902 resultados para supervisory control and data acquisition


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O atual modelo do setor elétrico brasileiro permite igualdade de condições a todos os agentes e reduz o papel do Estado no setor. Esse modelo obriga as empresas do setor a melhorarem cada vez mais a qualidade de seu produto e, como requisito para este objetivo, devem fazer uso mais efetivo da enorme quantidade de dados operacionais que são armazenados em bancos de dados, provenientes da operação dos seus sistemas elétricos e que tem nas Usinas Hidrelétricas (UHE) a sua principal fonte de geração de energia. Uma das principais ferramentas para gerenciamento dessas usinas são os sistemas de Supervisão, Controle e Aquisição de Dados (Supervisory Control And Data Acquisition - SCADA). Assim, a imensa quantidade de dados acumulados nos bancos de dados pelos sistemas SCADA, muito provavelmente contendo informações relevantes, deve ser tratada para descobrir relações e padrões e assim ajudar na compreensão de muitos aspectos operacionais importantes e avaliar o desempenho dos sistemas elétricos de potência. O processo de Descoberta de Conhecimento em Banco de Dados (Knowledge Discovery in Database - KDD) é o processo de identificar, em grandes conjuntos de dados, padrões que sejam válidos, novos, úteis e compreensíveis, para melhorar o entendimento de um problema ou um procedimento de tomada de decisão. A Mineração de Dados (ou Data Mining) é o passo dentro do KDD que permite extrair informações úteis em grandes bases de dados. Neste cenário, o presente trabalho se propõe a realizar experimentos de mineração de dados nos dados gerados por sistemas SCADA em UHE, a fim de produzir informações relevantes para auxiliar no planejamento, operação, manutenção e segurança das hidrelétricas e na implantação da cultura da mineração de dados aplicada a estas usinas.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Questo elaborato di tesi è nato con l'esigenza di sviluppare un nuovo modulo per la stima di variabili energetiche da inserire nel software On.Energy, per dare la possibilità a tutti gli utilizzatori di capire quanto i valori osservati nella realtà si discostino da un modello teorico appositamente creato, e fornire quindi un ulteriore strumento di analisi per mantenere sotto controllo il sistema nell'ottica del miglioramento continuo. Il risultato sarà uno strumento che verrà provato in via sperimentale sugli stabilimenti di due aziende leader in Italia in settori produttivi largamente differenti (Amadori - alimentare, Pfizer - farmaceutico), ma accomunati dalle esigenze di monitorare, analizzare e efficientare i consumi energetici.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Los ataques a redes de información son cada vez más sofisticados y exigen una constante evolución y mejora de las técnicas de detección. Para ello, en este proyecto se ha diseñado e implementado una plataforma cooperativa para la detección de intrusiones basada en red. En primer lugar, se ha realizado un estudio teórico previo del marco tecnológico relacionado con este ámbito, en el que se describe y caracteriza el software que se utiliza para realizar ataques a sistemas (malware) así como los métodos que se utilizan para llegar a transmitir ese software (vectores de ataque). En el documento también se describen los llamados APT, que son ataques dirigidos con una gran inversión económica y temporal. Estos pueden englobar todos los malware y vectores de ataque existentes. Para poder evitar estos ataques, se estudiarán los sistemas de detección y prevención de intrusiones, describiendo brevemente los algoritmos que se tienden a utilizar en la actualidad. En segundo lugar, se ha planteado y desarrollado una plataforma en red dedicada al análisis de paquetes y conexiones para detectar posibles intrusiones. Este sistema está orientado a sistemas SCADA (Supervisory Control And Data Adquisition) aunque funciona sobre cualquier red IPv4/IPv6, para ello se definirá previamente lo que es un sistema SCADA, así como sus partes principales. Para implementar el sistema se han utilizado dispositivos de bajo consumo llamados Raspberry PI, estos se ubican entre la red y el equipo final que se quiera analizar. En ellos se ejecutan 2 aplicaciones desarrolladas de tipo cliente-servidor (la Raspberry central ejecutará la aplicación servidora y las esclavas la aplicación cliente) que funcionan de forma cooperativa utilizando la tecnología distribuida de Hadoop, la cual se explica previamente. Mediante esta tecnología se consigue desarrollar un sistema completamente escalable. La aplicación servidora muestra una interfaz gráfica que permite administrar la plataforma de análisis de forma centralizada, pudiendo ver así las alarmas de cada dispositivo y calificando cada paquete según su peligrosidad. El algoritmo desarrollado en la aplicación calcula el ratio de paquetes/tiempo que entran/salen del equipo final, procesando los paquetes y analizándolos teniendo en cuenta la información de señalización, creando diferentes bases de datos que irán mejorando la robustez del sistema, reduciendo así la posibilidad de ataques externos. Para concluir, el proyecto inicial incluía el procesamiento en la nube de la aplicación principal, pudiendo administrar así varias infraestructuras concurrentemente, aunque debido al trabajo extra necesario se ha dejado preparado el sistema para poder implementar esta funcionalidad. En el caso experimental actual el procesamiento de la aplicación servidora se realiza en la Raspberry principal, creando un sistema escalable, rápido y tolerante a fallos. ABSTRACT. The attacks to networks of information are increasingly sophisticated and demand a constant evolution and improvement of the technologies of detection. For this project it is developed and implemented a cooperative platform for detect intrusions based on networking. First, there has been a previous theoretical study of technological framework related to this area, which describes the software used for attacks on systems (malware) as well as the methods used in order to transmit this software (attack vectors). In this document it is described the APT, which are attacks directed with a big economic and time inversion. These can contain all existing malware and attack vectors. To prevent these attacks, intrusion detection systems and prevention intrusion systems will be discussed, describing previously the algorithms tend to use today. Secondly, a platform for analyzing network packets has been proposed and developed to detect possible intrusions in SCADA (Supervisory Control And Data Adquisition) systems. This platform is designed for SCADA systems (Supervisory Control And Data Acquisition) but works on any IPv4 / IPv6 network. Previously, it is defined what a SCADA system is and the main parts of it. To implement it, we used low-power devices called Raspberry PI, these are located between the network and the final device to analyze it. In these Raspberry run two applications client-server developed (the central Raspberry runs the server application and the slaves the client application) that work cooperatively using Hadoop distributed technology, which is previously explained. Using this technology is achieved develop a fully scalable system. The server application displays a graphical interface to manage analytics platform centrally, thereby we can see each device alarms and qualifying each packet by dangerousness. The algorithm developed in the application calculates the ratio of packets/time entering/leaving the terminal device, processing the packets and analyzing the signaling information of each packet, reating different databases that will improve the system, thereby reducing the possibility of external attacks. In conclusion, the initial project included cloud computing of the main application, being able to manage multiple concurrent infrastructure, but due to the extra work required has been made ready the system to implement this funcionality. In the current test case the server application processing is made on the main Raspberry, creating a scalable, fast and fault-tolerant system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Emerging cybersecurity vulnerabilities in supervisory control and data acquisition (SCADA) systems are becoming urgent engineering issues for modern substations. This paper proposes a novel intrusion detection system (IDS) tailored for cybersecurity of IEC 61850 based substations. The proposed IDS integrates physical knowledge, protocol specifications and logical behaviours to provide a comprehensive and effective solution that is able to mitigate various cyberattacks. The proposed approach comprises access control detection, protocol whitelisting, model-based detection, and multi-parameter based detection. This SCADA-specific IDS is implemented and validated using a comprehensive and realistic cyber-physical test-bed and data from a real 500kV smart substation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The electric power systems are getting more complex and covering larger areas day by day. This fact has been contribuiting to the development of monitoring techniques that aim to help the analysis, control and planning of power systems. Supervisory Control and Data Acquisition (SCADA) systems, Wide Area Measurement Systems and disturbance record systems. Unlike SCADA and WAMS, disturbance record systems are mainly used for offilne analysis in occurrences where a fault resulted in tripping of and apparatus such as a transimission line, transformer, generator and so on. The device responsible for record the disturbances is called Digital Fault Recorder (DFR) and records, basically, electrical quantities as voltage and currents and also, records digital information from protection system devices. Generally, in power plants, all the DFRs data are centralized in the utility data centre and it results in an excess of data that difficults the task of analysis by the specialist engineers. This dissertation shows a new methodology for automated analysis of disturbances in power plants. A fuzzy reasoning system is proposed to deal with the data from the DFRs. The objective of the system is to help the engineer resposnible for the analysis of the DFRs’s information by means of a pre-classification of data. For that, the fuzzy system is responsible for generating unit operational state diagnosis and fault classification.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Esta dissertação desenvolve uma plataforma de controlo interactiva para edifícios inteligentes através de um sistema SCADA (Supervisory Control And Data Acquisition). Este sistema SCADA integra diferentes tipos de informações provenientes das várias tecnologias presentes em edifícios modernos (controlo da ventilação, temperatura, iluminação, etc.). A estratégia de controlo desenvolvida implementa um controlador em cascada hierárquica onde os "loops" interiores são executados pelos PLC's locais (Programmable Logic Controller), e o "loop" exterior é gerido pelo sistema SCADA centralizado, que interage com a rede local de PLC's. Nesta dissertação é implementado um controlador preditivo na plataforma SCADA centralizada. São apresentados testes efectuados para o controlo da temperatura e luminosidade de salas com uma grande área. O controlador preditivo desenvolvido tenta optimizar a satisfação dos utilizadores, com base nas preferências introduzidas em várias interfaces distribuídas, sujeito às restrições de minimização do desperdício de energia. De forma a executar o controlador preditivo na plataforma SCADA foi desenvolvido um canal de comunicação para permitir a comunicação entre a aplicação SCADA e a aplicação MATLAB, onde o controlador preditivo é executado. ABSTRACT: This dissertation develops an operational control platform for intelligent buildings using a SCADA system (Supervisory Control And Data Acquisition). This SCADA system integrates different types of information coming from the several technologies present in modem buildings (control of ventilation, temperature, illumination, etc.). The developed control strategy implements a hierarchical cascade controller where inner loops are performed by local PLCs (Programmable Logic Controller), and the outer loop is managed by the centralized SCADA system, which interacts with the entire local PLC network. ln this dissertation a Predictive Controller is implemented at the centralized SCADA platform. Tests applied to the control of temperature and luminosity in huge­area rooms are presented. The developed Predictive Controller tries to optimize the satisfaction of user explicit preferences coming from several distributed user-interfaces, subjected to the constraints of energy waste minimization. ln order to run the Predictive Controller at the SCADA platform a communication channel was developed to allow communication between the SCADA application and the MATLAB application where the Predictive Controller runs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Os controladores de caudal, normalmente implementados em sistemas Supervisory control and data acquisition (SCADA), apresentam uma grande relevância no controlo automático de canais de adução. Para garantir que os controladores de caudal sejam fiáveis em todo o seu domínio de funcionamento (em situações de escoamento com ressalto livre ou submerso e de transição entre escoamentos com ressalto livre e ressalto submerso) foram comparados os resultados dos ensaios experimentais com diferentes métodos de cálculo da vazão em comportas e/ou sobre soleiras. O programa de ensaios foi realizado nos canais laboratorial e experimental da Universidade de Évora. Foram realizados ensaios em comportas planas verticais e em soleiras do tipo Waterways Experiment Station (WES) controladas ou não por comportas planas verticais. Em ambos os casos, foram contempladas as situações de escoamento com ressalto livre e submerso. Os resultados obtidos mostram que: a) para as comportas, o método Rajaratnam e Subramanya (1967a) conduz a bons resultados com um erro percentual médio absoluto MAPE < 1% para o escoamento com ressalto livre e MAPE < 4% para o submerso; a transição entre escoamentos foi identificada corretamente por este método; b) para as soleiras, obtiveram-se bons resultados para o escoamento com ressalto livre para o método USACE (1987), com MAPE < 2%, e para o submerso através do método Alves e Martins (2011), com MAPE < 5%; a transição entre escoamentos pode ser considerada adequada de acordo com a curva experimental de Grace (1963); c) para soleiras controladas por comporta, conseguiram-se bons resultados para o escoamento com ressalto livre recorrendo à equação dos orifícios de pequenas dimensões, com MAPE < 1, 5%, e para o submerso com a equação dos orifícios totalmente submersos com MAPE < 1, 6%; em ambos os casos foi necessária calibração do coeficiente de vazão; a transição entre escoamentos foi adequada pelo método de Grace (1963). Com base nos resultados obtidos, foi possível definir um algoritmo de vazão generalizado para comportas e/ou soleiras que permite a determinação da vazão para as situações de escoamento com ressalto livre e submerso incluindo a transição entre escoamentos; ABSTRACT: Flow controllers, usually implemented in Supervisory Control and Data Acquisition (SCADA) systems, are very important in the automatic control of irrigation canal systems. To ensure that flow controllers are reliable for the entire operating range (free or submerged flow and flow transitions) the experimental results were compared with different methods of flow measurement for gates and/or weirs. The test program was conducted in the laboratory flume and in the automatic canal of the University of ´Evora. Tests were carried in sluice gates and in broad-crested weirs controlled or not by sluice gate. In both cases free and submerged flow conditions were analyzed. The results show that: a) for the sluice gates, the method of Rajaratnam e Subramanya (1967a) leads to good results with a mean absolute percentage error (MAPE) < 1% for free flow and MAPE < 4% for submerged flow. The transition between flows is correctly identified by this method; b) for the uncontrolled weir, good results were obtained for free flow with the method USACE (1987) with MAPE < 2%, and for submerged flow by the method Alves e Martins (2011) with MAPE < 5%. The transition between flows can be accurately defined by the experimental curve of Grace (1963); c) for the controlled weir, good results were achieved for the free flow with the small orifice equation with MAPE < 1.5% and for submerged flow with the submerged orifice equation with MAPE < 1.6%; in both cases the calibration of the discharge coefficient is needed. The transition between flows can be accomplished through Grace (1963) method. Based on the obtained results, it was possible to define a generalized flow algorithm for gates and/or weirs that allows flow determination for free and submerged flow conditions including the transition between flows.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Each plasma physics laboratory has a proprietary scheme to control and data acquisition system. Usually, it is different from one laboratory to another. It means that each laboratory has its own way to control the experiment and retrieving data from the database. Fusion research relies to a great extent on international collaboration and this private system makes it difficult to follow the work remotely. The TCABR data analysis and acquisition system has been upgraded to support a joint research programme using remote participation technologies. The choice of MDSplus (Model Driven System plus) is proved by the fact that it is widely utilized, and the scientists from different institutions may use the same system in different experiments in different tokamaks without the need to know how each system treats its acquisition system and data analysis. Another important point is the fact that the MDSplus has a library system that allows communication between different types of language (JAVA, Fortran, C, C++, Python) and programs such as MATLAB, IDL, OCTAVE. In the case of tokamak TCABR interfaces (object of this paper) between the system already in use and MDSplus were developed, instead of using the MDSplus at all stages, from the control, and data acquisition to the data analysis. This was done in the way to preserve a complex system already in operation and otherwise it would take a long time to migrate. This implementation also allows add new components using the MDSplus fully at all stages. (c) 2012 Elsevier B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The object of analysis in the present text is the issue of operational control and data retention in Poland. The analysis of this issue follows from a critical stance taken by NGOs and state institutions on the scope of operational control wielded by the Polish police and special services – it concerns, in particular, the employment of “itemized phone bills and the so-called phone tapping.” Besides the quantitative analysis of operational control and the scope of data retention, the text features the conclusions of the Human Rights Defender referred to the Constitutional Tribunal in 2011. It must be noted that the main problems concerned with the employment of operational control and data retention are caused by: (1) a lack of specification of technical means which can be used by individual services; (2) a lack of specification of what kind of information and evidence is in question; (3) an open catalogue of information and evidence which can be clandestinely acquired in an operational mode. Furthermore, with regard to the access granted to teleinformation data by the Telecommunications Act, attention should be drawn to a wide array of data submitted to particular services. Also, the text draws on the so-called open interviews conducted mainly with former police officers with a view to pointing to some non-formal reasons for “phone tapping” in Poland. This comes in the form of a summary.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El projecte "Laboratori Asssit per Ordinador Mitjançant Eines Ofimàtiques Convencionals" ha estat realitzat en la facultat de Física de la Universitat de Barcelona durant els anys 2007 i 2008 (projecte biennal). El principal objectiu d’aquest projecte és demostrar la possibilitat d’utilitzar les eines informàtiques més habituals en la realització d’experiències de laboratori assistit per ordinador (LAO). En particular, es proposa la utilització del Excel © juntament amb les seves macros (Visual Basic para Aplicacions, VBA) en pràctiques de laboratori d’assignatures en l’àrea de Física Aplicada. Excel és un full de càlcul molt conegut i usat tant per professors com pels estudiants. En aquest treball mostrem exemples concrets que abasten les diferents tècniques de control i adquisició de dades: programació del port sèrie (RS- 232) i paral·lel, i interfase GPIB. La implementació d’aquestes tècniques es realitza mitjançant macros VBA de Excel. La resta de programació de l’aplicació LAO, la representació gràfica i el tractament de les dades, es realitza de forma molt simple a partir del maneig habitual d’un full de càlcul. La realització del projecte ha demostrat la conveniència d’aquesta metodologia. Actualment pràcticament la totalitat de les pràctiques LAO de les quals és responsable el Departament de Física Aplicada utilitzen la programació a través del full de càlcul. La resposta dels estudiants ha estat molt positiva. La combinació de les característiques d’aquesta eina juntament amb la programació VBA té un enorme potencial i representa, probablement, una forma senzilla d’introduir tant a l’alumne com al professor en el món de la programació.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tässä diplomityössä esitellään langattoman mittaus- ja valvontajärjestelmän protokollakehitys. Työssä selvitetään protokollakehityksessä huomioon otettavat asiat ja esitetään langattoman tilavalvontaan perustuvan pilottijärjestelmän toteutus. Pilottijärjestelmänä käytetään Ensto Busch-Jaeger Oy:n Jussi-kosteusvahtijärjestelmää, joka muutetaan langattomaksi. Järjestelmän tiedonsiirto on yksisuuntaista ja tapahtuu radioyhteydellä. Käytetty taajuus on 433,92 MHz. Tavoitteena työssä oli kehittää yksinkertainen, mutta luotettava signalointijärjestelmä. Siihen toteutettu protokolla koodaa lähetettävän datan NRZ-L -koodauksen tapaisesti. Virheenkorjaus tehdään pariteettibittiä ja Hamming-etäisyyttä hyväksi käyttäen. Lisäksi tiedonsiirron yhteyskäytäntöön on lisätty rinnakkaisuutta yksisuuntaisen tiedonsiirron varmistamiseksi. Kehitetylle protokollalle tehdyt testit osoittavat sen olevan luotettava valitussa tiedonsiirtoympäristössä.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The treatment of wastewaters contaminated with oil is of great practical interest and it is fundamental in environmental issues. A relevant process, which has been studied on continuous treatment of contaminated water with oil, is the equipment denominated MDIF® (a mixer-settler based on phase inversion). An important variable during the operation of MDIF® is the water-solvent interface level in the separation section. The control of this level is essential both to avoid the dragging of the solvent during the water removal and improve the extraction efficiency of the oil by the solvent. The measurement of oil-water interface level (in line) is still a hard task. There are few sensors able to measure oil-water interface level in a reliable way. In the case of lab scale systems, there are no interface sensors with compatible dimensions. The objective of this work was to implement a level control system to the organic solvent/water interface level on the equipment MDIF®. The detection of the interface level is based on the acquisition and treatment of images obtained dynamically through a standard camera (webcam). The control strategy was developed to operate in feedback mode, where the level measure obtained by image detection is compared to the desired level and an action is taken on a control valve according to an implemented PID law. A control and data acquisition program was developed in Fortran to accomplish the following tasks: image acquisition; water-solvent interface identification; to perform decisions and send control signals; and to record data in files. Some experimental runs in open-loop were carried out using the MDIF® and random pulse disturbances were applied on the input variable (water outlet flow). The responses of interface level permitted the process identification by transfer models. From these models, the parameters for a PID controller were tuned by direct synthesis and tests in closed-loop were performed. Preliminary results for the feedback loop demonstrated that the sensor and the control strategy developed in this work were suitable for the control of organic solvent-water interface level