Dissertations / Theses on the topic 'I2C protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'I2C protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Sharma, Neena. "SERIAL PROTOCOL BRIDGE." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1352403332.
Full textRichert, Adam. "Developing a Portable System for Medicine Dosage." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-235738.
Full textProjektet som presenteras i denna rapport är tänkt att utveckla ett portabelt elektroniskt system för användning som en medicinsk pillerbehållare. Med funktionaliteten att konfigurera upp till tolv dagligen upprepande alarm är syftet med medicindoseringssystemet först och främst att påminna användaren när de ska ta sin medicin. Lysdioder och användarens egna inspelade röst som notifikationer ska implementeras för att vidare hjälpa användaren att ta rätt medicin vid varje tillfälle. Enheten ska också ha en minneslogg som sparar upp till etthundra missade doseringar, vilket gör det möjligt för auktoriserad sjukvårdspersonal att verifiera användarens följsamhet till medicineringen.En översiktlig beskrivning av funktionaliteten samt det fysiska utseendet av enheten skrevs av projektägaren Victrix AB innan projektet startades. Det som detta projekt täcker är hårdvaruoch mjukvaruutvecklingen, så väl som där tillhörande designval. Projektet siktar på att följa den föreslagna funktionalitetsspecifikationen så nära som möjligt, och samtidigt göra välgrundade val för hårdoch mjukvara med enkelhet, effektivitet, energiförbrukning och tillgänglighet i åtanke. Genom att följa specifikationen är det slutliga målet att frambringa ökad medicinföljsamhet för användare av den med det här projektet utvecklade enheten.Utvecklingen av medicindoseringssystemet föregicks av en befogad bakgrundsstudie utformad genom användningen av kvalitativa forskningsmetoder. Hårdvara att användas för en första prototyp av enheten valdes sedan baserat på den insamlade informationen om existerande teknologier och relaterat arbete. Genom grundliga tester och regelbundet informationsutbyte med kunden konstruerades en prototyp av medicindoseringssystemet baserat på en Arduinomikrokontroller. Prototypen utvärderades att uppfylla 92% av kraven som Victrix ansåg vara av hög prioritet.
Carvalho, Vicente Bueno. "Desenvolvimento e teste de um monitor de barramento I2C para proteção contra falhas transientes." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/150164.
Full textThe communication between integrated circuits has evolved in performance and reliability over the years. Initially projects used parallel buses, where there is a need for a large amount of wires, consuming many input and output pins of the integrated circuits resulting in a great susceptibility to electromagnetic interference (EMI) and electrostatic discharge (ESD). As a result, it became clear that the serial bus model had large advantage over predecessor, since it uses a smaller number of lanes, making the PCB layout process easier, which also facilitates the signal integrity allowing higher speeds despite fewer pathways. This work makes a comparison between the main low and medium speed serial protocols. The research has emphasized the positive and negative characteristics of each protocol, and as a result the framework of each of the protocols in a more appropriate market segment. The objective of this work is to use the results of comparative analysis of serial protocols to propose a hardware apparatus capable of filling a gap found in the I2C protocol, widely used in industry, but with limitations when the application requires high reliability. The apparatus, here called I2C Bus Monitor, is able to perform data integrity verification activities, to signalize metrics about the quality of communications, to detect transient faults and permanent errors on the bus and to act on the devices connected to the bus for the recovery of such errors avoiding failures. It was developed a fault injection mechanism to simulate faults in the devices connected to the bus and thus verify the monitor response. Results in the APSoC5 from Cypress show that the proposed solution has an extremely low cost overhead in terms of area and no performance impact in the communication.
Sedlář, Petr. "Digitálně řízený rezistor." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218032.
Full textTibor, Sakal. "Metoda za povezivanje mernog sistema i računarapomoću konverzije podataka iz I2S u TCP/IP protokol." Phd thesis, Univerzitet u Novom Sadu, Tehnički fakultet Mihajlo Pupin u Zrenjaninu, 2017. https://www.cris.uns.ac.rs/record.jsf?recordId=103839&source=NDLTD&language=en.
Full textThis doctoral thesis presents the research work carried out in order to solve a practical problem, the realization of a connection between a medical measuring device and a personal computer. The result of the research is a general method that provides efficient data conversion from the I2S protocol to the TCP/IP protocol.
Studený, Radim. "Simulátor komunikace protokolů SCADA." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377061.
Full textIqbal, Zeeshan. "Self-Organizing Wireless Sensor Networks For Inter-Vehicle Communication." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-230.
Full textNow a day, one of the most attractive research topics in the area of Intelligent Traffic Control is
Inter-vehicle communication (V2V communication). In V2V communication, a vehicle can
communicate to its neighbouring vehicles even in the absence of a central Base Station. The
concept of this direct communication is to send vehicle safety messages one-to-one or one-to-
many vehicles via wireless connection. Such messages are usually short in length and have very
short lifetime in which they must reach the destination. The Inter-vehicle communication system
is an ad-hoc network with high mobility and changing number of nodes, where mobile nodes
dynamically create temporary sensor networks and transferring messages from one network to
others by using multiple hops due to limitation of short range.
The goal of the project is to investigate some basic research questions in order to organize such
sensor networks and at the same time highlight the appropriate routing protocol that support
mobile ad hoc networks in an efficient and reliable manner.
In our investigation, we have answered the technical issues in order to construct a V2V
communication system. We have also studied some mobile ad hoc network routing protocols in
detail and then selected the DSR (Dynamic Source Routing) for our V2V communication and
then simulated it according to our system requirements. We are quite satisfied by the result of
DSR, but at the same time much more work is required to come up with an absolute application
for the end user.
Agrawal, Ambuj. "Implementation of Application Layer Protocol for an Active RFID System." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/34961.
Full textMaster of Science
Kopecký, Miroslav. "Univerzální převodník komunikačních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-217914.
Full textDitrych, Marek. "Problematika vyhodnocování blokovacích podmínek rozvodny pomocí GOOSE zpráv." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400562.
Full textHorych, Vladimír. "Analýza řídících protokolů využívaných v průmyslových aplikacích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218084.
Full textEngstrand, Johan. "A 3D-printed Fat-IBC-enabled prosthetic arm : Communication protocol and data representation." Thesis, Uppsala universitet, Fasta tillståndets elektronik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420051.
Full textPekárek, Dominik. "Popis a testování komunikačních protokolů normy IEC 60870-5-103 a 60870-5-104." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-319300.
Full textDzurňák, Tomáš. "Analyzátor protokolu čipových karet." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236947.
Full textQuintana, Pando María Elena. "Migración de una red industrial para subestaciones eléctricas al protocolo IEC 61850." Bachelor's thesis, Pontificia Universidad Católica del Perú, 2012. http://tesis.pucp.edu.pe/repositorio/handle/123456789/1300.
Full textTesis
Silva, Lázaro Eduardo da. "Sistema embarcado inteligente para detecção de intrusão em subestações de energia elétrica utilizando o Protocolo OpenFlow." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/18/18154/tde-11112016-085936/.
Full textThe IEC-61850 made it possible to integrate equipments of electric power system substations to a high-speed Ethernet data communication network. Its main goal is the interconnection of IEDs for the automation of processes in an electrical system. The contributions of this protocol for the integration of the control and supervision of the electrical system are diverse, although an Ethernet network exposes the electrical system for cyber attacks. The IEC-62351 states a series of recommendations to provide security to the communication network of the electrical system, such as the communication network management, the analysis of GOOSE messages and the use of intrusion detection systems. This study describes the development of an IDS that meets the security requirements proposed by the IEC-62351 standard to identify attacks on communication between GOOSE messages exchanged by electrical equipment using IEC-61850. For the development of this application, fields of the GOOSE messages were identified, in order to recognize the expected values in different power system operating conditions. Behaviour patterns were determined to detect false messages on the communication network. A real-time embedded operating system on ZYBO was installed and configured, as well as the OpenMul controller to manage the communication network of the substation through the OpenFlow protocol, performing optimizations for multicast traffic. A detection system and block tamper GOOSE messages, using the OpenFlow protocol for control of the electrical system communication network, were developed. In addition, an intelligent system using an Artificial Neural Network (ANN) Nonlinear Autoregressive Model with Exogenous Input (NARX) for predicting of the GOOSE messages traffic and the detection of Distributed Deny of Service attack (DDOS) were also developed. The results obtained show that the OpenFlow protocol may be a valuable tool for network control, however, manufacturers should maturely carry on with its implementation in the switches, so that it be used in substation communication networks. The traffic prediction system of the GOOSE messages presented interesting benefits for the security of the communication network, demonstrating potential to built a DDOS attack detection system performed by GOOSE messages on the communication network of electric power substations.
Toscano, Palacios Marco Antonio. "Automatización de una Subestación Eléctrica utilizando el Protocolo IEC 61850 y el ICCP para el envio de Datos." Bachelor's thesis, Universidad Ricardo Palma, 2010. http://cybertesis.urp.edu.pe/handle/urp/66.
Full textCastanheira, Fábio Mendes. "Desenvolvimento de uma aparelhagem de auditoria energética de sistemas eléctricos." Master's thesis, Universidade da Beira Interior, 2010. http://hdl.handle.net/10400.6/3836.
Full textRigi, Aref, and Bahnam Jura. "Analys av standarden IEC 61850 för styrning av elkraftsystem." Thesis, KTH, Hälsoinformatik och logistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-253006.
Full textOn behalf of the Swedish Transport Administration (Trafikverket), this report aims to provide a recommendation based on a comparison of the current communication protocol standard IEC 60870-5-104 and the alternative standard IEC 61850. This study compares IEC 61850 and IEC 60870-5-104 and differences between these two standards based on different areas such as communication, security and economic aspects. In the theoretical part of this thesis, the electricity grid is treated and how electricity stations generally work based on the communication protocols and how the systems communicate with other devices. The result of the thesis shows that the standard IEC 61850 offers great opportunities and advantages in all aspects and has a potential for development. With the communication protocol IEC 61850, more information is obtained in form of error type, direct measurements and control at control plants. However, there is a complexity in IEC 61850 which may require major adaptations to replace previous protocols on plants when changes are needed. Based on the safety aspect, IEC 61850 shows strength among other things regarding protection of privacy and confidentiality. Overall, the work shows that there is a great advantage of applying IEC 61850 in future use based on this thesis results.
Kabir-Querrec, Maëlle. "Cyber sécurité des systèmes industriels pour les smart-grids : détection d'intrusion dans les réseaux de communication IEC 61850." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT032/document.
Full textInformation and Communication Technologies have been pervading Industrial Automation and Control Systems (IACS) for a few decades now. Initially, IACS ran proprietary protocols on closed networks, thus ensuring some level of security through obscurity and isolation. Technologies and usages have evolved and today this intrinsic security does not exist any longer, though. This transition is in progress in the electricity domain, the power infrastructure turning into the "smart grid".The IEC 61850 standard is key to the smart grid development. It is aimed at making interoperability possible in ``Communication networks and systems for power utility automation''. It thus defines a common data object model and a stack of protocols answering different purposes.Although the cyber risk in IACS is now widely acknowledged, IEC 61850 does not address cyber security in any way whatsoever.This work tackles the question of cyber security through network intrusion detection in IEC 61850 networks, and more specifically in real-time GOOSE communications. The idea is to get the most out of the protocol specifications and system configuration while developing a tailored NIDS. This enables detection accuracy
Meireles, Tiago Hipkin. "Wireless protocols to support vehicular safety applications." Doctoral thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/16287.
Full textIn the last decades the number of vehicles travelling in European road has raised significantly. Unfortunately, this brought a very high number of road accidents and consequently various injuries and fatalities. Even after the introduction of passive safety systems, such as seat belts, airbags, and some active safety systems, such as electronic brake system (ABS) and electronic stabilization (ESP), the number of accidents is still too high. Approximately eight per cent of the fatal accidents occur in motorways, in the Portuguese case, the number of fatalities has remained constant in the first decade of the 21st century. The evolution of wireless communications, along with the north-American and European policies that reserve spectrum near the 5,9GHz band for safety applications in the vehicular environment, has lead to the development of several standards. Many of these applications are based on the possibility of using a wireless communication system to warn drivers and passengers of events occurring on the road that can put at risk their own safety. Some examples of safety applications are the hard-brake warning, the wrong-way warning and the accident warning. This work aims to contribute in defining a communication protocol that guarantees the timely dissemination of safety critical events, occurring in scenarios with a high number of vehicles or in the neighbourhood of so called motorway “blackspots”, to all vehicles in the zone of interest. To ensure information integrity and user trust, the proposed system is based on the motorway infrastructure, which will validate all events reported by the vehicles with the usage of several means, such as video surveillance or other sensors. The usage of motorway infrastructure that has full motorway coverage using fixed stations also known as road side units, allows to have a global vision of the interest zone, avoiding the problems associated to networks that depend solely on vehicle to vehicle communication, generally total ad-hoc networks. By using the infrastructure, it is possible to control medium access, avoiding possible badly intended intrusions and also avoiding the phenomenon known as alarm showers or broadcast storm that occur when all vehicles want to simultaneously access the medium to warn others of a safety event. The thesis presented in this document is that it is possible to guarantee in time information about safety events, using an architecture where the road side units are coordinated among themselves, and communicate with on board units (in vehicles) that dynamically register and deregister from the system. An exhaustive and systematic state of the art of safety applications and related research projects is done, followed by a study on the available wireless communications standards that are able to support them. The set of standards IEEE802.11p and ETSI-G5 was created for this purpose and is found to be the more adequate, but care is taken to define a scenario where WAVE enabled and non-enabled vehicles can coexist. The WAVE medium access control protocol suffers from collision problems that do not guarantee a bounded delay, therefore a new protocol (V-FTT) is proposed, based on the adaptation of the Flexible Time Triggered protocol to the vehicular field. A theoretical analysis of the V-FTT applied to WAVE and ETSI-G5 is done, including quantifying a real scenario based on the A5 motorway from Lisbon to Cascais, one of the busiest Portuguese motorways. We conclude the V-FTT protocol is feasible and guarantees a bounded delay.
Nas últimas décadas tem-se assistido a um aumento do número de veículos a circular nas vias rodoviárias europeias, trazendo consigo um elevado número de acidentes e como consequência muitos feridos e vítimas mortais. Apesar da introdução de sistemas de segurança passivos, tais como cintos de segurança, airbags e de alguns sistemas de segurança activos, tais como o sistema electrónico de travagem (ABS) e o sistema electrónico de estabilidade (ESP), o número de acidentes continua a ser demasiado elevado. Aproximadamente oito por cento dos acidentes fatais na Europa ocorrem em auto-estradas, no caso Português, o número de vítimas mortais tem-se mantido constante ao longo da primeira década do século XXI. A evolução das comunicações sem fios, acompanhada de políticas europeias e norte-americanas no sentido de reservar frequências próximas dos 5,9GHz para aplicações de segurança no ambiente veicular, levou à especificação de várias normas. A maior parte destas aplicações baseiam-se na possibilidade de usar um sistema confiável de comunicação sem fios para alertar os condutores e passageiros de veículos para eventos ocorridos nas estradas que possam colocar em risco a sua segurança. Exemplos de aplicações de segurança crítica são o aviso de travagem brusca, o aviso de veículo em contra mão e o aviso de acidente na estrada. Este trabalho contribui para a definição de protocolos de comunicação capazes de garantir que a informação sobre eventos relacionados com situações de segurança crítica, que ocorram em cenários com um elevado número de veículos em zonas urbanas ou na vizinhança dos chamados “pontos negros” das auto-estradas, é disseminada com pontualidade por todos os veículos localizados na zona de interesse Por uma questão da integridade das comunicações e confiança dos condutores, o sistema proposto baseia-se na infra-estrutura do concessionário da auto-estrada, que validará os eventos reportados pelos veículos usando vários meios à sua disposição, como por exemplo sistemas de videovigilância e outros sensores. O uso de uma infra-estrutura de comunicações, que dispõe de cobertura integral a partir de estações fixas, permite uma visão global da zona coberta, evitando os problemas associados a redes baseadas apenas na comunicação entre veículos, que são em geral totalmente ad-hoc. O uso da infra-estrutura permite, entre outras vantagens, controlar o acesso ao meio, evitando simultaneamente intrusões de estranhos ao sistema e o fenómeno conhecido como “chuva de alarmes” desencadeado quando todos os veículos querem aceder simultaneamente ao meio para avisar os restantes da existência dum evento de segurança crítica. A tese apresentada neste documento defende que é possível garantir informação atempada sobre eventos que põem em risco a segurança dos veículos a partir de uma arquitectura de interligação entre as estações de comunicações fixas, coordenadas entre si, e unidades móveis (veículos) que se registam e se desligam dinamicamente do sistema. Nesta tese faz-se um levantamento exaustivo e sistemático das aplicações de segurança abordando projectos de investigação relacionados, estudam-se as tecnologias de comunicação sem fios disponíveis e a sua possibilidade de suportar aplicações de segurança rodoviária. Desta análise, conclui-se que a norma norte americana WAVE/IEEE802.11p e a europeia ETSI-G5, criadas especificamente para o efeito são as que mais se adequam à finalidade desejada. Considera-se que o cenário de utilização é evolutivo, podendo coexistirem veículos que não dispõem de sistemas de comunicação com outros que suportam a norma WAVE. Dado que o protocolo de acesso ao meio proposto pela norma WAVE não garante um acesso determinístico ao meio partilhado, propõe-se um novo protocolo, o Vehicular Flexible Time-Triggered protocol (VFTT). Faz-se a análise teórica da viabilidade do protocolo proposto para a norma WAVE e respectiva norma europeia (ETSI-G5). Quantifica-se o protocolo VFTT para um cenário real: a auto-estrada A5 Lisboa-Cascais, uma das autoestradas portuguesas mais movimentadas. Conclui-se que o protocolo é viável e garante um atraso restringido temporalmente.
Vergara, Alonso Ekhiotz Jon. "Implementation of a manycast protocol for intermittently connected mobile ad hoc networks in disaster areas." Thesis, Linköpings universitet, RTSLAB - Laboratoriet för realtidssystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-58603.
Full textBrocardo, Marcelo Luiz. "I2 AC." Florianópolis, SC, 2001. http://repositorio.ufsc.br/xmlui/handle/123456789/80142.
Full textMade available in DSpace on 2012-10-18T10:56:18Z (GMT). No. of bitstreams: 0Bitstream added on 2014-09-25T21:26:18Z : No. of bitstreams: 1 181867.pdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
O tema desta dissertação de mestrado está centrado nas relações existentes em transações comerciais entre Estabelecimentos, Clientes e Sistemas de Crédito. Os Sistemas de Crédito, existentes devido à inadimplência, prestam serviços de análise de crédito dos Clientes. Os Sistemas de Crédito existentes possuem falhas de segurança e um déficit em abrangência, ao mesmo tempo em que são vulneráveis a ataques e roubo de informações. Portanto, a comunicação entre os Estabelecimentos, Clientes e Sistema de Crédito deve oferecer segurança, bem como rapidez, privacidade e veracidade das informações.
Sobotka, Lukáš. "Analýza protokolů pro komunikaci v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399184.
Full textPerigo, Levi. "An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/274.
Full textCampagna, Leonardo. "Miglioramento della qualità di immagini acquisite da sensori OV7670." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016.
Find full textSorbelli, Sara. "La digitalizzazione dei prodotti ceramici: un protocollo di acquisizione e rappresentazione dei dati." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Find full textTian, Bin. "Data dissemination protocols and mobility model for VANETs." Thesis, Clermont-Ferrand 2, 2016. http://www.theses.fr/2016CLF22739/document.
Full textIn the last two decades, Vehicular Ad hoc Network (VANETs) were developed significantly by both academic institute and industries association, since VANETs originate from traffic safety and are also an important application of Internet of Things / Web of Things (IoT/WoT) for Intelligent Transportation System (ITS), Intelligent Vehicles and Smart Cities. As an essential component of VANETs, Inter-Vehicle Communication (IVC) protocols face many critical challenges, in particular, because they relate to various specific applications. In this thesis, after elaborating on related knowledge of VANETs and state-of-the-art of IVC protocols, we propose a data dissemination protocol for vehicular networking, named TrAD, to disseminate efficiently warning messages from a source to vehicles in a range of interest (ROI). TrAD considers the status of road traffic and network traffic to adapt locally the strategy and the parameters of transmissions in order to optimize the global performance of IVC application. Moreover, a local vehicular cluster classification algorithm is designed to support TrAD to be performed in both highway and urban scenarios. In addition, an illustrative congestion control mechanism is used to avoid channel congestion using a distributed approach. Three state-of-the-art IVC protocols have been compared with TrAD by means of realistic simulations. The performance of all those protocols is evaluated quantitatively in various scenarios by taking into account different real road maps, trafic routes and vehicular densities. Compared with the reference protocols, TrAD gains an outstanding overall performance in terms of packet delivery ratio, number of transmissions and delay. Furthermore, TrAD also can tolerate a reasonable degree of GPS drift while achieving efficient data dissemination. In order to ensure the quality of simulations, we deeply investigated the mobility model of road traffic simulator, and then performed the bidirectionally coupled simulation in which the network simulator and the road trafic simulator can exchange information in real-time. Upon understanding of the mobility model, we obtained a chance to develop a low-cost tram simulator for the local public transportation provider, the T2C (Transports en Commun de l’agglomération Clermontoise). We attempt to design accurate mobility models from different scenarios for the specific type of tram used by T2C. Real world trials are carried out to explore the key parameters required by theoretical deduction for our mobility model. Moreover, the display GUI relies on a video stream, rather than 3D graphics, which can reduce the cost while guaranteeing the quality of service. This project was supported for two years by T2C
Celino, Ronaldo Andrusyszyn. "Aplicação da norma IEC 61400-25 na automação e controle de parques eólicos no Brasil." Pós-Graduação em Engenharia Elétrica, 2014. http://ri.ufs.br:8080/xmlui/handle/123456789/5047.
Full textO objetivo da pesquisa é desenvolver um sistema de supervisão, comunicação e controle, implementado em um software de supervisão livre o ScadaBR, para parques eólicos instalados e/ou a serem instalados no Brasil, a partir das considerações e recomendações da norma IEC 61400-25. A construção de parques eólicos completos, com automação total, tem levado os empreendedores a focalizar seus esforços não só no lucro e produtividade, mas também no: capital humano, preocupando-se com o sistema de gestão, domínio tecnológico e comunicação em todos os níveis. O processamento da informação com a comunicação, abriu fronteiras com as novas formas de relacionamento e a crescente tendência na área de automação industrial, favorece que diferentes dispositivos comuniquem-se com outros de uma maneira cooperativa. No entanto, os maiores fabricantes de usinas de geração eólica ainda oferecem soluções proprietárias caixas pretas para as redes de campo, o que resulta numa diversidade de protocolos de sistemas, levando dependência desses fornecedores. Visando a interoperabilidade e flexibilidade de operação, grupos de pesquisadores defendem normas de padrão aberto, como a solução de redes e protocolos para todos, deixando os clientes livres. Nesta luta, a organização mais conhecida na área de energia eólica é a norma IEC 61400-25, especificamente para o sistema de monitoramento e comunicação livre entre diferentes fornecedores de equipamentos, porém a comunicação interna dos componentes da usina de energia eólica não está no âmbito desta norma. A faixa de aplicação da norma abrange parte da operação desse tipo de usina, incluindo turbina de vento, sistema de medição meteorológica, sistema elétrico e sistema de gestão, mas não inclui a linha relevante de alimentação e informação da subestação. Daí a interação com o sistema supervisório ScadaBR, desenvolvido em modelo open-source de licença gratuita. Propõe-se a aplicação de uma multi-plataforma baseada em Java, a partir de um servidor de aplicações, com o Apache Tomcat a escolha padrão. Considerando as exigências do modelo de comunicação presentes na Norma IEC 61400-25-2, define-se um modelo de informação para monitoramento e controle de usinas eólicas, para tal, parte-se do simulador de dados MatrikonOPC, por meio da interação cliente / servidor OPC DA (Object Linkingand Embedding for Process Control Data Access), com o software ScadaBR.
Pérusse, Philibert. "Téléconduite et acquisition sur un réseau WAN, basées sur les protocoles TCP/IP et IEC 60870-5." Sherbrooke : Université de Sherbrooke, 2003.
Find full textPérusse, Philibert. "Téléconduite et acquisition sur un réseau WAN, basées sur les protocoles TCP/IP et IEC 60870-5." Mémoire, Université de Sherbrooke, 2003. http://savoirs.usherbrooke.ca/handle/11143/1196.
Full textAmato, Elisabetta. "Performance comparison of C-V2X and WAVE protocols for vehicular to infrastructure communications: simulation of the highway use case." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/16534/.
Full textArmadhila, Nelago Ndapandula. "Is the African Union’s decision on the ICC and the adoption of Article 46A Bis of the Protocol on Amendments to the Protocol on the Statute of the African Court of Justice and Human Rights unlawful under international law?" Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/13188.
Full textThe proceedings brought against Kenyan President Uhuru Kenyatta and his deputy, William Ruto for post-election election violence in 2007 by the International Criminal Court has resulted in action by the African Union that undermines individual criminal responsibility for heads of state and government officials and for the promotion and protection of human rights in Africa. This thesis will assess whether the African Union’s decision to not cooperate with the International Criminal Court, and the adoption of Article 46A Bis of the Protocol on Amendments to the Protocol on the Statute of the African Court of Justice and Human Rights is unlawful under the principles of international law. This thesis will also assess how these decisions will impact Africa’s ability to promote and protect human rights on the continent.
Amadhila, Nelago Ndapandula. "Is the African Union’s decision on the ICC and the adoption of Article 46A Bis of the Protocol on Amendments to the Protocol on the Statute of the African Court of Justice and Human rights unlawful under international law?" Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/12822.
Full textThe proceedings brought against Kenyan President Uhuru Kenyatta and his deputy, William Ruto for post-election election violence in 2007 by the International Criminal Court has resulted in action by the African Union that undermines individual criminal responsibility for heads of state and government officials and for the promotion and protection of human rights in Africa. This thesis will assess whther the African Union’s decision to not cooperate with the International Criminal Court , and the adoption of Article 46A Bis of the Protocol on Amendments to the Protocol on the Statute of the African Court of Justice and Human Rights is unlawful under the principles of international law. This thesis will also assess how thes e decisions will impact Africa’s ability to promote and protect human rights on the continent.
Bogati, Rajendra. "Performance Evaluation of Non-commercial LTE Network For Smart Grid Application : Modification of IEC 61850-90-5 Protocol stack and its Testing over Non-commercial LTE." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-219621.
Full textChvátal, Michal. "Řízení dodávky vody v rodinném domě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442453.
Full textCombes, Jean-Michel. "Utilisation d'identifiants cryptographiques pour la sécurisation IPv6." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00835931.
Full textMaršál, Martin. "Elektronický modul pro akustickou detekci." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-240831.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textSingh, Mandeep. "STUDIES ON THE SIZE AND NON-PLANARITY OF AROMATIC STACKING MOIETY ON CONFORMATION SELECTIVITY AND THERMAL STABILIZATION OF G-QUADRUPLEXES." Scholarly Commons, 2020. https://scholarlycommons.pacific.edu/uop_etds/3725.
Full textChiu, Hsien-Yao, and 邱顯堯. "Applying I2C Communication Protocol on the Development of Distributed Single-Chip System." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/55914329329790113748.
Full text元智大學
機械工程學系
92
Due to the limited ability of single-chip controller, it can not cover all the functionality provided by “Powerful controllers”, so we propose a single-chip system based on I2C network communication to integrate single-controller, and replace centralized communication architecture with multi-controllers distributed one. The core of this chip is PIC18F452 produced by Microchip, we utilize this to develop a chain of communication components to fit any different requirements in single-chip communication and fault tolerance field. In addition, we build up a testing module applied on “broken line” simulation, it assists us to detect if any communication component can fix fault during “broken line”. This test module is implemented by C language, so it could be ported to different platforms without extra efforts. This research has been carried out in X-Y platform, Stewart platform and auto pilot system. The experiments show that I2C network distributed single-chip system takes several benefits such as modulization, open architecture, simple layout, and scalable.
Caetano, Miguel José Chaves. "I2C Verification suite." Dissertação, 2010. http://hdl.handle.net/10216/57760.
Full textCaetano, Miguel José Chaves. "I2C Verification suite." Master's thesis, 2010. http://hdl.handle.net/10216/57760.
Full textSoprovich, Greg F. "Delay insensitive protocol and IC design." 1989. http://hdl.handle.net/1993/17134.
Full textLo, Chan Chen, and 羅佳昇. "Applying IIC Communication Protocol on the Development of Optical Fiber System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/72535338468773179539.
Full text元智大學
電機工程學系
98
IIC, Inter-IC, is a common interface for communication between two IC chips in electronic products. Due to superior capacity of serial transmission and low-cost property of without using special encoding and decoding devices, IIC are often widely used in various fields. For communication between audio and visual devices, the linking between them can be accomplished by IIC. Through IIC, the display device can transfer relevant information to the computer and the computer can also transmit high resolution images to the display device. Therefore, users can obtain convenient functions of insert and use promptly at the same time. In recent years, due to revolutionary development of display technology, the analog image signal completely changes into the digit in an all-round way such that the transmission of several high-frequency signals approaches the limit of capacity of copper wire. For application at higher frequencies, optical-fiber communication is one of the solutions to solve this problem. A traditional cable system can be replaced by a small optical fiber system to transmit the digit image. This approach can solve the problems of signal decay and transmit distance when high-order image signals are transmitted. In this study, we design a small optic fiber system to transmit the half-duplex IIC signal. At the same time, we also propose two schemes of software and hardware to solve the problem of two-way communication when the optical fiber was used to transmit IIC signals. Through numerous testing with real systems, we found that the transmitted higher-order digit images can still maintain both the computer and display device working normally as the IIC signal transmitted by the optical fiber system from a distance of 0.5 m to a distance of 500 m. In addition, the high quality of the transmitted high-order digit image can still be maintained at a distance of 500 m.
Tai, Chih-Chang, and 戴志昌. "A Secure Electronic Voting Protocol with IC Cards." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/89661963985970092984.
Full textYeh, Yu-Kuan, and 葉禹寬. "Intrusion Detection Method for IEC 60870-5-104 Protocol Using Honeypot Logs." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394024%22.&searchmode=basic.
Full text國立中興大學
資訊科學與工程學系所
107
Industrial Control system (ICS) and Supervisory Control and Data Acquisition (SCADA) system usually do not include security design in their design phase. With the growing demands of automation and remote monitoring, ICSs become more complex and have greater internet connectivity. As a result, the risk of hacking on industrial control networks also increases. Therefore, designing an effective intrusion detection system (IDS) for ICS has become an important issue. In this thesis, we design a honeypot to capture malicious packets of IEC 60870-5-104 protocol and then use deep packet analysis and machine learning algorithm to analyze the honeypot log. In the honeypot design, we add new codes to the open-source honeypot Conpot for supporting IEC 60870-5-104 protocol. The X-means clustering algorithm and Smith-Waterman Algorithm are used for generating and comparing attack gene sequences, respectively. If an attack sequence is unseen, then it is added to the attack signature database with appropriate class label. If an attack sequence is known in the attack signature database, then the proposed system will provide the characteristics of the attack, which in turn can be used as rules in intrusion detection system. The experimental results show that the performance of the proposed method has about 90.9% for accuracy, 96% for precision, 91% for recall, and 92% for F1-score.
Yeh, Ken-Wen, and 葉耕文. "Accountability Study on Electronic Voting Protocol with IC Cards." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/21703677619818326793.
Full text銘傳大學
資訊管理研究所
87
In 1997, J.K.Jan and C.C.Tai proposed an electronic voting process with IC cards. Their protocol can be separated to registration, authentication, voting, and opening phases. In this paper, we first analyze their process, and detect that the registration and voting phases lacks the accountability property, which may cause future disputes. Second, we modify their process into an accountable process. Third, we create extended finite state machines to model the new process (while only English texts are provided in their paper to describe their process). Fourth, extended finite state machines are interoperable to trace some basic functions of the protocol. Fifth, Estelle pseudo-codes are written for the extended finite state machines. We also discuss about possible extensions of the current protocol. First, we allow that each vote can have his own weight, and investigate the possible relationship about the weight and the privacy. Second, we discuss the encryption techniques to extend the two voting centers to more than two voting centers. Third, we propose a new security problem, called the time-sequence security problem, that may happen in voting using IC cards; and we propose possible approach for overcoming this problem.
Chung, Che-Kai, and 鐘晢愷. "The study on conformance test between IEDs based on IEC 61850 communication Protocol." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/91863842326046406779.
Full text中原大學
電機工程研究所
102
The purpose of this thesis is to establish of conformance test platform based on IEC 61850 communication protocol for intelligent electronic device (IED) among different manufacturers. Due to the IEC 61850 standard is not strictly regulated, although manufacturers all declare that their equipment meet the IEC 61850 standard but there still are some problems in the consistency. In this thesis we perform the conformance test network of Generic Object Oriented Substation Event (GOOSE) transmitting time for the IEDs within bay levels via Ethernet. GOOSE ping-pong method is also used for the test of different manufacturer’s IED whether its GOOSE input and output time meets the IEC 61850-10 standard or not. The IEC 61850-based conformance test pilot platform has been established. Based on this platform, a comprehensive IEC 61850 conformance test platform can be built to meet the industrial and academic requirements in the future.
Hsieh, Hsiang-Hua, and 謝祥化. "Digital Communication IC &Wireless Bio-Sensor Network Protocol Design." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/18059079369311889983.
Full text國立臺灣大學
電子工程學研究所
104
As the Internet of Thing (IoT) trend, cloud technology, and big data analysis technology grow, the wireless sensor network is introduced for the in-house IoT scenario. In this thesis, we design both the communication protocol and the transmission hardware together to optimize the overall system performance. Due to the cross-layer design, the interface problem becomes an important issue. Besides, a systematic analysis of a simple network architecture is conducted to find the optimal operational point of the protocol design, given the hardware parameters. In other words, a model considers the clock drift, BER vs SNR, the synchronization error, the sync. frequency, the sync. margin, fail packet statistics and so on, is proposed as a guideline for wireless communication network design. Moreover, a cost function in algorithm field and the Energy Per Byte Index (EPBI) are introduced to evaluate the performance in the perspective of power consumption V.S. data rate. Most important of all, most of the parameters in the analysis are based on the measurement result and hence are much more realistic for the integrated system design in practical. In short, a design rule for the wireless sensor network design is proposed and an optimal protocol parameter set in the perspective of power consumption is found for a fixed specification of the adopted hardware, which meets the low power consumption trend of the IoT application.