This research focused on conventional power swing blocking (PSB). The conventional PSB methods are tested with various fault conditions such as fault location and fault type scenarios consisting of stable and unstable power swings. PSB methods developed in MATLAB have been implemented on a two source test system simulated in PSCAD. Measurements taken from the reference bus are transformed to phasors using half cycle discrete fourier transform and they constitute the fundamental of the PSB methods. The methods used in this paper are as follows; decreasing resistance, swing center voltage, superimposed, and change of active and reactive power PSB methods. Threshold values for each PSB method are determined based on stable and unstable power swing conditions. The methods of the superimposed and change of active/reactive power are observed to be the most accurate ones while those of the decreasing resistance and swing center voltage found to be suffered from unstable power swing test conditions. This study revealed the importance and restriction of threshold determination.
{"title":"Evaluating Conventional Power Swing Blocking Methods","authors":"A. Çapar, Ezgi Ünverdi Ağlar, A. Arsoy","doi":"10.1145/3284557.3284731","DOIUrl":"https://doi.org/10.1145/3284557.3284731","url":null,"abstract":"This research focused on conventional power swing blocking (PSB). The conventional PSB methods are tested with various fault conditions such as fault location and fault type scenarios consisting of stable and unstable power swings. PSB methods developed in MATLAB have been implemented on a two source test system simulated in PSCAD. Measurements taken from the reference bus are transformed to phasors using half cycle discrete fourier transform and they constitute the fundamental of the PSB methods. The methods used in this paper are as follows; decreasing resistance, swing center voltage, superimposed, and change of active and reactive power PSB methods. Threshold values for each PSB method are determined based on stable and unstable power swing conditions. The methods of the superimposed and change of active/reactive power are observed to be the most accurate ones while those of the decreasing resistance and swing center voltage found to be suffered from unstable power swing test conditions. This study revealed the importance and restriction of threshold determination.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128555762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Real gas reservoirs have strong heterogeneities and usually have pore (hole) and fractured zones. They are difficult to develop and the invasion of edge-and-bottom water increases the complexity of the development. In order to be able to understand the water invasion law and development effect of the gas reservoirs with edge and bottom water. Different types and different permeability cores are selected to characterize the effect of the gas reservoir under the condition of inhomogeneous and the effect of different development methods. The results show that: Both arrange wells in high and low permeability zones can obtain the higher recovery factor. During the development process, the gas production rate of the high permeability zone should be limited to avoid the rapid coning of the formation water along the high permeability zone, resulting in the premature flooding of the gas reservoir. Different development order have little difference between water influx and water production, but if first develop low-permeability zone and then product high-permeability zone, it will have higher levels of water recovery and final recovery; High permeability zone do not shut the wells after water breakthrough can effectively increase the recovery of gas reservoirs, but it faces the problem of produced water treatment. The experimental results provide a basis for understanding the influence of different factors on the water invasion regularity of multiwell development and optimizing the production of the bottom water gas reservoirs.
{"title":"Simulation Experimental Study on Water Invasion Rules of Gas Reservoir With Multiwell Development","authors":"Fan Feifei, G. Shusheng, L. Huaxun","doi":"10.1145/3284557.3284728","DOIUrl":"https://doi.org/10.1145/3284557.3284728","url":null,"abstract":"Real gas reservoirs have strong heterogeneities and usually have pore (hole) and fractured zones. They are difficult to develop and the invasion of edge-and-bottom water increases the complexity of the development. In order to be able to understand the water invasion law and development effect of the gas reservoirs with edge and bottom water. Different types and different permeability cores are selected to characterize the effect of the gas reservoir under the condition of inhomogeneous and the effect of different development methods. The results show that: Both arrange wells in high and low permeability zones can obtain the higher recovery factor. During the development process, the gas production rate of the high permeability zone should be limited to avoid the rapid coning of the formation water along the high permeability zone, resulting in the premature flooding of the gas reservoir. Different development order have little difference between water influx and water production, but if first develop low-permeability zone and then product high-permeability zone, it will have higher levels of water recovery and final recovery; High permeability zone do not shut the wells after water breakthrough can effectively increase the recovery of gas reservoirs, but it faces the problem of produced water treatment. The experimental results provide a basis for understanding the influence of different factors on the water invasion regularity of multiwell development and optimizing the production of the bottom water gas reservoirs.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129389682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. D. Antón, Daniel Fraunholz, Dennis Krummacker, Christoph Fischer, Michael Karrenbauer, H. Schotten
Advances in industrial control lead to increasing incorporation of intercommunication technologies and embedded devices into the production environment. In addition to that, the rising complexity of automation tasks creates demand for extensive solutions. Standardised protocols and commercial off the shelf devices aid in providing these solutions. Still, setting up industrial communication networks is a tedious and high effort task. This justifies the need for simulation environments in the industrial context, as they provide cost-, resource- and time-efficient evaluation of solution approaches. In this work, industrial use cases are identified and the according requirements are derived. Furthermore, available simulation and emulation tools are analysed. They are mapped onto the requirements of industrial applications, so that an expressive assignment of solutions to application domains is given.
{"title":"The Dos and Don'ts of Industrial Network Simulation: A Field Report","authors":"S. D. Antón, Daniel Fraunholz, Dennis Krummacker, Christoph Fischer, Michael Karrenbauer, H. Schotten","doi":"10.1145/3284557.3284716","DOIUrl":"https://doi.org/10.1145/3284557.3284716","url":null,"abstract":"Advances in industrial control lead to increasing incorporation of intercommunication technologies and embedded devices into the production environment. In addition to that, the rising complexity of automation tasks creates demand for extensive solutions. Standardised protocols and commercial off the shelf devices aid in providing these solutions. Still, setting up industrial communication networks is a tedious and high effort task. This justifies the need for simulation environments in the industrial context, as they provide cost-, resource- and time-efficient evaluation of solution approaches. In this work, industrial use cases are identified and the according requirements are derived. Furthermore, available simulation and emulation tools are analysed. They are mapped onto the requirements of industrial applications, so that an expressive assignment of solutions to application domains is given.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124933907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main purposes of picture archiving systems produced by medical imaging modalities is used for diagnosis and research purposes, include in eye surgery field. In doing modern surgery such ophthalmologic, doctors operate eye's internal lens, which is small objects, so they are prone to making mistakes. The postoperative procedure is required to evaluate the intervention results. The microscope ophthalmologic surgery equipment uses trinocular which can be installed with a digital camera to record intervention activities for reflective purposes. In this study besides using that main digital camera, we explore the possibility to employ one or more aftermarket digital cameras, such as smart phone or action camera. Close-Up lens will also be used for increasing the object image obtains by the cameras. The uses of aftermarket cameras give beneficial for mobile operation-theatre or application in the rural area. The objective of this exploration is to get insight about the possibilities and functions of this kind of cameras, whether it may effectively be used. We used an image of eye rather than real eye. The results show that combining camera with close-up lens helps to obtain bigger size of images/videos although some further improvement is still required.
{"title":"Simulating Video Capturing for Phacoemulsification Surgery Using Aftermarket Cameras","authors":"Soetrisno, Josiah Irma, D. H. Hareva, H. Tjahyadi","doi":"10.1145/3284557.3284703","DOIUrl":"https://doi.org/10.1145/3284557.3284703","url":null,"abstract":"The main purposes of picture archiving systems produced by medical imaging modalities is used for diagnosis and research purposes, include in eye surgery field. In doing modern surgery such ophthalmologic, doctors operate eye's internal lens, which is small objects, so they are prone to making mistakes. The postoperative procedure is required to evaluate the intervention results. The microscope ophthalmologic surgery equipment uses trinocular which can be installed with a digital camera to record intervention activities for reflective purposes. In this study besides using that main digital camera, we explore the possibility to employ one or more aftermarket digital cameras, such as smart phone or action camera. Close-Up lens will also be used for increasing the object image obtains by the cameras. The uses of aftermarket cameras give beneficial for mobile operation-theatre or application in the rural area. The objective of this exploration is to get insight about the possibilities and functions of this kind of cameras, whether it may effectively be used. We used an image of eye rather than real eye. The results show that combining camera with close-up lens helps to obtain bigger size of images/videos although some further improvement is still required.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131475722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Home automation and the concept of Internet of Things (IoT) have been existing for more than a decade, with billions of devices connected to the internet. The conventional home automation system allows users to control household appliances such as lights, air-conditioning, surveillance camera etc. via smartphone applications, webpages and control panels. One of the major drawbacks is with the operation efficiency, where people would still need their hands on the physical interfaces to access the system. It could be quite inconvenient for specific groups such as the elderly and disabled people, who will not benefit much from such systems. In light of this, the project proposes a methodology and design of a voice-controlled environment with emphasis on speech recognition and voice control based on Amazon Alexa and Raspberry Pi. In this implementation, office users can easily control their office appliances with voice commands, where as the model can be implemented for smart home users as well. The proposed voice-controlled implementation comprises eight main features: 1) Control of wired electrical appliances; 2) Control of Radio Frequency (RF) and Infrared (IR) appliances; 3) YouTube connected entertainment system; 4) Digital memo; 5) Face recognition attendance taking system with SQL database; 6) Security surveillance; 7) Room occupancy detection; 8) Telegram-based voice-controlled text messaging. The proposed system not only saves time but also bring convenience to people.
{"title":"Smart Office: A Voice-controlled Workplace for Everyone","authors":"Z. Y. Chan, P. Shum","doi":"10.1145/3284557.3284712","DOIUrl":"https://doi.org/10.1145/3284557.3284712","url":null,"abstract":"Home automation and the concept of Internet of Things (IoT) have been existing for more than a decade, with billions of devices connected to the internet. The conventional home automation system allows users to control household appliances such as lights, air-conditioning, surveillance camera etc. via smartphone applications, webpages and control panels. One of the major drawbacks is with the operation efficiency, where people would still need their hands on the physical interfaces to access the system. It could be quite inconvenient for specific groups such as the elderly and disabled people, who will not benefit much from such systems. In light of this, the project proposes a methodology and design of a voice-controlled environment with emphasis on speech recognition and voice control based on Amazon Alexa and Raspberry Pi. In this implementation, office users can easily control their office appliances with voice commands, where as the model can be implemented for smart home users as well. The proposed voice-controlled implementation comprises eight main features: 1) Control of wired electrical appliances; 2) Control of Radio Frequency (RF) and Infrared (IR) appliances; 3) YouTube connected entertainment system; 4) Digital memo; 5) Face recognition attendance taking system with SQL database; 6) Security surveillance; 7) Room occupancy detection; 8) Telegram-based voice-controlled text messaging. The proposed system not only saves time but also bring convenience to people.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128355640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hisham Elmoaqet, I. Ismael, Florian Patzolt, Mutaz Ryalat
Cyber-Physical Systems (CPS) fully integrate computational and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa. Industry 4.0, otherwise known as the fourth industrial revolution, integrates people and digitally controlled machines with the internet and information technology. The most commonly used terms to describe the new development that is changing the industrial aspects, are Industry 4.0, Cyber-physical Systems, and the Internet of Things (IOT), which pave the way for smart production factories and the digital transformation. Models of CPS of Industry 4.0 (CPSI 4.0) present a high level of combination and coordination between physical and computational elements aiming to improve productivity and decrease production costs. This paper introduces a testbed for a cyber-physical system of Industry 4.0. The testbed is a serial line equipped with sensors to collect data at both the machine and system level. Various tools were utilized to aggregate, analyze, and display this data and prepare it for processing over the cloud. The implemented system leverages many of Industry 4.0 features such as predictive maintenance, Radio Frequency Identification (RFID), condition monitoring, communication technology and simple cyber-physical system security. The work presented is the basis for building a larger research testbed that could allow multidisciplinare research projects in this domain.
{"title":"Design and Integration of an IoT Device for Training Purposes of Industry 4.0","authors":"Hisham Elmoaqet, I. Ismael, Florian Patzolt, Mutaz Ryalat","doi":"10.1145/3284557.3284740","DOIUrl":"https://doi.org/10.1145/3284557.3284740","url":null,"abstract":"Cyber-Physical Systems (CPS) fully integrate computational and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa. Industry 4.0, otherwise known as the fourth industrial revolution, integrates people and digitally controlled machines with the internet and information technology. The most commonly used terms to describe the new development that is changing the industrial aspects, are Industry 4.0, Cyber-physical Systems, and the Internet of Things (IOT), which pave the way for smart production factories and the digital transformation. Models of CPS of Industry 4.0 (CPSI 4.0) present a high level of combination and coordination between physical and computational elements aiming to improve productivity and decrease production costs. This paper introduces a testbed for a cyber-physical system of Industry 4.0. The testbed is a serial line equipped with sensors to collect data at both the machine and system level. Various tools were utilized to aggregate, analyze, and display this data and prepare it for processing over the cloud. The implemented system leverages many of Industry 4.0 features such as predictive maintenance, Radio Frequency Identification (RFID), condition monitoring, communication technology and simple cyber-physical system security. The work presented is the basis for building a larger research testbed that could allow multidisciplinare research projects in this domain.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125361859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our research presented in this paper focuses on HRI (Human-Robot Interaction) via pointing gestures. We've designed a method where human operator points to a specific location and subsequently a mobile robot drives to the designated location. A depth sensor is used to capture operator's position and gesture. The key to our algorithm is 3D positions of operator's body joints. We further our previous research by analysis of two depth sensors, Kinect v1 and Kinect v2, in their ability to detect body joints.
{"title":"Human-Robot Interaction Using Pointing Gestures","authors":"Michal Tölgyessy, Martin Dekan, P. Hubinský","doi":"10.1145/3284557.3284718","DOIUrl":"https://doi.org/10.1145/3284557.3284718","url":null,"abstract":"Our research presented in this paper focuses on HRI (Human-Robot Interaction) via pointing gestures. We've designed a method where human operator points to a specific location and subsequently a mobile robot drives to the designated location. A depth sensor is used to capture operator's position and gesture. The key to our algorithm is 3D positions of operator's body joints. We further our previous research by analysis of two depth sensors, Kinect v1 and Kinect v2, in their ability to detect body joints.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Choo, Yong-jun Ha, Young-Bu Kim, Sang-Jin Lee, Hyun-Deuk Choi
Wireless Internet of Things (IoT) devices share several features such as limited energy supply, low computing power, limited memory size, and vulnerable radio communication network. IETF proposed the Constrained Application Protocol (CoAP) for this type of network. This paper presents implementation of CoAP into an embedded IoT device used for smart Energy Storage System (ESS) under microgrid environment. Confirmable message type was adopted to provide reliable communication. Since the frame size of IEEE 802.15.4 physical layer was limited to 127 bytes, the header of 6LoWPAN and UDP was compressed to reduce fragmentation and reassembly overhead. Performance of the communication service was tested by measuring round trip time between two end nodes of developed system.
{"title":"Development of CoAP-based IoT Communication System for Smart Energy Storage System","authors":"Y. Choo, Yong-jun Ha, Young-Bu Kim, Sang-Jin Lee, Hyun-Deuk Choi","doi":"10.1145/3284557.3284706","DOIUrl":"https://doi.org/10.1145/3284557.3284706","url":null,"abstract":"Wireless Internet of Things (IoT) devices share several features such as limited energy supply, low computing power, limited memory size, and vulnerable radio communication network. IETF proposed the Constrained Application Protocol (CoAP) for this type of network. This paper presents implementation of CoAP into an embedded IoT device used for smart Energy Storage System (ESS) under microgrid environment. Confirmable message type was adopted to provide reliable communication. Since the frame size of IEEE 802.15.4 physical layer was limited to 127 bytes, the header of 6LoWPAN and UDP was compressed to reduce fragmentation and reassembly overhead. Performance of the communication service was tested by measuring round trip time between two end nodes of developed system.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130680525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things is an integral part of the Internet of the future and can defined as a global and dynamic network infrastructure based on interoperable communication protocols where real and virtual Things have an identity or address that through smart interfaces are perfectly integrated into an information network. Among the connected objects will be the Wireless Sensor Networks WSN that can generate, collect, store and share information between themselves and with the centralized authentication nodes called "Base stations". The information collected by the sensor nodes must protected against attacks and forgery in the collection and transfer of data. Because connected sensor nodes have low computing, memory, and power capabilities, and access to the radio medium is highly consumer of resources, traditional cryptographic protocols are not suitable for connected Things because of their heterogeneity. In this paper will present the various attacks against WSN in the context of IoT and proposed solutions exist in literature to securing the network against these attacks.
{"title":"A Study of the Security Problems of Wireless Sensor Networks into the Context of the Internet of Things","authors":"Benfilali Mostefa, Gafour Abdelkader","doi":"10.1145/3284557.3284699","DOIUrl":"https://doi.org/10.1145/3284557.3284699","url":null,"abstract":"The Internet of Things is an integral part of the Internet of the future and can defined as a global and dynamic network infrastructure based on interoperable communication protocols where real and virtual Things have an identity or address that through smart interfaces are perfectly integrated into an information network. Among the connected objects will be the Wireless Sensor Networks WSN that can generate, collect, store and share information between themselves and with the centralized authentication nodes called \"Base stations\". The information collected by the sensor nodes must protected against attacks and forgery in the collection and transfer of data. Because connected sensor nodes have low computing, memory, and power capabilities, and access to the radio medium is highly consumer of resources, traditional cryptographic protocols are not suitable for connected Things because of their heterogeneity. In this paper will present the various attacks against WSN in the context of IoT and proposed solutions exist in literature to securing the network against these attacks.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114935610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Electromagnetic imaging has been investigated extensively to detect various diseases including breast cancer, stroke, lung ventilation, prostate cancer, and gastric emptying. This paper presents the compressive review on recent development in electromagnetic imaging techniques and instruments for brain stroke detection. Several electromagnetic sensing and imaging techniques, measurement systems and their biomedical applications are presented in this paper. This study also discusses the current challenges and future research directions of electromagnetic sensing and imaging techniques.
{"title":"Electromagnetic Sensing and Imaging for Stroke Detection","authors":"Lulu Wang","doi":"10.1145/3284557.3284734","DOIUrl":"https://doi.org/10.1145/3284557.3284734","url":null,"abstract":"Electromagnetic imaging has been investigated extensively to detect various diseases including breast cancer, stroke, lung ventilation, prostate cancer, and gastric emptying. This paper presents the compressive review on recent development in electromagnetic imaging techniques and instruments for brain stroke detection. Several electromagnetic sensing and imaging techniques, measurement systems and their biomedical applications are presented in this paper. This study also discusses the current challenges and future research directions of electromagnetic sensing and imaging techniques.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123325144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}