We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 26 results
  1. Pre-trained non-intrusive load monitoring model for recognizing activity of daily living

    Non-intrusive load monitoring (NILM) is a technology that analyzes total electricity consumption data to determine whether a specific type of...

    Gyubaek Kim, Sanghyun Park in Applied Intelligence
    Article 27 August 2022
  2. A framework for low cost, ubiquitous and interactive smart refrigerator

    Internet of Things (IoT) and Artificial Intelligence (AI)-enabled technologies are essential in develo** innovative environments and intelligent...

    Sona Mundody, Ram Mohana Reddy Guddeti in Multimedia Tools and Applications
    Article 05 July 2023
  3. Nonexclusive Classification of Household Appliances by Fuzzy Deep Neural Networks

    Fuzzy classification is a very useful tool for managing the uncertainty in a classification problem with non-mutually exclusive classes, whose values...
    Federico Succetti, Antonello Rosato, Massimo Panella in Applied Intelligence and Informatics
    Conference paper 2022
  4. Towards efficient human–machine interaction for home energy management with seasonal scheduling using deep fuzzy neural optimizer

    Maintaining the records of domestic consumers’ electricity consumption patterns is very complex task for the utilities, especially for extracting the...

    Sakeena Javaid, Nadeem Javaid, ... Muhammad Shahid Anwar in Cognition, Technology & Work
    Article 15 June 2023
  5. Securing Workloads on VMWare Cloud on AWS

    This chapter provides the basic understanding on how VMware NSX is integrated into VMware Cloud on AWS to deliver the virtual networking features...
    Christophe Lombard in VMware Cloud on AWS
    Chapter 2023
  6. On the non-intrusive extraction of residents’ privacy- and security-sensitive information from energy smart meters

    Energy smart meters have become very popular in monitoring and smart energy management applications. However, the acquired measurements except the...

    Pascal Alexander Schirmer, Iosif Mporas in Neural Computing and Applications
    Article 04 January 2021
  7. Towards effective urban region-of-interest demand modeling via graph representation learning

    Identifying the region’s functionalities and what the specific Point-of-Interest (POI) needs is essential for effective urban planning. However, due...

    Pu Wang, **gya Sun, ... Lei Zhao in Data Mining and Knowledge Discovery
    Article 03 July 2024
  8. Towards personalized control of things using Arabic voice commands for elderly and with disabilities people

    Considering recent smart home solutions that automate home appliances through voice commands, elderly people and/or with special needs prefer using...

    Abdelrahman Salah, Ghada Adel, ... Sherin M. Moussa in International Journal of Information Technology
    Article 15 December 2023
  9. Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain

    In recent years, the transitioning of conventional power grid system into the smart grid infrastructure has made the power distribution network more...
    Soumyadyuti Ghosh, Urbi Chatterjee, ... Soumyajit Dey in Applied Cryptography and Network Security Workshops
    Conference paper 2021
  10. Privacy and Tracking

    In order for ubiquitous computing to realize its full potential, it is necessary for service providers to detect the presence of user devices to...
    Markus Jakobsson, Arthur Jakobsson in Security, Privacy and User Interaction
    Chapter 2020
  11. Organisational Security Dependent on Individual Privacy

    The global proliferation of cloud computing, smart homes, the internet of things and machine learning requires a novel view on the flow of...

    Vitalian Danciu in SN Computer Science
    Article Open access 18 June 2020
  12. Let’s Cook: An Augmented Reality System Towards Develo** Cooking Skills for Children with Cognitive Impairments

    Although activities of daily living are often difficult for individuals with cognitive impairments, their autonomy and independence can be fostered...
    Eleni Papadaki, Stavroula Ntoa, ... Constantine Stephanidis in Smart Objects and Technologies for Social Good
    Conference paper 2018
  13. Detection of Behavioral Data Based on Recordings from Energy Usage Sensor

    Monitoring of human behavior in the natural living habitat requires a hidden yet accurate measurement. Several previous attempts showed, that this...
    Conference paper 2016
  14. Multi-Factor Authentication

    Multi-Factor authentication (MFA) is a secure process of authentication which requires more than one authentication technique chosen from independent...
    Dipankar Dasgupta, Arunava Roy, Abhijit Nag in Advances in User Authentication
    Chapter 2017
  15. Feature Learning Architecture Taxonomy and Neuroscience Background

    In many respects, computer vision practitioners are now being outpaced by neuroscientists, who are leading the way, modeling computer vision systems...
    Scott Krig in Computer Vision Metrics
    Chapter 2016
  16. Ensemble Learning of Run-Time Prediction Models for Data-Intensive Scientific Workflows

    Workflow applications for in-silico experimentation involve the processing of large amounts of data. One of the core issues for the efficient...
    David A. Monge, Matĕj Holec, ... Carlos García Garino in High Performance Computing
    Conference paper 2014
  17. Non-intrusive Identification of Electrical Appliances

    The aim of reducing greenhouse gases and increasing energy efficiency faces a number of challenges to date. A significant portion of overall energy...
    Aqeel H. Kazmi, Michael J. O’Grady, Gregory M. P. O’Hare in Evolving Ambient Intelligence
    Conference paper 2013
  18. Web-GIS models: accomplishing modularity with aspects

    Spatial concerns of Web geographical information systems (Web-GIS) are inherently crosscutting and volatile: crosscutting because they affect...

    Matias Urbieta, Ana Oliveira, ... Gustavo Rossi in Innovations in Systems and Software Engineering
    Article 15 May 2013
Did you find what you were looking for? Share feedback.