44 research outputs found

    Esnek üretim sisteminin gerçek zamanlı uzaktan erişimli kontrolü ve mekatronik eğitimine uygulanması

    Get PDF
    06.03.2018 tarihli ve 30352 sayılı Resmi Gazetede yayımlanan “Yükseköğretim Kanunu İle Bazı Kanun Ve Kanun Hükmünde Kararnamelerde Değişiklik Yapılması Hakkında Kanun” ile 18.06.2018 tarihli “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” gereğince tam metin erişime açılmıştır.Son yıllarda elektrik-elektronik, bilgisayar ve kontrol sistemlerinde çok büyük gelişmeler yaşanmaktadır. Elektrik-elektronik, pnömatik-hidrolik, bilgisayar ve mekanik teknolojilerinin birlikte kullanılması neredeyse bir zorunluluk haline gelmiştir. Bunun sonucu olarak çok geniş bir alanı kapsayan mekatronik yeni bir mühendislik disiplini olarak ortaya çıkmıştır. Günümüzde sadece mekanik veya sadece elektronik ürünler neredeyse hiç bulunmamaktadır. Bu etkili değişiklikten dolayı günümüzün mühendislik eğitiminde de önemli gelişmeler yaşanmaktadır. Bu bağlamda mekatronik sistemler ve eğitimi oldukça önem kazanmıştır. Teorik bilgilerin pekiştirilmesi ve teoriyle uygulama arasındaki uyum derecesinin gösterilebilmesi amacıyla mühendislik eğitiminin değişik bölümlerinde ilgili dersler kapsamında veya bağımsız bir ders olarak laboratuvar uygulamalarına yer verilmesi gerekmektedir. Verilen eğitimin hedefine ulaşabilmesi için teorik bilginin yanında bu bilgilerin gerçek sistemler üzerinde de uygulanarak pekiştirilmesi gerekmektedir. Mekatronik eğitiminde kullanılmak amacıyla Festo Didaktik firması tarafından üretilen Esnek Üretim Sistemi; mekanik, elektrik, elektronik, sensörler, hareket elemanları, pnömatik ve robot teknolojileri gibi birçok disiplinlerarası mühendislik uygulama konusunu kapsamaktadır. Fakat bu deney seti, mevcut haliyle lisans düzeyindeki bir öğrenci bakışıyla çok karmaşık bir mekanik ve kontrol algoritmasına sahip olarak görülmektedir. Bu nedenle sistem mevcut haliyle öğrenci müdahalesinden uzak, sadece gösterim amaçlı olarak kullanılabilmektedir. Bu tez çalışmasında, mevcut Esnek Üretim Sistemi'nin mekanik ve elektriksel yapısı değiştirilmeden sisteme ilave olarak elektronik ve kontrol sistemi için yeni tasarımlar yapılmıştır. Böylece, deney seti temel düzeydeki öğrencilerin de mekatronik sistemler konusunda en yüksek derecede fayda sağlayabileceği ve kapsadığı teknolojik konuların uygulamalarını kolayca gerçekleştirebileceği bir yapıya kavuşturulmuştur. Bu amaçla, Esnek Üretim Sistemi istasyonlarının kontrollerini sağlamak amacıyla mikrokontrolör tabanlı elektronik kartlar tasarlanmıştır. Bu sayede, mekatronik sistemlerde önemli bir yere sahip olan mikrokontrolörler ile gerçek bir sistem üzerinde uygulama yapma imkânı sağlanmıştır. Sistemin kendi donanımı ve istasyonları arası haberleşmeyi sağlamak amacıyla CAN ağı kurulmuştur. İstasyonları CAN ağı üzerinden programlamak, dağıtık kontrol uygulamaları geliştirmek ve sistem için anlık durum izleme amacıyla LabVIEW tabanlı kullanıcı arayüzleri tasarlanmıştır. Ayrıca bazı istasyonların web ortamında uzaktan programlanabilmesi imkanı da sağlanmıştır.In recent years, great developments have been experienced in electric-electronic, computer and control systems. Using of electric-electronic, pneumatic-hydraulic, computer and mechanic technologies together has become an obligation. Consequently, the mechatronics that covers a very wide area has appeared as a new discipline. Today, neither mechanic nor electronic products are almost not available alone. Because of this effective change, very important developments have been experienced in the engineering education of today. With this regard, mechatronics systems and education has gained a great deal of importance. One of the most important phases of the engineering education is undoubtedly the laboratory applications. For a productive education, the courses must be given both theoretically and practically by being applied on real systems. In this study made for purpose of giving an applied and detailed mechatronics education, with the changes made on the electronic and control system by using the mechanical structure of the flexible manufacturing system manufactured by the Festo Company, a structure that the students can get the highest degree of benefit from the system and understand the principles of technological subjects it covers has been established. However, this experiment set, in its current situation, seems having a very complex mechanic and control algorithm in view of an undergraduate student. For this reason, the system can only be used for purpose of demonstration far from intervention of a student. In this study, new designs have been developed for the electric and control system without making any modification in the mechanic structure of the system. In this manner, the experiment set, with its current structure, college students will be benefited by the highest rate in mechatronics subject and applications of the technological subjects in covers will be easily realized. Therefore microcontroller based controlling stations of the flexible manufacturing system cards have been designed. In this way, the application opportunity on a real system with microcontrollers which have an important role in mechatronics systems has been ensured. CAN bus protocol has been set up to ensure communication between the stations and hardware of the system. LabVIEW graphical programming based user interfaces have been designed to program stations via network, develop distributed control applications and online monitoring the status for the system. In addition these, as a very important development of this study, web based programming of some certain FMS stations has been realized. Hence users of the experiment set-up can be adapt own programs to the system

    Efficiency and Implementation Security of Code-based Cryptosystems

    Get PDF
    This thesis studies efficiency and security problems of implementations of code-based cryptosystems. These cryptosystems, though not currently used in the field, are of great scientific interest, since no quantum algorithm is known that breaks them essentially faster than any known classical algorithm. This qualifies them as cryptographic schemes for the quantum-computer era, where the currently used cryptographic schemes are rendered insecure. Concerning the efficiency of these schemes, we propose a solution for the handling of the public keys, which are, compared to the currently used schemes, of an enormous size. Here, the focus lies on resource-constrained devices, which are not capable of storing a code-based public key of communication partner in their volatile memory. Furthermore, we show a solution for the decryption without the parity check matrix with a passable speed penalty. This is also of great importance, since this matrix is of a size that is comparable to that of the public key. Thus, the employment of this matrix on memory-constrained devices is not possible or incurs a large cost. Subsequently, we present an analysis of improvements to the generally most time-consuming part of the decryption operation, which is the determination of the roots of the error locator polynomial. We compare a number of known algorithmic variants and new combinations thereof in terms of running time and memory demands. Though the speed of pure software implementations must be seen as one of the strong sides of code-based schemes, the optimisation of their running time on resource-constrained devices and servers is of great relevance. The second essential part of the thesis studies the side channel security of these schemes. A side channel vulnerability is given when an attacker is able to retrieve information about the secrets involved in a cryptographic operation by measuring physical quantities such as the running time or the power consumption during that operation. Specifically, we consider attacks on the decryption operation, which either target the message or the secret key. In most cases, concrete countermeasures are proposed and evaluated. In this context, we show a number of timing vulnerabilities that are linked to the algorithmic variants for the root-finding of the error locator polynomial mentioned above. Furthermore, we show a timing attack against a vulnerability in the Extended Euclidean Algorithm that is used to solve the so-called key equation during the decryption operation, which aims at the recovery of the message. We also present a related practical power analysis attack. Concluding, we present a practical timing attack that targets the secret key, which is based on the combination of three vulnerabilities, located within the syndrome inversion, a further suboperation of the decryption, and the already mentioned solving of the key equation. We compare the attacks that aim at the recovery of the message with the analogous attacks against the RSA cryptosystem and derive a general methodology for the discovery of the underlying vulnerabilities in cryptosystems with specific properties. Furthermore, we present two implementations of the code-based McEliece cryptosystem: a smart card implementation and flexible implementation, which is based on a previous open-source implementation. The previously existing open-source implementation was extended to be platform independent and optimised for resource-constrained devices. In addition, we added all algorithmic variants presented in this thesis, and we present all relevant performance data such as running time, code size and memory consumption for these variants on an embedded platform. Moreover, we implemented all side channel countermeasures developed in this work. Concluding, we present open research questions, which will become relevant once efficient and secure implementations of code-based cryptosystems are evaluated by the industry for an actual application
    corecore