Vous êtes sur la page 1sur 6

Course Folder

Research Methodology
Course Code: EE5001

Submitted to: Dr. Aftab Ahmed


Submitted by: Reeha Shareef(19-MS-EE-76)
Course Schedule
Week no. Date Task Assignment
1 18-09-2019 Write contents of MS thesis proposal. Assignment 1
Write 15 references about your topic. Due date 25-09-2019
2 25-09-2019 Write aim of your project and 3-4 Assignment 1
objectives of selected project. submitted

3 2-10-2019 Make title page of project proposal. Assignment 2


Due date 9-10-2019
4 9-10-2019 Write problem statement of your Assignment 2
project. Write review paper and submitted
submit it after mid.

5 16-10-2019 Write lecture description. Assignment 3


Make a folder and
arrange all
assignments.

6 23-10-2019 Assignment 3 was thoroughly checked Submission of


and reviews and suggestion was given Assignment 3
on course folder
7 30-10-2019 Write Literature review Assignment 4
Due date 6-11-2019
8 6-11-2019 Nil Nil
MID EXAMS
9 27-11-2019 Make a course folder of all previous Assignment 5
lectures and write research methodology Due date 4-12-2019
10 4-12-2019
11 11-12-2019
12 18-12-2019
13 25-12-2019
14 01-01-2019
16 08-01-2019
17
FINAL EXAMS
Lecture 07:
 In this lecture course folder was thoroughly checked, suggestion and reviews was given to
improve the course folder.
Lecture 08:
 Key Points was discussed from slides
Lecture 09:
In this lecture the format of Research Paper was discussed. Following are the main
headings of Research paper
 Title
 Abstract contain research paper, importance of study, proposed solution, application of the
research, main finding of paper
 Introduction mainly contain four to five paragraph
 Case study is the systemic description
 Methodology
 Result and discussion
 Conclusion contain present approach, strength and expert opinion
Research Methodology
The designed System architecture consists of three main steps:
 Mobile phone program
 Server side program (SSP)
 SCADA controlling program (SCP) [5]-[6].

Mobile phone program


The mobile phone program is designed by using J2ME (Java Micro Edition downloaded) to a
mobile phone with GPRS (general packet radio service) or WAP (wireless application protocol).
The program sends the data required for the web server in accordance with the protocol using
preferably GPRS or WAP internet access technology, receives the data sent by web server, and
informs it to the user with the help of graphical interface analyzing this knowledge in its structure.
The application routine has two stages. At the first stage, current and voltage values of the system,
state of motor 1 and motor 2 (ON/OFF), and bucket position value are sent to the mobile phone
from the SCADA server. The data received by the mobile phone are interpreted by the J2ME
application and some related graphical animations are offered to the user. At the second stage, an
authorized user can control the SCADA system values via the mobile phone by using its user name
and password. In our case study, authorized users can control the state of motor 1, motor 2, and
the system on/off position by using the J2ME application program in the mobile phone.

Figure 1. Designed mobile based system

Server side program


A Server side program (SSP) can be designed by using any server side script. The proposed mobile
phone based SCADA automation system. In this application, ASP is used as a SSP in order to get
fast response to a lower number of users than Java Servlet that supports excessive users. It receives
the request data sent by the program integrated into the mobile phone. It reads the values belonging
to the state or position database located in the computer in which the web server is installed. These
data are sent to the mobile phone via Internet in accordance with the program in the mobile phone
and the protocol between them [10]–[12].

Figure 1. Data flow diagram of the designed system.

SCADA controlling programs


This program is installed in the same computer with the SCADA system and has a visual interface,
receives the data pertaining to the state of the system connecting with SCADA, and saves it to the
condition-stating database in the computer in which the web server is installed. Two different
programs have been designed and used to monitor and control the SCADA system via mobile
phone. The remote control program mobile to SCADA has been used to control the SCADA
system via mobile phone, while the remote supervisor program (SCADA) to mobile has been used
to monitor the SCADA system via mobile phone. TCP/IP offers reliability by providing
connection-oriented, end-to-end reliable packet delivery through an Internet network. It does this
by sequencing bytes with a forwarding acknowledgment number that indicates to the destination
the next byte the source expects to receive. Bytes not acknowledged within a specified period are
retransmitted. The reliability mechanism of TCP/IP allows devices to deal with lost, delayed,
duplicate, or misread packets. A time-out mechanism allows devices to detect lost packets and
request retransmission.
References:
[1] Beaver et al., and K. N. Levitt, “SCADA Key Establishment”, IEEE Network, vol. 8, no.
3, pp. 26 – 41, 2005.
[2] Dawson et al., “Industrial Network Security”, IEEE Transactions on Software
Engineering, vol. 13, pp. 222-232, February 2006.
[3] Choi et al, “Computer System Intrusion Detection: A Survey”, 2007.
http://www.cs.virginia.edu/~jones/IDSresearch/Documents/jones-sielken-survey-v11.pdf
[4] Rezai et al., “An Intrusion Detection Model”, ISA-The Instrumentation, Systems and
Automation Society, December 24, 2008.
[5] Jiang et al. and D. Garvey, "The Development of a Process and Equipment Monitoring
(PEM) Toolbox and its Application to Sensor Calibration Monitoring", The Fourth
International Conference on Quality and Reliability, Beijing, China, 2009.
[6] Wang, "Network Security on the Plant Floor", In Tech Magazine, Instrumentation
Systems and Automation Society, Research Triangle Park, NC, pp. 20 – 22, 2010.
[7] Antonini et al. and D. Garvey, "Development and Application of Fault Detectability
Performance of SCADA", Journal of Pattern Recognition Research, vol. 1, 2011.
[8] Kristan Stoddart, Sequential Analysis. New York, NY: John Wiley & Sons, 2012.
[9] Raj Kumar and D.G khatot, “SCADA: Supervisory Control and Data Acquisition”, ISA-
The Instrumentation, Systems, and Automation Society, no. 3 June 2013.
[10] Scott R. Graham and Stuart H. Kurkowski, "Technical Review of On-line Monitoring
Techniques for Performance Assessment: Part II Theoretical Issues", U.S. Nuclear
Regulatory Commission, 2014.
[11] J.A. Jardini and L.C. Magrini, “Monitoring Controller's "DNA Sequence for System
Security”, ISA Emerging Technologies Conference, Instrumentation Systems and
Automation Society, Houston, September 2015.
[12] S.K Ghosh, “Proactive Fault Monitoring in Enterprise Servers,” Proceedings of the 2016
International Conference on Computer Design, pp. 3-10, June 2016.
[13] K. Gross, "Continuous System Telemetry Harness", Tech. Rep., 2017
[Online] Available: research.sun.com/sunlabsday/docs.2004/talks/1.03_ Gross.pdf.
[14] Baker et al., "Development and Application of Fault Detectability Performance of
SCADA", Journal of Pattern Recognition Research, vol. 1, 2018.
[15] M. Lehtonen, "Scheduling Theory", Algorithms and Systems, 2018.
[16] S.K. Mitra and L.C. Magrini, “Monitoring Controller's "DNA Sequence for System
Security”, ISA Emerging Technologies Conference, Instrumentation Systems and
Automation Society, Houston, September 2019.

Vous aimerez peut-être aussi