Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
In this week's Computer Weekly, we find out how the UK's power networks need to be digital transformed to be ready for renewable energy – and the role of open source. Wi-Fi 6 was meant to give a boost to wireless connectivity – we examine why adoption has stalled. And we look at what a quantum datacentre might be like. Read the issue now.
This use case describes how Israel's largest electricity provider utilizes IBM's predictive analytics software to monitor its turbine performance in real time, enabling the company to discover and resolve anomalies before outages occur.
This brief resource profiles a storage and analysis approach that can help your organization meet the challenges of today's data-intensive business world and achieve a competitive edge. Read on to learn more.
In this 3-part guide, SearchBusinessAnalytics explores organizations' operational intelligence initiatives and their impact on business processes in customer service, logistics, energy, and manufacturing.
The reference solution combines Dot Hill storage solutions, Intel Enterprise Edition for Lustre, and Mellanox Infiniband to deliver a highly scalable and high performance infrastructure for oil exploration computing platforms, as well as other HPC applications.
This white paper shows how mathematical optimization enables the rapid development and deployment of applications that address the energy and power industries’ most pressing issues, including climate change, grid utilization, market restructuring and Enterprise IT.
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.