In this study, we propose a novel method for predicting the number of household members using smart meter electricity consumption data. Utilizing various feature selection techniques, including SHAP values, mutual inf...
详细信息
Recent advancements in large language models' (LLMs) capabilities have yielded few-shot, human-comp.rable performance on a range of tasks. At the same time, researchers expend significant effort and resources gath...
详细信息
In recent years, more and more developers have been investigating robotic vehicles. Generally, the operations of robotic vehicles rely on navigation assistance systems, which make recommendations to guide robotic vehi...
详细信息
In this study, we propose a novel method for predicting the number of household members using smart meter electricity consumption data. Utilizing various feature selection techniques, including SHAP values, mutual inf...
详细信息
ISBN:
(数字)9798350364637
ISBN:
(纸本)9798350364644
In this study, we propose a novel method for predicting the number of household members using smart meter electricity consumption data. Utilizing various feature selection techniques, including SHAP values, mutual information, feature importance, and a proposed method involving pairwise grouping and selection based on importance testing, we aimed to enhance the model's predictive accuracy. The proposed method involves selecting time points based on specific time ranges and overlapping important features from other techniques. The analysis revealed that time periods such as morning, evening, and before bedtime are most informative for estimating household member numbers, while periods with lower activity, like lunchtime to early evening, are less useful.
Biocuration is the process of analyzing biological or biomedical articles to organize biological data into data repositories using taxonomies and ontologies. Due to the expanding number of articles and the relatively ...
详细信息
Blockchain technology and Artificial Intelligence (AI) have emerged as transformative forces in their respective domains. This paper explores synergies and challenges between these two technologies. Our research analy...
详细信息
With the increasing use of machine learning software in our daily life, software fairness has become a growing concern. In this paper, we propose an individual fairness testing technique called KOSEI. Individual fairn...
详细信息
Detecting abnormal driving behavior is crucial for preventing traffic accidents, as they are responsible for a sig-nificant majority of incidents. However, existing methods for detection often come with high costs or ...
详细信息
ISBN:
(数字)9781728190549
ISBN:
(纸本)9781728190556
Detecting abnormal driving behavior is crucial for preventing traffic accidents, as they are responsible for a sig-nificant majority of incidents. However, existing methods for detection often come with high costs or execution restrictions. In this paper, we introduce EADD, an Edge-based Anomaly Detection platform for Driving behavior. EADD overcomes these limitations by detecting abnormal driving behavior without the need for additional sensors or restrictions. Additionally, EADD boasts low comp.tational requirements and enables real-time detection on mobile devices like the Raspberry Pi 3 Model B.
The purpose of this study is to comp.re the results of measuring location information using multiple devices. In the Open Sky Museum for digital transformation, accurate location information is necessary for presentin...
详细信息
The Long Short-Term Memory (LSTM) model has significantly improved time series prediction accuracy, but also brought forth concerns regarding reliability and security with its widespread adoption, particularly in the ...
详细信息
ISBN:
(数字)9798350361261
ISBN:
(纸本)9798350361278
The Long Short-Term Memory (LSTM) model has significantly improved time series prediction accuracy, but also brought forth concerns regarding reliability and security with its widespread adoption, particularly in the context of poisoning attacks. While there is substantial research on attacks and defenses for LSTM models, there’s limited focus on LSTM time series prediction models. In this paper, we propose an arithmetic-based poisoning attack methodology for a demonstrative LSTM time series speed prediction model. Furthermore, we employ the “red team/blue team exercises” commonly used in network security to develop defense strategies using support vector machine and linear regression analysis methods. Through the system-level simulation experiments, we verify the effectiveness of our proposed methodology. Our experiment results indicate that, regarding attacks, our methodology can identify the optimal attacks for the representative road segments. As for defenses, we demonstrate that the defended model’s performance is close to the real model’s performance.
暂无评论