Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3674225.3674244acmotherconferencesArticle/Chapter ViewAbstractPublication PagespeaiConference Proceedingsconference-collections
research-article

Research and application of methods to prevent external force damage to underground cables based on the IoT

Published: 31 July 2024 Publication History

Abstract

As cities expand, transitioning various cable types from overhead lines to underground channels is crucial for the stability of the power grid. Underground cables offer high reliability but face threats from external forces, contributing significantly to faults and jeopardizing normal power supply and public safety. This paper addresses the issue of enhancing prevention and control of external damage to urban underground power cables. It investigates an Internet of Things-based method for preventing external damage to underground cables, establishes a monitoring process for preventing external damage to underground cables based on edge computing of vibration sensor data, develops smart markers to prevent external damage, verifies the effectiveness and timeliness of preventing external damage through on-site pilot applications, implements early warning systems for preventing external damage to underground cables, ensures the operational safety of cables, and provides theoretical and practical support for future initiatives by power grid companies to develop intelligent systems for preventing external damage to cables.

References

[1]
Fire fighting and rescue in underground cable pipe network[J]. Lu Zhonghua. Fire Protection Industry (Electronic Edition), 2022 (07)
[2]
Design of underground cable detection circuit based on electromagnetic method [J]. Xiong Zhiwen; Mo Shenghan. Electronic Production, 2021 (21)
[3]
Research on data structure of underground cable lean management [J]. Wang Cheng. Science and Technology Innovation, 2020 (02)
[4]
Research and design of urban underground cable path detection system [J]. Li Yingqiao; Wang Xuedong; Xu Qinglong; Wang Fei. Electrical Technology, 2020 (08)
[5]
Research and application of key technologies for lean management of underground cables based on big data [J]. Yang Binbin; Fan Haibo; Liang Lei. Electric Power Big Data, 2019 (12)
[6]
Application exploration of intelligent robot inspection in power system [J]. Zhang Shengfu; Zhu Jie. Internal Combustion Engine and Accessories, 2017 (07)
[7]
Fuzzy comprehensive analysis of safety risks of urban underground cable facilities [J]. Chu Xiaojie; Yang Taihua. Energy and Environment, 2013 (06)
[8]
Research and application of refined management platform for underground cables and channels [J]. Liu Tongxu; Gong Shibao; Chen Yegang. Electronic Technology and Software Engineering, 2015 (23)
[9]
Visualized comprehensive management of urban underground cables [J]. Lei Zhenjiang; Su Kun; Wang Pengyu; Zhang Wenguo; Liu Kun; Zhao Xiaofeng. Electrical Applications, 2015 (S1)
[10]
Design and application prospects of underground cable information standardized management model [J]. Gao Ming; Zhou Rencai; He Xianhua. Zhejiang Electric Power, 2012 (05)
[11]
A MENDEZ, TF MERSE and F MENDEZ, "Application of embedded optical Fiber Sensors in reinforce concrete buildings and structures [J]", Proc. Of SPIE, vol. 1171, pp. 60-69, 1989.
[12]
P F Felzenszwalb, R B Girshick, D Mcallester, "Object Detection Discriminatively Trained Part-Based Models[J]", IEEE Transactions on Pattern Analysis & Machine Intelligence, vol. 32, no. 9, pp. 1627-45, 2010.
[13]
R Poppe, "Vision-based human motion analysis: An overview[J]", Computer Vision & Image Understanding, vol. 108, no. 1-2, pp. 4-18, 2007.
[14]
J Redmon, S Divvala, R Girshick, "You Only Look Once: Unified", Real-Time Object Detection[J], pp. 779-788, 2015.
[15]
J Redmon and A Farhadi, "YOLOv3: An Incremental Improvement[J]", 2018.
[16]
S. Ren, K. He, R. B. Girshick, X. Zhang and J. Sun, "Object detection networks on convolutional feature maps", CoRR, vol. abs/1504.06066, pp. 3-7, 2015.
[17]
Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, "ImageNet Large Scale Visual Recognition Challenge", International Journal of Computer Vision (IJCV), pp. 3, 2015.
[18]
Markovchick-Nicholls, H.M. Regan, D.H. Deutschman, A. Widyanata, B. Martin, L. Noreke, "Re-lationships between human disturbance and wildlife land use in urban habitat fragments", Conservation Biology, vol. 22, pp. 99-109, January 2008.
[19]
William A. Link, John R. Sauer and Daniel K. Niven, "Combining breeding bird survey and christmas bird count data to evaluate seasonal components of population change in northern bobwhite", Journal of Wildlife Management, vol. 72, pp. 44-51, January 2008.
[20]
Jon Young and Tiffany Morgan, Animal Tracking Basics, Stackpole Books, 2007.
[21]
Ian A.R. Hulbert and John French, "The accuracy of gps for wildlife telemetry and habitat mapping", Journal of Applied Ecology, vol. 38, pp. 869-878, August 2001.
[22]
I.F. Akyildiz, Y. Sankarasubramaniam, W. Su and E. Cayirci, "Wireless sensor networks: a survey", Computer Networks, vol. 38, pp. 393-422, March 2002.
[23]
H. Gharavi and K. Ban, "Vision-based ad-hoc sensor networks for tactical operations", World Wireless Congress 3G Wireless 2002, 2002.
[24]
Ren Xiaobo, Tony X. Han and Zhihai He, "Ensemble video object cut in highly dynamic scenes", 2013 IEEE Conference on Computer Vision and Pattern Recognition, vol. 0, pp. 1947-1954, 2013.
[25]
David M. Blei, Andrew Y. Ng and Michael I. Jordan, "Latent dirichlet allocation", J. Mach. Learn. Res., vol. 3, pp. 993-1022, Mar. 2003.
[26]
Fei-Fei Li and Pietro Perona, "A bayesian hierarchical model for learning natural scene categories", Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR05) – Volume 2 – Volume 02, pp. 524-531, 2005.
[27]
Yann Lecun, Lon Bottou, Yoshua Bengio and Patrick Haffner, "Gradient-based learning applied to document recognition", Proceedings of the IEEE, pp. 2278-2324, 1998.
[28]
Clement Farabet, Camille Couprie, Laurent Najman and Yann LeCun, "Learning hierarchical features for scene labeling", IEEE Transactions on Pattern Analysis and Machine Intelli-gence, vol. 35, no. 8, pp. 1915-1929, 2013.
[29]
Antoine Bordes, Xavier Glorot, Jason Weston and Yoshua Bengio, "Joint learning of words and meaning representations for open-text semantic parsing", AISTATS, pp. 127-135, 2012.
[30]
Socher Richard, Eric H. Huang, Pennington Jeffrey, Andrew Y. Ng and Christopher D. Manning, "Dynamic pooling and unfolding recursive autoencoders for paraphrase detection", NIPS, pp. 801-809, 2011.
[31]
Dong Yu, Li Deng and Frank Seide, "The deep tensor neural network with applications to large vocabulary speech recognition", IEEE Transactions on Audio Speech Language Processing, vol. 21, no. 2, pp. 388-396, 2013.
[32]
Alex Krizhevsky, Ilya Sutskever and Geoff Hinton, "Ima-genet classification with deep convolutional neural networks" in Advances in Neural Information Processing Systems 25, pp. 1106-1114, 2012.
[33]
M. Z. Afzal, J. Pastor-Pellicer, F. Shafait, T. M. Breuel, A. Dengel and M. Liwicki, "Document image binarization using Istm: A sequence learning approach", Proceedings of the 3rd International Workshop on Historical Document Imaging and Processing, pp. 79-84, 2015.
[34]
J. Pastor-Pellicer, S. España-Boquera, F. Zamora-Martínez, M. Z. Afzal and M. J. Castro-Bleda, "Insights on the use of convolutional neural networks for document image binarization", International Work-Conference on Artificial Neural Networks, pp. 115-126, 2015.
[35]
K. Simonyan and A. Zisserman, "Very deep convolutional networks for large-scale image recognition", vol. 2, pp. 5, 2014.

Index Terms

  1. Research and application of methods to prevent external force damage to underground cables based on the IoT

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    PEAI '24: Proceedings of the 2024 International Conference on Power Electronics and Artificial Intelligence
    January 2024
    969 pages
    ISBN:9798400716638
    DOI:10.1145/3674225
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 31 July 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    PEAI 2024

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 10
      Total Downloads
    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)10
    Reflects downloads up to 26 Sep 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media