests the integration of a Battery Energy Storage System (BESS) into a power system with Variable Renewable Energy sources, such as a utility-scale Photovoltaic (PV) plant, to accelerate the damping of post-fault oscillations following a short-circuit disturbance. The objective is for a Power Oscillation Damping (POD) within the PV plant to address post-fault oscillations within a specific timeframe. The POD in the PV plant is designed to supply additional active and reactive power, responding to the system's demands after a disturbance. The addition of BESS to the system is anticipated to enhance the time required for the system to achieve a stable state, resulting in quicker system stabilization. Simulations conducted through PSCAD software can effectively depict the post-fault conditions of short-circuit disturbances, considering the impact of the integrated BESS.
This study delves into the prediction of protein-peptide interactions using advanced machine learning techniques, comparing models such as sequence-based, standard CNNs, and traditional classifiers. Leveraging pre-tra...
详细信息
A great number of deep learning-based models have been recently proposed for automatic piano classification. In this paper, we describe our contribution to the challenge of automatic piano classification when the perf...
详细信息
ISBN:
(数字)9798350386844
ISBN:
(纸本)9798350386851
A great number of deep learning-based models have been recently proposed for automatic piano classification. In this paper, we describe our contribution to the challenge of automatic piano classification when the performer performs at the concert or stage. Among these models in deep learning, we use init-1D-WaveNet and init-2D-MLNet for comparison the accuracy in the piano beginning level of the Christmas song (Jingle bells). Our experimental results show that the assessment using the init-2D-MLNet still achieve high accuracy of 87.5%.
Electrical energy has become a fundamental need for society to achieve economic and technical efficiency. To meet the demand for electrical energy, the thing that is done is Electric Load Forecast. In this study, we d...
Electrical energy has become a fundamental need for society to achieve economic and technical efficiency. To meet the demand for electrical energy, the thing that is done is Electric Load Forecast. In this study, we developed a daily peak load forecast model for Banda Aceh City by considering data on temperature, humidity, and today’s electricity load data at peak hours. Forecasts are made using artificial intelligence, namely, the Adaptive Neuro-Fuzzy Inference System (ANFIS) method. Software used Matlab R2015a to create a daily peak load forecast model based on the neuro-fuzzy designer toolbox. The ANFIS model developed is a variation of triangular, trapezium, and Gaussian membership function types, with each membership function equipped with 3 and 4 variable fuzzy sets. This study uses the MAPE instrument to measure the accuracy of the developed ANFIS model. The results obtained through simulations that have been carried out, all ANFIS Models produce MAPE values below 10%. This indicates that the developed ANFIS Model is very appropriate to be used for Daily Peak Load Forecast in Banda Aceh.
暂无评论