Due to the cost-effective and easy-to-deploy characteristics, WiFi has been widely used in indoor localization. For millimeter wave (mmWave) WiFi indoor communication systems, we develop a two-stage algorithm to achieve user localization and environment reconstruction in this paper. In the first stage, accurate estimation of parameters as well as the reconstructed sparse signal can be obtained through the improved orthogonal matching pursuit (IOMP) algorithm. In second stage, we construct the geometric model of positions, and implement user localization and scattering environment mapping via computation combined with the estimated parameters. The proposed algorithm has low complexity and requires a small number of sub-carriers to realize user localization and environment reconstruction. Simulations verify the effectiveness of the proposed algorithm.
{"title":"An Effective User Localization and Environment Reconstruction Algorithm for WiFi Systems","authors":"Yuan Tang, Zhihai Zhang, Xinhong Pan, Heyun Lin, Yuan Chen","doi":"10.1109/ICCT56141.2022.10072501","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072501","url":null,"abstract":"Due to the cost-effective and easy-to-deploy characteristics, WiFi has been widely used in indoor localization. For millimeter wave (mmWave) WiFi indoor communication systems, we develop a two-stage algorithm to achieve user localization and environment reconstruction in this paper. In the first stage, accurate estimation of parameters as well as the reconstructed sparse signal can be obtained through the improved orthogonal matching pursuit (IOMP) algorithm. In second stage, we construct the geometric model of positions, and implement user localization and scattering environment mapping via computation combined with the estimated parameters. The proposed algorithm has low complexity and requires a small number of sub-carriers to realize user localization and environment reconstruction. Simulations verify the effectiveness of the proposed algorithm.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114211981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development and using of clean energy, more and more distributed generations including photovoltaic panels, which can generate the power by consuming the new and renewable energy are connected to the system. However, the power grid system is vulnerable to attack due to the greater load pressure and security risks. This paper presents a third-party load aggregation platform interactive data anomaly detection method based on multi-dimensional feature information fusion and deep residual network analysis in a comprehensive energy scenario. The method we proposed can collect, extract and analyze the interactive data of the third-party load aggregation platform, and then analyze and detect the anomaly of the load data collected by the platform from the perspective of multi-dimensional feature fusion analysis. Specifically, by extracting the initial data features of the multi-dimensional third-party load platform, this paper adopts wavelet transform and spectral clustering technology to denoise, filter pseudo data features and perform feature clustering analysis due to the magnanimity and dynamic acquisition characteristics of power load data; Then, by using the cross layer direct connected edge characteristics of the depth residual network, the error back propagation attenuation in the depth learning is constructed, and the depth network model of abnormal data detection is trained to achieve the task of abnormal data detection of the third-party load aggregation platform interactive data. The main contribution of this paper is that the method of the third-party load aggregation platform interactive data anomaly detection based on multi-dimensional feature information fusion and deep residual network is presented, and the test results have shown the efficient of the method.
{"title":"Anomaly Detection Method For Interactive Data of Third-Party Load Aggregation Platform Based on Multidimensional Feature Information Fusion","authors":"Xiao Zhang, Chenghao Zheng, Xianglong Wu, Tianpeng Wang, Hailong Gao, Jing Guo","doi":"10.1109/ICCT56141.2022.10072826","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072826","url":null,"abstract":"With the development and using of clean energy, more and more distributed generations including photovoltaic panels, which can generate the power by consuming the new and renewable energy are connected to the system. However, the power grid system is vulnerable to attack due to the greater load pressure and security risks. This paper presents a third-party load aggregation platform interactive data anomaly detection method based on multi-dimensional feature information fusion and deep residual network analysis in a comprehensive energy scenario. The method we proposed can collect, extract and analyze the interactive data of the third-party load aggregation platform, and then analyze and detect the anomaly of the load data collected by the platform from the perspective of multi-dimensional feature fusion analysis. Specifically, by extracting the initial data features of the multi-dimensional third-party load platform, this paper adopts wavelet transform and spectral clustering technology to denoise, filter pseudo data features and perform feature clustering analysis due to the magnanimity and dynamic acquisition characteristics of power load data; Then, by using the cross layer direct connected edge characteristics of the depth residual network, the error back propagation attenuation in the depth learning is constructed, and the depth network model of abnormal data detection is trained to achieve the task of abnormal data detection of the third-party load aggregation platform interactive data. The main contribution of this paper is that the method of the third-party load aggregation platform interactive data anomaly detection based on multi-dimensional feature information fusion and deep residual network is presented, and the test results have shown the efficient of the method.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"46 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113936220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072780
Sixiang Ran, Zhongke Zhao, W. Ni, Chunyong Yang
We proposed a novel curvature-sensitivity-enhanced optical fiber sensor realized by Bragg hollow core fiber (BHCF). The suspended hollow core fiber (SHCF) and the BHCF were connected between two single-mode fibers forming the sensor. The special construction of a four-bilayer Bragg structure provides a well-defined period interference envelope in the transmission spectrum for sensing external perturbations. Because of the different sensitivities of the interference dips, the proposed BHCF-SHCF-based sensor is able to simultaneously measure the parameter of curvature and temperature by monitoring the intensity fluctuation and wavelength shift, respectively. The highest curvature sensitivity of the proposed sensor is measured to be 0.36 dB/m-1 in the range of 1.283-3.247 m-1 with the adjusted R square value of 0.9895. Besides, the experiment of the temperature is also conducted, the results indicate the two measurands without crosstalk attributing to the different demodulation method.
{"title":"Curvature-Sensitivity-Enhanced Fiber-Optic Sensor Based on Bragg Hollow Core Fiber","authors":"Sixiang Ran, Zhongke Zhao, W. Ni, Chunyong Yang","doi":"10.1109/ICCT56141.2022.10072780","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072780","url":null,"abstract":"We proposed a novel curvature-sensitivity-enhanced optical fiber sensor realized by Bragg hollow core fiber (BHCF). The suspended hollow core fiber (SHCF) and the BHCF were connected between two single-mode fibers forming the sensor. The special construction of a four-bilayer Bragg structure provides a well-defined period interference envelope in the transmission spectrum for sensing external perturbations. Because of the different sensitivities of the interference dips, the proposed BHCF-SHCF-based sensor is able to simultaneously measure the parameter of curvature and temperature by monitoring the intensity fluctuation and wavelength shift, respectively. The highest curvature sensitivity of the proposed sensor is measured to be 0.36 dB/m-1 in the range of 1.283-3.247 m-1 with the adjusted R square value of 0.9895. Besides, the experiment of the temperature is also conducted, the results indicate the two measurands without crosstalk attributing to the different demodulation method.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117312730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to realize the target positioning and search without mobile network in aviation, aerospace and other fields, a highly reliable wireless positioning and search system is proposed in this paper. The system includes positioning device and ground search device, avoids the risk of single point failure of communication by means of BeiDou Navigation Satellite System (BDS) / Global Positioning System (GPS) dual-mode Satellite positioning communication, proposes an innovative design of positioning device combined with microwave network, which expands a single group of antennas into an array antenna system, and improves the antenna transmission direction dimension to 360°at the expense of controllable signal transmission power. The system transmits target location information and equipment status through BDS short message service, and adopts time-sharing multiplexing and redundant framing technology to improve the comprehensive positioning frequency, which is more than 5 times of the original mode. In the actual test application, the average acquisition frequency of short message positioning information is less than 6s, and the measured average positioning error is about 5m.
{"title":"Optimization Design and Application of Positioning Search Technology Based on Satellite Navigation System","authors":"Junqi Pang, Wenyi Liu, Haifeng Hu, Ruixuan Yang, Ruixing Cao, Zhongliang Zhao","doi":"10.1109/ICCT56141.2022.10073298","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073298","url":null,"abstract":"In order to realize the target positioning and search without mobile network in aviation, aerospace and other fields, a highly reliable wireless positioning and search system is proposed in this paper. The system includes positioning device and ground search device, avoids the risk of single point failure of communication by means of BeiDou Navigation Satellite System (BDS) / Global Positioning System (GPS) dual-mode Satellite positioning communication, proposes an innovative design of positioning device combined with microwave network, which expands a single group of antennas into an array antenna system, and improves the antenna transmission direction dimension to 360°at the expense of controllable signal transmission power. The system transmits target location information and equipment status through BDS short message service, and adopts time-sharing multiplexing and redundant framing technology to improve the comprehensive positioning frequency, which is more than 5 times of the original mode. In the actual test application, the average acquisition frequency of short message positioning information is less than 6s, and the measured average positioning error is about 5m.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123160516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072757
Zijun Hu, Xinliang Chen, Zhennan Liang, Bowen Cai
With the continuous development of Digital Radio Frequency Memory (DRFM) technology, radar working condition is seriously threatened by various activate jamming, echo of true target will be mixed or covered by jamming. In this condition, splitting features extracted by modulating splitting code into the process of pulse compression present greatly difference between true target and jamming, and then this paper proposes a jamming identification method based on splitting feature and Swin Transformer (shifted window Transformer) neural network which can effectively distinguish the typical jamming, achieve classification task, and improve detection performance and recognition accuracy. Finally, the verification result of measured data shows that true target and jamming can be recognized perfectly.
{"title":"Identification of Active Jamming Based on Swin Transformer Model and Splitting Features","authors":"Zijun Hu, Xinliang Chen, Zhennan Liang, Bowen Cai","doi":"10.1109/ICCT56141.2022.10072757","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072757","url":null,"abstract":"With the continuous development of Digital Radio Frequency Memory (DRFM) technology, radar working condition is seriously threatened by various activate jamming, echo of true target will be mixed or covered by jamming. In this condition, splitting features extracted by modulating splitting code into the process of pulse compression present greatly difference between true target and jamming, and then this paper proposes a jamming identification method based on splitting feature and Swin Transformer (shifted window Transformer) neural network which can effectively distinguish the typical jamming, achieve classification task, and improve detection performance and recognition accuracy. Finally, the verification result of measured data shows that true target and jamming can be recognized perfectly.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072512
P. Kong, B. Li, Yong-heng Wang, Xiao Huang, Kaibo Shi, D. Ma, Bo Ran, Jitao Huang
With the development of future mobile communication, how to provide better quality of service for latency-sensitive services by mobile edge computing (MEC) in unmanned aerial vehicle (UAV) is a hot issue. Therefore, this paper considers the cooperation of multi- UAV to establish a mobile edge computing network and proposes an optimized delay scheme under the cooperative computing of multi-UAV. In this network, two main works are done. The first work is to model the computational delay of the tasks after the block. The second work is to optimize the computational delay through the deep deterministic policy gradient (DDPG) algorithm. Finally, the simulation results showcase that the proposed scheme has high reliability from the reward function. When subtasks are transmitted and computed, optimal allocate bandwidth and computing resources can be obtained by minimizing the computing delay in the proposed scheme.
{"title":"Multi-UAV Cooperative Computational Latency Modeling and DDPG Optimization","authors":"P. Kong, B. Li, Yong-heng Wang, Xiao Huang, Kaibo Shi, D. Ma, Bo Ran, Jitao Huang","doi":"10.1109/ICCT56141.2022.10072512","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072512","url":null,"abstract":"With the development of future mobile communication, how to provide better quality of service for latency-sensitive services by mobile edge computing (MEC) in unmanned aerial vehicle (UAV) is a hot issue. Therefore, this paper considers the cooperation of multi- UAV to establish a mobile edge computing network and proposes an optimized delay scheme under the cooperative computing of multi-UAV. In this network, two main works are done. The first work is to model the computational delay of the tasks after the block. The second work is to optimize the computational delay through the deep deterministic policy gradient (DDPG) algorithm. Finally, the simulation results showcase that the proposed scheme has high reliability from the reward function. When subtasks are transmitted and computed, optimal allocate bandwidth and computing resources can be obtained by minimizing the computing delay in the proposed scheme.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073105
Zuxiang Zheng, Dongdong Wang, Lizhe Liu, Bin Wang, Chenhua Sun
In this paper, we propose a robust random access preamble detection scheme for 5G integrated low-earth-orbit (LEO) satellite. By converting the traditional frequency domain detection to time domain detection and adjusting the starting time and interval of the time domain detection window according to the large round-trip delay differences of LEO satellite systems, this scheme can directly adopt the preamble format of terrestrial 5G, and achieve the correct preamble detection and the accurate TA (Timing Advance) estimation without relying on the navigation and positioning systems, which are used to provide necessary information for TA pre-compensation based LEO satellite preamble detection scheme. In addition, the optimal detection threshold expression, which is applicable to all preamble formats, is derived from a group of threshold coefficient curves which is acquired from the estimated value of detection threshold and noise power. Simulation results show that, compared with the TA pre-compensation LEO satellite preamble detection scheme, the proposed scheme shows 1dB performance improvement at the same detection success rate under different condition of normalized carrier frequency offset (NCFO) without the help of navigation and positioning systems.
{"title":"Robust Random Access Preamble Detection Scheme for 5G Integrated LEO Satellite Communication Systems","authors":"Zuxiang Zheng, Dongdong Wang, Lizhe Liu, Bin Wang, Chenhua Sun","doi":"10.1109/ICCT56141.2022.10073105","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073105","url":null,"abstract":"In this paper, we propose a robust random access preamble detection scheme for 5G integrated low-earth-orbit (LEO) satellite. By converting the traditional frequency domain detection to time domain detection and adjusting the starting time and interval of the time domain detection window according to the large round-trip delay differences of LEO satellite systems, this scheme can directly adopt the preamble format of terrestrial 5G, and achieve the correct preamble detection and the accurate TA (Timing Advance) estimation without relying on the navigation and positioning systems, which are used to provide necessary information for TA pre-compensation based LEO satellite preamble detection scheme. In addition, the optimal detection threshold expression, which is applicable to all preamble formats, is derived from a group of threshold coefficient curves which is acquired from the estimated value of detection threshold and noise power. Simulation results show that, compared with the TA pre-compensation LEO satellite preamble detection scheme, the proposed scheme shows 1dB performance improvement at the same detection success rate under different condition of normalized carrier frequency offset (NCFO) without the help of navigation and positioning systems.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123736602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10073340
Wenlong Xu, Tiankui Zhang, Liwei Yang
The cooperation of multiple unmanned aerial vehicles (UAVs) is investigated to provide auxiliary computing services for ground users. First, the system cost is defined considering the energy consumption of the UAV, the energy consumption of the user, and the delay of the user at the same time. Take into account the dynamic allocation of bandwidth by the user and the dynamic allocation of computational resources by the UAV, the flight trajectory of UAVs, the offloading object and the offloading ratio of users are jointly optimized to minimize the system cost. Due to the dynamic and long-term feature of the problem, it is described as a Markov decision process. A joint computing offloading and trajectory algorithm is proposed based on the PPO in deep reinforcement learning. Simulation results show the convergence of the proposed algorithm. The proposed algorithm has superior performance compared with the benchmark algorithms.
{"title":"Joint Computing Offloading and Trajectory for Multi-UAV Enabled MEC Systems","authors":"Wenlong Xu, Tiankui Zhang, Liwei Yang","doi":"10.1109/ICCT56141.2022.10073340","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10073340","url":null,"abstract":"The cooperation of multiple unmanned aerial vehicles (UAVs) is investigated to provide auxiliary computing services for ground users. First, the system cost is defined considering the energy consumption of the UAV, the energy consumption of the user, and the delay of the user at the same time. Take into account the dynamic allocation of bandwidth by the user and the dynamic allocation of computational resources by the UAV, the flight trajectory of UAVs, the offloading object and the offloading ratio of users are jointly optimized to minimize the system cost. Due to the dynamic and long-term feature of the problem, it is described as a Markov decision process. A joint computing offloading and trajectory algorithm is proposed based on the PPO in deep reinforcement learning. Simulation results show the convergence of the proposed algorithm. The proposed algorithm has superior performance compared with the benchmark algorithms.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121907649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072881
Jianxin Li, Chao Sun, Jiangong Zheng, Xiaotong Guo, Tongyu Song, Jing Ren, Ping Zhang, Siyang Liu
In Wireless Sensor Networks (WSNs), sensors collect and transmit information to the sink node through single-hop or multi-hop wireless communication links. However, the traditional static sink node solution will cause the hotspot problem due to the energy limitation of sensor nodes. To alleviate the above problem, the Unmanned Aerial Vehicle (UAV)-assisted WSNs, which employs a UAV as the sink node, is proposed to flexibly adjust the routing scheme and prolong the lifetime of sensor nodes. However, the movement of the UAV needs to adapt to the sensor nodes' energy consumption during the transmission in the WSNs, which is a challenging task. Therefore, we propose DRED, an energy-efficient data collection scheme for UAV-assisted WSNs, to control the dynamic routing and the movement of the UAV based on Deep Reinforcement Learning (DRL). The simulation results show that DRED can achieve high network performance in terms of network lifetime.
{"title":"DRED: A DRL-Based Energy-Efficient Data Collection Scheme for UAV-Assisted WSNs","authors":"Jianxin Li, Chao Sun, Jiangong Zheng, Xiaotong Guo, Tongyu Song, Jing Ren, Ping Zhang, Siyang Liu","doi":"10.1109/ICCT56141.2022.10072881","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072881","url":null,"abstract":"In Wireless Sensor Networks (WSNs), sensors collect and transmit information to the sink node through single-hop or multi-hop wireless communication links. However, the traditional static sink node solution will cause the hotspot problem due to the energy limitation of sensor nodes. To alleviate the above problem, the Unmanned Aerial Vehicle (UAV)-assisted WSNs, which employs a UAV as the sink node, is proposed to flexibly adjust the routing scheme and prolong the lifetime of sensor nodes. However, the movement of the UAV needs to adapt to the sensor nodes' energy consumption during the transmission in the WSNs, which is a challenging task. Therefore, we propose DRED, an energy-efficient data collection scheme for UAV-assisted WSNs, to control the dynamic routing and the movement of the UAV based on Deep Reinforcement Learning (DRL). The simulation results show that DRED can achieve high network performance in terms of network lifetime.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121577451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1109/ICCT56141.2022.10072675
Fanbin Meng, Gang Zheng, Yu Nan, Jiangtao Li
Operating cables will inevitably undergo insulation aging due to the influence of electric field, magnetic field, heat, light, moisture and other factors, and the insulation performance will be significantly reduced. Statistics show that cable joint failure is one of the important causes of cable failure. The multi-physical field coupling model adopts a variety of physical field interfaces such as electric and acoustic coupling to simulate the discharge waveforms and waveform propagation forms generated by cable joint defects. Firstly, the relationship between voltage and insulation fault is established, and the cable insulation fault is diagnosed by the electric field characteristics. In addition, the electric field characteristics are used to reflect the location of charge agglomeration area, and then the discharge signal at this location is detected to diagnose the deterioration degree of insulation materials.
{"title":"Research on Cable Aging and Joint State Detection Technology Under the Effect of Multi-physical Field Coupling","authors":"Fanbin Meng, Gang Zheng, Yu Nan, Jiangtao Li","doi":"10.1109/ICCT56141.2022.10072675","DOIUrl":"https://doi.org/10.1109/ICCT56141.2022.10072675","url":null,"abstract":"Operating cables will inevitably undergo insulation aging due to the influence of electric field, magnetic field, heat, light, moisture and other factors, and the insulation performance will be significantly reduced. Statistics show that cable joint failure is one of the important causes of cable failure. The multi-physical field coupling model adopts a variety of physical field interfaces such as electric and acoustic coupling to simulate the discharge waveforms and waveform propagation forms generated by cable joint defects. Firstly, the relationship between voltage and insulation fault is established, and the cable insulation fault is diagnosed by the electric field characteristics. In addition, the electric field characteristics are used to reflect the location of charge agglomeration area, and then the discharge signal at this location is detected to diagnose the deterioration degree of insulation materials.","PeriodicalId":294057,"journal":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123882913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}