• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 118
  • 92
  • 83
  • 28
  • 14
  • 9
  • 8
  • 4
  • 4
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 387
  • 193
  • 107
  • 90
  • 84
  • 84
  • 81
  • 51
  • 47
  • 47
  • 44
  • 44
  • 42
  • 41
  • 39
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Systém pro podporu auditu managementu informační bezpečnosti / System for Audit Support of Information Security Management

Soukop, Tomáš January 2012 (has links)
This master thesis describes creation of system for audit support of information security management. In the next chapters I will explain what is the information security, system of information security, audit system and what standards we have for this. Last but not least is described how to create a system for audit support. The whole design is created with usage of standards for quality management and information security management. System is oriented for web environment.
62

Návrh managementu bezpečnosti informací v malém účetním podniku / Proposal Information Security Management in Small Accouting Enterprise

Krčmář, Josef January 2016 (has links)
This diploma thesis proposes the implementation of information security management system in a business processing accounting. The first part describes the theoretical background. On the basis, will analyze the company and created the draft measures that will increase the security of information in a selected company.
63

Návrh na zavedení nutných oblastí ISMS na základní škole / The Proposal for Implementation of Essential ISMS Sections at the Primary School

Kryštof, Tomáš January 2016 (has links)
This master thesis is concerned with the information security on a specific primary school. In the first and second part of this thesis there is an endeavor to provide basic theoretical starting points about ISMS issues, and to get an overview about the current state of the information security at the primary school. This is followed by the practical part where there is the proposal of suitable security steps and recommendation for solution of the most important tasks from the ICT management security perspective.
64

Återskapande och validering av konfiguration för kommunikationsstandarden IEC 61850 i fördelarstationer : Recreation and Validation of Configuration for the IEC 61850 Communication Standard in Distribution Substations

Lennartsson, Felix January 2023 (has links)
I en fördelarstation i Ellevios elnät i Stockholm har en viktig konfigurationsfil försvunnit. Filen används för att beskriva styr- och kommunikationssystemet för övervakning och fjärrmanövrering av stationen från en driftcentral. Dessutom behöver operativsystemet på en enhet i kommunikationssystemet uppdateras. Det misstänks att konfigurationsfilen som har försvunnit behövs för att genomföra uppdateringen. Det visar sig att konfigurationsfilen inte behövs för att genomföra uppdateringen av operativsystemet. Två metoder utvecklas därför, en för att genomföra uppdateringen av kommunikationsenheten, och en för att återskapa konfigurationsfilen. Den första metoden beskriver hur operativsystemet på en Remote Terminal Unit i ABB:s RTU500-serie kan uppdateras från firmwareversion 11 till version 12. Den andra metoden beskriver hur en fullständig konfigurationsfil, i form av en Substation Configuration Description (SCD) kan återskapas för stationen. Den senare metoden utvecklas specifikt för den enskilda stationen, men skulle kunna vidareutvecklas för att återskapa SCD-filen i fler stationer där samma problem idag finns. Metoden för att genomföra uppdatering av operativsystemet används framgångsrikt för att genomföra själva uppdateringen. Metoden för att återskapa konfigurationsfilen testas genom att en konfiguration för en ny kommunikationsenhet genereras baserat på den återskapade konfigurationen.  Genom att tillämpa dessa metoder kan tillförlitligheten för styr- och kommunikationssystem med IEC 61850-teknologi förbättras. Detta kan leda till ökad tillförlitlighet vid elleverans, eftersom kommunikationssystemet används för att övervaka elnätet och hantera fel genom fjärrstyrning. Detta minskar behovet av fysiska besök till stationen. Rapporten är ett examensarbete för programmet Högskoleingenjör i elektroteknik. Examensarbetet utfördes under våren 2023 på företaget Omexom Sweden. / In a distribution substation in Ellevio's power grid in Stockholm, an important configuration file has gone missing. The file is used to describe the control and communication system for monitoring and remote operation of the substation from a control centre. Additionally, the operating system on a device within the communication system needs to be updated. It is suspected that the missing configuration file is required to perform the update. It turns out that the configuration file is not needed to carry out the operating system update. As a result, two methods are developed: one for performing the update of the communication unit and another for recreating the configuration file. The first method describes how the operating system on a Remote Terminal Unit in ABB’s RTU500 series can be updated from firmware version 11 to version 12. The second method explains how a complete configuration file, in the form of a Substation Configuration Description (SCD) can be recreated for the substation. Although the latter method is specifically tailored for the individual substation, it could be further refined to recreate the SCD file in several other stations with the same issue. The method for performing the operating system update is successfully utilized to carry out the update itself. The method for recreating the configuration file is tested by generating a configuration for a new communication unit based on the reconstructed configuration. By implementing these methods, the reliability of the IEC 61850-based control and communication system can be enhanced. This can lead to improved reliability of power delivery since the communication system is used to monitor the power grid and manage faults through remote control. Thereby, the need for physical visits to the substation is reduced. The report is a thesis for the Bachelor program in Electrical Engineering. The thesis was carried out during the spring of 2023 at the company Omexom Sweden.
65

Worldwide Infrastructure for Neuroevolution: A Modular Library to Turn Any Evolutionary Domain into an Online Interactive Platform

Szerlip, Paul 01 January 2015 (has links)
Across many scientific disciplines, there has emerged an open opportunity to utilize the scale and reach of the Internet to collect scientific contributions from scientists and non-scientists alike. This process, called citizen science, has already shown great promise in the fields of biology and astronomy. Within the fields of artificial life (ALife) and evolutionary computation (EC) experiments in collaborative interactive evolution (CIE) have demonstrated the ability to collect thousands of experimental contributions from hundreds of users across the glob. However, such collaborative evolutionary systems can take nearly a year to build with a small team of researchers. This dissertation introduces a new developer framework enabling researchers to easily build fully persistent online collaborative experiments around almost any evolutionary domain, thereby reducing the time to create such systems to weeks for a single researcher. To add collaborative functionality to any potential domain, this framework, called Worldwide Infrastructure for Neuroevolution (WIN), exploits an important unifying principle among all evolutionary algorithms: regardless of the overall methods and parameters of the evolutionary experiment, every individual created has an explicit parent-child relationship, wherein one individual is considered the direct descendant of another. This principle alone is enough to capture and preserve the relationships and results for a wide variety of evolutionary experiments, while allowing multiple human users to meaningfully contribute. The WIN framework is first validated through two experimental domains, image evolution and a new two-dimensional virtual creature domain, Indirectly Encoded SodaRace (IESoR), that is shown to produce a visually diverse variety of ambulatory creatures. Finally, an Android application built with WIN, "filters, allows users to interactively evolve custom image effects to apply to personalized photographs, thereby introducing the first CIE application available for any mobile device. Together, these collaborative experiments and new mobile application establish a comprehensive new platform for evolutionary computation that can change how researchers design and conduct citizen science online.
66

Development of a Sag Monitoring Instrument based on an Embedded System Platform

Gaikwad, Anish Madhukar 11 May 2002 (has links)
Small size, low weight and rugged environmental specifications characterize embedded systems. PC/104 is an embedded system architecture that implements the compact version of the PC (ISA and PCI) buses. The PC/104 architecture uses 104 pins for stacking different boards and eliminates the need for card edges and backplanes. Standardizing hardware and software around PC architecture substantially reduces the development cost, time and risks involved. The purpose of this study is to develop an environmentally rugged and portable instrument based on the PC/104 architecture for measuring and recording voltage sags as per the International Electrotechnical Commission (IEC) standards 61000-4-30 and 61000-2-8. Two different central processing units (CPU) for the instrument are evaluated in terms of hardware setup, cost and performance. The overall performance of the instrument using either CPU indicates that the instrument can be reliably used to measure voltage sags.
67

Lógica fuzzy aplicados ao registro de alarmes e eventos em subestações no padrão IEC 61850. / Fuzzy logic applied to registration of alarms and events in substations in standard IEC 61850.

Ribeiro, Luiz Gustavo 23 November 2015 (has links)
A aplicação de técnicas de Inteligência artificial em sistemas elétricos de potência permite a resolução de problemas onde soluções tradicionais não mostram bons resultados. Por exemplo, após a ocorrência de uma falta, um sistema automatizado toma todas as medidas necessárias para proteger o sistema e assumir um estado seguro de operação. Nessa ocasião, cabe aos operadores verificar todas as mensagens e dados disponíveis, selecionando aquelas relevantes, para então chegar a uma conclusão sobre o evento ocorrido. Apenas após esse diagnóstico, com base em seu conhecimento, o operador pode ordenar o restabelecimento do sistema ou sua manobra para outro estado. Esse processo é lento e passível de falhas, pois as informações são usualmente conflitantes e confusas, devido à avalanche de eventos, alarmes e alertas decorrentes. Diante desta dificuldade, é interessante dispor de uma ferramenta automática de diagnóstico e apoio na tomada de decisão que torne essa tarefa mais ágil e com menores riscos. Este trabalho aborda a integração e a interoperabilidade de equipamentos de uma subestação elétrica em conformidade com a norma IEC 61850, e a utilização de sistemas inteligentes com lógica Fuzzy executados em um controlador programável moderno. O sistema proposto faz uso de recursos de comunicação da IEC 61850, com mensagens prioritárias padrão GOOSE incluindo valores analógicos de corrente de falta, além de mensagens no padrão TCP/IP MMS. Essas informações, alarmes e eventos, são processadas de forma automática por um motor Fuzzy que permite aproximar a decisão computacional à decisão humana, incluindo zonas de incerteza e lógica ponderada, permitindo respostas mais abstratas do que algo puramente binário. O sistema proposto foi submetido a um grande número de eventos com um simulador em tempo real, com equipamentos reais, tais como IEDs e um controlador programável de alto desempenho. Além disso o sistema usou um esquema de comunicação inovador para o módulo do processador de dados em tempo real (RTDP), inteiramente baseado nos protocolos da IEC 61850. / The application of artificial intelligence techniques in electric power systems allows solving problems where traditional solutions do not show good results. For example, in electric power systems, after the occurence of a fault, an automated system takes all necessary measures to protect the system and assume a safe state of operation. On this occasion, it is for operators to review all messages and data available, selecting those relevant to then come to a conclusion about the event that occurred. Only after this diagnosis, based on his knowledge the operator may order the restoration of the system or their operation to another state. This process is therefore slow and subject to failure, because the information is usually conflicting and confusing because of the avalanche of events, alarms and warnings arising. Faced with this difficulty, it is interesting to have an automatic diagnostic tool and support in decision making that makes this task quicker and with less risk. This paper addresses the integration and interoperability of an electrical substation equipment in accordance with IEC 61850, and the use of intelligent systems Fuzzy logic running on a modern programmable controller. The proposed system makes use of the IEC 61850 communication resources with priority GOOSE messages including standard analog values of fault current, as well as messages on standard TCP / IP MMS. This information, alarms and events, are processed automatically by a fuzzy engine that allows the computational approach to human decision making, including areas of uncertainty and weighted logic, allowing more abstract answers than purely binary. The proposed system has undergone a large number of events with a simulator in real time with actual equipment such as a programmable controller IEDs and high performance. In addition the system used an innovative communication scheme for the module\'s real-time data processor ( RTDP ), based entirely on the IEC 61850 standard protocols such as MMS and GOOSE messages.
68

Processos de apoio ao desenvolvimento de aplicações web / Supporting process for Web applications development

Souza, Osnete Ribeiro de 06 May 2005 (has links)
Num curto período de tempo, a Web tornou-se o aspecto central de muitas aplicações em diferentes áreas. Rapidamente, cresceu e diversificou seu uso, e diversos setores de negócio realizam suas operações no ambiente da Web. Entretanto, à medida que cresce a extensão de uso de aplicações Web, que se tornam mais complexas, aumenta a preocupação com a maneira como as aplicações são desenvolvidas. Freqüentemente, a abordagem de desenvolvimento é ad hoc, desprovida de técnicas sistemáticas e de metodologias sólidas, resultando em aplicações de baixa qualidade. A fim de alcançar aplicações Web bem sucedidas, há a necessidade de melhores princípios de esenvolvimento que devem considerar as características especiais dessas aplicações. Dessa forma, o objetivo do trabalho é propor Processos de Apoio ao desenvolvimento das aplicações Web, baseando-se nas características dessas aplicações e nos Processos de Apoio da ISO/IEC 12207. Os processos de Apoio visam auxiliar outros processos do ciclo de vida da aplicação a alcançar produtos de qualidade e o sucesso do projeto / Within a short period, the Web has become the central aspect of many applications in different areas. Rapidly, it has grown and diversified in its scope and use. Diverse business sectors improve their operations in Web environment. The Web application has become more complex and it has increased the concern with the way the application is developed. Frequently, the development is ad hoc, unprovide of systematic methods and methodologies, resulting in poor quality applications. In order to have successful Web applications, it is necessary better principles of development that have to consider the characteristics of these applications. The objective of this work is to propose Supporting Process for development Web applications, based on the characteristics of these applications and the Supporting Process of ISO/IEC 12207. The Supporting processes aim to assist other processes of the cycle of life of the application to reach quality products and successful projects
69

Gestão de segurança da informação - uma proposta para potencializar a efetividade da segurança da informação em ambiente de pesquisa científica / Information security management a proposal to improve the effectiveness of information security in the scientific research environment

Alexandria, João Carlos Soares de 30 November 2009 (has links)
O aumento crescente da interconectividade no ambiente de negócio, aliado à dependência cada vez maior dos sistemas de informação nas organizações, faz da gestão da segurança da informação uma importante ferramenta de governança corporativa. A segurança da informação tem o objetivo de salvaguardar a efetividade das transações e, por conseguinte, a própria continuidade do negócio. As ameaças à informação vão desde ataques hackers, fraudes eletrônicas, espionagem e vandalismo; a incêndio, interrupção de energia elétrica e falhas humanas. Segurança da informação é obtida a partir da implementação de um conjunto de controles, incluindo-se dentre outros, políticas, processos, procedimentos, estruturas organizacionais, software e hardware, o que exige uma gestão contínua e uma estrutura administrativa bem estabelecida para fazer frente aos seus desafios. O presente trabalho procurou investigar as razões relacionadas às dificuldades que muitas organizações enfrentam para a estruturação da segurança da informação. Muitas delas se limitam a adotarem medidas pontuais e inconsistentes com a realidade em que vivem. O mercado conta com um arcabouço legal e normativo para a implementação da segurança da informação NBR ISO/IEC 27002, Lei Americana Sarbanes-Oxley, acordo de capital da Basiléia, regulamentações das agências regulatórias (ANATEL, ANVISA e CVM). As pesquisas de mercado mostram que a implementação da segurança da informação está concentrada em instituições de grande porte e de segmentos específicos da economia como, por exemplo, bancário-financeiro e telecomunicação. Entretanto, a segurança da informação faz-se necessária em qualquer organização que utilize sistema de informação nos seus processos de trabalho, independentemente do porte ou do setor econômico de atuação. A situação da segurança da informação no setor governamental do Brasil, e dentro deste, nas instituições de pesquisas científicas é considerada preocupante, de acordo com o Tribunal de Contas da União. Este trabalho apresenta um método de diagnóstico e avaliação da segurança da informação, aplicado na forma de levantamento de dados, que tem a intenção de servir de ponto de partida para fomentar uma discussão interna visando à estruturação da segurança da informação na organização. O referido método é destinado em especial àquelas organizações que não se enquadram no perfil das empresas atingidas pelas leis e regulamentos existentes, mas que necessitam igualmente protegerem seus ativos de informação para o bom e fiel cumprimento de seus objetivos e metas de negócio. / The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal of information security, applied in the form of a data survey, which intend to be a tool that can be used as a starting point to foment debates about information security concerns into organization. This can lead them to a well-structured information security implementation. The referred proposal is specially addressed to those organizations that do not have the profile that put them among those companies which are forced to follow some law or regulation. But in the same way they need to protect their information assets to reach their goals and their business objectives.
70

Avaliação do campo acústico gerado pelos aparelhos de ultra-som terapêutico do programa de pós-graduação interunidades em bioengenharia, de acordo com a norma NBR-IEC 1689 / Evaluation of the acoustic field produced by the therapeutic ultrasound apparatus of Interunits Postgraduate Program in Bioengineering according with NBR-IEC 1689

Valentini, Elton Antonio 13 March 2006 (has links)
O uso do ultra-som na área da saúde é bastante amplo, tanto para o diagnóstico por imagem como para o tratamento de inúmeras afecções (de feridas de pele a tumores malignos). No Programa de Pós-Graduação Interunidades em Bioengenharia há mais de 20 anos são feitas pesquisas sobre a interação do ultra-som com os tecidos biológicos. O presente trabalho objetiva avaliar os campos acústicos gerados pelos aparelhos de ultra-som terapêutico usados no Programa de Pós Graduação Interunidades em Bioengenharia de acordo com a norma NBR-IEC 1689. Para isto foi montado um tanque acústico e um sistema de posicionamento para a avaliação dos aparelhos, bem como foi desenvolvido um software para controle e automação do sistema. Os parâmetros que a norma pede que sejam avaliados e seu respectivo intervalo de tolerância são: potência de saída ('+ OU -' 20%); área de radiação efetiva ('+ OU -' 20%); intensidade efetiva ('+ OU -' 20%); freqüência de trabalho acústica ('+ OU -' 10%); relação de não-uniformidade do feixe ('+ OU -' 30%); intensidade máxima do feixe; tipo de feixe; fator de operação; forma de onda de modulação. Foram avaliados 8 aparelhos, sendo que 3 deles usados no ambulatório da bioengenharia e 5 usados em pesquisa. Para se avaliar os parâmetros dos equipamentos é necessário que eles estejam declarados no equipamento ou em manual que acompanha o equipamento. Na falta destas especificações fez se necessário a proposta de valores de referência para os aparelhos de ultra-som terapêutico da bioengenharia / The use of the ultrasound is quite wide health area, so much for image diagnosis as for the treatment of countless disease (skin wounds to malignant tumors). In the Interunidades Program of Masters degree in Bioengineering during more than 20 years are made researches about the interaction of the ultrasound with the biological tissues. The present work objective is the evaluate the acoustic fields generated by therapeutic ultrasound apparatus used in the Interunidades Program of Masters degree in Bioengineering according with NBR-IEC 1689. In this way, it was set up an acoustic tank and a positioning system for the apparatus, as well as software was developed for control and automation of the system. Parameters required by standard to be measured are presented with the respective tolerance interval: declared potency ('+ OR -' 20%); effective radiation area ('+ OR -' 20%); effective intensity ('+ OR -' 20%); work acoustics frequency ('+ OR -' 10%); non uniformity of the field relationship ('+ OR -' 30%); maximum intensity of the field; field type; operation factor; modulation wave form. There were appraised 8 apparatus, 3 of them are used in clinic of bioengineering and 5 are used in research. To evaluate the equipment parameters it is necessary that they are declared in the equipment or in equipment manual. In the lack of these specifications it is necessary proposal of reference values for the therapeutic ultrasound apparatus of bioengineering

Page generated in 0.171 seconds