Results 41 to 50 of about 10,066 (227)

A Study on Security of AMI(Advanced Metering Infrastructure) in SMARTGRID

open access: yesThe Journal of Korea Navigation Institute, 2012
Recently with improvement of SMART Grid, AMI network security has been affecting the environment for Electric information and communication. The system and communication protection consists of steps taken to protect the AMI components and the communication links between system components from cyber intrusions.
Yeoun-Soo Kim   +3 more
openaire   +2 more sources

Analysis of Residential Electricity Usage Characteristics and the Effects of Shifting Home Appliance Usage Time under a Time-of-Use Rate Plan

open access: yesEnergies, 2023
Carbon reduction programs are being introduced for carbon neutrality and energy transition to clean energy sources in various sectors, such as energy, buildings, transportation, and agriculture. In the residential electricity energy of the energy sector,
Young Mo Chung   +2 more
doaj   +1 more source

A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data

open access: yes, 2018
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan   +2 more
core   +1 more source

CleanTX Analysis on the Smart Grid [PDF]

open access: yes, 2008
The utility industry in the United States has an opportunity to revolutionize its electric grid system by utilizing emerging software, hardware and wireless technologies and renewable energy sources. As electricity generation in the U.S.
Duran, Lindsay   +4 more
core   +1 more source

Smart Charging With Hourly Pricing as Policy Intervention: Reducing Costs and Grid Congestion for Promoting Electric Vehicles in Developing Countries

open access: yesEnergy Science &Engineering, EarlyView.
Smart charging with hourly pricing optimizes electric vehicle (EV) charging in developing countries, reducing EV owner costs by 30% and easing grid congestion. Using an agent‐based energy management system, the study shows dynamic pricing effectively shifts charging to off‐peak hours, enhancing grid stability and supporting sustainable EV adoption in ...
Maha Iftikhar   +8 more
wiley   +1 more source

Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

open access: yesJournal of Applied Mathematics, 2014
A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI) is used in the smart grid as the core infrastructure.
Woong Go, Jin Kawk
doaj   +1 more source

An embedded and intelligent anomaly power consumption detection system based on smart metering

open access: yesIET Wireless Sensor Systems, 2023
User behaviour, human mistakes, and underperforming equipment contribute to wasted energy in buildings and industries. Identifying anomalous consumption power behaviour can help to reduce peak energy usage and change undesirable user behaviour ...
Sahar Lazim Qaddoori   +1 more
doaj   +1 more source

Turbulent snow transport and accumulation: New reduced‐order models and diagnostics

open access: yesQuarterly Journal of the Royal Meteorological Society, EarlyView.
Our new reduced‐order models of snow particle transport provide high‐fidelity calculations of snow accumulation in turbulent flows at significantly reduced computational costs. Additional accumulation diagnostics from the reduced‐order model predict complex patterns of particle concentration in turbulent boundary layers via coherent flow structures in ...
Nikolas O. Aksamit   +3 more
wiley   +1 more source

Energy theft detection for AMI using principal component analysis based reconstructed data

open access: yesIET Cyber-Physical Systems, 2018
To detect energy theft attacks in advanced metering infrastructure (AMI), we propose a detection method based on principal component analysis (PCA) approximation.
Sandeep Kumar Singh   +2 more
doaj   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy