<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">The Development of the Information System for Anomality Detection in the Utility Meters Data Using Self-Organized Maps</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Ivan</forename><surname>Azarov</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">North Caucasus Federal University</orgName>
								<address>
									<addrLine>2 Kulakova str</addrLine>
									<postCode>355029</postCode>
									<settlement>Stavropol</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Roman</forename><surname>Voronkin</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">North Caucasus Federal University</orgName>
								<address>
									<addrLine>2 Kulakova str</addrLine>
									<postCode>355029</postCode>
									<settlement>Stavropol</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ilya</forename><surname>Chaika</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">North Caucasus Federal University</orgName>
								<address>
									<addrLine>2 Kulakova str</addrLine>
									<postCode>355029</postCode>
									<settlement>Stavropol</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alena</forename><surname>Lyurova</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">North Caucasus Federal University</orgName>
								<address>
									<addrLine>2 Kulakova str</addrLine>
									<postCode>355029</postCode>
									<settlement>Stavropol</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Michail</forename><surname>Kotlov</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">North Caucasus Federal University</orgName>
								<address>
									<addrLine>2 Kulakova str</addrLine>
									<postCode>355029</postCode>
									<settlement>Stavropol</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">The Development of the Information System for Anomality Detection in the Utility Meters Data Using Self-Organized Maps</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">72C58E2CB45A1ACCFE8C7AB75E997429</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T05:32+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Neural networks</term>
					<term>self-organized map (SOM)</term>
					<term>information system</term>
					<term>energy efficiency</term>
					<term>energy saving</term>
					<term>commercial accounting</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this article, a project has been developed for the modernization of the data analysis technology of the system for accounting for the consumption of utility resources. The need to improve the system is due to insufficient efficiency in identifying the facts of unaccounted consumption of utility resources. Automation of data analysis processes will be based on the development of an artificial neural network. A feedforward network based on a multilayer perceptron and consisting of 1 hidden layer was chosen as a model. The backpropagation algorithm was chosen as the method for training the neural network.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>In the context of the accelerating growth of global energy consumption with a volume of non-renewable energy resources on Earth real reduction, one of the most urgent problems is the problem of energy efficiency and energy conservation. Thus, the priority goals of modern motherland and global energy policy have become the achievement of maximum energy efficiency and worldwide energy saving. <ref type="bibr" target="#b0">[1]</ref>.</p><p>Manual analysis of large volumes of information on the consumption of communal resources by the population in the monitored area will lead to significant losses for both consumers and resource supplying organizations.</p><p>In this regard, in the field of housing and communal services, the issue of organizing reliable and timely detection of energy losses has arisen. One of the ways to solve this problem is to analyze the readings of metering devices.</p><p>The analysis of the meter readings provided by the consumer by the management company consists of: 1. checking the status of individual and general metering devices, the fact of their presence or absence; 2. checking the reliability of the meter readings provided by the consumer by checking them with the readings of the corresponding meter at the time of the check;</p><p>3. providing of reports on detection of unauthorized or unaccounted consumption of utility resources to the department of housing and communal services management.</p><p>The main purpose of the analysis of the meter readings provided by the consumer is to identify the facts of unauthorized or unaccounted consumption of utility resources, in order to increase control over the consumption of utility resources in apartment buildings. YRID-2020: International Workshop on Data Mining and Knowledge Engineering, October 15-16, 2020, Stavropol, Russia EMAIL: azarov8282@mail.ru (Ivan Azarov); roman.voronkin@gmail.com (Roman Voronkin); igull98@mail.ru (Ilya Chaika); a8923719125@yandex.ru (Alena Lyurova); mikhailits161@yandex.ru (Michail Kotlov) ORCID: 0000-0002-6810-8152 (Ivan Azarov); 0000-0002-7345-579X (Roman Voronkin); 0000-0003-4448-8901 (Ilya Chaika); 0000-0003-4005-4399 (Alena Lyurova); 0000-0001-5114-1012 (Michail Kotlov) CEUR Workshop Proceedings (CEUR-WS.org)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Formulation of the problem</head><p>Nowadays, the system for analyzing the consumption of utility resources is imperfect and has a number of problems, one of which is the determination of the time and location of the leak.</p><p>The analysis of meter readings based on checking the deviations of the total volume of apartment meter readings from the general house meter readings. Figure <ref type="figure" target="#fig_1">1</ref> shows a context diagram showing the business process of analyzing the commercial accounting of utility resources.  Modern technology for analyzing meter readings has a number of disadvantages:</p><p> comparison of the "output indicators" available from the supplier of resources with the "input indicators" available to the consumer is carried out in manual mode, which is extremely rarely carried out in terms of efficiency, therefore, there is no reliable analysis of network losses and the need for their modernization;</p><p> time is spent on preparing and searching for the necessary data;  manual processing of information leads to numerous errors;</p><p> lack of universal presentation of information;  high complexity of information processing;  imperfect organization of collection and registration of initial information;  a large volume of paper workflow;  the identification of emergency situations does not occur immediately, and the bills for excess costs fall on the shoulders of management companies;</p><p> insufficient data to analyze network losses and assess the need for their modernization;  high complexity of information processing. All of these shortcomings form a problem associated with the loss of information about the consumed utility resources. Suppliers are paid for the entire amount of resources provided, and consumers are paid only for the amount they have consumed. As a result, utility tariffs for the population are overstated.</p><p>To improve the organization of business processes, the task was set to automate the analysis of commercial accounting data for the consumption of utility resources. This task includes the following points:</p><p> modernize the processing and analysis of meter readings. This task belongs to the class of tasks "data analysis". Data analysis is currently not fully carried out in this area. All discrepancies identified in the readings of general house meters and in total individual, ones are distributed equally among all consumers of a given object.</p><p> create a mechanism for identifying the facts of leakage or theft of resources.</p><p>The created subsystem must meet the following requirements:  analysis of the amount of consumed resources;  identification of the facts of leakage and theft of energy resources;  generating reports.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Method</head><p>The entire technological process can be subdivided into the processes of collecting and entering initial data into the computing system, the processes of placing and storing data in the system memory, processing data in order to obtain results and processes for issuing data in a form that is convenient for the user to perceive. Data collection and recording operations are carried out using various means.</p><p>The subsystem for analyzing the consumption of information of utility resources uses an automatic method of collecting information. In the developed software and hardware complex for energy accounting, the technological process of collecting information by submitting data to the system automatically, i.e. as soon as new information appeared in the system of accounting for the consumption of utility resources, at that moment they enter the neural network and undergo analysis.</p><p>The analysis subsystem will include tools for creating, training, saving and loading an artificial neural network. With the help of this subsystem, it will be possible to create a multilayer artificial neural network and train it by the method of back propagation of an error.</p><p>A simple analysis algorithm calculates a certain average value and looks for deviations on its basis, but, in this case, for different cities, seasons and other conditions, it would be necessary to change the algorithm or provide for all possible scenarios, which is not always possible to do. To achieve greater flexibility, they use processes of classification and clustering, allowing to fully perform the required information processing, for its subsequent analysis by a specialist <ref type="bibr" target="#b17">[18]</ref>.</p><p>To solve this problem, data clustering algorithms are well suited, since the task itself boils down to searching for anomalies. If we divide all the data coming from metering devices into clusters, then those data that do not fall into any cluster will be considered anomalous.</p><p>Consider various machine-learning methods that allow you to cluster information, both based on existing precedents and with the help of specialists. Also considered are clustering algorithms based on structural, metric and probabilistic approaches.</p><p>The K-means method is used to select groups of objects in the economy, in data analysis, and in information retrieval systems. The k-means method is used to cluster data based on an algorithm for dividing a vector space into a predetermined number of clusters k. The advantage of the algorithm is speed and ease of implementation. The disadvantage of the algorithm is the uncertainty in the choice of the initial cluster centers, and this algorithm has a relatively long runtime when applied to large databases.</p><p>The PAM (partitioning around medoids) algorithm is similar to the k-means algorithm, only when the algorithm works, the objects are redistributed relative to the median of the cluster, not its center <ref type="bibr" target="#b18">[19]</ref>. The main disadvantage of this algorithm is the limitation on the amount of data.</p><p>The hierarchical clustering method is used in collecting statistical data and is implemented in statistical packages. Also used for clustering text documents. The algorithms CURE (Clustering Using REpresentatives) and BIRCH (Balanced Iterative Reducing and Clustering using Hierarchies) are used to cluster very large sets of numeric data, but they need to set threshold values, and the latter is able to select only spherical clusters.</p><p>The Fuzzy C-means algorithm allows for the classification of large sets of numerical data. The method of fuzzy clustering of C-means can be considered as an improved method of k-means, in which for each element from the set under consideration the degree of its belonging to each of the clusters is calculated. The method of fuzzy clustering of C-means has limited application due to a significant drawback -the impossibility of correct partitioning into clusters, in the case when the clusters have different variances in different dimensions (axes), and has great computational complexity.</p><p>In <ref type="bibr" target="#b16">[17]</ref>, it is shown that the Kohonen network gives better performance compared to the K-means method, has high accuracy, as well as minimal computation time for the same data set and parameters.</p><p>To solve the problem of searching for anomalies, the Kohonen neural network was chosen, which learns without a teacher. The main advantage of the network is that there is no need to keep all processed data in the computer's RAM. The second important advantage will be high resistance to noisy data, that is, possible small deviations that erode clusters will not be considered anomalies.</p><p>This type of neural network operates on a winner-take-all basis.</p><p>The most interesting property of Kohonen networks is self-organization, namely, the repetition of objects in an N-dimensional space. "Regular" one-dimensional Kohonen networks are used for data clustering, multi-dimensional Kohonen networks can be used for image recognition.</p><p>Kohonen network training contains a number of parameters, such as a function of the learning rate, an algorithm for initializing neuron weights, optimization methods, the choice of which significantly affects the training result. </p><p>Let us calculate the cluster radius: r= ∑ ( ) ( ) Euclidean distance.</p><p>The next step is to calculate the rms deviation in the training set:</p><p>( ) , where √∑ ( ) .</p><p>(2)</p><p>This concludes the preliminary calculations. The values c, r, σ are saved to the database and can be used later. To improve the accuracy of detecting anomalies, formulas <ref type="bibr" target="#b6">(7)</ref> and ( <ref type="formula">8</ref>) are recalculated for the full set of objects. All vectors supplied to the input of the algorithm must be normalized. Anomalies are detected as follows: if the following condition is satisfied for some normalized vector v from the complete set of objects: d(v, c) &gt; r + 2‖ ‖, <ref type="bibr" target="#b8">(9)</ref> then the object corresponding to the vector v is an anomaly.</p><p>The number of clusters into which to split the input sample depends on the network hyperparameters. The issue of choosing the number of clusters requires additional study before implementing a neural network.</p><p>Kohonen's network will recognize clusters in the training data and assign all data to one cluster or another. If, after that, the network encounters a dataset that is not similar to any of the known samples, then it will not be able to classify such a dataset and thus reveal its anomalousness.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Design results</head><p>Figure <ref type="figure" target="#fig_4">5</ref> shows a diagram of the decomposition of the main business process "AS TO-BE" of the technology for analyzing meter readings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 4: Context diagram</head><p>If there is an information subsystem for analyzing the consumption of utility resources, the controller no longer needs to walk around the apartments to verify the readings. Also, when using this subsystem, not only facts about the leak and the amount of energy resources will be highlighted, but also the places where the leak occurred.</p><p>The process of functioning of an information system is a purposeful transformation of input information into output information. Information in the system passes through several software components. The diagram shown in figure <ref type="figure">6</ref> shows all the developed modules and the relationships between them. Sources of receipt of operational and conditionally permanent information is the system for recording the readings of water, gas, and electricity meters. Primary information is calculated indicators on the volumes of supplied utilities.</p><p>The resulting documents will be a report on the revealed facts of leakage or theft of resources. Information input and display of result data performed automatically. In addition, the formation of reportingthrough forms, which are the main interactive means of the program user.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>The first advantage of the developed system is its flexibility, provided by the use of a neural network as an analysis system. This system is suitable for use in different conditions, it is able to take into account the specifics of a given city or settlement. In addition, this system is more adaptive in comparison with the classical algorithms for analyzing the readings of utility meters and has the property of scalability. However, the advantages of the project also lead to its disadvantages: the use of a neural network presupposes at least basic knowledge of the principles of its operation, has a relatively higher complexity, and also cannot be used immediately after its implementation and requires time and a relatively large amount of data for training. ... Application of the developed information system is associated with the following economic advantages:</p><p> reduction of costs for manual processing of readings from meters  reduction of personnel labor costs  availability of automated functionality to identify the facts of emergencies, leaks or theft of resources;  availability of a system for automatic forecasting of resource consumption.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>2020</head><label></label><figDesc>Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Context diagram</figDesc><graphic coords="2,72.95,151.10,449.30,207.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Detailing the context diagram (IDEF0 -AS-IS)</figDesc><graphic coords="2,63.95,411.35,467.30,246.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Diagram of the Kohonen network</figDesc><graphic coords="4,159.65,398.22,276.00,220.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Diagram of the information subsystem functioning</figDesc><graphic coords="6,64.10,56.65,466.90,270.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="5,63.95,393.25,467.30,198.70" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Artificial neural networks</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">V</forename><surname>Kalitin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Electronic resource]: tutorial / Kalitin DV -Electron</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>Misis Publishing House</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page">88</biblScope>
		</imprint>
	</monogr>
	<note>Text data</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Introduction to neural networks [Electronic resource]: guidelines for laboratory work in the discipline</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Sedov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information systems and technologies&quot; / Sedov VA, Sedova NA -Electron. Text data</title>
				<meeting><address><addrLine>Saratov</addrLine></address></meeting>
		<imprint>
			<publisher>IP Er Media</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page">30</biblScope>
		</imprint>
	</monogr>
	<note>Neuroinformatics&quot; for students of the specialty 09.03.02</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Neural networks [Electronic resource</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">I</forename><surname>Citizen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">textbook / EI citizen -Electron</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page">84</biblScope>
		</imprint>
		<respStmt>
			<orgName>Samara ; Volga State University of Telecommunications and Informatics</orgName>
		</respStmt>
	</monogr>
	<note>Text data</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Fuzzy sets and neural networks</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">E</forename><surname>Yakhyaeva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">tutorial / Yakhyaeva GE -Electron</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>IPR Media</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page">315</biblScope>
		</imprint>
		<respStmt>
			<orgName>Internet University of Information Technologies (INTUIT)</orgName>
		</respStmt>
	</monogr>
	<note>Electronic resource. Text data</note>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Neural networks and deep learning: a brief introduction 06</title>
		<author>
			<persName><forename type="first">Adrian</forename><surname>Iustin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Georgevici</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Marius</forename><surname>Terblanche</surname></persName>
		</author>
		<idno type="DOI">10.1007/s00134-019-05537-w#article-info</idno>
		<imprint>
			<date type="published" when="2019-02">February 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Dynamic mortality risk predictions in pediatric critical care using recurrent neural networks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Aczon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ledbetter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gunny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Flynn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Williams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Wetzel</surname></persName>
		</author>
		<idno>Arxiv 1701.06675</idno>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A case study on sepsis using pubmed and deep learning for ontology learning</title>
		<author>
			<persName><forename type="first">Arguello</forename><surname>Casteleiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Maseda</forename><surname>Fernandez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Demetriou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Read</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Fernandez-Prieto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Des</forename><surname>Diz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Nenadic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Keane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Stevens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Informat Health</title>
		<imprint>
			<biblScope unit="volume">235</biblScope>
			<biblScope unit="page" from="516" to="520" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Continuous state-space models for optimal sepsis treatment -a deep reinforcement learning approach</title>
		<author>
			<persName><forename type="first">A</forename><surname>Raghu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Komorowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Celi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Szolovits</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ghassemi</surname></persName>
		</author>
		<idno>Arxiv 1705.08422</idno>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The artificial intelligence clinician learns optimal treatment strategies for sepsis in intensive care</title>
		<author>
			<persName><forename type="first">M</forename><surname>Komorowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Celi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Badawi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Gordon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Faisal</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Nat Med</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="1716" to="1720" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Introduction to neural networks</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Barsky</surname></persName>
		</author>
		<idno>-357</idno>
		<ptr target="http://www.iprbookshop.ru/89426.html.-EBS" />
	</analytic>
	<monogr>
		<title level="m">textbook / Barsky AB -Electron</title>
				<meeting><address><addrLine>Moscow; Saratov</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
		<respStmt>
			<orgName>Internet University of Information Technologies (INTUIT), IPR Media</orgName>
		</respStmt>
	</monogr>
	<note>Electronic resource. Text data</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Improving palliative care with deep learning</title>
		<author>
			<persName><forename type="first">A</forename><surname>Avati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Jung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Harman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Downing</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">H</forename><surname>Shah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2017 IEEE international conference on bioinformatics and biomedicine (BIBM)</title>
				<meeting><address><addrLine>Kansas City</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="311" to="316" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Mapping patient trajectories using longitudinal extraction and deep learning in the MIMIC-III critical care database</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Beaulieu-Jones</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Orzechowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Moore</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Biorxiv</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page">177428</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Automated 5-year mortality prediction using deep learning and radiomics features from chest computed tomography</title>
		<author>
			<persName><forename type="first">G</forename><surname>Carneiro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Oakden-Rayner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Bradley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Nascimento</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Palmer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 14th international symposium on biomedical imaging (ISBI 2017)</title>
				<meeting><address><addrLine>Melbourne</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017. 2017</date>
			<biblScope unit="page" from="130" to="134" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Deep learning for healthcare: review, opportunities and challenges</title>
		<author>
			<persName><forename type="first">R</forename><surname>Miotto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">T</forename><surname>Dudley</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Brief Bioinform</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1236" to="1246" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Applications of deep learning in biomedicine</title>
		<author>
			<persName><forename type="first">P</forename><surname>Mamoshina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vieira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Putin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zhavoronkov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mol Pharm</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="1445" to="1454" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">training of artificial neural networks computer science</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Chizhkov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>Publishing house of the Southern Federal University</publisher>
		</imprint>
		<respStmt>
			<orgName>computer technology and engineering education / A.V. Chizhkov -Rostov</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Comparative Analysis of K-Means and Kohonen SOM data mining algorithms based on student behaviors in sharing information on facebook</title>
		<author>
			<persName><forename type="first">Gurpreet</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Amandeep</forename><surname>Kaur</surname></persName>
		</author>
		<idno>Page No. 20990-20993</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal Of Engineering And Computer Science</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2017-04">April 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Tyukachev review of the main methods of classification and clustering of data / Voronezh State University</title>
		<author>
			<persName><forename type="first">S</forename><surname>Tcherezov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Development of a model for detecting security incidents in event flows from various components in a network of telecommunication service providers</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">I</forename><surname>Parfenov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Bolodurina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Lapina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IOP Conference Series: Materials Science and Engineering</title>
		<imprint>
			<biblScope unit="volume">873</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">12020</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
