• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 35
  • 18
  • 9
  • 8
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 116
  • 116
  • 49
  • 32
  • 24
  • 21
  • 20
  • 19
  • 17
  • 15
  • 13
  • 13
  • 13
  • 13
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

A simulative analysis of the robustness of Smart Grid networks and a summary of the security aspects

Kubler, Sarah Marie January 1900 (has links)
Master of Science / Department of Electrical and Computer Engineering / Caterina M. Scoglio / The need for reliable and quick communication in the power grid is growing and becoming more critical. With the Smart Grid initiative, an increasing number of intelligent devices, such as smart meters and new sensors, are being added to the grid. The traffic demand on the communications network increases as these new devices are being added. This can cause issues such as longer delay, dropped packets, and equipment failure. The power grid relies on this data to function properly. The power grid will lose reliability and will not be able to provide customers with power unless it has correct and timely data. The current communications network architecture needs to be evaluated and improved. In this thesis, a simulator program is developed to study the communications network. The simulation model is written in C++ and models the components of the communications network. The simulation results provide insight on how to design the communications network in order for the system to be robust from failures. We are using the simulator to study different topologies of the communications network. The communications network often has a simular topology to the power grid. This is because of right-a-ways and ownership of equipment. Modifying the topology of the communications network slightly can improve the performance of the network. Security of the communications network is a very important aspect. There is a risk of successful attacks on the communications network without the implementation of security protocols. Attacks can come from malicious users of the communications network or from entities outside the network. These attacks may lead to damaged equipment, loss of power to consumers, network overload, loss of data, and loss of privacy. This thesis presents a short overview of the major issues related to the security of the communications network. The department of Electrical and Computer Engineering (ECE) at Kansas State University (K-State) is working on developing a Smart Grid lab. Burns and McDonnell has collaborated with the ECE department at K-State to develop the Smart Grid Lab. This lab will be located inside of the ECE department. The lab will consist of both power grid equipment and network communication equipment. This thesis describes similar labs. It then describes the initial plan for the lab, which is currently in the planning stage.
22

The development of SCADA control and remote access for the Indlebe Radio Telescope

Dhaniram, Ajith Deoduth January 2016 (has links)
Submitted in fulfillment of the academic requirements for the Degree Master of Engineering (Electronic), Department of Electronic Engineering, Durban University of Technology, Durban, South Africa, 2016. / The proposed supervisory control and data acquisition solution is intended to gather data from all sub-systems and provide control commands related to the Indlebe Radio Telescope. Currently the control commands are executed from the command line prompt of the Skypipe software. These control commands are used to change the elevation angle of the antenna. The supervisory control and data acquisition system will be interfaced to sub-systems namely; a programmable logic controller, a weather station, an uninterruptible power supply and a camera. It will be used to manually or automatically control the elevation angle of the antenna, includes a menu structure that allows for easy navigation to the sub-systems and allows for trending, alarming, logging and monitoring of all system parameters. The proposed system will mitigate the lack of information on the existing system. A global system for mobile communication unit has also been installed to monitor the temperature within the Indlebe control room, detect a power failure and communicate this information to supervisors, using its short message service option. Implementing a solution of this nature means that all data from the various sub-systems are brought together, giving a single platform to monitor data and provide manual and automatic control functionality. Problem solving, understanding and maintenance of the system will also become easier. / D
23

An investigation into control techniques for cascaded plants with buffering, to minimise the influence of process disturbances and to maximise the process yield

Gryffenberg, Jolandi 12 1900 (has links)
Thesis (MScEng (Electrical and Electronic Engineering))--University of Stellenbosch, 2010. / ENGLISH ABSTRACT: The Coal to Liquid facility, Sasol, Secunda operates as a train of processes. Disturbances and capacity restrictions can occur throughout the plant and the throughput fluctuates whenever disturbances occur. When capacity restrictions occur in a subplant and more substances enter the sub-plant than can be processed, the extra substances are flared or dumped and therefore lost. To reduce losses and extra costs and to maximise the throughput of the whole plant, supervisory control is implemented over the whole plant system. Each process in the process train is controlled with regulatory controllers and the overall process is then controlled with a supervisory controller. These two sets of controllers operate in two different layers of control, with the regulatory controllers the faster inner layer. The supervisory control is the outer layer of the two control layers. The supervisory controller takes over the work of the human operator by deciding on the changes in total throughput as well as the set points for each individual process. These set points for each process are then followed with the regulatory controllers. For the regulatory control of the system, different control methods are investigated and compared. The different control methods that are looked at are PI control, Linearised State Feedback control, Fuzzy Logic control and Model Reference Adaptive Control. After an investigation into the various control methods Fuzzy Logic control was chosen for the regulatory as well as the supervisory control levels. Fuzzy Logic control is a rule based control method. Fuzzy variables are everyday terms such as very slow or nearly full. These terms are easy to understand by the operator and multi-variable control is possible with Fuzzy Logic control without an accurate mathematical representation of the system. These facts made Fuzzy Logic control ideal for this implementation. To improve the profit of the Coal to Liquid facility the throughput was maximised. The combination of regulatory and supervisory controllers minimised losses and rejected disturbances. This resulted in a smoother output with maximum profit. / AFRIKAANSE OPSOMMING: Die Steenkool-na-Olie fasiliteit, Sasol, Secunda funksioneer as ’n trein van prosesse. Versteurings en kapasiteit beperkings kan deur die hele aanleg voorkom en die deurset wissel voortdurend wanneer versteurings voorkom. Wanneer kapasiteit beperkings voorkom in ’n aanleg en meer stowwe word in die aanleg ingestuur as wat dit kan verwerk, word die ekstra stowwe gestort en dit gaan verlore. Om verliese en kostes te verminder en om die deurset van die hele aanleg te vergroot, is oorhoofse beheer geïmplementeer oor die hele stelsel. Elke proses in die trein van chemiese prosesse word beheer met regulerende beheerders. Die totale proses word dan beheer met ’n oorhoofse beheerder. Hierdie twee tipes beheerders funksioneer in twee lae van beheer met die regulerende beheerders die vinniger binneste laag. Die oorhoofse beheerder vorm die buitenste laag van die twee beheer lae en neem die werk van die menslike operateur oor deur die veranderinge in die totale deurset, sowel as die stelpunte vir elke afsonderlike proses, te bepaal. Hierdie stelpunte vir elke proses word dan met die regulerende beheerders gevolg. Verskillende beheer metodes is ondersoek vir die regulerende beheer van die stelsel. Die verskillende beheer metodes waarna gekyk word, is PI beheer, Geliniariseerde Toestands Terugvoer beheer, Wasige Logiese beheer en Model Verwysing Aanpassende beheer. Na ’n ondersoek na die verskillende beheer metodes is Wasige Logiese beheer gekies vir die regulerende asook die oorhoofse beheer. Wasige Logiese beheer is ’n reël gebasseerde beheer metode. Wasige Logika veranderlikes is alledaagse terme soos baie stadig of byna vol. Hierdie terme is maklik om te verstaan deur die operateur. Meervoudige-veranderlike beheer is moontlik met Wasige Logiese beheer sonder ’n akkurate wiskundige voorstelling van die stelsel. Hierdie feite maak Wasige Logiese beheer ideaal vir hierdie doel. Om die wins van die Steenkool-na-Olie fasiliteit te verbeter, is die deurset gemaksimeer. Die kombinasie van regulerende- en toesighoudende beheerders beperk verliese en verwerp versteurings. Dit lei tot ’n gladder uitset en ’n maksimum wins.
24

An architectural framework for describing Supervisory Control and Data Acquisition (SCADA) systems

Ward, Michael P. 09 1900 (has links)
Approved for public release; distribution is unlimited / Two recent trends have raised concerns about the security and stability of Supervisory Control and Data Acquisition (SCADA) systems. The first is a move to define standard interfaces and communications protocols in support of cross-vendor compatibility and modularity. The second is a move to connect nodes in a SCADA system to open networks such as the Internet. Recent failures of critical infrastructure SCADA systems highlight these concerns. To ensure continued operations in times of crisis, SCADA systems, particularly those operating in our critical infrastructure, must be secured. Developing an abstract generic framework for defining and understanding SCADA systems is a necessary first step. A framework can provide the tools to understand the system's functions and capabilities, and how components in the system relate and interface with each other. This thesis examines and describes SCADA systems, their components, and commonly used communications protocols. It presents a matrix approach to describing and defining the features, functions and capabilities of a SCADA system. Two small SCADA systems, using industry standard components and simulating real world applications, were designed and constructed for this thesis to provide context for applying the matrix approach. / Captain, United States Marine Corps
25

Control of Autonomous Robot Teams in Industrial Applications

Tsalatsanis, Athanasios 27 August 2008 (has links)
The use of teams of coordinated mobile robots in industrial settings such as underground mining, toxic waste cleanup and material storage and handling, is a viable and reliable approach to solving such problems that require or involve automation. In this thesis, abilities a team of mobile robots should demonstrate in order to successfully perform a mission in industrial settings are identified as a set of functional components. These components are related to navigation and obstacle avoidance, localization, task achieving behaviors and mission planning. The thesis focuses on designing and developing functional components applicable to diverse missions involving teams of mobile robots; in detail, the following are presented: 1. A navigation and obstacle avoidance technique to safely navigate the robot in an unknown environment. The technique relies on information retrieved by the robot's vision system and sonar sensors to identify and avoid surrounding obstacles. 2. A localization method based on Kalman filtering and Fuzzy logic to estimate the robot's position. The method uses information derived by multiple robot sensors such as vision system, odometer, laser range finder, GPS and IMU. 3. A target tracking and collision avoidance technique based on information derived by a vision system and a laser range finder. The technique is applicable in scenarios where an intruder is identified in the patrolling area. 4. A limited lookahead control methodology responsible for mission planning. The methodology is based on supervisory control theory and it is responsible for task allocation between the robots of the team. The control methodology considers situations where a robot may fail during operation. The performance of each functional component has been verified through extensive experimentation in indoor and outdoor environments. As a case study, a warehouse patrolling application is considered to demonstrate the effectiveness of the mission planning component.
26

Workflow Modeling Using Finite Automata

Khemuka, Atul Ravi 07 November 2003 (has links)
A Workflow is an automation of a business process. In general, it consists of processes and activities, which are represented by well-defined tasks. These include 'Office Automation,' 'Health Care' and service-oriented processes such as 'Online Reservations,' 'Online Bookstores' and 'Insurance Claims,' etc. The entities that execute these tasks are humans, application programs or database management systems. These tasks are related and dependent on one another based on business policies and rules. With rapid increases in application domains that use workflow management systems, there is a need for a framework that can be used to implement these applications. In particular, it is essential to provide a formal technique for defining a problem that can be used by various workflow software product developers. In this work, a formal framework based on finite state automata that facilitate modeling and analysis of workflows is presented. The workflow and its specifications are modeled separately as finite state automata models. We provide a general framework for specifying control flow dependencies in the context of supervisory control theory. We also identify several properties of supervisory control theory and demonstrate their use for conducting the analysis of the workflows.
27

A Framework for the Long-Term Operation of a Mobile Robot via the Internet

Shervin Emami Unknown Date (has links)
This report describes a docking system to allow autonomous battery charging of a mobile robot, and a Web interface that allows long-term unaided use of a sophisticated mobile robot by untrained Web users around the world. The docking system and Web interface are applied to the biologically inspired RatSLAM system as a foundation for testing both its long-term stability and its practicality for real-world applications. While there are existing battery charging and Web interface systems for mobile robots, the developed solution combines the two, resulting in a self-sufficient robot that can recharge its own batteries and stay accessible from the Web. Existing mobile robots on the Internet require manual charging by a human operator, leading to significant periods when the robot is offline. Furthermore, since the robot may be operational for extended periods without powering down, it may perform learning operations that require significantly longer operation than a single battery-recharge cycle would allow. The implemented Web interface makes use of the RatSLAM navigation system. RatSLAM provides the onboard intelligence for the robot to navigate to the user-supplied goal locations (such as “go to location X”), despite long paths or obstacles in the environment. The majority of the existing robot interfaces on the Internet provide direct control of the robot (such as “drive forward”) and therefore the users suffer greatly from the inherent delays of the Internet due to the time lag between performing an action and seeing the feedback. Instead, the robot in this study uses an onboard intelligent navigation system to generate all low-level commands. Due to the minimal input required to give high-level commands to the robot, the system is robust to the long and highly unpredictable delays of Internet communication. Traditional methods of autonomous battery charging for mobile robots have had limited reliability, often due to the mechanical docking system requiring a highly precise connection. Therefore, the mechanical design of the implemented battery charging system improves reliability by allowing for a significantly larger navigation error. In addition, the robot uses a standard vision sensor for both the long-range and short-range stages of navigation to the battery charger, compared to the many systems that require an omnidirectional camera and a high-resolution Laser range finder for this process. The result of this study is a public web interface at "http://ratslam.itee.uq.edu.au/robot.html" (currently offline), where any Web user in the world can watch and control the live mobile robot that is using RatSLAM for navigation, as it drives in its laboratory environment without human assistance.
28

Coherent design of uninhabited aerial vehicle operations and control stations

Gonzalez Castro, Luis Nicolas 22 May 2006 (has links)
This work presents the application of a cognitive engineering design method to the design of operational procedures and ground control station interfaces for uninhabited aerial vehicles (UAVs). Designing for UAV systems presents novel challenges, both in terms of selecting and presenting adequate information for effective teleoperation, and in creating operational procedures and ground control station interfaces that are robust to a range of UAV platforms and missions. Creating a coherent set of operating procedures, automatic functions and operator interfaces requires a systematic design approach that considers the system and the mission at different levels of abstraction and integrates the different element of the system. Several models are developed through the application of this cognitive engineering method. An analysis of the work of operating a UAV creates an abstraction decomposition space (ADS) model. The ADS helps identify the control tasks needed to operate the system. A strategies analysis then identifies methods for implementing these control tasks. The distribution of activities and roles between the human and automated components in the system is then considered in a social organization and cooperation analysis. These insights are applied to the design of coherent sets of operational procedures, ground control station interfaces and automatic functions for a specific UAV in support of a continuous target surveillance (CTS) mission. The importance of the coherence provided by the selected design method in the design of UAV operational procedures and ground control station interfaces is analyzed through a human in the loop simulation experiment for this mission. The results of the simulation experiment indicate that UAV controllers using coherently designed elements achieve significantly higher mission performance and experience lower workloads than those that when using incoherently matched elements.
29

Equipment controller design for resource monitoring and supervisory control

Du, Xiaohua 05 1900 (has links)
No description available.
30

Timed State Tree Structures: Supervisory Control and Fault Diagnosis

Saadatpoor, Ali 15 March 2010 (has links)
It is well known that the optimal nonblocking supervisory control problem of timed discrete event systems is NP-hard, subject in particular to state space explosion that is exponential in the number of system components. In this thesis, we propose to manage complexity by organizing the system as a Timed State Tree Structure (TSTS). TSTS are an adaptation of STS to timed Supervisory Control Theory (SCT). Based on TSTS we present an e±cient recursive symbolic algorithm that can perform nonblocking supervisory control design for systems of state size 10^12 and higher. Failure diagnosis is the process of detecting and identifying deviations of a system from its normal behavior using the information available through sensors. A method for fault diagnosis of the TSTS model is proposed. A state based diagnoser is constructed for each timed holon of TSTS. Fault diagnosis is accomplished using the state estimates provided by the timed holon diagnosers. The diagnosers may communicate among each other in order to update their state estimates. At any given time, only a subset of the diagnosers are operational, and as a result, instead of the entire model of the system, only the models of the timed holons associated with the operational diagnosers are used. It is shown that the computational complexity of constructing and storing the transition systems required for diagnosis in the proposed approach is polynomial in the number of system components, whereas in the original monolithic approach the computational complexity is exponential.

Page generated in 0.0994 seconds