Systems and methods for reducing energy usage

ABSTRACT

Systems and methods are disclosed for improving energy efficiency by determining a home composite load signature and energy saving based on predetermined weather factors and a prior success history of the message with predetermined group members; capturing feedback on messages to consumers to see if at least a change has occurred since a communication, wherein the feedback includes a user action taken with respect to the message; and presenting to the user cost savings between the user&#39;s existing appliance and a substitute appliance.

The present application claims priority to U.S. application Ser. No.12/871,638, filed Aug. 30, 2010 and Ser. No. 13/668,302 filed Nov. 4,2012, the content of which is incorporated by reference.

BACKGROUND

The present invention relates to reducing building energy use.

Improvements in living condition and advances in health care haveresulted in a marked prolongation of life expectancy for elderly anddisabled population. These individuals, a growing part of society, aredependent upon the delivery of home health and general care, which hasits own set of challenges and drawbacks. This population needscontinuous general, as well as medical, supervision and care.

The bulk of residential energy consumption is devoted to space heatingand cooling. Unlike other end uses, households typically have directcontrol over the amount of heating or cooling used in their home.Unfortunately, energy consumption is typically reported as a “lump sum”rather than being allocated to specific devices or end uses. Evenadvanced metering systems that record energy use by day, hour, or evenminute, only report the aggregate usage for each household.

United States Patent Application 20110106471 discloses a method andsystem for disaggregating climate control energy use from non-climatecontrol energy use for a building. The method includes receiving aseries of building energy use values and corresponding outdoortemperature values for a time period. Each of the energy use values andoutdoor temperature values is associated with a time interval. Themethod further includes determining a series of temperature differencevalues for the time period based on a difference in temperature betweena predetermined baseline temperature and each of the outdoor temperaturevalues. A regression analysis is used to determine a climate controlcoefficient and a non-climate control coefficient from the energy usevalues and temperature difference values. The climate controlcoefficient and/or the non-climate control coefficient are used todetermine climate control energy use and/or non-climate control energyuse for the building.

SUMMARY

In one aspect, systems and methods are disclosed for improving energyefficiency by determining a home composite load signature and energysaving based on predetermined weather factors and a prior successhistory of the message with predetermined group members; capturingfeedback on messages to consumers to see if at least a change hasoccurred since a communication, wherein the feedback includes a useraction taken with respect to the message; and presenting to the usercost savings between the user's existing appliance and a substituteappliance.

In another aspect, a system for detecting individual appliance energyloads from a building composite load profile includes an electric meterto capture building composite load profile; a detector coupled to theelectric meter to detect transitions in the load profile to determine anappliance state machine for each appliance; a clusterizer to detectclusters of patterns in the load profile; and an analyzer coupled to thedetector to receive the transitions and appliance state machines fromthe detector, the analyzer matching each transition to a predeterminedappliance state machine to disaggregate the building composite loadprofile into individual appliance energy loads.

In another aspect, a method for detecting individual appliance energyloads from a building composite load profile includes determiningtransitions within the building composite load profile; clusterizingpatterns in the load profile and determining specific appliance statemachines for each appliance in the building based on the clusterizedpatterns; and disaggregating the building composite load profile intoindividual appliance energy loads by assigning the determinedtransitions to the determined specific appliance state machines.

In yet another aspect, a method of improving energy efficiency includesdetermining an appliance load signature from a user's existingappliance, determined from a building composite load signature;determining a substitute appliance for the existing appliance; andpresenting to the user cost savings between the user's existingappliance and the substitute appliance.

In another aspect, a device such as a thermostat or a cellular telephoneincludes a wireless transceiver coupled to a utility meter to receivebuilding composite load profile; a detector coupled to the wirelesstransceiver to detect transitions in the load profile to determine anappliance state machine for each appliance; a clusterizer to detectclusters of patterns in the load profile; and an analyzer coupled to thedetector to receive the transitions and appliance state machines fromthe detector, the analyzer matching each transition to a predeterminedappliance state machine to disaggregate the building composite loadprofile into individual appliance energy loads.

In a further aspect, a system for reducing energy usage includes one ormore utility meters each capturing energy load data on a fifteen minutedata interval or an hourly basis; a usage disaggregator coupled to oneor more of the utility meters to disaggregate energy consumption for oneor more predetermined appliances based on the data interval (suchinterval can be 15 minutes interval, 30 minutes interval, or hourlyinterval, among others) electrical load signatures of each predeterminedappliance; and an energy messaging module coupled to the energy usagedisaggregator to help users reduce energy consumption.

In another aspect, a method to reduce energy usage includes readingfifteen minute interval or hourly interval energy load data from utilitymeters; disaggregating energy consumption for each of predeterminedappliances from the interval of energy load data; and normativelymessaging users to reduce energy consumption.

In yet another aspect, a system for optimizing energy usage includes oneor more utility meters to generate electrical load data at a 15-minuteinterval or hourly interval; a load monitoring disaggregator receivingthe interval of electrical load data from the utility meters to identifypower consumption from each of predetermined appliances; and an energymessaging module coupled to the disaggregator to generate normativeenergy saving messages to users.

Implementations of the system can enable energy consumers to increaseenergy efficiency, reduce costs, and realize environmental benefits. Thesystem can:

-   -   Collect detailed occupancy/usage data with a combination of        sub-meters and low cost sensors    -   Create models of occupancy patterns (Daily Office Activities)    -   Visualize usage data    -   Apply occupancy models with sensor data to automatically control        HVAC/heating/lighting/appliances to save energy    -   Predict demand and communicate with utility computers during        peak load    -   Prompting of building occupants for energy-saving actions.

Advantages of the system may include one or more of the following. Oncethe system can create accurate energy usage models for the building andits occupants, the system applies normative messaging to successfullyengage and motivate action across a very high percentage of targetedindividuals. The normative message motivates office workers to takeaction which is one of the main challenges to achieving large scaleenergy savings. Participation rates in most energy-efficiency programsare typically less than 5%. By contrast, the messaging system achievesmuch higher energy-saving actions by presenting users with only relevantand immediately actionable suggestions on how to cut down powerconsumption in their immediate office/cubicle. The system leveragesbehavioral science, customer data analytics, and the latest software toengage employees of utilities and energy consumers to collectively takeaction to save energy.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an exemplary embodiment for monitoring energy usage.

FIG. 2A shows an exemplary energy consumption for various appliancesover a period of time.

FIG. 2B shows exemplary signatures for various appliances.

FIG. 2C shows exemplary step changes in the power verses time plot dueto individual appliance events.

FIG. 2D shows an exemplary state transition tables or models for a twostate appliance such as a toaster, a two state appliance such as a threeway lamp, and a refrigerator with a defrost state, respectively.

FIG. 3 illustrates a process for classifying daily life activities.

FIG. 4 shows an exemplary process to monitor a user.

FIG. 5 shows an exemplary load disaggregation system working with hourlydata to disaggregate appliance energy usage and to send messages toprompt users to save energy.

DESCRIPTION

FIG. 1 shows an exemplary home energy monitoring system. In this system,a plurality of monitoring cameras 10 are placed in various predeterminedpositions in a home of a patient 30. The cameras 10 can be wired orwireless. For example, the cameras can communicate over infrared linksor over radio links conforming to the 802.11X (e.g. 802.11A, 802.11B,802.11G) standard or the Bluetooth standard to a server 20. The server20 stores images and videos of family members or elderly patients 30.

In one embodiment, electric/gas/water consumption can be monitored. Thisapproach non-invasively infers user activities through the operations ofappliances during the day. For example, in the morning, a user may use atoaster and turn on a TV for news. The user may also turn on lights inthe bathrooms and use water for toiletry and bathing purposes. The usermay then turn on a computer and conduct business using the telephone orcell phone. Periodically, the user may use the fan or AC or heater asneeded. The user may also use the oven/stove and the kitchen sink forlunch/dinner preparation. In this brief example, electricity, gas andwater is consumed. The embodiment captures data associated withelectricity, gas and water consumption for modeling user dailyactivities, and abnormality in daily activity can be detectednon-invasive manner without requiring the user to wear sensors. Further,this solution is inexpensive since it can operate off meters which areinstalled free by utilities. For example, smart electric meters usesprogrammable solid-state meter technology that provides two-waycommunication between the meter at the home or business and the utility,using secure wireless network technology. The solid-state digitalSmartMeter™ from PG&E is an electric meter that records hourly meterreads and periodically transmits the reads via a dedicated radiofrequency (RF) network back to PG&E. Each SmartMeter™ electric meter isequipped with a network radio, which transmits meter data to an electricnetwork access point (pictured below). The system uses RF meshtechnology, which allows meters and other sensing devices to securelyroute data via nearby meters and relay devices, creating a “mesh” ofnetwork coverage. The system supports two-way communication between themeter and PG&E. The electric network access point collects meter datafrom nearby electric meters and periodically transfers this data to PG&Evia a secure cellular network. Each RF mesh-enabled device (meters,relays) is connected to several other mesh-enabled devices, whichfunction as signal repeaters, relaying the data to an access point. Theaccess point device aggregates, encrypts, and sends the data back toPG&E over a secure commercial third-party network. The resulting RF meshnetwork can span large distances and reliably transmit data over roughor difficult terrain. If a meter or other transmitter drops out of thenetwork, its neighbors find another route. The mesh continuallyoptimizes routing to ensure information is passed from its source to itsdestination as quickly and efficiently as possible.

The gas system uses point-to-point RF technology to transmit gas usagedata from SmartMeter™ gas modules back to PG&E over a dedicated, securewireless network. Due to the simpler data requirements of the gassystem, the SmartMeter™ gas system supports only one-way communicationfrom customers to PG&E. PG&E attaches the SmartMeter™ gas module to thetraditional gas meter. This module is outfitted with a radio frequency(RF) transmitter. The module records daily meter reads and then uses anRF signal to transmit the reads to a data collector unit (see below) inthe vicinity. The data collector unit (DCU), in turn, collects meterreads from many meters and securely transmits the gas usage data over asecure wireless network back to PG&E. Similarly, water meter can bedigitized.

Various types of information contained in the collected data can be usedto identify a particular activity of life. For example measurements canbe made of: the time the consumption began; the duration of theconsumption; the rate of consumption; the total amount of utilityconsumed during a particular period; the maximum or peak use; the shapeand magnitude of the electrical power waveform (such as the 60 Hzwaveform); and any changes in the rate of consumption. Thesemeasurements can be compared to a library of standard values fordifferent types of loads. The measurements can also be compared to alibrary of appliances previously observed on the utility signal. As anexample of how consumption can be used to identify a load, a toiletflush can be distinguished from a shower based on the duration of theconsumption, the total amount of water consumed, and the water flowrate.

Time of day information can sometimes assist in identifying a lifeactivity. For example water usage in the middle of the night is morelikely to be due to a toilet flush than a shower. Even if theconsumption patterns are not sufficient to completely identify theloads, they can still be used to help select the most likely candidates.The user can assist the appliance identification program by linking anunidentified appliance to the name of an appliance that is known havebeen in operation.

FIG. 2A shows an exemplary energy consumption chart for variousappliances over a period of time while FIG. 2B shows various exemplarysignatures for an electric oven, hair dryer, water heater and kettle.FIG. 2C shows exemplary step changes in the power verses time plot dueto individual appliance events. FIG. 2D shows an exemplary statetransition tables or models for a two state appliance such as a toaster,a two state appliance such as a three way lamp, and a refrigerator witha defrost state, respectively.

From the signatures, the system can infer daily activity. When the datais electrical data, additional information may be measured and used toidentify a load. For example, the shape and size of the 60 Hzconductance waveform (defined as the current divided by the voltage) maybe used to help identify the load. Typical resistive appliances, such asincandescent lights and clothes irons, draw current that is in phasewith the AC voltage. Appliances with a reactive and resistive load (suchas a DC transformer for a stereo amplifier and a motor on a clotheswasher) draw current that is out of phase with the voltage. Yet otherappliances, such as computers, have switching power supplies thatconsume power for brief intervals during a voltage cycle. Analysis ofthe amplitude and temporal variation of the current and power waveformscan help identify specific loads connected to a circuit. The circuit canbe characterized by its voltage and current measured at a particularsampling rate, such as 3840 Hz to provide 64 samples per voltage cycle.

For some loads, the current or voltage may be very stable. For example,certain light bulbs are either on or off. Other loads may operate atdiscrete values, such as a ceiling fan with 3 speeds. Further types ofloads will have a range of settings, such as a power drill havingvariable speed control. Finally, other loads (such as a refrigerator,TV, or computer) may have more complex combinations of conductance overtime. The system can include circuits for sampling the electrical powerat the electrical power line and converting the sampled power intodigital format to provide digital signals proportional to circuit loadcharacteristics such as real power, reactive power, current, admittance,harmonics, sub-harmonics, dc current, starting-transient peak;starting-transient duration, starting-transient time-constant, orstarting-transient shape. Signal processing techniques can be used toanalyze the total household electrical or water use data, intoparticular daily activities based on the unique properties of each load.A library of properties of common loads can be maintained and accessedby the user interface, user computer, or remote system. For example, thelibrary can include properties of appliances from model years that aremost likely to be used in the monitored environment.

When located on the user interface or user computer, this library can beupdated periodically, such as through the internet by the remote server.Other programming of the user interface, or software running on the usercomputer, can also be updated via the internet, such as with improvedalgorithms, heuristics, and the like. In certain implementations,training or other user provided data is used to update a library thatcan be shared with other users. With a broad set of load profiles, thesystems will be able to, in particular examples, automatically identifythe loads consuming the majority of the utilities in the monitored area.

In some aspects, the systems use a processing algorithm that employsstatistical analysis, such as a least squares fit, to identifyindividual loads. In a specific example, an effective variance analysisis performed on changes in conductance. Conductance is a usefulparameter to characterize the power consumption behavior of an appliancesince it is: (1) voltage independent (i.e. an appliance's conductancechanges minimally with normal fluctuations in voltage delivered to thecircuit) and (2) is additive for the calculation of power (i.e. theconductance on a circuit is the sum of the conductances of allappliances).

In some examples, the voltage and current waveform is sampled at asufficient rate such that many data points are collected for eachvoltage period. When the AC voltage V passes from negative to positive,current I and voltage V data points are each inserted into the firstcolumns of a two dimensional array. The number of rows in the array isdefined by the number of samples taken during a voltage cycle. When theAC voltage V passes from negative to positive again, the current andvoltage data are inserted into the next columns of the arrays and soforth. With this data, instantaneous values of the Power P (I*V)measured in Watts and Conductance G (I/V) measured in Siemens can becalculated.

As noted above, the hardware for non-invasive monitoring is minimal. Insome configurations, meters 120, 130, 140 are directly connected to theuser interface 90, or local computer 20, such as through a wiredconnection, including standard communication protocols and adapters suchas RS-232, Ethernet, serial, parallel port, SPI, SCSI, I2C, ZigBee, andUSB connections. In a particular example, the utility meters 120, 130,140 send signals to the user interface 90 over power lines, such asusing a power line modem. The components of the system communicate mayuse the X10 communication standard. Utility meters 120, 130, and 140 cangenerate wireless signals received over the LAN or WAN and thendisplayed by user interface 90 or processed on local computer 20. Insome implementations, the user computer accesses the user interface 90through a web browser. For example, the user interface 90 may beassigned an internet protocol (IP) address. In particular examples, theuser interface 90 communicates with the user computer 160, remote system170, or network 180 over the Internet.

In particular embodiments, adapters can be hooked, mounted or installedwith the meters 120, 130 and 140 by a consumer or other end users suchas a professional electrician or plumber. Suitable electrical meteradapters can include the Meter Interface Units (MIUs) available fromArchnet of ShenZhen, China. In some implementations, the electricaladapter for electricity meter 130 can be an in line shunt resistor, acurrent transducer, or a Hall Effect sensor. Suitable Hall Effectsensors are available from GMW Associates of San Carlos, Calif., such asthe Sentron CSA-1V. The water meter adapter can be a photo sensor, suchas an infrared or optical sensor, that detects rotation of a dialmechanism. In one example, the sensor detects reflection of light off ofthe dial mechanism. A light source, such as an optical or infrared LED,is included, in certain embodiments, to generate a signal to bemeasured. An integrated light emitting diode and photodiode is availablefrom Honeywell (PN# HOA1180). A marker, such as a piece of more highlylight absorbing or reflecting material, may be placed on the dial inorder to help track rotation of the dial. In further examples, aseparate meter, such as a flow meter, is installed in the gas line orwater line. A separate meter may also be included on the electricalline, such as a voltage or current meter. In particular implementations,the electrical adapter is installed between an electrical socket and anexisting electrical meter, such as an electrical meter installed by apower company. Suitable socket adapters are available from RIOTronics,Inc. of Englewood, Colo. In some implementations, the adapters readsignals, such as wireless signals, generated by an existing meter, suchas a meter installed by a utility company.

In some implementations, the electrical adapter, or multiple electricaladapters, is connected to one or more individual circuits entering ameasurement site. Each circuit may have a separate adapter, such as anelectric metering device, or multiple circuits may be individuallymonitored by a single electrical adapter. In particular examples, theelectrical adapter includes a current transducer (not shown) attached tothe wires corresponding to each breaker switch in a circuit box. Amulti-channel analog to digital voltage sensor may be in communicationwith the current transducer to simultaneously monitor multiple circuits.

The server 20 also executes one or more software modules to analyze datafrom the patient. A module 50 monitors the patient's vital signs such asECG/EKG and generates warnings should problems occur. In this module,vital signs can be collected and communicated to the server 20 usingwired or wireless transmitters. In one embodiment, the server 20 feedsthe data to a statistical analyzer such as a neural network which hasbeen trained to flag potentially dangerous conditions. The neuralnetwork can be a back-propagation neural network, for example. In thisembodiment, the statistical analyzer is trained with training data wherecertain signals are determined to be undesirable for the patient, givenhis age, weight, and physical limitations, among others. For example,the patient's glucose level should be within a well-established range,and any value outside of this range is flagged by the statisticalanalyzer as a dangerous condition. As used herein, the dangerouscondition can be specified as an event or a pattern that can causephysiological or psychological damage to the patient. Moreover,interactions between different vital signals can be accounted for sothat the statistical analyzer can take into consideration instanceswhere individually the vital signs are acceptable, but in certaincombinations, the vital signs can indicate potentially dangerousconditions. Once trained, the data received by the server 20 can beappropriately scaled and processed by the statistical analyzer. Inaddition to statistical analyzers, the server 20 can process vital signsusing rule-based inference engines, fuzzy logic, as well as conventionalif-then logic. Additionally, the server can process vital signs usingHidden Markov Models (HMMs), dynamic time warping, or template matching,among others.

A module 52 monitors the patient ambulatory pattern and generateswarnings should the patient's patterns indicate that the patient hasfallen or is likely to fall. 3D detection is used to monitor thepatient's ambulation. In the 3D detection process, by putting 3 or moreknown coordinate objects in a scene, camera origin, view direction andup vector can be calculated and the 3D space that each camera views canbe defined.

In one embodiment with two or more cameras, camera parameters (e.g.field of view) are preset to fixed numbers. Each pixel from each cameramaps to a cone space. The system identifies one or more 3D featurepoints (such as a birthmark or an identifiable body landmark) on thepatient. The 3D feature point can be detected by identifying the samepoint from two or more different angles. By determining the intersectionfor the two or more cones, the system determines the position of thefeature point. The above process can be extended to certain featurecurves and surfaces, e.g. straight lines, arcs; flat surfaces,cylindrical surfaces. Thus, the system can detect curves if a featurecurve is known as a straight line or arc. Additionally, the system candetect surfaces if a feature surface is known as a flat or cylindricalsurface. The further the patient is from the camera, the lower theaccuracy of the feature point determination. Also, the presence of morecameras would lead to more correlation data for increased accuracy infeature point determination. When correlated feature points, curves andsurfaces are detected, the remaining surfaces are detected by texturematching and shading changes. Predetermined constraints are appliedbased on silhouette curves from different views. A different constraintcan be applied when one part of the patient is occluded by anotherobject. Further, as the system knows what basic organic shape it isdetecting, the basic profile can be applied and adjusted in the process.

A module 80 communicates with a third party such as the policedepartment, a security monitoring center, or a call center. The module80 operates with a POTS telephone and can use a broadband medium such asDSL or cable network if available. The module 80 requires that at leastthe telephone is available as a lifeline support. In this embodiment,duplex sound transmission is done using the POTS telephone network. Thebroadband network, if available, is optional for high resolution videoand other advanced services transmission.

During operation, the module 80 checks whether broadband network isavailable. If broadband network is available, the module 80 allows highresolution video, among others, to be broadcasted directly from theserver 20 to the third party or indirectly from the server 20 to theremote server 200 to the third party. In parallel, the module 80 allowssound to be transmitted using the telephone circuit. In this manner,high resolution video can be transmitted since sound data is separatelysent through the POTS network.

If broadband network is not available, the system relies on the POTStelephone network for transmission of voice and images. In this system,one or more images are compressed for burst transmission, and at therequest of the third party or the remote server 200, the telephone'ssound system is placed on hold for a brief period to allow transmissionof images over the POTS network. In this manner, existing POTS lifelinetelephone can be used to monitor patients. The resolution and quantityof images are selectable by the third party. Thus, using only thelifeline as a communication medium, the person monitoring the patientcan elect to only listen, to view one high resolution image with duplextelephone voice transmission, to view a few low resolution images, toview a compressed stream of low resolution video with digitized voice,among others.

During installation or while no live person in the scene, each camerawill capture its own environment objects and store it as backgroundimages, the software then detect the live person in the scene, changesof the live person, so only the portion of live person will be send tothe local server, other compression techniques will be applied, e.g.send changing file, balanced video streaming based on change.

The local server will control and schedule how the video/picture will besend, e.g. when the camera is view an empty room, no pictures will besent, the local server will also determine which camera is at the rightview, and request only the corresponding video be sent. The local serverwill determine which feature it is interested in looking at, e.g. faceand request only that portion be sent.

With predetermined background images and local server controlledstreaming, the system will enable higher resolution and more camerasystem by using narrower bandwidth.

Through this module, a police officer, a security agent, or a healthcareagent such as a physician at a remote location can engage, ininteractive visual communication with the patient. The patient's healthdata or audio-visual signal can be remotely accessed. The patient alsohas access to a video transmission of the third party. Should thepatient experience health symptoms requiring intervention and immediatecare, the health care practitioner at the central station may summonhelp from an emergency services provider. The emergency servicesprovider may send an ambulance, fire department personnel, familymember, or other emergency personnel to the patient's remote location.The emergency services provider may, perhaps, be an ambulance facility,a police station, the local fire department, or any suitable supportfacility.

Communication between the patient's remote location and the centralstation can be initiated by a variety of techniques. One method is bymanually or automatically placing a call on the telephone to thepatient's home or from the patient's home to the central station.

Alternatively, the system can ask a confirmatory question to the patientthrough text to speech software. The patient can be orally instructed bythe health practitioner to conduct specific physical activities such asspecific arm movements, walking, bending, among others. The examinationbegins during the initial conversation with the monitored subject. Anychanges in the spontaneous gestures of the body, arms and hands duringspeech as well as the fulfillment of nonspecific tasks are importantsigns of possible pathological events. The monitoring person caninstruct the monitored subject to perform a series of simple tasks whichcan be used for diagnosis of neurological abnormalities. Theseobservations may yield early indicators of the onset of a disease.

A network 100 such as the Internet receives images from the server 20and passes the data to one or more remote servers 200. The images aretransmitted from the server 20 over a secure communication link such asvirtual private network (VPN) to the remote server(s) 200.

The server 20 collects data from a plurality of cameras and uses the 3Dimages technology to determine if the patient needs help. The system cantransmit video (live or archived) to the friend, relative, neighbor, orcall center for human review. At each viewer site, after a viewerspecifies the correct URL to the client browser computer, a connectionwith the server 20 is established and user identity authenticated usingsuitable password or other security mechanisms. The server 200 thenretrieves the document from its local disk or cache memory storage andtransmits the content over the network. In the typical scenario, theuser of a Web browser requests that a media stream file be downloaded,such as sending, in particular, the URL of a media redirection file froma Web server. The media redirection file (MRF) is a type of specializedHypertext Markup Language (HTML) file that contains instructions for howto locate the multimedia file and in what format the multimedia file isin. The Web server returns the MRF file to the user's browser program.The browser program then reads the MRF file to determine the location ofthe media server containing one or more multimedia content files. Thebrowser then launches the associated media player application programand passes the MRF file to it. The media player reads the MRF file toobtain the information needed to open a connection to a media server,such as a URL, and the required protocol information, depending upon thetype of medial content is in the file. The streaming media content fileis then routed from the media server down to the user.

Next, the transactions between the server 20 and one of the remoteservers 200 are detailed. The server 20 compares one image frame to thenext image frame. If no difference exists, the duplicate frame isdeleted to minimize storage space. If a difference exists, only thedifference information is stored as described in the JPEG standard. Thisoperation effectively compresses video information so that the cameraimages can be transmitted even at telephone modem speed of 64 k or less.More aggressive compression techniques can be used. For example, patientmovements can be clusterized into a group of known motion vectors, andpatient movements can be described using a set of vectors. Only thevector data is saved. During view back, each vector is translated into apicture object which is suitably rasterized. The information can also becompressed as motion information.

Next, the server 20 transmits the compressed video to the remote server200. The server 200 stores and caches the video data so that multipleviewers can view the images at once since the server 200 is connected toa network link such as telephone line modem, cable modem, DSL modem, andATM transceiver, among others.

In one implementation, the servers 200 use RAID-5 striping and paritytechniques to organize data in a fault tolerant and efficient manner.The RAID (Redundant Array of Inexpensive Disks) approach is welldescribed in the literature and has various levels of operation,including RAID-5, and the data organization can achieve data storage ina fault tolerant and load balanced manner. RAID-5 provides that thestored data is spread among three or more disk drives, in a redundantmanner, so that even if one of the disk drives fails, the data stored onthe drive can be recovered in an efficient and error free manner fromthe other storage locations. This method also advantageously makes useof each of the disk drives in relatively equal and substantiallyparallel operations. Accordingly, if one has a six gigabyte clustervolume which spans three disk drives, each disk drive would beresponsible for servicing two gigabytes of the cluster volume. Each twogigabyte drive would be comprised of one-third redundant information, toprovide the redundant, and thus fault tolerant, operation required forthe RAID-5 approach. For additional physical security, the server can bestored in a Fire Safe or other secured box, so there is no chance toerase the recorded data, this is very important for forensic analysis.

The system can also monitor the patient's gait pattern and generatewarnings should the patient's gait patterns indicate that the patient islikely to fall. The system will detect patient skeleton structure,stride and frequency; and based on this information to judge whetherpatient has joint problem, asymmetrical bone structure, among others.The system can store historical gait information, and by overlayingcurrent structure to the historical (normal) gait information, gaitchanges can be detected.

The system also provides a patient interface 90 to assist the patient ineasily accessing information. In one embodiment, the patient interfaceincludes a touch screen; voice-activated text reading; one touchtelephone dialing; and video conferencing. The touch screen has largeicons that are pre-selected to the patient's needs, such as his or herfavorite web sites or application programs. The voice activated textreading allows a user with poor eye-sight to get information from thepatient interface 90. Buttons with pre-designated dialing numbers, orvideo conferencing contact information allow the user to call a friendor a healthcare provider quickly.

In one embodiment, medicine for the patient is tracked using radiofrequency identification (RFID) tags. In this embodiment, each drugcontainer is tracked through an RFID tag that is also a drug label. TheRF tag is an integrated circuit that is coupled with a mini-antenna totransmit data. The circuit contains memory that stores theidentification Code and other pertinent data to be transmitted when thechip is activated or interrogated using radio energy from a reader. Areader consists of an RF antenna, transceiver and a micro-processor. Thetransceiver sends activation signals to and receives identification datafrom the tag. The antenna may be enclosed with the reader or locatedoutside the reader as a separate piece. RFID readers communicatedirectly with the RFID tags and send encrypted usage data over thepatient's network to the server 20 and eventually over the Internet 100.The readers can be built directly into the walls or the cabinet doors.

In one embodiment, capacitively coupled RFID tags are used. Thecapacitive RFID tag includes a silicon microprocessor that can store 96bits of information, including the pharmaceutical manufacturer, drugname, usage instruction and a 40-bit serial number. A conductive carbonink acts as the tag's antenna and is applied to a paper substratethrough conventional printing means. The silicon chip is attached toprinted carbon-ink electrodes on the back of a paper label, creating alow-cost, disposable tag that can be integrated on the drug label. Theinformation stored on the drug labels is written in a Medicine MarkupLanguage (MML), which is based on the eXtensible Markup Language (XML).MML would allow all computers to communicate with any computer system ina similar way that Web servers read Hyper Text Markup Language (HTML),the common language used to create Web pages.

After receiving the medicine container, the patient places the medicinein a medicine cabinet, which is also equipped with a tag reader. Thissmart cabinet then tracks all medicine stored in it. It can track themedicine taken, how often the medicine is restocked and can let thepatient know when a particular medication is about to expire. At thispoint, the server 20 can order these items automatically. The server 20also monitors drug compliance, and if the patient does not remove thebottle to dispense medication as prescribed, the server 20 sends awarning to the healthcare provider.

FIG. 3 shows an exemplary process to non-invasively infer daily lifeactivities. Although the detection needs not be done in any particularorder, an exemplary sequence is discussed. In one implementation, theprocess detects wake-up time in the daily activity patterns in 201. Forexample, the wake-up time may be detected by detecting existence of aperson on a bed by using a pyroelectric infrared sensor, detecting thata television set is turned on in the morning or detecting electricalactivities in the restroom in the morning. In another example, thebedtime may be detected by detecting that the television set is turnedoff at night or detecting the electric lamp being turned off in thebedroom. A telephone time detection 202 detects calling time in thedaily activity patterns by receiving and analyzing phone bills oralternatively each time a phone is used, the phone transmits a log tothe monitoring server to indicate the time when the person to beobserved is using the phone. A toilet time detection 203 detectstoilet-using time in the daily activity patterns by detecting that theelectric lamp in the toilet is turned on/off and a low volume of waterconsumption rate. An entertainment time detection 204 detects TVwatching time in the daily activity patterns by receiving and analyzingTV display power consumption or alternatively when stereo equipment ison. A bathing time detection 205 detects bathing time in the dailyactivity patterns by detecting a high volume of water consumption rateand that the electric lamp in the bathroom is turned on. A cooking timedetection 206 detects cooking time in the daily activity patterns and iscomprised of one or more sensors or one or more home electric appliancesfor detecting the time when the person to be observed is cooking. Forexample, the cooking time may be detected by detecting that a ricecooker or microwave oven is turned on/off, detecting that a gas range oran IH (Induction-Heating) cooking heater is turned on/off or detectingother cooking home electric appliances are turned on/off.

A room-to-room movement frequency detection 207 detects the number ofmovement between rooms in the daily activity patterns and is comprisedof one or more sensors or one or more home electric appliances fordetecting the number of movement between the rooms. For example, thenumber of movement between the rooms may be detected by detecting thatthe electric lamps in each room are turned on/off or detecting thatother home electric appliances in each room are turned on/off.

Data of the daily activity patterns is detected by these detectionsensors and transmitted to the data processing apparatus in a wirelessor wired manner and, then, the transmitted data is stored in databasesof the data processing apparatus. Every time the data processingapparatus receives the data of the daily activity patterns from thedetection sensors, it performs the statistical analyses of the storeddata so as to determine whether the received daily activity pattern isabnormal or not. If it is determined that the received daily activitypattern is abnormal, the reporting apparatus in the home of the personto be observed or the reporting apparatuses are informed of theabnormality. In response to the abnormality notification, the person tobe observed or the observers checks whether the abnormality notificationis correct or not and gives the data processing apparatus feedback aboutwhether the abnormality notification is correct or not. Based on thefeedback information, the data processing apparatus determines whetherthe daily activity patterns that have been considered abnormalcorrespond to the actual abnormalities or not and learns the dailyactivity patterns unique to the person to be observed. Here, althoughexamples of the sensors for detecting the daily activity patternsinclude only the wake-up time detection, the bedtime detection, thetoilet time detection, the room cleaning time detection, the bathingtime detection, the cooking time detection and the room-to-room movementfrequency detection as described above, other sensors for detecting thedaily activity patterns may be provided.

For example, if the user typically sleeps between 10 pm to 6 am, thelocation would reflect that the user's location maps to the bedroombetween 10 pm and 6 am. In one exemplary system with an optional heartrate monitor, the system builds a schedule of the user's activity asfollows:

Location Time Start Time End Heart Rate Bed room   10 pm   6 am 60-80 Gym room   6 am   7 am 90-120 Bath room   7 am 7:30 am 85-120 Diningroom 7:30 am 8:45 am 80-90  Home Office 8:45 am 11:30 am  85-100 . . . .. .

FIG. 4 shows an exemplary process to monitor a patient. First, theprocess acquires utility meter data (304). In one embodiment, a directdata connection to a utility company database can be done. In anotherembodiment, sensors can be placed next to utility meters to get the datawithout having to get data from the utility company. Next, the processidentifies individual appliance utility consumption from the utilitymeter data (306). The process then determines daily life activitypatterns from the individual appliance utility consumption; and sendinga request for assistance when the pattern matches one or morepredetermined conditions (310).

The predetermined conditions can be dangerous conditions such as when aperson has fallen, as detected by the 3D accelerometers, or indirectlysuch as when the patient is in the bathroom for an unusual period. Thedangerous condition can include being in one position (such as bed orchair) for too long; having an oven on for an extended period, havingthe TV on without turning on lights in the bed room past a normal sleeptime, or may be as simple as the cellphone being turned off for toolong. The predetermined conditions can be programmed by a systeminstaller, and may not relate to dangerous conditions, but simplyconditions where someone such as a family member or a caretaker shouldfollow up to ensure patient safety.

In one embodiment, the phone can simply request that the user shuts offan alarm countdown or acknowledge that the patient is doing ok toprevent false alarms. The daily life activity tracking is adaptive inthat it gradually adjusts to the user's new activities and/or habits. Ifthere are sudden changes, the system flags these sudden changes forfollow up. For instance, if the user spends three hours in the bathroom,the system prompts the third party (such as a call center) to follow upwith the patient to make sure he or she does not need help.

In one embodiment, data driven analyzers may be used to track thepatient's habits. These data driven analyzers may incorporate a numberof models such as parametric statistical models, non-parametricstatistical models, clustering models, nearest neighbor models,regression methods, and engineered (artificial) neural networks. Priorto operation, data driven analyzers or models of the patient's habits orambulation patterns are built using one or more training sessions. Thedata used to build the analyzer or model in these sessions are typicallyreferred to as training data. As data driven analyzers are developed byexamining only training examples, the selection of the training data cansignificantly affect the accuracy and the learning speed of the datadriven analyzer. One approach used heretofore generates a separate dataset referred to as a test set for training purposes. The test set isused to avoid overfitting the model or analyzer to the training data.Overfitting refers to the situation where the analyzer has memorized thetraining data so well that it fails to fit or categorize unseen data.Typically, during the construction of the analyzer or model, theanalyzer's performance is tested against the test set. The selection ofthe analyzer or model parameters is performed iteratively until theperformance of the analyzer in classifying the test set reaches anoptimal point. At this point, the training process is completed. Analternative to using an independent training and test set is to use amethodology called cross-validation. Cross-validation can be used todetermine parameter values for a parametric analyzer or model for anon-parametric analyzer. In cross-validation, a single training data setis selected. Next, a number of different analyzers or models are builtby presenting different parts of the training data as test sets to theanalyzers in an iterative process. The parameter or model structure isthen determined on the basis of the combined performance of all modelsor analyzers. Under the cross-validation approach, the analyzer or modelis typically retrained with data using the determined optimal modelstructure.

In general, multiple dimensions of a user's daily activities such asstart and stop times of interactions of different interactions areencoded as distinct dimensions in a database. A predictive model,including time series models such as those employing autoregressionanalysis and other standard time series methods, dynamic Bayesiannetworks and Continuous Time Bayesian Networks, or temporalBayesian-network representation and reasoning methodology, is built, andthen the model, in conjunction with a specific query makes targetinferences.

Bayesian networks provide not only a graphical, easily interpretablealternative language for expressing background knowledge, but they alsoprovide an inference mechanism; that is, the probability of arbitraryevents can be calculated from the model. Intuitively, given a Bayesiannetwork, the task of mining interesting unexpected patterns can berephrased as discovering item sets in the data which are much more—ormuch less—frequent than the background knowledge suggests. These casesare provided to a learning and inference subsystem, which constructs aBayesian network that is tailored for a target prediction. The Bayesiannetwork is used to build a cumulative distribution over events ofinterest.

In another embodiment, a genetic algorithm (GA) search technique can beused to find approximate solutions to identifying the user's habits.Genetic algorithms are a particular class of evolutionary algorithmsthat use techniques inspired by evolutionary biology such asinheritance, mutation, natural selection, and recombination (orcrossover). Genetic algorithms are typically implemented as a computersimulation in which a population of abstract representations (calledchromosomes) of candidate solutions (called individuals) to anoptimization problem evolves toward better solutions. Traditionally,solutions are represented in binary as strings of 0s and 1s, butdifferent encodings are also possible. The evolution starts from apopulation of completely random individuals and happens in generations.In each generation, the fitness of the whole population is evaluated,multiple individuals are stochastically selected from the currentpopulation (based on their fitness), modified (mutated or recombined) toform a new population, which becomes current in the next iteration ofthe algorithm.

Substantially any type of learning system or process may be employed todetermine the user's ambulatory and living patterns so that unusualevents can be flagged.

In one embodiment, clustering operations are performed to detectpatterns in the data. In another embodiment, a neural network is used torecognize each pattern as the neural network is quite robust atrecognizing user habits or patterns. Once the treatment features havebeen characterized, the neural network then compares the input userinformation with stored templates of treatment vocabulary known by theneural network recognizer, among others. The recognition models caninclude a Hidden Markov Model (HMM), a dynamic programming model, aneural network, a fuzzy logic, or a template matcher, among others.These models may be used singly or in combination.

Dynamic programming considers all possible points within the permitteddomain for each value of i. Because the best path from the current pointto the next point is independent of what happens beyond that point.Thus, the total cost of [i(k), j(k)] is the cost of the point itselfplus the cost of the minimum path to it. Preferably, the values of thepredecessors can be kept in an M×N array, and the accumulated cost keptin a 2×N array to contain the accumulated costs of the immediatelypreceding column and the current column. However, this method requiressignificant computing resources. For the recognizer to find the optimaltime alignment between a sequence of frames and a sequence of nodemodels, it must compare most frames against a plurality of node models.One method of reducing the amount of computation required for dynamicprogramming is to use pruning Pruning terminates the dynamic programmingof a given portion of user habit information against a given treatmentmodel if the partial probability score for that comparison drops below agiven threshold. This greatly reduces computation.

Considered to be a generalization of dynamic programming, a hiddenMarkov model is used in the preferred embodiment to evaluate theprobability of occurrence of a sequence of observations O(1), O(2), . .. O(t), . . . , O(T), where each observation O(t) may be either adiscrete symbol under the VQ approach or a continuous vector. Thesequence of observations may be modeled as a probabilistic function ofan underlying Markov chain having state transitions that are notdirectly observable. In one embodiment, the Markov network is used tomodel a number of user habits and activities. The transitions betweenstates are represented by a transition matrix A=[a(i,j)]. Each a(i,j)term of the transition matrix is the probability of making a transitionto state j given that the model is in state i. The output symbolprobability of the model is represented by a set of functions B=[b(j)(O(t)], where the b(j) (O(t) term of the output symbol matrix is theprobability of outputting observation O(t), given that the model is instate j. The first state is always constrained to be the initial statefor the first time frame of the utterance, as only a prescribed set ofleft to right state transitions are possible. A predetermined finalstate is defined from which transitions to other states cannot occur.Transitions are restricted to reentry of a state or entry to one of thenext two states. Such transitions are defined in the model as transitionprobabilities. Although the preferred embodiment restricts the flowgraphs to the present state or to the next two states, one skilled inthe art can build an HMM model without any transition restrictions,although the sum of all the probabilities of transitioning from anystate must still add up to one. In each state of the model, the currentfeature frame may be identified with one of a set of predefined outputsymbols or may be labeled probabilistically. In this case, the outputsymbol probability b(j) O(t) corresponds to the probability assigned bythe model that the feature frame symbol is O(t). The model arrangementis a matrix A=[a(i,j)] of transition probabilities and a technique ofcomputing B=b(j) O(t), the feature frame symbol probability in state j.The Markov model is formed for a reference pattern from a plurality ofsequences of training patterns and the output symbol probabilities aremultivariate Gaussian function probability densities. The patient habitinformation is processed by a feature extractor. During learning, theresulting feature vector series is processed by a parameter estimator,whose output is provided to the hidden Markov model. The hidden Markovmodel is used to derive a set of reference pattern templates, eachtemplate representative of an identified pattern in a vocabulary set ofreference treatment patterns. The Markov model reference templates arenext utilized to classify a sequence of observations into one of thereference patterns based on the probability of generating theobservations from each Markov model reference pattern template. Duringrecognition, the unknown pattern can then be identified as the referencepattern with the highest probability in the likelihood calculator. TheHMM template has a number of states, each having a discrete value.However, because treatment pattern features may have a dynamic patternin contrast to a single value. The addition of a neural network at thefront end of the HMM in an embodiment provides the capability ofrepresenting states with dynamic values. The input layer of the neuralnetwork comprises input neurons. The outputs of the input layer aredistributed to all neurons in the middle layer. Similarly, the outputsof the middle layer are distributed to all output states, which normallywould be the output layer of the neuron. However, each output hastransition probabilities to itself or to the next outputs, thus forminga modified HMM. Each state of the thus formed HMM is capable ofresponding to a particular dynamic signal, resulting in a more robustHMM. Alternatively, the neural network can be used alone withoutresorting to the transition probabilities of the HMM architecture.

The system allows patients to conduct a low-cost, comprehensive,real-time monitoring of their vital daily life activities. Informationcan be viewed using an Internet-based website, a personal computer, orsimply by viewing a display on the monitor. Data measured several timeseach day provide a relatively comprehensive data set compared to thatmeasured during medical appointments separated by several weeks or evenmonths. This allows both the patient and medical professional to observetrends in the data, such as a gradual increase or decrease in bloodpressure, which may indicate a medical condition. The invention alsominimizes effects of white coat syndrome since the monitor automaticallymakes measurements with basically no discomfort; measurements are madeat the patient's home or work, rather than in a medical office.

To view information on daily life activities, the patient or anauthorized third party such as family members, emergency personnel, ormedical professional accesses a patient user interface hosted on the webserver 200 through the Internet 100 from a remote computer system. Thepatient interface displays vital information such as ambulation, bloodpressure and related data measured from a single patient. The system mayalso include a call center, typically staffed with medical professionalssuch as doctors, nurses, or nurse practioners, whom access acare-provider interface hosted on the same website on the server 200.The care-provider interface displays vital data from multiple patients.

The wearable appliance has an indoor positioning system and processesthese signals to determine a location (e.g., latitude, longitude, andaltitude) of the monitor and, presumably, the patient. This locationcould be plotted on a map by the server, and used to locate a patientduring an emergency, e.g. to dispatch an ambulance.

In one embodiment, the web page hosted by the server 200 includes aheader field that lists general information about the patient (e.g.name, age, and ID number, general location, and information concerningrecent measurements); a table that lists recently measured bloodpressure data and suggested (i.e. doctor-recommended) values of thesedata; and graphs that plot the systolic and diastolic blood pressuredata in a time-dependent manner. The header field additionally includesa series of tabs that each link to separate web pages that include,e.g., tables and graphs corresponding to a different data measured bythe wearable device such as calorie consumption/dissipation, ambulationpattern, sleeping pattern, heart rate, pulse oximetry, and temperature.The table lists a series of data fields that show running average valuesof the patient's daily, monthly, and yearly vital parameters. The levelsare compared to a series of corresponding ‘suggested’ values of vitalparameters that are extracted from a database associated with the website. The suggested values depend on, among other things, the patient'sage, sex, and weight. The table then calculates the difference betweenthe running average and suggested values to give the patient an idea ofhow their data compares to that of a healthy patient. The web softwareinterface may also include security measures such as authentication,authorization, encryption, credential presentation, and digitalsignature resolution. The interface may also be modified to conform toindustry-mandated, XML schema definitions, while being ‘backwardscompatible’ with any existing XML schema definitions.

The system provides for self-registration of Internet enabled appliancesby the user. Data can be synchronized between the Repository andappliance(s) via the base station 20. The user can preview the readingsreceived from the appliance(s) and reject erroneous readings. The useror treating professional can set up the system to generate alertsagainst received data, based on pre-defined parameters. The system candetermine trends in received data, based on user defined parameters.

Appliance registration is the process by which a patient monitoringappliance is associated with one or more users of the system. Thismechanism is also used when provisioning appliances for a user by athird party, such as a clinician (or their respective delegate). In oneimplementation, the user (or delegate) logs into the portal to selectone or more appliances and available for registration. In turn, the basestation server 20 broadcasts a query to all nodes in the mesh network toretrieve identification information for the appliance such asmanufacturer information, appliance model information, appliance serialnumber and optionally a hub number (available on hub packaging). Theuser may register more than one appliance at this point. The systemoptionally sets up a service subscription for appliance(s) usage. Thisincludes selecting service plans and providing payment information. Theappliance(s) are then associated with this user's account and a controlfile with appliance identification information is synchronized betweenthe server 200 and the base station 20 and each appliance oninitialization. In one embodiment, each appliance 8 transmits data tothe base station 20 in an XML format for ease of interfacing and iseither kept encrypted or in a non-readable format on the base station 20for security reasons.

The base station 20 frequently collects and synchronizes data from theappliances 8. The base station 20 may use one of various transportationmethods to connect to the repository on the server 200 using a PC asconduit or through a connection established using an embedded modem(connected to a phone line), a wireless router (DSL or cable wirelessrouter), a cellular modem, or another network-connected appliance (suchas, but not limited to, a web-phone, video-phone, embedded computer, PDAor handheld computer).

In one embodiment, users may set up alerts or reminders that aretriggered when one or more reading meet a certain set of conditions,depending on parameters defined by the user. The user chooses thecondition that they would like to be alerted to and by providing theparameters (e.g. threshold value for the reading) for alert generation.Each alert may have an interval which may be either the number of datapoints or a time duration in units such as hours, days, weeks or months.The user chooses the destination where the alert may be sent. Thisdestination may include the user's portal, e-mail, pager, voice-mail orany combination of the above.

Trends are determined by applying mathematical and statistical rules(e.g. moving average and deviation) over a set of reading values. Eachrule is configurable by parameters that are either automaticallycalculated or are set by the user.

The user may give permission to others as needed to read or edit theirpersonal data or receive alerts. The user or clinician could have a listof people that they want to monitor and have it show on their “MyAccount” page, which serves as a local central monitoring station in oneembodiment. Each person may be assigned different access rights whichmay be more or less than the access rights that the patient has. Forexample, a doctor or clinician could be allowed to edit data for exampleto annotate it, while the patient would have read-only privileges forcertain pages. An authorized person could set the reminders and alertsparameters with limited access to others. In one embodiment, the basestation server 20 serves a web page customized by the user or the user'srepresentative as the monitoring center that third parties such asfamily, physicians, or caregivers can log in and access information. Inanother embodiment, the base station 20 communicates with the server 200at a call center so that the call center provides all services. In yetanother embodiment, a hybrid solution where authorized representativescan log in to the base station server 20 access patient informationwhile the call center logs into both the server 200 and the base stationserver 20 to provide complete care services to the patient.

The server 200 may communicate with a business process outsourcing (BPO)company or a call center to provide central monitoring in an environmentwhere a small number of monitoring agents can cost effectively monitormultiple people 24 hours a day. A call center agent, a clinician or anursing home manager may monitor a group or a number of users via asummary “dashboard” of their readings data, with ability to drill-downinto details for the collected data. A clinician administrator maymonitor the data for and otherwise administer a number of users of thesystem. A summary “dashboard” of readings from all Patients assigned tothe Administrator is displayed upon log in to the Portal by theAdministrator. Readings may be color coded to visually distinguishnormal vs. readings that have generated an alert, along with descriptionof the alert generated. The Administrator may drill down into thedetails for each Patient to further examine the readings data, viewcharts etc. in a manner similar to the Patient's own use of the system.The Administrator may also view a summary of all the appliancesregistered to all assigned Patients, including but not limited to allappliance identification information. The Administrator has access onlyto information about Patients that have been assigned to theAdministrator by a Super Administrator. This allows for segmenting theentire population of monitored Patients amongst multiple Administrators.The Super Administrator may assign, remove and/or reassign Patientsamongst a number of Administrators.

In one embodiment, a patient using an Internet-accessible computer andweb browser, directs the browser to an appropriate URL and signs up fora service for a short-term (e.g., 1 month) period of time. The companyproviding the service completes an accompanying financial transaction(e.g. processes a credit card), registers the patient, and ships thepatient a wearable appliance for the short period of time. Theregistration process involves recording the patient's name and contactinformation, a number associated with the monitor (e.g. a serialnumber), and setting up a personalized website. The patient then usesthe monitor throughout the monitoring period, e.g. while working,sleeping, and exercising. During this time the monitor measures datafrom the patient and wirelessly transmits it through the channel to adata center. There, the data are analyzed using software running oncomputer servers to generate a statistical report. The computer serversthen automatically send the report to the patient using email, regularmail, or a facsimile machine at different times during the monitoringperiod. When the monitoring period is expired, the patient ships thewearable appliance back to the monitoring company.

Different web pages may be designed and accessed depending on theend-user. As described above, individual users have access to web pagesthat only their ambulation and blood pressure data (i.e., the patientinterface), while organizations that support a large number of patients(nursing homes or hospitals) have access to web pages that contain datafrom a group of patients using a care-provider interface. Otherinterfaces can also be used with the web site, such as interfaces usedfor: insurance companies, members of a particular company, clinicaltrials for pharmaceutical companies, and e-commerce purposes. Vitalpatient data displayed on these web pages, for example, can be sortedand analyzed depending on the patient's medical history, age, sex,medical condition, and geographic location. The web pages also support awide range of algorithms that can be used to analyze data once they areextracted from the data packets. For example, an instant message oremail can be sent out as an ‘alert’ in response to blood pressureindicating a medical condition that requires immediate attention.Alternatively, the message could be sent out when a data parameter (e.g.systolic blood pressure) exceeds a predetermined value. In some cases,multiple parameters (e.g., fall detection, positioning data, and bloodpressure) can be analyzed simultaneously to generate an alert message.In general, an alert message can be sent out after analyzing one or moredata parameters using any type of algorithm. These algorithms range fromthe relatively simple (e.g., comparing blood pressure to a recommendedvalue) to the complex (e.g., predictive medical diagnoses using datamining′ techniques). In some cases data may be ‘fit’ using algorithmssuch as a linear or non-linear least-squares fitting algorithm.

In one embodiment, a physician, other health care practitioner, oremergency personnel is provided with access to patient medicalinformation through the server 200. In one embodiment, if the wearableappliance detects that the patient needs help, or if the patient decideshelp is needed, the system can call his or her primary care physician.If the patient is unable to access his or her primary care physician (oranother practicing physician providing care to the patient) a call fromthe patient is received, by an answering service or a call centerassociated with the patient or with the practicing physician. The callcenter determines whether the patient is exhibiting symptoms of anemergency condition by polling vital patient information generated bythe wearable device, and if so, the answering service contacts 911emergency service or some other emergency service. The call center canreview falls information, blood pressure information, and other vitalinformation to determine if the patient is in need of emergencyassistance. If it is determined that the patient in not exhibitingsymptoms of an emergent condition, the answering service may thendetermine if the patient is exhibiting symptoms of a non-urgentcondition. If the patient is exhibiting symptoms of a non-urgentcondition, the answering service will inform the patient that he or shemay log into the server 200 for immediate information on treatment ofthe condition. If the answering service determines that the patient isexhibiting symptoms that are not related to a non-urgent condition, theanswering service may refer the patient to an emergency room, a clinic,the practicing physician (when the practicing physician is available)for treatment.

In another embodiment, the wearable appliance permits direct access tothe call center when the user pushes a switch or button on theappliance, for instance. In one implementation, telephones and switchingsystems in call centers are integrated with the home mesh network toprovide for, among other things, better routing of telephone calls,faster delivery of telephone calls and associated information, andimproved service with regard to client satisfaction throughcomputer-telephony integration (CTI). CTI implementations of variousdesign and purpose are implemented both within individual call-centersand, in some cases, at the telephone network level. For example,processors running CTI software applications may be linked to telephoneswitches, service control points (SCPs), and network entry points withina public or private telephone network. At the call-center level,CTI-enhanced processors, data servers, transaction servers, and thelike, are linked to telephone switches and, in some cases, to similarCTI hardware at the network level, often by a dedicated digital link.CTI processors and other hardware within a call-center is commonlyreferred to as customer premises equipment (CPE). It is the CTIprocessor and application software is such centers that providescomputer enhancement to a call center. In a CTI-enhanced call center,telephones at agent stations are connected to a central telephonyswitching apparatus, such as an automatic call distributor (ACD) switchor a private branch exchange (PBX). The agent stations may also beequipped with computer terminals such as personal computer/video displayunit's (PC/VDU's) so that agents manning such stations may have accessto stored data as well as being linked to incoming callers by telephoneequipment. Such stations may be interconnected through the PC/VDUs by alocal area network (LAN). One or more data or transaction servers mayalso be connected to the LAN that interconnects agent stations. The LANis, in turn, typically connected to the CTI processor, which isconnected to the call switching apparatus of the call center.

When a call from a patient arrives at a call center, whether or not thecall has been pre-processed at an SCP, the telephone number of thecalling line and the medical record are made available to the receivingswitch at the call center by the network provider. This service isavailable by most networks as caller-ID information in one of severalformats such as Automatic Number Identification (ANI). Typically thenumber called is also available through a service such as Dialed NumberIdentification Service (DNIS). If the call center is computer-enhanced(CTI), the phone number of the calling party may be used as a key toaccess additional medical and/or historical information from a customerinformation system (CIS) database at a server on the network thatconnects the agent workstations. In this manner information pertinent toa call may be provided to an agent, often as a screen pop on the agent'sPC/VDU.

The call center enables any of a first plurality of physician or healthcare practitioner terminals to be in audio communication over thenetwork with any of a second plurality of patient wearable appliances.The call center will route the call to a physician or other health carepractitioner at a physician or health care practitioner terminal andinformation related to the patient (such as an electronic medicalrecord) will be received at the physician or health care practitionerterminal via the network. The information may be forwarded via acomputer or database in the practicing physician's office or by acomputer or database associated with the practicing physician, a healthcare management system or other health care facility or an insuranceprovider. The physician or health care practitioner is then permitted toassess the patient, to treat the patient accordingly, and to forwardupdated information related to the patient (such as examination,treatment and prescription details related to the patient's visit to thepatient terminal) to the practicing physician via the network 200.

In one embodiment, the system informs a patient of a practicingphysician of the availability of the web services and referring thepatient to the web site upon agreement of the patient. A call from thepatient is received at a call center. The call center enables physiciansto be in audio communication over the network with any patient wearableappliances, and the call is routed to an available physician at one ofthe physician so that the available physician may carry on a two-wayconversation with the patient. The available physician is permitted tomake an assessment of the patient and to treat the patient. The systemcan forward information related to the patient to a health caremanagement system associated with the physician. The health caremanagement system may be a healthcare management organization, a pointof service health care system, or a preferred provider organization. Thehealth care practitioner may be a nurse practitioner or an internist.

The available health care practitioner can make an assessment of thepatient and to conduct an examination of the patient over the network,including optionally by a visual study of the patient. The system canmake an assessment in accordance with a protocol. The assessment can bemade in accordance with a protocol stored in a database and/or making anassessment in accordance with the protocol may include displaying inreal time a relevant segment of the protocol to the available physician.Similarly, permitting the physician to prescribe a treatment may includepermitting the physician to refer the patient to a third party fortreatment and/or referring the patient to a third party for treatmentmay include referring the patient to one or more of a primary carephysician, specialist, hospital, emergency room, ambulance service orclinic. Referring the patient to a third party may additionally includecommunicating with the third party via an electronic link included in arelevant segment of a protocol stored in a protocol database resident ona digital storage medium and the electronic link may be a hypertextlink. When a treatment is being prescribed by a physician, the systemcan communicate a prescription over the network to a pharmacy and/orcommunicating the prescription over the network to the pharmacy mayinclude communicating to the pharmacy instructions to be given to thepatient pertaining to the treatment of the patient. Communicating theprescription over the network to the pharmacy may also includecommunicating the prescription to the pharmacy via a hypertext linkincluded in a relevant segment of a protocol stored in a databaseresident on a digital storage medium. In accordance with another relatedembodiment, permitting the physician to conduct the examination may beaccomplished under conditions such that the examination is conductedwithout medical instruments at the patient terminal where the patient islocated.

In another embodiment, a system for delivering medical examination,diagnosis, and treatment services from a physician to a patient over anetwork includes a first plurality of health care practitioners at aplurality of terminals, each of the first plurality of health carepractitioner terminals including a display device that shows informationcollected by the wearable appliances and a second plurality of patientterminals or wearable appliances in audiovisual communication over anetwork with any of the first plurality of health care practitionerterminals. A call center is in communication with the patient wearableappliances and the health care practitioner terminals, the call centerrouting a call from a patient at one of the patient terminals to anavailable health care practitioner at one of the health carepractitioner terminals, so that the available health care practitionermay carry on a two-way conversation with the patient. A protocoldatabase resident on a digital storage medium is accessible to each ofthe health care practitioner terminals. The protocol database contains aplurality of protocol segments such that a relevant segment of theprotocol may be displayed in real time on the display device of thehealth care practitioner terminal of the available health carepractitioner for use by the available health care practitioner in makingan assessment of the patient. The relevant segment of the protocoldisplayed in real time on the display device of the health carepractitioner terminal may include an electronic link that establishescommunication between the available health care practitioner and a thirdparty and the third party may be one or more of a primary carephysician, specialist, hospital, emergency room, ambulance service,clinic or pharmacy.

In accordance with other related embodiment, the patient wearableappliance may include establish a direct connection to the call centerby pushing a button on the appliance. Further, the protocol database maybe resident on a server that is in communication with each of the healthcare practitioner terminals and each of the health care practitionerterminals may include a local storage device and the protocol databaseis replicated on the local storage device of one or more of thephysician terminals.

In another embodiment, a system for delivering medical examination,diagnosis, and treatment services from a physician to a patient over anetwork includes a first plurality of health care practitionerterminals, each of the first plurality of health care practitionerterminals including a display device and a second plurality of patientterminals in audiovisual communication over a network with any of thefirst plurality of health care practitioner terminals. Each of thesecond plurality of patient terminals includes a camera having pan, tiltand zoom modes, such modes being controlled from the first plurality ofhealth care practitioner terminals. A call center is in communicationwith the patient terminals and the health care practitioner terminalsand the call center routes a call from a patient at one of the patientterminals to an available health care practitioner at one of the healthcare practitioner terminals, so that the available health carepractitioner may carry on a two-way conversation with the patient andvisually observe the patient.

In one embodiment, the information is store in a secure environment,with security levels equal to those of online banking, social securitynumber input, and other confidential information. Conforming to HealthInsurance Portability and Accountability Act (HIPAA) requirements, thesystem creates audit trails, requires logins and passwords, and providesdata encryption to ensure the patient information is private and secure.The HIPAA privacy regulations ensure a national floor of privacyprotections for patients by limiting the ways that health plans,pharmacies, hospitals and other covered entities can use patients'personal medical information. The regulations protect medical recordsand other individually identifiable health information, whether it is onpaper, in computers or communicated orally.

FIG. 5 shows an exemplary process to use NILM with hourly data. First,the process reads hourly energy load data from utility meters (400).Then the NILM engine disaggregates energy consumption for each ofpredetermined appliances from the hourly energy load data (410). Oncethe energy consumption has been disaggregated to show appliance energyusage data, the system can send normatively messages to users to reduceenergy consumption (420).

In one embodiment, once the system has accurate energy usage models forthe building and its occupants, the system applies normative messagingto successfully engage and motivate action across a very high percentageof targeted individuals. The normative message motivates office workersto take action which is one of the main challenges to achieving largescale energy savings. Participation rates in most energy-efficiencyprograms are typically less than 5%. By contrast, the messaging systemachieves much higher energy-saving actions by presenting users with onlyrelevant and immediately actionable suggestions on how to cut down powerconsumption in their immediate office/cubicle. The system leveragesbehavioral science, customer data analytics, and the latest software toengage employees of utilities and energy consumers to collectively takeaction to save energy. The system enables energy consumers to increaseenergy efficiency, reduce costs, and realize environmental benefits. Thesystem can:

-   -   Collect detailed occupancy/usage data with a combination of        sub-meters and low cost sensors    -   Create models of occupancy patterns (Daily Office Activities)    -   Visualize usage data    -   Apply occupancy models with sensor data to automatically control        HVAC/heating/lighting/appliances to save energy    -   Predict demand and communicate with utility computers during        peak load    -   Prompting of building occupants for energy-saving actions.

The system can compare a consumer's energy usage with similar energyconsumption from his or her neighbors, and then select based on thecomparison, a message to be provided to the consumer. The system candetermine the relevant population that the consumer belongs to forcomparison purposes. The relevant population can be based on geography,such as a city name, postal code, or both. The system can select anormative message from a plurality of candidate messages. The messageselection can include assigning to each of at least a subset of aplurality of candidate messages a priority and selecting based at leastin part on the assigned priorities a number of selected messages,wherein the number of messages selected corresponds to a limited numberof messages to be presented to the consumer. The system can receivefeedback indicative of an effectiveness of the message wherein themessage is selected based at least in part on the feedback. Feedbackdata includes usage of at least the relevant population and theconsumer. Feedback data includes consumer action taken with respect tothe message. The system can determine usage of the resource as one ormore of the following: a time-value curve, a mean usage, a median usage,an average usage, and an aggregate usage. The message to be provided tothe consumer is part of the consumer's resource bill, the resource'swebsite, or both.

The system can communicate a consumer's usage of an energy resource.First, a relevant group is determined. In some embodiments this may beomitted if a relevant member of the similar group is pre-calculated ordetermined externally. In some embodiments, determining the relevantgroup can include selecting the relevant group based at least in part ona determination that the consumer's usage of energy is greater than therelevant members of the similar group's usage of energy resource.Selecting the relevant members of the similar group can includecomparing the consumer's usage to that of each of a plurality ofcandidate members of the similar groups and selecting as the relevantmembers of the similar group the candidate members of the similar groupto which the consumer compares least favorably. In some embodiments,determining the relevant members of the similar group can include usingthird party data sources. For example, third party data sources mayinclude records associated with home ownership, which are used toidentify relevant members of the similar group based at least in part oninformation indicating such members own a home associated with theirconsumption of the resource. The consumer's usage and relevant membersof the similar group's usage of the resource are compared. The usage ofthe resource may be time-value curve or a statistical measure such as amean, median, average, or aggregate usage. In some embodiments, theusage is chosen at least in part so that the consumer's usage of theresource is greater than the relevant members of the similar group'susage of the resource. The comparison is communicated to the consumer.In some embodiments, the comparison is communicated to the consumer asintegrated with the consumer's resource bill, standalone with theconsumer's resource bill or on the resource's website under theconsumer's web account.

Targeted direct marketing techniques can be used to persuade a consumerto moderate resource consumption using one or more of these techniques:

-   -   segmentation of the set of consumers into different subsets        based upon a plurality of demographic variables;    -   segmentation of the set of consumers into different subsets        based upon analysis and characterization of energy usage        normalized to relevant peer groups;    -   prioritization of the messages based upon their historical rate        of uptake multiplied by the expected energy savings value of the        program;    -   offers and services for resource efficient products discounted        by private industry through rebates, coupons, and other        discounts to support government subsidies of efficient products;    -   high quality design (using high quality print design, high        quality web graphics, video, audio and other multimedia) for all        data reports, dynamically customized for each consumer;    -   integration with an Internet site or website for online and        offline viewing of reports;    -   scalability of report format to hundreds of millions of reports;    -   enabling efficacy tracking of hundreds of simultaneous marketing        and messaging campaigns; and    -   straightforward integration with resource and/or utility        databases.

In one example, a relevant group for a consumer could be “3-bedroomhouses on the consumer's street”. The system may have data that over atwelve month average, the consumer used 66% more electrical energy thanthe relevant group. Another example can include data that one or moremembers of the relevant group recently participated in a air conditionerefficiency rebate program, or that the consumer's electricity usagetime-value curve coupled with a temperature time-value curve indicatesthat the consumer's electricity usage is higher than average during hotweather. In some embodiments, a similar analysis would determine whethera consumer's electricity usage increases as a percentage of daily usemore than average during hot weather.

In some embodiments, the system can take a global list of possiblecandidate messages and filters out and prioritizes messages to be sentto the consumer. For example, the long global list of possible candidatemessages may include a message to “install efficient central airconditioning using an existing government rebate”, a message to “installa timer for a car engine block heater during winter”. In the aboveexample where the input data shows that a consumer's electricity usageis higher than average during hot weather, and that 39% of the relevantgroup members have participated in an air conditioner rebate program,the system may prioritize the “install efficient central airconditioning using an existing government rebate” candidate messagehigher than “install a timer for a car engine block heater duringwinter” candidate message, especially if another data indicates theconsumer and relevant group members live in a state where there are nowinters below freezing. Feedback is used to determine the effectivenessof the algorithms used in the messaging module to determine appropriateselected messages. In some embodiments, feedback includes usage of atleast the relevant group members and the consumer, to see if any or nochange has occurred since the last communication. In some embodiments,feedback includes consumer action taken with respect to the message, forexample if a consumer has since participated in an air conditionerrebate program. In some embodiments, feedback includes an estimate offuture usage of the relevant group and the consumer based on previousconsumer action participation.

For utilities, the deployment of smart metering technology results in aflow of data several magnitudes greater than any previous traditionalmetering schemes. This increased data volume will not only flow into themanaging utility, but may also be passed to and from third-partyretailers for processing under new and modified market transactions. Theneed to manage this data, and subsequently transform it into actionablebusiness intelligence, creates challenges for utilities implementingsmart metering. To meet these challenges, in one embodiment, a loaddisaggregation meter data management systems provides utilities with abusiness-critical solution for storing, validating, aggregating andprocessing large volumes of data, in preparation for billing,settlements and other reporting and reconciliation obligations. In somemarkets, there will also be requirements for timely delivery ofaggregated data to the market. In one embodiment, the system runs on acloud computer that securely connects to a utility data center. Inanother embodiment, the system runs on a computer in the utility datacenter. The system provides “intelligence” that can be derived fromsmart meters and other smart grid devices so that utilities can derivethe substantial benefits that smart grid deployments can deliver. Asthese deployments significantly increase data quantity & availability,the computer providing load disaggregation data analytics is essential.

The system accesses the utility's centralized data repository for meterreadings. Adapters are provided to collection systems that enable rawdata collected from smart meters to be loaded into the loaddisaggregator, while also enabling controls to be performed. The loaddisaggregator allows meter read management components to validate,estimate, edit (VEE) and apply utility-specific or regulation specificbusiness logic to meter readings. An engine is provided to calculateenergy usage, demand and other bill determinants. Adapters are providedto link in to downstream systems that consume processed meter data, suchas billing, settlements, load forecasting, asset management and customerWeb portals.

Emerging trends, such as demand response and distributed generation,introduce potential complexities in meter data management and billingthat may expand the capabilities required from utility data centers. Forinstance, the need to support residential demand-response programs mayrequire the ability to evaluate customer participation using:Demand-response event information; Customer override of load controlreported by in-home devices; Customer baseline calculations usingsophisticated methodologies that compare a number of similar noneventdays adjusted for weather; ability to perform “net settlement” functions(whereby the consumer is compensated for energy delivered onto the gridusing a separate generation tariff). Distributed generation programswill also require additional capabilities. Allowing homes, farms andbusinesses to generate their own power from renewable sources, (such aswind, water, solar and agricultural biomass) and distributing any excesselectricity back to the grid for credit will require: The ability tometer and store at least two channels of energy interval data (importand export values) for all customers. Net metering (consumer is billedfor net energy use during the various tiers). Validation and estimationroutines can account for energy imports from customers (and canaccommodate negative net energy usage in an interval). Association ofgeneration pricing tariffs to customer accounts. Utilities whosebusiness drivers include billing, customer service and efficacy analysisfor their demand-response and distributed generation programs can usethe load disaggregation computer to provide these benefits.

The load disaggregation computer can handle widespread propagationand/or concentration of distributed generation on the distributionnetwork. For example, utility support programs allowing homes, farms andbusinesses to generate their own power from renewable sources—wind,water, solar power, agricultural biomass—and send excess electricityback to the grid for credit, and the eventual mass adoption of plug-inelectric vehicles that can act as distributed generation resourcesduring peak periods. These diverse distributed generation resourcestypically use inverter-based technologies. Large concentrations, definedby some industry studies 3,4 as more than 10 percent of servicedpremises on a feeder, or propagation of distributed generation on rural,low-density feeders, can result in a variety of problems around powerIntegration of distributed generation.

The system allows the smart meter network to act as the communicationsnetwork required to create and implement a smarter distribution grid.New devices, such as transformer and feeder meters, are becomingintegral elements of smart grid deployments. Utilities may also need totrack in-home devices, such as thermostats 142 and load controlswitches—which may not be the utility's own assets—and their lifecycles, as part of device and configuration management. Furthermore,many of these new devices are expected to be capable of remoteconfiguration and reprogramming. The load disaggregator can work withgrid monitoring equipment, such as transformer meters and feeder meters,to enable utilities to maintain accurate information about thedistribution network hierarchy.

In the context of bi-directional smart metering infrastructure networks,the load disaggregator can act as the routing and management componentfor implementing two-way processes. For example, the system can provide“turn-on/turn-off” processes at a utility using a combination of manualprocesses and smart meters with an integrated remote connect disconnect(RCD) switch. In this case, once the load disaggregator and a customerinformation system determine that customer power is to be turned off,the system can determine, depending on the meter type, whether theturn-on/turn-off requires a field service order, or can be executeddirectly through the smart metering infrastructure systems. Otherexamples of process automation enabled by the load disaggregatorinclude: On-demand reads initiated by customer service; Outage pings;Smart meter configuration and firmware upgrade management;Demand-response event orchestration and management. For exceptionmonitoring, reporting and management, the system can subscribe toevents, status messages, alarms and alerts from automated meteringinfrastructure to provide real-time monitoring of the network and fielddevices. The information provided can generate insight into operationalissues, the health of devices and analysis of operational trends.Examples include: Use of reported meter health events to dispatch metertechnicians to the field and review trends that may indicate qualityissues with a particular batch or type of meter; Detection of tamper andtheft from “unexpected” tilt indicators; Analysis of momentary outageindicators reported by meters on a distribution feeder or secondary toidentify the need for vegetation trimming; Integration with intrusiondetection systems to notify a potential security breach in the smartmetering infrastructure network (such as unauthorized access at themeter's optical probe); and Calculation and reporting of reliabilityindices from smart meter outage and restoration information.

The system provides advanced asset management which is the ability tomanage the operational state and performance of assets on thedistribution network. By combining information about the distributionnetwork topology with data from new smart-grid devices—such astransformer meters, low-voltage and medium voltage sensors (feedermeters) and metered data from smart meters and grid sensors—utilitiescan develop a wide array of monitoring, analytical and visualizationapplications. In combination with load disaggregation, theseapplications provide the distribution control center with a much higherdegree of situational awareness. Distribution system planning groups canalso use the same information to achieve a number of benefits. Theseinclude understanding the operational characteristics (such as loading,losses, phase imbalance and utilization) of the distribution networkassets, optimizing the utilization of existing assets and the ability todefer capital expenditure for new assets. The load disaggregation thuscan provide the ability to track grid assets, network hierarchy and datareported by grid devices.

The system allows utilities to offer additional products and servicessuch as providing a low-cost, comprehensive, real-time monitoring ofcustomer's vital daily life activities. Information can be viewed usingan Internet-based website, a personal computer, or simply by viewing adisplay on the monitor. Data measured several times each day provide arelatively comprehensive data set compared to that measured duringmedical appointments separated by several weeks or even months.

While this invention has been particularly shown and described withreferences to preferred embodiments thereof, it will be understood bythose skilled in the art that various changes in form and details may bemade therein without departing from the spirit and scope of theinvention as defined by the appended claims.

What is claimed is:
 1. A method of improving energy efficiency,comprising: determining a home composite load signature and energysaving based on predetermined weather factors and a prior successhistory of the message with predetermined group members; capturingfeedback on messages to consumers to see if at least a change hasoccurred since a communication, wherein the feedback includes a useraction taken with respect to the message; and presenting to the usercost savings between the user's existing appliance and a substituteappliance.
 2. The method of claim 1, further comprising generating anincentive for the user based at least in part on the difference inenergy usage and difference in costs between the user's existingappliance and the substitute appliance.
 3. The method of claim 1,further comprising identifying heat usage and air conditioning usagefrom a thermostat.
 4. The method of claim 1, comprising suggestingactions to take to reduce energy consumption.
 5. The method of claim 1,comprising recommending changes to air conditioning or heatingappliances based on the disaggregated energy consumption to save energy.6. The method of claim 1 comprising mailing users to engage in energysaving and motivating action from users.
 7. The method of claim 1,comprising deriving from utility meter readings energy usage for airconditioning, air heating, refrigerating, lighting, or water heating. 8.The method of claim 1, comprising predicting energy usage and performingdemand response in accordance with the predicted energy usage.
 9. Themethod of claim 1, comprising recommending a substitute appliance for anexisting appliance.
 10. The method of claim 1, comprising performingoperations selected from a group consisting of: segmenting consumersinto different subsets based upon a plurality of demographic variables;segmenting consumers into different subsets based upon energy usagenormalized to relevant peer groups; prioritizing messages based upon ahistorical rate of uptake multiplied by expected energy savings value;offering resource efficient products discounted by private industrythrough rebates, coupons, and discounts for government subsidies ofefficient products; integrating with an Internet website for online andoffline viewing of reports; integrating with resource and/or utilitydatabases.
 11. The method of claim 1, comprising clustering energy usageto identify a series of recurring patterns across energy usage data. 12.The method of claim 1, comprising storing meter readings to providecustomer attributes, behavior, and trends.
 13. The method of claim 1,comprising providing usage disaggregation, load curve identification,bill forecasts, and meter health.
 14. The method of claim 1, comprisingproviding usage segmentation to tailor content, and trigger messagesspecific to each individual customer.
 15. The method of claim 1,comprising communicating with customers using one or more channelsincluding email, direct mail, text, web, mobile interfaces.
 16. Themethod of claim 1, comprising communicating with a customer on how toadjust energy use before an end of a billing period.
 17. The method ofclaim 1, comprising communicating main drivers of customer energy useand providing utility call center representatives with data to increasecustomer satisfaction and lower average call times.
 18. The method ofclaim 1, comprising clustering usage patterns around predetermineddistinct hourly electric load patterns.
 19. A system for saving energy,comprising: an electric meter to capture building composite loadprofile; an analyzer to determine predetermined weather factors and aprior success history of the message with predetermined group membersand to capture feedback on messages to consumers to see if at least achange has occurred since a communication, wherein the feedback includesa user action taken with respect to the message; and a text or emailmodule to present to the user cost savings between the user's existingappliance and a substitute appliance.
 20. The method of claim 11,comprising one or more of: segmenting consumers into different subsetsbased upon a plurality of demographic variables; segmenting consumersinto different subsets based upon energy usage normalized to relevantpeer groups; prioritizing messages based upon a historical rate ofuptake multiplied by expected energy savings value; offering resourceefficient products discounted by private industry through rebates,coupons, and discounts for government subsidies of efficient products;integrating with an Internet website for online and offline viewing ofreports; integrating with resource and/or utility databases; clusteringusage patterns around predetermined distinct hourly electric loadpatterns.