Spelling suggestions: "subject:"intelligent atemsystem"" "subject:"intelligent systsystem""
21 |
Risk Management Model for International Public Construction Joint Venture Projects in KuwaitBu-Qammaz, Amani S A S 21 May 2015 (has links)
No description available.
|
22 |
Sistema embarcado inteligente para detecção de intrusão em subestações de energia elétrica utilizando o Protocolo OpenFlow / Embedded intelligent system for intrusion detection in electric power substations using the OpenFlow protocolSilva, Lázaro Eduardo da 05 October 2016 (has links)
O protocolo International Electrotechnical Commission (IEC)-61850 tornou possível integrar os equipamentos das subestações de energia elétrica, através de uma rede de comunicação de dados Ethernet de alta velocidade. A utilização deste protocolo tem como objetivo principal a interligação dos Intelligent Electronic Devices (IEDs) para a automatização dos processos no sistema elétrico. As contribuições deste protocolo para a integração do controle e supervisão do sistema elétrico são diversas, porém, o fato de utilizar uma rede de comunicação de dados Ethernet integrada expõe o sistema elétrico à ataques cibernéticos. A norma IEC-62351 estabelece uma série de recomendações para prover segurança à rede de comunicação do sistema elétrico, dentre elas, o gerenciamento da rede de comunicação, a análise dos campos da mensagem Generic Object Oriented Substation Event (GOOSE) e a utilização de sistemas de detecção de intrusão. O presente trabalho descreve o desenvolvimento de um Intrusion Detection System (IDS) que atende os requisitos de segurança propostos pelo protocolo IEC-62351, para a identificação de ataques à comunicação realizada por mensagens GOOSE do protocolo IEC-61850, e entre equipamentos do sistema elétrico. Para o desenvolvimento desta aplicação, foram identificados os campos que compõem as mensagens GOOSE, de forma a reconhecer os valores esperados em diferentes situações de operação do sistema elétrico. Determinaram-se padrões de comportamento a serem utilizados para discernir mensagens falsas na rede de comunicação. Instalou-se e configurou-se um sistema operacional de tempo real embarcado na plataforma de desenvolvimento Zynq Board (ZYBO), juntamente com o controlador Open-Mul, para gerenciar a rede de comunicação da subestação, através do protocolo OpenFlow, realizando otimizações para o tráfego multicast. Foi desenvolvido um sistema de detecção e bloqueio de mensagens GOOSE falsas que utiliza o protocolo OpenFlow para controle da rede de comunicação do Sistema Elétrico. Desenvolveu-se ainda um sistema inteligente, utilizando-se uma Rede Neural Artificial (RNA) Nonlinear Autoregressive Model with Exogenous Input (NARX), para predição do tráfego realizado por mensagens GOOSE e detecção de ataques Distributed Deny of Service (DDOS). Os resultados obtidos demonstraram que o protocolo OpenFlow pode ser uma ferramenta interessante para controle da rede, porém, os fabricantes necessitam amadurecer sua implementação nos switches, para que sejam utilizados em produção nas redes de comunicação das subestações. O sistema de predição do tráfego gerado por mensagens GOOSE apresentou benefícios interessantes para a segurança da rede de comunicação, demonstrando potencial para compor um sistema de detecção de ataques DDOS realizado por mensagens GOOSE, na rede de comunicação das subestações de energia elétrica. / The IEC-61850 made it possible to integrate equipments of electric power system substations to a high-speed Ethernet data communication network. Its main goal is the interconnection of IEDs for the automation of processes in an electrical system. The contributions of this protocol for the integration of the control and supervision of the electrical system are diverse, although an Ethernet network exposes the electrical system for cyber attacks. The IEC-62351 states a series of recommendations to provide security to the communication network of the electrical system, such as the communication network management, the analysis of GOOSE messages and the use of intrusion detection systems. This study describes the development of an IDS that meets the security requirements proposed by the IEC-62351 standard to identify attacks on communication between GOOSE messages exchanged by electrical equipment using IEC-61850. For the development of this application, fields of the GOOSE messages were identified, in order to recognize the expected values in different power system operating conditions. Behaviour patterns were determined to detect false messages on the communication network. A real-time embedded operating system on ZYBO was installed and configured, as well as the OpenMul controller to manage the communication network of the substation through the OpenFlow protocol, performing optimizations for multicast traffic. A detection system and block tamper GOOSE messages, using the OpenFlow protocol for control of the electrical system communication network, were developed. In addition, an intelligent system using an Artificial Neural Network (ANN) Nonlinear Autoregressive Model with Exogenous Input (NARX) for predicting of the GOOSE messages traffic and the detection of Distributed Deny of Service attack (DDOS) were also developed. The results obtained show that the OpenFlow protocol may be a valuable tool for network control, however, manufacturers should maturely carry on with its implementation in the switches, so that it be used in substation communication networks. The traffic prediction system of the GOOSE messages presented interesting benefits for the security of the communication network, demonstrating potential to built a DDOS attack detection system performed by GOOSE messages on the communication network of electric power substations.
|
23 |
Sistema embarcado inteligente para detecção de intrusão em subestações de energia elétrica utilizando o Protocolo OpenFlow / Embedded intelligent system for intrusion detection in electric power substations using the OpenFlow protocolLázaro Eduardo da Silva 05 October 2016 (has links)
O protocolo International Electrotechnical Commission (IEC)-61850 tornou possível integrar os equipamentos das subestações de energia elétrica, através de uma rede de comunicação de dados Ethernet de alta velocidade. A utilização deste protocolo tem como objetivo principal a interligação dos Intelligent Electronic Devices (IEDs) para a automatização dos processos no sistema elétrico. As contribuições deste protocolo para a integração do controle e supervisão do sistema elétrico são diversas, porém, o fato de utilizar uma rede de comunicação de dados Ethernet integrada expõe o sistema elétrico à ataques cibernéticos. A norma IEC-62351 estabelece uma série de recomendações para prover segurança à rede de comunicação do sistema elétrico, dentre elas, o gerenciamento da rede de comunicação, a análise dos campos da mensagem Generic Object Oriented Substation Event (GOOSE) e a utilização de sistemas de detecção de intrusão. O presente trabalho descreve o desenvolvimento de um Intrusion Detection System (IDS) que atende os requisitos de segurança propostos pelo protocolo IEC-62351, para a identificação de ataques à comunicação realizada por mensagens GOOSE do protocolo IEC-61850, e entre equipamentos do sistema elétrico. Para o desenvolvimento desta aplicação, foram identificados os campos que compõem as mensagens GOOSE, de forma a reconhecer os valores esperados em diferentes situações de operação do sistema elétrico. Determinaram-se padrões de comportamento a serem utilizados para discernir mensagens falsas na rede de comunicação. Instalou-se e configurou-se um sistema operacional de tempo real embarcado na plataforma de desenvolvimento Zynq Board (ZYBO), juntamente com o controlador Open-Mul, para gerenciar a rede de comunicação da subestação, através do protocolo OpenFlow, realizando otimizações para o tráfego multicast. Foi desenvolvido um sistema de detecção e bloqueio de mensagens GOOSE falsas que utiliza o protocolo OpenFlow para controle da rede de comunicação do Sistema Elétrico. Desenvolveu-se ainda um sistema inteligente, utilizando-se uma Rede Neural Artificial (RNA) Nonlinear Autoregressive Model with Exogenous Input (NARX), para predição do tráfego realizado por mensagens GOOSE e detecção de ataques Distributed Deny of Service (DDOS). Os resultados obtidos demonstraram que o protocolo OpenFlow pode ser uma ferramenta interessante para controle da rede, porém, os fabricantes necessitam amadurecer sua implementação nos switches, para que sejam utilizados em produção nas redes de comunicação das subestações. O sistema de predição do tráfego gerado por mensagens GOOSE apresentou benefícios interessantes para a segurança da rede de comunicação, demonstrando potencial para compor um sistema de detecção de ataques DDOS realizado por mensagens GOOSE, na rede de comunicação das subestações de energia elétrica. / The IEC-61850 made it possible to integrate equipments of electric power system substations to a high-speed Ethernet data communication network. Its main goal is the interconnection of IEDs for the automation of processes in an electrical system. The contributions of this protocol for the integration of the control and supervision of the electrical system are diverse, although an Ethernet network exposes the electrical system for cyber attacks. The IEC-62351 states a series of recommendations to provide security to the communication network of the electrical system, such as the communication network management, the analysis of GOOSE messages and the use of intrusion detection systems. This study describes the development of an IDS that meets the security requirements proposed by the IEC-62351 standard to identify attacks on communication between GOOSE messages exchanged by electrical equipment using IEC-61850. For the development of this application, fields of the GOOSE messages were identified, in order to recognize the expected values in different power system operating conditions. Behaviour patterns were determined to detect false messages on the communication network. A real-time embedded operating system on ZYBO was installed and configured, as well as the OpenMul controller to manage the communication network of the substation through the OpenFlow protocol, performing optimizations for multicast traffic. A detection system and block tamper GOOSE messages, using the OpenFlow protocol for control of the electrical system communication network, were developed. In addition, an intelligent system using an Artificial Neural Network (ANN) Nonlinear Autoregressive Model with Exogenous Input (NARX) for predicting of the GOOSE messages traffic and the detection of Distributed Deny of Service attack (DDOS) were also developed. The results obtained show that the OpenFlow protocol may be a valuable tool for network control, however, manufacturers should maturely carry on with its implementation in the switches, so that it be used in substation communication networks. The traffic prediction system of the GOOSE messages presented interesting benefits for the security of the communication network, demonstrating potential to built a DDOS attack detection system performed by GOOSE messages on the communication network of electric power substations.
|
24 |
An Artificial Intelligence-Driven Model-Based Analysis of System Requirements for Exposing Off-Nominal BehaviorsMadala, Kaushik 05 1900 (has links)
With the advent of autonomous systems and deep learning systems, safety pertaining to these systems has become a major concern. The existing failure analysis techniques are not enough to thoroughly analyze the safety in these systems. Moreover, because these systems are created to operate in various conditions, they are susceptible to unknown safety issues. Hence, we need mechanisms which can take into account the complexity of operational design domains, identify safety issues other than failures, and expose unknown safety issues. Moreover, existing safety analysis approaches require a lot of effort and time for analysis and do not consider machine learning (ML) safety. To address these limitations, in this dissertation, we discuss an artificial-intelligence driven model-based methodology that aids in identifying unknown safety issues and analyzing ML safety. Our methodology consists of 4 major tasks: 1) automated model generation, 2) automated analysis of component state transition model specification, 3) undesired states analysis, and 4) causal factor analysis. In our methodology we identify unknown safety issues by finding undesired combinations of components' states and environmental entities' states as well as causes resulting in these undesired combinations. In our methodology, we refer to the behaviors that occur because of undesired combinations as off-nominal behaviors (ONBs). To identify undesired combinations and ONBs that aid in exposing unknown safety issues with less effort and time we proposed various approaches for each of the task and performed corresponding empirical studies. We also discussed machine learning safety analysis from the perspective of machine learning engineers as well as system and software safety engineers. The results of studies conducted as part of our research shows that our proposed methodology helps in identifying unknown safety issues effectively. Our results also show that combinatorial methods are effective in reducing effort and time for analysis of off-nominal behaviors without overlooking any dependencies among components and environmental entities of a system. We also found that safety analysis of machine learning components is different from analysis of conventional software components and detail the aspects we need to consider for ML safety.
|
25 |
Návrh na realizaci projektu ve společnosti TOROLA design s.r.o. / Proposal for Implementation of the Project in the Society TOROLA Design Ltd.Jakimov, Jan January 2011 (has links)
The diploma thesis deals with the analysis of business environment of the TOROLA design Ltd. On the basis of established information a concept and options for project execution of production and distribution of the electronic system for „Smart houses“ will be configured. This project will make extending the range of products and services possible the company and it will help to improve its financial situation.
|
26 |
Разработка “интеллектуальных” систем термостабилизации подшипников шпиндельного узла металлорежущего станка в среде MATLAB : магистерская диссертация / Development of "intelligent" systems of thermal stabilization of bearings of the spindle Assembly of the metal-cutting machine in MATLABГараев, Е. С., Garaev, E. S. January 2018 (has links)
The aim of the work is to develop systems of thermal stabilization of metal-cutting machine spindle assembly with artificial intelligence in MATLAB environment. The paper analyzes the existing systems of thermal stabilization of the supports of spindle units of metal-cutting machines and the known methods of compensation of thermal deformations of machines that occur during machining. The advantages and disadvantages of such systems are shown and attention is drawn to the thermal stabilization systems based on fuzzy logic. Two new variants of such systems are considered, which realize control on deviation and combined (on deviation and disturbance). Both systems are implemented programmatically in MATLAB. According to the results of programs in MATLAB, a scientific article was written, which in the international competition US-2017-02 took 3rd place in the direction of “Technical Sciences” in the category “Research project”. Diploma for 3rd place and the text of the article from the collection are attached. The explanatory note to the project contains 153 sheets and is accompanied by 23 demonstration sheets. / Цель работы – разработка “интеллектуальных” систем термостабилизации шпиндельного узла металлорежущего станка с искусственным интеллектом в среде MATLAB. В работе анализируются существующие системы термостабилизации опор шпиндельных узлов металлорежущих станков и известные способы компенсации тепловых деформаций станков, возникающих при обработке резанием. Показываются достоинства и недостатки таких систем и обращается внимание на системы термостабилизации, построенные на основе нечеткой логики. Рассматриваются два новых варианта таких систем, которые разработаны аппаратно и реализующие управление по отклонению и комбинированное (по отклонению и возмущению). Обе системы реализуются программно в MATLAB. По результатам создания программ в MATLAB, была написана научная статья, которая в международном конкурсе US-2017-02 заняла 3-е место по направлению “Технические науки” в номинации “Исследовательский проект”. Диплом за 3-е место и текст статьи из сборника прикреплены в приложении. Пояснительная записка к проекту содержит 153 листа и сопровождается 23 демонстрационными листами.
|
27 |
История русской философии в информационной среде : магистерская диссертация / History of Russian philosophy in the information environmentНикитин, П. В., Nikitin, P. V. January 2020 (has links)
Тема магистерской диссертации – «История русской философии в информационной среде», в рамках которой было проведено исследование с использованием количественного метода сбора данных в информационной среде интернет-ресурсов. Цель исследования – выяснить популярность истории русской философии среди пользователей Интернета. Исследование состоит из двух частей, первая часть включает в себя теоретическое описание информационной среды. Вторая часть состоит из данных, собранных с интернет-ресурсов, и их интерпретации. Используя аналитические интернет-сервисы: «https://be1.ru/» и «https://www.liveinternet.ru/», мы проанализировали 5 популярных интернет-ресурсов: «https://ilibrary.ru/», «http://Lib.ru», «https://filosof.historic.ru», «https://arzamas.academy/» и «https://platona.net/», используя количественный метод, мы получили результаты, которые показывают, что история русской философии является популярным и востребованным предметом среди пользователей Интернета. Данное исследование уникально тем, что впервые мы получим ответ на вопрос, насколько история русской философии востребована современными пользователями Интернета. / The subject of the master's thesis is «history of Russian philosophy in the information environment», in within the was conducted research using a quantitative method of data collection in the information environment of Internet resources. The purpose of the research is to find out the popularity of the history of Russian philosophy among Internet users. The study consists of two parts, the first part includes a theoretical description of the information environment. The second part consists of data collected from Internet resources and their interpretation. By using analytical Internet services: «https://be1.ru/» and «https://www.liveinternet.ru/», we analyzed 5 popular Internet resources: «https://ilibrary.ru/», «http://Lib.ru», «https://filosof.historic.ru», https://arzamas.academy/» and «https://platona.net/», using the quantitative method, we obtained results that show that the history of Russian philosophy is a popular and popular subject among Internet users. The research is unique because for the first time we will get an answer to the question of how much the history of Russian philosophy is in demand by modern Internet users.
|
28 |
IDS---Intelligent Dougong System: A Knowledge-based and Graphical Simulation of Construction Processes of China’s Song-style Dougong SystemHao, Shilun January 2014 (has links)
No description available.
|
29 |
Using Virtual Reality to Produce 3-D Graphical Simulation of the Construction and Use of Dougong in Chinese Architecture Emphasizing the Song and Qing DynastiesHao, Shilun 18 September 2018 (has links)
No description available.
|
30 |
A networked multi-agent combat model : emergence explainedYang, Ang, Information Technology & Electrical Engineering, Australian Defence Force Academy, UNSW January 2007 (has links)
Simulation has been used to model combat for a long time. Recently, it has been accepted that combat is a complex adaptive system (CAS). Multi-agent systems (MAS) are also considered as a powerful modelling and development environment to simulate combat. Agent-based distillations (ABD) - proposed by the US Marine Corp - are a type of MAS used mainly by the military for exploring large scenario spaces. ABDs that facilitated the analysis and understanding of combat include: ISAAC, EINSTein, MANA, CROCADILE and BactoWars. With new concepts such as networked forces, previous ABDs can implicitly simulate a networked force. However, the architectures of these systems limit the potential advantages gained from the use of networks. In this thesis, a novel network centric multi-agent architecture (NCMAA) is pro-posed, based purely on network theory and CAS. In NCMAA, each relationship and interaction is modelled as a network, with the entities or agents as the nodes. NCMAA offers the following advantages: 1. An explicit model of interactions/relationships: it facilitates the analysis of the role of interactions/relationships in simulations; 2. A mechanism to capture the interaction or influence between networks; 3. A formal real-time reasoning framework at the network level in ABDs: it interprets the emergent behaviours online. For a long time, it has been believed that it is hard in CAS to reason about emerging phenomena. In this thesis, I show that despite being almost impossible to reason about the behaviour of the system by looking at the components alone because of high nonlinearity, it is possible to reason about emerging phenomena by looking at the network level. This is undertaken through analysing network dynamics, where I provide an English-like reasoning log to explain the simulation. Two implementations of a new land-combat system called the Warfare Intelligent System for Dynamic Optimization of Missions (WISDOM) are presented. WISDOM-I is built based on the same principles as those in existing ABDs while WISDOM-II is built based on NCMAA. The unique features of WISDOM-II include: 1. A real-time network analysis toolbox: it captures patterns while interaction is evolving during the simulation; 2. Flexible C3 (command, control and communication) models; I 3. Integration of tactics with strategies: the tactical decisions are guided by the strategic planning; 4. A model of recovery: it allows users to study the role of recovery capability and resources; 5. Real-time visualization of all possible information: it allows users to intervene during the simulation to steer it differently in human-in-the-loop simulations. A comparison between the fitness landscapes of WISDOM-I and II reveals similarities and differences, which emphasise the importance and role of the networked architecture and the addition of strategic planning. Lastly but not least, WISDOM-II is used in an experiment with two setups, with and without strategic planning in different urban terrains. When the strategic planning was removed, conclusions were similar to traditional ABDs but were very different when the system ran with strategic planning. As such, I show that results obtained from traditional ABDs - where rational group planning is not considered - can be misleading. Finally, the thesis tests and demonstrates the role of communication in urban ter-rains. As future warfighting concepts tend to focus on asymmetric warfare in urban environments, it was vital to test the role of networked forces in these environments. I demonstrate that there is a phase transition in a number of situations where highly dense urban terrains may lead to similar outcomes as open terrains, while medium to light dense urban terrains have different dynamics
|
Page generated in 0.0973 seconds