Internet Enhanced Smart Energy Network Efficiency using Artificial Intelligence

In the state of affairs of industrialization, requirements of the international strength crisis, including environmental pollution and smart grid connectivity for power networks continue enhancement to deeply built-in to shape network the Power Internet using Artificial Intelligence. Hence, it is wished aimed at power systems, proceedings technology, AI, and science along with research. Because of this, this research paper is an intelligent way to analyze synthetic wise methods and their software in strength network communications. Initially, it recommends based on AI’s creating process automatically connect core technologies based on working importance and later enchanting the concerned software of Neural Network community technological know-how in inspecting and predicting wind power, based on the situation factors out that AI strategies can be utilized to strengthen an internet lookup on communicate too frequently asset device scheduling and the personal aspect of the electrical energy market. To conclude, it outcomes in the future improvement of the power Internet connectivity and decreased troubles of unexpected situations have occurred during the working environment that resolves an Artificial Intelligence technological know-how justifies interest in the strength Internet.

  • Research Type: Applied Research
  • Paper Type: Theoretical Research Paper
  • Vol.8 , Issue 2 , Pages: 1 - 9, Mar 2026
  • Published on: 01 Mar, 2026
  • Issue Type: Regular
  • Cite Score
    :

    100

  • No. of authors
    :

    75

  • No. of Downloads
    :

    43

  • Cite Score
    :

    100

  • No. of authors
    :

    75

  • No. of Downloads
    :

    43

  • Cite Score
    :

    100

  • No. of authors
    :

    75

  • No. of Downloads
    :

    43

About Authors:
T Murali Mohan
India
Swarnandhra College of Engineering and Technology

"""


Copyright © 2026, This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC-BY-NY-SA). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Corresponding Author: T Murali Mohan, drtmm512@gmail.com

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Conflict of interest: The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Global Readers View
  • No. of Readers
    14
  • No. of Reaction
    0
  • No. of Comments
    0
  • No. of Downloads
    0

Or share your Opinion

Edited by:
  • Editor-In-Chief
    IJRDES
Reviewed by:
Similar Papers
  • Blockchain for Cybersecurity : Stre...
    02 Mar, 2026

    Academic institutions have become prominent targets for evolving cyber threats, including ransom ware, credential theft, data manipulation attacks,...

Authors’ other publications
  • Authors’ other publications not found.
×