113 research outputs found

    The LHC Logging Service: Capturing, storing and using time-series data for the world's largest scientific instrument

    Get PDF
    CERN, the European Laboratory for Particle Physics, is well underway in building the most powerful particle accelerator called LHC (Large Hadron Collider), which will probe deeper into matter than ever before. This circular 27-km long superconducting installation is extremely complex, and its functioning has to be closely monitored. The LHC Logging service is aimed to satisfy the requirement of capturing and storing of any relevant piece of information to track its variation over time. Web-deployed tools have been developed to visualize, correlate and export the data into dedicated off-line analysis tools. The quality of the data, the manageability of the service and the overall system performance are key factors for the service. Oracle technology has been used extensively to support this mission-critical service, which has proven already to be useful during the commissioning phase of individual subsystems of the LHC. The architecture, design and implementation of the LHC Logging service, based on Oracle Database, Application Servers and the Enterprise Manager, are described in this paper

    Knowledge Discovery in the SCADA Databases Used for the Municipal Power Supply System

    Full text link
    This scientific paper delves into the problems related to the develop-ment of intellectual data analysis system that could support decision making to manage municipal power supply services. The management problems of mu-nicipal power supply system have been specified taking into consideration modern tendencies shown by new technologies that allow for an increase in the energy efficiency. The analysis findings of the system problems related to the integrated computer-aided control of the power supply for the city have been given. The consideration was given to the hierarchy-level management decom-position model. The objective task targeted at an increase in the energy effi-ciency to minimize expenditures and energy losses during the generation and transportation of energy carriers to the Consumer, the optimization of power consumption at the prescribed level of the reliability of pipelines and networks and the satisfaction of Consumers has been defined. To optimize the support of the decision making a new approach to the monitoring of engineering systems and technological processes related to the energy consumption and transporta-tion using the technologies of geospatial analysis and Knowledge Discovery in databases (KDD) has been proposed. The data acquisition for analytical prob-lems is realized in the wireless heterogeneous medium, which includes soft-touch VPN segments of ZigBee technology realizing the 6LoWPAN standard over the IEEE 802.15.4 standard and also the segments of the networks of cellu-lar communications. JBoss Application Server is used as a server-based plat-form for the operation of the tools used for the retrieval of data collected from sensor nodes, PLC and energy consumption record devices. The KDD tools are developed using Java Enterprise Edition platform and Spring and ORM Hiber-nate technologies

    Development of a Service Oriented SCADA System

    Get PDF
    AbstractMonitoring and control of technological process, in many cases spread out over small or large geographical areas, are achieved with supervisory control and data acquisition SCADA. This is a fact imposed by technological requirements and also by economical aspects. This approach raises a number of problems, starting from the design and implementation solutions as well as security and safety in these systems. This paper makes a brief analysis of these issues, and starting from this point authors propose a solution based on Service-Oriented Architecture SOA which may represent a solution to some of the identified challenges. For the proposed solution a study is performed. The results are used to conclude on applicability conditions and recommendations on the design and implementation of monitoring and control systems in case of database-as-a-service DbaaS approach

    PROTEUS – Creating Distributed Maintenance Systems through an Integration Platform

    Get PDF
    International audienceThis paper is based on the results from the project PROTEUS sponsored by the French Ministry of Economy, Finance and Industry and the Federal Ministry of Education and Research of Germany under the label of European Commission Initiative ITEA. It presents the architecture and the basic concepts of an integration platform, which constitutes the framework of systems implementing the tasks dedicated to remote maintenance, as well as other applications, for large and medium scale industrial installation. The approach illustrated here is useful for executing any maintenance strategy by implementing the relevant means for controlling workflow between several system components as well as the component's integration itself. The paper first points out the need for designing such a maintenance-oriented platform, continues with a requirements analysis to a global maintenance system followed by the description of the fundamentals of a maintenance application integration system. Finally a sample implementation of a maintenance scenario is given

    Integration of Interactive Voice Response Unit and Outage Management System

    Get PDF
    This project provides a technical solution that integrates the Interactive Voice Response Unit (IVR) and the Outage Management System (OMS) for the Public Service Company. The IVR system is introduced because its automatic call logging functionality can process a large volume of phone calls from the customers reporting electrical service problems. This is a major improvement over the current Trouble Call Center (TCC) infrastructure that has a limited number of agents handling a relatively small number of customer calls. Because OMS can receive more calls, it then can predict the outage locations and causes more accurately, dispatch more repair crews on time, and restore outages quicker. As a result, the company benefits greatly on its customer relationship and revenue generation. The goal of this project is to provide a simpler and less costly approach to the integration of IVR and OMS than the conventional integration approach provided by the IVR vender. The proposed solution utilizes the existing interface application between TCC and OMS. An adapter will be developed to communicate between IVR and the TCC-OMS interface. The adapter consists of a set of database tables and stored procedures. Compared with the vender\u27s full integration approach from IVR to OMS, this proposed simple solution provides significant savings on the cost and time of the interface development as well as the system maintenance and upgrade

    Intelligent Knowledge Retrieval from Industrial Repositories

    Get PDF
    Actually, a large amount of information is stored in the industrial repositories. Accessing this information is complicated, and the techniques currently used in metadata and the material chosen by the user do not scale efficiently in large collections. The semantic Web provides a frame of reference that allows sharing and reusing knowledge efficiently. In our work, we present a focus for discovering information in digital repositories based on the application of expert system technologies, and we show a conceptual architecture for a semantic search engine. We used case-based reasoning methodology to create a prototype that supports efficient retrieval knowledge from digital repositories. OntoEnter is a collaborative effort that proposes a new form of interaction between users and digital enterprise repositories, where the latter are adapted to users and their surroundings

    LHC Machine

    Get PDF

    Design and Implementation of SMMS In Electrical Supply Enterprise

    Get PDF
    对照国电公司的《电力供电企业营销管理信息系统设计规范》,当前供电行业的电力营销系统存在很多不足之处,主要表现在业务流程不规范,各模块比较孤立,没有很好体现相互之间的业务关系,同时随着电力行业不断强调服务意识,提高服务水平,改进服务方式,现有的营销系统也不能满足利用多种技术手段、互联网站以及与电力呼叫中心系统互联互通、支持网银支付等等更多的要求。 电力供电企业营销管理系统采用B/S架构设计,技术路线采用J2EE技术,融合了SOA(面向服务的架构)设计思想,充分利用构件技术,实现功能模块的高度复用。系统采用多层结构体系,服务层采用面向服务架构,各功能模块采用SCA技术规范,实现业务功能的服务组件...Contrast the guodian corp. power marketing management information system design specification ", the current power supply industry power marketing system has many shortcomings, mainly displays in business process is not standard, each module, no good comparative isolated mutual business relations reflect, and at the same time as the electric power industry constantly stressed service consciousness...学位:工程硕士院系专业:软件学院_工程硕士(软件工程)学号:X200823019

    Security-Driven Software Evolution Using A Model Driven Approach

    Get PDF
    High security level must be guaranteed in applications in order to mitigate risks during the deployment of information systems in open network environments. However, a significant number of legacy systems remain in use which poses security risks to the enterprise’ assets due to the poor technologies used and lack of security concerns when they were in design. Software reengineering is a way out to improve their security levels in a systematic way. Model driven is an approach in which model as defined by its type directs the execution of the process. The aim of this research is to explore how model driven approach can facilitate the software reengineering driven by security demand. The research in this thesis involves the following three phases. Firstly, legacy system understanding is performed using reverse engineering techniques. Task of this phase is to reverse engineer legacy system into UML models, partition the legacy system into subsystems with the help of model slicing technique and detect existing security mechanisms to determine whether or not the provided security in the legacy system satisfies the user’s security objectives. Secondly, security requirements are elicited using risk analysis method. It is the process of analysing key aspects of the legacy systems in terms of security. A new risk assessment method, taking consideration of asset, threat and vulnerability, is proposed and used to elicit the security requirements which will generate the detailed security requirements in the specific format to direct the subsequent security enhancement. Finally, security enhancement for the system is performed using the proposed ontology based security pattern approach. It is the stage that security patterns derived from security expertise and fulfilling the elicited security requirements are selected and integrated in the legacy system models with the help of the proposed security ontology. The proposed approach is evaluated by the selected case study. Based on the analysis, conclusions are drawn and future research is discussed at the end of this thesis. The results show this thesis contributes an effective, reusable and suitable evolution approach for software security
    corecore