2019 IST-Africa Week Conference (IST-Africa) 2019
DOI: 10.23919/istafrica.2019.8764818
|View full text |Cite
|
Sign up to set email alerts
|

IoT based Appliances Identification Techniques with Fog Computing for e-Health

Abstract: To improve the living standard of urban communities and to render the healthcare services sustainable and efficient, e-health system is experiencing a paradigm shift. Patients with cognitive discrepancies can be monitored and observed through the analyses of power consumption of home appliances. This paper surveys recent trends in home-based e-health services using metered energy consumption data. It also analyses and summarizes the constant impedance, constant current and constant power (ZIP) approaches for l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…The advantage of the presented work is that the utility company can further improve the DR programs targeting specific consumers. In addition, appliance identification when coupled with user behavior can be used to provide better health services, particularly for the elderly [53,54].…”
Section: Discussionmentioning
confidence: 99%
“…The advantage of the presented work is that the utility company can further improve the DR programs targeting specific consumers. In addition, appliance identification when coupled with user behavior can be used to provide better health services, particularly for the elderly [53,54].…”
Section: Discussionmentioning
confidence: 99%
“…165 It refers to the continuous power data collection at the edge layer, which then transmits the data to a gateway acting as a fog platform. 166 Moreover, NILM algorithms are processed at the gateway stage, where computing resources are available. • P3.…”
Section: Computing Platforms (P)mentioning
confidence: 99%
“…Fog computing architecture : Data preprocessing and NILM modules are implemented in the middle layer located between the edge and cloud layers 165 . It refers to the continuous power data collection at the edge layer, which then transmits the data to a gateway acting as a fog platform 166 . Moreover, NILM algorithms are processed at the gateway stage, where computing resources are available. P3.…”
Section: Applications Of Nilm and Its Commercial Perspectivesmentioning
confidence: 99%
“…In addition, a Hybrid Dynamic Quantization approach for finding out how to hash has been proposed; studies show that other quantization methods are beaten by DAQ [9]. Kelati et al [10] have discussed recent advances in metered energy usage knowledge in locally formed administrations. It also studies and analyzes interference, reliable existing, and effective force strategies that demonstrate stable load.…”
Section: Literature Studymentioning
confidence: 99%