2020
DOI: 10.1007/978-981-15-3125-5_47
|View full text |Cite
|
Sign up to set email alerts
|

Electric Consumption Pattern from Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Being very small in size, sensor nodes are built with limited computational capacity, small storage memory, and finite battery power capacity [10]. The structure of a typical WSN node [11] consists of four main components: a sensing element, normally used for sensing a physically measureable parameter; an Analog-to-Digital Converter (ADC), used for converting analog signals to some digital formats; a processing unit, providing simple/basic data processing and computation capabilities; and a power unit, responsible for sensor node's operation life span. It is a known fact that WSN is a resource constrained network in which energy efficiency is always the main issue since the operation of WSN depends heavily on the life span of the sensor node battery [12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Being very small in size, sensor nodes are built with limited computational capacity, small storage memory, and finite battery power capacity [10]. The structure of a typical WSN node [11] consists of four main components: a sensing element, normally used for sensing a physically measureable parameter; an Analog-to-Digital Converter (ADC), used for converting analog signals to some digital formats; a processing unit, providing simple/basic data processing and computation capabilities; and a power unit, responsible for sensor node's operation life span. It is a known fact that WSN is a resource constrained network in which energy efficiency is always the main issue since the operation of WSN depends heavily on the life span of the sensor node battery [12].…”
Section: Introductionmentioning
confidence: 99%
“…As two sensor nodes cannot directly establish a secret key, they can use base station as a trusted third party to setup the secret key. In [11], Basagni et al present a key management scheme to secure the communication by periodically updating the symmetric keys shared by all sen-Title Suppressed Due to Excessive Length 3 sor nodes.…”
Section: Introductionmentioning
confidence: 99%