October 2024
·
1 Read
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
October 2024
·
1 Read
July 2024
·
2 Reads
February 2024
·
2 Reads
November 2023
·
7 Reads
·
1 Citation
October 2023
·
2 Reads
·
1 Citation
April 2023
·
1 Read
·
1 Citation
October 2022
·
11 Reads
·
4 Citations
April 2022
·
7 Reads
·
4 Citations
November 2021
·
6 Reads
·
1 Citation
April 2021
·
45 Reads
·
2 Citations
... Most of the app API, and most importantly, the fuel level monitoring part, is written in the Rust programming language. Rust is a compiled language that allows you to write programs that are as fast as C or C++ programs [29], [30] while being more modern and, most importantly, type-safe [31]. Therefore, Rust is perfect for dealing with the real-time constraints related to processing the data from the CAM and for integrating the information from various external sources, ensuring the system remains reliable under heavy loads. ...
November 2023
... designed a communication infrastructure that deploys several wireless technologies to test their efficiency in monitoring and controlling WAMS operations. These infrastructures include wireless LAN, Wi-Fi, Wi-Max, GPRS, and GSM infrastructure [55]. Different communication infrastructures are selected to address the specific requirements of a given energy grid. ...
October 2022
... Unlike fault diagnosis and detection, which identify the objective for the existence of a diagnosed burden or specific fault that has previously happened, [308] the designated "anomaly" specifies that the structure is different from standard operational circumstances, so further info is unavailable. Anomalies can be initiated by numerous causes, such as disturbances of several nature, incorrect operations, and equipment disasters, and can have substantial concerns if left hidden [309]. Hence, anomaly finding shows a desperate function in arguing the efficiency, reliability, and safety of several industrial methods [310][311]. ...
April 2022
... AI-based anomaly detection techniques are being developed to identify unusual behavior or deviations from normal operations in smart grids. These methods leverage machine learning algorithms to establish baseline behavior and detect abnormal activities that may signify a cyberattack [72,73]. AI is being applied to enhance the intrusion detection systems in smart grids. ...
April 2021
... Edge intelligence can also help ensure the reliability and resilience of the power grid. One such example has been proposed and described by Matthews et al. [64]. In their works, the authors proposed an edge-based system for anomaly detection in synchrophasor data, allowing the system to detect anomalies quicker and be more resilient to network outages. ...
September 2020
... The three CIA parameters are all impacted by MITM attacks, which can be conducted in various layers, particularly the transport and MAC layers. Comprehensive packet analysis software should be a part of cyber security systems, and strong authentication procedures can thwart MITM breaches [100]. ...
April 2019
... Thus, breach or loss of data could affect the power security and stability of the power grid [157]. Ref. [3] suggests resolving the issue of cybersecurity with blockchain technology where all the parameters can be retained in blockchains and accessed through blockchain protocols [158]. Another option could be the design of advanced and secured protocols with authentication and authorization as methods for access and control [73]. ...
April 2019
... In [30] authors are completely agnostic to the data being transmitted between PMUs and PDC. Instead of checking the validity of the data they use k-means clustering to separate the network traffic not typical for PMU to PDC communication. ...
October 2019
... Hashgraphs is a DLT type that transactions are recorded and stored in a form of a directed acyclic graph, but it employs a different type of a consensus mechanisms that uses virtual voting with an aim of gaining network consensus. This means that the nodes in the network then do not need to validate each of the transactions in the network [17]. Holochain DLT is decentralized than blockchain. ...
November 2019
... The so-called smart grid is the natural evolution of the traditional electrical grid, where an increased number of intelligent devices and measuring instruments are requiring pervasive communication infrastructures [1] [2], to implement advanced control capabilities, even over legacy equipment [3]. These new functionalities are enabled by smart sensors and actuators, i.e., objects which offer computing power and network communication interfaces. ...
September 2018