873 resultados para data acquisition
Resumo:
The injection stretch blow moulding process is used to manufacture PET containers used in the soft drinks and carbonated soft drinks industry. The process consists of a test tube like specimen known as a preform which is heated, stretch and blown into a mould to form the container. This research is focused on developing a validated simulation of the process thus enabling manufacturers to design their products in a virtual environment without the need to waste time, material and energy. The simulation has been developed using the commercial FEA package Abaqus and has been validated using state of the art data acquisition system consisting of measurements for preform temperature (inner and outer wall) using a device known as THERMOscan (Figure 1), stretch rod force and velocity, internal pressure and air temperature inside the preform using an instrumented stretch rod and the?exact?timing of when the preform touches the mould wall using contact sensors.? In addition, validation studies have also been performed by blowing a perform without a mould and using high sped imaging technology in cooperation with an advanced digital image correlation system (VIC 3D) to provided new quantitative information on the behaviour of PET during blowing.? The approach has resulted in a realistic simulation in terms of accurate input parameters, preform shape evolution and prediction of final properties.
Resumo:
Capillary-based systems for measuring the input impedance of musical wind instruments were first developed in the mid-20th century and remain in widespread use today. In this paper, the basic principles and assumptions underpinning the design of such systems are examined. Inexpensive modifications to a capillary-based impedance measurement set-up made possible due to advances in computing and data acquisition technology are discussed. The modified set-up is able to measure both impedance magnitude and impedance phase even though it only contains one microphone. In addition, a method of calibration is described that results in a significant improvement in accuracy when measuring high impedance objects on the modified capillary-based system. The method involves carrying out calibration measurements on two different objects whose impedances are well-known theoretically. The benefits of performing two calibration measurements (as opposed to the one calibration measurement that has been traditionally used) are demonstrated experimentally through input impedance measurements on two test objects and a Boosey and Hawkes oboe. © S. Hirzel Verlag · EAA.
Resumo:
Tissue microarrays (TMAs) represent a powerful method for undertaking large-scale tissue-based biomarker studies. While TMAs offer several advantages, there are a number of issues specific to their use which need to be considered when employing this method. Given the investment in TMA-based research, guidance on design and execution of experiments will be of benefit and should help researchers new to TMA-based studies to avoid known pitfalls. Furthermore, a consensus on quality standards for TMA-based experiments should improve the robustness and reproducibility of studies, thereby increasing the likelihood of identifying clinically useful biomarkers. In order to address these issues, the National Cancer Research Institute Biomarker and Imaging Clinical Studies Group organized a 1-day TMA workshop held in Nottingham in May 2012. The document herein summarizes the conclusions from the workshop. It includes guidance and considerations on all aspects of TMA-based research, including the pre-analytical stages of experimental design, the analytical stages of data acquisition, and the postanalytical stages of data analysis. A checklist is presented which can be used both for planning a TMA experiment and interpreting the results of such an experiment. For studies of cancer biomarkers, this checklist could be used as a supplement to the REMARK guidelines.
Resumo:
The commonly used British Standard constant head triaxial permeability test for testing of fine-grained soils is relatively time consuming. A reduction in the required time for soil permeability testing would provide potential cost savings to the construction industry, particularly in the construction quality assurance of landfill clay liners. The purpose of this paper is to evaluate an alternative approach of measuring permeability of fine-grained soils benefiting from accelerated time scaling for seepage flow when testing specimens in elevated gravity conditions provided by a centrifuge. As part of the investigation, an apparatus was designed and produced to measure water flow through soil samples under conditions of elevated gravitational acceleration using a small desktop laboratory centrifuge. A membrane was used to hydrostatically confine the test sample. A miniature data acquisition system was designed and incorporated in the apparatus to monitor and record changes in head and flow throughout the tests. Under enhanced gravity in the centrifuge, the flow through the sample was under ‘variable head' conditions as opposed to ‘constant head' conditions as in the classic constant head permeability tests conducted at 1 g . A mathematical model was developed for analysis of Darcy's coefficient of permeability under conditions of elevated gravitational acceleration and verified using the results obtained. The test data compare well with the results on analogous samples obtained using the classical British Standard constant head permeability tests.
Resumo:
The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.
Resumo:
Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified using a ruled based method.
Resumo:
Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.
Resumo:
This paper studies the impact of tower shadow effect on the power output of a fixed-speed wind farm. A data acquisition unit was placed at a wind farm in Northern Ireland which consists of ten fixed-speed wind turbines. The recording equipment logged the wind farmpsilas electrical data, which was time stamped using the global positioning network. Video footage of the wind farm was recorded and from it the blade angle of each turbine was determined with respect to time. Using the blade angle data and the wind farmpsilas power output, studies where performed to ascertain the extent of tower shadow effect on power fluctuation. This paper presents evidence that suggests that tower shadow effect has a significant impact on power fluctuation and that this effect is increased due to the synchronising of turbine blades around the tower region.
Resumo:
The impact of power fluctuations arising from fixed-speed wind turbines on the magnitude and frequency of inter-area oscillations has been investigated. The authors introduced data acquisition equipment to record the power flow on the interconnector between the Northern Ireland and Republic of Ireland systems. Through monitoring the interconnector oscillation using a fast Fourier transform, it was possible to determine the magnitude and frequency of the inter-area oscillation between the two systems. The impact of tower shadow on the output power from a wind farm was analysed using data recorded on site. A case study investigates the effect on the system of the removal of a large fixed-speed wind farm. Conclusions are drawn on the impact that conventional generation and the output from fixed-speed wind farms have on the stability of the Irish power system.
Resumo:
The impact of power fluctuations arising from fixed-speed wind turbines on the magnitude and frequency of inter-area oscillations was investigated. The authors used data acquisition equipment to record the power flow on the interconnector between the Northern Ireland and Republic of Ireland systems. By monitoring the interconnector oscillation using a fast Fourier transform, it was possible to determine the magnitude and frequency of the inter-area oscillation between the Northern Ireland electricity system and that of the electricity supply board. Analysis was preformed to determine the relationship (if any) between the inter-area oscillation and the observed wind power generation at the corresponding time. Subsequently, regression analysis was introduced to model this relationship between the FFT output and the wind power generation. The effect of conventional generators on the magnitude and frequency of the inter-area oscillation was also considered.
Resumo:
The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.
Resumo:
The temperature at which densification ends for a range of blends comprising a metallocene catalysed medium density polyethylene (PE) in two different physical forms (powder and micropellets) were investigated using a novel data acquisition system (TP Picture®), developed by Total Petrochemicals [1]. The various blends were subsequently rotomoulded and test specimens prepared for mechanical analysis to establish the relationship between densification rate and bubble size / distribution on the part properties. The micropellets exhibited more rapid bubble removal times than powder.
Resumo:
Data processing is an essential part of Acoustic Doppler Profiler (ADP) surveys, which have become the standard tool in assessing flow characteristics at tidal power development sites. In most cases, further processing beyond the capabilities of the manufacturer provided software tools is required. These additional tasks are often implemented by every user in mathematical toolboxes like MATLAB, Octave or Python. This requires the transfer of the data from one system to another and thus increases the possibility of errors. The application of dedicated tools for visualisation of flow or geographic data is also often beneficial and a wide range of tools are freely available, though again problems arise from the necessity of transferring the data. Furthermore, almost exclusively PCs are supported directly by the ADP manufacturers, whereas small computing solutions like tablet computers, often running Android or Linux operating systems, seem better suited for online monitoring or data acquisition in field conditions. While many manufacturers offer support for developers, any solution is limited to a single device of a single manufacturer. A common data format for all ADP data would allow development of applications and quicker distribution of new post processing methodologies across the industry.
Resumo:
Cyber threats in Supervisory Control and Data Acquisition (SCADA) systems have the potential to render physical damage and jeopardize power system operation, safety and stability. SCADA systems were originally designed with little consideration of escalating cyber threats and hence the problem of how to develop robust intrusion detection technologies to tailor the requirements of SCADA is an emerging topic and a big challenge. This paper proposes a stateful Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method to improve the cyber-security of SCADA systems using the IEC 60870-5-104 protocol which is tailored for basic telecontrol communications. The proposed stateful protocol analysis approach is presented that is designed specifically for the IEC 60870-5-104 protocol. Finally, the novel intrusion detection approach are implemented and validated.
Resumo:
In this paper, we present a hybrid BDI-PGM framework, in which PGMs (Probabilistic Graphical Models) are incorporated into a BDI (belief-desire-intention) architecture. This work is motivated by the need to address the scalability and noisy sensing issues in SCADA (Supervisory Control And Data Acquisition) systems. Our approach uses the incorporated PGMs to model the uncertainty reasoning and decision making processes of agents situated in a stochastic environment. In particular, we use Bayesian networks to reason about an agent’s beliefs about the environment based on its sensory observations, and select optimal plans according to the utilities of actions defined in influence diagrams. This approach takes the advantage of the scalability of the BDI architecture and the uncertainty reasoning capability of PGMs. We present a prototype of the proposed approach using a transit scenario to validate its effectiveness.