Enhancing energy savings verification in industrial settings using deep learning and anomaly detection within the IPMVP framework
This study advances industrial energy Measurement and Verification (M&V) practices by integrating Deep Learning (DL) techniques with automated anomaly detection, challenging traditional M&V reliance on manual non-routine adjustments. The research explores whether automated, data-driven anoma...
| Main Authors: | Sukarti, Suziee, Sulaima, Mohamad Fani, Abdul Kadir, Aida Fazliana, Zulkafli, Nur Izyan, Othman, Mohammad Lutfi, Hanak, Dawid P. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier Ltd
2025
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/120176/ http://psasir.upm.edu.my/id/eprint/120176/1/120176.pdf |
Similar Items
Anomaly detection with Attention-based deep autoencoder
by: Yong, Hong Long
Published: (2022)
by: Yong, Hong Long
Published: (2022)
Firefly analytical hierarchy algorithm for optimal allocation and sizing of DG in distribution network
by: Noor Ropidah, Bujal, et al.
Published: (2022)
by: Noor Ropidah, Bujal, et al.
Published: (2022)
Association between isolated external ear malformation and renal anomalies
by: Ismail, Izyan
Published: (2016)
by: Ismail, Izyan
Published: (2016)
Identification of ECG anomalies through deep deterministic learning / Uzair Iqbal
by: Uzair , Iqbal
Published: (2020)
by: Uzair , Iqbal
Published: (2020)
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)
by: Wasswa, Hassan
Published: (2019)
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
by: Suboh, Syahirah, et al.
Published: (2023)
by: Suboh, Syahirah, et al.
Published: (2023)
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
by: Suboh, Syahirah, et al.
Published: (2023)
by: Suboh, Syahirah, et al.
Published: (2023)
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
by: Suboh, Syahirah, et al.
Published: (2023)
by: Suboh, Syahirah, et al.
Published: (2023)
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
by: Suboh, Syahirah, et al.
Published: (2023)
by: Suboh, Syahirah, et al.
Published: (2023)
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
by: Suboh, Syahirah, et al.
Published: (2023)
by: Suboh, Syahirah, et al.
Published: (2023)
A bayesian scene-prior-based deep network model for face verification
by: Wang, H., et al.
Published: (2018)
by: Wang, H., et al.
Published: (2018)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
A systematic review of machine learning and deep learning techniques for anomaly detection in data mining
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Fitness function determination of uav anomaly detection in large data set via pso
by: Fatimah, Daing Jamil
Published: (2022)
by: Fatimah, Daing Jamil
Published: (2022)
Deep carbon cycles constrained by a large-scale mantle Mg isotope anomaly in eastern China
by: Li, S., et al.
Published: (2017)
by: Li, S., et al.
Published: (2017)
Methods and attributes for customer-centric dynamic electricity tariff design: a review
by: Rahman, Tasmeea, et al.
Published: (2024)
by: Rahman, Tasmeea, et al.
Published: (2024)
Improved bacterial foraging optimization algorithm with machine learning-driven short-term electricity load forecasting: a case study in peninsular Malaysia
by: Zaini, Farah Anishah, et al.
Published: (2024)
by: Zaini, Farah Anishah, et al.
Published: (2024)
Deep reconstruction models for image set classification
by: Hayat, M., et al.
Published: (2015)
by: Hayat, M., et al.
Published: (2015)
Design verification on bored pile within Kenny Hill formation via static load test
by: Mohamed, Zalina
Published: (2010)
by: Mohamed, Zalina
Published: (2010)
Verification of RISC-V design with Universal Verification Methodology (UVM)
by: Liew, You Hong
Published: (2022)
by: Liew, You Hong
Published: (2022)
Formal verification of RFID system using model verification agent
by: Lockman, Muhammad Tarmizi
Published: (2012)
by: Lockman, Muhammad Tarmizi
Published: (2012)
Dempster-Shafer for Anomaly Detection
by: Chen, Qi, et al.
Published: (2006)
by: Chen, Qi, et al.
Published: (2006)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Seasonality Anomalies Of Malaysia Revisited
by: Ching, Tan Voon
Published: (2007)
by: Ching, Tan Voon
Published: (2007)
Essays in stock market anomalies
by: Yu, Lin
Published: (2016)
by: Yu, Lin
Published: (2016)
Detection of Cross-Channel Anomalies
by: Pham, DucSon, et al.
Published: (2012)
by: Pham, DucSon, et al.
Published: (2012)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
“Capital investment anomaly” and “Accruals anomaly” : independent or inter-dependent? – evidence from South Asia
by: Abdul Rafay,, et al.
Published: (2017)
by: Abdul Rafay,, et al.
Published: (2017)
Face verification : an introduction
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Introduction to fingerprint verification
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Converters results verifications
by: Ma, Li Ya, et al.
Published: (2011)
by: Ma, Li Ya, et al.
Published: (2011)
Finger vein verification
by: Krishna Veni, Selvan.
Published: (2009)
by: Krishna Veni, Selvan.
Published: (2009)
Measurement of Dosimetric Parameters and Dose Verification in Stereotactic Radiosurgery (SRS)
by: Reduan Abdullah,, et al.
Published: (2015)
by: Reduan Abdullah,, et al.
Published: (2015)
Cultural Competence in Elderly Care within the Clinical Practice Setting
by: Dhadda, Sukdeep
Published: (2014)
by: Dhadda, Sukdeep
Published: (2014)
Investigating the difference in participation in discussion within class and online settings
by: Cooke, Lauren
Published: (2016)
by: Cooke, Lauren
Published: (2016)
Dental anomalies in children: Management and consideration
by: Ismail, Ahmad Faisal
Published: (2018)
by: Ismail, Ahmad Faisal
Published: (2018)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Global anomalies on Lorentzian space-times
by: Schenkel, Alexander, et al.
Published: (2017)
by: Schenkel, Alexander, et al.
Published: (2017)
Neoglacial climate anomalies and the Harappan metamorphosis
by: Giosan, L., et al.
Published: (2018)
by: Giosan, L., et al.
Published: (2018)
Woman monks: an anomaly or a misnomer?
by: Marja-Leena Heikkila-Horn,
Published: (2003)
by: Marja-Leena Heikkila-Horn,
Published: (2003)
Similar Items
-
Anomaly detection with Attention-based deep autoencoder
by: Yong, Hong Long
Published: (2022) -
Firefly analytical hierarchy algorithm for optimal allocation and sizing of DG in distribution network
by: Noor Ropidah, Bujal, et al.
Published: (2022) -
Association between isolated external ear malformation and renal anomalies
by: Ismail, Izyan
Published: (2016) -
Identification of ECG anomalies through deep deterministic learning / Uzair Iqbal
by: Uzair , Iqbal
Published: (2020) -
An optimized feature set for anomaly-based intrusion detection / Wasswa Hassan
by: Wasswa, Hassan
Published: (2019)