• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 118
  • 92
  • 83
  • 28
  • 14
  • 9
  • 8
  • 4
  • 4
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 387
  • 193
  • 107
  • 90
  • 84
  • 84
  • 81
  • 51
  • 47
  • 47
  • 44
  • 44
  • 42
  • 41
  • 39
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

An Electrical Mine Monitoring System Utilizing the IEC 61850 Standard

Mazur, David Christopher 14 November 2013 (has links)
Motor control assets are foundational elements in many industrial operations. In the mining industry, these assets primarily consist of motor control centers and drives, which are available with a comprehensive assortment of control and monitoring devices. Various intelligent electronic devices (IEDs) are now used to prevent machine damage and downtime. As motor control devices have advanced in technology, so too have the IEDs that protect them. These advances have resulted in new standards, such as IEC 61850, that have embedded intelligence and a standard set of communication schemes by which IEDs can share information in a peer-to-peer or one-to-many fashion. This dissertation investigated the steps involved in interfacing IEDs to a mining process control network via the use of the IEC 61850 standard. As a result of this study, several key technological advancements were made including the development of (i) vendor independent system to communicate with IEDs in a mining environment over IEC 61850, (ii) command and control methods for communication based assisted automation of IEDs for mining firms, (iii) effective solutions to incorporate electrical distribution data in the process control system, (iv) enhanced safety platforms through remote operation of IEDs, (v) standard visualization faceplate graphics for HMI operators with enhanced security, and (vi) new methods for time stamped dataflow to be correctly inserted into a process historian for 'true' Sequence of Events Records. / Ph. D.
192

An Engineering Methodology for the Formal Verification of Function Block Based Systems

Pang, Linna 11 1900 (has links)
Many industrial control systems use programmable logic controllers (PLCs) since they provide a highly reliable, off-the-shelf hardware platform. On the programming side, function blocks (FBs) are reusable PLC components that can be composed to implement the required system behaviour. A higher quality system may be realized if the FBs are pre-certified to be compliant with an international standard such as IEC 61131-3. Unfortunately, the set of programming notations defined in IEC 61131-3 lack well-defined formal semantics. As a result, tool vendors and users of PLCs may have inconsistent interpretations of the expected system behaviour. To address this issue, we propose an engineering method for formally verifying the conformance of candidate implementations of FBs (and their compositions) to their high-level, input-output requirements. The proposed method is sufficiently general to handle FBs supplied by IEC 61131-3, and industrial FB applications involving real-time requirements. Our method involves several steps. First, we use tabular expressions to ensure the completeness and disjointness of the requirements for the FB. Second, we formalize the candidate implementation(s) of the FB in question. Third, we state and prove theorems regarding the consistency and correctness of the FB. All three steps are performed using the Prototype Verification Systems (PVS) proof assistant. As a first case study, we apply our approach to the IEC 61131-3 standard to examine the entire library of FBs and their supplied implementations described in structured text (ST) and function block diagrams (FBDs). As a second case study, we apply our approach to two realistic sub-systems taken from the nuclear domain. Applying the proposed method, we identified three kinds of issues: ambiguous behavioural descriptions, missing assumptions, and erroneous implementations. Furthermore, we suggest solutions to these issues. / Thesis / Doctor of Philosophy (PhD) / A formal verification approach for the function block based control systems
193

Defining the Industrial Designer's Role in the ISO/IEC 62366 Standard

Alley, Krista I. January 2014 (has links)
No description available.
194

Modelo de aporte de valor de la implantación de un sistema de gestión de servicios de TI (SGSIT), basado en los requisitos de la norma ISO/IEC 20000

BAUSET CARBONELL, MARÍA DEL CARMEN 13 July 2012 (has links)
El presente trabajo de investigación tiene como objetivo analizar en qué medida una organización, al satisfacer los requisitos de la norma ISO/IEC 20000-1:2005 y obtener su certificación, aporta valor a la propia organización desde el punto de vista de la gestión de los servicios de TI. Esta tesis se ha desarrollado con el objetivo de proporcionar un modelo de referencia a cualquier organización, que necesite medir el aporte de valor de los servicios de tecnología de la organización. Los fundamentos de la investigación incluyen un análisis desde dos perspectivas claramente diferenciadas, es decir, un enfoque más tradicional orientado a definir instrumentos de medida de ayuda al autodiagnóstico en el campo de la creación de valor de la tecnología de la información, y otro enfoque más innovador relacionado con los marcos de trabajo de gestión de TI como ITIL, considerado como un estándar de �facto� aplicable a cualquier modelo empresarial, y la norma ISO/IEC 20000. El modelo ha permitido contrastar empíricamente los factores directos e indirectos que pueden estar relacionados con el aporte de valor de los servicios de TI, considerándose para ello factores tangibles e intangibles como la eficiencia en la provisión de los servicios de TI, soporte de la prestación de los servicios de TI, control sobre los servicios, eficiencia en la gestión de los proveedores y satisfacción de los clientes. Todo ello, se ha aplicado sobre los más de 90 servicios de TI de INDRA, consultora tecnológica de ámbito internacional, facilitando la aplicación de dicho modelo información estratégica para la dirección de sistemas internos de la organización, convirtiéndose en una herramienta de apoyo a la toma de decisiones. / Bauset Carbonell, MDC. (2012). Modelo de aporte de valor de la implantación de un sistema de gestión de servicios de TI (SGSIT), basado en los requisitos de la norma ISO/IEC 20000 [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/16546
195

Chanter le développement au Burkina Faso : ethnographie de la rencontre entre deux champs d'action

Lessard-Bérubé, Stéphanie 11 1900 (has links)
Dans le contexte urbain du Burkina Faso, la chanson de sensibilisation se situe au coeur des pratiques sociales traditionnelles, des nouvelles économies culturelles et des approches participatives en matière de développement. Cette pratique répond à des enjeux particuliers au contexte local et aux relations internationales. La musique comme outil commun de communication sociale artistique rejoint des stratégies professionnelles différentes chez les artistes-musiciens et les associations locales. Pour les premiers, nous pouvons porter un regard sur la place du musicien dans la société contemporaine burkinabè, entre paupérisation et mondialisation. Pour les seconds, la chanson de sensibilisation s’inscrit comme une tentative d’innover dans les approches d’Information, Éducation et Communication (IEC) pour la santé et la Communication pour le Changement de Comportement (CCC). Ce mémoire présente les modes de collaboration entre les artistes-musiciens et les associations locales qui oeuvrent en santé au Burkina Faso. Il décrit l’état respectif de leur champ puis analyse les négociations sociales issues de leur rencontre. La problématique de recherche s’inscrit dans des courants de recherche en anthropologie et établit un pont avec la praxis de l’animation sociale et culturelle. La chaîne de création (production-diffusion-consommation) permet de poser un regard historique sur les concepts de culture et de développement dans le contexte particulier de l’Afrique de l’Ouest francophone. / In the urban context of Burkina Faso, music and songs with a message for social education have become an intersection for traditionnal social practice, news cultural economies and participative development programs. This practice responds to specific local and international issues. As a common resource of social and artistic communication, music represents a strategic resource for musicians and local associations. For the former, we can discuss the role of the musician in contemporary society, between impoverisation and globalization. For the latter, music and songs with a message for social education are an innovative approach of Information, Éducation et Communication pour la santé (IEC/santé) and Communication pour le Changement de Comportement (CCC). In this research, we present the diverse levels of collaboration between musicians artist and local associations working in the healthcare sector in Burkina Faso. The ethnography presents the particular sphere of each group and analyzes the social negociations that results from their encounter. The research question proposed here falls between cultural studies and the study of social change. Hence, the chain of creation-production-diffusion commoditization allows us to study the history of complex concepts such as culture and developpement in a particular setting in Frenchspeaking West Africa.
196

Siemens och Rockwell Automation : En jämförande studie mellan styrsystem

Rexhaj, Kastriot January 2017 (has links)
Detta arbete har syftat till att ställa två av de större automationstillverkarna Siemens och Rockwell Automation mot varandra kring utvalda faktorer som: prestanda, kommunikation och tillgängliga mjukvaruverktyg. Studien har utformat tester på olika PLC-enheter från respektive tillverkare, redogjort för skillnader i de erbjudna kommunikationslösningarna samt analyserat mjukvaruverktygen utifrån utvalda egenskaper men också internationellt erkända standarder. Undersökningen har visat på bättre prestanda på processorer från Rockwell Automation än motsvarande från Siemens för ett givet tillämpningsområde. Vad befattar kommunikationslösningar med ethernet-teknologi har Siemens visat på bättre prestanda, stabilare kommunikation och ett mer komplett ekosystem som svarar på flera av de behov som kan uppstå i industriverksamhet. Mjukvaruverktygen från Siemens erbjuder mer objekt-orienterad funktionalitet och har visat sig betydligt mer kompatibel med den väletablerade standarden IEC 61131-3 som utformar programmeringsmetodiker för PLC-enheter och är tänkt att svara mot framtidens behov av interoperabilitet och effektivisering. Av resultaten som fåtts har en bedömning gjorts att Siemens erbjuder ett mer fördelaktigt utbud av produkter och tjänster som svarar väl mot framtidens krav. / This paper treats two competing suppliers of automation technology, Siemens and Rockwell Automation and directly compares them for a given set of factors in the following categories: performance, communication and software tools. The study consists of performance tests made on different PLC’s from these suppliers, considerations in the differences of communication technology and analysis of the programming tools according to chosen criteria’s but also by the degree of compliance with internationally established standards. The tests have shown the PLC from Rockwell Automation as having better performance for the chosen criteria (PLC’s for small to medium sized machines). Siemens offers more performance and more stable industrial ethernet communication over ProfiNET than does Rockwell Automation with EtherNet/IP. Accordingly, Siemens offers more flexibility in meeting future industrial needs. The software tools provided by Siemens offer a more object-oriented approach for programming PLC’s than equivalent tools from Rockwell Automation. TIA Portal offered by Siemens is more than twice as compliant with the internationally accepted standard IEC 61131-3 as Studio 5000 from Rockwell and in being more compliant benefits from increased interoperability and effective programming. The results show that Siemens’ products and services for automation benefits the customer in long term viability.
197

Determinação de um parâmetro para monitoramento do desempenho de mensagens GOOSE do padrão IEC 61850 utilizadas em subestações de energia elétrica / Determination of a parameter for monitoring the performance of GOOSE messages used in electric power substations

Chemin Netto, Ulisses 10 August 2012 (has links)
O desenvolvimento e utilização do padrão IEC 61850 alterou a concepção e operação das subestações de energia elétrica. O desempenho e confiabilidade do sistema de proteção depende da rede de comunicação de dados. Esta pesquisa propõe um parâmetro de dimensionamento e comparação de desempenho para o tempo de transferência das mensagens Generic Object Oriented Substation Event (GOOSE) entre Intelligent Electronic Devices (IEDs). Esse parâmetro foi obtido através do levantamento experimental da curva do tempo de transferência das mensagens GOOSE versus a ocupação percentual da largura de banda dos IEDs. Para a realização dos experimentos foram utilizados três IEDs, um switch Ethernet gerenciável, três microcomputadores do tipo PC, um relógio sincronizador Global Positioning System (GPS), cordões de fibra óptica, cabos do tipo par trançado sem blindagem e aplicativos de software. Os resultados mostraram que a partir de um limiar característico, o qual é distinto para cada IED ensaiado, o tempo de transferência excede o limite máximo permitido pelo padrão IEC 61850. A partir da análise destes dados, foi desenvolvido um sistema preditivo de monitoramento de banda para supervisionar a interface de rede dos IEDs. O sistema preditivo apresentou para a medição de banda um erro relativo médio igual a 0,55% em relação ao aplicativo comercial utilizado na comparação, já a predição feita pela rede neural artificial apresentou um erro de estimativa menor do que 3% para 91,30% das amostras utilizadas, além de modelar adequadamente o comportamento da série temporal que representa a ocupação de banda do IED monitorado. / The development and utilization of IEC 61850 standard changed the design and operation of electric power substations. The performance and reliability of the protection system depends on the data communication network. This research proposes a parameter for dimensioning and comparising the transfer time of Generic Object Oriented Substation Event (GOOSE) messages between different Intelligent Electronic Devices (IEDs). This parameter was obtained from experimental data related to the transfer time of GOOSE messages curve versus IEDs bandwidth percentage occupation. In this context, a laboratory structure was set up in order to carry out these experiments. This structure mainly consists of three IEDs, an Ethernet switch, three personal computers, a GPS Clock, fiber optic cables, unshielded twisted pair cables, as well as support software. The results show the existence of a characteristic threshold, different for each IED tested, after which the transfer time exceeded the total transmission time allowed for the IEC 61850 standard. Based on these results, a predictive bandwidth monitoring system was developed to supervise the IEDs bandwidth interface. The bandwidth measurement has a mean relative error of 0.55% regarding to the commercial software used for comparison. Finally, the forecasting made by the artificial neural network has a relative error of 3% for 91,30% of the samples used in test phase. In addition, that it was able to model the behaviour of the time series that represent the bandwidth occupation.
198

Validation temporelle et déploiement d'une application de contrôle industrielle à base de composants / Temporal validation and deployment of component based industrial control applications

Khalgui, Mohamed 02 February 2007 (has links)
Dans cette thèse, nous nous intéressons à la validation temporelle ainsi qu'au déploiement d'applications de contrôle industriel à base de composants. La technologie des composants retenue est celle des Blocs Fonctionnels définie dans la norme industrielle IEC 61499. Un Bloc Fonctionnel est défini comme un composant réactif supportant des fonctionnalités d'une application. L'avantage de cette norme, connue dans l'industrie, est la description statique de l'application ainsi que de son support d'exécution. Une première contribution de la thèse est l'interprétation des différents concepts définis dans la norme. Nous précisons, en particulier, la dynamique du composant en vue de décrire un comportement déterministe de l'application. Pour appliquer une validation temporelle exhaustive, nous proposons un modèle de comportement d'un Bloc Fonctionnel à l'aide du formalisme des automates temporisés. D'autre part, nous fournissons une sémantique au concept de réseau de Blocs Fonctionnels pour décrire une application comme une composition de Blocs. Une deuxième contribution de la thèse est le déploiement de tels réseaux sur une architecture distribuée multi-tâches tout en respectant des propriétés sur les temps de réponse de bout en bout. Nous transformons un réseau de Blocs Fonctionnels vers un ensemble de tâches élémentaires dépendantes, appelées actions. Cette transformation permet l'exploitation de résultats d'ordonnancement pour valider la correction temporelle de l'application. Pour déployer les blocs d'une application, nous proposons une approche hybride alliant un ordonnancement statique non-préemptif et un autre ordonnancement en ligne préemptif. L'ordonnancement statique permet la construction des tâches s'exécutant sur chaque calculateur. Ces tâches sont vues comme des séquencements statiques d'actions. Elles sont alors à ordonnancer dynamiquement selon une politique préemptive reposant sur EDF (Earliest Deadline First). Grâce à cette approche, nous réduisons le nombre de commutation de contexte en regroupant les actions au sein des tâches. De plus l'ordonnancement dynamique préemptif augmente la faisabilité du système. Enfin, une dernière contribution est une extension de la deuxième. Nous proposons une approche d'allocation de réseaux de blocs fonctionnels sur un support d'exécution distribué. Cette allocation, basée sur une heuristique de Liste, se repose sur la méthode hybride pour assurer un déploiement faisable de l'application. Le problème d'allocation est de trouver pour chaque bloc fonctionnel le calculateur capable de l'exécuter tout en respectant des contraintes fonctionnelles, temporelles et de support d'exécution. Notons enfin que l'heuristique proposée se base sur une technique de retour-arrière pour augmenter l'espace de solutions. / This thesis deals with the temporal validation and the deployment of component-based industrial control applications. We are interested in the Function Blocks approach, defined in the IEC 61499 standard, as a well known component based technology in the industry. A Function Block is an event triggered component owning data to support the application functionalities. The advantage of this technology is the taking into account of the application and also its execution support. The first thesis contribution deals with the interpretation of the different concepts defined in the standard. In particular, we propose a policy defining a deterministic behavior of a FB. To apply an exhaustive temporal validation of the application, we propose a behavioral model of a Block as Timed Automata. On the other hand, we propose a semantic for the concept of FBs networks to develop industrial control applications. The second thesis contribution deals with the deployment of FBs networks in a distributed multi-tasking architecture. Such deployment has to respect classical End to End Response Time Bounds as temporal constraints. To validate the temporal behavior of an application, we propose an approach transforming its blocks into an actions system with precedence constraints. The purpose is to exploit previous theories on the scheduling of real-time systems. To deploy FBs networks in feasible OS tasks, we propose a Hybrid scheduling approach combining an off-line non-preemptive scheduling and an on-line preemptive one. The off-line scheduling allows to construct OS tasks from FBs, whereas the on-line one allows to schedule these tasks according to the classical EDF policy. A constructed OS task is an actions sequence defining an execution scenario of the application. Thanks to this approach, we reduce the context switching at run-time by merging application actions in OS tasks. In addition, the system feasibility is increased by applying an on-line preemptive policy. Finally, the last thesis contribution is an extension of the previous one. We propose an approach allocating FBs networks in a distributed architecture. Based on a heuristic, such approach uses the hybrid method to construct feasible OS tasks in calculators. The allocation problem of a particular application FB is to look for a corresponding calculator while respecting functional, temporal and execution support constraints. We note that the proposed heuristic is based on a back-tracking technic to increase the solutions space.
199

Contribuições para a implementação de um barramento de processo segundo a norma IEC 61850-9. / Contributions for implementation of a process bus according to IEC 61850-9-2 standard.

Igarashi, Gilberto 27 November 2015 (has links)
Desde seu lançamento, em 2002, a Norma IEC 61850 vem evoluindo para se tornar o padrão adotado nos Sistemas de Automação de Subestações. Dentre seus vários aspectos, destacam- se os serviços de tempo real, que permitem a implementação de funções de automação e de proteção dentro da subestação através da troca de mensagens específicas entre Dispositivos Eletrônicos Inteligentes através de um barramento digital de rede de dados. O objetivo central deste trabalho é explorar algumas das questões que envolvem a implementação de uma classe de serviços de tempo real: a transmissão de valores amostrados através de Serviços SMV, definidos pela Norma IEC 61850-9. Primeiramente, apresenta-se um breve resumo das principais características da Norma IEC 61850 que possibilitam o atendimento dos três requisitos por ela estabelecidos como base: a interoperabilidade entre dispositivos de diferentes fabricantes, a versatilidade na configuração e reconfiguração do Sistema de Automação da Subestação, e a possibilidade de implementação de novas tecnologias. Em seguida, explora-se com maior profundidade todos os aspectos relevantes à implementação dos Serviços SMV. Devido à complexidade deste assunto, o autor propõe abordá-lo sob a ótica de cinco tópicos interdependentes: variações da Norma IEC 61850-9, confiabilidade do barramento de processo, sincronismo de tempo, análise da qualidade da medição e segurança cibernética. Com base nos resultados apresentados neste estudo, propõem-se duas plataformas, um protótipo de Transformador de Potencial Óptico e um protótipo de Relé de Proteção Diferencial para transformadores de potência, com o objetivo de explorar alguns dos aspectos pertinentes à implementação de um barramento de processo de acordo com a Norma IEC 61850-9. Também foram realizados testes de geração e transmissão de mensagens contendo valores de amostras de tensão/corrente do sistema elétrico (denominadas de SV Messages) com a finalidade de implementá-las de fato e avaliar as ferramentas de mercado disponíveis. Por fim foi proposto um modelo para a simulação do sistema de potência em conjunto com a rede de comunicação utilizando o programa Matlab/Simulink. O autor espera que este trabalho contribua para esclarecer os vários conceitos envolvidos na implementação do barramento de processo definido pela Norma IEC 61850-9, auxiliando na pesquisa e no desenvolvimento de novas ferramentas e dispositivos, e no aprimoramento da Norma IEC 61850. / Since its introduction, in 2002, the IEC 61850 Standard has been evolved to become the standard adopted in Substation Automation Systems. Among its various aspects it can be highlighted the real-time services, which allows the implementation of automation and protection functions within the substation by exchanging specific messages between Intelligent Electronic Devices via a digital data bus network. The main objective of this text is to explore some issues about the implementation of one class of real-time services: the transmission of sampled values through SMV Services, defined by IEC 61850-9 Standard. First, it is presented a brief summary of the main features of IEC 61850 Standard which allows it to meet the three main requirements on this standard: interoperability between devices from different manufacturers, versatility in configuration and reconfiguration of Substation Automation System, and possibility of implementation of new technologies. Next, it is explored, with more details, all aspects involved in the implementation of SMV Services. Due to the complexity of this subject, the author proposes approaches it from the perspective of five interdependent topics: variations of IEC 61850-9 Standard, process bus reliability, time synchronism, analysis of measurement quality, and cyber security. Based on results presented two platforms are proposed, an Optical Voltage Transformer prototype and a Differential Protection Relay prototype for power transformers, in order to explore some of aspects related to the implementation of a process bus according to IEC 61850-9 Standard. It was executed also some tests of generation and transmission of messages containing samples values of voltage/current from power system (referred as SV Messages) in order to implement them in fact, and to evaluate available market tools. At the end it is propoused a model for simulation of power system and network communication using Matlab/Simulink software. The author hopes this work may contribute to clarify the various concepts involved in the implementation of a process bus according to IEC 61850-9 Standard, aiding in research and development of new tools and devices, and improvement of IEC 61850 Standard.
200

Gestion des risques appliquée aux systèmes d’information distribués / Risk management to distributed information systems

Lalanne, Vincent 19 December 2013 (has links)
Dans cette thèse nous abordons la gestion des risques appliquée aux systèmes d’information distribués. Nous traitons des problèmes d’interopérabilité et de sécurisation des échanges dans les systèmes DRM et nous proposons la mise en place de ce système pour l’entreprise: il doit nous permettre de distribuer des contenus auto-protégés. Ensuite nous présentons la participation à la création d’une entreprise innovante qui met en avant la sécurité de l’information, avec en particulier la gestion des risques au travers de la norme ISO/IEC 27005:2011. Nous présentons les risques liés à l’utilisation de services avec un accent tout particulier sur les risques autres que les risques technologiques; nous abordons les risques inhérents au cloud (défaillance d’un provider, etc...) mais également les aspects plus sournois d’espionnage et d’intrusion dans les données personnelles (Affaire PRISM en juin 2013). Dans la dernière partie nous présentons un concept de DRM d’Entreprise qui utilise les métadonnées pour déployer des contextes dans les modèles de contrôle d’usage. Nous proposons une ébauche de formalisation des métadonnées nécessaires à la mise en œuvre de la politique de sécurité et nous garantissons le respect de la réglementation et de la loi en vigueur. / In this thesis we discuss the application of risk management to distributed information systems. We handle problems of interoperability and securisation of the exchanges within DRM systems and we propose the implementation of this system for the company: it needs to permit the distribution of self-protected contents. We then present the (our) participation in the creation of an innovative company which emphasizes on the security of information, in particular the management of risks through the ISO/IEC 27005:2011 standard. We present risks related to the use of services, highlighting in particular the ones which are not technological: we approach inheritent risks in clouds (provider failure, etc ...) but also the more insidious aspects of espionage and intrusion in personal data (Case PRISM in June 2013). In the last section, we present a concept of a DRM company which uses metadata to deploy settings in usage control models. We propose a draft formalization of metadata necessary for the implementation of a security policy and guarantee respect of regulations and legislation.

Page generated in 0.0375 seconds