Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Page 1. I. INTRODUCTION Abstract— The IEC 61850 standard inserted new paradigms on communication between power system protection equipments. In this new environment the involved engineers need to learn new concepts. ...
Mediated reality systems introduce the possibility to alter users' perception of the surrounding environment by adding or removing information. These particular innovative features have made this technology attractive for several... more
Mediated reality systems introduce the possibility to alter users' perception of the surrounding environment by adding or removing information. These particular innovative features have made this technology attractive for several adjacent fields. However, despite their direct impact on the presentation of information, mediated reality systems are still poorly explored by information designers. Regarding technical operations, visual instructions are very effective to convey information, and therefore a great opportunity for technology aided operations. This work establishes a dialogue between information design and mediated reality systems, and introduces some of the several concerns of this joint context. Based on correlated research, we identify general principles, challenges and opportunities for mediated reality applications, and for information designers willing to use them. Finally, we also describe the development of an experimental system for technical maintenance and training that makes use of mediated reality. The system was tested with users and the results serve as an opportunity to take further lessons and establish detailed recommendations.
Abstract. Ongoing automation and the open access implementation of critical systems are increasing security vulnerability in automation and control networks employed in the electric power sector. This work is of the view that the... more
Abstract. Ongoing automation and the open access implementation of critical systems are increasing security vulnerability in automation and control networks employed in the electric power sector. This work is of the view that the integration between policy-based management and access control mechanisms is necessary to take us closer to a more effective solution for the combat against security threats. This paper introduces a modular architecture based on the XACML framework and applies this to automation and control networks used in the electric power industry. This security architecture is described and its components are individually analyzed and tested in a real power production environment. This paper also describes relevant encountered difficulties, provides results and new insights into access control when applied to industrial critical network infrastructures. Resumo. O atual nível de automação e o livre acesso as implementações de sistemas críticos estão aumentando as vulner...
Research Interests:
O desenvolvimento tecnológico dos sistemas computacionais e das comunicações ocasiona uma forte digitalização em todos os setores da sociedade moderna. Conceitos como cidades inteligentes e indústria 4.0 são introduzidos e novos modelos... more
O desenvolvimento tecnológico dos sistemas computacionais e das comunicações ocasiona uma forte digitalização em todos os setores da sociedade moderna. Conceitos como cidades inteligentes e indústria 4.0 são introduzidos e novos modelos comportamentais são impostos. Essa revolução também está acontecendo nos sistemas de produção, transmissão e distribuição de energia elétrica. Conceitos como geração distribuída, armazenamento de energia, mobilidade elétrica e redes inteligentes afetam sobremaneira o comportamento das pessoas. Para suportar as redes inteligentes é necessário que se tenha uma infraestrutura de medição inteligente (AMI) que suporte os modelos de negócio entre os consumidores e as empresas de distribuição de energia, garantindo a integridade, a confidencialidade e a disponibilidade das informações. Esta pesquisa apresenta os resultados de teste de varredura de vulnerabilidade executado em um concentrador de dados responsável pela aquisição das informações de medidores d...
Until the 1970s, control and automation of critical systems were based on wired electromechanical devices, and were usually static and offered no flexibility. Next, advances of electronic devices and computer networks introduced new... more
Until the 1970s, control and automation of critical systems were based on wired electromechanical devices, and were usually static and offered no flexibility. Next, advances of electronic devices and computer networks introduced new technologies, coupled with proprietary software and hardware philosophy. The deregulation of the electricity sector, together with the market competitive pressure, forced companies producing and transmitting electric energy to seek increasingly competitive automation projects. This context enforced manufacturers to abandon proprietary systems and adopt open standards that are economically more attractive. Consequently, the automation and control networks started operating with known operating systems, based on open technologies and Ethernet communication networks. Nonetheless, this made these networks more vulnerable to cyberattacks. Furthermore, the growth of the terrorist groups in the world raised the governments concern with the vulnerability of the ...
GPRS defines four codification schemes. Each codification schema include more redundancy or less redundancy. The first codification schemes (CS1) includes a elevated redundancy rate and it utilized in channels with high interference... more
GPRS defines four codification schemes. Each codification schema include more redundancy or less redundancy. The first codification schemes (CS1) includes a elevated redundancy rate and it utilized in channels with high interference levels. The codification schema CS4 has been utilized in channels without interference or with minimal interference. GPRS development include research to discover suitable codification scheme that increases a GPRS performance. The GPRS simulator developed by UFPE GPRT has been utilized an adaptation algorithm to chooses the best codification scheme according to channel quality. This algorithm uses the block rate error to decide about the best codification scheme to adopt. The algorithm chooses CS1 to channel that is suitable for a high interference and presents a high packet drop rate. The codification schema CS1 have a high redundancy level and becomes more easy the recovery errors through a packet retransmission, increasing the GPRS performance. By the...
Mediated reality systems introduce the possibility to alter users' perception of the surrounding environment by adding or removing information. These particular innovative features have made this technology attractive for several... more
Mediated reality systems introduce the possibility to alter users' perception of the surrounding environment by adding or removing information. These particular innovative features have made this technology attractive for several adjacent fields. However, despite their direct impact on the presentation of information, mediated reality systems are still poorly explored by information designers. Regarding technical operations, visual instructions are very effective to convey information, and therefore a great opportunity for technology aided operations. This work establishes a dialogue between information design and mediated reality systems, and introduces some of the several concerns of this joint context. Based on correlated research, we identify general principles, challenges and opportunities for mediated reality applications, and for information designers willing to use them. Finally, we also describe the development of an experimental system for technical maintenance and tra...
Research Interests: