Data integrity in a steel manufacturing environment with special reference to Columbus Stainless Steel
- Authors: Kruger, Angela
- Date: 2012-03-05
- Subjects: Data transmission systems , Computer network protocols
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/380716 , uj:2139 , http://hdl.handle.net/10210/4506
- Description: M.Comm. , In manufacturing companies where raw material is transformed into an endproduct, data pertaining to that transformation process are transported from the physical machine (workstation) to a central database and visa versa. To ensure a successful end-product creation, the company needs to ensure that the data being transported is correct, accurate and trustworthy at all times. As unreliable data seems to be a general problem for large manufacturing companies an investigation was launched to establish what integrity problems are being experienced and possible solutions to these problems in manufacturing companies such as Columbus Stainless Steel. On completion of the investigation it was found that the main causes for late deliveries and data fixes being performed was that the data being transmitted at the source was not always the same data received at the destination, hence a lack of data integrity during data transmission was identified. As it was decided to reduce or eliminate the integrity causes rather than correcting the incorrect results the data transportation process was analyzed. During the analysis the main causes for data integrity problems (errors) were identified. In the environment being investigated, data strings (messages) were created at the workstation and then transported via the use of a transporter (protocol) over an established network to the destination database. The more complex the contents of the message (data string), the more advanced features were needed within the functionality of the protocol to ensure the accurate and correct transmission and processing. Once the main causes for these data integrity errors were identified the investigation was broadened to incorporate the search for various protocols with the ability to reduce or eliminate the causes identified previously.
- Full Text:
- Authors: Kruger, Angela
- Date: 2012-03-05
- Subjects: Data transmission systems , Computer network protocols
- Type: Thesis
- Identifier: http://ujcontent.uj.ac.za8080/10210/380716 , uj:2139 , http://hdl.handle.net/10210/4506
- Description: M.Comm. , In manufacturing companies where raw material is transformed into an endproduct, data pertaining to that transformation process are transported from the physical machine (workstation) to a central database and visa versa. To ensure a successful end-product creation, the company needs to ensure that the data being transported is correct, accurate and trustworthy at all times. As unreliable data seems to be a general problem for large manufacturing companies an investigation was launched to establish what integrity problems are being experienced and possible solutions to these problems in manufacturing companies such as Columbus Stainless Steel. On completion of the investigation it was found that the main causes for late deliveries and data fixes being performed was that the data being transmitted at the source was not always the same data received at the destination, hence a lack of data integrity during data transmission was identified. As it was decided to reduce or eliminate the integrity causes rather than correcting the incorrect results the data transportation process was analyzed. During the analysis the main causes for data integrity problems (errors) were identified. In the environment being investigated, data strings (messages) were created at the workstation and then transported via the use of a transporter (protocol) over an established network to the destination database. The more complex the contents of the message (data string), the more advanced features were needed within the functionality of the protocol to ensure the accurate and correct transmission and processing. Once the main causes for these data integrity errors were identified the investigation was broadened to incorporate the search for various protocols with the ability to reduce or eliminate the causes identified previously.
- Full Text:
Performance analysis of low-energy bluetooth and nearfield communication technologies in the financial sector
- Authors: Mngomezulu, Zinhle
- Date: 2019
- Subjects: Near-field communication , Bluetooth technology , Computer network protocols
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/393879 , uj:32607
- Description: Abstract : Bluetooth Low-energy (BLE) and Near-field Communication (NFC) are two of the recently emerging short range wireless communication technologies that transmit information in the 13.56 MHz and 2.4 GHz radio frequency bands respectively. NFC technology is made up of several standards that include both passive tags as well as active NFC-enabled mobile phones and readers such as the ISO/IEC 14443, the ISO/IEC 1800-3, the NFC Forum and ECMA-340 to name just a few [1]. This technology is based on the radio frequency identification (RFID) standard and uses the principle of electromagnetism and mutual induction to transmit data. It transmits data at a range of 4 – 10 cm and transmits information at data rates of 106, 212 and 424 kbps. This technology uses amplitude shift keying (ASK) and load modulation (LM) to map and transmit data. Bluetooth is based on the IEEE 802.15 standard. Its transmission coverage ranges up to 350 m, depending on the devices power classification and its version. This technology comes in various forms, each with its own performance features that enable the user to choose according to their system requirements. Bluetooth supports data rates up to 24 Mbps [2]. It uses Gaussian frequency shift keying (GFSK) and variations of phase shift keying (PSK) to transmit data. With the emergence of the internet of things/everything (IoT/E), these technologies are identified as the most likely to be instrumental in the success of this application area. One of the reasons that serve to validate this claim, is the fact that both technologies have already (both historically and with emergence) been widely implemented and used in several devices such as smart mobile phones and appliances. To add to that, these technologies offer advantages of low power consumption, mobility, inherent security features, relatively high data rates and the ability to be incorporated in devices that contain networks such as mobile data transmission (Long-term Evolution (LTE), Third Generation (3G) and General Packet Radio Service (GPRS)), which will enable devices ease of access in the internet and data... , M.Ing. (Electrical Engineering)
- Full Text:
- Authors: Mngomezulu, Zinhle
- Date: 2019
- Subjects: Near-field communication , Bluetooth technology , Computer network protocols
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/393879 , uj:32607
- Description: Abstract : Bluetooth Low-energy (BLE) and Near-field Communication (NFC) are two of the recently emerging short range wireless communication technologies that transmit information in the 13.56 MHz and 2.4 GHz radio frequency bands respectively. NFC technology is made up of several standards that include both passive tags as well as active NFC-enabled mobile phones and readers such as the ISO/IEC 14443, the ISO/IEC 1800-3, the NFC Forum and ECMA-340 to name just a few [1]. This technology is based on the radio frequency identification (RFID) standard and uses the principle of electromagnetism and mutual induction to transmit data. It transmits data at a range of 4 – 10 cm and transmits information at data rates of 106, 212 and 424 kbps. This technology uses amplitude shift keying (ASK) and load modulation (LM) to map and transmit data. Bluetooth is based on the IEEE 802.15 standard. Its transmission coverage ranges up to 350 m, depending on the devices power classification and its version. This technology comes in various forms, each with its own performance features that enable the user to choose according to their system requirements. Bluetooth supports data rates up to 24 Mbps [2]. It uses Gaussian frequency shift keying (GFSK) and variations of phase shift keying (PSK) to transmit data. With the emergence of the internet of things/everything (IoT/E), these technologies are identified as the most likely to be instrumental in the success of this application area. One of the reasons that serve to validate this claim, is the fact that both technologies have already (both historically and with emergence) been widely implemented and used in several devices such as smart mobile phones and appliances. To add to that, these technologies offer advantages of low power consumption, mobility, inherent security features, relatively high data rates and the ability to be incorporated in devices that contain networks such as mobile data transmission (Long-term Evolution (LTE), Third Generation (3G) and General Packet Radio Service (GPRS)), which will enable devices ease of access in the internet and data... , M.Ing. (Electrical Engineering)
- Full Text:
Remote monitoring and diagnosis for control of EDM parameters
- Authors: Cilliers, Charl
- Date: 2008-11-18T09:06:39Z
- Subjects: Machining automatic control , Machining monitoring , Computer integrated manufacturing systems , Internet , Computer network protocols , Neural networks (Computer science)
- Type: Thesis
- Identifier: uj:14726 , http://hdl.handle.net/10210/1730
- Description: M.Ing. , This thesis presents the concept of remote (Internet) data acquisition and processing for control of EDM parameters. It incorporates aspects of data analysis while performing diagnosis of process behavior. A working neuro-macro model of the EDM process is utilized for process correlation and diagnosis recommendations. The approach allows selective ways to vary the EDM process performance. The focus in this work is on the process efficiency. The process efficiency is related to the input parameters through the neuro-macro model of the EDM process. A comprehensive description of on-line monitoring and processing of data is included. Experimental results based on the suggested analysis and diagnosis for possible process adaptation particularly with respect to the EDM process efficiency is presented.
- Full Text:
- Authors: Cilliers, Charl
- Date: 2008-11-18T09:06:39Z
- Subjects: Machining automatic control , Machining monitoring , Computer integrated manufacturing systems , Internet , Computer network protocols , Neural networks (Computer science)
- Type: Thesis
- Identifier: uj:14726 , http://hdl.handle.net/10210/1730
- Description: M.Ing. , This thesis presents the concept of remote (Internet) data acquisition and processing for control of EDM parameters. It incorporates aspects of data analysis while performing diagnosis of process behavior. A working neuro-macro model of the EDM process is utilized for process correlation and diagnosis recommendations. The approach allows selective ways to vary the EDM process performance. The focus in this work is on the process efficiency. The process efficiency is related to the input parameters through the neuro-macro model of the EDM process. A comprehensive description of on-line monitoring and processing of data is included. Experimental results based on the suggested analysis and diagnosis for possible process adaptation particularly with respect to the EDM process efficiency is presented.
- Full Text:
Utilizing IEC61850 standard and the generic object orientated substation event in modern protection and control devices
- Authors: Motsei, Tumelo Timoty
- Date: 2016
- Subjects: Electric power systems , Electric power systems - Protection , Electric power systems - Control , Computer network protocols
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/243029 , uj:25083
- Description: M.Ing. (Engineering Management) , Abstract: The research is about the comparative study between IEC61850 and the conventional DNP3 protocol in as far as the practicability of their application in the modern substation environment is concerned. IEC61850 is a fairly new international standard and technology that entails numerous progressions to traditional Substation Automation Systems (SAS). Currently in South Africa, the major electricity supply utility, Eskom, has predominantly employed Distributed Network Protocol 3 (DNP3) technology for communicating data between protection and control devices. This protocol does not possess all the desirable attributes for use in the Smart Grid (The world is shifting towards smart grid operations). For instance, with IEC61850 the secondary power circuits are simplified by replacing clusters of wires in a substation with a simpler piece of equipment called a process bus. Faster performance speeds can then consequently be realized using Ethernet and Generic Object Orientated Substation Event (GOOSE) messaging in the new substation network which in turn results in a more reliable power system. It is often a challenging task to evaluate the feasibility of the new technology such as IEC61850 when there are only few known cases of its implementation. There are numerous suggestions as to how IEC61850 should be implemented in the industries however; there is currently no one procedure that has been proven to be the best. In the face of this, IEC61850 has proven to be the future of communications in the power system protection environment. The numerous benefits of IEC61850 overshadow the currently utilized traditional protocols such as DNP3. The Design alternatives analysis is thus conducted in this research to determine if power utilities can do away with the traditional DNP3 platforms in the name of introducing the revolutionary IEC61850 technology in their plants. A Monte Carlo approach is employed for comprehensive analysis of the design alternatives. All the inputs to Monte Carlo analysis are evaluated using the Simple Additive Weighting (SAW) strategy as a deterministic model within Monte Carlo to evaluate the probability of IEC61850 being the most preferred technology over DNP3. The inputs to Monte Carlo analysis are the weights of the technology selection criteria. The weights are computed from randomized judgement/comparison matrices using a Visual Basic (VBA) code in Excel. The design alternatives base rates within SAW analysis are determined through application of theory and laboratory experiments results. Intelligent Electronic Devices (IEDs) were used in the laboratory to evaluate the performance and characteristics of both IEC61850 and DNP3 technologies. The whole Monte Carlo procedure from determination of criteria comparison matrices to determining the probability of IEC61850 being the most preferred technology, is carried out by a VBA code complied in Microsoft Excel. About 100 seven-criterion comparison matrices were generated within Microsoft Excel for the purpose of this study. After performing Monte Carlo analysis it was observed that the probability of IEC61850 being the most preferred technology in the industry was 0.46 for a worst case scenario whereby the flexible base rates in SAW analysis were maximized in favour of the DNP3 technology. For any other worst case scenarios studied in this research, IEC61850 proved to be more beneficial than DNP3 technology with a probability between 0.52 and 0.59. The selection criteria which allowed flexible base rates were; ease of system configuration, space saving and system scalability. The base rates for the performance speed, technology system effectiveness, reliability of the system, and purchase costs were fixed.
- Full Text:
- Authors: Motsei, Tumelo Timoty
- Date: 2016
- Subjects: Electric power systems , Electric power systems - Protection , Electric power systems - Control , Computer network protocols
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/243029 , uj:25083
- Description: M.Ing. (Engineering Management) , Abstract: The research is about the comparative study between IEC61850 and the conventional DNP3 protocol in as far as the practicability of their application in the modern substation environment is concerned. IEC61850 is a fairly new international standard and technology that entails numerous progressions to traditional Substation Automation Systems (SAS). Currently in South Africa, the major electricity supply utility, Eskom, has predominantly employed Distributed Network Protocol 3 (DNP3) technology for communicating data between protection and control devices. This protocol does not possess all the desirable attributes for use in the Smart Grid (The world is shifting towards smart grid operations). For instance, with IEC61850 the secondary power circuits are simplified by replacing clusters of wires in a substation with a simpler piece of equipment called a process bus. Faster performance speeds can then consequently be realized using Ethernet and Generic Object Orientated Substation Event (GOOSE) messaging in the new substation network which in turn results in a more reliable power system. It is often a challenging task to evaluate the feasibility of the new technology such as IEC61850 when there are only few known cases of its implementation. There are numerous suggestions as to how IEC61850 should be implemented in the industries however; there is currently no one procedure that has been proven to be the best. In the face of this, IEC61850 has proven to be the future of communications in the power system protection environment. The numerous benefits of IEC61850 overshadow the currently utilized traditional protocols such as DNP3. The Design alternatives analysis is thus conducted in this research to determine if power utilities can do away with the traditional DNP3 platforms in the name of introducing the revolutionary IEC61850 technology in their plants. A Monte Carlo approach is employed for comprehensive analysis of the design alternatives. All the inputs to Monte Carlo analysis are evaluated using the Simple Additive Weighting (SAW) strategy as a deterministic model within Monte Carlo to evaluate the probability of IEC61850 being the most preferred technology over DNP3. The inputs to Monte Carlo analysis are the weights of the technology selection criteria. The weights are computed from randomized judgement/comparison matrices using a Visual Basic (VBA) code in Excel. The design alternatives base rates within SAW analysis are determined through application of theory and laboratory experiments results. Intelligent Electronic Devices (IEDs) were used in the laboratory to evaluate the performance and characteristics of both IEC61850 and DNP3 technologies. The whole Monte Carlo procedure from determination of criteria comparison matrices to determining the probability of IEC61850 being the most preferred technology, is carried out by a VBA code complied in Microsoft Excel. About 100 seven-criterion comparison matrices were generated within Microsoft Excel for the purpose of this study. After performing Monte Carlo analysis it was observed that the probability of IEC61850 being the most preferred technology in the industry was 0.46 for a worst case scenario whereby the flexible base rates in SAW analysis were maximized in favour of the DNP3 technology. For any other worst case scenarios studied in this research, IEC61850 proved to be more beneficial than DNP3 technology with a probability between 0.52 and 0.59. The selection criteria which allowed flexible base rates were; ease of system configuration, space saving and system scalability. The base rates for the performance speed, technology system effectiveness, reliability of the system, and purchase costs were fixed.
- Full Text:
Using formal languages in data communications protocols
- Authors: Mulder, Petrus Gerhardus
- Date: 2014-05-19
- Subjects: Formal languages , Computer network protocols , Computer networks
- Type: Thesis
- Identifier: uj:11124 , http://hdl.handle.net/10210/10711
- Description: D.Phil. (Computer Science) , Please refer to full text to view abstract
- Full Text:
- Authors: Mulder, Petrus Gerhardus
- Date: 2014-05-19
- Subjects: Formal languages , Computer network protocols , Computer networks
- Type: Thesis
- Identifier: uj:11124 , http://hdl.handle.net/10210/10711
- Description: D.Phil. (Computer Science) , Please refer to full text to view abstract
- Full Text:
- «
- ‹
- 1
- ›
- »