• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 19
  • 19
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Datensicherheit trotz transparenter Güterströme / Kooperative Zugriffskontrolle für den Lieferketten-übergreifenden Einsatz automatisch erfasster Produktdaten

Schill, Alexander, Grummt, Eberhard 23 February 2010 (has links) (PDF)
Die firmenübergreifende Datenintegration automatisch erfasster, produktbezogener Ereignisse ermöglicht eine verbesserte Sicht auf logistische Prozesse. Unternehmen möchten die dazu notwendige Weitergabe von durch sie erfassten Ereignissen jedoch attributgenau kontrollieren können. Da durch die Verkettung von Ereignissen aus mehreren Quellen Lieferbeziehungen zwischen Firmen ermittelt werden können, kann die Herausgabe von Ereignissen durch eine Firma die Sicherheitsanforderungen anderer Firmen verletzen. Ausgehend von einer Problemanalyse stellt dieser Beitrag ein Zugriffskontrollsystem vor, das solche externen Sicherheitsanforderungen in den Zugriffskontrollprozess einbeziehen kann. Es unterstützt die regelbasierte Delegation der Entscheidungsgewalt an Partnerunternehmen und die Kombination mehrerer Entscheidungen. / The cross-company integration of automatically recorded product- related events enables an improved view of logistic processes. The individual companies, however, often strive to control the necessary information dissemination at attribute granularity. As the linking of events from different sources may permit business relationships between companies to be inferred, the dissemination of data acquired locally by one company might well violate the security requirements of other companies. Based on a problem analysis, this paper introduces an access control system which is able to accommodate such external security requirements. The system supports both rulebased delegation of the right to decide on access requests and combinations of multiple decisions.
2

Bewertung von Altmaschinen nach BetrSichV

Unger, Holger, Wieland, Katja 05 December 2017 (has links) (PDF)
Für Alt- und Gebrauchtmaschinen gelten spezielle Regelungen für die sicherheitsgerechte Gestaltung. Nicht selten müssen derartige Maschinen Einzelfallprüfungen standhalten, um explizit die rechtlichen Gegebenheiten anwenden zu können. Zu beachten ist dabei, dass gemäß § 5 Abs. 3 BetrSichV nur solche Arbeitsmittel zur Verfügung gestellt und verwendet werden „die den für sie geltenden Rechtsvorschriften über Sicherheit und Gesundheitsschutz entsprechen.“ Maschinen die „für eigene Zwecke selbst hergestellt wurden, müssen den grundlegenden Sicherheitsanforderungen der anzuwendenden Gemeinschaftsrichtlinien entsprechen.“ Für Maschinen die "wesentlich verändert" wurden, muss ein entsprechendes Konformitätsbewertungsverfahren gemäß der Maschinenrichtlinie 2006/42/EG durchgeführt werden.
3

Development of an engraving machineby designing a protection cabin for laser marking

Azman, Ahmet, Meradi, Sabra January 2013 (has links)
The “Development of an existing engraving machine by designing a protection cabin for laser marking”project consists of the achievement of a protection cabin for a marking laser by applying the theory and the experience acquired during the courses in Mechanical Engineering program. Degree project is made with the Maskinteknik i Oskharsham AB by the Mechanical Engineering student, Ahmet Azman and Sabra Meradi. This protection cabin is design for the Deckel GK 21 engraving machine that company already bought it several years ago. The safety requirements for laser protection cabin shown in IEC and ISO standard will be observed. The design process explained in the GETTING DESIGN RIGHT: A Systems Approach book will be followed to achieve this project. Six steps of this method are followed: Define the problem, Measure the needs and set targets, Explore the design space, Optimize design choices, Develop the architecture, Validate the project.
4

Bewertung von Altmaschinen nach BetrSichV

Unger, Holger, Wieland, Katja 05 December 2017 (has links)
Für Alt- und Gebrauchtmaschinen gelten spezielle Regelungen für die sicherheitsgerechte Gestaltung. Nicht selten müssen derartige Maschinen Einzelfallprüfungen standhalten, um explizit die rechtlichen Gegebenheiten anwenden zu können. Zu beachten ist dabei, dass gemäß § 5 Abs. 3 BetrSichV nur solche Arbeitsmittel zur Verfügung gestellt und verwendet werden „die den für sie geltenden Rechtsvorschriften über Sicherheit und Gesundheitsschutz entsprechen.“ Maschinen die „für eigene Zwecke selbst hergestellt wurden, müssen den grundlegenden Sicherheitsanforderungen der anzuwendenden Gemeinschaftsrichtlinien entsprechen.“ Für Maschinen die "wesentlich verändert" wurden, muss ein entsprechendes Konformitätsbewertungsverfahren gemäß der Maschinenrichtlinie 2006/42/EG durchgeführt werden.:1. Einführung 2. Rechtliche Grundlagen 3. Gefährdungsbeurteilung
5

Datensicherheit trotz transparenter Güterströme: Datensicherheit trotz transparenter Güterströme: Kooperative Zugriffskontrolle für den Lieferketten-übergreifenden Einsatz automatisch erfasster Produktdaten

Schill, Alexander, Grummt, Eberhard 23 February 2010 (has links)
Die firmenübergreifende Datenintegration automatisch erfasster, produktbezogener Ereignisse ermöglicht eine verbesserte Sicht auf logistische Prozesse. Unternehmen möchten die dazu notwendige Weitergabe von durch sie erfassten Ereignissen jedoch attributgenau kontrollieren können. Da durch die Verkettung von Ereignissen aus mehreren Quellen Lieferbeziehungen zwischen Firmen ermittelt werden können, kann die Herausgabe von Ereignissen durch eine Firma die Sicherheitsanforderungen anderer Firmen verletzen. Ausgehend von einer Problemanalyse stellt dieser Beitrag ein Zugriffskontrollsystem vor, das solche externen Sicherheitsanforderungen in den Zugriffskontrollprozess einbeziehen kann. Es unterstützt die regelbasierte Delegation der Entscheidungsgewalt an Partnerunternehmen und die Kombination mehrerer Entscheidungen. / The cross-company integration of automatically recorded product- related events enables an improved view of logistic processes. The individual companies, however, often strive to control the necessary information dissemination at attribute granularity. As the linking of events from different sources may permit business relationships between companies to be inferred, the dissemination of data acquired locally by one company might well violate the security requirements of other companies. Based on a problem analysis, this paper introduces an access control system which is able to accommodate such external security requirements. The system supports both rulebased delegation of the right to decide on access requests and combinations of multiple decisions.
6

Coordenação de dispositivos de proteção contra surtos em baixa tensão: ênfase instalações nucleares. / Low-voltage surge pretective device coordination: emphasis nuclear facilities.

Borsoi, Sad Sandrini 15 December 2017 (has links)
O trabalho apresenta uma metodologia aplicável à coordenação de dispositivos de proteção contra surtos em sistemas de corrente alternada de baixa tensão. Esta tem como base a adequação dos níveis de isolamento e imunidade dos equipamentos elétricos e eletrônicos e de energia absorvida pelos dispositivos de proteção. A principal motivação está relacionada aos critérios de segurança e confiabilidade requeridos por instalações nucleares, em que a coordenação da proteção contra surtos assume um importante papel. Uma metodologia interativa é implementada visando otimizar o processo de análise e especificação dos dispositivos de proteção, considerando a adoção de métodos analíticos e numéricos. Modelos de equipamentos elétricos e eletrônicos, quando submetidos a surtos de tensão e corrente, além dos dispositivos de proteção contra surtos, são implementados no simulador de transitórios eletromagnéticos - ATP. Destacam-se nestes estudos, as análises de configurações e arranjos do sistema elétrico, assim como seus parâmetros, a influência destes na configuração ou arranjo ótimo dos dispositivos de proteção, além do atendimento aos requisitos das normas aplicáveis. / The work presents a methodology regarding to low-voltage surge protective device coordination. This is based on adequacy of the isolation and immunity level of electrical and electronic equipment and the energy absorbed by the protective devices. The main motivation is related to the required nuclear plant reliability and safety criteria, in whose the surge protection coordination can assume an important role. An interactive methodology is carried out to optimize the analysis and the protection device specification, considering the adoption of analytical and numerical methods. Electrical and electronic equipment models, when submitted to voltage and current surges, in addition to surge protective devices, are implemented in the electromagnetic transient simulator - ATP. In these studies, the analysis of electrical system configurations and arrangements, as well as their parameters, and their influence on the configuration or optimum protective device arrangement, besides compliance with the requirements of applicable standards are highlighted.
7

Coordenação de dispositivos de proteção contra surtos em baixa tensão: ênfase instalações nucleares. / Low-voltage surge pretective device coordination: emphasis nuclear facilities.

Sad Sandrini Borsoi 15 December 2017 (has links)
O trabalho apresenta uma metodologia aplicável à coordenação de dispositivos de proteção contra surtos em sistemas de corrente alternada de baixa tensão. Esta tem como base a adequação dos níveis de isolamento e imunidade dos equipamentos elétricos e eletrônicos e de energia absorvida pelos dispositivos de proteção. A principal motivação está relacionada aos critérios de segurança e confiabilidade requeridos por instalações nucleares, em que a coordenação da proteção contra surtos assume um importante papel. Uma metodologia interativa é implementada visando otimizar o processo de análise e especificação dos dispositivos de proteção, considerando a adoção de métodos analíticos e numéricos. Modelos de equipamentos elétricos e eletrônicos, quando submetidos a surtos de tensão e corrente, além dos dispositivos de proteção contra surtos, são implementados no simulador de transitórios eletromagnéticos - ATP. Destacam-se nestes estudos, as análises de configurações e arranjos do sistema elétrico, assim como seus parâmetros, a influência destes na configuração ou arranjo ótimo dos dispositivos de proteção, além do atendimento aos requisitos das normas aplicáveis. / The work presents a methodology regarding to low-voltage surge protective device coordination. This is based on adequacy of the isolation and immunity level of electrical and electronic equipment and the energy absorbed by the protective devices. The main motivation is related to the required nuclear plant reliability and safety criteria, in whose the surge protection coordination can assume an important role. An interactive methodology is carried out to optimize the analysis and the protection device specification, considering the adoption of analytical and numerical methods. Electrical and electronic equipment models, when submitted to voltage and current surges, in addition to surge protective devices, are implemented in the electromagnetic transient simulator - ATP. In these studies, the analysis of electrical system configurations and arrangements, as well as their parameters, and their influence on the configuration or optimum protective device arrangement, besides compliance with the requirements of applicable standards are highlighted.
8

FE safety analysis of a high speed wood planer cutter. An alternative method to achieve the requirements of EN847 standard / FE safety analysis of a high speed wood planer cutter. An alternative method to achieve the requirements of EN847 standard

Marques Novo, Francisco José, Saraiva Rézio, Henrique Manuel January 2004 (has links)
<p>In the last decades, high speed cutting has become an attractive technology in the wood industry. The possibility of reducing global costs in addiction with an increase in productivity, were the main reasons for the enlargement of the use of this technology. </p><p>As usual, these advantages are accompanied by disadvantages that should be carefully analyzed. If on the one hand cutting forces are reduced with increasing cutting speeds, on the other hand, the centrifugal forces affecting the tool are higher. Exposed to such high loads, there is a considerable risk of tool failure that embeds hazards for both machine and workers. </p><p>To prevent the risk of accidents and to guarantee safety in use, security standards have been implemented in industrial fields, imposing specific experimental tests, with defined procedure modes. Accordingly with these standards, the results obtained through the tests should fall inside limited ranges. The experimental tests suggested on the European Standards are intended to simulate the real working conditions of a rotating cutting tool, where extreme centrifugal forces are imposed by the high values of speed. Although their main importance, these destructive tests aren’t always practicable. It happens, for instance, with tools produced in small batch sizes, or as an ascertainment for the fail-critical speed during the development stage, or even due to physical incompatibilities between the tool and the laboratory testmachines. </p><p>The high value of weight associated with the cutting tool prototype developed and patented by Verktygs Larsson AB was an impediment to run the laboratorial tests specified by the standards, forcing the company to find a new way to assure the safety requirements of their product. </p><p>The main goal of this project was the development of an alternative method based on finite element theory to perform a safety analysis to the prototype of a wood cutter. This tool is used as a component in high speed planers. </p><p>In addiction to this primary objective, some considerations were made about other available models, with increased dimensions or even with different parameters. If there was the need, design changes could be assumed in order to guarantee that the tool reached the requisites of the safety standards. Considering an optimization effort, material changes would also be considered, to aim in the direction of reducing the tool weight and the consequent centrifugal forces.</p>
9

FE safety analysis of a high speed wood planer cutter. An alternative method to achieve the requirements of EN847 standard / FE safety analysis of a high speed wood planer cutter. An alternative method to achieve the requirements of EN847 standard

Marques Novo, Francisco José, Saraiva Rézio, Henrique Manuel January 2004 (has links)
In the last decades, high speed cutting has become an attractive technology in the wood industry. The possibility of reducing global costs in addiction with an increase in productivity, were the main reasons for the enlargement of the use of this technology. As usual, these advantages are accompanied by disadvantages that should be carefully analyzed. If on the one hand cutting forces are reduced with increasing cutting speeds, on the other hand, the centrifugal forces affecting the tool are higher. Exposed to such high loads, there is a considerable risk of tool failure that embeds hazards for both machine and workers. To prevent the risk of accidents and to guarantee safety in use, security standards have been implemented in industrial fields, imposing specific experimental tests, with defined procedure modes. Accordingly with these standards, the results obtained through the tests should fall inside limited ranges. The experimental tests suggested on the European Standards are intended to simulate the real working conditions of a rotating cutting tool, where extreme centrifugal forces are imposed by the high values of speed. Although their main importance, these destructive tests aren’t always practicable. It happens, for instance, with tools produced in small batch sizes, or as an ascertainment for the fail-critical speed during the development stage, or even due to physical incompatibilities between the tool and the laboratory testmachines. The high value of weight associated with the cutting tool prototype developed and patented by Verktygs Larsson AB was an impediment to run the laboratorial tests specified by the standards, forcing the company to find a new way to assure the safety requirements of their product. The main goal of this project was the development of an alternative method based on finite element theory to perform a safety analysis to the prototype of a wood cutter. This tool is used as a component in high speed planers. In addiction to this primary objective, some considerations were made about other available models, with increased dimensions or even with different parameters. If there was the need, design changes could be assumed in order to guarantee that the tool reached the requisites of the safety standards. Considering an optimization effort, material changes would also be considered, to aim in the direction of reducing the tool weight and the consequent centrifugal forces.
10

From Formal Requirement Analysis to Testing and Monitoring of Cyber-Physical Systems

January 2017 (has links)
abstract: Cyber-Physical Systems (CPS) are being used in many safety-critical applications. Due to the important role in virtually every aspect of human life, it is crucial to make sure that a CPS works properly before its deployment. However, formal verification of CPS is a computationally hard problem. Therefore, lightweight verification methods such as testing and monitoring of the CPS are considered in the industry. The formal representation of the CPS requirements is a challenging task. In addition, checking the system outputs with respect to requirements is a computationally complex problem. In this dissertation, these problems for the verification of CPS are addressed. The first method provides a formal requirement analysis framework which can find logical issues in the requirements and help engineers to correct the requirements. Also, a method is provided to detect tests which vacuously satisfy the requirement because of the requirement structure. This method is used to improve the test generation framework for CPS. Finally, two runtime verification algorithms are developed for off-line/on-line monitoring with respect to real-time requirements. These monitoring algorithms are computationally efficient, and they can be used in practical applications for monitoring CPS with low runtime overhead. / Dissertation/Thesis / Doctoral Dissertation Computer Science 2017

Page generated in 0.0791 seconds