A method for evaluating options for motif detection in electricity meter data
Investigation of household electricity usage patterns, and matching the patterns to behaviours, is an important area of research given the centrality of such patterns in addressing the needs of the electricity industry. Additional knowledge of household behaviours will allow more effective targeting...
| Main Authors: | Dent, Ian, Craig, Tony, Aickelin, Uwe, Rodden, Tom |
|---|---|
| Format: | Article |
| Published: |
Tingmao Publishing Co.
2018
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/48612/ |
Similar Items
The Motif Tracking Algorithm
by: Wilson, William, et al.
by: Wilson, William, et al.
Finding the creatures of habit: clustering households based on their flexibility in using electricity
by: Dent, Ian, et al.
Published: (2012)
by: Dent, Ian, et al.
Published: (2012)
An approach for assessing clustering of households by electricity usage
by: Dent, Ian, et al.
Published: (2012)
by: Dent, Ian, et al.
Published: (2012)
Application of a clustering framework to UK domestic electricity data
by: Dent, Ian, et al.
by: Dent, Ian, et al.
Variability of behaviour in electricity load profile clustering: who does things at the same time each day?
by: Dent, Ian, et al.
Published: (2014)
by: Dent, Ian, et al.
Published: (2014)
The application of a data mining framework to energy usage profiling in domestic residences using UK data
by: Dent, Ian, et al.
Published: (2011)
by: Dent, Ian, et al.
Published: (2011)
Duplicate bug report detection using clustering
by: Gopalan, Raj, et al.
Published: (2014)
by: Gopalan, Raj, et al.
Published: (2014)
HoneySpam 2.0: profiling web spambot behaviour
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
Deriving knowledge of household behaviour from domestic electricity usage metering
by: Dent, Ian
Published: (2015)
by: Dent, Ian
Published: (2015)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
An improved system for sentence-level novelty detection in textual streams
by: Fu, Xinyu, et al.
Published: (2016)
by: Fu, Xinyu, et al.
Published: (2016)
The genome sequence of the biocontrol fungus Metarhizium anisopliae and comparative genomics of Metarhizium species.
by: Pattemore, J., et al.
Published: (2014)
by: Pattemore, J., et al.
Published: (2014)
A framework for measuring ontology usage on the web
by: Ashraf, Jamshaid, et al.
Published: (2013)
by: Ashraf, Jamshaid, et al.
Published: (2013)
Evolution of codon usage in bacteria
by: Henry, Ian
Published: (2007)
by: Henry, Ian
Published: (2007)
Young consumers' motives for using SMS and perceptions towards SMS advertising
by: Phau, Ian, et al.
Published: (2008)
by: Phau, Ian, et al.
Published: (2008)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011)
by: Wilson, William, et al.
Published: (2011)
Detecting Motifs in System Call Sequences
by: Wilson, William, et al.
Published: (2007)
by: Wilson, William, et al.
Published: (2007)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2007)
by: Wilson, William, et al.
Published: (2007)
Detection of cross channel anomalies from multiple data channels
by: Pham, DucSon, et al.
Published: (2011)
by: Pham, DucSon, et al.
Published: (2011)
Creating personalised energy plans: from groups to individuals using Fuzzy C Means Clustering
by: Dent, Ian, et al.
by: Dent, Ian, et al.
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
by: Jalali, Mehrdad
Published: (2009)
by: Jalali, Mehrdad
Published: (2009)
Patterns of language choice and use among undergraduates of different ethnic groups in a malaysian public university
by: Md. Mostafizar Rahman, Abu Rashed
Published: (2007)
by: Md. Mostafizar Rahman, Abu Rashed
Published: (2007)
A novel vision-based approach for accurate equipment usage detection for energy efficiency and indoor comfort level improvement in office buildings
by: Wei, Shuangyu
Published: (2023)
by: Wei, Shuangyu
Published: (2023)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Measuring player’s behaviour change over time in public goods game
by: Fattah, Polla, et al.
Published: (2016)
by: Fattah, Polla, et al.
Published: (2016)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Empirical analysis of Domain Ontology usage on the Web: eCommerce Domain in focus.
by: Ashraf, Jamshaid, et al.
Published: (2013)
by: Ashraf, Jamshaid, et al.
Published: (2013)
Characterisation of web spambots using self organising maps
by: Hayati, Pedram, et al.
Published: (2011)
by: Hayati, Pedram, et al.
Published: (2011)
Application of Markov Stability for graph-based clustering on protein-protein interaction networks
by: von Holy, Peter
Published: (2023)
by: von Holy, Peter
Published: (2023)
Web user navigation pattern mining approach based on graph partitioning algorithm.
by: Jalali, Mehrdad, et al.
Published: (2008)
by: Jalali, Mehrdad, et al.
Published: (2008)
WebPUM : a web-based recommendation system to predict user future movements.
by: Jalali, Mehrdad, et al.
Published: (2010)
by: Jalali, Mehrdad, et al.
Published: (2010)
Comparison of distance metrics for hierarchical data in medical databases
by: Hassan, Diman, et al.
Published: (2014)
by: Hassan, Diman, et al.
Published: (2014)
Association among vocabulary size, academic achievement, English language proficiency, and language dominance
by: Rahman, Arifur
Published: (2017)
by: Rahman, Arifur
Published: (2017)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Graph clustering, variational image segmentation methods and Hough transform scale detection for object measurement in images
by: Calatroni, Luca, et al.
Published: (2016)
by: Calatroni, Luca, et al.
Published: (2016)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Space opera: a hybrid form of science fiction and fantasy
by: Cupitt, Catherine Anne
Published: (2004)
by: Cupitt, Catherine Anne
Published: (2004)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Similar Items
-
The Motif Tracking Algorithm
by: Wilson, William, et al. -
Finding the creatures of habit: clustering households based on their flexibility in using electricity
by: Dent, Ian, et al.
Published: (2012) -
An approach for assessing clustering of households by electricity usage
by: Dent, Ian, et al.
Published: (2012) -
Application of a clustering framework to UK domestic electricity data
by: Dent, Ian, et al. -
Variability of behaviour in electricity load profile clustering: who does things at the same time each day?
by: Dent, Ian, et al.
Published: (2014)