Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Support Vector Machine in Smart Grid and Cloud Computing A B M Shawkat Ali CQUniversity, Australia • Smart Grid: How much Computational Intelligence (CI) is involved? • Cloud Computing: How can CI ensure the services? • Current Projects • Demand and Supply • IT • Automatic Observation Figure 1. A sketch of Smart Grid. Need an Intelligent System for: • • • • Forecasting demand and supply Grid security Monitoring power quality Power storage Let us consider n data points For instance Recently, a new loss function called -insensitive loss has been proposed by Vapnik (1995): Subject to This optimization problem can be transformed into the dual problem (Vapnik, 1995), and its solution is given by with coefficient values in the range , and denotes the dot product in the input space. age solar radiation w/m^2 in Hour Figure 2. HourlyTime average solar radiation of Rockhampton, Australia Outliers, High-leverage Points and Influential Observations Figure 3. Outlier mapping. Imon (2005) defines generalized Studentized residuals and generalized weights (leverage) as Imon (1996) also introduces generalized potentials for identifying multiple high-leverage points by using group-deletion idea for a dataset as He re-expresses GDFFITS in terms of deletion residuals and leverages as Outlier Detection in Linear Regression Table 1. Solar radiation prediction performance. • • • • • Software Service Storage Data Mining Data analysis Figure 4. An overview of Cloud Computing. Figure 5. A real life Cloud Computing Environment. Figure 6. Performance chart of Hypervisor at the time of Installing new VM. Training Data Domain Non linear Mapping by Kernel To Choose Optimal Hyperplane Linear Feature Space of SVM Figure 7. SVM training process. Construct Model through Feature knowledge Class I Class II Kernel Mapping Test Data Domain Figure 8. SVM model testing process. Mercer’s Condition Figure 7. Ten (10) fold cross validation process. Figure 8. Attack classification performance in the real life Cloud scenario. Student Projects: PhD Students Mohammed Mizanul Mazid Topic: Intrusion Detection Using Machine Learning Gazi Mohammad Shafiullah Topic: Experimental Investigation and Development of Renewable Energy Integration into the Smart Grid Md Rahat Hossain Topic: Hybrid Forecasting System of Renewable Energy with Smart Grid for a Sustainable Future Mohammed Arif Topic: Storage and Its Strategic Impacts on Smart Grid MD Tanzim Khorshed Topic: Combating Cyber Attacks in Cloud Computing Using Machine Learning Techniques MD Akhlaqur Rahman Topic: Data Mining in Telecommunication Industry of Call Records, Customer Profiles and Network Data Master’s Student Choudhury Wahid Topic: Cancer Classification by Support Vector Machine using Microarray Gene Expression Data Personal Projects • • • • Livestock tacking Road load estimation for a better plan Industry automation: Magnesia sorting Cool train monitoring High Lime Core EFH2 EFH1 Analysing : Percent correct Confidence : 0.05 (two tailed) Date : 7/17/11 12:23 PM Dataset (1) NB| (2) SMO (3) lBK (4) ABM1 (5) J48 (6) PART -----------------------------------------------------------------------------------------------------------------------------mgdata (100) 77.62| 73.71 83.76 78.48 80.69 84.31 ------------------------------------------------------------------------------------------------------------------------------ Our mission is to establish the effectiveness of CI theories by solving industry problems! “I cannot teach anybody anything, I can only make them think”. – Socrates (470–399 B.C.) 1. Vapnik, V. N., (2005). The Nature of Statitical Learning Theory , Springer. 2. Imon, A. H. M. R. (1996). Subsample methods in regression residual prediction and diagnostics. PhD Thesis, University of Birmingham, UK. 3. Imon, A. H. M. R. (2005). Identifying multiple influential observations in linear regression. Journal of Applied Statistics, 32, 73 – 90. 4. Shafiullah, GM., M. T. Oo, A., Ali, S. A., D. Jarvis, and Wolfs, P., "Prospects of Renewable Energy - A feasibility study in the Australian context", Accepted for the International Journal of Renewable Energy, ELSEVIER, 2011. 5. Khorshed, M. T., Ali, S., and Wasimi, S., "Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning", Accepted for IEEE TrustCom-11, Nov. 16-18, 2011, Changsha, China. 6. Shafiullah, GM., Ali, S. Thompson, A. and Wolfs, P. "Forecasting Vertical Acceleration of Railway Wagons using Regression Algorithms" IEEE Transactions on Intelligent Transportation Systems, vol. 11, No. 2, June 2010, pp. 290-299. 7. Ali, S. and Pun, D., "Electrofused Magnesium Oxide Classification Using Digital Image Processing and Machine Learning Techniques", Proceeding of The IEEE International Conference on Industrial Technology (ICIT 2009), 10-13 February 2009, Australia. 8. Khorshed, M. T., Ali, S., and Wasimi, S., “A survey on gaps, threats remediation challenges and some thoughts for proactive attack detection in cloud computing “, Submitted to Future Generation Computer System, Elsevier, 2011. (Under Review). 9. Hossain, M. R., M. T. Oo, A., Ali, S., " Computational Intelligence: The Effectiveness in Smart Grid ", Submitted to IEEE Transaction on Smart Grid, 2011, Now your time! Please ask me your Questions- “?”.