• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 35
  • 18
  • 9
  • 8
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 116
  • 116
  • 49
  • 32
  • 24
  • 21
  • 20
  • 19
  • 17
  • 15
  • 13
  • 13
  • 13
  • 13
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Sistema de emulação de aerogeradores para aplicação em geração distribuída de energia elétrica / Wind turbine emulation system for use in distributed power generation

Martinello, Diana 30 September 2015 (has links)
CAPES / A geração de energia a partir de fontes alternativas é na atualidade tema de inúmeras pesquisas e desenvolvimento no meio científico e industrial. A energia eólica destaca-se nesse cenário como uma das mais proeminentes alternativas na geração de energia elétrica, por suas inúmeras vantagens. Em trabalhos de pesquisa, a reprodução computacional e em bancada do comportamento de uma turbina eólica, incluindo simulação de grandezas mecânicas e elétricas, que afetam diretamente a conversão de energia, são ferramentas muito apropriadas para o desenvolvimento e estudo de novas tecnologias quanto ao aproveitamento do potencial eólico de uma determinada região. Este trabalho aborda estudos referentes ao processo de conversão de energia em sistemas eólicos para geração de energia elétrica, com a finalidade de se desenvolver uma ferramenta para emulação de turbina eólica em bancada experimental, utilizando software LabVIEW®. O objetivo desta ferramenta é emular o torque mecânico desenvolvido no eixo de uma turbina eólica operando em geração distribuída, a partir de uma bancada experimental constituída por motor de indução trifásico e gerador síncrono a imã permanente, sob diferentes condições de velocidade de vento. Tal ferramenta possui o objetivo de ser flexível para demais arranjos laboratoriais, ou seja, capaz de ser empregada em outras estruturas de emulação de geração eólica em tempo real. Uma modelagem do sistema eólico é apresentada, desde a turbina ao gerador elétrico, após uma ferramenta de simulação em ambiente Matlab/Simulink® é desenvolvida com finalidade de pré-validar o experimento em bancada, então é realizada a implementação de projeto em bancada. / Power generation from alternative sources is at present the subject of numerous research and development in science and industry. Wind energy stands out in this scenario as one of the most prominent alternative in the generation of electricity, by its numerous advantages. In research works, computer reproduction and experimental behavior of a wind turbine are very suitable tools for the development and study of new technologies and the use of wind potential of a given region. These tools generally are desired to include simulation of mechanical and electrical parameters that directly affect the energy conversion. This work presents the energy conversion process in wind systems for power generation, in order to develop a tool for wind turbine emulation testing experimental, using LabVIEW® software. The purpose of this tool is to emulate the torque developed in an axis wind turbine. The physical setup consists of a three phase induction motor and a permanent magnet synchronous generator, which are evaluated under different wind speed conditions. This tool has the objective to be flexible to other laboratory arrangements, and can be used in other wind power generation structures in real time. A modeling of the wind power system is presented, from the turbine to the electrical generator. A simulation tool is developed using Matlab/Simulink® with the purpose to pre-validate the experiment setup. Finally, the design is implemented in a laboratory setup.
92

A one-class NIDS for SDN-based SCADA systems / Um NIDS baseado em OCC para sistemas SCADA baseados em SDN

Silva, Eduardo Germano da January 2007 (has links)
Sistemas elétricos possuem grande influência no desenvolvimento econômico mundial. Dada a importância da energia elétrica para nossa sociedade, os sistemas elétricos frequentemente são alvos de intrusões pela rede causadas pelas mais diversas motivações. Para minimizar ou até mesmo mitigar os efeitos de intrusões pela rede, estão sendo propostos mecanismos que aumentam o nível de segurança dos sistemas elétricos, como novos protocolos de comunicação e normas de padronização. Além disso, os sistemas elétricos estão passando por um intenso processo de modernização, tornando-os altamente dependentes de sistemas de rede responsáveis por monitorar e gerenciar componentes elétricos. Estes, então denominados Smart Grids, compreendem subsistemas de geração, transmissão, e distribuição elétrica, que são monitorados e gerenciados por sistemas de controle e aquisição de dados (SCADA). Nesta dissertação de mestrado, investigamos e discutimos a aplicabilidade e os benefícios da adoção de Redes Definidas por Software (SDN) para auxiliar o desenvolvimento da próxima geração de sistemas SCADA. Propomos também um sistema de detecção de intrusões (IDS) que utiliza técnicas específicas de classificação de tráfego e se beneficia de características das redes SCADA e do paradigma SDN/OpenFlow. Nossa proposta utiliza SDN para coletar periodicamente estatísticas de rede dos equipamentos SCADA, que são posteriormente processados por algoritmos de classificação baseados em exemplares de uma única classe (OCC). Dado que informações sobre ataques direcionados à sistemas SCADA são escassos e pouco divulgados publicamente por seus mantenedores, a principal vantagem ao utilizar algoritmos OCC é de que estes não dependem de assinaturas de ataques para detectar possíveis tráfegos maliciosos. Como prova de conceito, desenvolvemos um protótipo de nossa proposta. Por fim, em nossa avaliação experimental, observamos a performance e a acurácia de nosso protótipo utilizando dois tipos de algoritmos OCC, e considerando eventos anômalos na rede SCADA, como um ataque de negação de serviço (DoS), e a falha de diversos dispositivos de campo. / Power grids have great influence on the development of the world economy. Given the importance of the electrical energy to our society, power grids are often target of network intrusion motivated by several causes. To minimize or even to mitigate the aftereffects of network intrusions, more secure protocols and standardization norms to enhance the security of power grids have been proposed. In addition, power grids are undergoing an intense process of modernization, and becoming highly dependent on networked systems used to monitor and manage power components. These so-called Smart Grids comprise energy generation, transmission, and distribution subsystems, which are monitored and managed by Supervisory Control and Data Acquisition (SCADA) systems. In this Masters dissertation, we investigate and discuss the applicability and benefits of using Software-Defined Networking (SDN) to assist in the deployment of next generation SCADA systems. We also propose an Intrusion Detection System (IDS) that relies on specific techniques of traffic classification and takes advantage of the characteristics of SCADA networks and of the adoption of SDN/OpenFlow. Our proposal relies on SDN to periodically gather statistics from network devices, which are then processed by One- Class Classification (OCC) algorithms. Given that attack traces in SCADA networks are scarce and not publicly disclosed by utility companies, the main advantage of using OCC algorithms is that they do not depend on known attack signatures to detect possible malicious traffic. As a proof-of-concept, we developed a prototype of our proposal. Finally, in our experimental evaluation, we observed the performance and accuracy of our prototype using two OCC-based Machine Learning (ML) algorithms, and considering anomalous events in the SCADA network, such as a Denial-of-Service (DoS), and the failure of several SCADA field devices.
93

Testing the Lumberjack Analogy: Automation, Situational Awareness, and Mental Workload

Morgan, Justin W. 30 August 2022 (has links)
No description available.
94

Exploring the Interface to Aid the Operator’s Situation Awareness in Supervisory Control of Multiple Drones / Utforska gränssnittet för att hjälpa operatörens situationsmedvetenhet vid övervakningskontroll av flera drönare

Sun, Sihan January 2022 (has links)
Unmanned Aerial Vehicles (UAVs), commonly called drones, have been applied in manifold fields recently. With the development of UAV autonomy, the next generation of drone applications is moving towards team-based, multi-drone operations. This also promotes the transition of the operator role to the supervisory control of multiple UAVs. Situation awareness (SA) is a significant concept in this aspect to evaluate human performance in complex systems. This thesis work proposes a human-system interface for monitoring multiple autonomous UAVs simultaneously by a single operator, and investigates how to decrease the impact of task switching among different UAVs on the operator’s SA. Tasks in the context of fleet mission control are defined to be of different levels of urgency. Several design strategies have been concluded to address the research question. In conclusion, the usage of similar interface layouts between different tasks is effective to generally decrease the impact of task switching. The alert system with appropriate design is a specific factor in mitigating the impact of task switching towards higher urgency tasks/interfaces. Moreover, the reasonable division of areas of the interface and proper presentation of information by their importance are significant, especially for task switching towards lower urgency tasks/interfaces. / Unmanned Aerial Vehicles (UAV), vanligtvis kallade drönare, har använts i många områden nyligen. Med utvecklingen av UAV-autonomi, går nästa generation av drönarapplikationer mot teambaserad, multi-drönarverksamhet. Detta främjar också övergången av operatörsrollen till övervakande kontroll av flera UAV. Situationsmedvetenhet (SA) är ett betydelsefullt koncept i denna aspekt för att utvärdera mänsklig prestation i komplexa system. Detta examensarbete föreslår ett gränssnitt mellan människa och system för att övervaka flera autonoma UAV:er samtidigt av en enda operatör, och undersöker hur man kan minska effekten av uppgiftsbyte mellan olika UAV:er på operatörens SA. Uppgifter i samband med kontroll av flottans uppdrag definieras till att vara av olika brådskande nivå. Flera designstrategier har tagits fram för att ta itu med forskningsfrågan. Sammanfattningsvis är användningen av liknande gränssnittslayouter mellan olika uppgifter effektivt för att generellt minska effekten av uppgiftsbyte. Varningssystemet med lämplig design är en specifik faktor för att mildra effekterna av uppgiftsbyte mot mer brådskande uppgifter/gränssnitt. Dessutom är den rimliga uppdelningen av områden i gränssnittet och korrekt presentation av information efter deras betydelse betydande, särskilt för uppgiftsbyte mot mindre brådskande uppgifter/gränssnitt.
95

Automatic Translation of Moore Finite State Machines into Timed Discrete Event System Supervisors / Automatic Translation of Moore FSM into TDES Supervisors

Mahmood, Hina January 2023 (has links)
In the area of Discrete Event Systems (DES), formal verification techniques are important in examining a variety of system properties including controllability and nonblocking. Nonetheless, in reality, most software and hardware practitioners are not proficient in formal methods which holds them back from the formal representation and verification of their systems. Alternatively, it is a common observation that control engineers are typically familiar with Moore synchronous Finite State Machines (FSM) and use them to express their controllers’ behaviour. Taking this into consideration, we devise a generic and structured approach to automatically translate Moore synchronous FSM into timed DES (TDES) supervisors. In this thesis, we describe our FSM-TDES translation method, present a set of algorithms to realize the translation steps and rules, and demonstrate the application and correctness of our translation approach with the help of an example. In order to develop our automatic FSM-TDES translation approach, we exploit the structural similarity created by the sampled-data (SD) supervisory control theory between the two models. To build upon the SD framework, first we address a related issue of disabling the tick event in order to force an eligible prohibitable event in the SD framework. To do this, we introduce a new synchronization operator called the SD synchronous product (||SD), adapt the existing TDES and SD properties, and devise our ||SD setting. We formally verify the controllability and nonblocking properties of our ||SD setting by establishing logical equivalence between the existing SD setting and our ||SD setting. We present algorithms to implement our ||SD setting in the DES research tool, DESpot. The formulation of the ||SD operator provides twofold benefits. First, it simplifies the design logic of the TDES supervisors that are modelled in the SD framework. This results in improving the ease of manually designing SD controllable TDES supervisors, and reduced verification time of the closed-loop system. We demonstrate these benefits by applying our ||SD setting to an example system. Second, it bridges the gap between theoretical supervisors and physical controllers with respect to event forcing. This makes our FSM-TDES translation approach relatively uncomplicated. Our automatic FSM-TDES translation approach enables the designers to obtain a formal representation of their controllers without designing TDES supervisors by hand and without requiring formal methods expertise. Overall, this work should increase the adoption of the SD supervisory control theory in particular, and formal methods in general, in the industry by facilitating software and hardware practitioners in the formal representation and verification of their control systems. / Dissertation / Doctor of Philosophy (PhD)
96

Supervisory Control Validation of a Fuel Cell Hybrid Bus Using Software-in-the-Loop and Hardware-in-the-Loop Techniques

Ramirez, Steven Abraham January 2013 (has links)
No description available.
97

Within Reach: The Contribution of Dynamic Viewpoint to the Perception of Remote Environments

Murphy, Taylor B. 12 December 2017 (has links)
No description available.
98

Visualization Methods and User Interface Design Guidelines for Rapid Decision Making in Complex Multi-Task Time-Critical Environments

Mahadevan, Sriram 05 May 2009 (has links)
No description available.
99

Symbolic Decentralized Supervisory Control

Agarwal, Urvashi 04 1900 (has links)
<p>A decentralized discrete-event system (DES) consists of supervisors that are physically distributed. Co-observability is one of the necessary and sufficient conditions for the existence of a decentralized supervisors that correctly solve the control problem. In this thesis we present a state-based definition of co-observability and introduce algorithms for its verification. Existing algorithms for the verification of co-observability do not scale well, especially when the system is composed of many components. We show that the implementation of our state-based definition leads to more efficient algorithms.</p> <p>We present a set of algorithms that use an existing structure for the verification of state-based co-observability (SB Co-observability). A computational complexity analysis of the algorithms show that the state-based implementation of algorithms result in quadratic complexity. Further improvements come from using a more compact way of representing finite-state machines namely Binary Decision Diagrams (BDD).</p> / Master of Science (MSc)
100

Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters

Akbar, Yousef M. A. H. 11 May 2020 (has links)
The power grid has changed a great deal from what has been generally viewed as a traditional power grid. The modernization of the power grid has seen an increase in the integration and incorporation of computing and communication elements, creating an interdependence of both physical and cyber assets of the power grid. The fast-increasing connectivity has transformed the grid from what used to be primarily a physical system into a Cyber- Physical System (CPS). The physical elements within a power grid are well understood by power engineers; however, the newly deployed cyber aspects are new to most researchers and operators in this field. The new computing and communications structure brings new vulnerabilities along with all the benefits it provides. Cyber security of the power grid is critical due to the potential impact it can make on the community or society that relies on the critical infrastructure. These vulnerabilities have already been exploited in the attack on the Ukrainian power grid, a highly sophisticated, multi-layered attack which caused large power outages for numerous customers. There is an urgent need to understand the cyber aspects of the modernized power grid and take the necessary precautions such that the security of the CPS can be better achieved. The power grid is dependent on two main cyber infrastructures, i.e., Supervisory Control And Data Acquisition (SCADA) and Advanced Metering Infrastructure (AMI). This thesis investigates the AMI in power grids by developing a testbed environment that can be created and used to better understand and develop security strategies to remove the vulnerabilities that exist within it. The testbed is to be used to conduct and implement security strategies, i.e., an Intrusion Detections Systems (IDS), creating an emulated environment to best resemble the environment of the AMI system. A DoS flooding attack and an IDS are implemented on the emulated testbed to show the effectiveness and validate the performance of the emulated testbed. / M.S. / The power grid is becoming more digitized and is utilizing information and communication technologies more, hence the smart grid. New systems are developed and utilized in the modernized power grid that directly relies on new communication networks. The power grid is becoming more efficient and more effective due to these developments, however, there are some considerations to be made as for the security of the power grid. An important expectation of the power grid is the reliability of power delivery to its customers. New information and communication technology integration brings rise to new cyber vulnerabilities that can inhibit the functionality of the power grid. A coordinated cyber-attack was conducted against the Ukrainian power grid in 2015 that targeted the cyber vulnerabilities of the system. The attackers made sure that the grid operators were unable to observe their system being attacked via Denial of Service attacks. Smart meters are the digitized equivalent of a traditional energy meter, it wirelessly communicates with the grid operators. An increase in deployment of these smart meters makes it such that we are more dependent on them and hence creating a new vulnerability for an attack. The smart meter integration into the power grid needs to be studied and carefully considered for the prevention of attacks. A testbed is created using devices that emulate the smart meters and a network is established between the devices. The network was attacked with a Denial of Service attack to validate the testbed performance, and an Intrusion detection method was developed and applied onto the testbed to prove that the testbed created can be used to study and develop methods to cover the vulnerabilities present.

Page generated in 0.0687 seconds