Pub Date : 2018-08-27DOI: 10.1109/CCECE.2018.8447593
Riham S. Elhabyan, Wei Shi, M. St-Hilaire
In Wireless Sensor Networks (WSNs), providing full area coverage while maintaining connectivity between the sensors is considered an important issue. Coverage-aware sleep scheduling is an efficient way to optimize the coverage of WSNs while maximizing the energy consumption. On the other hand, clustering can provide an efficient way to achieve high connectivity in WSNs. Despite the close relationship between the coverage problem and the clustering problem, they have been formulated, discussed and evaluated separately. Furthermore, most existing WSN strategies are designed to be applied on Two-Dimensional (2D) fields under an ideal energy consumption model that relies on calculating the Euclidean distance between any pair of sensors. In reality, sensors are mostly deployed in a Three-Dimensional (3D) field in many applications and they do exhibit a discrete energy consumption model that depends on the sensors' status rather than the distance between them. In this paper, we propose a Pareto-based network configuration strategy for 3D WSN s. In the proposed protocol, deciding the status of each sensor in a 3D WSN s is formulated as a single multi-objective minimization problem. The proposed formulation considers the following combined properties: energy efficiency, data delivery reliability, scalability, and full area coverage. The performance of the proposed protocol is tested in 3D WSNs and under a realistic energy consumption model which is based on the characteristics of the Chip con CC2420 radio transceiver data sheet.
在无线传感器网络(WSNs)中,在保持传感器之间连接的同时提供全区域覆盖被认为是一个重要问题。覆盖感知睡眠调度是优化无线传感器网络覆盖,同时使能量消耗最大化的有效方法。另一方面,聚类可以为wsn提供一种实现高连通性的有效途径。尽管覆盖率问题和聚类问题之间有着密切的关系,但它们都是单独制定、讨论和评估的。此外,大多数现有的WSN策略都是在理想的能量消耗模型下设计的,该模型依赖于计算任意一对传感器之间的欧几里得距离。实际上,在许多应用中,传感器大多部署在三维(3D)领域,它们确实表现出离散的能耗模型,该模型取决于传感器的状态,而不是它们之间的距离。在本文中,我们提出了一种基于pareto的三维WSN网络配置策略。在该协议中,确定三维WSN中每个传感器的状态被表述为一个单一的多目标最小化问题。提出的配方考虑了以下综合属性:能源效率、数据传输可靠性、可扩展性和全区域覆盖。基于Chip con CC2420无线收发器数据表的特性,在三维无线传感器网络和现实能耗模型下测试了该协议的性能。
{"title":"A Full Area Coverage Guaranteed, Energy Efficient Network Configuration Strategy for 3D Wireless Sensor Networks","authors":"Riham S. Elhabyan, Wei Shi, M. St-Hilaire","doi":"10.1109/CCECE.2018.8447593","DOIUrl":"https://doi.org/10.1109/CCECE.2018.8447593","url":null,"abstract":"In Wireless Sensor Networks (WSNs), providing full area coverage while maintaining connectivity between the sensors is considered an important issue. Coverage-aware sleep scheduling is an efficient way to optimize the coverage of WSNs while maximizing the energy consumption. On the other hand, clustering can provide an efficient way to achieve high connectivity in WSNs. Despite the close relationship between the coverage problem and the clustering problem, they have been formulated, discussed and evaluated separately. Furthermore, most existing WSN strategies are designed to be applied on Two-Dimensional (2D) fields under an ideal energy consumption model that relies on calculating the Euclidean distance between any pair of sensors. In reality, sensors are mostly deployed in a Three-Dimensional (3D) field in many applications and they do exhibit a discrete energy consumption model that depends on the sensors' status rather than the distance between them. In this paper, we propose a Pareto-based network configuration strategy for 3D WSN s. In the proposed protocol, deciding the status of each sensor in a 3D WSN s is formulated as a single multi-objective minimization problem. The proposed formulation considers the following combined properties: energy efficiency, data delivery reliability, scalability, and full area coverage. The performance of the proposed protocol is tested in 3D WSNs and under a realistic energy consumption model which is based on the characteristics of the Chip con CC2420 radio transceiver data sheet.","PeriodicalId":181463,"journal":{"name":"2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114303064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-27DOI: 10.1109/CCECE.2018.8447780
Henrique V. Lima, Abdallah S. Abdallah, Elivelton F. Bueno, K. Cardoso
Long Term Evolution in unlicensed bands (LTE-U) has emerged as a promising solution to address the unprecedented growth of mobile data traffic. LTE-U extends the advantages of LTE protocols to the 5GHz unlicensed bands, which are primarily used in USA by IEEE 802.11a/n/ac WLANs and radar systems. However, LTE-U deployment is a challenging task for cellular operators due to several regulations and factors (e.g., uncertainty of available capacity). In this paper, we present a stochastic programming model for the allocation of LTE-U resources that maximizes the service capacity for LTE users, while controls the risk of collision with Wi-Fi traffic by operating under a predefined minimum collision probability.
{"title":"A Stochastic Programming Model for Resource Allocation in LTE-U Networks","authors":"Henrique V. Lima, Abdallah S. Abdallah, Elivelton F. Bueno, K. Cardoso","doi":"10.1109/CCECE.2018.8447780","DOIUrl":"https://doi.org/10.1109/CCECE.2018.8447780","url":null,"abstract":"Long Term Evolution in unlicensed bands (LTE-U) has emerged as a promising solution to address the unprecedented growth of mobile data traffic. LTE-U extends the advantages of LTE protocols to the 5GHz unlicensed bands, which are primarily used in USA by IEEE 802.11a/n/ac WLANs and radar systems. However, LTE-U deployment is a challenging task for cellular operators due to several regulations and factors (e.g., uncertainty of available capacity). In this paper, we present a stochastic programming model for the allocation of LTE-U resources that maximizes the service capacity for LTE users, while controls the risk of collision with Wi-Fi traffic by operating under a predefined minimum collision probability.","PeriodicalId":181463,"journal":{"name":"2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132136640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-27DOI: 10.1109/CCECE.2018.8447782
A. M. Almohaimeed, M. Yagoub, J. Lima, R. Amaya, G. Xiao, Y. Tao
In this paper, a rectenna is introduced by making use of an adaptive rectifier topology and a low-cost metasurface based printed antenna to cover a wide-range of input power levels. The low-cost metasurface printed antenna is based on flexible substrates while the rectifier can handle a wide input power range by employing a FET as a switch between low power and high power, which overcomes issues related to failure voltage in conventional rectification devices. The proposed rectifier attains an RF-DC efficiency of more than 40% for an input power ranging from −8 dBm to 25dBm. At 15 dBm, it demonstrates a peak power efficiency of 66% at 915 MHz. The low-cost metasurface-based printed antenna achieved a gain of 3 dBi, a directivity of 5.3 dBi and a radiation efficiency of 57%. The rectenna achieved 40% efficiency over a wide-range of input power from −5 dBm to 23 dBm, making it suitable for Wireless Power Transfer applications.
{"title":"Metasurface-Based WPT Rectenna with Extensive Input Power Range in the 900 MHz","authors":"A. M. Almohaimeed, M. Yagoub, J. Lima, R. Amaya, G. Xiao, Y. Tao","doi":"10.1109/CCECE.2018.8447782","DOIUrl":"https://doi.org/10.1109/CCECE.2018.8447782","url":null,"abstract":"In this paper, a rectenna is introduced by making use of an adaptive rectifier topology and a low-cost metasurface based printed antenna to cover a wide-range of input power levels. The low-cost metasurface printed antenna is based on flexible substrates while the rectifier can handle a wide input power range by employing a FET as a switch between low power and high power, which overcomes issues related to failure voltage in conventional rectification devices. The proposed rectifier attains an RF-DC efficiency of more than 40% for an input power ranging from −8 dBm to 25dBm. At 15 dBm, it demonstrates a peak power efficiency of 66% at 915 MHz. The low-cost metasurface-based printed antenna achieved a gain of 3 dBi, a directivity of 5.3 dBi and a radiation efficiency of 57%. The rectenna achieved 40% efficiency over a wide-range of input power from −5 dBm to 23 dBm, making it suitable for Wireless Power Transfer applications.","PeriodicalId":181463,"journal":{"name":"2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114405166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-27DOI: 10.1109/CCECE.2018.8447859
I. AlMohimeed, M. Agarwal, Y. Ono
Monitoring of the physical properties of the tissues provides valuable information for the clinical diagnosis and evaluation. However, one of the challenges of an ultrasonic method for continuous monitoring of a tissue motion using a conventional clinical ultrasonic image system could be motion artifacts due to the weight and size of its handheld ultrasonic probe employed. A wearable ultrasonic sensor, made of a polyvinylidene fluoride (PVDF) polymer piezoelectric film, may be able to reduce the motion artifacts due to its lightweight and flexible properties. However, the PVDF ultrasonic sensor has a relatively weak transmitting acoustic signal strength which causes poor signal-to-noise ratio of the ultrasonic signal acquired in pulse-echo measurements, particularly for the signal reflected from deeper tissue. This paper investigated an improvement of the ultrasonic performance of the WUS using double-layer PVDF films. The sensor was constructed using two 52-μm thick PVDF films. The developed double-layer WUS showed the 1.7 times greater ultrasonic signal amplitude compared to the WUS made of a single-layer PVDF having the equivalent PVDF film thickness. Thus, the developed double-layer PVDF WUS improved the depth of the ultrasonic penetration into the tissue. The developed WUS successfully demonstrated to monitor the contractions of biceps muscles in an upper arm. In addition, a cardiac tissue motion was clearly observed in the M-mode measurement corresponding with the cardiac cycles obtained from the ECG measurement.
{"title":"Wearable Ultrasonic Sensor Using Double-Layer PVDF Films for Monitoring Tissue Motion","authors":"I. AlMohimeed, M. Agarwal, Y. Ono","doi":"10.1109/CCECE.2018.8447859","DOIUrl":"https://doi.org/10.1109/CCECE.2018.8447859","url":null,"abstract":"Monitoring of the physical properties of the tissues provides valuable information for the clinical diagnosis and evaluation. However, one of the challenges of an ultrasonic method for continuous monitoring of a tissue motion using a conventional clinical ultrasonic image system could be motion artifacts due to the weight and size of its handheld ultrasonic probe employed. A wearable ultrasonic sensor, made of a polyvinylidene fluoride (PVDF) polymer piezoelectric film, may be able to reduce the motion artifacts due to its lightweight and flexible properties. However, the PVDF ultrasonic sensor has a relatively weak transmitting acoustic signal strength which causes poor signal-to-noise ratio of the ultrasonic signal acquired in pulse-echo measurements, particularly for the signal reflected from deeper tissue. This paper investigated an improvement of the ultrasonic performance of the WUS using double-layer PVDF films. The sensor was constructed using two 52-μm thick PVDF films. The developed double-layer WUS showed the 1.7 times greater ultrasonic signal amplitude compared to the WUS made of a single-layer PVDF having the equivalent PVDF film thickness. Thus, the developed double-layer PVDF WUS improved the depth of the ultrasonic penetration into the tissue. The developed WUS successfully demonstrated to monitor the contractions of biceps muscles in an upper arm. In addition, a cardiac tissue motion was clearly observed in the M-mode measurement corresponding with the cardiac cycles obtained from the ECG measurement.","PeriodicalId":181463,"journal":{"name":"2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123281925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-13DOI: 10.1109/CCECE.2018.8447585
M. T. Khayata, M. Shaaban
This paper presents an approach for photo-voltaic based DG allocation in distribution networks. The objective of the proposed approach is to minimize the developer's investment cost associated with energy supply requirements over predefined planning period. Uncertainties associated with supply and demand are considered in this work, as well as, the uncertainty associated with energy prices. In addition, this work introduces smart curtailment of renewable resources, which can maximize the penetration and minimize the overall investment. Simulation results on a typical distribution network are provided, which prove the effectiveness and robustness of the proposed resource allocation approach.
{"title":"Accommodating High Penetration of PV in Distribution Networks Considering Smart Curtailment","authors":"M. T. Khayata, M. Shaaban","doi":"10.1109/CCECE.2018.8447585","DOIUrl":"https://doi.org/10.1109/CCECE.2018.8447585","url":null,"abstract":"This paper presents an approach for photo-voltaic based DG allocation in distribution networks. The objective of the proposed approach is to minimize the developer's investment cost associated with energy supply requirements over predefined planning period. Uncertainties associated with supply and demand are considered in this work, as well as, the uncertainty associated with energy prices. In addition, this work introduces smart curtailment of renewable resources, which can maximize the penetration and minimize the overall investment. Simulation results on a typical distribution network are provided, which prove the effectiveness and robustness of the proposed resource allocation approach.","PeriodicalId":181463,"journal":{"name":"2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115089436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-13DOI: 10.1109/CCECE.2018.8447661
N. Rajasinghe, J. Samarabandu, Xianbin Wang
One critical challenge in design and operation of network intrusion detection systems (IDS) is the limited datasets used for IDS training and its impact on the system performance. If the training dataset is not updated or lacks necessary attributes, it will affect the performance of the IDS. To overcome this challenge, we propose a highly customizable software framework capable of generating labeled network intrusion datasets on demand. In addition to the capability to customize attributes, it accepts two modes of data input and output. One input method is to collect real-time data by running the software at a chosen network node and the other is to get Raw PCAP files from another data provider. The output can be either Raw PCAP with selected attributes per packet or a processed dataset with customized attributes related to both individual packet features and overall traffic behavior within a time window. The abilities of this software are compared with a product which has similar intentions and notable novelties and capabilities of the proposed system have been noted.
{"title":"INSECS-DCS: A Highly Customizable Network Intrusion Dataset Creation Framework","authors":"N. Rajasinghe, J. Samarabandu, Xianbin Wang","doi":"10.1109/CCECE.2018.8447661","DOIUrl":"https://doi.org/10.1109/CCECE.2018.8447661","url":null,"abstract":"One critical challenge in design and operation of network intrusion detection systems (IDS) is the limited datasets used for IDS training and its impact on the system performance. If the training dataset is not updated or lacks necessary attributes, it will affect the performance of the IDS. To overcome this challenge, we propose a highly customizable software framework capable of generating labeled network intrusion datasets on demand. In addition to the capability to customize attributes, it accepts two modes of data input and output. One input method is to collect real-time data by running the software at a chosen network node and the other is to get Raw PCAP files from another data provider. The output can be either Raw PCAP with selected attributes per packet or a processed dataset with customized attributes related to both individual packet features and overall traffic behavior within a time window. The abilities of this software are compared with a product which has similar intentions and notable novelties and capabilities of the proposed system have been noted.","PeriodicalId":181463,"journal":{"name":"2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129878840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-13DOI: 10.1109/CCECE.2018.8447670
Danish Sattar, A. Matrawy, Troy Bryant, Marc Kneppers
Small cells, such as femtocells, are becoming a key component in improving the service of wireless networks. These small cells are low-powered, low-range cellular base stations that connect to the LTE core through the Internet or the network operators wireline network, and provide new and diverse ways to increase wireless coverage and bandwidth in high-density areas. These new advances in capabilities introduce new opportunities for adversaries to exploit technology against the public interest. In this paper, we present a threat model of small cell LTE networks from a network perspective. As small cells are an evolving technology and ever increasing in use and importance, threat modelling is important to identify and address the threats introduced by new deployment architectures and designs. Our asset-focused model explores three main categories and the factors that contribute to the risks of: denial of service against the Evolved Packet Core network; unauthorized access to network operator resources; and compromise of end-user privacy, confidentiality, or service availability. While this model is not meant to be an exhaustive list of risks, we hope it raises awareness of the threats discussed, and encourages security discussions on this important aspect of LTE and future 5G networks.
{"title":"Threat Modeling in LTE Small Cell Networks","authors":"Danish Sattar, A. Matrawy, Troy Bryant, Marc Kneppers","doi":"10.1109/CCECE.2018.8447670","DOIUrl":"https://doi.org/10.1109/CCECE.2018.8447670","url":null,"abstract":"Small cells, such as femtocells, are becoming a key component in improving the service of wireless networks. These small cells are low-powered, low-range cellular base stations that connect to the LTE core through the Internet or the network operators wireline network, and provide new and diverse ways to increase wireless coverage and bandwidth in high-density areas. These new advances in capabilities introduce new opportunities for adversaries to exploit technology against the public interest. In this paper, we present a threat model of small cell LTE networks from a network perspective. As small cells are an evolving technology and ever increasing in use and importance, threat modelling is important to identify and address the threats introduced by new deployment architectures and designs. Our asset-focused model explores three main categories and the factors that contribute to the risks of: denial of service against the Evolved Packet Core network; unauthorized access to network operator resources; and compromise of end-user privacy, confidentiality, or service availability. While this model is not meant to be an exhaustive list of risks, we hope it raises awareness of the threats discussed, and encourages security discussions on this important aspect of LTE and future 5G networks.","PeriodicalId":181463,"journal":{"name":"2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121304456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-13DOI: 10.1109/CCECE.2018.8447804
Prashanth Venkataswamy, M. Ahmad, M. Swamy
Image aesthetics classification is the method of visualizing and classifying images based on the visual signatures in the data rather than the semantics associated with it. In this work, we develop learning techniques that is inspired by the way a human brain identifies images. We develop CNN models by providing most useful information to the network by leveraging the joint information from wavelet compressed image patches and class activation maps (CAM). The performance of the network in recognizing the image based on simple visual aesthetics signatures is shown to be better than existing techniques with few caveats.
{"title":"Targeted Wavelet Based Image Aesthetics Classification Using Convolutional Neural Nets","authors":"Prashanth Venkataswamy, M. Ahmad, M. Swamy","doi":"10.1109/CCECE.2018.8447804","DOIUrl":"https://doi.org/10.1109/CCECE.2018.8447804","url":null,"abstract":"Image aesthetics classification is the method of visualizing and classifying images based on the visual signatures in the data rather than the semantics associated with it. In this work, we develop learning techniques that is inspired by the way a human brain identifies images. We develop CNN models by providing most useful information to the network by leveraging the joint information from wavelet compressed image patches and class activation maps (CAM). The performance of the network in recognizing the image based on simple visual aesthetics signatures is shown to be better than existing techniques with few caveats.","PeriodicalId":181463,"journal":{"name":"2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128871173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-13DOI: 10.1109/CCECE.2018.8447592
A. Molaei, H. Taghirad, J. Dargahi
Sagging of the conductor in transmission line has a vital role in the safety, reliability and efficiency of power transmission. Transmission lines must be designed to guarantee the maximum static loading capacity. This is done by maintaining the minimum vertical clearance between the cables and the ground. However, the increase of the cable length between two tower, leads to the high cost of material and electrical energy loss, as well as increasing the possibility of intervention. On the other hand, reducing the line sagging induces high tension in the conductor, which may lead to damage of the conductor. To assure a safety sagging profile, an inspection is essential at the establishment and maintainance of the power transmission lines. In this paper firstly the mathematical formulation of long and heavy cables are developed. Then an image processing method is applied for inspection of cable sagging. To investigate the method a reconfigurable experimental setup is designed to provide various sagging profiles and the sagging profile is extracted via image processing and the result is compared to that of analytical method.
{"title":"Extracting of Sagging Profile of Overhead Power Transmission Line Via Image Processing","authors":"A. Molaei, H. Taghirad, J. Dargahi","doi":"10.1109/CCECE.2018.8447592","DOIUrl":"https://doi.org/10.1109/CCECE.2018.8447592","url":null,"abstract":"Sagging of the conductor in transmission line has a vital role in the safety, reliability and efficiency of power transmission. Transmission lines must be designed to guarantee the maximum static loading capacity. This is done by maintaining the minimum vertical clearance between the cables and the ground. However, the increase of the cable length between two tower, leads to the high cost of material and electrical energy loss, as well as increasing the possibility of intervention. On the other hand, reducing the line sagging induces high tension in the conductor, which may lead to damage of the conductor. To assure a safety sagging profile, an inspection is essential at the establishment and maintainance of the power transmission lines. In this paper firstly the mathematical formulation of long and heavy cables are developed. Then an image processing method is applied for inspection of cable sagging. To investigate the method a reconfigurable experimental setup is designed to provide various sagging profiles and the sagging profile is extracted via image processing and the result is compared to that of analytical method.","PeriodicalId":181463,"journal":{"name":"2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE)","volume":"74 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116288013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-13DOI: 10.1109/CCECE.2018.8447627
B. S. D. Silva, G. Laureano, Abdallah S. Abdallah, K. Cardoso
The accurate detection of people in indoor environments requires high-cost devices, while low-cost devices, in addition to low accuracy, offer little information about the monitored events. The perturbations that result from indoor movements affect the signals received by 802.11 interfaces. Hence, an 802.11 device becomes a widely available, low-cost, and reasonably accurate solution for several applications. This paper presents WiDMove, a proposed technique to detect the entry and exit of persons, within an indoor environment, using the channel state information (CSI) measurements, which is provided by the IEEE 802.11n compliant devices. Based on the gathered CSI measurements, we utilized frequency-time analysis methodology to build an efficient features vector based on Short-Time Fourier Transform (STFT) and Principal Component Analysis (PCA). We used the extracted features to train and develop a Support Vector Machine (SVM) classifier, which provided very promising initial results. Our initial results have an accuracy near 80 %.
{"title":"WiDMove: Sensing Movement Direction Using IEEE 802.11n Interfaces","authors":"B. S. D. Silva, G. Laureano, Abdallah S. Abdallah, K. Cardoso","doi":"10.1109/CCECE.2018.8447627","DOIUrl":"https://doi.org/10.1109/CCECE.2018.8447627","url":null,"abstract":"The accurate detection of people in indoor environments requires high-cost devices, while low-cost devices, in addition to low accuracy, offer little information about the monitored events. The perturbations that result from indoor movements affect the signals received by 802.11 interfaces. Hence, an 802.11 device becomes a widely available, low-cost, and reasonably accurate solution for several applications. This paper presents WiDMove, a proposed technique to detect the entry and exit of persons, within an indoor environment, using the channel state information (CSI) measurements, which is provided by the IEEE 802.11n compliant devices. Based on the gathered CSI measurements, we utilized frequency-time analysis methodology to build an efficient features vector based on Short-Time Fourier Transform (STFT) and Principal Component Analysis (PCA). We used the extracted features to train and develop a Support Vector Machine (SVM) classifier, which provided very promising initial results. Our initial results have an accuracy near 80 %.","PeriodicalId":181463,"journal":{"name":"2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125057125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}