Fig. 5From: Systematic literature review of the techniques for household electrical appliance anomaly detections and knowledge extractionsCategorizations of implemented algorithmsBack to article page