CloudProcMon: A Non-Intrusive Cloud Monitoring Framework
نویسندگان
چکیده
منابع مشابه
Non-Intrusive Load Monitoring
Non-Intrusive Load Monitoring (NILM) is a technique that determines the load composition of a household through a single point of measurement at the main power feed. Here we presented an unsupervised approach to determine the number of appliances in the household, their power consumption and the state of each one at any given moment.
متن کاملAn Active Learning Framework for Non-Intrusive Load Monitoring: Preprint
Non-Intrusive Load Monitoring (NILM) is a set of techniques that estimates the electricity usage of individual appliances from power measurements taken at a limited number of locations in a building. One of the key challenges in NILM is having too many data lacking class labels, but being unable to label the data manually for cost or time constraints. This paper presents an active learning fram...
متن کاملRemote Non-Intrusive Patient Monitoring
The Tyndall-DMS-Mote is a wireless sensor device that can monitor patient vital signs non-intrusively within and outside their home. Patient real-time vital sign readings (dynamic data) and archived records (static data) need to be managed, correlated and analysed in a cohesive manner to produce effective results. The Data Management System (DMS) has been developed to intelligently manage this ...
متن کاملEvolving Non-Intrusive Load Monitoring
Non-intrusive load monitoring (NILM) identifies used appliances in a total power load according to their individual load characteristics. In this paper we propose an evolutionary optimization algorithm to identify appliances, which are modeled as on/off appliances. We evaluate our proposed evolutionary optimization by simulation with Matlab, where we use a random total load and randomly generat...
متن کاملA Non-Intrusive and Context-Based Vulnerability Scoring Framework for Cloud Services
Understanding the severity of vulnerabilities within cloud services is particularly important for today’s service administrators. Although many systems, e.g., CVSS, have been built to evaluate and score the severity of vulnerabilities for administrators, the scoring schemes employed by these systems fail to take into account the contextual information of specific services having these vulnerabi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2018
ISSN: 2169-3536
DOI: 10.1109/access.2018.2864573