2,377 research outputs found

    VI-based appliance classification using aggregated power consumption data

    Get PDF
    Non-intrusive load monitoring detects active appliances in a household (and their power consumption) from measuring the aggregated power at just one point in that household. Our previous works focused on classifying a single appliance, assuming that the voltage and current trace could be isolated from an aggregated signal by considering the difference in current before and after the event. In this paper, we show that this assumption holds and that it is a viable approach in practice. We experimentally validate this for two classification methods we proposed earlier: (1) random forests using elliptical Fourier descriptors of the appliances' VI trajectories and (2) convolutional neural networks using the appliances' VI images. We benchmark these approaches on the aggregated data from the 2018 version of PLAID. We obtain, respectively for each of these classifiers, a maximal F-macro-measure of 85.31% and 87.95 %. We also show that using submetered data for training does not improve the performance

    Energy Efficiency in the ICT - Profiling Power Consumption in Desktop Computer Systems

    Get PDF
    Energy awareness in the ICT has become an important issue. Focusing on software, recent work suggested the existence of a relationship between power consumption, software configuration and usage patterns in computer systems. The aim of this work was collecting and analysing power consumption data of general-purpose computer systems, simulating common usage scenarios, in order to extract a power consumption profile for each scenario. We selected two desktop systems of different generations as test machines. Meanwhile, we developed 11 usage scenarios, and conducted several test runs of them, collecting power consumption data by means of a power meter. Our analysis resulted in an estimation of a power consumption value for each scenario and software application used, obtaining that each single scenario introduced an overhead from 2 to 11 Watts, which corresponds to a percentage increase that can reach up to 20% on recent and more powerful systems. We determined that software and its usage patterns impact consistently on the power consumption of computer systems. Further work will be devoted to evaluate how power consumption is affected by the usage of specific system resource

    Do Power Consumption Data Tell the Story? - Electricity Intensity and Hidden Economy in Post-Socialist Countries

    Get PDF
    The paper disputes the frequently presented and quoted statement that in post-socialist economies data on power consumption are better indicators for aggregate output changes than data on official GDP. Attempt is made to show that the variation of electricity intensities in post-socialist countries does not necessarily reflect the growth of the hidden parts of the economy. Statistical and econometric analysis of data for 18 post-socialist economies show that in this region, the differences in measured and registered structural changes are more important factors explaining the differences in the changes of electricity intensity than the changing size of the unofficial economy.

    PowerSpy: Location Tracking using Mobile Device Power Analysis

    Full text link
    Modern mobile platforms like Android enable applications to read aggregate power usage on the phone. This information is considered harmless and reading it requires no user permission or notification. We show that by simply reading the phone's aggregate power consumption over a period of a few minutes an application can learn information about the user's location. Aggregate phone power consumption data is extremely noisy due to the multitude of components and applications that simultaneously consume power. Nevertheless, by using machine learning algorithms we are able to successfully infer the phone's location. We discuss several ways in which this privacy leak can be remedied.Comment: Usenix Security 201

    Privacy-Preserving Data Falsification Detection in Smart Grids using Elliptic Curve Cryptography and Homomorphic Encryption

    Get PDF
    In an advanced metering infrastructure (AMI), the electric utility collects power consumption data from smart meters to improve energy optimization and provides detailed information on power consumption to electric utility customers. However, AMI is vulnerable to data falsification attacks, which organized adversaries can launch. Such attacks can be detected by analyzing customers\u27 fine-grained power consumption data; however, analyzing customers\u27 private data violates the customers\u27 privacy. Although homomorphic encryption-based schemes have been proposed to tackle the problem, the disadvantage is a long execution time. This paper proposes a new privacy-preserving data falsification detection scheme to shorten the execution time. We adopt elliptic curve cryptography (ECC) based on homomorphic encryption (HE) without revealing customer power consumption data. HE is a form of encryption that permits users to perform computations on the encrypted data without decryption. Through ECC, we can achieve light computation. Our experimental evaluation showed that our proposed scheme successfully achieved 18 times faster than the CKKS scheme, a common HE scheme
    corecore