To see the other types of publications on this topic, follow the link: I2C protocol.

Dissertations / Theses on the topic 'I2C protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'I2C protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Sharma, Neena. "SERIAL PROTOCOL BRIDGE." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1352403332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Richert, Adam. "Developing a Portable System for Medicine Dosage." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-235738.

Full text
Abstract:
The project presented in this report is set out to develop a portable electronic system to be used as a medicine pill container. With the functionality to configure up to twelve daily repeated alarms, the purpose of the medicine dosage system is first and foremost to remind the user when they should take their medicine. Secondly, LED lights and user-recorded voice notifications are to be implemented to further aid the user in taking the right medicine each time. The device is also to have a memory log, recording up to one hundred missed dosages, enabling an authorized medicine professional to verify the medicine adherence of the user.Prior to the start of the project, an outline for the functionality and physical appearance of the device was set by the project owner, Victrix AB. This project covers the hardware and software development, as well as the design choices within. The aim is to follow the proposed functionality specification as close as possible, while making justified hardware and software choices considering simplicity, efficiency, power consumption, and availability. By following the specification, the goal is ultimately to increase the medicine adherence for users of the device developed with this thesis.Using qualitative research methods, a valid background study was created, preceding the development of the medicine dosage system. Hardware for a first prototype of the device was then chosen based on the gathered information about existing technologies and related work. With thorough testing and recurrent information exchange with the client, a prototype of the medicine dosage system, based on an Arduino microcontroller, was constructed. The prototype was evaluated to fulfill 92% of the requirements considered as high priority by Victrix.
Projektet som presenteras i denna rapport är tänkt att utveckla ett portabelt elektroniskt system för användning som en medicinsk pillerbehållare. Med funktionaliteten att konfigurera upp till tolv dagligen upprepande alarm är syftet med medicindoseringssystemet först och främst att påminna användaren när de ska ta sin medicin. Lysdioder och användarens egna inspelade röst som notifikationer ska implementeras för att vidare hjälpa användaren att ta rätt medicin vid varje tillfälle. Enheten ska också ha en minneslogg som sparar upp till etthundra missade doseringar, vilket gör det möjligt för auktoriserad sjukvårdspersonal att verifiera användarens följsamhet till medicineringen.En översiktlig beskrivning av funktionaliteten samt det fysiska utseendet av enheten skrevs av projektägaren Victrix AB innan projektet startades. Det som detta projekt täcker är hårdvaruoch mjukvaruutvecklingen, så väl som där tillhörande designval. Projektet siktar på att följa den föreslagna funktionalitetsspecifikationen så nära som möjligt, och samtidigt göra välgrundade val för hårdoch mjukvara med enkelhet, effektivitet, energiförbrukning och tillgänglighet i åtanke. Genom att följa specifikationen är det slutliga målet att frambringa ökad medicinföljsamhet för användare av den med det här projektet utvecklade enheten.Utvecklingen av medicindoseringssystemet föregicks av en befogad bakgrundsstudie utformad genom användningen av kvalitativa forskningsmetoder. Hårdvara att användas för en första prototyp av enheten valdes sedan baserat på den insamlade informationen om existerande teknologier och relaterat arbete. Genom grundliga tester och regelbundet informationsutbyte med kunden konstruerades en prototyp av medicindoseringssystemet baserat på en Arduinomikrokontroller. Prototypen utvärderades att uppfylla 92% av kraven som Victrix ansåg vara av hög prioritet.
APA, Harvard, Vancouver, ISO, and other styles
3

Carvalho, Vicente Bueno. "Desenvolvimento e teste de um monitor de barramento I2C para proteção contra falhas transientes." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/150164.

Full text
Abstract:
A comunicação entre circuitos integrados tem evoluído em desempenho e confiabilidade ao longo dos anos. Inicialmente os projetos utilizavam barramentos paralelos, onde existe a necessidade de uma grande quantidade de vias, utilizando muitos pinos de entrada e saída dos circuitos integrados resultando também em uma grande suscetibilidade a interferências eletromagnéticas (EMI) e descargas eletrostáticas (ESD). Na sequência, ficou claro que o modelo de barramento serial possuía ampla vantagem em relação ao predecessor, uma vez que este utiliza um menor número de vias, facilitando o processo de leiaute de placas, facilitando também a integridade de sinais possibilitando velocidades muito maiores apesar do menor número de vias. Este trabalho faz uma comparação entre os principais protocolos seriais de baixa e média velocidade. Nessa pesquisa, foram salientadas as características positivas e negativas de cada protocolo, e como resultado o enquadramento de cada um dos protocolos em um segmento de atuação mais apropriado. O objetivo deste trabalho é utilizar o resultado da análise comparativa dos protocolos seriais para propor um aparato de hardware capaz de suprir uma deficiência encontrada no protocolo serial I2C, amplamente utilizado na indústria, mas que possui restrições quando a aplicação necessita alta confiabilidade. O aparato, aqui chamado de Monitor de Barramento I2C, é capaz de verificar a integridade de dados, sinalizar métricas sobre a qualidade das comunicações, detectar falhas transitórias e erros permanentes no barramento e agir sobre os dispositivos conectados ao barramento para a recuperação de tais erros, evitando falhas. Foi desenvolvido um mecanismo de injeção de falhas para simular as falhas em dispositivos conectados ao barramento e, portanto, verificar a resposta do monitor. Resultados no PSoC5, da empresa Cypress, mostram que a solução proposta tem um baixo custo em termos de área e nenhum impacto no desempenho das comunicações.
The communication between integrated circuits has evolved in performance and reliability over the years. Initially projects used parallel buses, where there is a need for a large amount of wires, consuming many input and output pins of the integrated circuits resulting in a great susceptibility to electromagnetic interference (EMI) and electrostatic discharge (ESD). As a result, it became clear that the serial bus model had large advantage over predecessor, since it uses a smaller number of lanes, making the PCB layout process easier, which also facilitates the signal integrity allowing higher speeds despite fewer pathways. This work makes a comparison between the main low and medium speed serial protocols. The research has emphasized the positive and negative characteristics of each protocol, and as a result the framework of each of the protocols in a more appropriate market segment. The objective of this work is to use the results of comparative analysis of serial protocols to propose a hardware apparatus capable of filling a gap found in the I2C protocol, widely used in industry, but with limitations when the application requires high reliability. The apparatus, here called I2C Bus Monitor, is able to perform data integrity verification activities, to signalize metrics about the quality of communications, to detect transient faults and permanent errors on the bus and to act on the devices connected to the bus for the recovery of such errors avoiding failures. It was developed a fault injection mechanism to simulate faults in the devices connected to the bus and thus verify the monitor response. Results in the APSoC5 from Cypress show that the proposed solution has an extremely low cost overhead in terms of area and no performance impact in the communication.
APA, Harvard, Vancouver, ISO, and other styles
4

Sedlář, Petr. "Digitálně řízený rezistor." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218032.

Full text
Abstract:
This master´s thesis deals with the design of the control circuits for digital potentiometers and their application in analog systems. Digital potentiometers are three-terminal resistors with an adjustable center connection. The digital potentiomneters enable to drive logic gates, LED drivers, LCD drivers, analog switches etc. Controlling of these mentioned devices is possible by the I2C 2- wire serial bus (invented by Philips). The digital potentiometers are used to control of the primary parameters like cut-off frequency and quality factor in the state variable filter and cut-off frequency in a passive filter. Both filters are simulated in PSpice and then compared with the measured results. Next parts of this master's thesis are a computer program and a exemplary protocol.
APA, Harvard, Vancouver, ISO, and other styles
5

Tibor, Sakal. "Metoda za povezivanje mernog sistema i računarapomoću konverzije podataka iz I2S u TCP/IP protokol." Phd thesis, Univerzitet u Novom Sadu, Tehnički fakultet Mihajlo Pupin u Zrenjaninu, 2017. https://www.cris.uns.ac.rs/record.jsf?recordId=103839&source=NDLTD&language=en.

Full text
Abstract:
Ova doktorska disertacija predstavlja istraživački rad sproveden sa ciljem da reši problem koji se odnosi na realizaciju povezivanja laboratorijskog, medicinskog mernog uređaja sa personalnim računarom. Rezultat istraživačkog rada je opšta metoda koja obezbeđuje efikasnu konverziju podataka I2S protokola u TCP/IP protokol.
This doctoral thesis presents the research work carried out in order to solve a practical problem, the realization of a connection between a medical measuring device and a personal computer. The result of the research is a general method that provides efficient data conversion from the I2S protocol to the TCP/IP protocol.
APA, Harvard, Vancouver, ISO, and other styles
6

Studený, Radim. "Simulátor komunikace protokolů SCADA." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377061.

Full text
Abstract:
This work describes DNP3, IEC-60870, IEC-61850 communication protocols and their implementing in SCADA systems. It further describes communication of these protocols between RaspberryPi as a slave device and Personal Computer as a master device.
APA, Harvard, Vancouver, ISO, and other styles
7

Iqbal, Zeeshan. "Self-Organizing Wireless Sensor Networks For Inter-Vehicle Communication." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-230.

Full text
Abstract:

Now a day, one of the most attractive research topics in the area of Intelligent Traffic Control is

Inter-vehicle communication (V2V communication). In V2V communication, a vehicle can

communicate to its neighbouring vehicles even in the absence of a central Base Station. The

concept of this direct communication is to send vehicle safety messages one-to-one or one-to-

many vehicles via wireless connection. Such messages are usually short in length and have very

short lifetime in which they must reach the destination. The Inter-vehicle communication system

is an ad-hoc network with high mobility and changing number of nodes, where mobile nodes

dynamically create temporary sensor networks and transferring messages from one network to

others by using multiple hops due to limitation of short range.

The goal of the project is to investigate some basic research questions in order to organize such

sensor networks and at the same time highlight the appropriate routing protocol that support

mobile ad hoc networks in an efficient and reliable manner.

In our investigation, we have answered the technical issues in order to construct a V2V

communication system. We have also studied some mobile ad hoc network routing protocols in

detail and then selected the DSR (Dynamic Source Routing) for our V2V communication and

then simulated it according to our system requirements. We are quite satisfied by the result of

DSR, but at the same time much more work is required to come up with an absolute application

for the end user.

APA, Harvard, Vancouver, ISO, and other styles
8

Agrawal, Ambuj. "Implementation of Application Layer Protocol for an Active RFID System." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/34961.

Full text
Abstract:
The emerging technology of active RFID tags has strong potential in the areas of real time health monitoring, sorting of cargo, and large scale inventory management because of their longer communication range and larger data storage capacity. The market of active RFID is growing very rapidly and therefore there has been an increase in the number of companies engaging in this field. But very often it is found that the products available in the market are not always suited to the application at hand. To overcome this problem, off the shelf active RFID products which were reconfigurable and followed a standard PHY and MAC layer protocol were used for this work. By reprogramming the application layer protocol of the RFID hardware, these devices were made suitable for the desired application. This also allowed the RFID tags to extend their functionality by interfacing extra modules with themselves. The work presented in this thesis describes the way in which the microcontroller on board the active RFID tags and readers can be programmed so that the functionality of the RFID hardware can be changed as per requirements. It also shows that extra modules can be added to the tag by successfully interfacing an accelerometer module with the tag.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
9

Kopecký, Miroslav. "Univerzální převodník komunikačních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-217914.

Full text
Abstract:
Aim of this master’s thesis is create universal converter communication protocols. This converter will be instrumental towards testing attendance single communication protocol on microprocessors FREESCALE. Test instrument is behind purpose ease testing software PROCESSOR EXPERT. Processor expert is extended software for CODEWARRIROR. Test instrument is connected over interface USB to personal computer. PC is used like evolution tool for testing single periphery. Device could be used in future for other peripheries.
APA, Harvard, Vancouver, ISO, and other styles
10

Ditrych, Marek. "Problematika vyhodnocování blokovacích podmínek rozvodny pomocí GOOSE zpráv." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400562.

Full text
Abstract:
This master thesis focuses on problematics of GOOSE messages used for evaluation of blocking conditions of substations in the electrical power plant in Opatovice (EOP). Firstly, the thesis describes the multifunctional electrical protection relay 7SJ64 as well as GOOSE messages, that are run by protocol IEC 61850. Next, it contains a brief description of the energy consumption of EOP itself, since the project was written for its protection relays. In the practical part of the thesis, an experimental network consisting of two distinct substations with three 7SJ64 multifunctional protection relays was designed together with simple blocking conditions. These require information about the state of circuit breakers. The whole communication is carried by GOOSE messages. Moreover, to inform about the loss of GOOSE messages, the logical function SI_GET_S (decoder) was used inside the coding interface of DIGSI programme called CFC. This function was then tested in the experimental network using each different condition, that experienced interruptions of communication caused either by simulated defect of optical cabels, or by „user‘s mistakes“ in the settings of communication parameters in DIGSI. Finally, the system protecting from the loss of GOOSE messages was incorporated into the existing project evaluating blocking conditions in the block substation of EOP.
APA, Harvard, Vancouver, ISO, and other styles
11

Horych, Vladimír. "Analýza řídících protokolů využívaných v průmyslových aplikacích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218084.

Full text
Abstract:
This master's thesis deals with distributed control protocols for industrial applications. It explains term distributed control system, control protocol and it is dealing with properties, frame structures and ways of communication within CAN, Modbus, IEC60870-5-101 and DLMS protocols. This thesis includes informations, which are in most cases difficult to find. Second part of the thesis is dedicated to education system. This part is contained by information about protocols and their layers based on ISO/OSI model, pictures of structure of messages, knowledge test and an application based on JavaScript language. This JavaScript application emulates behavior of workstations, which are using communication based on IEC 60870-5-101 protocol. This application can set various conditions for influence of message transfer. These conditions are setting way of message transfer, data availability, filling of workstation’s buffer or intentional damage of message's content. It also contains a large amount of context help, activated after moving mouse cursor over most of application's elements. Even visitor without great knowledge of distributed control systems should understand how this protocol works, thanks to these context help and messages printed in lower part of the application. The conclusion of this work is aimed to positive and negative features and comparison of mentioned control protocols.
APA, Harvard, Vancouver, ISO, and other styles
12

Engstrand, Johan. "A 3D-printed Fat-IBC-enabled prosthetic arm : Communication protocol and data representation." Thesis, Uppsala universitet, Fasta tillståndets elektronik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420051.

Full text
Abstract:
The aim of this thesis is to optimize the design of the Fat-IBC-based communication of a novel neuroprosthetic system in which a brain-machine interface is used to control a prosthetic arm. Fat-based intra-body communication (Fat-IBC) uses the fat tissue inside the body of the bearer as a transmission medium for low-power microwaves. Future projects will use the communication system and investigate ways to control the prosthetic arm directly from the brain. The finished system was able to individually control all movable joints of multiple prosthesis prototypes using information that was received wirelessly through Fat-IBC. Simultaneous transmission in the other direction was possible, with the control data then being replaced by sensor readings from the prosthesis. All data packets were encoded with the COBS/R algorithm and the wireless communication was handled by Digi Xbee 3 radio modules using the IEEE 802.15.4 protocol at a frequency of 2.45 GHz. The Fat-IBC communication was evaluated with the help of so-called "phantoms" which emulated the conditions of the human body fat channel. During said testing, packet loss measurements were performed for various combinations of packet sizes and time intervals between packets. The packet loss measurements showed that the typical amount of transmitted data could be handled well by the fat channel test setup. Although the transmission system was found to be well-functioning in its current state, increasing the packet size to achieve a higher granularity of the movement was perceived to be viable considering the findings from the packet loss measurements.
APA, Harvard, Vancouver, ISO, and other styles
13

Pekárek, Dominik. "Popis a testování komunikačních protokolů normy IEC 60870-5-103 a 60870-5-104." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-319300.

Full text
Abstract:
This thesis is focused on testing of communication protocols IEC 60870-5-103 and IEC 60870-5-104. Theoretical part of the thesis describes basic principles, services and possibilities of both communication protocols. Practical part of the thesis deals with configuration of the IEC 60870-5-103 communication standard of protective terminal REF630. PCVDEW6 tool was used to test this communication protocol. Next part of the thesis is focused on convertion of the communication standard IEC 61850 to IEC 61870-5-104 using control system COM600. The testing of both communication protocols was carried out in the laboratory of the protection relays on the testing panels at ABB Brno.
APA, Harvard, Vancouver, ISO, and other styles
14

Dzurňák, Tomáš. "Analyzátor protokolu čipových karet." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236947.

Full text
Abstract:
The goal of this project is to develop a analyzer of communication between a smart card and reader terminal. The analyzer should be able to diagnose and control correlations of standards.  The thesis include description of standards to be familiar with and a detail description of standard ISO/IEC 7816-3, that introduce monitored protocol. The thesis also involves development kit features and a design of application.
APA, Harvard, Vancouver, ISO, and other styles
15

Quintana, Pando María Elena. "Migración de una red industrial para subestaciones eléctricas al protocolo IEC 61850." Bachelor's thesis, Pontificia Universidad Católica del Perú, 2012. http://tesis.pucp.edu.pe/repositorio/handle/123456789/1300.

Full text
Abstract:
El presente documento aborda la investigación para plantear el modelo de migración de una red industrial destinada al control y monitoreo de una subestación eléctrica al protocolo IEC 61850 como estándar en la comunicación interna de equipos y concentrando la información en un sistema SCADA. Para un mejor entendimiento de la investigación, el trabajo realizado se divide en cuatro capítulos, los cuales son detallados a continuación: i. El Capítulo 1 describe la problemática que motiva la realización del estudio, la cual consiste principalmente en la incompatibilidad de protocolos utilizados para la automatización de una subestación eléctrica. ii. El Capítulo 2 abarca los conceptos teóricos involucrados en la investigación realizada. Se describen los conceptos básicos de redes industriales que permiten la automatización en el sistema eléctrico, enfocándose al campo de las subestaciones eléctricas. De la misma manera, se introduce el protocolo IEC 61850 y lo que éste propone para los sistemas y redes de comunicación en subestaciones. iii. El Capítulo 3 desarrolla el modelo de migración del sistema de comunicación convencional de una subestación eléctrica al protocolo IEC 61850. Para ello, se realiza la selección e ingeniería de equipos adecuados que cumplan con el estándar y se plantea la arquitectura del nuevo sistema de comunicación siguiendo el modelo definido en el estándar. iv. El Capítulo 4 complementa el análisis del modelo realizado en el capítulo anterior. Se evalúan los resultados esperados y las respectivas pruebas de validación que deben ser realizadas. Además, se realiza la comparación de la disponibilidad de un sistema convencional con otro basado en el estándar IEC 61850.
Tesis
APA, Harvard, Vancouver, ISO, and other styles
16

Silva, Lázaro Eduardo da. "Sistema embarcado inteligente para detecção de intrusão em subestações de energia elétrica utilizando o Protocolo OpenFlow." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/18/18154/tde-11112016-085936/.

Full text
Abstract:
O protocolo International Electrotechnical Commission (IEC)-61850 tornou possível integrar os equipamentos das subestações de energia elétrica, através de uma rede de comunicação de dados Ethernet de alta velocidade. A utilização deste protocolo tem como objetivo principal a interligação dos Intelligent Electronic Devices (IEDs) para a automatização dos processos no sistema elétrico. As contribuições deste protocolo para a integração do controle e supervisão do sistema elétrico são diversas, porém, o fato de utilizar uma rede de comunicação de dados Ethernet integrada expõe o sistema elétrico à ataques cibernéticos. A norma IEC-62351 estabelece uma série de recomendações para prover segurança à rede de comunicação do sistema elétrico, dentre elas, o gerenciamento da rede de comunicação, a análise dos campos da mensagem Generic Object Oriented Substation Event (GOOSE) e a utilização de sistemas de detecção de intrusão. O presente trabalho descreve o desenvolvimento de um Intrusion Detection System (IDS) que atende os requisitos de segurança propostos pelo protocolo IEC-62351, para a identificação de ataques à comunicação realizada por mensagens GOOSE do protocolo IEC-61850, e entre equipamentos do sistema elétrico. Para o desenvolvimento desta aplicação, foram identificados os campos que compõem as mensagens GOOSE, de forma a reconhecer os valores esperados em diferentes situações de operação do sistema elétrico. Determinaram-se padrões de comportamento a serem utilizados para discernir mensagens falsas na rede de comunicação. Instalou-se e configurou-se um sistema operacional de tempo real embarcado na plataforma de desenvolvimento Zynq Board (ZYBO), juntamente com o controlador Open-Mul, para gerenciar a rede de comunicação da subestação, através do protocolo OpenFlow, realizando otimizações para o tráfego multicast. Foi desenvolvido um sistema de detecção e bloqueio de mensagens GOOSE falsas que utiliza o protocolo OpenFlow para controle da rede de comunicação do Sistema Elétrico. Desenvolveu-se ainda um sistema inteligente, utilizando-se uma Rede Neural Artificial (RNA) Nonlinear Autoregressive Model with Exogenous Input (NARX), para predição do tráfego realizado por mensagens GOOSE e detecção de ataques Distributed Deny of Service (DDOS). Os resultados obtidos demonstraram que o protocolo OpenFlow pode ser uma ferramenta interessante para controle da rede, porém, os fabricantes necessitam amadurecer sua implementação nos switches, para que sejam utilizados em produção nas redes de comunicação das subestações. O sistema de predição do tráfego gerado por mensagens GOOSE apresentou benefícios interessantes para a segurança da rede de comunicação, demonstrando potencial para compor um sistema de detecção de ataques DDOS realizado por mensagens GOOSE, na rede de comunicação das subestações de energia elétrica.
The IEC-61850 made it possible to integrate equipments of electric power system substations to a high-speed Ethernet data communication network. Its main goal is the interconnection of IEDs for the automation of processes in an electrical system. The contributions of this protocol for the integration of the control and supervision of the electrical system are diverse, although an Ethernet network exposes the electrical system for cyber attacks. The IEC-62351 states a series of recommendations to provide security to the communication network of the electrical system, such as the communication network management, the analysis of GOOSE messages and the use of intrusion detection systems. This study describes the development of an IDS that meets the security requirements proposed by the IEC-62351 standard to identify attacks on communication between GOOSE messages exchanged by electrical equipment using IEC-61850. For the development of this application, fields of the GOOSE messages were identified, in order to recognize the expected values in different power system operating conditions. Behaviour patterns were determined to detect false messages on the communication network. A real-time embedded operating system on ZYBO was installed and configured, as well as the OpenMul controller to manage the communication network of the substation through the OpenFlow protocol, performing optimizations for multicast traffic. A detection system and block tamper GOOSE messages, using the OpenFlow protocol for control of the electrical system communication network, were developed. In addition, an intelligent system using an Artificial Neural Network (ANN) Nonlinear Autoregressive Model with Exogenous Input (NARX) for predicting of the GOOSE messages traffic and the detection of Distributed Deny of Service attack (DDOS) were also developed. The results obtained show that the OpenFlow protocol may be a valuable tool for network control, however, manufacturers should maturely carry on with its implementation in the switches, so that it be used in substation communication networks. The traffic prediction system of the GOOSE messages presented interesting benefits for the security of the communication network, demonstrating potential to built a DDOS attack detection system performed by GOOSE messages on the communication network of electric power substations.
APA, Harvard, Vancouver, ISO, and other styles
17

Toscano, Palacios Marco Antonio. "Automatización de una Subestación Eléctrica utilizando el Protocolo IEC 61850 y el ICCP para el envio de Datos." Bachelor's thesis, Universidad Ricardo Palma, 2010. http://cybertesis.urp.edu.pe/handle/urp/66.

Full text
Abstract:
This thesis report, focuses on the automation process of Electrical Substations, with the main objective of integration into SCADA systems for electrical equipment responsible for the operation within substations, these devices have different communication protocols, after concentration information substation SCADA system, the next step to realize is sending data to the regulatory body that is in a remote location away from the substation, this is achieved using communication protocols designed for this function. All this process requires an optimization for the response times to any event that may happen in the substations and with this an optimization in operation of generation, distribution and transformation of electrical energy
APA, Harvard, Vancouver, ISO, and other styles
18

Castanheira, Fábio Mendes. "Desenvolvimento de uma aparelhagem de auditoria energética de sistemas eléctricos." Master's thesis, Universidade da Beira Interior, 2010. http://hdl.handle.net/10400.6/3836.

Full text
Abstract:
Esta dissertação com vista à obtenção do Grau de Mestre em Engenharia Electrótecnica e de Computadores, ramo de automação e electrónica, tem como principal objectivo o desenvolvimento de um dispositivo para apoio à realização de auditorias energéticas da rede eléctrica. O trabalho consiste em criar de raiz os vários componentes de hardware que constituem o equipamento pretendido. Esta tarefa inclui tanto a parte do dimensionamento dos PCBs e dos componentes, como a escolha mais apropriada dos diferentes componentes que compõe cada um dos módulos. Além disso, é descrito integralmente a parte do funcionamento dos circuitos concebidos. Neste trabalho de dissertação, também é feito o estudo pormenorizado do protocolo de comunicação I2C utilizado entre os diversos módulos.Este protocolo foi escolhido devido à sua simplicidade de implementação, que se traduz numa fácil programação.
APA, Harvard, Vancouver, ISO, and other styles
19

Rigi, Aref, and Bahnam Jura. "Analys av standarden IEC 61850 för styrning av elkraftsystem." Thesis, KTH, Hälsoinformatik och logistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-253006.

Full text
Abstract:
På uppdrag av Trafikverket har denna rapport syftet att ge en rekommendation baserat på jämförelse av nuvarande standarden IEC 60870-5-104 och den alternativa standarden IEC 61850. Studien jämför IEC 61850 och IEC 60870-5-104 och skillnader mellan dessa två standarder utifrån olika områden som kommunikation, säkerhet samt ekonomiska aspekter. I arbetets teoridel behandlas elnätet och hur elstationer i allmänhet fungerar utifrån kommunikationsprotokollen och hur systemen kommunicerar med andra enheter. Resultatet av arbetet visar att standarden IEC 61850 erbjuder stora möjligheter och fördelar i samtliga aspekter, och har även en utvecklingspotential. Med kommunikationsprotokollet IEC 61850 erhålls mer information i form av feltyp, direkta mätningar och styrning på kontrollanläggningar. Dock finns det en komplexitet i IEC 61850 som kan kräva större anpassningar för att ersätta tidigare protokoll på anläggningar vid byte. Utifrån säkerhetsaspekten uppvisar IEC 61850 styrka bland annat gällande skydd av integritet och konfidentialitet. Sammantaget visar arbetet att det finns stor fördel att använda sig av IEC 61850 vid framtida tillämpningar utifrån examensarbetets resultat
On behalf of the Swedish Transport Administration (Trafikverket), this report aims to provide a recommendation based on a comparison of the current communication protocol standard IEC 60870-5-104 and the alternative standard IEC 61850. This study compares IEC 61850 and IEC 60870-5-104 and differences between these two standards based on different areas such as communication, security and economic aspects. In the theoretical part of this thesis, the electricity grid is treated and how electricity stations generally work based on the communication protocols and how the systems communicate with other devices. The result of the thesis shows that the standard IEC 61850 offers great opportunities and advantages in all aspects and has a potential for development. With the communication protocol IEC 61850, more information is obtained in form of error type, direct measurements and control at control plants. However, there is a complexity in IEC 61850 which may require major adaptations to replace previous protocols on plants when changes are needed. Based on the safety aspect, IEC 61850 shows strength among other things regarding protection of privacy and confidentiality. Overall, the work shows that there is a great advantage of applying IEC 61850 in future use based on this thesis results.
APA, Harvard, Vancouver, ISO, and other styles
20

Kabir-Querrec, Maëlle. "Cyber sécurité des systèmes industriels pour les smart-grids : détection d'intrusion dans les réseaux de communication IEC 61850." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT032/document.

Full text
Abstract:
Les systèmes de contrôle et d'automatisation industriels (IACS - Industrial Control and Automation Systems) reposent largement et de plus en plus sur les Technologies de l'Information et de la Communication. A l'origine, les IACS utilisaient des protocoles propriétaires sur des réseaux fermés, assurant ainsi une sécurité par obscurité et isolement. Mais les technologies et les usages ont évolué et cette sécurité intrinsèque n'existe plus désormais. Cette évolution concerne entre autre le domaine électrique : le réseau électrique devenant le "smart grid".Le standard IEC 61850 est un pilier pour le développement du smart grid. Il a pour objectif de rendre possible l'interopérabilité dans les "Systèmes et réseaux de communication pour l'automatisation des services de distribution d'énergie". Pour cela, la norme définit un modèle de données commun ainsi qu'une pile de protocoles répondant à divers besoins de communication.Le standard IEC 61850 n'aborde pas la question de la cyber sécurité malgré une prise de conscience générale qu'un risque cyber pèse sur les IACS.Ces travaux de recherche proposent de répondre à cette question de la cyber sécurité par de la détection d'intrusion dans les réseaux IEC 61850, et plus précisément dans les communications temps-réel GOOSE. L'idée est d'exploiter au maximum les sources d'informations que sont les spécifications du protocole et la configuration du système pour développer un système de détection d'intrusion réseau (NIDS - Network Intrusion Detection System) sur mesure. Cette approche comportementale déterministe est un gage de précision de détection.Ce manuscrit compte quatre chapitres. Les deux premiers consistent en un état de l'art détaillé sur les NIDS pour les IACS d'une part, et l'analyse du risque cyber d'autre part. Les deux autres chapitres présentent les contributions proprement dites de ces travaux de thèse. Le chapitre 3 explore tout d'abord le risque cyber pesant sur un poste électrique et pouvant compromettre la sûreté de fonctionnement du système. Dans un deuxième temps, est proposée une extension du modèle de données IEC 61850 dédiées à la détection d'intrusion dans les communication GOOSE. Le chapitre 4 commence avec la démonstration expérimentale de la faisabilité d'une attaque de type injection de données sur le protocole GOOSE, puis explique comment utiliser les fichiers de configuration du système pour spécifier les règles de détection. Un analyseur syntaxique pour le protocole GOOSE a été intégré à l'analyseur de trafic open source Bro, permettant l'implémentation d'un algorithme de détection
Information and Communication Technologies have been pervading Industrial Automation and Control Systems (IACS) for a few decades now. Initially, IACS ran proprietary protocols on closed networks, thus ensuring some level of security through obscurity and isolation. Technologies and usages have evolved and today this intrinsic security does not exist any longer, though. This transition is in progress in the electricity domain, the power infrastructure turning into the "smart grid".The IEC 61850 standard is key to the smart grid development. It is aimed at making interoperability possible in ``Communication networks and systems for power utility automation''. It thus defines a common data object model and a stack of protocols answering different purposes.Although the cyber risk in IACS is now widely acknowledged, IEC 61850 does not address cyber security in any way whatsoever.This work tackles the question of cyber security through network intrusion detection in IEC 61850 networks, and more specifically in real-time GOOSE communications. The idea is to get the most out of the protocol specifications and system configuration while developing a tailored NIDS. This enables detection accuracy
APA, Harvard, Vancouver, ISO, and other styles
21

Meireles, Tiago Hipkin. "Wireless protocols to support vehicular safety applications." Doctoral thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/16287.

Full text
Abstract:
Doutoramento em Engenharia Electrotécnica
In the last decades the number of vehicles travelling in European road has raised significantly. Unfortunately, this brought a very high number of road accidents and consequently various injuries and fatalities. Even after the introduction of passive safety systems, such as seat belts, airbags, and some active safety systems, such as electronic brake system (ABS) and electronic stabilization (ESP), the number of accidents is still too high. Approximately eight per cent of the fatal accidents occur in motorways, in the Portuguese case, the number of fatalities has remained constant in the first decade of the 21st century. The evolution of wireless communications, along with the north-American and European policies that reserve spectrum near the 5,9GHz band for safety applications in the vehicular environment, has lead to the development of several standards. Many of these applications are based on the possibility of using a wireless communication system to warn drivers and passengers of events occurring on the road that can put at risk their own safety. Some examples of safety applications are the hard-brake warning, the wrong-way warning and the accident warning. This work aims to contribute in defining a communication protocol that guarantees the timely dissemination of safety critical events, occurring in scenarios with a high number of vehicles or in the neighbourhood of so called motorway “blackspots”, to all vehicles in the zone of interest. To ensure information integrity and user trust, the proposed system is based on the motorway infrastructure, which will validate all events reported by the vehicles with the usage of several means, such as video surveillance or other sensors. The usage of motorway infrastructure that has full motorway coverage using fixed stations also known as road side units, allows to have a global vision of the interest zone, avoiding the problems associated to networks that depend solely on vehicle to vehicle communication, generally total ad-hoc networks. By using the infrastructure, it is possible to control medium access, avoiding possible badly intended intrusions and also avoiding the phenomenon known as alarm showers or broadcast storm that occur when all vehicles want to simultaneously access the medium to warn others of a safety event. The thesis presented in this document is that it is possible to guarantee in time information about safety events, using an architecture where the road side units are coordinated among themselves, and communicate with on board units (in vehicles) that dynamically register and deregister from the system. An exhaustive and systematic state of the art of safety applications and related research projects is done, followed by a study on the available wireless communications standards that are able to support them. The set of standards IEEE802.11p and ETSI-G5 was created for this purpose and is found to be the more adequate, but care is taken to define a scenario where WAVE enabled and non-enabled vehicles can coexist. The WAVE medium access control protocol suffers from collision problems that do not guarantee a bounded delay, therefore a new protocol (V-FTT) is proposed, based on the adaptation of the Flexible Time Triggered protocol to the vehicular field. A theoretical analysis of the V-FTT applied to WAVE and ETSI-G5 is done, including quantifying a real scenario based on the A5 motorway from Lisbon to Cascais, one of the busiest Portuguese motorways. We conclude the V-FTT protocol is feasible and guarantees a bounded delay.
Nas últimas décadas tem-se assistido a um aumento do número de veículos a circular nas vias rodoviárias europeias, trazendo consigo um elevado número de acidentes e como consequência muitos feridos e vítimas mortais. Apesar da introdução de sistemas de segurança passivos, tais como cintos de segurança, airbags e de alguns sistemas de segurança activos, tais como o sistema electrónico de travagem (ABS) e o sistema electrónico de estabilidade (ESP), o número de acidentes continua a ser demasiado elevado. Aproximadamente oito por cento dos acidentes fatais na Europa ocorrem em auto-estradas, no caso Português, o número de vítimas mortais tem-se mantido constante ao longo da primeira década do século XXI. A evolução das comunicações sem fios, acompanhada de políticas europeias e norte-americanas no sentido de reservar frequências próximas dos 5,9GHz para aplicações de segurança no ambiente veicular, levou à especificação de várias normas. A maior parte destas aplicações baseiam-se na possibilidade de usar um sistema confiável de comunicação sem fios para alertar os condutores e passageiros de veículos para eventos ocorridos nas estradas que possam colocar em risco a sua segurança. Exemplos de aplicações de segurança crítica são o aviso de travagem brusca, o aviso de veículo em contra mão e o aviso de acidente na estrada. Este trabalho contribui para a definição de protocolos de comunicação capazes de garantir que a informação sobre eventos relacionados com situações de segurança crítica, que ocorram em cenários com um elevado número de veículos em zonas urbanas ou na vizinhança dos chamados “pontos negros” das auto-estradas, é disseminada com pontualidade por todos os veículos localizados na zona de interesse Por uma questão da integridade das comunicações e confiança dos condutores, o sistema proposto baseia-se na infra-estrutura do concessionário da auto-estrada, que validará os eventos reportados pelos veículos usando vários meios à sua disposição, como por exemplo sistemas de videovigilância e outros sensores. O uso de uma infra-estrutura de comunicações, que dispõe de cobertura integral a partir de estações fixas, permite uma visão global da zona coberta, evitando os problemas associados a redes baseadas apenas na comunicação entre veículos, que são em geral totalmente ad-hoc. O uso da infra-estrutura permite, entre outras vantagens, controlar o acesso ao meio, evitando simultaneamente intrusões de estranhos ao sistema e o fenómeno conhecido como “chuva de alarmes” desencadeado quando todos os veículos querem aceder simultaneamente ao meio para avisar os restantes da existência dum evento de segurança crítica. A tese apresentada neste documento defende que é possível garantir informação atempada sobre eventos que põem em risco a segurança dos veículos a partir de uma arquitectura de interligação entre as estações de comunicações fixas, coordenadas entre si, e unidades móveis (veículos) que se registam e se desligam dinamicamente do sistema. Nesta tese faz-se um levantamento exaustivo e sistemático das aplicações de segurança abordando projectos de investigação relacionados, estudam-se as tecnologias de comunicação sem fios disponíveis e a sua possibilidade de suportar aplicações de segurança rodoviária. Desta análise, conclui-se que a norma norte americana WAVE/IEEE802.11p e a europeia ETSI-G5, criadas especificamente para o efeito são as que mais se adequam à finalidade desejada. Considera-se que o cenário de utilização é evolutivo, podendo coexistirem veículos que não dispõem de sistemas de comunicação com outros que suportam a norma WAVE. Dado que o protocolo de acesso ao meio proposto pela norma WAVE não garante um acesso determinístico ao meio partilhado, propõe-se um novo protocolo, o Vehicular Flexible Time-Triggered protocol (VFTT). Faz-se a análise teórica da viabilidade do protocolo proposto para a norma WAVE e respectiva norma europeia (ETSI-G5). Quantifica-se o protocolo VFTT para um cenário real: a auto-estrada A5 Lisboa-Cascais, uma das autoestradas portuguesas mais movimentadas. Conclui-se que o protocolo é viável e garante um atraso restringido temporalmente.
APA, Harvard, Vancouver, ISO, and other styles
22

Vergara, Alonso Ekhiotz Jon. "Implementation of a manycast protocol for intermittently connected mobile ad hoc networks in disaster areas." Thesis, Linköpings universitet, RTSLAB - Laboratoriet för realtidssystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-58603.

Full text
Abstract:
Nowadays, the use of mobile phones and other wireless devices has become an indispensable part of daily life. However, the focus of wireless communication is on infrastructure-based networks, making them prone to service outage if for any reason the infrastructure is overloaded or there is no network coverage. This is the case in a disaster area, where the infrastructure that supports the communication may be destroyed or could become useless. Different approaches to complement the exchange of information in these scenarios are emerging as research results. This thesis concerns Random-Walk Gossip (RWG), which is a protocol to disseminate information in disaster areas. RWG is a many-cast protocol for intermittently connected mobile ad hoc networks. The more people can communicate, the more chances of success there are. Therefore, it is useful to investigate the possibility of implementing such protocols on commodity devices. Since Symbian is currently the most widespread mobile phone operating system, this master's thesis presents the implementation of the protocol in that platform. The protocol is also implemented in Linux and Mac OS X in order to provide heterogeneity. Finally, some aspects of the performance of the protocol in different devices are analyzed, studying the CPU load, memory consumption, radio range, energy consumption and response time of different devices using the protocol. The studies show that the use of the RWG protocol in both laptops and handheld devices is viable.
APA, Harvard, Vancouver, ISO, and other styles
23

Brocardo, Marcelo Luiz. "I2 AC." Florianópolis, SC, 2001. http://repositorio.ufsc.br/xmlui/handle/123456789/80142.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Ciência da Computação.
Made available in DSpace on 2012-10-18T10:56:18Z (GMT). No. of bitstreams: 0Bitstream added on 2014-09-25T21:26:18Z : No. of bitstreams: 1 181867.pdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
O tema desta dissertação de mestrado está centrado nas relações existentes em transações comerciais entre Estabelecimentos, Clientes e Sistemas de Crédito. Os Sistemas de Crédito, existentes devido à inadimplência, prestam serviços de análise de crédito dos Clientes. Os Sistemas de Crédito existentes possuem falhas de segurança e um déficit em abrangência, ao mesmo tempo em que são vulneráveis a ataques e roubo de informações. Portanto, a comunicação entre os Estabelecimentos, Clientes e Sistema de Crédito deve oferecer segurança, bem como rapidez, privacidade e veracidade das informações.
APA, Harvard, Vancouver, ISO, and other styles
24

Sobotka, Lukáš. "Analýza protokolů pro komunikaci v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399184.

Full text
Abstract:
This work deals security of SCADA industry systems which are used in energetic networks. It describes architecture of those systems and also analyze in details two communication protocols -- DNP3 and IEC 60870-5-104.  Next part is devoted to the analysis of anomaly and security threats which can be happen in SCADA systems. The main goal of this work is design and implementation of system which will be able to detect some of threats or anomalies. Also is necessary to propose simulation environment for testing.
APA, Harvard, Vancouver, ISO, and other styles
25

Perigo, Levi. "An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/274.

Full text
Abstract:
In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol to be prepared in it becoming the dominant internetworking protocol. The goal of the research was to develop a model for IS specialists to use with MBs in the transition from IPv4 to IPv6. To achieve this goal, the author performed a case study of ADTRAN Inc.'s IPv6 implementation, using the Systems Development Life Cycle (SDLC) framework. The SDLC methodology consists of five phases and was used to support the design, development, and implementation of the ADTRAN Inc. IPv6 solution. For Phase 1, the Research Phase, the author examined business requirements, administered a questionnaire, and recorded participant observation. In Phase 2, the Analysis Phase, the author analyzed the data from Phase 1 and created a functional and nonfunctional requirements list. For Phase 3, the Logical Design Phase, the author developed documentation and diagrams for the IPv6 implementation. In Phase 4, the Physical Design Phase, the author determined what internetworking hardware would be needed and where it should be deployed. For Phase 5, the Implementation Phase, the author completed the IPv6 network implementation. Finally, the author analyzed the data collected from this investigation. The use of the findings, in conjunction with the SDLC methodology, resulted in the ADTRAN Inc. Implementation model, which can be used by MBs of a similar size to ADTRAN Inc., when IPv6 transition initiatives are being considered.
APA, Harvard, Vancouver, ISO, and other styles
26

Campagna, Leonardo. "Miglioramento della qualità di immagini acquisite da sensori OV7670." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016.

Find full text
Abstract:
Tramite l'ausilio della development board prodotta dalla Xilinx e denominata ZedBoard, è stato utilizzato il protocollo I2C per effetuare una configurazione dei registri interni del sensore OV7670 al fine di migliorare la qualità delle immagini acquisite.
APA, Harvard, Vancouver, ISO, and other styles
27

Sorbelli, Sara. "La digitalizzazione dei prodotti ceramici: un protocollo di acquisizione e rappresentazione dei dati." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Find full text
Abstract:
Il lavoro di tesi ha analizzato i principali materiali da costruzione presenti sul mercato italiano come Oggetti BIM, ed ha elaborato una loro possibile evoluzione all’interno di un software BIM authoring. La sperimentazione nasce nell’ambito del progetto “eBIM” di ricerca e innovazione della Regione Emilia Romagna, finanziato dal fondo europeo di sviluppo regionale (POR_FESR 2014-2020) e in particolare ha riguardato la definizione di un protocollo di acquisizione e rappresentazione dei dati, ovvero una struttura informativa, che ha portato alla creazione di un database di un campione consistente di materiali da costruzione: laterizi, piastrelle, malte e intonaci. Il database contiene al suo interno una ricca selezione tra i prodotti di alcune delle principali aziende del settore produttivo di piastrelle di ceramica e laterizi, che hanno contribuito all’arricchimento semantico dei modelli BIM. Attraverso il software ArchiCAD, i prodotti selezionati sono stati digitalizzati, come materiali da costruzione, inserendo i valori delle relative proprietà nella struttura informativa creata. Per le piastrelle di ceramica è stato sviluppato anche un contenuto informativo geometrico, ovvero prototipi tridimensionali di Oggetti BIM parametrici, che sono stati esportati in formati OpenBIM, facilitando quindi l’interoperabilità e l’interscambio dei dati. Il protocollo rappresenta una nuova metodologia di digitalizzazione del prodotto che rende disponibili al progettista i dati necessari per il confronto e la selezione dei materiali da costruzione presenti sul mercato, incentivando le aziende a compiere il primo passo verso la digitalizzazione del prodotto per favorirne l’acquisto. La struttura informativa sviluppata per i prodotti ceramici sarà sia valutata in sede di comitato UNI come parte della nuova normativa, sia messa a disposizione da Confindustria Ceramica ai suoi associati come modello di riferimento per creare prodotti digitali o aggiornare quelli già esistenti.
APA, Harvard, Vancouver, ISO, and other styles
28

Tian, Bin. "Data dissemination protocols and mobility model for VANETs." Thesis, Clermont-Ferrand 2, 2016. http://www.theses.fr/2016CLF22739/document.

Full text
Abstract:
Pendant les deux dernières décennies, les technologies de réseaux ad-hoc de véhicules (VANETs : Vehicular Ad-Hoc Networks) ont été développées sous l’impulsion du monde de la recherche comme de l’industrie, étant donnés les liens des VANETs avec la sécurité routière, l’internet des objets (IoT/WoT : Internet of Things/Web of Things) pour les systèmes de transport intelligents (ITS : Intelligent Transportation Systems), les villes intelligentes et les villes vertes. Composant essentiel des VANETs, les protocoles de communication inter-véhicules (IVC : Inter-Vehicle Communication) font face à des défis techniques, en particulier à cause de la diversité des applications dans lesquelles ils sont impliqués. Dans cette thèse, après une présentation des VANETs et de l’état de l’art des IVC, nous proposons un protocole de dissémination de données, TrAD, conçu pour diffuser de manière efficiente des messages d’une source vers les véhicules présents dans la zone d’intérêt (ROI : Range of Interest). TrAD se base sur les états du trafic routier et du trafic réseau pour adapter localement la stratégie et les paramètres de transmission des données afin d’optimiser les performances des applications qui l’utilisent. De plus, un algorithme de classification des clusters locaux de véhicules est conçu pour permettre l’usage de TrAD sur autoroute aussi bien qu’en ville. Pour éviter l’encombrement des canaux de communication, un mécanisme illustratif de contrôle de la congestion reposant sur une approche distribuée est utilisé. Trois protocoles IVC de l’état de l’art ont été comparés à TrAD dans des scénarios réalistes de simulation, basés sur différentes villes réelles, différents trajets et densités véhiculaires. Les performances de TrAD surpassent celles des protocoles de référence en termes de taux de délivrance des paquets (PDR : Packet Delivery Ratio), nombre de transmissions et latence. De plus, nous montrons que TrAD est tolérant, dans une certaine mesure, aux erreurs sur les données GPS. Pour s’assurer de la qualité des simulations, nous avons étudié le modèle de déplacement employé dans le simulateur de trafic, puis couplé ce dernier au simulateur de réseau, afin que les deux s’échangent des informations en temps-réel. Grâce à la compréhension acquise lors de l’analyse du modèle de déplacement, nous avons pu développer un simulateur de conduite de tramway pour la T2C (Transports en Commun de l’agglomération Clermontoise). Des tests menés sur le matériel roulant nous ont permis d’élaborer des modèles de déplacement fidèles correspondants aux diverses situations rencontrées par le tramway. L’affichage de la simulation est assuré par un flux vidéo ajusté plutôt que des images de synthèse, ce qui permet de limiter le coût de développement tout en garantissant un certain réalisme dans l’affichage. Ce projet est soutenu par la T2C pour une durée de deux ans
In the last two decades, Vehicular Ad hoc Network (VANETs) were developed significantly by both academic institute and industries association, since VANETs originate from traffic safety and are also an important application of Internet of Things / Web of Things (IoT/WoT) for Intelligent Transportation System (ITS), Intelligent Vehicles and Smart Cities. As an essential component of VANETs, Inter-Vehicle Communication (IVC) protocols face many critical challenges, in particular, because they relate to various specific applications. In this thesis, after elaborating on related knowledge of VANETs and state-of-the-art of IVC protocols, we propose a data dissemination protocol for vehicular networking, named TrAD, to disseminate efficiently warning messages from a source to vehicles in a range of interest (ROI). TrAD considers the status of road traffic and network traffic to adapt locally the strategy and the parameters of transmissions in order to optimize the global performance of IVC application. Moreover, a local vehicular cluster classification algorithm is designed to support TrAD to be performed in both highway and urban scenarios. In addition, an illustrative congestion control mechanism is used to avoid channel congestion using a distributed approach. Three state-of-the-art IVC protocols have been compared with TrAD by means of realistic simulations. The performance of all those protocols is evaluated quantitatively in various scenarios by taking into account different real road maps, trafic routes and vehicular densities. Compared with the reference protocols, TrAD gains an outstanding overall performance in terms of packet delivery ratio, number of transmissions and delay. Furthermore, TrAD also can tolerate a reasonable degree of GPS drift while achieving efficient data dissemination. In order to ensure the quality of simulations, we deeply investigated the mobility model of road traffic simulator, and then performed the bidirectionally coupled simulation in which the network simulator and the road trafic simulator can exchange information in real-time. Upon understanding of the mobility model, we obtained a chance to develop a low-cost tram simulator for the local public transportation provider, the T2C (Transports en Commun de l’agglomération Clermontoise). We attempt to design accurate mobility models from different scenarios for the specific type of tram used by T2C. Real world trials are carried out to explore the key parameters required by theoretical deduction for our mobility model. Moreover, the display GUI relies on a video stream, rather than 3D graphics, which can reduce the cost while guaranteeing the quality of service. This project was supported for two years by T2C
APA, Harvard, Vancouver, ISO, and other styles
29

Celino, Ronaldo Andrusyszyn. "Aplicação da norma IEC 61400-25 na automação e controle de parques eólicos no Brasil." Pós-Graduação em Engenharia Elétrica, 2014. http://ri.ufs.br:8080/xmlui/handle/123456789/5047.

Full text
Abstract:
The goal of this project is to develop a system of supervision, communication and control, implemented in a free supervisory software the SCADABR for installed wind farms and/or to be installed in Brazil, from the considerations and recommendations of IEC 61400 - 25. The construction of complete wind farms with full automation, has led entrepreneurs to focus their efforts not only on profit and productivity, but also in: human capital, concerned with the management system, technological mastery and communication at all levels. Information processing with communication, opened borders with new forms of relationship and growing trend in the industrial automation field, which favors different devices to communicate with others in a cooperative way. However, the largest manufacturers of wind generation plants still offer proprietary solutions "black boxes" for the networks field, which results in a variety of protocols of systems, causing the client the full dependence on these suppliers. Aiming interoperability and flexibility of operation, groups of researchers advocate standards of open model, as the solution of networks and protocols for all, leaving customers free. In this struggle, the best-known organization in the field of wind energy is IEC 61400-25, specifically for the monitoring system and free communication among different equipment vendors, nevertheless internal communication of the components of wind power plant is not within the standard. The application range of the standard covers the operation of this kind of wind farm, including wind turbine, meteorological measurement system, electrical system and management system, but does not include the relevant line of the substation feeding and information. Hence, the interaction with the supervisory system SCADABR developed in "open-source" model of free license. It is proposed the application of a multi-platform Java-based, from an application server, like Apache Tomcat the standard choice. Considering the requirements of the present communication model in IEC 61400-25-2 it is defined a model of information for monitoring and control of wind power plants, to this end, part-data simulator MatrikonOPC through customer / OPC DA server interaction (Object Linking and Embedding for Process Control Data Access), with ScadaBR software.
O objetivo da pesquisa é desenvolver um sistema de supervisão, comunicação e controle, implementado em um software de supervisão livre o ScadaBR, para parques eólicos instalados e/ou a serem instalados no Brasil, a partir das considerações e recomendações da norma IEC 61400-25. A construção de parques eólicos completos, com automação total, tem levado os empreendedores a focalizar seus esforços não só no lucro e produtividade, mas também no: capital humano, preocupando-se com o sistema de gestão, domínio tecnológico e comunicação em todos os níveis. O processamento da informação com a comunicação, abriu fronteiras com as novas formas de relacionamento e a crescente tendência na área de automação industrial, favorece que diferentes dispositivos comuniquem-se com outros de uma maneira cooperativa. No entanto, os maiores fabricantes de usinas de geração eólica ainda oferecem soluções proprietárias caixas pretas para as redes de campo, o que resulta numa diversidade de protocolos de sistemas, levando dependência desses fornecedores. Visando a interoperabilidade e flexibilidade de operação, grupos de pesquisadores defendem normas de padrão aberto, como a solução de redes e protocolos para todos, deixando os clientes livres. Nesta luta, a organização mais conhecida na área de energia eólica é a norma IEC 61400-25, especificamente para o sistema de monitoramento e comunicação livre entre diferentes fornecedores de equipamentos, porém a comunicação interna dos componentes da usina de energia eólica não está no âmbito desta norma. A faixa de aplicação da norma abrange parte da operação desse tipo de usina, incluindo turbina de vento, sistema de medição meteorológica, sistema elétrico e sistema de gestão, mas não inclui a linha relevante de alimentação e informação da subestação. Daí a interação com o sistema supervisório ScadaBR, desenvolvido em modelo open-source de licença gratuita. Propõe-se a aplicação de uma multi-plataforma baseada em Java, a partir de um servidor de aplicações, com o Apache Tomcat a escolha padrão. Considerando as exigências do modelo de comunicação presentes na Norma IEC 61400-25-2, define-se um modelo de informação para monitoramento e controle de usinas eólicas, para tal, parte-se do simulador de dados MatrikonOPC, por meio da interação cliente / servidor OPC DA (Object Linkingand Embedding for Process Control Data Access), com o software ScadaBR.
APA, Harvard, Vancouver, ISO, and other styles
30

Pérusse, Philibert. "Téléconduite et acquisition sur un réseau WAN, basées sur les protocoles TCP/IP et IEC 60870-5." Sherbrooke : Université de Sherbrooke, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Pérusse, Philibert. "Téléconduite et acquisition sur un réseau WAN, basées sur les protocoles TCP/IP et IEC 60870-5." Mémoire, Université de Sherbrooke, 2003. http://savoirs.usherbrooke.ca/handle/11143/1196.

Full text
Abstract:
La déréglementation de l'industrie de l'énergie mène à un contrôle des coûts et des dépenses de plus en plus accru. Ce contrôle passe par la gestion plus efficace et complète des réseaux de production, de transport et distribution électrique. Ces besoins de gestions amènent une nécessité de disponibilité et de centralisation des informations sur le réseau et ses constituants. Avec la disponibilité des technologies de communication réseau dans de plus en plus de postes et de centrales, il devient intéressant d'utiliser ce nouveau médium pour transporter les protocoles de téléconduite. Toutefois, ces protocoles étant conçus pour opérer sur des lignes sérielles dédiées, ils doivent être adaptés. Le protocole de téléconduite IEC 60870-5-104 a été développé pour évoluer sur les réseaux à commutation par paquets en remplacement du protocole sériel IEC 60870-5-101. Les exigences de la téléconduite étant particulières, il s'avère important de valider que le nouveau protocole soit à la hauteur. Une des contributions principales de ce travail a été de faire l'étude du protocole IEC 60870-5-104 et d'effectuer des comparaisons avec le protocole IEC 60870-5-101. Pour ce faire, des bancs d'essais ont été montés. De plus, des points de mesures et des critères de comparaisons ont été élaborés. Les résultats démontrent que le protocole réagit bien aux situations développées, mais que d'autres considérations sont à considérer. Ce travail aura permis d'éclairer le choix des mécanismes introduits dans le IEC 60870-5-104 tout en validant son fonctionnement.
APA, Harvard, Vancouver, ISO, and other styles
32

Amato, Elisabetta. "Performance comparison of C-V2X and WAVE protocols for vehicular to infrastructure communications: simulation of the highway use case." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/16534/.

Full text
Abstract:
The objective of this thesis is the analysis and the study of the various access techniques for vehicular communications, in particular of the C-V2X and WAVE protocols. The simulator used to study the performance of the two protocols is called LTEV2Vsim and was developed by the CNI IEIIT for the study of V2V (Vehicle-to-Vehicle) communications. The changes I made allowed me to study the I2V (Infrastructure-to-Vehicle) scenario in highway areas and, with the results obtained, I made a comparison between the two protocols in the case of high vehicular density and low vehicular density, putting in relation to the PRR (packet reception ratio) and the cell size (RAW, awareness range). The final comparison allows to fully understand the possible performances of the two protocols and highlights the need for a protocol that allows to reach the minimum necessary requirements.
APA, Harvard, Vancouver, ISO, and other styles
33

Armadhila, Nelago Ndapandula. "Is the African Union’s decision on the ICC and the adoption of Article 46A Bis of the Protocol on Amendments to the Protocol on the Statute of the African Court of Justice and Human Rights unlawful under international law?" Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/13188.

Full text
Abstract:
Includes bibliographic references.
The proceedings brought against Kenyan President Uhuru Kenyatta and his deputy, William Ruto for post-election election violence in 2007 by the International Criminal Court has resulted in action by the African Union that undermines individual criminal responsibility for heads of state and government officials and for the promotion and protection of human rights in Africa. This thesis will assess whether the African Union’s decision to not cooperate with the International Criminal Court, and the adoption of Article 46A Bis of the Protocol on Amendments to the Protocol on the Statute of the African Court of Justice and Human Rights is unlawful under the principles of international law. This thesis will also assess how these decisions will impact Africa’s ability to promote and protect human rights on the continent.
APA, Harvard, Vancouver, ISO, and other styles
34

Amadhila, Nelago Ndapandula. "Is the African Union’s decision on the ICC and the adoption of Article 46A Bis of the Protocol on Amendments to the Protocol on the Statute of the African Court of Justice and Human rights unlawful under international law?" Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/12822.

Full text
Abstract:
Includes bibliographical references.
The proceedings brought against Kenyan President Uhuru Kenyatta and his deputy, William Ruto for post-election election violence in 2007 by the International Criminal Court has resulted in action by the African Union that undermines individual criminal responsibility for heads of state and government officials and for the promotion and protection of human rights in Africa. This thesis will assess whther the African Union’s decision to not cooperate with the International Criminal Court , and the adoption of Article 46A Bis of the Protocol on Amendments to the Protocol on the Statute of the African Court of Justice and Human Rights is unlawful under the principles of international law. This thesis will also assess how thes e decisions will impact Africa’s ability to promote and protect human rights on the continent.
APA, Harvard, Vancouver, ISO, and other styles
35

Bogati, Rajendra. "Performance Evaluation of Non-commercial LTE Network For Smart Grid Application : Modification of IEC 61850-90-5 Protocol stack and its Testing over Non-commercial LTE." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-219621.

Full text
Abstract:
The introduction of smart grid technology has changed the way traditional power grid network function. It made the grid structure more dynamic by enhancing electrical usage management capability. Also, it has increased the scope to enhance communication infrastructure in a smart grid structure. The current smart grid solution is based on IEC 61850 architecture where the exchange of information between the electrical utilities is over the fast Ethernet LAN connection. This communication mechanism is fast, efficient but lacks scalability, flexibility and less susceptible to failure. Also, earlier technical paper from IEC 61850 standard was for communication within a substation. Wide Area Monitoring Protection and Control implementation which utilizes coherent real time synchrophasor information would play a vital role in realizing the utility physical status. IEC 61850-90-5, a new technical report from International Electrotechnical Commission provides the mechanism to transmit and receive the synchrophasor information using the advance IP protocol over a wireless communication infrastructure for WAMPAC application. IEC 61850-90-5 provide a way to exchange routable synchrophasor information over public IP network such as LTE, WiMax, WLAN, etc. Out of all the available wireless solution, LTE provides high flexibility, distance coverage, data rate with low latency and hence can play an important role in replacing the existing communication structure in a smart grid. The thesis work evaluates the performance and applicability of LTE for smart grid communication. An IEC 61850-90-5 communication model utilizing UDP/IP protocol to transmit and receive data over the LTE network was developed from the open source project. The modified model was used to benchmark the performance of LTE. Different communication metrics such as reliability, availability, latency, and throughput was evaluated to benchmark the performance of LTE for time critical smart grid application. The metrics were measured for different packet sizes and transmission rates combination. The result shares some interesting findings on the readiness of LTE for smart grid solution. It is concluded that cellular network can play an important role in realizing communication infrastructure in a smart grid application.
APA, Harvard, Vancouver, ISO, and other styles
36

Chvátal, Michal. "Řízení dodávky vody v rodinném domě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442453.

Full text
Abstract:
The diploma thesis deals with the design and implementation of the system that will control the water supply for the family house and its garden. The system aslo allows you to store a history that can be viewed via the web interface. The web interface also allows you to set system parameters and monitor the current status.
APA, Harvard, Vancouver, ISO, and other styles
37

Combes, Jean-Michel. "Utilisation d'identifiants cryptographiques pour la sécurisation IPv6." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00835931.

Full text
Abstract:
IPv6, protocole succédant à IPv4, est en cours de déploiement dans l'Internet. Il repose fortement sur le mécanisme Neighbor Discovery Protocol (NDP). Celui-ci permet non seulement à deux nœuds IPv6 de pouvoir communiquer, à l'instar du mécanisme Address Resolution Protocol (ARP) en IPv4, mais il apporte aussi de nouvelles fonctionnalités, telles que l'autoconfiguration d'adresse IPv6. Aussi, sa sécurisation pour le bon fonctionnement de l'Internet en IPv6 est critique. Son mécanisme de sécurité standardisée à l'Internet Engineering Task Force (IETF) se nomme Secure Neighbor Discovery (SEND). Il s'appuie à la fois sur l'utilisation d'identifiants cryptographiques, adresses IPv6 appelées Cryptographically Generated Addresses (CGA) et qui sont générées à partir d'une paire de clés publique/privée, et de certificats électroniques X.509. L'objet de cette thèse est l'étude de ces identifiants cryptographiques, les adresses CGA, ainsi que le mécanisme SEND les employant, et leurs réutilisations potentielles pour la sécurisation IPv6. Dans une première partie de cette thèse, tout d'abord, nous posons l'état de l'art. Dans une deuxième partie de cette thèse, nous nous intéressons à la fiabilité du principal mécanisme connu employant les adresses CGA, le mécanisme SEND. Dans une troisième et dernière partie de cette thèse, nous présentons des utilisations des identifiants cryptographiques pour la sécurisation IPv6
APA, Harvard, Vancouver, ISO, and other styles
38

Maršál, Martin. "Elektronický modul pro akustickou detekci." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-240831.

Full text
Abstract:
This diploma thesis deals with the design and implementation of an electronic module for acoustic detection. The module has the task of detecting a predetermined acoustic signals through them learned classification model. The module is used mainly for security purposes. To identify and classify the proposed model using machine learning techniques. Given the possibility of retraining for a different set of sounds, the module becomes a universal sound detector. With acoustic sound using the digital MEMS microphone, for which it is designed and implemented conversion filter. The resulting system is implemented into firmware microcontroller with real time operating system. The various functions of the system are realized with regard to the possible optimization (less powerful MCU or battery power). The module transmits the detection results of the master station via Ethernet network. In the case of multiple modules connected to the network to create a distributed system, which is designed for precise time synchronization using PTP protocol defined by the IEEE-1588 standard.
APA, Harvard, Vancouver, ISO, and other styles
39

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles
40

Singh, Mandeep. "STUDIES ON THE SIZE AND NON-PLANARITY OF AROMATIC STACKING MOIETY ON CONFORMATION SELECTIVITY AND THERMAL STABILIZATION OF G-QUADRUPLEXES." Scholarly Commons, 2020. https://scholarlycommons.pacific.edu/uop_etds/3725.

Full text
Abstract:
Targeting DNA has the advantage over proteins for cancer remediation because of the fewer copies of the ligands required for the desired therapeutic effect. Traditionally, covalent DNA binders like alkylating agents have been used to induce genetic instability through the formation of DNA lesions and strand breaks, leading to cellular apoptosis. The primary drawback of this treatment is the non-specific binding that affects both cancerous and non-cancerous cells. G-quadruplexes are the DNA secondary structures that are present in abundance near the promoter regions of the oncogenes and are involved in the regulation of their activities. A ligand-mediated stabilization of G-quadruplexes in the promoter regions and down-regulation of the associated oncogenes have been validated. In contrast to alkylating agents, G-quadruplex ligands induce genetic stabilization through non-covalent interactions. They can be designed to interact specifically with G-quadruplex DNA over duplex DNA, which reduce side effects arising from the off-targeting. G-quadruplex ligands invariably have the large planar aromatic moiety to interact with G-quadruplexes through π- π stacking interactions. For determining the size effect of the aromatic moiety on stabilization of G-quadruplexes, a series of ligands were synthesized by conjugating nucleobases or 1,10-phenanthroline with an aminoglycoside, neomycin. The resulting conjugates increased the binding affinity synergistically and enabled us to study the effect of the stacking moiety required for G-quadruplex stabilization. Nucleobase-neomycin conjugates did not show stabilization stabilize of human telomeric G-quadruplex. 1,10-Phenanthroline-neomycin conjugate (7b) on the other hand binds to human telomeric G-quadruplex with a Ka of (8.92.4)×108 M-1 and inhibits telomerase activity at 1.56 µM probably through G-quadruplex stabilization. Moving forward, we further enlarged the aromatic moiety by tethering two 1,10-phenantholine molecules together through a five-atom linker. The resulting molecule (2-Clip-phen) was conjugated with various amino-containing side chains. 2-Clip-phen derivatives showed at least 30 times weaker binding to duplex DNA over G-quadruplex DNA. In addition, compounds showed a preference for the antiparallel G-quadruplex conformation over parallel and hybrid G-quadruplex conformations, as shown in the CD spectroscopy studies. Ligands 11 and 13 induced the formation of an antiparallel G-quadruplex from random coils and stabilize it to 60 oC (Tm) in a salt-free condition. Mass spectrometry study showed the formation of a two-tetrad G-quadruplex with the 2-Clip-phen ligand. Docking study showed that the ligand interacts most favorably with antiparallel G-quadruplex conformation, which is supported further by the larger thermal stabilization effect on antiparallel G-quadruplex compared with other G-quadruplex conformations. Our study suggests that 2-Clip-phen can be used as a scaffold for designing G-quadruplex binding ligands that preferentially bind to antiparallel G-quadruplexes, which has never been reported before.
APA, Harvard, Vancouver, ISO, and other styles
41

Chiu, Hsien-Yao, and 邱顯堯. "Applying I2C Communication Protocol on the Development of Distributed Single-Chip System." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/55914329329790113748.

Full text
Abstract:
碩士
元智大學
機械工程學系
92
Due to the limited ability of single-chip controller, it can not cover all the functionality provided by “Powerful controllers”, so we propose a single-chip system based on I2C network communication to integrate single-controller, and replace centralized communication architecture with multi-controllers distributed one. The core of this chip is PIC18F452 produced by Microchip, we utilize this to develop a chain of communication components to fit any different requirements in single-chip communication and fault tolerance field. In addition, we build up a testing module applied on “broken line” simulation, it assists us to detect if any communication component can fix fault during “broken line”. This test module is implemented by C language, so it could be ported to different platforms without extra efforts. This research has been carried out in X-Y platform, Stewart platform and auto pilot system. The experiments show that I2C network distributed single-chip system takes several benefits such as modulization, open architecture, simple layout, and scalable.
APA, Harvard, Vancouver, ISO, and other styles
42

Caetano, Miguel José Chaves. "I2C Verification suite." Dissertação, 2010. http://hdl.handle.net/10216/57760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Caetano, Miguel José Chaves. "I2C Verification suite." Master's thesis, 2010. http://hdl.handle.net/10216/57760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Soprovich, Greg F. "Delay insensitive protocol and IC design." 1989. http://hdl.handle.net/1993/17134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Lo, Chan Chen, and 羅佳昇. "Applying IIC Communication Protocol on the Development of Optical Fiber System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/72535338468773179539.

Full text
Abstract:
碩士
元智大學
電機工程學系
98
IIC, Inter-IC, is a common interface for communication between two IC chips in electronic products. Due to superior capacity of serial transmission and low-cost property of without using special encoding and decoding devices, IIC are often widely used in various fields. For communication between audio and visual devices, the linking between them can be accomplished by IIC. Through IIC, the display device can transfer relevant information to the computer and the computer can also transmit high resolution images to the display device. Therefore, users can obtain convenient functions of insert and use promptly at the same time. In recent years, due to revolutionary development of display technology, the analog image signal completely changes into the digit in an all-round way such that the transmission of several high-frequency signals approaches the limit of capacity of copper wire. For application at higher frequencies, optical-fiber communication is one of the solutions to solve this problem. A traditional cable system can be replaced by a small optical fiber system to transmit the digit image. This approach can solve the problems of signal decay and transmit distance when high-order image signals are transmitted. In this study, we design a small optic fiber system to transmit the half-duplex IIC signal. At the same time, we also propose two schemes of software and hardware to solve the problem of two-way communication when the optical fiber was used to transmit IIC signals. Through numerous testing with real systems, we found that the transmitted higher-order digit images can still maintain both the computer and display device working normally as the IIC signal transmitted by the optical fiber system from a distance of 0.5 m to a distance of 500 m. In addition, the high quality of the transmitted high-order digit image can still be maintained at a distance of 500 m.
APA, Harvard, Vancouver, ISO, and other styles
46

Tai, Chih-Chang, and 戴志昌. "A Secure Electronic Voting Protocol with IC Cards." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/89661963985970092984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Yeh, Yu-Kuan, and 葉禹寬. "Intrusion Detection Method for IEC 60870-5-104 Protocol Using Honeypot Logs." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394024%22.&searchmode=basic.

Full text
Abstract:
碩士
國立中興大學
資訊科學與工程學系所
107
Industrial Control system (ICS) and Supervisory Control and Data Acquisition (SCADA) system usually do not include security design in their design phase. With the growing demands of automation and remote monitoring, ICSs become more complex and have greater internet connectivity. As a result, the risk of hacking on industrial control networks also increases. Therefore, designing an effective intrusion detection system (IDS) for ICS has become an important issue. In this thesis, we design a honeypot to capture malicious packets of IEC 60870-5-104 protocol and then use deep packet analysis and machine learning algorithm to analyze the honeypot log. In the honeypot design, we add new codes to the open-source honeypot Conpot for supporting IEC 60870-5-104 protocol. The X-means clustering algorithm and Smith-Waterman Algorithm are used for generating and comparing attack gene sequences, respectively. If an attack sequence is unseen, then it is added to the attack signature database with appropriate class label. If an attack sequence is known in the attack signature database, then the proposed system will provide the characteristics of the attack, which in turn can be used as rules in intrusion detection system. The experimental results show that the performance of the proposed method has about 90.9% for accuracy, 96% for precision, 91% for recall, and 92% for F1-score.
APA, Harvard, Vancouver, ISO, and other styles
48

Yeh, Ken-Wen, and 葉耕文. "Accountability Study on Electronic Voting Protocol with IC Cards." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/21703677619818326793.

Full text
Abstract:
碩士
銘傳大學
資訊管理研究所
87
In 1997, J.K.Jan and C.C.Tai proposed an electronic voting process with IC cards. Their protocol can be separated to registration, authentication, voting, and opening phases. In this paper, we first analyze their process, and detect that the registration and voting phases lacks the accountability property, which may cause future disputes. Second, we modify their process into an accountable process. Third, we create extended finite state machines to model the new process (while only English texts are provided in their paper to describe their process). Fourth, extended finite state machines are interoperable to trace some basic functions of the protocol. Fifth, Estelle pseudo-codes are written for the extended finite state machines. We also discuss about possible extensions of the current protocol. First, we allow that each vote can have his own weight, and investigate the possible relationship about the weight and the privacy. Second, we discuss the encryption techniques to extend the two voting centers to more than two voting centers. Third, we propose a new security problem, called the time-sequence security problem, that may happen in voting using IC cards; and we propose possible approach for overcoming this problem.
APA, Harvard, Vancouver, ISO, and other styles
49

Chung, Che-Kai, and 鐘晢愷. "The study on conformance test between IEDs based on IEC 61850 communication Protocol." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/91863842326046406779.

Full text
Abstract:
碩士
中原大學
電機工程研究所
102
The purpose of this thesis is to establish of conformance test platform based on IEC 61850 communication protocol for intelligent electronic device (IED) among different manufacturers. Due to the IEC 61850 standard is not strictly regulated, although manufacturers all declare that their equipment meet the IEC 61850 standard but there still are some problems in the consistency. In this thesis we perform the conformance test network of Generic Object Oriented Substation Event (GOOSE) transmitting time for the IEDs within bay levels via Ethernet. GOOSE ping-pong method is also used for the test of different manufacturer’s IED whether its GOOSE input and output time meets the IEC 61850-10 standard or not. The IEC 61850-based conformance test pilot platform has been established. Based on this platform, a comprehensive IEC 61850 conformance test platform can be built to meet the industrial and academic requirements in the future.
APA, Harvard, Vancouver, ISO, and other styles
50

Hsieh, Hsiang-Hua, and 謝祥化. "Digital Communication IC &Wireless Bio-Sensor Network Protocol Design." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/18059079369311889983.

Full text
Abstract:
碩士
國立臺灣大學
電子工程學研究所
104
As the Internet of Thing (IoT) trend, cloud technology, and big data analysis technology grow, the wireless sensor network is introduced for the in-house IoT scenario. In this thesis, we design both the communication protocol and the transmission hardware together to optimize the overall system performance. Due to the cross-layer design, the interface problem becomes an important issue. Besides, a systematic analysis of a simple network architecture is conducted to find the optimal operational point of the protocol design, given the hardware parameters. In other words, a model considers the clock drift, BER vs SNR, the synchronization error, the sync. frequency, the sync. margin, fail packet statistics and so on, is proposed as a guideline for wireless communication network design. Moreover, a cost function in algorithm field and the Energy Per Byte Index (EPBI) are introduced to evaluate the performance in the perspective of power consumption V.S. data rate. Most important of all, most of the parameters in the analysis are based on the measurement result and hence are much more realistic for the integrated system design in practical. In short, a design rule for the wireless sensor network design is proposed and an optimal protocol parameter set in the perspective of power consumption is found for a fixed specification of the adopted hardware, which meets the low power consumption trend of the IoT application.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography