Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods 2017
DOI: 10.5220/0006247006690675
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection for an Elderly Person Watching System using Multiple Power Consumption Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…To demonstrate how SEPAD achieves a high degree of anomaly detection in monitoring the power consumption data and detects anomalies according to the electricity usage habits of residents, we compared SEPAD to three other detectors, based on two parameters: accuracy and training cost and speed. We compared SEPAD against the results of Nagi et al [12], Chou and Telaga [22], and Hori et al [27] 2.…”
Section: Comparison Results and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…To demonstrate how SEPAD achieves a high degree of anomaly detection in monitoring the power consumption data and detects anomalies according to the electricity usage habits of residents, we compared SEPAD to three other detectors, based on two parameters: accuracy and training cost and speed. We compared SEPAD against the results of Nagi et al [12], Chou and Telaga [22], and Hori et al [27] 2.…”
Section: Comparison Results and Evaluationmentioning
confidence: 99%
“…However, the detecting speed and training cost are not discussed in this work. Hori et al [27] introduced a power consumption-based home health monitoring system in which a kNN model was used to monitor anomalies in real time. By dividing time into different time zones, a larger anomaly score in a specific time zone may indicate the occurrence of abnormal events.…”
Section: Related Workmentioning
confidence: 99%
“…IoT Device Utility or Communication Data Activity detection [1,2,4,[11][12][13][14], [6][7][8][9] * [16][17][18][19][20][21] Anomaly detection [3,5,10], [6][7][8][9] * [22][23][24][25][26][27][28][29] * Studies that used both analysis methods.…”
Section: Methodsmentioning
confidence: 99%
“…Communication usage data processed from call detail records (CDRs) are used to find call patterns and location movements [ 20 , 21 ]; Anomaly detection-based: It checks whether an abnormality exceeding a specific threshold has occurred. Various techniques such as Bayesian networks, support vector machines, nearest neighbors, clustering, hidden Markov models (HMMs), and neural networks have been applied to detect such anomalies [ 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 ]. …”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation