An overview of Non-intrusive load monitoring methodologies

Isiyaku Abubakar, S. N. Khalid, M. W. Mustafa, Hussain Shareef, Mamunu Mustapha

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Citations (Scopus)

Abstract

Load monitoring is essential in every energy consuming system. Traditional load monitoring system, which used to be intrusive in nature require the installation of sensor to every load of interest which makes the system to be costly and time consuming. Nonintrusive load monitoring (NILM) system uses the aggregated measurement at the utility service entry to identify and disaggregate the appliances connected in the building, which means only one set of sensors is required and it does not require entrance into the consumer premises. Having studied much and working in the area, this paper aim to provide a comprehensive review of the state of art of NILM, the different methods applied by researchers so far, before concluding with the future research direction, which include automatic home energy saving using NILM.

Original languageEnglish
Title of host publication2015 IEEE Conference on Energy Conversion, CENCON 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages54-59
Number of pages6
ISBN (Electronic)9781479985982
DOIs
Publication statusPublished - 2015
Externally publishedYes
Event2nd IEEE Conference on Energy Conversion, CENCON 2015 - Johor Bahru, Malaysia
Duration: Oct 19 2015Oct 20 2015

Publication series

Name2015 IEEE Conference on Energy Conversion, CENCON 2015

Conference

Conference2nd IEEE Conference on Energy Conversion, CENCON 2015
Country/TerritoryMalaysia
CityJohor Bahru
Period10/19/1510/20/15

Keywords

  • Appliance signature
  • Artificial Intelligence
  • Nonintrusive Load Monitoring (NILM)
  • Smart house
  • energy management

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'An overview of Non-intrusive load monitoring methodologies'. Together they form a unique fingerprint.

Cite this