Results 41 to 50 of about 11,351,001 (331)

A Bayesian Approach to Unsupervised, Non-Intrusive Load Disaggregation. [PDF]

open access: yesSensors (Basel), 2022
Estimating household energy use patterns and user consumption habits is a fundamental requirement for management and control techniques of demand response programs, leading to a growing interest in non-intrusive load disaggregation methods.
Massidda L, Marrocu M.
europepmc   +2 more sources

Situation assessment for non-intrusive recommendation [PDF]

open access: yes2018 12th International Conference on Research Challenges in Information Science (RCIS), 2018
With the rapid growth of mobile applications, the user is increasingly confronted with a lot of information and tend to reject notifications sent by applications installed within his/her mobile device. This rejection affects the performance of many systems, especially proactive recommender systems.
Akermi, Imen, Faiz, Rim
openaire   +2 more sources

Utilising semantic technologies for decision support in dementia care [PDF]

open access: yes, 2013
The main objective of this work is to discuss our experience in utilising semantic technologies for building decision support in Dementia care systems that are based on the non-intrusive on the non-intrusive monitoring of the patient’s behaviour.
Mahmoud, S   +3 more
core   +1 more source

Improving Non-Intrusive Load Disaggregation through an Attention-Based Deep Neural Network

open access: yesEnergies, 2021
Energy disaggregation, known in the literature as Non-Intrusive Load Monitoring (NILM), is the task of inferring the power demand of the individual appliances given the aggregate power demand recorded by a single smart meter which monitors multiple ...
V. Piccialli, A. M. Sudoso
semanticscholar   +1 more source

Non-intrusive scheduling of TCP flows [PDF]

open access: yes2015 IFIP Networking Conference (IFIP Networking), 2015
We investigate how to build a non-intrusive scheduled TCP. For the flows of a given origin-destination pair, the objective is to schedule their TCP segments (according to some desired criteria) without modifying the network bandwidth-share used by these flows, which in turn ensures friendliness with respect to the rest of the network.
Ayesta, Urtzi   +2 more
openaire   +2 more sources

A Scalable Real-Time Non-Intrusive Load Monitoring System for the Estimation of Household Appliance Power Consumption

open access: yesEnergies, 2021
Smart-meter technology advancements have resulted in the generation of massive volumes of information introducing new opportunities for energy services and data-driven business models. One such service is non-intrusive load monitoring (NILM).
Christos Athanasiadis   +3 more
semanticscholar   +1 more source

A Non-intrusive Intelligent Monitoring Method for Elevator State

open access: yesTaiyuan Ligong Daxue xuebao, 2021
A non-intrusive intelligent monitoring method for elevater state was established. In this method, the acceleration signal is initialized by Weiszfeld algorithm, and the acceleration signal is decomposed into vertical component and horizontal component ...
Yu YANG   +4 more
doaj   +1 more source

Non-Contact and Non-Intrusive Add-on IoT Device for Wireless Remote Elevator Control

open access: yesApplied Sciences, 2023
This work proposes an Internet-of-Things (IoT) device for remote elevator control. The new contribution of this proposal to the state-of-the-art is that it can convert a manually operated elevator into a remote controlled elevator without requiring any ...
Elena Rubies   +3 more
doaj   +1 more source

A Multimodal Feature Fusion Framework for Sleep-Deprived Fatigue Detection to Prevent Accidents

open access: yesSensors, 2023
Sleep-deprived fatigued person is likely to commit more errors that may even prove to be fatal. Thus, it is necessary to recognize this fatigue. The novelty of the proposed research work for the detection of this fatigue is that it is nonintrusive and ...
Jitender Singh Virk   +4 more
doaj   +1 more source

$\mu AFL$: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware [PDF]

open access: yesInternational Conference on Software Engineering, 2022
Fuzzing is one of the most effective approaches to finding software flaws. However, applying it to microcontroller firmware incurs many challenges. For example, rehosting-based solutions cannot accurately model peripheral behaviors and thus cannot be ...
Wenqiang Li   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy