ISGT2011-India 2011
DOI: 10.1109/iset-india.2011.6145348
|View full text |Cite
|
Sign up to set email alerts
|

Remote detection of illegal electricity usage employing smart energy meter - A current based technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…The key expectations of an Agri-IoT routing architecture and its implementation mechanisms via CA-IoT network architecture are presented in Figure 3. Regardless of the routing architecture, the layers of the event flow framework and the principal components of Agri-IoT generally consist of the "Things" unit (i.e., perception layer), Base Station(BS)/Gateway (i.e., network layer), and the Cloud (i.e., application and end-user layer) [9], [46], [47], as illustrated in Figure 4. There are two routing architectures: centralized and distributed (e.g., flooding/graph-based and tree-or clusterbased) [4], [9].…”
Section: Overview Of Wsn-based Agri-iot Architectures and Test-bedsmentioning
confidence: 99%
“…The key expectations of an Agri-IoT routing architecture and its implementation mechanisms via CA-IoT network architecture are presented in Figure 3. Regardless of the routing architecture, the layers of the event flow framework and the principal components of Agri-IoT generally consist of the "Things" unit (i.e., perception layer), Base Station(BS)/Gateway (i.e., network layer), and the Cloud (i.e., application and end-user layer) [9], [46], [47], as illustrated in Figure 4. There are two routing architectures: centralized and distributed (e.g., flooding/graph-based and tree-or clusterbased) [4], [9].…”
Section: Overview Of Wsn-based Agri-iot Architectures and Test-bedsmentioning
confidence: 99%
“…However, Ethernet-based networks are not suited to establish everywhere because it is a wired system network [49]. Furthermore, as per Deb et al [50], cloud computing has brought great evaluation in communication technologies. Fuzzy controllers have the strength to enhance the robustness of the system.…”
Section: Technology Developmentmentioning
confidence: 99%