• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Jingjie, Nie Lei. Bayesian Current Disaggregation: Sensing the Current Waveforms of Household Appliances Using One Sensor[J]. Journal of Computer Research and Development, 2018, 55(3): 662-672. DOI: 10.7544/issn1000-1239.2018.20150311
Citation: Liu Jingjie, Nie Lei. Bayesian Current Disaggregation: Sensing the Current Waveforms of Household Appliances Using One Sensor[J]. Journal of Computer Research and Development, 2018, 55(3): 662-672. DOI: 10.7544/issn1000-1239.2018.20150311

Bayesian Current Disaggregation: Sensing the Current Waveforms of Household Appliances Using One Sensor

More Information
  • Published Date: February 28, 2018
  • An important application of pervasive computing is to obtain the electricity usage information for each appliance in a household using one sensor. The key problem of this application is current disaggregating, which is to estimate the currents of individual appliances from the total current waveform. Existing methods to solve this problem can be classified into two classes: steady-state estimation methods and linear disaggregating methods. Based on the steady-state load assumption, the methods in the first class estimate the current for a running appliance using its steady-state current waveform. These methods can avoid the interference between appliances. But the results of these methods cannot reflect the real-time changes of the total current. The methods in the second class reduce the dimensions of the current waveforms for a specific appliance using model constraints or data constraints, and disaggregate the total current into the linear spaces with low dimensions. The results of these methods can reflect the real-time change of the total current, but similar appliances reduce the accuracy of disaggregating results. From the perspective of the Bayesian statistics, this paper relaxes the key assumptions of the above methods as the prior of position vectors and the prior of noises, and proposes a Bayesian current disaggregating method based these two priors. Using the electricity usage data generated by actual appliances, we conduct several simulation experiments to evaluate our method. The experiment results show that the accuracy of the proposed method is higher than previous methods. Our method not only reflects the real-time change of the total current, but also reduces the effects of similar appliances on the disaggregating results.
  • Related Articles

    [1]Yang Yongpeng, Jiang Dejun. A Method for Solving the wandering B+ tree Problem[J]. Journal of Computer Research and Development, 2023, 60(3): 539-554. DOI: 10.7544/issn1000-1239.202220555
    [2]Chen Yewang, Shen Lianlian, Zhong Caiming, Wang Tian, Chen Yi, Du Jixiang. Survey on Density Peak Clustering Algorithm[J]. Journal of Computer Research and Development, 2020, 57(2): 378-394. DOI: 10.7544/issn1000-1239.2020.20190104
    [3]Zhang Ming, Hua Yu, Liu Lurong, Hu Rong, Li Ziyi. A Write-Optimized Re-computation Scheme for Non-Volatile Memory[J]. Journal of Computer Research and Development, 2020, 57(2): 243-256. DOI: 10.7544/issn1000-1239.2020.20190524
    [4]Gao Peng, Wang Dongsheng, Wang Haixia. Extending PCM Lifetime by Redirecting Writes from the Most Modified Byte[J]. Journal of Computer Research and Development, 2019, 56(12): 2733-2743. DOI: 10.7544/issn1000-1239.2019.20180267
    [5]Niu Dejiao, He Qingjian, Cai Tao, Wang Jie, Zhan Yongzhao, Liang Jun. APMSS: The New Solid Storage System with Asymmetric Interface[J]. Journal of Computer Research and Development, 2018, 55(9): 2083-2093. DOI: 10.7544/issn1000-1239.2018.20180198
    [6]Cui Yu, Zhang Hongli, Tian Zhihong, and Fang Binxing. Multi-Addresses Amplification DoS Attacks by Native IPv6 and IPv6Tunnels[J]. Journal of Computer Research and Development, 2014, 51(7): 1594-1603.
    [7]Sun Zhizhuo, Zhang Quanxin, Li Yuanzhang, Tan Yu'an, Liu Jingyu, Ma Zhongmei. Write Optimization for RAID5 in Sequential Data Storage[J]. Journal of Computer Research and Development, 2013, 50(8): 1604-1612.
    [8]Hu Chaojian, Li Zhoujun, Guo Tao, Shi Zhiwei. Detecting the Vulnerability Pattern of Writing Tainted Value to Tainted Address[J]. Journal of Computer Research and Development, 2011, 48(8): 1455-1463.
    [9]Qiu Yuanjie and Liu Xinsong. Writing Mechanism in Digital Organism File System[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Huan Dandan, Li Zusong, Hu Weiwu, Liu Zhiyong. A Cache Adaptive Write Allocate Policy[J]. Journal of Computer Research and Development, 2007, 44(2): 348-354.
  • Cited by

    Periodical cited type(0)

    Other cited types(5)

Catalog

    Article views (1168) PDF downloads (768) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return