4 resultados para passive safety systems
em AMS Tesi di Laurea - Alm@DL - Università di Bologna
Resumo:
With the development of the embedded application and driving assistance systems, it becomes relevant to develop parallel mechanisms in order to check and to diagnose these new systems. In this thesis we focus our research on one of this type of parallel mechanisms and analytical redundancy for fault diagnosis of an automotive suspension system. We have considered a quarter model car passive suspension model and used a parameter estimation, ARX model, method to detect the fault happening in the damper and spring of system. Moreover, afterward we have deployed a neural network classifier to isolate the faults and identifies where the fault is happening. Then in this regard, the safety measurements and redundancies can take into the effect to prevent failure in the system. It is shown that The ARX estimator could quickly detect the fault online using the vertical acceleration and displacement sensor data which are common sensors in nowadays vehicles. Hence, the clear divergence is the ARX response make it easy to deploy a threshold to give alarm to the intelligent system of vehicle and the neural classifier can quickly show the place of fault occurrence.
Resumo:
The trend related to the turnover of internal combustion engine vehicles with EVs goes by the name of electrification. The push electrification experienced in the last decade is linked to the still ongoing evolution in power electronics technology for charging systems. This is the reason why an evolution in testing strategies and testing equipment is crucial too. The project this dissertation is based on concerns the investigation of a new EV simulator design. that optimizes the structure of the testing equipment used by the company who commissioned this work. Project requirements can be summarized in the following two points: space occupation reduction and parallel charging implementation. Some components were completely redesigned, and others were substituted with equivalent ones that could perform the same tasks. In this way it was possible to reduce the space occupation of the simulator, as well as to increase the efficiency of the testing device. Moreover, the possibility of conjugating different charging simulations could be investigated by parallelly launching two testing procedures on a unique machine, properly predisposed for supporting the two charging protocols used. On the back of the results achieved in the body of this dissertation, a new design for the EV simulator was proposed. In this way, space reduction was obtained, and space occupation efficiency was improved with the proposed new design. The testing device thus resulted to be way more compact, enabling to gain in safety and productivity, along with a 25% cost reduction. Furthermore, parallel charging was implemented in the proposed new design since the conducted tests clearly showed the feasibility of parallel charging sessions. The results presented in this work can thus be implemented to build the first prototype of the new EV simulator.
Resumo:
Today more than ever, with the recent war in Ukraine and the increasing number of attacks that affect systems of nations and companies every day, the world realizes that cybersecurity can no longer be considered just as a “cost”. It must become a pillar for our infrastructures that involve the security of our nations and the safety of people. Critical infrastructure, like energy, financial services, and healthcare, have become targets of many cyberattacks from several criminal groups, with an increasing number of resources and competencies, putting at risk the security and safety of companies and entire nations. This thesis aims to investigate the state-of-the-art regarding the best practice for securing Industrial control systems. We study the differences between two security frameworks. The first is Industrial Demilitarized Zone (I-DMZ), a perimeter-based security solution. The second one is the Zero Trust Architecture (ZTA) which removes the concept of perimeter to offer an entirely new approach to cybersecurity based on the slogan ‘Never Trust, always verify’. Starting from this premise, the Zero Trust model embeds strict Authentication, Authorization, and monitoring controls for any access to any resource. We have defined two architectures according to the State-of-the-art and the cybersecurity experts’ guidelines to compare I-DMZ, and Zero Trust approaches to ICS security. The goal is to demonstrate how a Zero Trust approach dramatically reduces the possibility of an attacker penetrating the network or moving laterally to compromise the entire infrastructure. A third architecture has been defined based on Cloud and fog/edge computing technology. It shows how Cloud solutions can improve the security and reliability of infrastructure and production processes that can benefit from a range of new functionalities, that the Cloud could offer as-a-Service.We have implemented and tested our Zero Trust solution and its ability to block intrusion or attempted attacks.