SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue IV, April 2017 | ISSN 2278-2540
www.ijltemas.in Page 170
Predicting Electricity Consumption Using Hidden
Parameters
Lata Chakor1
, Lata Musne2
, Priyanka Kumbhar3
, S. M. Shedole4
1,2,3
Department of Computer Engineering, SIT’S, Lonavala-410401, India
4
Assistant Professor, Department of Computer Engineering, SIT’S, Lonavala-410401, India
Abstract: -data mining technique to forecast power demand of a
biological region based on the metrological conditions. The value
forecast analytical data mining technique is implement with the
Hidden Marko Model. The morals of the factor such as heat,
clamminess and municipal celebration on which influence
operation depends and the everyday utilization morals compose
the data. Data mining operation are perform on this
chronological data to form a forecast model which is able of
predict every day utilization provide the meteorological
parameter. The steps of information detection of data process are
implemented. The data is preprocessed and fed to HMM for
guidance it. The educated HMM network is used to predict the
electricity demand for the given meteorological conditions.
Keywords: Data Mining, Predictive modeling, Artificial Neural
Networks, KDD, etc.
I. INTRODUCTION
ata mining (sometimes called data or knowledge
discovery) is the process of analyze data from dissimilar
perspective and abbreviation it into helpful in sequence - in
sequence that can be old to add to profits, cut expenses, or
both. Data mining software is one of a digit of systematic
apparatus for analyze data. Some of the data mining technique
is analytical model, cluster, and association psychoanalysis and
difference discovery. Analytical model is a technique to
forecast from monitor. Analytical model is a process that uses
data mining and outlook to expect outcome. Each model is
made up of a number of predictors, which are variables that are
probable to power viewpoint results. Data preprocessing is
a data mining technique that involve transform underdone
data into an logical format. Real-world data is frequently
partial, conflicting, and/or absent in confident behaviors or
trend, and is likely to contain many errors. Data
preprocessing is a established process of resolve such issues.
Data preprocessing process is divided into different categories
Data cleaning, Data transformation, Data reduction. Fuzzy c-
means (FCM) is a method of clustering which allows one piece
of data to belong to two or more clusters. Fuzzy c-mean
clustering algorithm. This algorithm works by transitory on
add-on to each data point consequent to each cluster middle on
the basis of a space between the cluster middle and the data
position. More the data is close to to the cluster middle more is
its relationship towards the exacting cluster middle. obviously,
the outline of relationship of each data point should be alike to
one. Later than each iteration relationship and cluster center
are efficient. Hidden Markov model (HMM) is a statistical
Markov model in which the system being model is unspecified
to be a Markov process with unseen (hidden) state. An HMM
can be obtainable as the simplest energetic Bayesian
network.Markov models (like a Markov chain), the location is
straight visible to the viewer, and so the place change
accidental are the one control. In a hidden Markov model, the
location is not traditional obvious, but the production, needy
on the state, is noticeable. Every formal has a prospect
dissemination done the thinkable production symbols. Thus,
the arrangement of symbols created by an HMM stretches
certain material about the arrangement of positions. a hidden
Markov process can be pictured as a generalization of
the tricky with additional (where each item from the urn is
repaid to the unique urn before the next step).Redirect this
example: in a room that is not noticeable to an viewer near is a
sprite. The room holds urns X1, X2, X3, …each of which
holds a acknowledged mixture of balls, each ball characterized
y1, y2, y3, … The sprite selects an urn in that room and
casually attractions a ball after that urn. It then sets the ball on
a conveyor tie, where the viewer can note the arrangement of
the balls but not the classification of urns after which they
stood strained. The apparition has some process to select urns;
the special of the urn for the n-th ball be contingent only upon
accidental amount and the optimal of the urn for the (n − 1)-th
ball. The optimal of urn does not straight be contingent on the
urns select before this lone prior urn; then, this is called
a Markov process. It can be labelled by the greater part of
Figure. The Markov process themself cannot be practical; only
the arrangement of considered balls, thus this plan is called a
"hidden Markov process". This is showed by the lesser slice of
the drawing shown in Figure 1, where one can get that balls
y1, y2, y3, y4 can be pinched in each formal.
Figure1. Probabilistic factors of a hidden Markov model
D
International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue IV, April 2017 | ISSN 2278-2540
www.ijltemas.in Page 171
X —conditions
y —probable observations
a — state conversion probabilities
b — output prospects
Uniform if the viewer identifies the structure of the urns and
has just perceived a arrangement of three balls, e.g. y1, y2 and
y3 on the express or belt, the viewer still cannot
be definite which urn (i.e., at which state) the spirit has
strained the third ball from. Though, the viewers can effort out
additional substantial, such as the lookout that the third ball
come from each of the urns. Fuzzy classification is the process
of collection origins into a fuzzy set whose associative purpose
is distinct by the fact value of a fuzzy propositional purpose.
II. LITERATURE SURVEY
There are many steps complicated to prediction energy
consumption like Fuzzy c-means clustering, Hidden Marko
Model (HMM), Fuzzy classification. The major phase
presented to forecast electricity feasting is Fuzzy c-means
clustering offers the best result for overlain data set and
relatively better than k-means algorithm.
Let X = {x1, x2, x3 ..., xn} be the set of data points and V =
{v1, v2, v3 ..., vc} be the set of midpoints.
1) Randomly select ‘c’ cluster centers.
2) calculate the fuzzy membership 'µij' using:
3) Compute the fuzzy centers 'vj' using:
1) Repeat step 2) until the minimum 'J' value is achieved or
||U(k+1) - U(k)|| < β.
Where,
‘K’ is the iteration step.
‘β’ is the termination criterion between [0, 1].
‘U = (µij) n*c’ is the fuzzy membership matrix.
‘J’ is the objective function.
Different k-means wherever data point must completely fit to
one cluster midpoint here data point is allocated association to
each cluster midpoint as a result of which data point may
belong to extra than one cluster midpoint.
Fig I: Result of Fuzzy c-means clustering
Hidden Markov Model (HMM) is clarified as a arithmetic
Markov model in which the system being demonstrated is
expected to be a Markov process with overlooked (hidden)
states. Poisson hidden Markov models (PHMM) are superior
belongings of hidden Markov models anywhere a Poisson
procedure has a amount which differs in suggestion with
variations among the dissimilar conditions of a Markov model.
PHMMs are not essentially Markova processes themselves
because the original Markov chain or Markov process cannot
be experiential and only the Poisson signal is experiential.
Hidden Markov model is used in cryptanalysis, speech
recognition, speech synthesis etc.
Fuzzy classification labeled as a is the process of group
essentials into a fuzzy set whose connection function is distinct
by the truth value of a fuzzy propositional function. Later the
opening of the history of Fuzzy Sets Theory, Classification
Models and Control Theory has been two essential grounds for
their academic and applied progresses. In fact, countless
difficulties indoors both arenas are logically formal by
presenting fuzzy concepts. In some cases, a fuzzy method
looks to offer a useful generalization of a too composite
certainty. In a fuzzy classification process, one of the main
aims is to combine the information we have obtained about
each object. If such information is given by means of degrees
of association, we can find in the literature that improver rules
and some t-conforms are useful for starting conjunctive
instructions. Material is in this way combined into one single
index. Later we frequently do not know in advance the number
of pieces of information we should collective, traditional
methods undertake the actuality of a basic binary operative
existence associative, in such a way that a consecutive
application of such an operative will give us the combined
information, no difficulty the measurement of information. But
we know that not each operative is associative.
International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue IV, April 2017 | ISSN 2278-2540
www.ijltemas.in Page 172
III. PROPOSED METHODOLOGY
Figure 1: System Overview
Proposed System Implements Five Phase Algorithmic
Procedure to forecast Larceny in Energy Practice founded on
Design of electricity usage.
Phase 1: Data Reading and Pre-processing: Firstly whole
data is been recite from dataset. Parallel process run to on
Working out dataset and input Data Set. Only applicable
factors are been nominated after input dataset.
Phase 2: Fuzzy C-Means Clustering: This Stage Fuzzy C
means Clustering is been useful on Both Working out dataset
and input data set producing clusters for coming treating. In K-
means Centroid are been Prepared for clustering and based on
Euclidean distance portion Data points has been clustered.
Charted Data is too remained clustered.
Phase 3: HMM: A hidden Markov model (HMM) is one in
which you see a arrangement of productions, but do not know
the order of conditions the typical departed determined to
produce the radioactivity. Estimates of hidden Markov models
attempt to invention to progress the instruction of conditions
since the experiential data.
HMM Working
HMM assistance in classifying Hidden States in data . In
electricity consumption overlooked data of customer no is
been recognized created on HMM preparation.
Phase 4: Fuzzy Classification: classification approaches
agree you to decrease the dimensionality of a compound data
set by group the data into a set number of classes. With
outdated (crisp) classification methods, each model/position is
located into one class or another. In crusty classification, class
association is second, a model is a member of a class or not.
Crusty class association ideals can be either "1" when that
class is the best fit, or "0" (for all other classes). In fuzzy
classification, a model can have association in countless
dissimilar programs to dissimilar grades. Typically, the
association values are inhibited so that all of the membership
values for a specific model amount to 1.
Phase 5: Consumption Analysis: previous stage in
Consumption analysis which recognizes consumption units
and recognizes consumption values of user with higher values.
1. Forward Algorithm
______________________________________
// Input : Data Set D,
Detected Conditions Os = { Os1 , Os2,Os3}
Step 0: Start
Step 1: Recognize the Detected state Characteristic Osi
Step 2: FOR i=0 to size of D
Step 3: Recognize Characteristic Osi and put in discrete Lists’
Step 4: FINISH FOR
Step 5: FOR i=0 to size of OSL
Step 6: recognize α using equation 1
Step 7: FINISH FOR
Step 8: Break
Equation1:
∑
Where = Forward Probability
O( t+1) = For every next element of Observed state
N= Size of the Observed state List
= For Every observed state
_________________________________
2.Backward Algorithm
__________________________________________
// Input : Data Set D
Detected Conditions Os = { Os1 , Os2,Os3}
Step 0: Start
Step 1: Recognize the Detected state Characteristic Osi
Step 2: FOR i=0 to size of D
Step 3: Recognize Characteristic Osi and put in discrete list’s
International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue IV, April 2017 | ISSN 2278-2540
www.ijltemas.in Page 173
Step 4: FINISH FOR
Step 5: FOR i=0 to size of OSL
Step 6: recognize β using equation2
Step 7: FINISH FOR
Step 8: Stop
Equation 2 :
∑
Where = Forward Probability
O( t+1) = For every next element of Observed state
N= Size of the Observed state List
= For Every observed state
= Frequency of the occurred state
_______________________________________
4 Fuzzy c-means clustering Algorithm
_________________________________________
Let X = {x1, x2, x3 ..., xn} be the set of data points and V =
{v1, v2, v3 ..., vc} be the set of centers.
1) Randomly select ‘c’ cluster centers.
2) calculate the fuzzy membership 'µij' using:
3)
compute the fuzzy centers 'vj' using:
4) Repeat step 2) and 3) until the minimum 'J' value is
achieved or ||U(k+1)
- U(k)
|| < β.
Where,
‘k’ is the iteration step.
‘β’ is the termination criterion between [0,1]
‘U = (µij)n*c’ is the fuzzy membership matrix.
‘J’ is the objective function.
IV. RESULTS AND DISCUSSIONS
Proposed system of Theft Detection System is organized as a
individual system using Net beans as development IDE for
java technology which is reinforced by java media file
structure. Presentation is evaluated constructed on the accuracy
and recollection constraints. Accuracy is defined as the ratio of
number of related Consumption to the entire amount of related
and unrelated related Consumption identified. Relation
efficiency of the system is well articulated by using precision
parameters. While the recollection can be definite as the ratio
of number of related Consumption identification the total
figure of related Consumption are noticed not perceived.
Complete exactness of the system is fine recounted by using
recollection constraints.
System can be estimated using accuracy and recollection
constraints, and they can be more openly explained as follows
• X = The numbers of related Consumption been are
noticed,
• Y = the number of related Consumption not noticed, and
• Z = the number of unrelated Consumption that are been
noticed.
So, Accuracy = (X/ ( X+ Z))*100
And Recollection = (X/ ( X+ Y))*100
Fig.2. Average precision for Consumption Detection System
In Fig. 2, by detecting it is clear that the average precision
gained for Consumption Detection System using HMM is
almost 68%.
Figure3. Shows that the system gives 89.33% recollection for
the Consumption method using HMM Fuzzy logic
Dissemination. By relating these two graphs we can complete
that the system with proposed methodology has higher
performance.
Fig.3. Average Recall for Consumption Detection System
International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS)
Volume VI, Issue IV, April 2017 | ISSN 2278-2540
www.ijltemas.in Page 174
V. CONCLUSION AND FUTURE SCOPE
Presented Artifact is Implementation Work on electricity
Consumption Analysis Artifact presents invention methods in
data mining domain. Presents analytical System which would
contribution electricity boards to possible perceive Higher
value consumption meters. This Exploration work is decently
predictive and hence involves sureness and provision scrutiny
.upcoming system can be improved and taken to higher level
as product. Computational scrutiny and everyday values have
been initiate to be accurate analytical and hence system has
large scope of exploration.
REFERENCES
[1]. Jiacong Li, Ying Wang, Jinke Yu, Shaoyong Guo,” An HMM-
based Performance Diagnosis Approach for Hadoop Clusters” The
18th Asia-Pacific Network Operations and Management
Symposium (APNOMS) 2016.
[2]. Md. Khaliluzzaman and Lamia Iqbal Dolon,”Analyzing MRI
Segmentation Based on Wavelet and BEMD using Fuzzy C-Means
Clustering” ©2016 IEEE.
[3]. Daniele Soria, Jonathan M. Garibaldi,” Validation of a quantifier-
based fuzzy classification system for breast cancer patients on
external independent cohorts”, © 2016 IEEE DOI
10.1109/ICMLA.2016.176.
[4]. DimitriosKoutsoukos*, GeorgiosAlexandridis t, GeorgiosSiolas+,
Andreas Stafylopatis,” A new approach to session identification by
applying fuzzy c-means clustering on web logs”, ©2016 IEEE.

More Related Content

What's hot

Image Segmentation Using Two Weighted Variable Fuzzy K Means
Image Segmentation Using Two Weighted Variable Fuzzy K MeansImage Segmentation Using Two Weighted Variable Fuzzy K Means
Image Segmentation Using Two Weighted Variable Fuzzy K MeansEditor IJCATR
 
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...Waqas Tariq
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...IRJET Journal
 
CS583-unsupervised-learning.ppt
CS583-unsupervised-learning.pptCS583-unsupervised-learning.ppt
CS583-unsupervised-learning.pptHathiramN1
 
A Time Series ANN Approach for Weather Forecasting
A Time Series ANN Approach for Weather ForecastingA Time Series ANN Approach for Weather Forecasting
A Time Series ANN Approach for Weather Forecastingijctcm
 
Self Organizing Maps: Fundamentals
Self Organizing Maps: FundamentalsSelf Organizing Maps: Fundamentals
Self Organizing Maps: FundamentalsSpacetoshare
 
Extended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmExtended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmIJMIT JOURNAL
 
A divisive hierarchical clustering based method for indexing image information
A divisive hierarchical clustering based method for indexing image informationA divisive hierarchical clustering based method for indexing image information
A divisive hierarchical clustering based method for indexing image informationsipij
 
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...cscpconf
 
11 construction productivity and cost estimation using artificial
11 construction productivity and cost estimation using artificial 11 construction productivity and cost estimation using artificial
11 construction productivity and cost estimation using artificial Vivan17
 
Learning in non stationary environments
Learning in non stationary environmentsLearning in non stationary environments
Learning in non stationary environmentsSpringer
 
IRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means ClusteringIRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means ClusteringIRJET Journal
 
Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016ijcsbi
 
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...IJECEIAES
 
A SURVEY OF CLUSTERING ALGORITHMS IN ASSOCIATION RULES MINING
A SURVEY OF CLUSTERING ALGORITHMS IN ASSOCIATION RULES MININGA SURVEY OF CLUSTERING ALGORITHMS IN ASSOCIATION RULES MINING
A SURVEY OF CLUSTERING ALGORITHMS IN ASSOCIATION RULES MININGAIRCC Publishing Corporation
 

What's hot (17)

Image Segmentation Using Two Weighted Variable Fuzzy K Means
Image Segmentation Using Two Weighted Variable Fuzzy K MeansImage Segmentation Using Two Weighted Variable Fuzzy K Means
Image Segmentation Using Two Weighted Variable Fuzzy K Means
 
F017533540
F017533540F017533540
F017533540
 
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
The Positive Effects of Fuzzy C-Means Clustering on Supervised Learning Class...
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
 
CS583-unsupervised-learning.ppt
CS583-unsupervised-learning.pptCS583-unsupervised-learning.ppt
CS583-unsupervised-learning.ppt
 
A Time Series ANN Approach for Weather Forecasting
A Time Series ANN Approach for Weather ForecastingA Time Series ANN Approach for Weather Forecasting
A Time Series ANN Approach for Weather Forecasting
 
Self Organizing Maps: Fundamentals
Self Organizing Maps: FundamentalsSelf Organizing Maps: Fundamentals
Self Organizing Maps: Fundamentals
 
Extended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithmExtended pso algorithm for improvement problems k means clustering algorithm
Extended pso algorithm for improvement problems k means clustering algorithm
 
A divisive hierarchical clustering based method for indexing image information
A divisive hierarchical clustering based method for indexing image informationA divisive hierarchical clustering based method for indexing image information
A divisive hierarchical clustering based method for indexing image information
 
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
 
11 construction productivity and cost estimation using artificial
11 construction productivity and cost estimation using artificial 11 construction productivity and cost estimation using artificial
11 construction productivity and cost estimation using artificial
 
Learning in non stationary environments
Learning in non stationary environmentsLearning in non stationary environments
Learning in non stationary environments
 
IRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means ClusteringIRJET-Multimodal Image Classification through Band and K-Means Clustering
IRJET-Multimodal Image Classification through Band and K-Means Clustering
 
Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016
 
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
System for Prediction of Non Stationary Time Series based on the Wavelet Radi...
 
A SURVEY OF CLUSTERING ALGORITHMS IN ASSOCIATION RULES MINING
A SURVEY OF CLUSTERING ALGORITHMS IN ASSOCIATION RULES MININGA SURVEY OF CLUSTERING ALGORITHMS IN ASSOCIATION RULES MINING
A SURVEY OF CLUSTERING ALGORITHMS IN ASSOCIATION RULES MINING
 

Similar to Predicting electricity consumption using hidden parameters

Decentralized Data Fusion Algorithm using Factor Analysis Model
Decentralized Data Fusion Algorithm using Factor Analysis ModelDecentralized Data Fusion Algorithm using Factor Analysis Model
Decentralized Data Fusion Algorithm using Factor Analysis ModelSayed Abulhasan Quadri
 
A COMPREHENSIVE ANALYSIS OF QUANTUM CLUSTERING : FINDING ALL THE POTENTIAL MI...
A COMPREHENSIVE ANALYSIS OF QUANTUM CLUSTERING : FINDING ALL THE POTENTIAL MI...A COMPREHENSIVE ANALYSIS OF QUANTUM CLUSTERING : FINDING ALL THE POTENTIAL MI...
A COMPREHENSIVE ANALYSIS OF QUANTUM CLUSTERING : FINDING ALL THE POTENTIAL MI...IJDKP
 
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...ijcsit
 
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...Editor IJCATR
 
3. 10079 20812-1-pb
3. 10079 20812-1-pb3. 10079 20812-1-pb
3. 10079 20812-1-pbIAESIJEECS
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Effective data mining for proper
Effective data mining for properEffective data mining for proper
Effective data mining for properIJDKP
 
Dynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c meansDynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c meansWrishin Bhattacharya
 
Capital market applications of neural networks etc
Capital market applications of neural networks etcCapital market applications of neural networks etc
Capital market applications of neural networks etc23tino
 
Survey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsSurvey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsIRJET Journal
 
A tutorial on applying artificial neural networks and geometric brownian moti...
A tutorial on applying artificial neural networks and geometric brownian moti...A tutorial on applying artificial neural networks and geometric brownian moti...
A tutorial on applying artificial neural networks and geometric brownian moti...eSAT Journals
 
Ensemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes ClusteringEnsemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes ClusteringIJERD Editor
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Alexander Decker
 
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...IAEME Publication
 

Similar to Predicting electricity consumption using hidden parameters (20)

Decentralized Data Fusion Algorithm using Factor Analysis Model
Decentralized Data Fusion Algorithm using Factor Analysis ModelDecentralized Data Fusion Algorithm using Factor Analysis Model
Decentralized Data Fusion Algorithm using Factor Analysis Model
 
Saif_CCECE2007_full_paper_submitted
Saif_CCECE2007_full_paper_submittedSaif_CCECE2007_full_paper_submitted
Saif_CCECE2007_full_paper_submitted
 
A COMPREHENSIVE ANALYSIS OF QUANTUM CLUSTERING : FINDING ALL THE POTENTIAL MI...
A COMPREHENSIVE ANALYSIS OF QUANTUM CLUSTERING : FINDING ALL THE POTENTIAL MI...A COMPREHENSIVE ANALYSIS OF QUANTUM CLUSTERING : FINDING ALL THE POTENTIAL MI...
A COMPREHENSIVE ANALYSIS OF QUANTUM CLUSTERING : FINDING ALL THE POTENTIAL MI...
 
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...Q UANTUM  C LUSTERING -B ASED  F EATURE SUBSET  S ELECTION FOR MAMMOGRAPHIC I...
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...
 
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
Time Series Forecasting Using Novel Feature Extraction Algorithm and Multilay...
 
3. 10079 20812-1-pb
3. 10079 20812-1-pb3. 10079 20812-1-pb
3. 10079 20812-1-pb
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Effective data mining for proper
Effective data mining for properEffective data mining for proper
Effective data mining for proper
 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
 
Dynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c meansDynamic clustering algorithm using fuzzy c means
Dynamic clustering algorithm using fuzzy c means
 
tsopze2011
tsopze2011tsopze2011
tsopze2011
 
Capital market applications of neural networks etc
Capital market applications of neural networks etcCapital market applications of neural networks etc
Capital market applications of neural networks etc
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
 
Survey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique AlgorithmsSurvey on Artificial Neural Network Learning Technique Algorithms
Survey on Artificial Neural Network Learning Technique Algorithms
 
ME Synopsis
ME SynopsisME Synopsis
ME Synopsis
 
PggLas12
PggLas12PggLas12
PggLas12
 
A tutorial on applying artificial neural networks and geometric brownian moti...
A tutorial on applying artificial neural networks and geometric brownian moti...A tutorial on applying artificial neural networks and geometric brownian moti...
A tutorial on applying artificial neural networks and geometric brownian moti...
 
Ensemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes ClusteringEnsemble based Distributed K-Modes Clustering
Ensemble based Distributed K-Modes Clustering
 
Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)Survey on classification algorithms for data mining (comparison and evaluation)
Survey on classification algorithms for data mining (comparison and evaluation)
 
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...
AN IMPROVED METHOD FOR IDENTIFYING WELL-TEST INTERPRETATION MODEL BASED ON AG...
 

More from IJLT EMAS

Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...
Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...
Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...IJLT EMAS
 
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...IJLT EMAS
 
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...IJLT EMAS
 
Comparison of Concurrent Mobile OS Characteristics
Comparison of Concurrent Mobile OS CharacteristicsComparison of Concurrent Mobile OS Characteristics
Comparison of Concurrent Mobile OS CharacteristicsIJLT EMAS
 
Design of Complex Adders and Parity Generators Using Reversible Gates
Design of Complex Adders and Parity Generators Using Reversible GatesDesign of Complex Adders and Parity Generators Using Reversible Gates
Design of Complex Adders and Parity Generators Using Reversible GatesIJLT EMAS
 
Design of Multiplexers, Decoder and a Full Subtractor using Reversible Gates
Design of Multiplexers, Decoder and a Full Subtractor using Reversible GatesDesign of Multiplexers, Decoder and a Full Subtractor using Reversible Gates
Design of Multiplexers, Decoder and a Full Subtractor using Reversible GatesIJLT EMAS
 
Multistage Classification of Alzheimer’s Disease
Multistage Classification of Alzheimer’s DiseaseMultistage Classification of Alzheimer’s Disease
Multistage Classification of Alzheimer’s DiseaseIJLT EMAS
 
Design and Analysis of Disc Brake for Low Brake Squeal
Design and Analysis of Disc Brake for Low Brake SquealDesign and Analysis of Disc Brake for Low Brake Squeal
Design and Analysis of Disc Brake for Low Brake SquealIJLT EMAS
 
Tomato Processing Industry Management
Tomato Processing Industry ManagementTomato Processing Industry Management
Tomato Processing Industry ManagementIJLT EMAS
 
Management of Propylene Recovery Unit
Management of Propylene Recovery UnitManagement of Propylene Recovery Unit
Management of Propylene Recovery UnitIJLT EMAS
 
Online Grocery Market
Online Grocery MarketOnline Grocery Market
Online Grocery MarketIJLT EMAS
 
Management of Home Textiles Export
Management of Home Textiles ExportManagement of Home Textiles Export
Management of Home Textiles ExportIJLT EMAS
 
Coffee Shop Management
Coffee Shop ManagementCoffee Shop Management
Coffee Shop ManagementIJLT EMAS
 
Management of a Paper Manufacturing Industry
Management of a Paper Manufacturing IndustryManagement of a Paper Manufacturing Industry
Management of a Paper Manufacturing IndustryIJLT EMAS
 
Application of Big Data Systems to Airline Management
Application of Big Data Systems to Airline ManagementApplication of Big Data Systems to Airline Management
Application of Big Data Systems to Airline ManagementIJLT EMAS
 
Impact of Organisational behaviour and HR Practices on Employee Retention in ...
Impact of Organisational behaviour and HR Practices on Employee Retention in ...Impact of Organisational behaviour and HR Practices on Employee Retention in ...
Impact of Organisational behaviour and HR Practices on Employee Retention in ...IJLT EMAS
 
Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...
Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...
Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...IJLT EMAS
 
Sweet-shop Management
Sweet-shop ManagementSweet-shop Management
Sweet-shop ManagementIJLT EMAS
 
Hassle Free Travel
Hassle Free TravelHassle Free Travel
Hassle Free TravelIJLT EMAS
 
Aviation Meteorology
Aviation MeteorologyAviation Meteorology
Aviation MeteorologyIJLT EMAS
 

More from IJLT EMAS (20)

Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...
Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...
Lithological Investigation at Tombia and Opolo Using Vertical Electrical Soun...
 
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...
Public Health Implications of Locally Femented Milk (Nono) and Antibiotic Sus...
 
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...
Bioremediation Potentials of Hydrocarbonoclastic Bacteria Indigenous in the O...
 
Comparison of Concurrent Mobile OS Characteristics
Comparison of Concurrent Mobile OS CharacteristicsComparison of Concurrent Mobile OS Characteristics
Comparison of Concurrent Mobile OS Characteristics
 
Design of Complex Adders and Parity Generators Using Reversible Gates
Design of Complex Adders and Parity Generators Using Reversible GatesDesign of Complex Adders and Parity Generators Using Reversible Gates
Design of Complex Adders and Parity Generators Using Reversible Gates
 
Design of Multiplexers, Decoder and a Full Subtractor using Reversible Gates
Design of Multiplexers, Decoder and a Full Subtractor using Reversible GatesDesign of Multiplexers, Decoder and a Full Subtractor using Reversible Gates
Design of Multiplexers, Decoder and a Full Subtractor using Reversible Gates
 
Multistage Classification of Alzheimer’s Disease
Multistage Classification of Alzheimer’s DiseaseMultistage Classification of Alzheimer’s Disease
Multistage Classification of Alzheimer’s Disease
 
Design and Analysis of Disc Brake for Low Brake Squeal
Design and Analysis of Disc Brake for Low Brake SquealDesign and Analysis of Disc Brake for Low Brake Squeal
Design and Analysis of Disc Brake for Low Brake Squeal
 
Tomato Processing Industry Management
Tomato Processing Industry ManagementTomato Processing Industry Management
Tomato Processing Industry Management
 
Management of Propylene Recovery Unit
Management of Propylene Recovery UnitManagement of Propylene Recovery Unit
Management of Propylene Recovery Unit
 
Online Grocery Market
Online Grocery MarketOnline Grocery Market
Online Grocery Market
 
Management of Home Textiles Export
Management of Home Textiles ExportManagement of Home Textiles Export
Management of Home Textiles Export
 
Coffee Shop Management
Coffee Shop ManagementCoffee Shop Management
Coffee Shop Management
 
Management of a Paper Manufacturing Industry
Management of a Paper Manufacturing IndustryManagement of a Paper Manufacturing Industry
Management of a Paper Manufacturing Industry
 
Application of Big Data Systems to Airline Management
Application of Big Data Systems to Airline ManagementApplication of Big Data Systems to Airline Management
Application of Big Data Systems to Airline Management
 
Impact of Organisational behaviour and HR Practices on Employee Retention in ...
Impact of Organisational behaviour and HR Practices on Employee Retention in ...Impact of Organisational behaviour and HR Practices on Employee Retention in ...
Impact of Organisational behaviour and HR Practices on Employee Retention in ...
 
Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...
Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...
Sustainable Methods used to reduce the Energy Consumption by Various Faciliti...
 
Sweet-shop Management
Sweet-shop ManagementSweet-shop Management
Sweet-shop Management
 
Hassle Free Travel
Hassle Free TravelHassle Free Travel
Hassle Free Travel
 
Aviation Meteorology
Aviation MeteorologyAviation Meteorology
Aviation Meteorology
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Predicting electricity consumption using hidden parameters

  • 1. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS) Volume VI, Issue IV, April 2017 | ISSN 2278-2540 www.ijltemas.in Page 170 Predicting Electricity Consumption Using Hidden Parameters Lata Chakor1 , Lata Musne2 , Priyanka Kumbhar3 , S. M. Shedole4 1,2,3 Department of Computer Engineering, SIT’S, Lonavala-410401, India 4 Assistant Professor, Department of Computer Engineering, SIT’S, Lonavala-410401, India Abstract: -data mining technique to forecast power demand of a biological region based on the metrological conditions. The value forecast analytical data mining technique is implement with the Hidden Marko Model. The morals of the factor such as heat, clamminess and municipal celebration on which influence operation depends and the everyday utilization morals compose the data. Data mining operation are perform on this chronological data to form a forecast model which is able of predict every day utilization provide the meteorological parameter. The steps of information detection of data process are implemented. The data is preprocessed and fed to HMM for guidance it. The educated HMM network is used to predict the electricity demand for the given meteorological conditions. Keywords: Data Mining, Predictive modeling, Artificial Neural Networks, KDD, etc. I. INTRODUCTION ata mining (sometimes called data or knowledge discovery) is the process of analyze data from dissimilar perspective and abbreviation it into helpful in sequence - in sequence that can be old to add to profits, cut expenses, or both. Data mining software is one of a digit of systematic apparatus for analyze data. Some of the data mining technique is analytical model, cluster, and association psychoanalysis and difference discovery. Analytical model is a technique to forecast from monitor. Analytical model is a process that uses data mining and outlook to expect outcome. Each model is made up of a number of predictors, which are variables that are probable to power viewpoint results. Data preprocessing is a data mining technique that involve transform underdone data into an logical format. Real-world data is frequently partial, conflicting, and/or absent in confident behaviors or trend, and is likely to contain many errors. Data preprocessing is a established process of resolve such issues. Data preprocessing process is divided into different categories Data cleaning, Data transformation, Data reduction. Fuzzy c- means (FCM) is a method of clustering which allows one piece of data to belong to two or more clusters. Fuzzy c-mean clustering algorithm. This algorithm works by transitory on add-on to each data point consequent to each cluster middle on the basis of a space between the cluster middle and the data position. More the data is close to to the cluster middle more is its relationship towards the exacting cluster middle. obviously, the outline of relationship of each data point should be alike to one. Later than each iteration relationship and cluster center are efficient. Hidden Markov model (HMM) is a statistical Markov model in which the system being model is unspecified to be a Markov process with unseen (hidden) state. An HMM can be obtainable as the simplest energetic Bayesian network.Markov models (like a Markov chain), the location is straight visible to the viewer, and so the place change accidental are the one control. In a hidden Markov model, the location is not traditional obvious, but the production, needy on the state, is noticeable. Every formal has a prospect dissemination done the thinkable production symbols. Thus, the arrangement of symbols created by an HMM stretches certain material about the arrangement of positions. a hidden Markov process can be pictured as a generalization of the tricky with additional (where each item from the urn is repaid to the unique urn before the next step).Redirect this example: in a room that is not noticeable to an viewer near is a sprite. The room holds urns X1, X2, X3, …each of which holds a acknowledged mixture of balls, each ball characterized y1, y2, y3, … The sprite selects an urn in that room and casually attractions a ball after that urn. It then sets the ball on a conveyor tie, where the viewer can note the arrangement of the balls but not the classification of urns after which they stood strained. The apparition has some process to select urns; the special of the urn for the n-th ball be contingent only upon accidental amount and the optimal of the urn for the (n − 1)-th ball. The optimal of urn does not straight be contingent on the urns select before this lone prior urn; then, this is called a Markov process. It can be labelled by the greater part of Figure. The Markov process themself cannot be practical; only the arrangement of considered balls, thus this plan is called a "hidden Markov process". This is showed by the lesser slice of the drawing shown in Figure 1, where one can get that balls y1, y2, y3, y4 can be pinched in each formal. Figure1. Probabilistic factors of a hidden Markov model D
  • 2. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS) Volume VI, Issue IV, April 2017 | ISSN 2278-2540 www.ijltemas.in Page 171 X —conditions y —probable observations a — state conversion probabilities b — output prospects Uniform if the viewer identifies the structure of the urns and has just perceived a arrangement of three balls, e.g. y1, y2 and y3 on the express or belt, the viewer still cannot be definite which urn (i.e., at which state) the spirit has strained the third ball from. Though, the viewers can effort out additional substantial, such as the lookout that the third ball come from each of the urns. Fuzzy classification is the process of collection origins into a fuzzy set whose associative purpose is distinct by the fact value of a fuzzy propositional purpose. II. LITERATURE SURVEY There are many steps complicated to prediction energy consumption like Fuzzy c-means clustering, Hidden Marko Model (HMM), Fuzzy classification. The major phase presented to forecast electricity feasting is Fuzzy c-means clustering offers the best result for overlain data set and relatively better than k-means algorithm. Let X = {x1, x2, x3 ..., xn} be the set of data points and V = {v1, v2, v3 ..., vc} be the set of midpoints. 1) Randomly select ‘c’ cluster centers. 2) calculate the fuzzy membership 'µij' using: 3) Compute the fuzzy centers 'vj' using: 1) Repeat step 2) until the minimum 'J' value is achieved or ||U(k+1) - U(k)|| < β. Where, ‘K’ is the iteration step. ‘β’ is the termination criterion between [0, 1]. ‘U = (µij) n*c’ is the fuzzy membership matrix. ‘J’ is the objective function. Different k-means wherever data point must completely fit to one cluster midpoint here data point is allocated association to each cluster midpoint as a result of which data point may belong to extra than one cluster midpoint. Fig I: Result of Fuzzy c-means clustering Hidden Markov Model (HMM) is clarified as a arithmetic Markov model in which the system being demonstrated is expected to be a Markov process with overlooked (hidden) states. Poisson hidden Markov models (PHMM) are superior belongings of hidden Markov models anywhere a Poisson procedure has a amount which differs in suggestion with variations among the dissimilar conditions of a Markov model. PHMMs are not essentially Markova processes themselves because the original Markov chain or Markov process cannot be experiential and only the Poisson signal is experiential. Hidden Markov model is used in cryptanalysis, speech recognition, speech synthesis etc. Fuzzy classification labeled as a is the process of group essentials into a fuzzy set whose connection function is distinct by the truth value of a fuzzy propositional function. Later the opening of the history of Fuzzy Sets Theory, Classification Models and Control Theory has been two essential grounds for their academic and applied progresses. In fact, countless difficulties indoors both arenas are logically formal by presenting fuzzy concepts. In some cases, a fuzzy method looks to offer a useful generalization of a too composite certainty. In a fuzzy classification process, one of the main aims is to combine the information we have obtained about each object. If such information is given by means of degrees of association, we can find in the literature that improver rules and some t-conforms are useful for starting conjunctive instructions. Material is in this way combined into one single index. Later we frequently do not know in advance the number of pieces of information we should collective, traditional methods undertake the actuality of a basic binary operative existence associative, in such a way that a consecutive application of such an operative will give us the combined information, no difficulty the measurement of information. But we know that not each operative is associative.
  • 3. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS) Volume VI, Issue IV, April 2017 | ISSN 2278-2540 www.ijltemas.in Page 172 III. PROPOSED METHODOLOGY Figure 1: System Overview Proposed System Implements Five Phase Algorithmic Procedure to forecast Larceny in Energy Practice founded on Design of electricity usage. Phase 1: Data Reading and Pre-processing: Firstly whole data is been recite from dataset. Parallel process run to on Working out dataset and input Data Set. Only applicable factors are been nominated after input dataset. Phase 2: Fuzzy C-Means Clustering: This Stage Fuzzy C means Clustering is been useful on Both Working out dataset and input data set producing clusters for coming treating. In K- means Centroid are been Prepared for clustering and based on Euclidean distance portion Data points has been clustered. Charted Data is too remained clustered. Phase 3: HMM: A hidden Markov model (HMM) is one in which you see a arrangement of productions, but do not know the order of conditions the typical departed determined to produce the radioactivity. Estimates of hidden Markov models attempt to invention to progress the instruction of conditions since the experiential data. HMM Working HMM assistance in classifying Hidden States in data . In electricity consumption overlooked data of customer no is been recognized created on HMM preparation. Phase 4: Fuzzy Classification: classification approaches agree you to decrease the dimensionality of a compound data set by group the data into a set number of classes. With outdated (crisp) classification methods, each model/position is located into one class or another. In crusty classification, class association is second, a model is a member of a class or not. Crusty class association ideals can be either "1" when that class is the best fit, or "0" (for all other classes). In fuzzy classification, a model can have association in countless dissimilar programs to dissimilar grades. Typically, the association values are inhibited so that all of the membership values for a specific model amount to 1. Phase 5: Consumption Analysis: previous stage in Consumption analysis which recognizes consumption units and recognizes consumption values of user with higher values. 1. Forward Algorithm ______________________________________ // Input : Data Set D, Detected Conditions Os = { Os1 , Os2,Os3} Step 0: Start Step 1: Recognize the Detected state Characteristic Osi Step 2: FOR i=0 to size of D Step 3: Recognize Characteristic Osi and put in discrete Lists’ Step 4: FINISH FOR Step 5: FOR i=0 to size of OSL Step 6: recognize α using equation 1 Step 7: FINISH FOR Step 8: Break Equation1: ∑ Where = Forward Probability O( t+1) = For every next element of Observed state N= Size of the Observed state List = For Every observed state _________________________________ 2.Backward Algorithm __________________________________________ // Input : Data Set D Detected Conditions Os = { Os1 , Os2,Os3} Step 0: Start Step 1: Recognize the Detected state Characteristic Osi Step 2: FOR i=0 to size of D Step 3: Recognize Characteristic Osi and put in discrete list’s
  • 4. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS) Volume VI, Issue IV, April 2017 | ISSN 2278-2540 www.ijltemas.in Page 173 Step 4: FINISH FOR Step 5: FOR i=0 to size of OSL Step 6: recognize β using equation2 Step 7: FINISH FOR Step 8: Stop Equation 2 : ∑ Where = Forward Probability O( t+1) = For every next element of Observed state N= Size of the Observed state List = For Every observed state = Frequency of the occurred state _______________________________________ 4 Fuzzy c-means clustering Algorithm _________________________________________ Let X = {x1, x2, x3 ..., xn} be the set of data points and V = {v1, v2, v3 ..., vc} be the set of centers. 1) Randomly select ‘c’ cluster centers. 2) calculate the fuzzy membership 'µij' using: 3) compute the fuzzy centers 'vj' using: 4) Repeat step 2) and 3) until the minimum 'J' value is achieved or ||U(k+1) - U(k) || < β. Where, ‘k’ is the iteration step. ‘β’ is the termination criterion between [0,1] ‘U = (µij)n*c’ is the fuzzy membership matrix. ‘J’ is the objective function. IV. RESULTS AND DISCUSSIONS Proposed system of Theft Detection System is organized as a individual system using Net beans as development IDE for java technology which is reinforced by java media file structure. Presentation is evaluated constructed on the accuracy and recollection constraints. Accuracy is defined as the ratio of number of related Consumption to the entire amount of related and unrelated related Consumption identified. Relation efficiency of the system is well articulated by using precision parameters. While the recollection can be definite as the ratio of number of related Consumption identification the total figure of related Consumption are noticed not perceived. Complete exactness of the system is fine recounted by using recollection constraints. System can be estimated using accuracy and recollection constraints, and they can be more openly explained as follows • X = The numbers of related Consumption been are noticed, • Y = the number of related Consumption not noticed, and • Z = the number of unrelated Consumption that are been noticed. So, Accuracy = (X/ ( X+ Z))*100 And Recollection = (X/ ( X+ Y))*100 Fig.2. Average precision for Consumption Detection System In Fig. 2, by detecting it is clear that the average precision gained for Consumption Detection System using HMM is almost 68%. Figure3. Shows that the system gives 89.33% recollection for the Consumption method using HMM Fuzzy logic Dissemination. By relating these two graphs we can complete that the system with proposed methodology has higher performance. Fig.3. Average Recall for Consumption Detection System
  • 5. International Journal of Latest Technology in Engineering, Management & Applied Science (IJLTEMAS) Volume VI, Issue IV, April 2017 | ISSN 2278-2540 www.ijltemas.in Page 174 V. CONCLUSION AND FUTURE SCOPE Presented Artifact is Implementation Work on electricity Consumption Analysis Artifact presents invention methods in data mining domain. Presents analytical System which would contribution electricity boards to possible perceive Higher value consumption meters. This Exploration work is decently predictive and hence involves sureness and provision scrutiny .upcoming system can be improved and taken to higher level as product. Computational scrutiny and everyday values have been initiate to be accurate analytical and hence system has large scope of exploration. REFERENCES [1]. Jiacong Li, Ying Wang, Jinke Yu, Shaoyong Guo,” An HMM- based Performance Diagnosis Approach for Hadoop Clusters” The 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) 2016. [2]. Md. Khaliluzzaman and Lamia Iqbal Dolon,”Analyzing MRI Segmentation Based on Wavelet and BEMD using Fuzzy C-Means Clustering” ©2016 IEEE. [3]. Daniele Soria, Jonathan M. Garibaldi,” Validation of a quantifier- based fuzzy classification system for breast cancer patients on external independent cohorts”, © 2016 IEEE DOI 10.1109/ICMLA.2016.176. [4]. DimitriosKoutsoukos*, GeorgiosAlexandridis t, GeorgiosSiolas+, Andreas Stafylopatis,” A new approach to session identification by applying fuzzy c-means clustering on web logs”, ©2016 IEEE.