Bike Sharing Prediction using Deep Neural Networks

Chandrasegar Thirumalai - VIT University, India
Ravisankar Koppuravuri - VIT University, India


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.1.3.30

Abstract


In this paper, we will use deep neural networks for predicting the bike sharing usage based on previous years usage data. We will use because deep neural nets for getting higher accuracy. Deep neural nets are quite different from other machine learning techniques; here we can add many numbers of hidden layers to improve the accuracy of our prediction and the model can be trained in the way we want such that we can achieve the results we want. Nowadays many AI experts will say that deep learning is the best AI technique available now and we can achieve some unbelievable results using this technique. Now we will use that technique to predict bike sharing usage of a rental company to make sure they can take good business decisions based on previous years data.

Keywords


accuracy; artificial intelligence; neural network; deep learning; hidden layer; sharing.

Full Text:

PDF

References


Hinton, G. E., Osindero, S., & Teh, Y.¬W. (2006). A fast learning algorithm for deep belief nets.

Nair, V., & Hinton, G. E. (2010). Rectified Linear Units Improve Restricted Boltzmann Machines

Hinton, G. E., Srivastava, N., Krizhevsky, A., Sutskever, I., & Salakhutdinov, R. R. (2012). Improving neural networks by preventing co-adaptation of feature detectors.

Bengio, Y. and LeCun, Y. Scaling learning algorithms to-wards AI. 2007.

Freund, Y. and Haussler, D. Unsupervised learning of distributions on binary vectors using two layer networks.

Technical report, Santa Cruz, CA, USA, 1994.

Salakhutdinov, R. and Hinton, G. E. Replicated softmax: an undirected topic model. In Advances in Neural In-formation Processing Systems 22, 2009.

Hahnloser, Richard H. R., Seung, H. Sebastian, and Slotine, Jean-Jacques. Permitted and forbidden sets in symmetric threshold-linear networks. Neural Computation,15(3):621–638, 2003. ISSN 0899-7667.

Larochelle, H., Erhan, D., Courville, A., Bergstra, J., and Bengio., Y. An empirical evaluation of deep architectures on problems with many factors of variation. In ICML, pp. 473–480, 2007.

https://archive.ics.uci.edu/ml/datasets/Bike Sharing Dataset

Hauke J., Kossowski T., Comparison of values of Pearson’s and Spearman’s correlation coefficient on the same sets of data. Quaestiones Geographicae 30(2), Bogucki Wydawnictwo Naukowe, Poznań 2011, pp. 87–93, 3 figs, 1 table. DOI 10.2478/v10117-011-0021-1, ISBN 978-83-62662-62-3, ISSN 0137-477X.

Piovani J.I., 2008. The historical construction of correlation as a conceptual and operative instrument for empirical research. Quality & Quantity 42: 757–777.

P. Dhavachelvan, Chandra Segar T, K. Satheskumar, "Evaluation of SOA Complexity Metrics Using Weyuker’s Axioms," IEEE International Advance Computing (IACC), India, pp. 2325 – 2329, March 2009

Halstead Metric for Intelligence, Effort, Time predictions, DOI:10.13140/RG.2.2.17988.42881

Fisher R.A., 1921. On the “probable error†of a coefficient of correlation deduced from a small sample. Metron 1: 3–32.

Spearman C.E, 1904b. General intelligence, objectively determined and measured. American Journal of Psychology 15: 201–293.

Software metric Numerical Data analysis using Box plot and control chart methods, VIT University, DOI:10.13140/RG.2.2.27422.95041

Vaishnavi B, Karthikeyan J, Kiran Yarrakula, Chandrasegar Thirumalai, “An Assessment Framework for Precipitation Decision Making Using AHPâ€, International Conference on Electronics and Communication Systems (ICECS), IEEE & 978-1-4673-7832-1, Feb. 2016

Griffith D.A., 2003. Spatial autocorrelation and spatial filtering. Springer, Berlin.

Chandrasegar Thirumalai, Senthilkumar M, “An Assessment Framework of Intuitionistic Fuzzy Network for C2B Decision Makingâ€, International Conference on Electronics and Communication Systems (ICECS), IEEE & 978-1-4673-7832-1, Feb. 2016

Rodgers J.L. & Nicewander W.A., 1988. Thirteen ways to look at the correlation coefficient. The American Statistician 42 (1): 59–66.

F. Fioravanti, P. Nesi, “A method and tool for assessing object-oriented projects and metrics management,†Journal of Systems and Software, Volume 53, Issue 2, 31 August 2000, Pages 111-136

Galton F., 1875. Statistics by intercomparison. Philosophical Magazine 49: 33–46

Chandrasegar Thirumalai, Viswanathan P, “Diophantine based Asymmetric Cryptomata for Cloud Confidentiality and Blind Signature applications,†JISA, Elsevier, 2017.

Galton F., 1877. Typical laws of heredity. Proceedings of the Royal Institution 8: 282–301.

Chandrasegar Thirumalai, Sathish Shanmugam, “Multi-key distribution scheme using Diophantine form for secure IoT communications,†IEEE IPACT 2017.

Galton F., 1888. Co-relations and their measurement, chiefly from anthropometric data. Proceedings of the Royal Society of London 45: 135–145.

Chandrasegar Thirumalai, Senthilkumar M, “Spanning Tree approach for Error Detection and Correction,†IJPT, Vol. 8, Issue No. 4, Dec-2016, pp. 5009-5020.

Galton F., 1890. Kinship and correlation. North American Review 150: 419–431.

Chandrasegar Thirumalai, Senthilkumar M, “Secured E-Mail System using Base 128 Encoding Scheme,†International journal of pharmacy and technology, Vol. 8 Issue 4, Dec. 2016, pp. 21797-21806.

Yule G.U., 1897a. On the significance of Bravais’ formulae for regression, in the case of skew correlation. Proceedings of the Royal Society of London Ser. A 60: 477–489

Chandramowliswaran N, Srinivasan.S and Chandra Segar.T, “A Note on Linear based Set Associative Cache address System†International J. on Computer Science and Engg. (IJCSE) & India, Engineering Journals & 0975-3397, Vol. 4 No. 08 / pp. 1383-1386 / Aug. 2012.

T Chandra Segar, R Vijayaragavan, “Pell's RSA key generation and its security analysis,†in Computing, Communications and Networking Technologies (ICCCNT) 2013, pp. 1-5

Chandrasegar Thirumalai, Senthilkumar M, Vaishnavi B, “Physicians Medicament using Linear Public Key Crypto System,†in International conference on Electrical, Electronics, and Optimization Techniques, ICEEOT, IEEE & 978-1-4673-9939-5, March 2016.

Chandrasegar Thirumalai, “Physicians Drug encoding system using an Efficient and Secured Linear Public Key Cryptosystem (ESLPKC),†International journal of pharmacy and technology, Vol. 8 Issue 3, Sep. 2016, pp. 16296-16303

E Malathy, Chandra Segar Thirumalai, "Review on non-linear set associative cache design," IJPT, Dec-2016, Vol. 8, Issue No.4, pp. 5320-5330

“DDoS: Survey Of Traceback Methodsâ€, International Joint Journal Conference in Engineering 2009, ISSN 1797-9617.

Chandrasegar Thirumalai, Senthilkumar M, Silambarasan R, Carlos Becker Westphall, “Analyzing the strength of Pell’s RSA,†IJPT, Vol. 8 Issue 4, Dec. 2016, pp. 21869-21874.

Chandramowliswaran N, Srinivasan.S and Chandra Segar T, “A Novel scheme for Secured Associative Mapping†The International J. of Computer Science and Applications (TIJCSA) & India, TIJCSA Publishers & 2278-1080, Vol. 1, No 5 / pp. 1-7 / July 2012

Chandrasegar Thirumalai, “Review on the memory efficient RSA variants,†International Journal of Pharmacy and Technology, Vol. 8 Issue 4, Dec. 2016, pp. 4907-4916.

Vinothini S, Chandra Segar Thirumalai, Vijayaragavan R, Senthil Kumar M, “A Cubic based Set Associative Cache encoded mapping,†International Research Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 02 May -2015

Chandrasegar Thirumalai, Himanshu Kar, “Memory Efficient Multi Key (MEMK) generation scheme for secure transportation of sensitive data over Cloud and IoT devices,†IEEE IPACT 2017.

M.Senthilkumar, T.Chandrasegar, M.K. Nallakaruppan, S.Prasanna, “A Modified and Efficient Genetic Algorithm to Address a Travelling Salesman Problem,†in International Journal of Applied Engineering Research, Vol. 9 No. 10, 2014, pp. 1279-1288

Nallakaruppan, M.K., Senthil Kumar, M., Chandrasegar, T., Suraj, K.A., Magesh, G., “Accident avoidance in railway tracks using Adhoc wireless networks,†2014, IJAER, 9 (21), pp. 9551-9556.

Ji, S., Xu, W., Yang, M., & Yu, K. (2013). 3D convolutional neural networks for human action recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(1), 221–231.