• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 118
  • 92
  • 79
  • 27
  • 14
  • 9
  • 8
  • 4
  • 4
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 381
  • 190
  • 105
  • 89
  • 82
  • 82
  • 78
  • 49
  • 47
  • 45
  • 44
  • 44
  • 41
  • 41
  • 39
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Tool support for software process assessments

Lok, Richard Him 14 October 2008 (has links)
Thesis Abstract Software process assessments are currently being conducted by organisations using de facto assessment standards such as ISO/IEC 15504, ISO 9001, CMM and BOOTSTRAP. These assessment standards require practical tools and support mechanisms to enable them to be effective and efficient in their execution. This thesis is a study of the functional composition of such automated tools and investigates the viability of creating mappings between the software process models that would allow the assessment data to be translated between models. The result is a model for creating automated assessment tools and a methodology for using data mappings to translate and compare assessment data between software process models in these assessment tools.
12

Segurança cibernética com hardware reconfigurável em subestações de energia elétrica utilizando o padrão IEC 61850 / Cyber security with reconfigurable hardware in power substations using the IEC 61850 standard

Miranda, Juliano Coêlho 20 September 2016 (has links)
Com a tecnologia digital, as redes de comunicação têm sido de fundamental importância para o bom funcionamento das subestações de energia elétrica. Criado em 2002, o padrão IEC 61850 busca harmonizar a diversidade de equipamentos e fabricantes, e possibilitar a integração de dados para que o máximo de benefícios possa ser extraído. Nesse contexto, o protocolo GOOSE (Generic Object Oriented Substation Event), pertinente ao padrão IEC 61850, é um datagrama multicast concebido para funcionar na rede local ou de longa distância que interliga as subestações de energia elétrica. Nos ambientes de longa distância, o tráfego de dentro para fora, e vice-versa, deveria passar por um firewall. Porém, a tecnologia de firewall atual não é capaz de inspecionar as mensagens GOOSE reais ou originadas a partir de um ataque, e afeta o tempo de transferência das mesmas, que, no enlace de comunicação, não deve exceder 5ms. Dessa forma, o objetivo deste trabalho é desenvolver um firewall em hardware reconfigurável, por meio da plataforma NetFPGA, de modo que o incremento no tempo de propagação de uma mensagem GOOSE, Tipo 1A (Trip), ao transpor o dispositivo de segurança, não ultrapasse 20% do tempo total destinado ao enlace de comunicação. Por ter a capacidade de ser um acelerador, construído por meio de hardware reconfigurável FPGA (Field Programmable Gate Array), a NetFPGA conduz enlaces Gigabit, e torna possível examinar e estabelecer regras iniciais de autorização ou negação para o tráfego de mensagens GOOSE, manipulando os campos do quadro ISO/IEC 8802-3. O incremento no tempo máximo de propagação de uma mensagem com 1518 bytes foi de 77,39 μs, com 77,38 μs de tempo médio. Um algoritmo de criptografia e outro de autenticação também foram testados e mensagens falsas não conseguiram transpor o firewall. No momento atual da pesquisa, concluiu-se que o firewall em NetFPGA, pertinente ao conjunto de recursos de hardware e software destinados a garantir a segurança de uma rede, é capaz de rejeitar mensagens GOOSE falsas e fornecer segurança aos dispositivos ativos de uma subestação, sem atrasos adicionais superiores a 1ms. / With the digital technology, the communication networks have been of fundamental importance for the good performance of power substations. Created in 2002, the IEC 61850 standard seeks for harmonization of the different equipment and manufacturers, enabling the integration of data for maximum performance. In this context, the GOOSE (Generic Object Oriented Substation Event) message, concerning the IEC 61850 standard, is a multicast datagram, designed to operate in LAN or WAN that connects power substations. In the long-distance environment, the propagation time in the communication link must not exceed 5ms. The current firewall technology is not able to differ true GOOSE messages from the ones originated from an attack, and it affects the transfer time of messages. The objective of this research is to develop a reconfigurable firewall hardware, using the NetFPGA platform, so that the increase in propagation time of a GOOSE message, Type 1A (Trip), does not exceed 20% of the total time allocated to the link communication. Due to the ability of NetFPGA of being an accelerator, and having been built by using reconfigurable FPGA (Field Programmable Gate Array) leading to Gigabit links, it was possible to examine and establish initial rules of authorization or denial of GOOSE messages by manipulating some of the fields from the table ISO/IEC 8802-3. The increase in the maximum propagation time of a message of 1518 bytes was 77.39 μs, with the average of 77.38 μs. Fake messages failed to cross the firewall. Results from a process of authentication and encryption were also presented. At the present study, it has been concluded that the firewall using NetFPGA, concerning the hardware and software in order to ensure the security of a network, is able to reject false GOOSE messages and provide security to devices of a power substation without time increments greater than 1ms.
13

Segurança cibernética com hardware reconfigurável em subestações de energia elétrica utilizando o padrão IEC 61850 / Cyber security with reconfigurable hardware in power substations using the IEC 61850 standard

Juliano Coêlho Miranda 20 September 2016 (has links)
Com a tecnologia digital, as redes de comunicação têm sido de fundamental importância para o bom funcionamento das subestações de energia elétrica. Criado em 2002, o padrão IEC 61850 busca harmonizar a diversidade de equipamentos e fabricantes, e possibilitar a integração de dados para que o máximo de benefícios possa ser extraído. Nesse contexto, o protocolo GOOSE (Generic Object Oriented Substation Event), pertinente ao padrão IEC 61850, é um datagrama multicast concebido para funcionar na rede local ou de longa distância que interliga as subestações de energia elétrica. Nos ambientes de longa distância, o tráfego de dentro para fora, e vice-versa, deveria passar por um firewall. Porém, a tecnologia de firewall atual não é capaz de inspecionar as mensagens GOOSE reais ou originadas a partir de um ataque, e afeta o tempo de transferência das mesmas, que, no enlace de comunicação, não deve exceder 5ms. Dessa forma, o objetivo deste trabalho é desenvolver um firewall em hardware reconfigurável, por meio da plataforma NetFPGA, de modo que o incremento no tempo de propagação de uma mensagem GOOSE, Tipo 1A (Trip), ao transpor o dispositivo de segurança, não ultrapasse 20% do tempo total destinado ao enlace de comunicação. Por ter a capacidade de ser um acelerador, construído por meio de hardware reconfigurável FPGA (Field Programmable Gate Array), a NetFPGA conduz enlaces Gigabit, e torna possível examinar e estabelecer regras iniciais de autorização ou negação para o tráfego de mensagens GOOSE, manipulando os campos do quadro ISO/IEC 8802-3. O incremento no tempo máximo de propagação de uma mensagem com 1518 bytes foi de 77,39 μs, com 77,38 μs de tempo médio. Um algoritmo de criptografia e outro de autenticação também foram testados e mensagens falsas não conseguiram transpor o firewall. No momento atual da pesquisa, concluiu-se que o firewall em NetFPGA, pertinente ao conjunto de recursos de hardware e software destinados a garantir a segurança de uma rede, é capaz de rejeitar mensagens GOOSE falsas e fornecer segurança aos dispositivos ativos de uma subestação, sem atrasos adicionais superiores a 1ms. / With the digital technology, the communication networks have been of fundamental importance for the good performance of power substations. Created in 2002, the IEC 61850 standard seeks for harmonization of the different equipment and manufacturers, enabling the integration of data for maximum performance. In this context, the GOOSE (Generic Object Oriented Substation Event) message, concerning the IEC 61850 standard, is a multicast datagram, designed to operate in LAN or WAN that connects power substations. In the long-distance environment, the propagation time in the communication link must not exceed 5ms. The current firewall technology is not able to differ true GOOSE messages from the ones originated from an attack, and it affects the transfer time of messages. The objective of this research is to develop a reconfigurable firewall hardware, using the NetFPGA platform, so that the increase in propagation time of a GOOSE message, Type 1A (Trip), does not exceed 20% of the total time allocated to the link communication. Due to the ability of NetFPGA of being an accelerator, and having been built by using reconfigurable FPGA (Field Programmable Gate Array) leading to Gigabit links, it was possible to examine and establish initial rules of authorization or denial of GOOSE messages by manipulating some of the fields from the table ISO/IEC 8802-3. The increase in the maximum propagation time of a message of 1518 bytes was 77.39 μs, with the average of 77.38 μs. Fake messages failed to cross the firewall. Results from a process of authentication and encryption were also presented. At the present study, it has been concluded that the firewall using NetFPGA, concerning the hardware and software in order to ensure the security of a network, is able to reject false GOOSE messages and provide security to devices of a power substation without time increments greater than 1ms.
14

Proposta de critério para avaliação de softwares de questionários eletrônicos, com base nas normas ABNT NBR ISO/IEC 9126 e 14598

Alquimim, Hebert Bratefixe 19 June 2013 (has links)
Made available in DSpace on 2016-04-29T14:23:20Z (GMT). No. of bitstreams: 1 Hebert Bratefixe Alquimim.pdf: 2664407 bytes, checksum: 77eb81380d89e7688a502253778a5265 (MD5) Previous issue date: 2013-06-19 / Within the advent of Internet and its popularization, several Software that allow the creation of electronic questionnaire for a focus on evaluation of educational process in learning, appear as an alternative to the teacher, even if the course is taught in presence meeting, allowing a differentiated evaluation. This research has as aim to describe a methodology for evaluating electronic questionnaire son the Web, using as basis the standard ISO /IEC 9126, which specifies the quality of Software products and the standard ISO /IEC 14598 which describes the evaluation process of the Software product. To perform the evaluation, Webapps were identified for building electronic questionnaires that comply with the criteria established and at the end, the evaluation will have their data analyzed and compared according to the quality of Software / Com o advento e a popularização da Internet, diversos Softwares que permitem a criação de questionários eletrônicos como foco na avaliação de ensino aparecem como uma alternativa para o docente, mesmo que a disciplina lecionada seja presencial, permitindo assim uma forma diferenciada de avaliação. Este trabalho tem por objetivo descrever uma proposta de critério para avaliação de questionários eletrônicos na Web, utilizando como base a norma ABNT NBR ISO/IEC 9126, que especifica as qualidades de produtos de Software e, a norma ABNT NBR ISO/IEC 14598 que descreve o processo de avaliação de produto de Software. Para a realização da avaliação foram identificados Webapps para construção de questionários eletrônicos que estejam de acordo com o critério estabelecido e ao final, terão seus dados analisados e comparados de acordo com as características de qualidade de Software
15

The Islamic education curriculum in Kuwaiti secondary schools

Al Azemi, Fahad Khalaf al-lamia January 2000 (has links)
This investigation was designed to research the Islamic education curriculum (I. E. C.) for secondary schools in Kuwait. The investigation covered the major elements of the Islamic education curriculum, namely the aims, the textbooks, teaching methods, aids and activities and the styles of assessment. The methods which were used to collect the data for this research were the questionnaire and the interview. The research population included: teachers of the I. E. C., supervisors, students of the 10th grade secondary schools. The findings indicated that in theory the I. E. C.’s aims seem to be comprehensive, covering all the aspects of student development. But, unfortunately, there were no real applications for all those aims in the practical teaching of the I. E. C., whether one examined the textbook, teaching methods, or styles of assessment. The topics of the textbook generally focused on the theoretical aspects of the I. E. C. and some of those topics were repetitive. Teaching methods were traditional and focused on telling by the teacher, with a lack of modern teaching methods to encourage the student to take an active role in the learning process. In addition, there was a clear lack of modern educational aids like audio visual equipment. Finally, the style of assessment was traditional aimed at measuring the students' knowledge, without paying attention to measuring other aspects of student achievement. This thesis is divided into eight chapters. Chapter One, outlines the general approach for studying problems related to the Islamic education curriculum in Kuwaiti secondary schools. There are clear weaknesses in the Islamic education curriculum in secondary schools. One of the most important is the absence of any explanation of the way in which the I. E. C. deals with the negative changes that are taken place in Kuwaiti society after the Iraqi aggression in 1990 and this is the main focus of the chapter. In Chapter Two, the educational system in Kuwait is discussed in detail from Al-katatib to the modern schools. The aims of each stage of the Kuwaiti educational system are also discussed. Chapter Three examines the background of the Islamic education in general and its sources, examining in particular what is the general aim of Islamic education and how this relates to the Kuwaiti context. Chapter Four, identifies previous studies of the curriculum in general. It examines definitions of the curriculum in general, the aims and their classification, the content of the textbook, the types of teaching methods and their importance in the learning teaching process and finally the style of assessments and their role in the learning process. This material is then related to the learning process in Kuwait and particularly its connections to the I. E. C. In the second section of this chapter previous studies which evaluated the Islamic education curriculum in Kuwaiti schools (especially the I. E. C.’s role in confronting the negative changes taken place in the Kuwait society) are examined. Chapter Five critically discusses the methodology, which was used in this research. Chapter Six examines the statistical result of the research. Chapter Seven then discusses and analyses the research findings. Chapter Eight ends the thesis with make a series of recommendations and conclusions based on the research findings.
16

Υπολογισμός επικίνδυνων τάσεων επαφής λόγω πλήγματος κεραυνού σε κατασκευή (πρότυπο IEC 62305)

Μηλιώνη, Ευσταθία 27 December 2010 (has links)
Σκοπός της παρούσας διπλωματικής εργασίας είναι ο υπολογισμός των επικίνδυνων τάσεων επαφής σε μια κατασκευή μετά από πλήγμα κεραυνού και των αντίστοιχων συνιστωσών κινδύνου σύμφωνα με το πρότυπο IEC 62305. Στο πρώτο κεφάλαιο γίνεται μια σύντομη αλλά απαραίτητη θεωρητική ανάλυση του φαινομένου του κεραυνού. Δίνονται επίσης κάποια στοιχεία για την επίδραση του ηλεκτρικού ρεύματος στον άνθρωπο για να φανεί η σπουδαιότητα της αντικεραυνικής προστασίας. Περιγράφονται οι βασικές αρχές της αντικεραυνικής προστασίας και οι στάθμες των συστημάτων αντικεραυνικής προστασίας. Στη συνέχεια αναλύονται οι διάφορες περιπτώσεις ανάπτυξης επικίνδυνων τάσεων επαφής σε μια κατασκευή και οι μέθοδοι προστασίας που επιβάλλονται από τα διεθνή πρότυπα για την προστασία των ατόμων. Οι πιθανές συνέπειες των τάσεων επαφής και οι απώλειες που μπορεί ανά προκαλέσουν αναλύονται στο επόμενο κεφάλαιο. Στο δεύτερο κεφάλαιο αναλύεται σύντομα το πρότυπο IEC 62305 ,το οποίο εισάγει την έννοια των συνιστωσών κινδύνου σαν εργαλείο για τη μελέτη αναγκαιότητας συστήματος αντικεραυνικής προστασίας για μια κατασκευή. Το πρότυπο ορίζει τέσσερις πηγές βλαβών , τρεις τύπους βλαβών και τέσσερις κατηγορίες απωλειών. Σύμφωνα με αυτούς τους ορισμούς εκφράζει όλους τους πιθανούς κινδύνους σε μια κατασκευή λόγω πλήγματος κεραυνού με συνιστώσες κινδύνου. Κάθε συνιστώσα εκφράζεται ως γινόμενο των επικίνδυνων συμβάντων ετησίως επί την πιθανότητα βλάβης επί την επακόλουθη απώλεια. Οι όροι αυτής της εξίσωσης αναλύονται διεξοδικά για όλες τις συνιστώσες κινδύνου. Επίσης δίνονται οι αλγόριθμοι λήψης αποφάσεων για την εγκατάσταση συστήματος αντικεραυνικής προστασίας και την αξιολόγηση κόστους-αποτελεσματικότητας. Για να γίνει αυτό εκτός από το συνολικό κίνδυνο ορίζεται, σύμφωνα πάντα με το πρότυπο IEC 62305,ο αποδεκτός κίνδυνος για κάθε κατασκευή. Εκτός από τη θεωρητική διερεύνηση και τη μελέτη του προτύπου αναπτύχθηκε λογισμικό αξιολόγησης επικινδυνότητας (Risk Assessment Manager).Το πρόγραμμα υλοποιήθηκε στο Visual Studio 2008 με τη γλώσσα προγραμματισμού Visual Basic 2008, μια απ’ τις πιο δημοφιλείς γλώσσες καθοδηγούμενες από συμβάντα(event driven). Η γλώσσα αυτή επέτρεψε το σχεδιασμό ενός γραφικού περιβάλλοντος φιλικού προς το μηχανικό, ο οποίος δε χρειάζεται να είναι εξοικειωμένος με πρότυπο. Αρκεί να εισάγει τα βασικά χαρακτηριστικά της κατασκευής και στη συνέχεια να επιλέξει από λίστα επιλογών τις ρυθμίσεις που ταιριάζουν σε κάθε κατασκευή. Το πρόγραμμα δίνει επίσης τη δυνατότητα στο μηχανικός να χωρίσει την κατασκευή σε ζώνες να αποθηκεύσει και να αναζητήσει προηγούμενες μελέτες. Στο τρίτο κεφάλαιο αναλύεται ο τρόπος εισαγωγής των δεδομένων και η παρουσίαση των αποτελεσμάτων μέσω εικόνων(screenshots).Δίνεται επίσης παράδειγμα αξιολόγησης κινδύνου για κτίριο γραφείων με τρεις ζώνες(χώρος γραφείων), χώρος διακομιστών (servers) και στάθμευσης. Αρχικά γίνεται μελέτη της κατασκευής χωρίς αντικεραυνική προστασία και στη συνέχεια εφαρμόζονται συνδυασμοί μέτρων αντικεραυνικής προστασίας. Φαίνονται έτσι οι δυνατότητες που δίνει το πρόγραμμα για εύκολο υπολογισμό των συνιστωσών κινδύνου με ρύθμιση διαφόρων παραμέτρων. Στο τελευταίο κεφάλαιο παρουσιάζονται τα συμπεράσματα που προέκυψαν από αυτή τη διπλωματική εργασία και προτείνονται βελτιώσεις που θα μπορούσε να περιλαμβάνει η δεύτερη έκδοση του προγράμματος. Στο Παράρτημα δίνεται ο κώδικας του προγράμματος. Αποτελείται από τον κώδικα για τα 3 παράθυρα της εφαρμογής και για τις 3 μονάδες(module) οι οποίες περιλαμβάνουν τις απαραίτητες για την εφαρμογή συναρτήσεις. / The subject of this essay is the calculation of hazardous touch voltages inside a structure after a lightning strike according to international standard IEC 62305. First chapter is a brief but essential theoretical approach on the lightning phenomenon. The effects of electrical current to human bodies are also briefly analyzed in order to point out the importance of lightning protection. The fundamentals of lightning protection are stated, as well as the level of it as defined from the international standards. At the end of the first chapter the various scenarios of the development of touch voltages in a structure after a lightning strike are developed. The possible consequences and losses of these voltages are discussed in the next chapter. The second chapter is a thorough study of the international standard IEC 62305 and introduces the risk assessment method and the calculation of risk components for structures. The standard defines four (4) possible sources of damage, three (3) possible types of damage and 4 possible types of losses. Based on this categorization all risk components can be expressed. Each risk component can be expressed as a product of the number of annual dangerous event, of the probability of damage of a structure and of the consequent loss. The terms of this equation are thoroughly explained and calculated as well as the procedures for evaluating the need of a lightning protection system and the cost-effectiveness of the protection measures. For this study to be complete the tolerable risk for each type of loss is introduced. Along with the writing of this essay a computer program (Risk Assessment Manager) was developed. The program calculates the risk to a structure due to a lightning strike according to IEC 62305 and was written in Visual Basic 2008, one of the most popular event-driven program languages. The use of Visual Basic 2008 permitted the development of a utility friendly to users not familiar with the standard IEC 62305.The user has to insert the basic attributes of the structure and then choose from a variety of advanced characteristics of the structure. The program also allows the division of the structure to more than one zone, to save and load older studies. At the third chapter the way the program works is examined with the use of screenshots. A case study of a three zone structure (offices, server’s room and parking) is presented. Initially the risks of the structure without lightning protection are calculated and then different types of measures are applied. In the last chapter results are examined and conclusions are extracted and presented. Further optimizations on the code are discussed leading to possible, future software’s improvement. The code of the program consisting of 3 Window’s Forms and 3 modules including various functions is appended in the annex of the thesis.
17

Zavádění bezpečnostních opatření dle ISMS do malé společnosti / Small Company Security Measures Implementation According to ISMS

Kohoutek, Josef January 2016 (has links)
In my master´s thesis I focus on the design of information security management system for the company INNC s.r.o., which specializes in the design and implementation of computer networks. The thesis is divided into two parts. The first part provides theoretical knowledge of the issue. Second part is the analysis and proposal of security measures.
18

Analys av standarden IEC 61850 för styrning av elkraftsystem / Analysis of the standard IEC 61850 for control of electrical power system

Rigi, Aref, Jura, Bahnam January 2019 (has links)
På uppdrag av Trafikverket har denna rapport syftet att ge en rekommendation baserat på jämförelse av nuvarande standarden IEC 60870-5-104 och den alternativa standarden IEC 61850. Studien jämför IEC 61850 och IEC 60870-5-104 och skillnader mellan dessa två standarder utifrån olika områden som kommunikation, säkerhet samt ekonomiska aspekter. I arbetets teoridel behandlas elnätet och hur elstationer i allmänhet fungerar utifrån kommunikationsprotokollen och hur systemen kommunicerar med andra enheter. Resultatet av arbetet visar att standarden IEC 61850 erbjuder stora möjligheter och fördelar i samtliga aspekter, och har även en utvecklingspotential. Med kommunikationsprotokollet IEC 61850 erhålls mer information i form av feltyp, direkta mätningar och styrning på kontrollanläggningar. Dock finns det en komplexitet i IEC 61850 som kan kräva större anpassningar för att ersätta tidigare protokoll på anläggningar vid byte. Utifrån säkerhetsaspekten uppvisar IEC 61850 styrka bland annat gällande skydd av integritet och konfidentialitet. Sammantaget visar arbetet att det finns stor fördel att använda sig av IEC 61850 vid framtida tillämpningar utifrån examensarbetets resultat / On behalf of the Swedish Transport Administration (Trafikverket), this report aims to provide a recommendation based on a comparison of the current communication protocol standard IEC 60870-5-104 and the alternative standard IEC 61850. This study compares IEC 61850 and IEC 60870-5-104 and differences between these two standards based on different areas such as communication, security and economic aspects. In the theoretical part of this thesis, the electricity grid is treated and how electricity stations generally work based on the communication protocols and how the systems communicate with other devices. The result of the thesis shows that the standard IEC 61850 offers great opportunities and advantages in all aspects and has a potential for development. With the communication protocol IEC 61850, more information is obtained in form of error type, direct measurements and control at control plants. However, there is a complexity in IEC 61850 which may require major adaptations to replace previous protocols on plants when changes are needed. Based on the safety aspect, IEC 61850 shows strength among other things regarding protection of privacy and confidentiality. Overall, the work shows that there is a great advantage of applying IEC 61850 in future use based on this thesis results.
19

Implementering och riskhantering vid införande av IEC 62353 för testning av medicinteknisk utrustning / Implementation and Risk Management upon Introduction of IEC 62353for Testing Medical Equipment

Fayazi, Leo, Alagha, Ali January 2022 (has links)
IEC 60601 elsäkerhetstest används fortfarande på många medicintekniskaavdelningar på sjukhus för testning av utrustning i samband med ankomstkontrolloch reparation. Denna rapport utreder möjligheten att ta fram ett underlag för attbörja implementera IEC 62353 som elsäkerhetsteststandard istället för IEC 60601.Studien fokuserar på huruvida Karolinska Universitetssjukhuset bör tillämpa IEC62353 som sin elsäkerhetsteststandard. Vidare diskuteras även skillnaderna mellande två ovanstående standarderna. Detta görs genom att ta reda på hur KarolinskaUniversitetssjukhuset ställer sig i frågan och informationsinsamling, samt hur IEC62353 standarden tillämpas i industrin.Den information som framställs i resultatet efter kontakt med flera sjukhus visar tvåolika aspekter. Den ena är självständig tillämpning av IEC 62353 som enelsäkerhetsteststandard, den andra är att följa tillverkarens instruktioner. Framtidastudier som kan ge tydligare vägledning ur tillverkarens synvinkel föreslås. / IEC 60601 electrical safety tests are still used in many medical engineeringdepartments in hospitals for testing equipment in connection with arrival controland repair. This report investigates the possibility of producing a basis for starting toimplement IEC 62353 as an electrical safety test standard instead of IEC 60601.The study focuses on whether Karolinska University Hospital should apply IEC62353 as its electrical safety test standard. Furthermore, the differences between thetwo above standards are discussed. This is done by finding out how the KarolinskaUniversity Hospital responds to the question and the collection of information, aswell as how the IEC 62353 standard is applied in industry.The information presented in the results after contact with several hospitals showstwo different aspects. One is an independent application of IEC 62353 as an electricalsafety test standard, the other is to follow the manufacturer's instructions. Futurestudies that can provide clearer guidance from the manufacturer's point of view arerecommended.
20

Análise de problemas ligados às comunicações em redes elétricas inteligentes. / Analysis of communication issues related to smart grids.

Petenel, Fernando Henrique Jacyntho 06 December 2013 (has links)
Este estudo é uma análise de interfaces e protocolos de automação que possuem potencial para serem adotados como padrões em redes elétricas inteligentes em um futuro próximo. A fim de verificar a possibilidade de implementar a IEC 61850 em uma aplicação típica de redes deste tipo, é realizada uma simulação usando o software NS-2. Os resultados deste trabalho servirão de orientação para o dimensionamento de redes de automação baseadas em IEC 61850. / This study is an analysis of automation interfaces and protocols with the potential to be adopted as standards for smart grids in the near future. In order to verify the feasibility of implementing the IEC 61850 in a typical application of such grids, it is performed a simulation using NS-2 software. The results of this work will be an orientation to dimension automation networks based on IEC 61850.

Page generated in 0.0433 seconds