scispace - formally typeset
Open AccessJournal ArticleDOI

Energy big data: A survey

Reads0
Chats0
TLDR
This paper gives a brief introduction on big data, smart grid, and big data application in the smart grid scenario, and recent studies and developments are summarized in the context of integrated architecture and key enabling technologies.
Abstract
As a significant application of energy, smart grid is a complicated interconnected power grid that involves sensors, deployment strategies, smart meters, and real-time data processing. It continuously generates data with large volume, high velocity, and diverse variety. In this paper, we first give a brief introduction on big data, smart grid, and big data application in the smart grid scenario. Then, recent studies and developments are summarized in the context of integrated architecture and key enabling technologies. Meanwhile, security issues are specifically addressed. Finally, we introduce several typical big data applications and point out future challenges in the energy domain.

read more

Citations
More filters

A Survey on Smart Grid CommunicationInfrastructures: Motivations, Requirements andChallenges

TL;DR: From the experience of several industrial trials on smart grid with communication infrastructures, it is expected that the traditional carbon fuel based power plants can cooperate with emerging distributed renewable energy such as wind, solar, etc, to reduce the carbon fuel consumption and consequent green house gas such as carbon dioxide emission.
Journal ArticleDOI

Digital Twin: Values, Challenges and Enablers From a Modeling Perspective

TL;DR: This work reviews the recent status of methodologies and techniques related to the construction of digital twins mostly from a modeling perspective to provide a detailed coverage of the current challenges and enabling technologies along with recommendations and reflections for various stakeholders.
Journal ArticleDOI

Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids

TL;DR: A novel electricity-theft detection method based on wide and deep convolutional neural networks (CNN) model that outperforms other existing methods in detection accuracy and captures the global features of 1-D electricity consumption data.
Journal ArticleDOI

A Survey on Energy Internet: Architecture, Approach, and Emerging Technologies

TL;DR: An introduction and the motivation to the evolution from smart grid to EI are presented and a representative EI architecture is introduced, i.e., the future renewable electric energy delivery and management system.
Journal ArticleDOI

A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks

TL;DR: A comprehensive security understanding of the SGs framework, attacks scenarios, detection/protection methods, estimation and control strategies from both communication and control viewpoints are addressed.
References
More filters
Book

Elements of information theory

TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Journal ArticleDOI

MapReduce: simplified data processing on large clusters

TL;DR: This paper presents the implementation of MapReduce, a programming model and an associated implementation for processing and generating large data sets that runs on a large cluster of commodity machines and is highly scalable.
Journal ArticleDOI

MapReduce: simplified data processing on large clusters

TL;DR: This presentation explains how the underlying runtime system automatically parallelizes the computation across large-scale clusters of machines, handles machine failures, and schedules inter-machine communication to make efficient use of the network and disks.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Related Papers (5)