2017
DOI: 10.1016/j.apenergy.2016.10.040
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Signature-based Iterative Disaggregation algorithm for Non-Intrusive Load Monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
75
0
6

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 131 publications
(86 citation statements)
references
References 34 publications
0
75
0
6
Order By: Relevance
“…After the disaggregation process, single-use events could be categorized by clustering analysis or any other classification algorithm [15]. Similar methodologies have already been used in other fields, like non-intrusive electric load data disaggregation [26][27][28][29]. As an example of the results that can be achieved by these techniques, Figure 10 shows the findings for one of the most complex households, HH-06 of R1, showing an indoor leak and a high average daily consumption.…”
Section: Resultsmentioning
confidence: 99%
“…After the disaggregation process, single-use events could be categorized by clustering analysis or any other classification algorithm [15]. Similar methodologies have already been used in other fields, like non-intrusive electric load data disaggregation [26][27][28][29]. As an example of the results that can be achieved by these techniques, Figure 10 shows the findings for one of the most complex households, HH-06 of R1, showing an indoor leak and a high average daily consumption.…”
Section: Resultsmentioning
confidence: 99%
“…As a baseline NILM approach, we consider a data-driven energy disaggregation methodology without the use of SS techniques, adopted in several publications found in the literature [39,[43][44][45][46]. The baseline NILM consists of preprocessing of the aggregated signal P agg , then decomposition of the sequence of frames to a sequence of feature vectors followed by processing from a classification/regression algorithm using pre-trained appliances' models to determine device operation as shown in Fig.…”
Section: Baseline Nilm Architecturementioning
confidence: 99%
“…Perhaps, the biggest challenge of NILM is not technology but privacy [10,17]. Scalability is to be allowed while minimizing the expenses of sensor installation, data collection/analysis, and privacy protection [30]. This study considered privacy issues from two perspectives.…”
Section: Contribution and Limitationmentioning
confidence: 99%