Aaron St. Leger’s research while affiliated with United States Military Academy and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (61)


Data Cleaning in Large Customer-Owned Electricity Meter Systems
  • Conference Paper

October 2024

·

1 Read

Benjamin Nguyen

·

Aaron St. Leger

·

Nicholas Barry










Citations (40)


... Most of the app API, and most importantly, the fuel level monitoring part, is written in the Rust programming language. Rust is a compiled language that allows you to write programs that are as fast as C or C++ programs [29], [30] while being more modern and, most importantly, type-safe [31]. Therefore, Rust is perfect for dealing with the real-time constraints related to processing the data from the CAM and for integrating the information from various external sources, ensuring the system remains reliable under heavy loads. ...

Reference:

P.I.E.N.O. - Petrol-filling Itinerary Estimation aNd Optimization
A Comparative Study of Programming Languages for a Real-Time Smart Grid Application
  • Citing Conference Paper
  • November 2023

... designed a communication infrastructure that deploys several wireless technologies to test their efficiency in monitoring and controlling WAMS operations. These infrastructures include wireless LAN, Wi-Fi, Wi-Max, GPRS, and GSM infrastructure [55]. Different communication infrastructures are selected to address the specific requirements of a given energy grid. ...

Implementing a PMU Based Linear State Estimator on a Single Board Computer
  • Citing Conference Paper
  • October 2022

... Unlike fault diagnosis and detection, which identify the objective for the existence of a diagnosed burden or specific fault that has previously happened, [308] the designated "anomaly" specifies that the structure is different from standard operational circumstances, so further info is unavailable. Anomalies can be initiated by numerous causes, such as disturbances of several nature, incorrect operations, and equipment disasters, and can have substantial concerns if left hidden [309]. Hence, anomaly finding shows a desperate function in arguing the efficiency, reliability, and safety of several industrial methods [310][311]. ...

Methodology for Machine Learning Anomaly Detection in Phasor Measurement Unit Data
  • Citing Conference Paper
  • April 2022

... AI-based anomaly detection techniques are being developed to identify unusual behavior or deviations from normal operations in smart grids. These methods leverage machine learning algorithms to establish baseline behavior and detect abnormal activities that may signify a cyberattack [72,73]. AI is being applied to enhance the intrusion detection systems in smart grids. ...

Investigating Machine Learning for Anomaly Detection in Phasor Measurement Unit Data
  • Citing Conference Paper
  • April 2021

... Edge intelligence can also help ensure the reliability and resilience of the power grid. One such example has been proposed and described by Matthews et al. [64]. In their works, the authors proposed an edge-based system for anomaly detection in synchrophasor data, allowing the system to detect anomalies quicker and be more resilient to network outages. ...

Energy-Efficient Analysis of Synchrophasor Data using the NVIDIA Jetson Nano
  • Citing Conference Paper
  • September 2020

... The three CIA parameters are all impacted by MITM attacks, which can be conducted in various layers, particularly the transport and MAC layers. Comprehensive packet analysis software should be a part of cyber security systems, and strong authentication procedures can thwart MITM breaches [100]. ...

Simulation of Man in the Middle Attack On Smart Grid Testbed
  • Citing Conference Paper
  • April 2019

... Thus, breach or loss of data could affect the power security and stability of the power grid [157]. Ref. [3] suggests resolving the issue of cybersecurity with blockchain technology where all the parameters can be retained in blockchains and accessed through blockchain protocols [158]. Another option could be the design of advanced and secured protocols with authentication and authorization as methods for access and control [73]. ...

Blockchain for Power Grids
  • Citing Conference Paper
  • Full-text available
  • April 2019

... In [30] authors are completely agnostic to the data being transmitted between PMUs and PDC. Instead of checking the validity of the data they use k-means clustering to separate the network traffic not typical for PMU to PDC communication. ...

Unsupervised Machine Learning for Anomaly Detection in Synchrophasor Network Traffic
  • Citing Conference Paper
  • October 2019

... Hashgraphs is a DLT type that transactions are recorded and stored in a form of a directed acyclic graph, but it employs a different type of a consensus mechanisms that uses virtual voting with an aim of gaining network consensus. This means that the nodes in the network then do not need to validate each of the transactions in the network [17]. Holochain DLT is decentralized than blockchain. ...

An experimental framework for investigating hashgraph algorithm transaction speed
  • Citing Conference Paper
  • November 2019

... The so-called smart grid is the natural evolution of the traditional electrical grid, where an increased number of intelligent devices and measuring instruments are requiring pervasive communication infrastructures [1] [2], to implement advanced control capabilities, even over legacy equipment [3]. These new functionalities are enabled by smart sensors and actuators, i.e., objects which offer computing power and network communication interfaces. ...

Emulation of Anomalies for Wide-Area Monitoring, Protection and Control System Development
  • Citing Conference Paper
  • September 2018