Showing 161 - 180 results of 266 for search '"Smart grid"', query time: 0.07s Refine Results
  1. 161

    Integrating Sensor Networks for Energy Monitoring with Service-Oriented Architectures by C. Busemann, V. Gazis, R. Gold, P. Kikiras, A. Leonardi, J. Mirkovic, M. Walther, H. Ziekow

    Published 2013-06-01
    “…More accurate predictions of energy consumption are a strong motivator for utility providers to deploy a smart grid infrastructure. However, measurements which only reflect the consumption of a household lose the details associated with the behaviour of individual devices. …”
    Get full text
    Article
  2. 162
  3. 163

    Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure by Woong Go, Jin Kawk

    Published 2014-01-01
    “…A smart grid provides two-way communication by using the information and communication technology. …”
    Get full text
    Article
  4. 164

    A Novel Deep Learning-Based Data Analysis Model for Solar Photovoltaic Power Generation and Electrical Consumption Forecasting in the Smart Power Grid by Camille Franklin Mbey, Felix Ghislain Yem Souhe, Vinny Junior Foba Kakeu, Alexandre Teplaira Boum

    Published 2024-01-01
    “…With the installation of solar panels around the world and the permanent fluctuation of climatic factors, it is, therefore, important to provide the necessary energy in the electrical network in order to satisfy the electrical demand at all times for smart grid applications. This study first presents a comprehensive and comparative review of existing deep learning methods used for smart grid applications such as solar photovoltaic (PV) generation forecasting and power consumption forecasting. …”
    Get full text
    Article
  5. 165

    Application of Improved Deep Learning Method in Intelligent Power System by HuiJie Liu, Yang Liu, ChengWen Xu

    Published 2022-01-01
    “…In view of the inaccurate short-term power load prediction in the power system, where the smart grid cannot effectively coordinate the production, transportation, and distribution of electric energy, the authors propose the application of improved deep learning methods in intelligent power systems. …”
    Get full text
    Article
  6. 166
  7. 167
  8. 168

    Deep learning and smart energy-based lightweight urban power load forecasting model for sustainable urban growth by Haewon Byeon, Azzah AlGhamdi, Ismail Keshta, Mukesh Soni, Sultonali Mekhmonov, Gurpreet Singh

    Published 2025-01-01
    “…IntroductionUrban power load forecasting is essential for smart grid planning but is hindered by data imbalance issues. …”
    Get full text
    Article
  9. 169

    Development of energy internet based on internet thinking by Jianan LIU, Yanjie DU, Xianyi MENG

    Published 2016-03-01
    “…The development of the next internet revolution era energy industry was concerned.Guided by the Maslow’s hierarchy of needs theory,it puts forward the theory of energy development needs was put forward.It was revealed that the energy internet and its very nature generated by the changing of the energy using form has the consistency of the internet thinking.To comply with the development trend of the times,using the internet thinking to build and develop a new generation of smart grid will become the only way of the grid development in the future.…”
    Get full text
    Article
  10. 170

    Hierarchical Multi-Communities Energy Sharing Management with Electric Vehicle Integration by Ruengwit Khwanrit, Saher Javaid, Yuto Lim, Chalie Charoenlarpnopparut, Yasuo Tan

    Published 2025-01-01
    “…The widespread adoption of Electric Vehicles (EVs) in the smart grid is transforming the traditional grid into a more complex system. …”
    Get full text
    Article
  11. 171

    A method of SQL access logs pretreatment for power business system by Weiwei LI, Tao ZHANG, Yuanyuan MA, Cheng ZHOU

    Published 2015-12-01
    “…With the development of smart grid interactive,the database interaction between the information inside and outside is increasing.A method of SQL access log compression for power business system to respond to the demand of database security audit for the power system was designed in detail.This method can realize the compression of SQL access log and have the function of simple classification for SQL logs.The test results show that the method can achieve a large margin compression of SQL access logs and meet the requirements of log preprocessing for the database behavior audit of power business system.…”
    Get full text
    Article
  12. 172

    Network bandwidth forecast method for IMS business in power dispatching communication by Xiande BU, Zhenhua QU, IBinglin L, IANWenfeng T

    Published 2015-12-01
    “…The electric power dispatching data network business requirements of the IMS system were analyzed,the networking of the dispatching data network method was proposed,and the amount of the dispatching data network users was researched.According to the technology development and the power communication services requirement,IMS technique was used to construct next generation communication system,and the electric power dispatching data network was needed to be designed to load IMS services.The calculation method of network bandwidth and multimedia business traffic model for loading multimedia businesses was studied.It has guiding significance to construct next generation communication network for smart grid.…”
    Get full text
    Article
  13. 173

    Protocol security enhancement on secondary system of smart substation by Chen WANG, Zhipeng SHAO, Xiuli HUANG

    Published 2015-12-01
    “…With the wide application of smart substation communication protocol IEC6150 and Smart Grid,IEC61850 safety issue has become a problem can't be ignored.Combined with IEC62351,in the internal of substation as a whole,from authentication,encrypted communications,anti-replay attack,key distribution,the communication protocol security enhancement with in side of the substation which included MMS,GOOSE and SMV protocol was studied.Encrypted packet analysis technology was discussed.Combined with the test equipment run conditions,the performance caused by protocol security enhancement equipment was analyzed.…”
    Get full text
    Article
  14. 174

    Support of the Internet of things for energy transformation by Yusheng XUE, Hongbo ZHU, Qin WANG, Haitao ZHAO

    Published 2019-03-01
    “…The trend of energy transformation is to integrate smart grid into comprehensive energy.The research method is to establish the framework of energy information,physics and social system research.The active support of power transformation is the guarantee of the success of energy transformation.The proposed scheme emphasized the importance of social factors in practical engineering and research.As a new research methodology,it was compatible with mixed simulation of data,model and behavior.The widely used method in engineering was extended to economics and sociology,and the decision-making method based on subjective experience was made more scientific.In addition,in the definition of the Internet of things,the idea of removing the limitations of the Internet was proposed,and a unified framework was used to reflect the impact of the combination of the Internet/private network and other technologies.…”
    Get full text
    Article
  15. 175

    Research of authentication techniques for the Internet of things by Hongqiang YAN, Linjie WANG

    Published 2020-07-01
    “…Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.…”
    Get full text
    Article
  16. 176

    Network Topology Reconstruction Based on Power Line Communication by Xu Ma, Fang Yang, Jian Song, Jianqi Li, Weilin Liu

    Published 2015-12-01
    “…Power line communication(PLC)is playing a more and more important role in the smart grid(SG). Apart from conveying information, to reconstruct the topology of the network is also very critical. …”
    Get full text
    Article
  17. 177

    Wireless Multiple Access and Analog Oscillation Analysis in Microgrids: A Prony Approach by Shuping Gong, Husheng Li

    Published 2012-10-01
    “…A key challenge in smart grid is to monitor the system modal characteristics of disturbance over a microgrid for system stability and diagnosis. …”
    Get full text
    Article
  18. 178

    A big data based flow anomaly detection mechanism of electric power information network by Honghong JIANG, Tao ZHANG, Xinjian ZHAO, Xin QIAN, Tiancheng ZHAO, Lisha GAO

    Published 2017-03-01
    “…With the construction of smart grid, the electric power information network and its business system get rapid development. …”
    Get full text
    Article
  19. 179

    New electric power CDN based on the technology of SDN and NFV by Hongkai WANG, Hanyong HAO, Botao YU, Linqing LI

    Published 2016-09-01
    “…With the development of smart grid and the increasing of network application within the electric power information network,electric power CDN plays an important role of network acceleration technology,traffic load balancing and network security.However,facing the rapidly changing of application requirements,electric power CDN was required to response to the application deployment quickly and possess flexible application extensibility.In addition,there are some problems on electric power CDN node expansion,such as complex operations management and low utilization rate of resources.It is necessary to reform the traditional power CDN architecture,SDN and NFV technique can support.The data control can be extracted and transmitted by SDN from the network data,so it is conducive to expand a variety of application in power CDN rapidly.And NFV can expand the CDN node capacity and schedule node resources based on the application.It can effectively reduce the capital ecpenditure,storage and power consumption.…”
    Get full text
    Article
  20. 180

    State Estimation in Power Systems Under Random Data Attack Using Correlation Matching, Semidefinite Relaxation, and Truncated Eigenvalue Decomposition by Bamrung Tausiesakul, Krissada Asavaskulkiet, Chuttchaval Jeraputra, Ittiphong Leevongwat, Thamvarit Singhavilai, Supun Tiptipakorn

    Published 2025-01-01
    “…This work considers a state estimation problem in modern power systems from the perspective of smart grids. Due to the use of digital technology, smart grids often encounter malicious data that is deliberately injected to attack their grid operations. …”
    Get full text
    Article