1 / 41

A B M Shawkat Ali CQUniversity, Australia

Support Vector Machine in Smart Grid and Cloud Computing. A B M Shawkat Ali CQUniversity, Australia. Smart Grid: How much Computational Intelligence (CI) is involved? Cloud Computing: How can CI ensure the services? Current Projects. Demand and Supply IT Automatic Observation.

rio
Download Presentation

A B M Shawkat Ali CQUniversity, Australia

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Support Vector Machine in Smart Grid and Cloud Computing A B M Shawkat Ali CQUniversity, Australia

  2. Smart Grid: How much Computational Intelligence (CI) is involved? • Cloud Computing: How can CI ensure the services? • Current Projects

  3. Demand and Supply • IT • Automatic Observation

  4. Figure 1. A sketch of Smart Grid.

  5. Need an Intelligent System for: • Forecasting demand and supply • Grid security • Monitoring power quality • Power storage

  6. Let us consider n data points For instance

  7. Recently, a new loss function called -insensitive loss has been proposed by Vapnik (1995): Subject to This optimization problem can be transformed into the dual problem (Vapnik, 1995), and its solution is given by , denotes the dot product in the input space. with coefficient values in the range and

  8. Average solar radiation w/m^2 Time in Hour Figure 2. Hourly average solar radiation of Rockhampton, Australia

  9. Outliers, High-leverage Points and Influential Observations Figure 3. Outlier mapping.

  10. Imon (2005) defines generalized Studentized residuals and generalized weights (leverage) as Imon (1996) also introduces generalized potentials for identifying multiple high-leverage points by using group-deletion idea for a dataset as He re-expresses GDFFITS in terms of deletion residuals and leverages as Outlier Detection in Linear Regression

  11. Table 1. Solar radiation prediction performance.

  12. Software • Service • Storage • Data Mining • Data analysis

  13. Figure 4. An overview of Cloud Computing.

  14. Figure 5. A real life Cloud Computing Environment.

  15. Figure 6. Performance chart of Hypervisor at the time of Installing new VM.

  16.               Non linear Mapping by Kernel Training Data Domain            To Choose Optimal Hyperplane                           Linear Feature Space of SVM Figure 7. SVM training process.

  17.        Construct Model through Feature knowledge Class I          Class II Kernel Mapping                 Test Data Domain Figure 8. SVM model testing process.

  18. Mercer’s Condition

  19. Figure 7. Ten (10) fold cross validation process.

  20. Figure 8. Attack classification performance in the real life Cloud scenario.

  21. Student Projects: PhD Students Mohammed Mizanul Mazid Topic: Intrusion Detection Using Machine Learning Gazi Mohammad Shafiullah Topic: Experimental Investigation and Development of Renewable Energy Integration into the Smart Grid Md Rahat Hossain Topic: Hybrid Forecasting System of Renewable Energy with Smart Grid for a Sustainable Future Mohammed Arif Topic: Storage and Its Strategic Impacts on Smart Grid MD Tanzim Khorshed Topic: Combating Cyber Attacks in Cloud Computing Using Machine Learning Techniques MD Akhlaqur Rahman Topic: Data Mining in Telecommunication Industry of Call Records, Customer Profiles and Network Data Master’s Student Choudhury Wahid Topic: Cancer Classification by Support Vector Machine using Microarray Gene Expression Data

  22. Personal Projects • Livestock tacking • Road load estimation for a better plan • Industry automation: Magnesia sorting • Cool train monitoring

  23. High Lime Core EFH2 EFH1

  24. Analysing : Percent correct Confidence : 0.05 (two tailed) Date : 7/17/11 12:23 PM Dataset (1)NB| (2)SMO (3) lBK (4)ABM1 (5) J48 (6)PART ------------------------------------------------------------------------------------------------------------------------------- mgdata (100) 77.62| 73.71 83.76 78.48 80.69 84.31 -------------------------------------------------------------------------------------------------------------------------------

  25. Our mission is to establish the effectiveness of CI theories by solving industry problems!

  26. “I cannot teach anybody anything, I can only make them think”. – Socrates (470–399 B.C.)

  27. Vapnik, V. N., (2005). The Nature of Statitical Learning Theory , Springer. • Imon, A. H. M. R. (1996). Subsample methods in regression residual prediction and diagnostics. PhD Thesis, University of Birmingham, UK. • Imon, A. H. M. R. (2005). Identifying multiple influential observations in linear regression. Journal of Applied Statistics, 32, 73 – 90. • Shafiullah, GM., M. T. Oo, A., Ali, S. A., D. Jarvis, and Wolfs, P., "Prospects of Renewable Energy - A feasibility study in the Australian context", Accepted for the International Journal of Renewable Energy, ELSEVIER, 2011. • Khorshed, M. T., Ali, S., and Wasimi, S., "Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning", Accepted for IEEE TrustCom-11, Nov. 16-18, 2011, Changsha, China. • Shafiullah, GM., Ali, S. Thompson, A. and Wolfs, P. "Forecasting Vertical Acceleration of Railway Wagons using Regression Algorithms" IEEE Transactions on Intelligent Transportation Systems, vol. 11, No. 2, June 2010, pp. 290-299. • Ali, S. and Pun, D., "Electrofused Magnesium Oxide Classification Using Digital Image Processing and Machine Learning Techniques", Proceeding of The IEEE International Conference on Industrial Technology (ICIT 2009), 10-13 February 2009, Australia. • Khorshed, M. T., Ali, S., and Wasimi, S., “A survey on gaps, threats remediation challenges and some thoughts for proactive attack detection in cloud computing “, Submitted to Future Generation Computer System, Elsevier, 2011. (Under Review). • Hossain, M. R., M. T. Oo, A., Ali, S.,  " Computational Intelligence: The Effectiveness in Smart Grid ", Submitted to IEEE Transaction on Smart Grid, 2011,

  28. Now your time! Please ask me your Questions- “?”.

More Related