Pub Date : 2021-06-12DOI: 10.1109/ICECCE52056.2021.9514124
Muhammad Salman Kabir, Ikechi Ndukwe, Engr. Zainab Shahid Awan
Drone detection technology is a new frontier in defence systems. With increasing incidences of crimes and terroristic attacks using commercial drones, detection of unauthorized drones is critical for timely responses from law enforcement agencies. In this paper, the issues of unavailability of benchmark dataset and performance metrics for drone detection are addressed and three single shot detectors, based on YOLOv4, YOLOv5 and DETR architectures are presented. A maximum of 99% average precision (AP) with an average Intersection over Union (IOU) of 84% was achieved. The precision-recall curves corroborate the generalization and fitness of the trained detection models.
{"title":"Deep Learning Inspired Vision based Frameworks for Drone Detection","authors":"Muhammad Salman Kabir, Ikechi Ndukwe, Engr. Zainab Shahid Awan","doi":"10.1109/ICECCE52056.2021.9514124","DOIUrl":"https://doi.org/10.1109/ICECCE52056.2021.9514124","url":null,"abstract":"Drone detection technology is a new frontier in defence systems. With increasing incidences of crimes and terroristic attacks using commercial drones, detection of unauthorized drones is critical for timely responses from law enforcement agencies. In this paper, the issues of unavailability of benchmark dataset and performance metrics for drone detection are addressed and three single shot detectors, based on YOLOv4, YOLOv5 and DETR architectures are presented. A maximum of 99% average precision (AP) with an average Intersection over Union (IOU) of 84% was achieved. The precision-recall curves corroborate the generalization and fitness of the trained detection models.","PeriodicalId":302947,"journal":{"name":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"27 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125614918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-12DOI: 10.1109/ICECCE52056.2021.9514168
Jun O. Seo, S. Manoharan, U. Speidel
Network packets can be used to hide information in space or in time, a steganographic technique known as a covert channel. Steganalysis is the science of finding the presence of covert channels. Re-embedding steganalysis has been shown to be effective in detecting both the presence and the amount of hidden information. The technique, however, is impractical because it required manual analysis of every network flow. This paper proposes methods to automate the analysis process effectively. The experimental results suggest that automatic detection is possible and that re-embedding steganalysis is practical.
{"title":"Automatic Detection of Storage-Based Covert Channels","authors":"Jun O. Seo, S. Manoharan, U. Speidel","doi":"10.1109/ICECCE52056.2021.9514168","DOIUrl":"https://doi.org/10.1109/ICECCE52056.2021.9514168","url":null,"abstract":"Network packets can be used to hide information in space or in time, a steganographic technique known as a covert channel. Steganalysis is the science of finding the presence of covert channels. Re-embedding steganalysis has been shown to be effective in detecting both the presence and the amount of hidden information. The technique, however, is impractical because it required manual analysis of every network flow. This paper proposes methods to automate the analysis process effectively. The experimental results suggest that automatic detection is possible and that re-embedding steganalysis is practical.","PeriodicalId":302947,"journal":{"name":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116534394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-12DOI: 10.1109/ICECCE52056.2021.9514109
Taha Darwassh Hanawy Hussein, M. Frikha, Sulayman Ahmed, Javad Rahebi
In this paper, ambulance vehicles are routed using BAT algorithm. The city map is created by node method. The control station receives the information about accident place and then this information is communicated to the ambulance and hospital. The drive feed the data i.e., node position of the accident and ambulance vehicle in the bat algorithm based vehicle routing method and it provides shortest path for reaching accident place to driver. After reaching accident place, drive feed the position of the accident place and hospital position in the bat algorithm vehicle routing method and it provide shortest path for reaching hospital to driver. Shortest bath and quick reach time is generated using this algorithm.
{"title":"Ambulance Vehicle Routing using BAT Algorithm","authors":"Taha Darwassh Hanawy Hussein, M. Frikha, Sulayman Ahmed, Javad Rahebi","doi":"10.1109/ICECCE52056.2021.9514109","DOIUrl":"https://doi.org/10.1109/ICECCE52056.2021.9514109","url":null,"abstract":"In this paper, ambulance vehicles are routed using BAT algorithm. The city map is created by node method. The control station receives the information about accident place and then this information is communicated to the ambulance and hospital. The drive feed the data i.e., node position of the accident and ambulance vehicle in the bat algorithm based vehicle routing method and it provides shortest path for reaching accident place to driver. After reaching accident place, drive feed the position of the accident place and hospital position in the bat algorithm vehicle routing method and it provide shortest path for reaching hospital to driver. Shortest bath and quick reach time is generated using this algorithm.","PeriodicalId":302947,"journal":{"name":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127732027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-12DOI: 10.1109/ICECCE52056.2021.9514118
Nyandika, Kimwele, Okeyo
The paper introduces handover system by use of two radio connections fitted in the train operating on different channels as well as use of the train's location and directional information to aid in reducing ping pong during handover. The paper formulates the Global Systems for Mobiles Railway (GSM-R) algorithm to help make decisions on when to handover with the objective of minimizing the handoff latency. These measures allow seamless connection to the network while moving along the railway boundaries which improves communication. This reduces outage duration. Simulation of the system is done using MATLAB. The algorithm used is disruption free and quite effective in high speed train travel, and the handoff decision is very efficient and more exact. This will therefore significantly improve service availability and reduce latency in data communication.
{"title":"Handover Enhancement in Wireless Communication-Based Train Control Systems","authors":"Nyandika, Kimwele, Okeyo","doi":"10.1109/ICECCE52056.2021.9514118","DOIUrl":"https://doi.org/10.1109/ICECCE52056.2021.9514118","url":null,"abstract":"The paper introduces handover system by use of two radio connections fitted in the train operating on different channels as well as use of the train's location and directional information to aid in reducing ping pong during handover. The paper formulates the Global Systems for Mobiles Railway (GSM-R) algorithm to help make decisions on when to handover with the objective of minimizing the handoff latency. These measures allow seamless connection to the network while moving along the railway boundaries which improves communication. This reduces outage duration. Simulation of the system is done using MATLAB. The algorithm used is disruption free and quite effective in high speed train travel, and the handoff decision is very efficient and more exact. This will therefore significantly improve service availability and reduce latency in data communication.","PeriodicalId":302947,"journal":{"name":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131912916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-12DOI: 10.1109/ICECCE52056.2021.9514068
E. A. Ogbodo, Augustine O. Nwajana
Coupled resonators are commonly used in the design of filters with bandpass response. Majority of these filters are designed using edge coupled or direct coupled technique. This paper proposes the implementation of the edge coupled and the direct coupled technique in the designing of a bandpass filter using microstrip technology. This is to ease the bandwidth and the frequency control of the circuit. The bandpass filter is designed to operate at a centre frequency of 1.95 GHz, using the open-loop resonators for the ease of edge coupling and a λ/4 resonator for the direct coupling. The measured response of the prototyped design and the simulated response show good agreements between the two.
{"title":"A Bandpass Filter Using Edge Coupled and Direct Coupled Techniques","authors":"E. A. Ogbodo, Augustine O. Nwajana","doi":"10.1109/ICECCE52056.2021.9514068","DOIUrl":"https://doi.org/10.1109/ICECCE52056.2021.9514068","url":null,"abstract":"Coupled resonators are commonly used in the design of filters with bandpass response. Majority of these filters are designed using edge coupled or direct coupled technique. This paper proposes the implementation of the edge coupled and the direct coupled technique in the designing of a bandpass filter using microstrip technology. This is to ease the bandwidth and the frequency control of the circuit. The bandpass filter is designed to operate at a centre frequency of 1.95 GHz, using the open-loop resonators for the ease of edge coupling and a λ/4 resonator for the direct coupling. The measured response of the prototyped design and the simulated response show good agreements between the two.","PeriodicalId":302947,"journal":{"name":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133542634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-12DOI: 10.1109/ICECCE52056.2021.9514108
Waqas Arshad, Muhammad Ali, Muhammad Mumtaz Ali, A. Javed, S. Hussain
The objective of text classification is to categorize documents into a specific number of predefined categories. We can easily imagine the issue of arranging documents, not by topic, but rather by and large assessment, e.g. deciding if the sentiment of a document is whether positive or negative. While working on a supervised machine learning problem with a defined dataset, there are many classifiers that can be used in text classification. Utilizing dataset of stack overflow questions, answers, and tags as information, we find that standard machine learning systems completely beat human-delivered baselines. These majorly include Naive Bayes Classifier for multinomial models, Linear Support Vector Machine, Logistic Regression, Word to vector (Word2vec) and Logistic Regression, Document to vector (Doc2vc) and logistic regression, Bag of Words (BOW) with Keras. Our paper is a detailed examination and comparison of accuracies among these algorithms.
{"title":"Multi-Class Text Classification: Model Comparison and Selection","authors":"Waqas Arshad, Muhammad Ali, Muhammad Mumtaz Ali, A. Javed, S. Hussain","doi":"10.1109/ICECCE52056.2021.9514108","DOIUrl":"https://doi.org/10.1109/ICECCE52056.2021.9514108","url":null,"abstract":"The objective of text classification is to categorize documents into a specific number of predefined categories. We can easily imagine the issue of arranging documents, not by topic, but rather by and large assessment, e.g. deciding if the sentiment of a document is whether positive or negative. While working on a supervised machine learning problem with a defined dataset, there are many classifiers that can be used in text classification. Utilizing dataset of stack overflow questions, answers, and tags as information, we find that standard machine learning systems completely beat human-delivered baselines. These majorly include Naive Bayes Classifier for multinomial models, Linear Support Vector Machine, Logistic Regression, Word to vector (Word2vec) and Logistic Regression, Document to vector (Doc2vc) and logistic regression, Bag of Words (BOW) with Keras. Our paper is a detailed examination and comparison of accuracies among these algorithms.","PeriodicalId":302947,"journal":{"name":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114719051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-12DOI: 10.1109/ICECCE52056.2021.9514232
T. U. Sane, Tanuj Sane
With the ever-growing population, demand of good quality food has also increased. This demand is also constrained by shortage of skillful labor & involved costs. Considering these, efforts have been made to automate and improve current crop harvesting processes, using advancements in artificial intelligence (AI) and deep learning (DL) algorithms. This paper explores various robotic harvesting systems, which have already implemented or plan to utilize such techniques to detect a crop, navigate to it and efficiently harvest it in a reliable way. The paper states the harvested crop, investigates the selection criteria of an AI/ DL method, the respective benefits & challenges faced in its field implementation. Lastly, the paper states the possible metrics for selection of such a method and finds that Convoluted Neural Networks (CNN) are a popular choice of DL method for such applications based on their robustness and performance.
{"title":"Artificial Intelligence and Deep Learning Applications in Crop Harvesting Robots -A Survey","authors":"T. U. Sane, Tanuj Sane","doi":"10.1109/ICECCE52056.2021.9514232","DOIUrl":"https://doi.org/10.1109/ICECCE52056.2021.9514232","url":null,"abstract":"With the ever-growing population, demand of good quality food has also increased. This demand is also constrained by shortage of skillful labor & involved costs. Considering these, efforts have been made to automate and improve current crop harvesting processes, using advancements in artificial intelligence (AI) and deep learning (DL) algorithms. This paper explores various robotic harvesting systems, which have already implemented or plan to utilize such techniques to detect a crop, navigate to it and efficiently harvest it in a reliable way. The paper states the harvested crop, investigates the selection criteria of an AI/ DL method, the respective benefits & challenges faced in its field implementation. Lastly, the paper states the possible metrics for selection of such a method and finds that Convoluted Neural Networks (CNN) are a popular choice of DL method for such applications based on their robustness and performance.","PeriodicalId":302947,"journal":{"name":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117321687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-12DOI: 10.1109/ICECCE52056.2021.9514116
Kesh. S. Randhava, M. Roslee, Prince Ugochukwu Nmenme, Z. Yusoff
Due to advancement of wireless communication technology, there is a progressive increase in the number of devices and connectivity each year and this will inevitably overwhelm the base station with the amount of traffic that it has to handle at a time. Device-to-device communication is one of the most significant aspect technologies in the enhancement of moving towards 5G as it is able to solve this problem. Despite that fact, this solution is entailed with an interference problem whereby the resource blocks need to be allocated efficiently in order to minimize its overall interference effect and maximize its throughput. The D2D communication is then further investigated in a more focused and smaller scale network in which we will create a small system model to study the throughput and interference effect of this type of communication. To ensure minimum interference is caused by the RBs allocation problem, a dynamic spectrum algorithm is preferred than the conventional fixed spectrum allocation. The proposed simulation for this project is done by altering one of the parameters that may or may not influence the overall performance of D2D communication. Based on the simulations performed in this project, it is found that the throughput of the system increased by 40.83% and the interference occurred has also slightly improved by an approximate value of 24.15%. Furthermore, the SINR value of the D2D communication has also improved by a significant value of 66.35%, thus, proving that the scheme proposed in this project succesfully improve the overall interference effect in the D2D communication network system.
{"title":"Radio Resource Allocation for Interference Management in Device to Device (D2D) 5G Networks","authors":"Kesh. S. Randhava, M. Roslee, Prince Ugochukwu Nmenme, Z. Yusoff","doi":"10.1109/ICECCE52056.2021.9514116","DOIUrl":"https://doi.org/10.1109/ICECCE52056.2021.9514116","url":null,"abstract":"Due to advancement of wireless communication technology, there is a progressive increase in the number of devices and connectivity each year and this will inevitably overwhelm the base station with the amount of traffic that it has to handle at a time. Device-to-device communication is one of the most significant aspect technologies in the enhancement of moving towards 5G as it is able to solve this problem. Despite that fact, this solution is entailed with an interference problem whereby the resource blocks need to be allocated efficiently in order to minimize its overall interference effect and maximize its throughput. The D2D communication is then further investigated in a more focused and smaller scale network in which we will create a small system model to study the throughput and interference effect of this type of communication. To ensure minimum interference is caused by the RBs allocation problem, a dynamic spectrum algorithm is preferred than the conventional fixed spectrum allocation. The proposed simulation for this project is done by altering one of the parameters that may or may not influence the overall performance of D2D communication. Based on the simulations performed in this project, it is found that the throughput of the system increased by 40.83% and the interference occurred has also slightly improved by an approximate value of 24.15%. Furthermore, the SINR value of the D2D communication has also improved by a significant value of 66.35%, thus, proving that the scheme proposed in this project succesfully improve the overall interference effect in the D2D communication network system.","PeriodicalId":302947,"journal":{"name":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123113452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To reduce the risk of botnet malware, methods of detecting botnet malware using machine learning have received enormous attention in recent years. Most of the traditional methods are based on supervised learning that relies on static features with defined labels. However, recent studies show that supervised machine learning-based IoT malware botnet models are more vulnerable to intentional attacks, known as an adversarial attack. In this paper, we study the adversarial attack on PSI-graph based researches. To perform the efficient attack, we proposed a reinforcement learning based method with a trained target classifier to modify the structures of PSI-graphs. We show that PSI-graphs are vulnerable to such attack. We also discuss about defense method which uses adversarial training to train a defensive model. Experiment result achieves 94.1% accuracy on the adversarial dataset; thus, shows that our defensive model is much more robust than the previous target classifier.
{"title":"Adversarial Attack and Defense on Graph-based IoT Botnet Detection Approach","authors":"Quoc-Dung Ngo, Huy-Trung Nguyen, Viet-Dung Nguyen, C. Dinh, Anh-Tu Phung, Quy-Tung Bui","doi":"10.1109/ICECCE52056.2021.9514255","DOIUrl":"https://doi.org/10.1109/ICECCE52056.2021.9514255","url":null,"abstract":"To reduce the risk of botnet malware, methods of detecting botnet malware using machine learning have received enormous attention in recent years. Most of the traditional methods are based on supervised learning that relies on static features with defined labels. However, recent studies show that supervised machine learning-based IoT malware botnet models are more vulnerable to intentional attacks, known as an adversarial attack. In this paper, we study the adversarial attack on PSI-graph based researches. To perform the efficient attack, we proposed a reinforcement learning based method with a trained target classifier to modify the structures of PSI-graphs. We show that PSI-graphs are vulnerable to such attack. We also discuss about defense method which uses adversarial training to train a defensive model. Experiment result achieves 94.1% accuracy on the adversarial dataset; thus, shows that our defensive model is much more robust than the previous target classifier.","PeriodicalId":302947,"journal":{"name":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"22 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123449608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-12DOI: 10.1109/ICECCE52056.2021.9514158
S. V. Fernandes, T. R. Chaves, M. A. Martins, R. O. Brandão, A. F. Macedo, K. Martins
The development of new technologies linked to Smart Grid has led to a series of technological advances in the area of power systems. The IEC 61850, since its advent in 2002, has revolutionized projects and operations in substations, bringing several improvements, such as the use of high speed and high availability data communication networks. With this, it has been possible to readjust and modernize the protection systems found in a substation. In this perspective, this article proposes the development and implementation of a substation protection architecture different from those already registered, reducing the amount of IEDs used and finding a technological-financial balance. This new architecture can be used as a model for the digitalization and improvement of other substations. This study is part of the scope of the Urban Futurability R&D project, carried out by ENEL Distribuição São Paulo, located in the Vila Olímpia neighborhood, a region with very favorable characteristics to carry out this type of study because of its different types of grids, from overhead grids with medium load density to underground grids with high load density.
智能电网相关新技术的发展带动了电力系统领域的一系列技术进步。IEC 61850自2002年问世以来,已经彻底改变了变电站的项目和操作,带来了一些改进,例如使用高速和高可用性数据通信网络。有了这个,就有可能重新调整和现代化变电站中的保护系统。从这个角度来看,本文建议开发和实施一种不同于已注册的变电站保护架构,减少简易爆炸装置的使用数量,并找到技术与财务的平衡。这种新的结构可以作为其他变电站数字化改造的样板。这项研究是城市未来能力研发项目的一部分,由ENEL distribui o s o Paulo开展,该项目位于Vila Olímpia社区,该地区具有非常有利的特征,因为它具有不同类型的电网,从中等负荷密度的架空电网到高负荷密度的地下电网。
{"title":"Study of the Primary Substation Digitalization","authors":"S. V. Fernandes, T. R. Chaves, M. A. Martins, R. O. Brandão, A. F. Macedo, K. Martins","doi":"10.1109/ICECCE52056.2021.9514158","DOIUrl":"https://doi.org/10.1109/ICECCE52056.2021.9514158","url":null,"abstract":"The development of new technologies linked to Smart Grid has led to a series of technological advances in the area of power systems. The IEC 61850, since its advent in 2002, has revolutionized projects and operations in substations, bringing several improvements, such as the use of high speed and high availability data communication networks. With this, it has been possible to readjust and modernize the protection systems found in a substation. In this perspective, this article proposes the development and implementation of a substation protection architecture different from those already registered, reducing the amount of IEDs used and finding a technological-financial balance. This new architecture can be used as a model for the digitalization and improvement of other substations. This study is part of the scope of the Urban Futurability R&D project, carried out by ENEL Distribuição São Paulo, located in the Vila Olímpia neighborhood, a region with very favorable characteristics to carry out this type of study because of its different types of grids, from overhead grids with medium load density to underground grids with high load density.","PeriodicalId":302947,"journal":{"name":"2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"158 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}