Energy big data: A survey
Reads0
Chats0
TLDR
This paper gives a brief introduction on big data, smart grid, and big data application in the smart grid scenario, and recent studies and developments are summarized in the context of integrated architecture and key enabling technologies.Abstract:
As a significant application of energy, smart grid is a complicated interconnected power grid that involves sensors, deployment strategies, smart meters, and real-time data processing. It continuously generates data with large volume, high velocity, and diverse variety. In this paper, we first give a brief introduction on big data, smart grid, and big data application in the smart grid scenario. Then, recent studies and developments are summarized in the context of integrated architecture and key enabling technologies. Meanwhile, security issues are specifically addressed. Finally, we introduce several typical big data applications and point out future challenges in the energy domain.read more
Citations
More filters
A Survey on Smart Grid CommunicationInfrastructures: Motivations, Requirements andChallenges
TL;DR: From the experience of several industrial trials on smart grid with communication infrastructures, it is expected that the traditional carbon fuel based power plants can cooperate with emerging distributed renewable energy such as wind, solar, etc, to reduce the carbon fuel consumption and consequent green house gas such as carbon dioxide emission.
Journal ArticleDOI
Digital Twin: Values, Challenges and Enablers From a Modeling Perspective
TL;DR: This work reviews the recent status of methodologies and techniques related to the construction of digital twins mostly from a modeling perspective to provide a detailed coverage of the current challenges and enabling technologies along with recommendations and reflections for various stakeholders.
Journal ArticleDOI
Wide and Deep Convolutional Neural Networks for Electricity-Theft Detection to Secure Smart Grids
TL;DR: A novel electricity-theft detection method based on wide and deep convolutional neural networks (CNN) model that outperforms other existing methods in detection accuracy and captures the global features of 1-D electricity consumption data.
Journal ArticleDOI
A Survey on Energy Internet: Architecture, Approach, and Emerging Technologies
TL;DR: An introduction and the motivation to the evolution from smart grid to EI are presented and a representative EI architecture is introduced, i.e., the future renewable electric energy delivery and management system.
Journal ArticleDOI
A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks
TL;DR: A comprehensive security understanding of the SGs framework, attacks scenarios, detection/protection methods, estimation and control strategies from both communication and control viewpoints are addressed.
References
More filters
Book
Elements of information theory
Thomas M. Cover,Joy A. Thomas +1 more
TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Journal ArticleDOI
MapReduce: simplified data processing on large clusters
Jeffrey Dean,Sanjay Ghemawat +1 more
TL;DR: This paper presents the implementation of MapReduce, a programming model and an associated implementation for processing and generating large data sets that runs on a large cluster of commodity machines and is highly scalable.
Journal ArticleDOI
MapReduce: simplified data processing on large clusters
Jeffrey Dean,Sanjay Ghemawat +1 more
TL;DR: This presentation explains how the underlying runtime system automatically parallelizes the computation across large-scale clusters of machines, handles machine failures, and schedules inter-machine communication to make efficient use of the network and disks.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Related Papers (5)
Big data driven smart energy management: From big data to big insights
Kaile Zhou,Chao Fu,Shanlin Yang +2 more