2020
DOI: 10.1016/j.comcom.2020.08.024
|View full text |Cite
|
Sign up to set email alerts
|

A secure edge monitoring approach to unsupervised energy disaggregation using mean shift algorithm in residential buildings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…Under the background of the various power acquisition equipment and the rapid development of the Internet of Smart Grids (IoSG), Intelligent equipment is gradually used for load data RT acquisition at various power consumption sides. [1][2][3][4][5] The popularity of smart sockets creates favorable conditions for using edge computing when processing and analyzing a large number of power load data. 6,7 Since the end of the epidemic, the society has resumed business and production, and the load power consumption of the whole society has increased sharply.…”
Section: Introductionmentioning
confidence: 99%
“…Under the background of the various power acquisition equipment and the rapid development of the Internet of Smart Grids (IoSG), Intelligent equipment is gradually used for load data RT acquisition at various power consumption sides. [1][2][3][4][5] The popularity of smart sockets creates favorable conditions for using edge computing when processing and analyzing a large number of power load data. 6,7 Since the end of the epidemic, the society has resumed business and production, and the load power consumption of the whole society has increased sharply.…”
Section: Introductionmentioning
confidence: 99%
“…Machine learning has been applied to identify and disaggregate loads, including SVM [12,26], k-NN [27], DT [7], RF [6], k-means [12], FCM [13], mean-shift [28], etc. In [26], load state transition events are detected heuristically and classified by an SVM model, featuring duration, average power, maximum power and power variance.…”
Section: Introductionmentioning
confidence: 99%
“…However, prior knowledge including the number of clusters is required. For breaking this limitation, Liu et al apply mean-shift algorithm to group the transient states detected based on their magnitudes [28]. Note that small bandwidth is set for guaranteeing NILM performance while increasing convergence duration.…”
Section: Introductionmentioning
confidence: 99%
“…However, HMM-based NILM methods require good quality data to build the models, suffer from noise caused by unknown appliances, and are ineffective for rarely used appliances or appliances that are never used alone [ 8 , 11 , 25 ]. Some other unsupervised methods include: time-series approaches ( e.g., [ 26 ]) that require building a database of time-series signatures necessary for pattern matching; fuzzy-clustering regression trees-based approaches [ 27 , 28 ]; various edge detectors, e.g., mean shift proposed in [ 29 ]; and optimization-based methods [ 30 ] that are limited to small number of appliances. Bonfigli et al [ 31 ] provided an overview of unsupervised NILM methods with performance comparison.…”
Section: Introductionmentioning
confidence: 99%