National Repository of Grey Literature 24 records found  beginprevious15 - 24  jump to record: Search took 0.01 seconds. 
Protection functions of the REX 640 terminal in case of earth faults
Siegel, Josef ; Bukvišová, Zuzana (referee) ; Wasserbauer, Vojtěch (advisor)
This bachelor thesis deals with the protection, implementation and evaluation of test for fault condition indicators. Thesis focus on earth fault indicators. These protections must be able to evaluate earth faults in compensated, compensated with auxiliary resistor, unearthed and high-resistance earthed networks. Furthermore, part of the thesis is research of methods of earth fault detection, including their principles and function description.
IED Simulator with a Support of Industrial Communication GOOSE
Ládr, Tomáš ; Lichtner, Ondrej (referee) ; Matoušek, Petr (advisor)
The goal of this bachelors thesis is to create simulator of IED working as publisher of the protocol IEC 61850-GOOSE. For achieving of this goal the library libIEC61850 has been used. During the work on this project an emulator of GOOSE publisher was implemented. There are experiments validating the emulated communication in the report. The merit of this thesis is creation of an open-source emulator for operating system Linux, because other existing solutions are commercial.
IEC 61850 simulation environment
Rusz, Lukáš ; Fujdiak, Radek (referee) ; Blažek, Petr (advisor)
The work deals with communication protocols of the IEC 61850 standard. The protocols GOOSE (Generic Object Oriented Substation Events), SMV (Sampled Measured Values) and MMS (Manufacturing Message Specification) are described. The protocols are used to create a simulation network, which is described in this work. The simulation network is created in the OMNeT ++, program installed in the Ubuntu virtual environment.
IEC 61850 industrial communication simulator
Srp, Jakub ; Pospíšil, Ondřej (referee) ; Blažek, Petr (advisor)
This thesis is focused on IEC 61850 communication protocols SMV, GOOSE and MMS and their implementation in SCADA systems. There is a simulator, run on Raspberry Pi, that generates data according to IEC 61850 and transmits the data using protocols in question. The simulation consist of various virtual devices e.g. surge protection, undervoltage protection, circuit breaker, disconnector, HMI. The MMS protocol is used for station control. Simulation can be user-defined from textual configuration file.
Description and testing of communication protocols IEC 60870-5-103 and 60870-5-104
Pekárek, Dominik ; Mičulka,, Petr (referee) ; Sumec, Stanislav (advisor)
This thesis is focused on testing of communication protocols IEC 60870-5-103 and IEC 60870-5-104. Theoretical part of the thesis describes basic principles, services and possibilities of both communication protocols. Practical part of the thesis deals with configuration of the IEC 60870-5-103 communication standard of protective terminal REF630. PCVDEW6 tool was used to test this communication protocol. Next part of the thesis is focused on convertion of the communication standard IEC 61850 to IEC 61870-5-104 using control system COM600. The testing of both communication protocols was carried out in the laboratory of the protection relays on the testing panels at ABB Brno.
Protection setting concept for given MV substation
Váhala, Václav ; Holub, Jiří (referee) ; Topolánek, David (advisor)
The thesis is focused on the protection concept for medium voltage substation. The first theoretical part of thesis describes given medium voltage substation. Substation consists of two incoming feeders and six outgoing feeders. Due to the size of the substation was selected one outgoing feeder which is the subject of description and protection concept. Next part of the thesis is a description of the protective functions used to protect the elements in the selected feeder. This part contains a detailed description of the function and setting options for protection. The main part of the thesis describes calculation of specific protection functions and consequently with secondary testing of protective functions. Tests were performed on protective functions in the digital protections REF615 and REM620. The final part of the thesis deals with the evaluation of the secondary test results and verification saturation of the specified current transformers.
Case study of intracranial EEG records of patients with focal cortical dysplasia type I and II
Balach, J. ; Ježdík, P. ; Čmejla, R. ; Kršek, P. ; Jiruška, Přemysl
In this study we try to find out if it is possible to differentiate type of focal cortical dysplasia by features obtained from intracranial EEG. We compare occurrence and rates of three biomarkers present in epilepsy in patients with focal cortical dysplasia type I and II. Case study is made on long term night records of 6 pediatric patients. Detection of interictal epileptiform discharges and high-frequency oscillations is made by automated algorithms, delta brush are marked visually. Position of lesion and electrodes inside were obtained from MRI. In individual rates were not found difference on significant level. No major significance were found, but as promising seem to be ratio inside to outside rates of high-frequency oscillations and presence of delta brush, which were found only in patients with focal cortical dysplasia type II.
Medium voltage substation automation using control system COM600 and standard IEC61850
Havelka, Tomáš ; Štaffa, Jan (referee) ; Háze, Jiří (advisor)
This work deals with problematic of standard IEC61850, mainly with chapter IEC 61850-9-2 LE which is commonly known as Process bus communication. There are described advanced tools of the control system COM600 with detail description of their configuration in this work. It also deals with configuration of IEC 61850-9-2 LE with Relion family protection relays and its implementation to the control system COM600. The main aim of this work is focused on configuration of IEC 61850-9-2 standard with protection relays, configuration and detail description of COM600 advanced tools, description of Logic processor, further custom design and appliaction configuration global reset of Logic procesor in control system COM600.
Model of Electrical Station with IEC 61850 Communication Protocol
Stodůlka, Ivo ; Majer, Karol (referee) ; Orságová, Jaroslava (advisor)
The amount of information transmitted in automation systems has grown exponentially, since the modern digital protection and control devices had been introduced. These systems with different features, limited data flow and the mutual incompatibility were mostly based on the principles defined by vendors themselves. The international communication standard IEC 61850 was created with the aim of introducing definite rules and the structure into the communication part of the electrical substations with the application of the latest technologies. This standard also emphasises the mutual interoperability of the different vendors´ devices. This thesis is focused on the comprehension of basic principles, the practical application and the testing of digital protections with IEC 61850 communication standard implemented. The first part of my thesis is a theoretical one and describes basic principles, services and possibilities of the abstract communication model defined by IEC 61850 standard. The second part of my thesis describes the configuration of IEC 61850 communication standard of the protective terminal REF 542plus with the partial support of this standard including only the vertical communication and the subsequent testing using the OMICRON's testing tool IED Scout. The third part of my thesis is focused on the configuration of the feeder protection REF615 which has fully implemented IEC 61850 standard covering both vertical and horizontal communication by means of the GOOSE messages and the subsequent testing using the ABB's testing tool ITT600 SA Explorer. The testing of both protective devices was carried out in the laboratory of the protection relays on the testing panels at ABB PPMV Brno. The conclusion summarizes the contributions of IEC 61850 communication standard and there are also compared the engineering procedures of the protective terminal REF 542plus and the feeder protection REF615.
Improvised explosive devices and their threat for the population
MAIRYCH, Michal
Improvised explosive device (IED), for many a meaningless set of three words, but for professionals who deal with this issue it is a concept related to absolute threat and a significant danger that is not only an emergency situation but also a global problem. IED is a weapon that has become a sheer standard and the most frequently used lethal means in most armed conflicts and wars of drug cartels. However, people do not realize these systems are the destructive agents that destroy houses, tear cars apart and kill people in terrorist attacks. Maybe some people are not familiar with the name - IED, but I am sure that they know the title - which is used by the media. They call it bombings. As I mentioned before, the IED is the biggest killer in today's wars, where the debit attributed not only hundreds or thousands of the dead, wounded and maimed soldiers of the coalition forces but also the bringer of death for dozens of thousands of innocent civilian casualties. IEDs are not only a phenomenon associated with armed conflicts, wars, drug cartels, guerrilla insurgents practices at various locations around the world and a way of terrorist violence, but also means exploited by individuals or groups to commit crime. In the Czech Republic, we can come across with other nomenclature where the professional literature for training of the police bomb squad of the Czech Republic mentions explosive booby traps (hereinafter NVS), and after a few years yet another term appears - an improvised explosive device (hereinafter IVP). In this thesis, however, for the purpose of familiarization with international terminology I will use international names, terms, abbreviations and translations. At the beginning of this thesis, I will briefly deal with the term of IEDs, what they present and what kind of forces should deal with them in the Czech Republic and dismantle them at our homeland or abroad. Furthermore, I present what the subject of this research is. In the theoretical part, I try to draw the reader into a bit of history and to highlight some of the time periods, facts and information that provide a better view and easier understanding of some topics related to the IED. And in a nutshell, I introduce some terrorist and insurgent groups and their way they have been using IEDs in their fight, why and what this usage has brought. Later in this chapter, I mention the basic concepts and their explanations that appear in the thesis. For better understanding I introduce the construction of IED. I describe various basic components of these systems (switch, initiator, power source, main charge, container and enhancement), their categories, types, their description, what they are for, what are the advantages or disadvantages and what kind of IED types they are associated with. In the last section of this chapter I describe specific types of IEDs, I mention their representatives and I describe in detail those that currently pose the greatest threat. I also present categories and types of IED incidents, which the EOD Service of the Police of the Czech Republic (hereinafter PS PČR) and EOD units in the Army of the Czech Republic (hereinafter EOD AČR) have been dealing with.

National Repository of Grey Literature : 24 records found   beginprevious15 - 24  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.