摘要:
Systems and methods for monitoring, logging, and managing data transformations and data streams of energy management (EM) data energy data sources.
摘要:
A method of parsing a natural language phrase to retrieve data associated with a power monitoring system. An input receives a natural language phrase including terms, one of which indicates a data manipulation action for manipulating data of the power monitoring system. A parser component parses the phrase to extract the terms and maps those terms to corresponding category items. The parser component constructs a structured query based on the category items and provides the query to a processor component that retrieves the data from a data source specified in the submitted phrase. The processor component also manipulates the data according to the data manipulation action. The output from the processor component is provided to a presentation component that formats the manipulated data for presentation on a video display, and the formatted manipulated data is displayed on the video display.
摘要:
A method of parsing a natural language phrase to retrieve data associated with a power monitoring system. An input receives a natural language phrase including terms, one of which indicates a data manipulation action for manipulating data of the power monitoring system. A parser component parses the phrase to extract the terms and maps those terms to corresponding category items. The parser component constructs a structured query based on the category items and provides the query to a processor component that retrieves the data from a data source specified in the submitted phrase. The processor component also manipulates the data according to the data manipulation action. The output from the processor component is provided to a presentation component that formats the manipulated data for presentation on a video display, and the formatted manipulated data is displayed on the video display.
摘要:
Systems and methods for monitoring, logging, and managing data transformations and data streams of energy management (EM) data energy data sources.
摘要:
An energy efficiency solution for automatically pushing data measured by IEDs in a utility system to an Internet server. Before the utility system is commissioned, the manufacturer pre-configures each IED to automatically push measured data to the server at regular intervals and associates each IED with a unique identifier that is transmitted with the data and with a customer who has purchased the solution. After commissioning, the IEDs come online and begin to automatically push their measured data to the server. The customer logs into the website via a manufacturer-provided access code to access the measured data instantly. Requests to change the type of data pushed from IEDs and other configuration changes can be made via the website. Periodically, the IEDs ask whether any configuration updates exist, and if so, the server makes available to the IEDs the updated configuration. By having IEDs initiate communications for data transmission and configuration updates, intervening firewalls are bypassed.
摘要:
An energy efficiency solution for automatically pushing data measured by IEDs in a utility system to an Internet server. Before the utility system is commissioned, the manufacturer pre-configures each IED to automatically push measured data to the server at regular intervals and associates each IED with a unique identifier that is transmitted with the data and with a customer who has purchased the solution. After commissioning, the IEDs come online and begin to automatically push their measured data to the server. The customer logs into the website via a manufacturer-provided access code to access the measured data instantly. Requests to change the type of data pushed from IEDs and other configuration changes can be made via the website. Periodically, the IEDs ask whether any configuration updates exist, and if so, the server makes available to the IEDs the updated configuration. By having IEDs initiate communications for data transmission and configuration updates, intervening firewalls are bypassed.