Print Friendly, PDF & Email

Whether you require a single course for a small group or an extensive training program for your entire workforce, on-site courses offer significant savings and convenience with the same quality hands-on instruction delivered in TONEX Training Education Centers around the world.

TONEX Training offers many training seminars in variety of subject areas including Telecom, Mobile and Cellular, Wireless, Engineering, Technology, IT, business, AI and Machine Learning, Systems Engineering, Defense, Tactical Data Links (TDL), Aerospace, Aviation, Space Engineering, Specification Writing, Power and Energy, Enterprise Architecture Management, Mini MBA, Finance, Logistics, Blockchain, Leadership, and Product/Project Management. We offer programs in our four state-of-the-art Executive Conference Centers and in 20 other cities in US and international locations including:

  • Atlanta, GA
  • Dallas, TX
  • Plano, TX
  • San Francisco, CA
  • Santa Clara, California
  • Santa Monica, California
  • Alexandria, Virginia
  • New York City, NY
  • Rome, Italy
  • Shanghai, China
  • London, UK
  • Munich, Germany
  • Stockholm, Sweden
  • Tokyo, Japan
  • Seoul, Korea
  • Hong Kong
  • Bangalore, India
  • Istanbul, Turkey
  • Dubai, UAE
Mar
27
Tue
Enterprise Architecture (EA) Training Boot Camp @ UMW Dahlgren, VA
Mar 27 – Mar 29 all-day
Apr
9
Mon
Microgrid Certification Training | Microgrid Certificate @ Tonex Plano Site
Apr 9 @ 9:00 am – Apr 12 @ 4:00 pm
Print Friendly, PDF & Email

Microgrid Certification Training, Microgrid Certificate

Microgrid Certification Training curriculum is a leading edge certification and relevant to what is happening in the energy industry right now. Microgrid technology is an advanced technology developed in recent years as a critical competence of traditional power networks with reliable and efficient operation across a wide range of industries. The ability to deliver the technical information of smart grids to the right audience at the right time is a valuable skill, especially for those engaged in the field of power systems.

Microgrid Certification Training, Micro grid Certificate helps you to understand the microgrids, their operation and control as well as energy management principles applied to the microgrids. This certificate is divided into three main topics in microgrids which will help engineers and scientists to prepare themselves with the skills and required confidence to meet their organization’s needs or position themselves for their job responsibilities and promotions.  Our experts at TONEX will help you to understand the fundamental concepts of micro grids in order to tackle the real-world challenges. The micro gird certificate consists of four major topics:

  • Introduction to Microgrids
  • Microgrid operation and control
  • Energy management systems in Microgrids

The first part of the Microgrid Certification Training briefly introduces the concept of microgrids, background of renewable energy sources as the main components of a microgrid, history of renewable energy sources, advantages of microgrids and transmission system implemented in microgrids. Furthermore, you will be introduced to the basic per unit systems applied to microgrids, different types of microgrids, main operating modes in a microgrid such as: islanded mode and grid connected mode To add more details to the microgrids, you will learn the basics of solar panels, wind farms and energy storage systems as three main components of a microgrid in detail.

For each part, the operation basics, and main components will be briefly introduced and recent advancement will be taught. For example, main components of a wind farm generation unit such as: wind generators, wind turbines, towers, and foundations will be introduced and power converters implemented for each device will be discusses briefly. By the end of the first part, the audience are supposed to understand the basics of microgrid operation and should be able to understand the solar photovoltaic panels, wind farms, and battery energy storage systems.

You will also learn:

  • Transformers in microgrids
  • Different types of load in microgrids
  • Fault tolerance in microgrids
  • Cost benefits regarding microgrids
  • Hybrid microgrids
  • Micrgorid stability assessment and protection
  • Batteries in solar panels
  • Different types of PV modules
  • PV strings
  • Hybrid PV systems
  • Pulse width modulation techniques in microgrids
  • Power voltage curves for PV system
  • Power curves in wind turbines
  • Different types of wind turbines
  • Concept of pitch in wind farms
  • Series compensation in wind parks
  • Control of wind energy systems
  • Concept of energy storage systems
  • Applications of energy storage systems in microgrids
  • Conventional energy storage systems
  • Control of battery energy storage systems
  • Droop control in energy storage systems

The second part of the Microgrid Certification Training, Microgrid certificate training focuses on operation and control of microgrids from basic traditional approaches to the advanced hierarchical control of microgrids.  Firstly, basics of microgrid control will be introduced and different control modes in islanded mode and grid connected operation mode of the microgrid will be discussed. You will also learn the power elecrtronic converter control, classifications and operation, operation principles of wind farms, PV, energy storage, concept of offshore wind farms, and maximum power point tracking in microgrids. Next our instructors will focus on two separate operating modes in a microgrid (islanded and grid connect) and will describe the different control methodologies applied to each mode so far. For example, effect of voltage dips in islanded mode, active power control in islanded/grid connected mode, supporting the voltage and frequency in grid connected mode, parallel operation of converters in islanded/grid connected mode, concept of droop control in islanded mode, reactive power sharing in grid connected mode, and low voltage ride through capability of converters in grid connected mode are covered in the second part. Finally, the advanced control methodology named as hierarchical control of microgrid will be introduced and concepts of primary, secondary and tertiary controllers will be discussed in detail. You will also learn:

  • Voltage source converters in microgrids
  • Distributed loads in microgrids
  • Effect of electric vehicle charging in microgrid
  • Operation of storage units in islanded mode
  • Virtual synchronous generator effect in islanded microgrid
  • Power quality in islanded mode
  • Effect of LCL filter
  • Inner current loop and frequency control in islanded mode
  • Control of single converter in grid connected mode
  • Master and slave control of microgrids
  • Primary droop control
  • Secondary voltage and frequency control in microgrids
  • Primary control in wind farms, energy storages and PV
  • Power flow using tertiary control of microgrids
  • Frequency restoration
  • Peak shaving in microgrids
  • Demand response in microgrids
  • Unbalance compensation
  • Voltage harmonic reduction in microgrids

The third part of Microgrid Certification Training, Microgrid certificate training covers the energy management system (EMS) in microgrids. Firstly, the definitions and common terms will be provided to describe the concept of EMS. Then, the audience will be introduced with the main topics of EMS in microgrids such as: Data forecasting in microgrid EMS, DG scheduling, load dispatch, photovoltaic effect in EMS, effect of fuel cells in microgrid EMS, and optimization platform for microgrids.  After introduction part, our instructors will go into the details of EMS architecture and control in microgrids. You will learn the centralized and decentralized EMS techniques, market operator, local controllers, effect of real time data in centralized EMS, communication advancement in EMS, exchanging the price information between multiple DGs, advantages and disadvantages of microgrid EMS, forecasting the data for EMS, optimizing the power flow, optimizing the EMS policies and voltage and frequency control in short term microgrid EMS. Finally, the audience will be introduced to the challenges in the microgrid EMS such as renewable energy intermittency, network latency, and reliability of communications, two way communication challenges, and cyber security in centralized and decentralized microgrid EMS.  You will also learn:

  • Optimal dispatch in microgrid EMS
  • Monitoring devices for EMS
  • Load dispatch in microgrid EMS
  • Major vendors of EMS
  • Photovoltaic in EMS
  • Battery energy storage effect in microgrid EMS
  • Centralized and decentralized EMS in microgrids
  • Microgrid central controller (MGCC)
  • Communicating with neighbors in microgrid
  • Synchronization of microgrid through consensus objective
  • Data transfer limit between neighbors in microgrid
  • Human machine interface (HMI)
  • Real-time control effect in microgrid EMS
  • Optimization in microgrid EMS
  • Weather forecasting
  • Short term and long term EMS
  • Electricity market in EMS
  • Reliability of communications
  • Time synchronization
  • Openness of microgrid EMS
  • Reliability and cyber security of microgrid EMS

microgrid certification training

Audience

The Microgrid Certification Training, Microgrid certificate training is a 4-day course designed for:

  • All engineers who wants to learn, design, or operate the micro grids
  • Power traders to understand the modern microgrid technologies.
  • Independent system operator personnel.
  • Faculty members from academic institutes who want to teach the renewable energy or micro grid courses.
  • Investors and contractors who plan to make investments in smart grid industry.
  • Professionals in other energy industries.
  • Marketing people who need to know the background of the products they sell.
  • Electric utility personnel who recently started career in power systems or having new job responsibilities related to micro grids.
  • Technicians, operators, and maintenance personnel who are or will be working at green energy based companies.
  • Managers, accountants, and executives of power system industry.
  • Scientist or non-electrical engineers involved in micro grid related projects or proposals.
  • Graduate students seeking a professional career in micro grids

 

Microgrid Certification Training Objectives

Upon completion of the Microgrid Certification Training, Microgrid certificate training course, the attendees are able to:

  • Understand the concept of microgrids with its main components
  • Understand the operation of battery energy storage systems
  • Describe the main parts and operation principle of wind farms
  • Explain the operation and control of solar PV modules.
  • Describe the main power electronic converter types implemented in microgrids
  • Understand the hierarchical control of microgrids
  • Describe the differences between islanded mode and grid connected mode operation of microgrids
  • Explain the droop control methods implemented in microgrids
  • Understand the voltage and frequency control algorithms in microgrids
  • Describe the power control methods in islanded or grid connected mode operation.
  • Understand the energy management systems (EMS) in microgrids.
  • Tackle different challenges related to microgrid EMS.
  • Understand the EMS in centralized or decentralized microgrids.
  • Explain the effect of data forecasting in microgrid EMS

Microgrid Certification Training Course Agenda and Topics

Microgrid Certification Training, Microgrid certificate-Part1 (Introduction):

Concept of Microgrids

  • Traditional power network
  • Background and history of renewable energy sources
  • Trends for microgrids
  • Power electronic based devices
  • Common terms
  • Cower consumption in microgrids
  • Renewable generation units
  • Transformers in microgrids
  • Different types of loads in microgrids
  • Component of a microgrids
  • Per unit system
  • Transmission lines
  • DC and AC microgrids
  • Advantages of microgrids
  • Redundancy
  • Modularity
  • Fault tolerance
  • Efficiency in microgrids
  • Maintenance
  • Smaller size and cost benefits
  • Grid connected microgrids
  • Islanded mode operation of microgrids
  • Typical structure of microgrids
  • AC-DC hybrid microgrids
  • Microgrid configurations
  • Synchronization of AC sources in microgrids
  • Stability assessment of microgrids
  • Microgrid protection

Solar Panels and Photovoltaics in Microgrids

  • Why solar energy?
  • High photovoltaic (PV) penetration and utility distribution systems
  • Solar system owners
  • Advanced distribution system and solar panels
  • Main components of a PV system
  • PV module or solar arrays
  • Battery
  • Charge regulator
  • Inverter
  • Back-up generator
  • DC/AC loads
  • Different types of PV modules
  • Main elements of a PV module selection
  • PV strings
  • Connection of modules, series and parallel
  • Lead-acid batteries in PV systems
  • Nickel Cadmium batteries in PV systems
  • Standalone PV system
  • Grid connected PV system
  • Hybrid PV system
  • PV system design considerations
  • Costs in PV systems
  • Installation and operation principals of PV systems
  • PV system control
  • Maximum power point tracking
  • Proportional resonance controller
  • Pulse width modulation unit
  • Current controller
  • Phase locked loop in PV systems
  • Voltage current characteristics of PV modules
  • Power curves for PV system
  • Incremental conductance control
  • Perturb and observe control in PV system

Wind Farms in Microgrids

  • Wind energy systems
  • Wind farm scales
  • Grid integration of wind farms
  • Economics of wind farms
  • Fundamentals of wind power
  • Kinetic energy in wind power
  • Efficiency in extracting the wind power
  • Power curves in wind turbines
  • Different types of wind turbines
  • Doubly fed induction generators (DFIG)
  • Permanent magnet based wind farms
  • Main components of a wind farms
  • Wind generator
  • Wind turbine
  • Wind turbine blades
  • Horizontal and vertical axis wind farms
  • Tower
  • Drive train
  • Electronics and control
  • Pitch
  • Brake
  • Cooling system
  • Foundation of wind farms
  • Control of wind farms
  • Transmission lines
  • Concept of reactive power compensation in wind farms
  • Oscillations in wind farms
  • Control of drivetrain speed
  • Blade regulation control
  • Stalling and pitch angle control
  • Active and reactive power control in DFIGs
  • Wind forecasting
  • Future technology developments of wind farms
  • Cost of wind energy

Battery Energy Storage Systems in Microgrids

  • Concept of energy storage systems
  • Emerging needs for energy storages
  • Effect of energy storages in utility, customers and generations
  • Classifications of energy storage systems
  • Economics of energy storages in market
  • Energy storage applications in current grids
  • Limiting factors in energy storage implementations
  • Mechanical storage systems
  • Electromechanical storage systems
  • Chemical energy storages
  • Thermal storage systems
  • Conventional battery technology
  • Capacitors
  • Superconducting magnetic energy storage
  • Contingency reserves by energy storages
  • Reactive support and voltage control
  • Black start capability of energy storages
  • Congestion management by energy storages in microgrids
  • Demand management
  • Detailed models of energy storage systems
  • Different sizes of energy storage system for microgrid applications
  • Applications of energy storages in microgrids
  • Grid operational support by energy storages
  • Power quality and reliability improvements by energy storages
  • Concept and power and energy in storage systems
  • Discharging principles
  • Short term applications of energy storages in microgrids
  • Control of energy storage systems
  • Droop control
  • Active and reactive power control in energy storages
  • State of charge (SOC) control
  • Optimization techniques by energy storage system control

 

Microgrid Certification Training, Microgrid certificate-Part2 (Control and Operation):

Basics of Microgrid Control

  • Types of operation of microgrids
  • Control in grid connected mode
  • Control in islanded mode
  • Power electronic based equipments in microgrids
  • Power electronic converters
  • Power electronic switches
  • Classification of power electronic converters implemented in microgrids
  • Voltage source converters in microgrids
  • Multilevel voltage source converters
  • Pulse width modulation techniques
  • Operation principles of PV panel system
  • Operation principles of wind turbines
  • Effect of UPS in microgrid systems
  • Distributed loads in microgrids
  • Effect of virtual inertias in microgrids
  • Integration of distributed generation to shape smart grids
  • Necessity of maximum power point trackers
  • Operation of storage units in islanded mode
  • Effect of electric vehicle charging stations in microgrids
  • Wind turbine generations, offshore and on shore

Islanded Mode Operation of Microgrids

  • Islanded mode operation basics
  • Effect of long-term voltage dips or faults
  • Importing and exporting the active and reactive power
  • Controlling the current and voltage in converters
  • Supporting the frequency and voltage
  • Virtual synchronous generator effect
  • Blackouts by main grids
  • Voltage and frequency management in islanded mode operation
  • Supply and demand balancing effect
  • Power quality in islanded mode operation
  • Hierarchy of loads in islanded mode
  • Concept of point of common coupling
  • Control of a voltage source converter in islanded mode
  • Effect of LCL filter
  • Direct and quadratic (d-q) axis based control
  • Voltage control loop
  • Effect of inner current loop in islanded mode
  • Parallel converters in islanded mode operation
  • Effect of master/slave control in islanded mode
  • Frequency droop control in parallel operation
  • Voltage droop control in parallel operation

Grid Connected Mode Operation of Microgrids

  • Basics of grid connected operation
  • Control of a single converter in grid connected mode
  • Effect of parallel converters in control
  • Concept of master and slave control
  • Inner current loop and voltage control in grid connected mode
  • Droop control strategy of grid connected converters
  • Active power sharing among converters through droop
  • Reactive power sharing droop
  • Concept of inertia in microgrids
  • Effect of synchronization through an inverter
  • An inverter working as a synchronous generator
  • Park transformation in droop control of inverters in grid connected mode
  • Low voltage ride through capability of voltage source converters in grid connected mode

Hierarchical Control of Microgrids

  • Primary control loop
  • Secondary control in microgrids
  • Tertiary control
  • Centralized control of microgrids
  • Decentralized control of microgrids
  • Primary control in wind energy systems
  • Primary control in PV systems
  • Primary control in energy storages
  • Secondary control in wind energy systems
  • Secondary control in PV systems
  • Secondary control in energy storages
  • Calculating power flow for tertiary control
  • SOC management control for energy storage system
  • Cooperative synchronization of multiple energy storage units
  • Secondary control in islanded microgrids
  • Frequency restorations
  • Power quality improvement
  • Energy management systems for load shedding
  • Load shedding
  • Peak shaving control
  • Synchronization of the microgrid with grid
  • Optimization and upper level control as a tertiary control loop
  • Low voltage ride through as a tertiary control loop
  • Islanding detection
  • Microgrids interconnections
  • Harmonic compensation
  • Voltage harmonic reduction in grid connected mode
  • Voltage harmonic reduction in islanded mode
  • Unbalance compensation in microgrids
  • Concept of unbalance in microgrids
  • Sources for unbalances
  • Modeling the unbalance effect
  • Designing the compensation algorithms

 

May
16
Wed
EMC/EMI Training for Aerospace @ Dallas
May 16 @ 9:00 am – May 18 @ 4:00 pm
Print Friendly, PDF & Email

EMC/EMI Training for Aerospace by TONEX

EMC/EMI Training for Aerospace will help the attendees to develop and build EMC / EMI compliance systems that optimizes your system’s performance and reliability.

Electromagnetic Interference (EMI)/Electromagnetic Capability (EMC) for Aerospace Training Course will help you to cost-effectively identify EMC/EMI problems early in your product development cycle. EMC/EMI Training for Aerospace should also help you with capability of troubleshooting your design if you have compliance problems such as: shielding, filtering, bonding and grounding techniques, and associated materials.

Learn how to establish interface and associated verification requirements for the control of the electromagnetic interference (EMI) emission and susceptibility characteristics of electronic, electrical, and electromechanical equipment and subsystems designed or procured for use by Aerospace activities and agencies including items that have the following features: electronic enclosures, equipment racks, electrical interconnections that are discrete wiring harnesses between enclosures, and electrical power input derived from prime power sources.

EMC testing (emissions and immunity) to a variety of standards including:

  • ANSI C63.4
  • Bellcore GR-1089-Core (NEBS)
  • EMC Directive for Europe (includes EN61000 series and EN550XX series of tests)
  • EPRI TR-102323
  • FCC Part 2, 15
  • FCC Part 18 Electromagnetic Tests and Certification
  • FCC Part 68 (Analog systems)
  • Magnetic Field Interactions MIL-E-16400
  • MIL-STD 461/462
  • NASA Specification MSFC Spec. 521
  • SAE J1211
  • SAE J551/J1113
  • TIA 631
  •  US Nuclear Regulatory Commission Guide 1.180
  • VCCI Japan
May
30
Wed
VSAT Technology Training Boot Camp @ Nashville
May 30 @ 9:00 am – Jun 1 @ 4:00 pm
Print Friendly, PDF & Email

VSAT Training covers Very Small Aperture Terminal (VSAT) systems. VSAT is growing throughout the world as a way of establishing private satellite communications networks for large organizations that have several widely dispersed locations, or providing higher bandwidth for the individual.

Depending on bandwidth requirement (data speed and/or communications channels), VSAT systems can be relatively small and easily installed.

A VSAT is a two-way satellite ground station with a dish antenna that is smaller than 3 meters (most VSAT antennas range from 75 cm to 2.4 m).

Very Small Aperture Terminals data rates typically range from narrowband up to 18 Mbit/s.

Very Small Aperture Terminals access satellites in geosynchronous orbit to relay data from small remote earth stations (terminals) to other terminals (in mesh configurations) or master earth station hubs (in star configurations).

Jun
21
Thu
Microwave Radio Link Planning and Frequency @ Nashville, TN
Jun 21 @ 9:00 am – Jun 22 @ 4:00 pm
Print Friendly, PDF & Email

Nashville, TN; June 21- 22, 2018

Microwave Training Course, Microwave Radio link planning and frequency management

Microwave Training Course presents the state-of-the-art in microwave radio communications. The course presents the basic theory, procedures, and techniques for microwave communication systems an Microwave Radio link planning and frequency management. Detailed mathematical analyses are minimized in order to concentrate on basic concepts, procedures, and optimal applications. Measured results are used to demonstrate each of the techniques discussed.

Microwave networks provide reliable point-to-point and highly directional communication that maximizes your RF transmission. Because Microwave uses a higher frequency band, the capacity, throughput, and reliability of Microwave networks is well proven and understood to be very efficient throughout the telecommunications industry. In existence since the mid 1940’s, point-to-point microwave now uses digital modulation rather than simply analog.

Course Agenda

Radio System Design

  • Radio Propagation.
  • Line-of-Sight Microwave
  • Digital Line-of-Sight Microwave
  • Forward Error Correction (FEC) and Advanced Digital Waveforms
  • Basic Principles of Satellite Communications
  • Digital Communications by Satellite
  • Very Small Aperture Terminals
  • Radio System Design Above 10 GHz
  • Mobile Communications: Cellular Radio and Personal Communication Services
  • High Frequency (HF) Transmission Links
  • Meteor Burst Communication
  • Interference Issues in Radio Communications
  • Radio Terminal Design Considerations

Introduction to Microwave Communications

  • Overview
  • Microwave Radio Service
  • Regulatory and Licensing

Transmission Media

  • Copper Wire
  • Microwave Radio
  • Fiber Optic Cable
  • Bandwidth
  • Attenuation
  • Noise

Transmission Principles

  • Impedances
  • Matching
  • SWR
  • Return Loss

Propagation Transmission Characteristics

  • Microwave Frequencies
  • Wavelength – Defined
  • Propagation
  • Natural and Man-Made Obstructions to Propagation
  • Spectrum regulation and licensing aspects
  • Relevant ITU Recommendations
  • Wave propagation and effects
  • ITU Propagation Models
  • Path profile analysis
  • Microwave devices and antennas

 

Modulation In Microwave Systems

  • Modulation Overview
  • Basebands
  • FM & PM Modulation
  • Digital Modulation

Baseband Interfaces and Channels

  • System Loading -FDM
  • Network Elements
  • Low Density Digital S
  • Medium Density DS3
  • High Density SONET/SDH
  • Higher Capacity Optical Netorks

The Microwave System

  • Transmitters
  • Receivers
  • Microwave Antennas

Microwave Links

  • Antennas
  • Propagation
  • Power budgets (link calculations)
  • FDM/TDM
  • Basic rules

 

Microwave Link Budget and System Evaluation

  • The Link Budget
  • System Gain and Loss
  • Planning a Point to Point System
  • Understanding Digital Microwave System Testing
  • Interpreting Microwave Alarms

 

Microwave Radio Link Planning and Frequency Management

  • Planning & Coordination of Microwave Links (PtP & PtMP)
  • Communication links with high capacity and availability.
  • Wave propagation
  • Microwave link budgets and availability calculations
  • Technical parameters of antennas and microwave devices
  • Analysis of Path Profiles
  • LoS ( line of sight) aspects
  • Engineering of links and frequency and capacity planning
  • Effective use of frequency raster
  • Analysis of the complete network interference
  • Low interference and high frequency reuse
  • Availability and error performance
  • Link budget calculation
  • Frequency planning and channel assignment
  • Techniques for Interference analysis and network optimization

Who Should Attend

Engineers, technicians and managers who are new to Microwave and require applicable skills in design, planning and engineering.

Objectives

After completing this course, students will be able to:

  • Explain the Basics of RF and Microwave
  • Understand the engineering tools and procedures required for Microwave engineering and planning
  • Understand existing and emerging standards for Microwave
  • Understand RF Propagation and Antenna Principle
  • Describe and understand a broad spectrum of antenna types
  • Discuss Microwave Modulation Techniques
  • Review Microwave System Design Considerations
  • Review Microwave System Budget Profiles
  • Calculate Microwave Propagation Lossess and Link Budgets
  • Explain Microwave performance and Optimization considerations
  • Analyze system degradation due to Microwave components
  • Evaluate the performance of differing Microwave wireless system architectures
  • Explore project planning process of Microwave Systems
  • Review successful Microwave Deployments
  • Step through a practical process for managing Microwave networks
  • Explore the current and future market trends
  • Undertand Microwave Radio link planning and frequency management
Nov
5
Mon
Hands-On MBSE Training | Creating SysML Models Workshop @ Tonex Washington, DC
Nov 5 @ 9:00 am – Nov 7 @ 4:00 pm
Jan
14
Mon
Machine Learning Training Bootcamp @ Tonex Washington, DC
Jan 14 @ 9:00 am – Jan 16 @ 4:00 pm
Print Friendly, PDF & Email

Machine Learning Training Bootcamp

Machine Learning training bootcamp is a 3-day technical training course that covers the fundamentals of machine learning, a form and application of artificial intelligence (AI).

Machine learning helps to automate the data analysis process by enabling computers, machines and IoT to learn and adapt through experience applied to specific tasks without explicit programming.

Attendees will learn, comprehend and master ideas on machine learning concepts, key principles, techniques including: supervised and unsupervised learning, mathematical and heuristic aspects, modeling to develop algorithms, prediction, linear regression, clustering, classification, and prediction.

Learn differences and similarities between Machine Learning, Artificial Intelligence, Deep Learning, Data Mining and Data Warehouse. Artificial Intelligence uses models built by Machine Learning to create intelligent behavior applied to businesses, marketing and sales, operations, autonomous cars, games and industrial automation by prediction based on rules and using programming languages and algorithms.

Machine learning based on artificial intelligence provides the ability to learn about newer data sets without being programmed explicitly using methods of data analysis. Machine Learning takes advantages of Data Mining techniques, statistics, other key principles and learning algorithms to build models to predict future outcomes. Math and programming are the basis for many of the machine learning algorithms. Using machine learning as a tool, the machine must automatically learn the parameters of models from the data. Using larger datasets, better accuracy and performance is achieved.

Machine learning and data mining can use the same key algorithms to discover patterns in your data and dataset. In machine learning, the computers, machines and IoT devices must automatically learn the parameters of models from the data using self-learning algorithms to reveal insights and provide feedback in near real-time.

Machine learning, for example, can be used in proactive maintenance to continuously monitor the performance of simple or complex industrial systems, applications and events. Using the ability to learn and adapt, makes it the optimal choice for improvements in ongoing processes, and to automatically predict and prevent failures.

Learn how Machine Learning can automatically process and analyze huge volumes of complex data. Machine learning powers innovative automated technologies such as recommendation engines, facial recognition, financial losses from stock market and bonds, fraud protection, self-driving autonomous cars, robotics, industrial automation and future applications.

Learning Objectives

After completing this course, the student will be able to:

  • Learn about Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL)
  • List similarities and differences between AI, Machine Learning and Data Mining
  • Learn how Artificial Intelligence uses data to offer solutions to existing problems
  • Explore how Machine Learning goes beyond AI to offer data necessary for a machine to learn, adapt and optimize
  • Clarify how Data Mining can serve as foundation for AI and machine learning to use existing information to highlight patterns
  • List the various applications of machine learning and related algorithms
  • Learn how to classify the types of learning such as supervised and unsupervised learning
  • Implement supervised learning techniques such as linear and logistic regression
  • Use unsupervised learning algorithms including deep learning, clustering and recommender systems (RS) used to help users find new items or services, such as books, music, transportation, people and jobs based on information about the user or the recommended item
  • Learn about classification data and Machine Learning models
  • Select the best algorithms applied to Machine Learning
  • Make accurate predictions and analysis to effectively solve potential problems
  • List Machine Learning concepts, principles, algorithms, tools and applications
  • Learn the concepts and operation of support neural networks, vector machines, kernel SVM, naive bayes, decision tree classifier, random forest classifier, logistic regression, K-nearest neighbors, K-means and clustering
  • Comprehend the theoretical concepts and how they relate to the practical aspects of machine learning
  • Be able to model a wide variety of robust machine learning algorithms including deep learning, clustering and recommendation systems

Course Agenda and Topics

The Basics of Machine Learning

  • What is Machine Learning?
  • Emergence and applications of Artificial Intelligence and Machine Learning
  • Basics of Artificial Intelligence
  • Basics of Machine Learning
  • Basics of Data Mining
  • Data Mining versus Machine Learning versus Data Science
  • Data Mining and patterns
  • Why is machine learning important?
  • Creating good machine learning systems

Machine Learning Techniques, Tools and Algorithms

  • Supervised, unsupervised, semi supervised and reinforcement learning
  • Basic tools and ideas in Machine Learning
  • Supervised Machine Learning problems and solutions
  • Supervised Machine Learning tasks subgroups: regression and classification
  • Unsupervised Machine Learning
  • Unsupervised tasks and generative modelling
  • Reinforcement Learning, Hybrids and Beyond
  • Data preparation capabilities
  • Techniques of Machine Learning
  • Polynomial regression
  • Linear regression
  • Random forest
  • Decision tree regression
  • Gradient descent and regularization
  • Classification
  • Logistic regression
  • K-nearest neighbors
  • Support vector machines
  • Naive Bayes
  • Kernel support vector machines
  • Decision tree classifier
  • Random forest classifier
  • Clustering algorithms
  • K-means clustering
  • Bias and variance trade-off
  • Representation learning
  • Data Preprocessing
  • Data preparation
  • Feature engineering and scaling
  • Data and Datasets
  • Dimensionality reduction

Data and Data Science

  • Principles of Data science
  • Programming, logical reasoning, mathematics and statistics
  • Data Engineering versus Data Science
  • Time series comparison
  • Neural Networks
  • Steps to Machine Learning

Review of Terminology and Principles

  • Math Refresher
  • Concepts of linear algebra
  • Probability and statistics
  • Algorithms
  • Automation and iterative processes
  • Scalability
  • Ensemble modeling
  • Framing
  • Generalization
  • Machine Learning methods
  • Classification
  • Training and Training Set
  • Validation
  • Representation
  • Regularization
  • Logistic Regressions
  • Neutral Nets
  • Neutral Nets
  • Multi class Neutral Nets
  • Embeddings
  • Basic Algebra and Calculus
  • Basic Python
  • Chain rule
  • Concept of a derivative
  • Gradient or slope
  • Linear algebra
  • Logarithms, and logarithmic equations
  • Matrix multiplication
  • Mean, median, outliers and standard deviation
  • Partial derivatives
  • Sigmoid function
  • Statistics
  • Tanh
  • Tensor and tensor rank
  • Trigonometry
  • Variables, coefficients, and functions

Applied Artificial Intelligence (AI) and Machine Learning

  • Machine Learning prediction with models
  • Artificial Intelligence behaving and reasoning
  • Applications of Machine Learning
  • Machine Learning algorithms
  • Models
  • Techniques
  • Statistics and Math
  • Algorithms
  • Programming
  • Patterns and Prediction
  • Intelligent Behavior
  • Statistics quantifies numbers
  • Machine learning generalizing information from large data sets
  • Principles to detect and extrapolate patterns
  • Machine Learning System Analysis and Design
  • Support Vector Machines

Popular Machine Learning Methods

  • Supervised learning and unsupervised learning
  • Supervised learning algorithms and labeled data
  • Trained using labeled examples
  • Classification, regression, prediction and gradient boosting
  • Supervised learning and patterns
  • Predicting the values of the label on additional unlabeled data
  • Using historical data to predict likely future events
  • Unsupervised learning and unlabeled data
  • Unsupervised learning against data that has no historical labels
  • Semi supervised learning
  • Using both labeled and unlabeled data for training
  • Classification, regression and prediction
  • Reinforcement learning
  • Robotics, gaming and navigation
  • Discovery through trial and error
  • The agent (the learner or decision maker)
  • The environment (everything the agent interacts with)
  • Actions (what the agent can do)

Learning Applied to Machine Learning

  • Application of Supervised versus Unsupervised Learning
  • Case Study: credit card transactions as fraudulent charges
  • Self-organizing maps, nearest-neighbor mapping, k-means clustering and singular value decomposition
  • Face recognition

Principal Component Analysis

  • Anomaly detection
  • Deep learning
  • Neural networks
  • Learning with deep neural networks
  • Deep neural networks and hidden layers and multiple types of hierarchies
  • Deep learning as a type of machine learning
  • Regularization
  • Machine learning models need to generalize well to new examples that the model has not seen in practice.
  • Tools to prevent models from overfitting the training data.

Principles of Supervised Machine Learning Algorithms

  • Machine Learning algorithms mind map
  • What is supervised machine learning?
  • How does it relate to unsupervised machine learning?
  • Classification and regression supervised learning problems
  • Clustering and association unsupervised learning problems
  • Algorithms used for supervised and unsupervised problems
  • Supervised Machine Learning as a majority of practical machine learning
  • Supervised learning problems grouping into regression and classification problems
  • Principles of “Classification”
  • Principles of “Regression”
  • Popular examples of supervised machine learning algorithms
  • Linear regression for regression problems
  • Random forest for classification and regression problems
  • Support vector machines for classification problems

Principles of Unsupervised Machine Learning

  • The goal for unsupervised learning
  • Modeling the underlying structure or distribution in the data
  • Ways to learn more about the data
  • Algorithms to discover and present the interesting structure in the data
  • Unsupervised learning problems grouping into clustering and association problems
  • Principles of “Clustering”
  • Ways to discover the inherent groupings in the data
  • Principles of “Association”
  • Ways to discover rules that describe large portions of your data
  • Examples of unsupervised learning algorithms
  • K-means for clustering problems
  • Apriori algorithm for association rule learning problems
  • Semi-Supervised Machine Learning
  • Unlabeled data and a mixture of supervised and unsupervised techniques
  • Collecting and storing unlabeled data

Regression Applied to Machines Learning

  • Linear Regression with One Variable
  • Application of linear regression
  • Method for learning
  • Linear Algebra Review
  • Refresher on linear algebra concepts
  • Models with multiple variables
  • Linear Regression with Multiple Variables
  • Implement the learning algorithms in practice
  • Logistic Regression
  • Logistic regression is a method for classifying data into discrete outcomes
  • Logistic regression to classify a credit card transaction as fraud or not fraud

Principles of Neural Networks

  • Neural Networks Representation
  • Principles behind neural networks and models
  • Neural Networks Learning
  • Backpropagation algorithm
  • Learn parameters for a neural network.
  • Implementing your own neural network for credit card fraud
  • Advice for Applying Machine Learning
  • Best practices for applying machine learning in practice
  • Best ways to evaluate performance of the learned models

Large Scale Machine Learning

  • Real-world case studies
  • Interactive visualizations of algorithms in action
  • Pattern Recognition
  • Accuracy
  • Case Study: Marketing Campaign
  • Working with Regression
  • Prediction
  • Classification
  • Logistic Regression
  • Unsupervised Learning with Clustering

Introduction to Deep Learning

  • Principles of Deep Learning
  • Artificial Neural Networks
  • TensorFlow
  • Learning complicated patterns in large amounts of data
  • Identifying objects in images and words in sounds
  • Automatic language translation
  • Medical diagnoses

Applying Machine Learning

  • Applying machine learning to IoT
  • Financial services
  • DoD
  • Government
  • Health care
  • Marketing and sales
  • Oil and gas
  • Renewable Energy
  • Transportation

Overview of Algorithms

  • Associations and sequence discovery
  • Bayesian networks
  • Decision trees
  • Expectation maximization
  • Gaussian mixture models
  • Gradient boosting and bagging
  • Kernel density estimation
  • K-means clustering
  • Local search optimization techniques
  • Multivariate adaptive regression splines
  • Nearest-neighbor mapping
  • Neural networks
  • Principal component analysis
  • Random forests
  • Self-organizing maps
  • Sequential covering rule building
  • Singular value decomposition
  • Support vector machines

Overview of Tools and Processes

  • Comprehensive data quality and management
  • GUIs for building models and process flows
  • Interactive data exploration
  • Visualization of model results
  • Comparisons of different machine learning models
  • Identify the best machine learning models
  • Automated ensemble model evaluation
  • Repeatable and reliable results
  • Integrated, end-to-end platforms to automate data-to-decision process
  • Exploratory Data Analysis with R
  • Loading, querying and manipulating data in R
  • Cleaning raw data for modeling
  • Reducing dimensions with Principal Component Analysis
  • Identifying outliers in data
  • Working with Unstructured Data
  • Mining unstructured data
  • Building and evaluating association rules
  • Constructing recommendation engines
  • Machine learning with neural networks
Jan
21
Mon
Scrum @ Tonex Training Center
Jan 21 @ 9:00 am – Jan 22 @ 4:00 pm
Print Friendly, PDF & Email

Scrum training

Mar
6
Wed
Defense Demilitarization Program Course (DDPC) @ Tonex Dallas
Mar 6 @ 9:00 am – Mar 8 @ 4:00 pm
Print Friendly, PDF & Email

Defense Demilitarization Program Course (DDPC)

Defense Demilitarization Program Course (DDPC) will identify what the Defense Demilitarization Program Course DEMIL is and will define what the codes associated with the items mean.  Emphasis will be placed on the accurate coding of Munitions List Items (MLI) / Commerce Control List Items, the employment of the DEMIL manual and the latest changes effecting the DEMIL program.

DEMIL training will be tailored to personnel who have a functional responsibility associated with the logistics and disposal of military property, assignment of DEMIL codes and/or management of the DoD Demilitarization and Trade Security Controls Program.

DEMIL training is required for personnel to assign DEMIL code and to verify and validate that DEMIL of the MLI has been completed.

Target Audience: Provisioners, Inventory Managers and other NSWC PHD personnel who want to become familiar with Demilitarization

Pre-Requisites:  None

 Learning Objectives

Upon completion of this course, the participants are able to:

  • Identify regulatory and implementing documents used in DEMIL and Trade Security controls.
  • Examine the USML to identify MLI.
  • Discuss requirements for each DEMIL code.
  • Assign DEMIL codes to MLI.
  • Identify additional requirements for instructions associated with DEMIL code G, P and F items.
  • Identify the entities authorized to perform physical DEMIL.
  • Distinguish between DEMIL code “Q” and DEMIL code “A” items by using the Commerce Control List.
  • Determine appropriate disposition requirements for MLI and CCLI by using the DEMIL Code Challenge Program
  • Interpret disposition requirements for Munitions List Items and Commerce Control List Items.
  • Discuss DoD Trade Security Controls
  • Interpret the policies and programs applicable to MLI and CCLI in Contractor Inventory.

Course Agenda

  • Principles of DEMIL
  • DoD Demilitarization (DEMIL) Program
  • DEMIL Program Administration
  • DEMIL Planning Guidance
  • DEMIL Roles and Responsibilities
  • Demilitarization Coding
  • Policy and assigns responsibilities for the DoD DEMIL program
  • DoD Directive 5134.01
  • Oversight of DEMIL functions
  • DEMIL code assignment accuracy
  • DEMIL life cycle planning
  • Section 1051 of Public Law 105-261
  • DoD programs for the research, development, and acquisition; management; sustainment; maintenance; disposition; or release of DoD personal property
  • Commerce Control List (CCL)
  • Trade security controls (TSC) measures
  • DoD Instruction 2030.08
  • Sensitive and non-sensitive Commerce Control List Items (CCLI)
  • International transfers procedures in DoD Instruction 2040.02
  • DEMIL Validation Program
  • DEMIL and Controlled Inventory Item Codes (CIICs)
  • DLA Disposition Services
  • DLA Disposition Services/Controlled Property Verification
  • DEMIL Waivers and Modifications
  • Captured Property
  • Qualified Recycling Program
Apr
15
Mon
DO-178 And DO-254 Avionic Training Bootcamp @ Atlanta, GA
Apr 15 @ 9:00 am – Apr 18 @ 4:00 pm
Print Friendly, PDF & Email

Price: $3,999.00
Length: 4 Days

DO-178 And DO-254 Avionic Training Bootcamp

DO-178 And DO-254 Avionic Training Bootcamp Description

DO-178 And DO-254 Avionic Training Bootcamp covers the software and hardware aspects of avionic certification. You will learn the fundamental concepts, principals, tools, and methods associated with these two standards. You also will understand the differences and similarities of DO-178 and DO-254. In this bootcamp, we will discuss the background of these certifications, how they have evolved over the past years, and what would be the current application of them.

DO-178 And DO-254 Avionic Training Bootcamp<img class=”aligncenter wp-image-11474 size-large” src=”https://tonex.wpenginepowered.com/wp-content/uploads/DO-178DO-254-640×314.jpg” alt=”DO-178 And DO-254 Avionic Training Bootcamp” width=”580″ height=”285″ srcset=”https://tonex.wpenginepowered.com/wp-content/uploads/DO-178DO-254-640×314.jpg 640w, https://tonex.wpenginepowered.com/wp-content/uploads/DO-178DO-254-300×147.jpg 300w, https://tonex.wpenginepowered.com/wp-content/uploads/DO-178DO-254-768×377.jpg 768w” sizes=”(max-width: 580px) 100vw, 580px” />

Learn About:

  • DO-178 & DO-254 background and evolution path
  • DO-178C/254 rules
  • Document hierarchy
  • DO-178C Certification Plans
  • DO-254 Certification Plans
  • 
PSAC/PHAC
  • 
System & requirements
  • 
DO178/254 design process
  • 
DO178/254 execution, coding and reviews
  • 
DO178/254 verification process
  • DO-178C structures, tools and plans
  • 
Traceability
  • 
DO-178/254 errors and prevention action plans
  • 
Gap analysis
  • 
Design, data & control flow
  • 
Hardware and software verification
  • 
COTS Usage in DO-178/254

TONEX Bootcamp Format

DO-178 and DO-254 Training bootcamp is mostly a hands-on course. More than 70% of the class will be spent on practical exercises including labs, group class activities, and hands-on workshops. We have tried to encompass all the required material associated with DO-178/DO-254 when we designed the course, but we are also flexible to tailor the course agenda based on the needs of your organization.

Audience

DO-178 and DO-254 Training bootcamp is a 4-day course designed for:

  • Software Engineers
  • Hardware Engineers
  • Systems Engineers
  • Test Engineers
  • Quality and Process Assurance engineers and managers
  • Project managers
  • Process engineers
  • All individuals involved in DO-178 and DO-245 projects

Training Objectives

Upon the completion of DO-178 and DO-254 Training bootcamp, the attendees are able to:

  • Understand both DO-178 and DO-254 components and they work
  • Recognize the differences and similarities between these two
  • Recognize the exact application of each DO-178 and DO-254 to various elements inside the system
  • 
Understand the actual intent of DO-178 industrial effective strategies
  • 
Explain the history behind the DO-254 and DO-178C standards
  • Comprehend the DO-178/254 evolution path resulting in the present’s interpretation.
  • Identify what exactly is required to initiate a project in regards to safety, tools, quality assurance, and configuration management.
  • Provide DO-178/254 compliant requirements
  • Conduct DO-178/254 design, execution, and verification
  • Apply best practices of DO-178/254
  • Prevent usual errors
  • Analyze DO-254/DO-178 gaps in their organization
  • Estimate the associated costs and benefits of applying DO-178/254.

Course Outline

Overview of DO-254 and DO-178

  • DO-178 certification description
  • DO-254 certification description
  • DO-178/DO-254 history and evolution path
  • DO-178/DO-254 applications
  • DO-178/DO-254 terminology and definitions
  • DO-178/DO-254 part number and nomenclature
  • DO-178/DO-254 team personnel
  • DO-178/DO-254 organizational responsibilities
  • DO-178/DO-254 acronyms and abbreviations
  • Applicable internal and external documents

Hardware System Synopsis

  • Mechanical systems top level chart
  • Electrical systems top level block diagram
  • System functional definition
  • System failure states
  • Safety and partitioning

Hardware Synopsis

  • Hardware operations
  • Hardware safety and partitioning
  • Single incident upset planning
  • Hardware elements

DO-254 Hardware Certification Contemplations

  • Certification fundamentals and tools of compliance
  • Issue paper sheets
  • Certification Review Items (CRIs)
  • Hardware level identification
  • Compliance measures
  • Certification authority engagement

Lifecycle of DO-254 Hardware Design

  • V-Model technique
  • DO-254 team personnel roles
  • Interactions among the processes and activities
  • Development sequencing
  • Relationship between processes
  • Flow diagram of the system lifecycle
  • Flow diagram of hardware lifecycle
  • Methods to give feedback
  • Feedback procedure
  • Iterative development model
  • Overview of problem reporting techniques
  • Traceability of evaluations
  • Assessment results
  • Planning process
  • Development flow diagrams
  • Requirements capture development
  • Conceptual design development
  • Detail design development
  • Execution process
  • Verification process
  • Production transition process

DO-254 Hardware Design Planning Process

  • Objectives
  • Inputs
  • Outputs
  • Actions
  • Technical boundaries
  • Tools
  • Transition requirements
  • Essential processes
    • Validation & verification process
    • Configuration management
    • Process assurance
    • Certification liaison

DO-254 Hardware Process Assurance

  • Process assurance audits
  • Hardware transition requirements approval review
  • Process assurance corrective Action
  • Certification liaison goals and actions
  • Compliance and criteria tools
  • Compliance substantiation process

Data Associated with Hardware Design Lifecycle

  • Introduction
  • Traceable data
  • Objective criteria of compliance
  • Generating and regulating the hardware lifecycle data
  • Submitting hardware lifecycle data
  • Hardware control classifications

DO-254 Supplemental Considerations

  • Taking advantage of the formerly developed hardware
  • Applying Commercial-Off-The-Shelf (COTS) elements
  • SH-1 Issue paper compliance
  • Safety concerns
  • Tool evaluation and qualification
  • Design assurance concerns
  • Applying contractors, sub-tier providers and off-shore facilities
  • Nonconformities and changes to plans

DO-254 Certification Timetable

  • Master project timetable
  • Certification authority web interface
  • Management system

Software Synopsis

  • Software configuration block diagram
  • Processor #1
  • Processor #2
  • COTS software determination
  • Disabled code partitioning
  • Safety and partitioning considerations
  • Resource allocation
  • Redundancy
  • Fault tolerance
  • Task timing

DO-178 Software Certification Considerations

  • Certification fundamentals and compliance tools
  • Certification Review Items (CRI)
  • Development assurance levels (DALs)
  • Software level identification
  • DO-178C objectives By DAL
  • Software conformity matrix
  • Certification authority involvement

DO-178 Software Lifecycle

  • V-Model approach
  • Expansion of several DAL’s inside a single lifecycle procedure
  • DO-178 team personnel roles and responsibilities
  • Interactions of processes and actions
  • Relationships between processes
  • Delivering feedback methods
  • Traceability of appraisals and assessment outcomes
  • Overview of problem reporting
  • Software planning process
  • Integral procedures
  • Software criteria process
  • Software design development
  • Software coding procedure
  • Integration process
  • Software testing procedure

DO-178 Software Lifecycle Data

  • Introduction
  • Lifecycle data interactions with other data describing the system
  • Trace information
  • Creating and regulating the software lifecycle data
  • Presenting the software lifecycle data to the certification authority
  • Software control classification
  • DER delegation plan

DO-178 Software Supplemental Considerations

  • Taking advantage of formerly developed software
  • Tool qualification
  • Alternate techniques
  • In-situ loadable software
  • Preference selectable software
  • User adaptable software
  • Various version software
  • Software COTS
  • Applying suppliers, sub-tier providers and off-shore facilities
  • Nonconformities and alterations to plans

TONEX Workshop Sample

  • Apply V-model for both software and hardware
  • Develop conceptual design according to DO-178 and DO-254
  • Estimate the costs associated with DO-178 and DO-254 implementation
  • Perform COTS for both DO-178 and DO-254
  • Develop process planning for DO-178 and DO-254
  • Develop the DO-178 and DO-254 lifecycle step by step
May
9
Thu
GPON Training | Gigabit Passive Optical Networking @ Atlanta, GA
May 9 @ 9:00 am – May 10 @ 4:00 pm
Print Friendly, PDF & Email

Price: $1,899.00
Length: 2 Days

Print Friendly, PDF & Email

GPON Training, Gigabit Passive Optical Networking Training

GPON Training, Gigabit Passive Optical Networking Training.  A 2-day GPON training course including GPON, XGPON 10 Gigabit systems. and NG-PON2.

Gigabit Passive Optical Networking course covers the fundamentals of FTTx GPON,  XGPON and NG-PON2  technologies.

gpon training

GPON is defined by ITU-T recommendation series G.984.1 – G.984.6. GPON can transport  Ethernet, and TDM (PSTN, ISDN, E1 and E3) traffic and consists of Optical Line Termination (OLT) and Optical Network Unit (ONU) or Optical Network Termination (ONT)  transmission equipments.

XGPON’s Capable passive optical networks (GPON) maximum rate is 10 Gbits/s (9.95328) downstream and 2.5 Gbits/s (2.48832) upstream using different WDM wavelengths such as 1577 nm downstream and 1270 nm upstream:

  • XGPON optical split is 1:128
  • Data formatting is the same as GPON
  • Maximum range is 20 km

Learn about:

  • The basics FTTx technologies
  • Principles behind Passive optical networks (PONs)
  • Architectural principles of access networks
  • Analysis and planning, topologies, site types, and Fiber Termination Points
  • GPON general characteristics
  • GPON FTTH platforms
  • Capable passive optical networks (GPON); XPON

Learning Objectives

Upon completion of GPON training course, the attendees will be able to:

  • Describe what PON/FTTx is
  • Describe what GPON networking is
  • Describe GPON Network Architecture
  • Outline GPON Basic Concepts
  • Outline GPON Applications
  • List the advantages, requirements and capabilities of GPON and XGPON
  • Describe GPON typical application scenarios
  • Describe the use of GPON and supported applications and network interfaces
  • Describe the key concepts in GPON and XGPON
  • Sketch the architecture of GPON. Network Elements and designs
  • Explain the network architecture of GPON and XGPON
  • List GPON subsystems and interfaces
  • Describe the functions and specifications of GPON components
  • Explain GPON operational procedures
  • Describe GPON capacity planning, upstream and downstream technologies
  • Describe GPON  key performance parameters
  • Describe the QoS, security, protection, and OAM solutions in GPON
  • Describe ONT management concepts applied to GPON
  • List GPON service implementation process steps
  • Describe 10-Gigabit-capable passive optical network (XG-PON) systems, services, architecture, protocols and Reach Extension
  • Describe 40-Gigabit-capable passive optical networks (NG-PON2) systems, services, architecture and protocols

Course Agenda

FTTx Access Networks

  • Elements of an Access Network
  • Access Network Infrastructures
  • Principles behind FTTX Access Networks
  • FTTx networks architecture
  • FTTC, FTTN, FTTD, FTTP, FTTH
  • Principles behind FTTH
  • FTTH topology, technology and network layers
  • What is Passive Optical Networks (PON)?
  • BPON architecture and components
  • BPON and EPON
  • What is GPON?
  • Fundamentals of GPON
  • GPON Infrastructure
  • Similarities and differences between BPON, EPON  and GPON

Technical Introduction to GPON

  • GPON Standards
  • GPON ITU-T G.984.1
  • GPON ITU-T G.984.2
  • Physical Media Dependent (PMD)
  • GPON ITU-T G.984.3
  • Transmission Convergence
  • GPON ITU-T G.984.4
  • 988 ONT Management and Control Interface (OMCI)
  • GPON ITU-T G.984.5 Enhancement Band
  • GPON ITU-T G.984.6
  • Optical Reach Extension (G.984.re)
  • XG-PON ITU-T G.987.1
  • 10 Gigabit Passive Optical Network XG-PON
  • XG-PON2
  • 40Gbps
  • GPON Network Elements
  • Optical Line Termination (OLT)
  • Optical Network Unit (ONU)
  • SFU, SBU, MDU, and MTU
  • GPON Fiber Termination
  • Fiber Connectors
  • Fiber Splice Trays
  • Fiber Cassette Trays and Enclosures
  • Optical Splitter
  • Optical Distributions Frame (ODF)

GPON Power Budget Calculation

  • GPON Infrastructure Examples
  • Optical Power Budgets
  • Dispersion Calculation
  • In-Building wiring
  • GPON Multiplexing
  • PMD
  • Channel Insertion Loss,
  • Optical Distribution Network (ODN)
  • GPON power budgets
  • XGPON power budgets

GPON Architecture, Interfaces and Protocols

  • GPON Services
  • Downstream and Upstream TDM Architectures
  • GPON Stack
  • Network Protocol Support
  • OLT PMD and ONU PMD
  • Frame Structure
  • GPON Encapsulation Method (GEM)
  • GTC adaptation sublayer
  • GTC framing sublayer protocol stack
  • Transmission container (T-CONT)
  • Physical Parameters
  • Reliability and FEC Encoding
  • Channel model and Ports
  • GTC Layer
  • OAM at GTC layer
  • User Planes in GPON
  • ONU Management and Control Interface (OMCI)
  • GPON System Management Mode: SNMP, TR-069
  • Security
  • Protection

GPON OSS/NMS/EMS

  • GPON Service Management
  • GPON Network Management
  • GPON OSS, NMS and EMS
  • Best Practices

10-Gigabit-capable passive optical network (XG-PON): G.987

  • XG-PON Definitions, abbreviations and acronyms
  • XG-PON General requirements
  • XG-PON Physical media dependent (PMD) layer specification
  • XG-PON XG-PON Transmission convergence (TC) layer specification
  • Reach extension

40-Gigabit-capable passive optical networks (NG-PON2): G.989

  • NG-PON2 Definitions, abbreviations and acronyms
  • NG-PON2 General requirements
  • NG-PON2 Physical media dependent (PMD) layer specification
  • NG-PON2 Transmission convergence (TC) layer specification
May
13
Mon
Mobile Application Development Workshop @ TONEX LA Office
May 13 @ 9:00 am – May 14 @ 4:00 pm
Print Friendly, PDF & Email

Mobile Application Development Workshop

Mobile Application Development Workshop Description

Mobile Application Development workshop is designed by TONEX to examine the principles of mobile application (app) design and development. It is a project-oriented course which includes app design for different mobile platforms such as iOS, Android and Windows based on the latest versions and trends available.

Mobile Application Development workshop

TONEX as a leader in teaching industry for more than 15 years and having a lot of experience in mobile app development industry is now announcing the Mobile Application Development workshop which helps you to understand the advanced technology behind the mobile application development and design advanced applications for distribution or individual need.

Mobile Application Development workshop contains real-world application implementation for different platforms using Java, Swift and Objective-C (for iOS), HTML5, JavaScript and XML, and C# and XAML (for Windows).

Our Company, TONEX, has established a complete mobile application development program with different variety of courses, workshops, seminars, and comprehensive courses designed by professionals from academia and industry in mobile application development. We are pleased to announce the mobile application development workshop for those professional fellows interested in developing mobile applications for iPhone, iPad, Android, or Windows devices.

This course covers a variety of topics in mobile app development such as: Introduction to mobile app development, application development for Android systems using Java and XML, Android environment setup and architecture, Android User Interface (UI) layouts and control, iOS mobile application development using Objective-C and Swift programming, UI design in iOS, and Windows mobile application development using C# and XAML programming languages.

By taking the Mobile Application Development workshop, you will understand the basics of iOS, iOS Xcode app development interface, benefits of newly designed Swift programming over Objective-C and Cocoa, delegates and UI elements in iOS and object creation for iOS.

Learn about fundamentals of JavaScript and XML programming for android, android software development kit (SDK), event handling, hardware sensors, UI controls, fragments, and content providers in android operating system.

Learn about basics of Objective C, Swift, Java, C# and CAML which are vital parts of mobile app development in windows phones, XAML layout and events, video/audio control, maps, Bluetooth and database for windows phones.

All the materials and topics in this course are being updated in a timely manner to ensure the trend is followed and it has been proven that many clients learn about upcoming technologies from TONEX first. For example, the programming part covers the recent advancements in iOS 9, Android 6, and Windows 10 application developments.

Finally, the Mobile Application Development workshop will introduce a set of labs, workshops and group activities of real world case studies in order to prepare you to develop sophisticated mobile apps and to be able to tackle all the related mobile app development challenges.

Audience

The Mobile Application Development workshop is a 2-day course designed for:

  • Mobile app developers and software engineers
  • Project managers and business analysts working with mobile application development
  • Team members or stakeholders involved in mobile application design and development
  • Business analysts, functional managers, project managers, developers and testers
  • System administrators, engineers who want to learn mobile app development
  • Vendors who will develop mobile apps
  • Investors and contractors who plan to make investments in mobile app industry.

Training Objectives

Upon completion of the Mobile Application Development workshop, the attendees are able to:

  • Describe all aspects of mobile programming which make mobile programming unique compared to other platforms
  • Design mobile applications for a company or individual profit
  • Implement and apply prototyping approaches in order to develop complicated mobile interfaces
  • Program iOS using basic and advanced phone features
  • Implement an Android application using advanced phone features
  • Understand design principles to program windows phone applications
  • Implement mobile apps for Android, iOS, or Windows phones in marketplace for distribution
  • Get a profound understanding of the ideas and philosophy behind the mobile app development.
  • Have a thorough understanding of the motivation, requirements, functionality, possibilities, and limitations mobile app development and design

Training Outline

The Mobile Application Development workshop consists of the following lessons, which can be revised and tailored to the client’s need:

Introduction to Mobile App Development

  • History and Background of Mobile Apps
  • Smart Phones
  • Tablets
  • Mobile Computing
  • Mobile Business Landscape
  • Native Mobile Applications
  • Mobile Web Applications
  • Different Mobile Platforms
  • iOS
  • Android
  • Windows Phone
  • BlackBerry OS
  • Tablet Platforms
  • Hardware Sensors
  • Security Consideration in Mobile App Design
  • Data Integration and Database
  • Programming Languages
  • Web Designer and Developer Role

App Development for Android

  • Features of Android
  • Software Development Kit (SDK) for Android
  • Android Applications
  • Environment Setup
  • Android Architecture
  • Application Components
  • Organizing Resources and Accessibility
  • Broadcast Receivers and Intents
  • Content Providers
  • Fragments
  • Intents and Filters
  • User Interface (UI) Layouts
  • UI Controls
  • Event Handling
  • Styles and Themes
  • Custom Components
  • Database and Content Providers
  • Hardware Sensors
  • Maps, Geocoding, and Location Services
  • Audio, Video, and Camera
  • Bluetooth, Bluetooth LE, NFC, Networks and Wi-Fi
  • Telephony and SMS

Android Environment Setup and Architecture

  • Tools
  • Java Development Kit (JDK)
  • Android JDK
  • Android Development Tools (ADT) Plug-in
  • Android Virtual Device
  • Eclipse IDE
  • Linux Kernel
  • Android Libraries
  • Android Runtime
  • Application Framework
  • Applications

 Android User Interface (UI) Layouts and Control

  • Relative Layout Attributes
  • GridView Attributes
  • Sub-Activity Attributes
  • Layout Attributes
  • View Identification
  • Android UI Control
  • TextView Attributes
  • EditText Attributes
  • AutoComplete TextView
  • Button Attributes
  • ImageButton Attributes
  • CheckBox Attribute
  • ToggleButton
  • RadioButton Attrubutes
  • RadioGroup Attribute

 iOS Mobile Application Development Using Objective-C and Swift (iOS 9 and Below)

  • General Background about iOS
  • iOS Xcode
  • Improvement from Cocoa Framework to Objective-C and Swift
  • Benefits of Swift Development
  • Combination of Objective-C and Swift
  • Swift Interface and Implementation
  • Object Creation
  • Data Types in Swift
  • Printing Logs
  • Arrays, Dictionary and Categories in Swift
  • Creating an App
  • Actions and Outlets
  • Delegates
  • User Interface (UI) Elements
  • Designing UI for iOS
  • Accelerometer
  • Universal Applications
  • Camera Management
  • Location Handling
  • SQLITE Database
  • Audio and Video
  • File Handling
  • Map and Location
  • In-App Purchases, Storyboards, and Audio Layouts
  • Game, Twitter, and Facebook
  • Memory Management in iOS
  • Application Development Debugging Techniques

 User Interface Design in iOS

  • Main Elements of UI
  • UI Focus and Approaches
  • Text Files
  • Input Types
  • Buttons
  • Labels and Toolbars
  • Status Bars and Navigation Bars
  • Tab Bar
  • Image View
  • Scroll view
  • Table view
  • Split View
  • Text View
  • Pickers
  • Icons and Switchers
  • Sliders and Alerts

 C# and XAML for Windows Mobile Application Development (Windows 10 and Below)

  • Introduction to Windows Phone Platform
  • User Interface Design for Windows Phone
  • Application Interface
  • Windows Phone Developer and Designer Tools
  • Coding Tools
  • Designing Tools
  • Application Development Tools
  • C# Programming for Windows Phone App Development
  • Windows Application Life Cycle
  • Storage and Network Access
  • API Mapping Tools
  • Navigation Model
  • XAML Layout and Events
  • Windows Phone Emulator
  • HTML Apps in WebView
  • Maps and Animations
  • Video/Audio Control
  • Controls and File Handling
  • Bluetooth and Connectivity
  • Web Services and Database

 Hands On, Workshops, and Group Activities

  • Labs
  • Workshops
  • Group Activities

 Sample Workshops and Labs for Mobile App Development Workshop

  • UI Design for Android Systems, Case Study
  • Hello World Example for Android with Java
  • Add Button to UI in Android Sample Code
  • Designing an Image Capturing Event for Android
  • Using XML for Slide Out Animation in Android
  • Xcode Hands on Training for iOS
  • Creating Button and Label for iOS App Development Case Study
  • Example on Creating Delegate for iOS
  • UI Design for iOS using Objective-C
  • Create the Project for Windows Phone App in C#
  • Creating the UI for Windows Phone
  • Hello Word Example for Windows Phones
May
16
Thu
Design Verification Plan & Report Training | DVP&R Training @ Tonex Atlanta
May 16 @ 9:00 am – May 17 @ 4:00 pm
Print Friendly, PDF & Email

Design Verification Plan & Report (DVP&R) training course covers the theories, concepts, and methods required for DVP&R. Design verification, in general, is a crucial part of any product development. It is a key step in qualification testing, ensuring that the final product is the same as the product was supposed to design and develop. Failing to complete this step can lead to produce and manufacture a product that doesn’t meet the characteristics of the designed product or the prototype.

As you might know, many clients take the testing and design verification of products very seriously, as though in the same importance as the actual design. Even so, many contracts require design verification as a major phase, in which the clients often send their own people to witness testing and to ensure they are conducted to their satisfaction. Therefore, if you are the manager of or a member of the quality, R&D, and design team, you need to know how to conduct design verification and how to prepare the report. The TONEX Design Verification Plan and Report training course will help you gain sufficient knowledge and develop necessary skills to be able to complete DVP&R for your products.

TONEX Design Verification Plan and Report training includes many in-class activities including hands on exercises, case studies and workshops. During the DVP&R workshops, attendees can bring in their own design work and products and through our coaching, develop their own Design Verification Plan and Report (DVP&R).

While testing might seem costly at first, the price of not having it done can be way higher plus it can negatively affect the reputation of the company in the client’s view if the final product doesn’t meet the promised characteristics.

Testing should be included in the design process at many points, from the very beginning when the concept is developed to the end when the final product is produced. Although type of the tests and the methods vary from one point to another, the general guidelines are applied to all. During the DVP&R training course, we will teach you these guidelines and also teach you how to tailor them based on where, where, and the type of product for which you are conducting the tests.

Historically, DVP&R processes have been practiced by the automotive industry. However, currently such processes are being used in almost all manufacturing industries including mechanical, electrical, chemical, and even pharmaceutical and that’s because a proper Design Verification/Product Validation (DV/PV) can significantly eliminate failure modes and increase the reliability of the product. In this seminar, we will walk you through all the steps of a good, effective DV/PV that is appropriate for your industry.

Audience

The TONEX Design Verification Plan and Report (DVP&R) training is a 2-day course designed for:

  • Engineers, scientists, and managers involved with manufacturing
  • Production and manufacturing team
  • Product design personnel
  • Reliability, testing, and quality team members
  • R&D personnel
  • Product and process assurance people
  • Assembly personnel

Training Objectives

Upon completion of this course, attendees are able to:

  • Understand and explain the importance of Design Verification Plan and Report
  • Discuss the theory of Design Verification Plan and Report
  • Design an appropriate DVP for the product they are testing
  • Design and conduct necessary and relevant testing at various points during the design process
  • Interpreted the results of the testing to find if and where the problem is and where the product deviates from standards
  • Prepare the Design verification Report
  • Test the prototype
  • Identify the best method to conduct the verifications
  • Developing measurement methods
  • Determine opportunities to combine all verification activities
  • Determine required equipment, software, facilities, etc. to conduct verifications
  • Determine a high-level verification schedule

Course Outline

Overview and Background

  • Definition of Design Verification
  • What is a Design Verification Plan and Report
  • Why is it crucial in the designing and manufacturing process?
  • How does it impact the quality of the product, cost of production, and customer satisfaction?
  • When DVP&R is needed?

Introduction to Design Verification

  • Tests development
  • Prototype testing
  • Proof testing
  • Acceptance testing

The Verification Process

  • Basics of verification
  • Design scenarios and verification action plan
  • Verification; a risk-based process
  • Different types of risks
  • How to incorporate risk to affect the verification practice
  • Model of risk-based verification design

Verification Methods

  • Demonstration
  • Inspection
  • Analysis
  • Similarity
  • Testing
  • How to select the most appropriate method

The Verification Activities

  • Identifying verification activities
  • Preparing for verification activities
    • Best approach identification
    • Measurement methods definition
    • Verification activities combination
    • High-level verification schedule identification
    • Developing a detailed Design Verification Plan
  • Conducting verification activities
    • Performing the Design Verification Plan
    • Logging the results
    • Highlighting the non-conformance

Implementing A DVP&R

  • Setting out the verification testing method
  • Outline your Verification Plan
    • Review all the requirements and protocols
    • Analyze the potential risks
    • Draft you Verification Plan
  • Refine your Verification Plan
    • Identify the verification demand
    • Review all the possible verification methods
    • Analyze all the advantages/disadvantages of each method
    • Select the best approach
    • Validate the selected method(s)
  • Perform protocols
    • Complete protocols
    • Implement protocols

Complementary Checklist

  • Verification methods development
    • Draft the methods
    • Check the methods
  • Documentation
    • Documenting all the plans and protocols
  • Implement and manage changes in the design based on the DVP&R

Design Verification Plan & Report Hands-on and In-Class Activities

  • 3 Labs
  • 2 Workshops
  • 1 Group Activity

Sample DVP&R Activity Workshop

  • How to develop a DVP&R Template (TONEX’s DVP&R Template)
  • How to develop proper methods
  • How many testings (testing points) would you need?
  • Analyzing the potential risks
  • How to read the raw data and analyze them?
  • How to use data to decide whether (or not) the prototype or sample has deviated from its specifications?
  • How to prepare the report
  • How to use the report to make adjustments?
May
20
Mon
Pipeline Leak Detection Training | Pipeline Leak Monitoring Training @ TONEX Plano, TX
May 20 @ 9:00 am – May 23 @ 4:00 pm
Print Friendly, PDF & Email

Pipeline Leak Detection Training Course Description

Pipeline Leak Detection Course is a 4-day training boot camp covers all aspects of pipeline leak detection system. Pipeline leak detection systems can help minimize the liability of pipeline operating companies. The early identification and accurate location of a pipeline incident are essential for protecting a company’s reputation.

Leak detection is a good tool for quickly raising alarms for theft, identifying product loss due to wear and corrosion to the pipe, and/or preventing environmental events caused by spills. Whether driven by safety and production concerns or regulatory requirements, the method chosen for leak detection has a significant impact on its effectiveness.

Although moving crude oil, gas, liquid and hazardous materials in pipelines is the safest means of transport, a number of incidents have been associated with this method. Statistics from the Office of Pipeline Safety within the U.S. Department of Transportation, Pipeline and Hazardous Materials Safety Administration show that over the twenty year period from 1991 to 2010 there were 5,636 significant incidents involving 378 fatalities, US$ 440,652,471 property damage and 2,566,699 gross barrels spilled in the USA alone.
Pipeline incidents incur liabilities to pipeline operators, pipeline shareholders and owner of the volume lost. Such liabilities can range from cleaning up cost and damage compensation to criminal offences.

Major liabilities are usually associated with major leak events without a reliable pipeline leak detection system. Therefore investing in a proven and reliable leak detection system can help pipeline companies minimize the consequences of a pipeline incident.

To maintain the above performance standard, it is necessary for the pipeline operating companies and leak detection system to insure that:

  • The field instruments are working correctly.
  • The SCADA and telecommunication system are available.
  • The leak detection system is optimized to current operating and instrument conditions.
  • Alarms and anomalies are addressed timely.
  • Operators have confidence in the leak detection system at all times.

After completing this course, students will be able to:

  • Explain the basic architecture and components of a Pipeline and Pipeline Leak Detection System
  • (LDS)
  • Describe the component technologies behind an LDS system
  • Describe the component technologies behind a SCADA system
  • Apply potential benefits of LDS and SCADA applied to Aramco
  • Understand the base standards that apply to LDS
  • Understand the terms used in describing the technology
  • Discuss the technical aspects of LDS, SCADA and communications methods
  • Review LDS and SCADA System Design Considerations
  • Review integration of LDS with SCADA
  • Explain LDS and SCADA performance and Optimization considerations
  • Explore project planning process of LDS
  • Discuss successful and unsuccessful LDS deployments
  • Step through a practical process for managing LDS Systems
  • Explore the current and future LDS market trends

Topics Discussed

  • Pipeline Leak Detection techniques
  • Leak detection system optimizations to current operating and instrument conditions
  • Pipeline leak detection techniques by a SCADA system that controls and monitors the pipeline
  • Integrating leak detection into existing SCADA systems to provide alarm management of a leak
  • event as well as record keeping and trending before and after the event
  • Techniques to locating the leak with a precise location for quicker response and repairs

Pre-Requisites

Pipeline Leak Detection Training | Pipeline Leak Monitoring Training

Outline

Basic Fundamental and Concepts of Leak Detection

  • General Types of Energy Pipelines
  • Crude oil
  • Multi-products with varying batch sizes
  • Natural gas including wet gas
  • Carbon Monoxide (CO)
  • Hydrogen (H2), Ethylene, Chlorine, Propylene, LPG, and Water
  • Pipeline Components
  • Structural Design of Pipeline
  • Planning and Construction of Pipeline
  • Instrumentation and Pigging
  • Maintenance, Reliability and Failure Analysis
  • Pipe defects
  • Corrosion on Pipeline
  • Pipeline Rehabilitation and Repair Techniques
  • Flaws in Pipeline Leak Detection Systems
  • Leak Detection Systems (LDS)
  • Leak Detection and SCADA Systems
  • Integration of a LDS with SCADA
  • Multiphase pipeline leak detection
  • Pipeline Risk Assessment
  • Pipeline Maintenance and Repair
  • Classification of Leak Detection Technologies
  • Evaluation of Leak Detection Systems
  • Standards for Leak Detection Systems

Overview of Leak Detection Systems (LDS)

  • LDS technologies / methods
  • LDS technologies / methods
  • LDS components
  • Hydraulics theories pertaining to LDS
  • Communication infrastructure
  • Operations & maintenance
  • Troubleshooting and Diagnostics
  • Pipeline Leak Detection Best Practices
  • Statistical Pipeline Leak Detection
  • Rarefaction Wave Leak Detection
  • Multiphase Pipeline Leak Detection
  • Internally based LDS
  • Pressure/Flow monitoring
  • Acoustic Pressure Waves
  • Balancing methods
  • Statistical methods
  • RTTM methods
  • E-RTTM methods
  • Bubble Emission Method

Types of LDS

  • Externally based LDS
  • Infrared radiometric pipeline testing
  • Acoustic emission detectors
  • Vapour-sensing tubes
  • Fibre-optic leak detection
  • Visual Inspection Procedures
  • Visual Leak Detection Capability
  • Manual Over/Short Calculation
  • Pressure Monitoring
  • Discrete Sensor based Technologies
  • Liquid Sensing
  • Vapor Sensing
  • Acoustic Emissions
  • Factors that can affect External Methods

LDS Technique Selection

  • Pipeline Service Types
  • Types by Transport Function
  • Pipe Leakage Evaluation
  • Components and Definitions
  • LDS Technique Selection
  • LDS Selection Methodology
  • Methods Used
  • Burst & leak history
  • Pipeline Audits
  • DMA/Flow
  • Measurement (flow into less flow out of network)
  • Hydrostatic testing (pressure testing)
  • Pipeline Asset Management
  • Infrastructure Leakage Index (ILI)
  • Pressure Control
  • District Meter Areas (DMA’s)
  • Leak Noise Surveys
  • Leak Correlation Survey’s
  • Noise Logger Survey’s
  • Acoustic emission
  • Acoustic with Correlation
  • Ultrasonic
  • Ultrasonic flow measurement
  • Transit time and Doppler
  • Clamp-on ultrasonic flowmeters
  • Transducers
  • Measuring fluid flow velocity
  • Nonintrusive clamp-on transducers
  • Distance Measurement
  • Advanced Correlation
  • Infrared Thermography
  • Chemical
  • Mechanical
  • Ground Penetrating Radar
  • Volume or mass balance
  • Rate of change in flow or pressure
  • Hydraulic modelling
  • Pressure point analysis
  • Limitations of Leak Detection Methods
  • Method
  • Application
  • Limitations

Leak Classification and Action Criteria

  • Multiphase flow
  • Hydrates
  • Monitoring Techniques
  • Computational Methods
  • Over/Short Comparison
  • Volume Balance with Line Pack Correction
  • Pattern of Discrepancy Between Modeled and Measured Pressure and/or Flow
  • Rate of Pressure/Flow Change
  • Statistical Methods
  • System Identification with Digital Signal Analysis
  • Rupture Detection
  • Comparison of Computational Methods
  • Field Instrumentation Requirements
Jun
3
Mon
Bluetooth Training Bootcamp | Hands-on Bluetooth Classic and Bluetooth LE @ Tonex Plano Office
Jun 3 @ 9:00 am – Jun 5 @ 4:00 pm
Print Friendly, PDF & Email

Bluetooth Training Bootcamp, Hands-on Bluetooth Classic and Bluetooth LE (BLE) Training

Bluetooth Training Bootcamp, is a 3-days Hands-on Bluetooth Classic and Bluetooth LE (ble) Training Bootcamp with workshops, and exercises. This is a  practical Classic Bluetooth and BLE Training with hands-on activities.

Learn about Bluetooth Classic and Bluetooth Low Energy (BLE) wireless technology standards. Both Classic Bluetooth and BLE operate in the 2400-2483.5 MHz range within the ISM 2.4 GHz frequency band. In Classic Bluetooth, data is split into packets and exchanged through Bluetooth channels (79 designated channels, 1 MHz in bandwidth).

Bluetooth Classic is a good fit for consumer products vs. BLE with lower power consumption for Machine to Machine (M2M) and Internet of Things (IoT).

BLE also operates in the 2.4 GHz ISM band and unlike classic Bluetooth it remains in sleep mode most of the time (low duty cycle).

Learning Objectives

Upon completion of this course, the participants will be able to:

  • List the requirements and capabilities of Classic Bluetooth
  • List the requirements of Bluetooth Low Energy (BLE) including Bluetooth 4.2 (BLE) and Bluetooth 5
  • Compare Classic Bluetooth vs. Bluetooth Low Energy (BLE)
  • Explain the simplified architecture of both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Describe enhanced features in LTE Bluetooth Low Energy (BLE)
  • Describe Profile and Services in Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Describe implementation models for both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Describe the concept of GAP/GATT in Bluetooth Low Energy (BLE)
  • Explain the security features in both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Sniff L2 and L3 packets in both Classic Bluetooth and Bluetooth Low Energy (BLE) using sniffers and devices
  • Analyze L2/L3 packets in both Classic Bluetooth and Bluetooth Low Energy (BLE)
  • Analyze and compare Physical Layer of Classic Bluetooth and Bluetooth Low Energy (BLE) using spectrum analyzers

Topics Include Details of Classic Bluetooth and BLE Profiles and Protocols

  • Profiles and Services
  • Classic Bluetooth Physical Layer Classic Bluetooth Controller stack
    • Classic Bluetooth Link layer
    • Asynchronous Connection-Less (ACL)
    • Synchronous Connection-Oriented (SCO)
    • Active Slave Broadcast (ASB)
    • Parked Slave Broadcast (PSB)
    • Link control protocol (LC)
    • Link manager protocol (LMP)
    • Low-energy link layer (LELL)
    • Host controller interface (HCI
  • Classic Bluetooth Host stack
    • Logical link control and adaptation protocol (LCAP)
    • Bluetooth network encapsulation protocol (BNEP)
    • Radio frequency communication (RFCOMM)
    • Service discovery protocol (SDP)
    • Telephony Control Protocol Specification (TCS)
    • Audio/video control transport protocol (AVCTP)
    • Audio/video distribution transport protocol (AVDTP)
    • Object exchange (OBEX)
    • Low Energy Attribute Protocol (ATT)
  • BLE Profiles and Services
  • Bluetooth Low Energy (BLE) Controller and Host stack
  • Generic Access Profile (GAP)
  • Generic Attribute Profile (GATT)
  • LE Privacy
  • BLE HCI Commands
  • Privacy and White List
  • Logical Link Control and Adaptation Layer Protocol (LCAP)
  • Host Controller Interface (HCI)
  • BLE Link Layer
  • BLE Physical Layer

 

Bluetooth Classic and BLE Combo Training Bootcamp Agenda

Introduction to Bluetooth Classic

  • What is Bluetooth technology?
  • Bluetooth Standards
  • IEEE Related Standards
  • The Bluetooth Special Interest Group (SIG)
  • Conformance and Compatibility Testing
  • Applications for Bluetooth
  • Classic Bluetooth
  • Bluetooth Services
  • Basic Bluetooth Operation
  • Configuring Bluetooth Devices
  • Device Discovery and Service Discovery
  • Data Throughput and Range
  • Spectrum
  • Frequency Hopping Spread Spectrum
  • Interference
  • Class of Radio
  • Power and Range

Classic Bluetooth Protocols       

  • PHY characteristics
  • Adaptive Frequency Hopping (AFH)
  • Link management protocol (LMP)
  • Packet structure, signaling, discover and connection procedures
  • Logical link control and adaptation protocol (L2CAP)
  • Host/controller interface (HCI)
  • Bluetooth network encapsulation protocol (BNEP)
  • Radio frequency communication (RFCOMM)
  • Service discovery protocol (SDP)
  • Audio/video control transport protocol (AVCTP)
  • Audio/video data transport protocol (AVDTP)
  • Asynchronous Connection-oriented (ACL)
  • Synchronous connection-oriented (SCO)

Classic Bluetooth Operation

  • Bluetooth Operations
  • Classic Bluetooth packet structure and connection procedures
  • Device Discoverability
  • Device Connectability
  • Bluetooth Classic Architecture
  • Masters and Slaves
  • Piconets and Scatternets
  • Device Addressing
  • Pairing and Bonding
  • Inquiry and Paging
  • Security
  • Link Keys
  • Authentication
  • L2 Packet Exchange
  • Bluetooth Packets
  • Packet structure, signaling, discover and connection procedures
  • Advertising Packets, and Scan Response Data
  • Data exchange

Working with Classic Bluetooth Profiles

  • Advanced Audio Distribution Profile (A2DP)
  • Hands-Free Profile (HFP)
  • Human Interface Device Profile (HID)
  • Synchronous Connection-Oriented (SCO)
  • Headset Profile (HSP)
  • Audio/Video Remote Control Profile (AVRCP)

Introduction to Bluetooth Low Energy (BLE)

  • BLE Background theory
  • BLE vs. Bluetooth Classic
  • BLE features
  • BLE Profiles and Services
  • The lowest power consumption
  • Robustness, security, and reliability
  • Wireless co-existence
  • Connection range and data rates
  • Ease of use and integration

Overview of BLE Protocols

  • Generic Access Profile (GAP)
  • Generic Attribute Profile (GATT)
  • Attribute Protocol (ATT)
  • Security Manager (SM)
  • Security and AES Encryption (NIST and NSA versions)
  • Logical Link Control and Adaptation Protocol (L2CAP)
  • Enhancements to L2CAP for Low Energy
  • Host Controller Interface (HCI), Host side
  • Host Controller Interface (HCI), Controller side
  • Enhancements to HCI Protocol
  • Direct Test Mode (DTM)
  • BLE Link Layer
  • BLE PHY Characteristics

BLE Operation

  • Bluetooth Configuration
  • Core Configurations
  • Basic operations (GAP)
  • Device roles
  • Connections in BLE
  • Event flow and handling
  • Scanning
  • Connecting
  • Service Discovery
  • Device discovery
  • Connection management
  • Pairing
  • Bonding
  • Sending and receiving data
  • Low power idle mode operation
  • Device discovery
  • Reliable point-to-multipoint data transfer
  • Advanced power-save
  • Advanced encryption functionalities
  • Single mode and dual mode
  • BLE Device Roles
  • Central and peripheral roles
  • Server and client roles
  • Advertising and Scan Response Data
  • Establishing a connection
  • Connected Network Topology
  • GATT Transactions
  • Services and Characteristics
  • Profiles vs. Services
  • Characteristics

Introduction to Bluetooth 5

  • Bluetooth Core 5.0
  • Bluetooth 5.0 Architecture
  • Changes from v4.2 to v5.0
  • Bluetooth 5.0 Features Added
  • Integrated in v5.0
  • Deprecated Features
  • Slot Availability Mask (SAM)
  • 2 Msym/s PHY for LE
  • LE Long Range
  • High Duty Cycle Non-Connectable Advertising
  • LE Advertising Extensions

Practical Activities

  • Quizzes and homework
  • Hands-on labs and demos
  • Hands-on Activities: Working with Classic and BLE Profiles
  • Hands-on Activities: Introduction, Setup, Pairing and Bonding Bluetooth Devices (classic and BLE)
  • Hands-on Activities: Sniffing Bluetooth L2 packets
  • Hands-on Activities: Sniffing BLE Bluetooth
  • Hands-on Activities: Analyzing Bluetooth and BLE L1 (Physical Layer)
  • Hands-on Activities: Capturing Bluetooth and BLE L2/L3 Packets
  • Hands-on Activities: Working with Profiles
  • Hands-on Activities: Create your own Profile
Jun
6
Thu
Requirements Writing Training Course – Specification Writing Training @ Tonex Dallas
Jun 6 @ 9:00 am – Jun 7 @ 4:00 pm
Print Friendly, PDF & Email

Requirements Writing Training Course, and Specifications Writing Training course addresses the techniques used to write, validate and verify requirements and convert them to technical design specifications. It gives attendees the basic tools necessary to write effective system design specifications. Requirements are the foundation for building systems and software. They determine WHAT the system must do and drive the system development. Requirements are used to determine [verify] if the project team built the system correctly. The requirements development process identifies the activities needed to produce a set of complete and verifiable requirements.

Participants will learn how to:

  • Write well-formed, validated requirements and specifications
  • Analyze, Verify and Validate requirements into a user requirements document
  • Create Project Plan/SEMP with  various plans, such as the review plans, configuration management plans, and risk plans. [Control the requirements development].
  • Establish Configuration management [CM] the process to control changes to the requirements and manage the baseline documentation.
  • Plan the Risk management to monitor, control, and mitigate high risk requirements.
  • Manage Technical reviews to identify defects, conflicts, missing, or unnecessary requirements.
  • Manage Stakeholder involvement which is  essential for validating the requirements. Are these the correct requirements?
  • Establish Elicitation techniques to enable the discovery and understanding of the needed requirements.
  • Manage Traceability of requirements to user needs & requirements, support documentation, and constraining policies [e.g., safety requirements].

Requirements Writing Training Requirements define the functions, performance, and environment of the system under development to a level that can be built: Does the system do WHAT it is supposed to do? – These are Functional requirements. How well does the system do its functions? – These are Performance requirements. TONEX Requirements Writing Training provides the foundation to produce requirements for the system and sub-systems with set of activities . The systems engineering standard [EIA 632] defines “requirement” as “something that governs what, how well, and under what conditions a product will achieve a given purpose.” This course gives PEs 13 PDH (Professional Development Hours) approved by PIE.

 

Learning Objectives:

Upon successful completion of the course, attendees will:

  • Describe the way the system is intended to operate from the user’s perspective
  • Describe Concept of Operations (ConOps) process where user needs, expectations, goals, and objectives are described
  • Understand how feasibility Study can produce the conceptual high-level design and requirements which can be used as a starting point for the project.
  • Demonstrate the ability to capture and validate requirements throughout the requirements analysis process.
  • Learn how to conduct technical reviews, manage stakeholder involvement, and elicit requirements
  • Understand traceability of requirements to user needs
  • Understand the relationships among all stages of the system life cycle.
  • Describe different levels of requirements
  • Learn how to develop requirements, write and document requirements, check completeness of requirements, analyze, refine, and decompose requirements, validate requirements and manage requirements
  • Describe communications techniques to elicit requirements
  • Classify requirements as functional or design
  • Demonstrate the ability to write functionally oriented and design oriented specifications
  • Understand how to convert requirements into valid design specifications
  • Learn how to separate System and Sub-system Requirements
  • Learn how to create a Verification Plan to verify each system requirement
  • Effectively produce design specification
  • Effectively perform Verification (Functional, Non-Functional, and Interface reqs.) and Validation (ConOps)

Course Topics

BASICS OF SYSTEMS ENGINEERING

  • Definition of Common Terms
  • System Definition and Design
  • Design Methodologies
  • Master Plan Scope
  • Concept of Operations (ConOps)
  • Preliminary Engineering
  • Final Engineering
  • RFP vs. Consultant Design vs. Design-Build

REQUIREMENTS ANALYSIS

  • Introduction to Requirements
  • The Quality of Requirements
  • Description of Requirements Writing (within the larger context of system development)
  • Overview of Requirements Development

Communication Techniques for Eliciting Requirements

  • Stakeholder involvement
  • Defining valid and meaningful needs
  • Technical reviews
  • Stakeholder feedback on the needs being collected
  • Prioritization of the needs
  • ConOps to System Requirements (generic)

REQUIREMENTS SOURCES

  • Purpose of Requirements
  • Levels of Requirements
  • Understanding the different levels of requirements
  • Performance requirements
  • Conditions [e.g. environmental, reliability, and availability]
  • Environmental and Non-Functional requirements
  • System
  • Sub system
  • Component / task

Types of Requirements

  • Eight basic types
  • Differences between requirements for hardware, software, services
  • Functional
  • Non functional
  • Performance, etc.
  • Non-Requirements

STRUCTURE OF A WELL FORMED REQUIREMENT

  • Definition
  • Capabilities
  • Conditions
  • Constraints
  • Operational Policies & Constraints
  • Technical and Policy Constraints
  • Properties
  • Interface
  • Human
  • Hardware
  • Software
  • Communications
  • Functional analysis – needs analysis, operational analysis, use cases
  • Design requirements analysis
  • States & Modes analysis
  • Workshop – States and modes analysis
  • Requirements parsing
  • Writing requirements vs. defining a system proposed is critical

SPECIFICATIONS VS. REQUIREMENTS

  • Development of requirements
  • Description of the current environment
  • Stakeholders
  • Feedback to Stakeholders
  • Facilitation skills and techniques
  • Transforming Requirements into Requirements Specifications
  • How requirements specifications relate to requirements
  • Requirements Flowdown in Specifications
  • Specification Types and Formats
  • Types of requirements specification
  • Specification Writing
  • Review of requirements quality
  • Requirement structural template

SYSTEM TESTS (Verification and Validation)

  • Test Plans
  • Test Procedures
  • User Acceptance Testing
  • Requirements Verification Matrix
  • Traceability to user requirements (Validation against ConOps)
  • Traceability to system requirements (Verification against System Specs.)
  • Verification (Functional, Non-Functional, and Interface reqs.)
  • Validation (ConOps)
  • System Integration
  • Standards and Policies

WORKSHOPS/EXERCISE

  • Workshop 1
  • Examples of good and poor requirements (group project)
  • Requirements constructs
  • Group presentations and discussions
  • Workshop 2- classifying requirements as functional or design
  • Workshop 3 – writing a functionally oriented specification vs. a design oriented specification
  • Analysis of Conops document
  • Analysis of Test plans/procedures

Who Should Attend

SMEs, project stakeholders, users, Project and program managers, directors, project sponsors and anyone else involved in planning and writing specifications requirements for projects.

Jun
10
Mon
NERC CIP Training Bootcamp | Crash Course @ TONEX Atlanta, GA
Jun 10 @ 9:00 am – Jun 14 @ 4:00 pm
Print Friendly, PDF & Email

NERC CIP Training Bootcamp, a 5-Day Hands-on Cybersecurity Certificate

NERC CIP Training Bootcamp,   North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) training bootcamp is a crash course style training program designed and crated to meet the needs of the electric in regards to CIP compliance: Cyber Security for NERC CIP Versions 5 & 6 Compliance.

Security specialists, CIP Senior Manager, analysts, designer engineers, system operators, directors of CIP compliance, VPs of operations.

NERC Critical Infrastructure Protection (CIP) training bootcamp is a 5-day crash course empowers attendees with knowledge and skills covering version 5/6 standards. NERC Critical Infrastructure Protection training bootcamp addresses the role of FERC, NERC and the Regional Entities.

Learn approaches for identifying and categorizing BES Cyber Systems and requirements tio implement and comply the standards including strategies for the version 5/6 requirements.

TONEX is the industry leader in Cyber Security and NERC CIP. Our courses are planned, designed and developed by NERC CIP experts in CIP implementation and audits.

Learn how NERC Critical Infrastructure Protection (CIP) requirements address physical security and cybersecurity of the critical electricity infrastructure of North America including:

  • References to NERC CIP associated documents
  • References to Implementation Plan for Cyber Security Standards
  • References to Mandatory Reliability Standards for CIP
  • Guidance for Enforcement of CIP Standards
  • References to NERC CIP Rules
  • Best practices for managing NERC Compliance
  • Protecting: physical security, cybersecurity, emergency preparedness and response
  • Business continuity planning, and recovery from a catastrophic event with emphasis on deterring, preventing, limiting, and recovering from terrorist attacks
  • Sabotage Reporting
  • Critical Cyber Asset Identification
  • Security Management Controls
  • Personnel & Training
  • Electronic Security Perimeter(s)
  • Physical Security of Critical Cyber Assets
  • Systems Security Management
  • Incident Reporting and Response Planning
  • Recovery Plans for Critical Cyber Assets
  • Deterring to dissuade an entity from attempting an attack
  • Preventing  to cause an attempted attack to fail
  • Limiting  to constrain consequences of an attack in time and scope
  • Recovering – to return to normalcy quickly and without unacceptable consequences in the interim
  • Operating, Planning, and Critical Infrastructure Protection Committee
  • Security Guidelines
  • Control Systems Security
  • Cyber Security Analysis
  • Operating Security
  • Business Continuity Guideline
  • Physical Security
  • Protecting Sensitive Information
  • Security Policy
  • Bulk Electric System Security Metrics
  • Personnel Security Clearances
  • Compliance Enforcement and Input

Learn about:

NERC CIP Training

Who Should Attend:
  • CIP Compliance
  • IT  cybersecurity
  • ICS and SCAD cybersecurity
  • EMS cybersecurity
  • Field and security operations
  • Incident response
  • Project managers
  • CIP Auditors
  • Any other staff from electrical utilities who are  maintaining cyber security standards across their enterprise and substations
  • Generation, transmission and distribution staff working to meet NERC CIP standards
Program Learning Objectives:
  • Discuss requirements for reliable operation of the Bulk Electric System
  • List CIP categories of assets to which CIP requirements apply
  • Describe asset classification criteria and tiers: High/Medium/Low
  • List similarities and differences between CIP standards in version 5 and 6
  • Describe NERC filings and FERC rulings on these standards
  • Deep Dive into the CIP 5/6 requirements and obligations/expectations
  • Discuss sabotage reporting process
  • Describe identification and documentation requirements of the Critical Cyber Assets associated with the Critical Assets
  • Describe roles and responsibilities for minimum security management controls to protect Critical Cyber Assets
  • Discuss requirements for identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets
  • Describe implementation of physical security programs for the protection of Critical Cyber Assets
  • Define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets
  • Ensure the identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets
  • Ensure that recovery plans are put in place for Critical Cyber Assets and that these plans with established business continuity and disaster recovery techniques and practices
Program Coverage and Highlights of Enforcement:
  • NERC CIP requirements
  • HIghlights of NERC CIP 5 & 6
  • Overview of Cyber Security for NERC CIP Versions 5 & 6 Compliance
  • Asset Identification and Governance
  • Access Control and Monitoring
  • System Management
  • Information Protection and Response
  • CIP Process highlights
  • BES Cyber System Categorization
  • High and medium impact BES vs. low impact BES
  • Operational Technology (OT) security
  • Highlights of known ICS vulnerabilities
  • Configuration Change Management & Vulnerability Assessments
  • Cyber Security for NERC CIP Compliance
  • Electronic Security Perimeter(s)
  • Information Protection
  • Incident Reporting and Response Planning
  • Personnel & Training
  • Physical Security
  • Physical Security of BES Cyber Systems
  • Recovery Plans for BES Cyber Systems
  • Sabotage Reporting
  • Security Management Controls
  • System Security Management
  • Best Practice specifications
  • Reference Architecture
  • Gap and Cyber Vulnerability Assessments
  • Firewall/Network intrusion detection
  • Access Management
  • Centralized Patch Management
  • Security Information & Event Management
  • Automated Back-up & Recovery
  • Network Segmentation
  • Intrusion Prevention System (IPS)
  • Protocol Inspection
  • Security Factory Acceptance Testing (FAT)
  • Multi vendor testing
  • Cyber Asset Protection
  • System Design, Reliability and Configuration
  • Baseline Documentation
  • Change Control Services
  • Ports & services, applications & protocols
  • Equipment changes
  • Decommission plan
RF Safety Training @ Nashville, TN
Jun 10 @ 9:00 am – Jun 11 @ 4:00 pm
Print Friendly, PDF & Email

Why choose TONEX for your RF Safety Training?

RF Safety Training covers RF theory of operations, regulations and RF standards, types of radiation and field effect, Maximum Permissible Exposure (MPE) at RF sites, RF safety signs, hazard assessment, Lock out – Tag out procedures and Personal Protective equipment.

RF Safety training is for anyone who may encounter RF fields or RF exposure, and is required training for employees and sub-contractors in the telecommunications industry.

RF Safety Training

RF safety training highlights: Radiofrequency (RF) and microwave (MW) radiation are electromagnetic radiation in the frequency ranges 3 kilohertz (kHz) – 300 Megahertz (MHz), and 300 MHz – 300 gigahertz (GHz), respectively. Research continues on possible biological effects of exposure to RF/MW radiation from radios, cellular phones, the processing and cooking of foods, heat sealers, vinyl welders, high frequency welders, induction heaters, flow solder machines, communications transmitters, radar transmitters, ion implant equipment, microwave drying equipment, sputtering equipment and glue curing.

WHAT ARE “RADIOFREQUENCY” AND MICROWAVE RADIATION?

Electromagnetic radiation consists of waves of electric and magnetic energy moving together (i.e., radiating) through space at the speed of light.  Taken together, all forms of electromagnetic energy are referred to as the electromagnetic “spectrum.”  Radio waves and microwaves emitted by transmitting antennas are one form of electromagnetic energy.  They are collectively referred to as “radiofrequency” or “RF” energy or radiation.  Note that the term “radiation” does not mean “radioactive.”  Often, the terms “electromagnetic field” or “radiofrequency field” may be used to indicate the presence of electromagnetic or RF energy.

The RF waves emanating from an antenna are generated by the movement of electrical charges in the antenna.  Electromagnetic waves can be characterized by a wavelength and a frequency.  The wavelength is the distance covered by one complete cycle of the electromagnetic wave, while the frequency is the number of electromagnetic waves passing a given point in one second.  The frequency of an RF signal is usually expressed in terms of a unit called the “hertz” (abbreviated “Hz”).  One Hz equals one cycle per second.  One megahertz (“MHz”) equals one million cycles per second.

Different forms of electromagnetic energy are categorized by their wavelengths and frequencies.  The RF part of the electromagnetic spectrum is generally defined as that part of the spectrum where electromagnetic waves have frequencies in the range of about 3 kilohertz (3 kHz) to 300 gigahertz (300 GHz).  Microwaves are a specific category of radio waves that can be loosely defined as radiofrequency energy at frequencies ranging from about 1 GHz upward.

WHAT IS NON-IONIZING RADIATION?

“Ionization” is a process by which electrons are stripped from atoms and molecules.  This process can produce molecular changes that can lead to damage in biological tissue, including effects on DNA, the genetic material of living organisms.  This process requires interaction with high levels of electromagnetic energy.  Those types of electromagnetic radiation with enough energy to ionize biological material include X-radiation and gamma radiation.  Therefore, X-rays and gamma rays are examples of ionizing radiation.

The energy levels associated with RF and microwave radiation, on the other hand, are not great enough to cause the ionization of atoms and molecules, and RF energy is, therefore, is a type of non-ionizing radiation.  Other types of non-ionizing radiation include visible and infrared light.  Often the term “radiation” is used, colloquially, to imply that ionizing radiation (radioactivity), such as that associated with nuclear power plants, is present.  Ionizing radiation should not be confused with the lower-energy, non-ionizing radiation with respect to possible biological effects, since the mechanisms of action are quite different.

Attendees attending this class will receive a completion certificate and card complying with OSHA reporting requirements in 29 CFR1910.268.

Some Interesting FCC Links on RF Safety

Anyone who may be at risk to RF exposure RF Site operators and managers Managers and supervisors Building and land owners, managers, engineers and technicians of telecommunication sites

 

Upon completion of the RF safety training course, the attendees will learn about:

  • RF Theory of Operation
  • RF Site Safety and the Law
  • Type of RF Radiation
  • Introduction to Antennas and RF sources
  • Analyzing Maximum Permissible Exposure – MPE
  • How to begin Hazard assessment
  • Available Personal Protective Equipment – PPE
  • RF Safety Models

RF Theory of RF Operations

  • Radiofrequency Energy
  • Radiofrequency and Microwave
  • Radiation Standards
  • Health Effects
  • Hazard Locations and Solutions
  • Evaluating RF and Microwave Exposure
  • RF and Microwave Safety Programs
  • Electromagnetic Fields
  • RF fields and their application
  • Cell Phones
  • Wireless Devices and Health Concerns
  • Towers
  • Cellular and PCS sites
  • Human Exposure from Vehicle Mounted Antennas
  • Cellular Telephone Specific Absorption Rate (SAR)
  • RF Biological Hazard Issues
  • Public Exposure (“Uncontrolled”)
  • Occupational Exposure (“Controlled”)
  • Tonex 10 RF Safety Rules
  • RF Exposure Surveys Perform on-site survey characterize area with multiple RF sources
  • Measurement equipment and probes Microwave to 28 or 38 GHz
  • Low Band Land Mobile to 30 MHz
  • AM Broadcast around 1.0 MHz
  • Exposure as Percentage of MPE Exposure as Percentage of MPE
  • How to read Site-Specific RF Compliance Guidelines
  • Tips on Using Personal Safety Monitors
  • Tips on using RF Protective Suits

RF Safety Regulations and Standards

  • Notice of Proposed Rulemaking dated June 6, 2003, proposing amendments to FCC rules governing Exposure to Radiofrequency Electromagnetic Fields, 47 CFR parts 1, 2, and 95.
  • FCC’s Office of Engineering Technology (OET) Bulletin 65, Evaluating Compliance with FCC Guidelines for Human Exposure to Radiofrequency Electromagnetic Fields.
  • FCC’s Docket File ET93-62, information on FCC Rules
  • FCC RF Exposure Regulations First Memorandum Opinion
  • FCC RF Exposure Regulations Second Memorandum Order and Opinion 97-303
  • NEPA, FCC and OSHA RF Compliance
  • The 1997 FCC Regulation, IEEE C95.1-2005/ANSI C95.1-1992
  • Standard
  • FCC RF/NEPA Rules
  • FCC RF Environmental Rules
  • OSHA RF Compliance
  • FCC RF Exposure Regulations overview
  • FCC Frequently Asked RF Exposure
  • Observe RF Exposure Guidelines The Electromagnetic Spectrum Non-Ionizing and Ionizing Radiation
  • Cumulative and Non-Cumulative Radiation
  • Effects FCC Rules and FCC OET Bulletin 65 FCC Rules and FCC OET Bulletin 65
  • Commission for Non-Ionizing Radiation Protection (ICNIRP)
  • Non-Ionizing Radiation Survey
  • PCS, cellular, SMR, paging, Part 15, WiFi, in-building
  • RF Compliance Documentation
  • Electromagnetic shielding
  • EME site audits, evaluations and reports
  • Site specific safety guidelines
  • Software modeling and analysis
  • Field survey and RF measurement
  • Safety policy evaluation and development
  • Complete exposure mitigation
  • RF Radiation (RFR) Safety
  • Non-Ionizing Radiation

RF Field Measurements for Antenna

  • Instrument Overview
  • Detector Designs
  • Effects and Definitions
  • Standards Overview
  • Antenna Designs and Calculations
  • Performing Surveys
  • Documenting a Survey
  • Units of Measure
  • Shaped Frequency Response Probes versus
  • Traditional Flat Frequency Response Probes
  • Measurement Uncertainty and
  • Correction Factors
  • Analog versus Digital Meters
  • Connecting and Zeroing the Probe
  • Checking Probe Functionality
  • Beginning to Make Measurements
  • Identifying High Level Areas First
  • Spatial Averaging Techniques
  • Using the Maximum Hold Feature
  • Impact of the Human Body on
  • Field Measurements
Jun
17
Mon
SysML Training | Systems Modeling Language Training @ Atlanta, GA
Jun 17 @ 9:00 am – Jun 19 @ 4:00 pm
Print Friendly, PDF & Email

Price: $2,199.00
Course Number: 11501
Length: 3 Days
College Credits: 24

SysML Training, SysML Course Description

SysML Training, SysML Course  by TONEX, – Systems Modeling Language Training Course,  is an extension to Systems Engineering Training providing a comprehensive and practical resource for modeling systems with SysML.

SysML Training

The Systems Modeling Language (SysML) is a visual modeling language useful for Systems Engineering applications supporting the specification, analysis, design, verification and validation of a broad range of systems and systems-of-systems (SoS).

These systems may include hardware, software, information, processes, personnel, and facilities. SysML is a dialect of UML 2, and is defined as a UML 2 Profile (Profile = UML customization that uses Stereotypes, Tagged Values, and Constraints.)
SysML is an enabling technology for Model-Based Systems Engineering (MBSE)

SysML for Systems Engineering includes Systems modelling, System Analysis and System Design as essential enabling techniques for systems engineering processes Systems Modeling Language (SysML) a subset of UML for Systems Engineering).

SysML Training Course provides technical details of SysM Las a systems engineering modeling language. The syntax of SysML is covered and each concept is explained through a number of hands-on practical application workshops and a complete SysML v1.3 Reference Guide.

Learn about:

  • UML and SysML
  • Model-based systems engineering (MBSE) approach
  • SysML diagrams and language
  • Look at SysML from the systems engineering process viewpoint
  • Develop a system conceptual model and architecture using SysML.
  • System architecture, modeling and design with SysML

The SysML training course covers the following:

  • Provides  a comprehensive overview of the SysML concepts, terminology and modeling notation
  • Shows attendees how to create analysis and design models with SysML
  • Covers the complete system-modeling lifecycle from requirements to Validation of the system
  • Presents many practical case studies
  • 50% lectures and 50 % practical (hands on exercises).

Learning Objectives

Upon completion of this course, the attendees will be able to:

  • Describe UML
  • Describe SysML
  • Describe model-based systems engineering approach
  • List SysML diagrams and language concepts
  • Apply SysML as part of a model based SE process
  • Explore transitioning to SysML
  • Synthesize and analyze existing architecting approaches to enhancing creativity while reducing ambiguity and complexity.
  • Utilize out-of-the-box holistic system thinking
  • Develop a system conceptual model and architecture using SysML.
  • Define system architecture, modeling, form, function, structure and behavior with SysML
  • Describe how a system’s function emerges from its form and behavior
  • Describe the notions of system, product, service, and project with SysML
  • Model a combined Project-Product Lifecycle Management system and study the benefits of the project-product synergies with SysML
  • Work with real life projects using SysML

Course Agenda

Overview of Systems Engineering (SE)

  • Systems Engineering Overview
  • Model-Based Systems Engineering
  • SysML Language Overview
  • SE Practices for Describing Systems
  • Specifications
  • Interface requirements
  • System design
  • Analysis & Trade-off
  • Test plans
  • Stakeholders Involved in System Acquisition

What is Model-based systems engineering (MBSE) ?

  • What is a model?
  • principles behind MBSE
  • Formalized application of modeling to support system requirements, design, analysis, verification and validation activities
  • SE Artifacts and transitions to MBSE
  • MBSE Across the
  • System Life Cycle Specifications
  • Interface requirements
  • System design
  • Analysis & Trade-off
  • Test plans
  • MBSE benefits
  • Modeling at multiple levels of the System
  • Operational model
  • System model
  • Component model
  • MBSE to support complex predictive and affects-based modeling
  • Relationship between SySML and MBE/MBSE

Overview of UML and SysML

  • Diagram Overview and Language Concepts
  • What is SysML?
  • UML for Systems Engineering R
  • SysML Diagram Taxonomy
  • A subset of UML with extensions
  • SysML as a UML Profile
  • Systems including hardware, software, data, personnel, procedures, and facilities
  • SysML in specification, analysis, design, verification, and validation of systems

Overview of System Modeling with SysML

  • Functional/Behavioral Model
  • Performance Model
  • System model
  • Structural/Component Model
  • Other Engineering Analysis Model
  • Model Based Systems Engineering Benefits
  • Shared understanding of system requirements and design
  • Assists in managing complex system development
  • Improved design quality

The Structure of an element or system

  • System
  • Hardware
  • Software
  • Data
  • Procedure
  • Facility
  • Person

SysML Diagram Techniques

  • Use Case
  • Requirement
  • Activity
  • Block Definition
  • Internal Block
  • Sequence
  • State Machine
  • Parametric
  • Package
  • Allocation Tables

SysML Modeling Elements

  • Allocations
  • Rationales
  • Diagram Frames
  • Model Views and Viewpoints
  • Problems

SysML Diagram Taxonomy

  • Behavioral Diagram
  • Activity Diagram
  • Sequence Diagram
  • State Machine Diagram
  • Use Case Diagram
  • Requirement Diagram
  • Structural Diagram
  • Block Definition Diagram
  • Internal Block Diagram
  • Package Diagram

Working with SysML

  • Structure: Definition and Use
  • Behavior: Interaction, State Machine and activity/functions
  • Requirements
  • Parametrics
  • SysML Diagram Frames
  • Package Diagram
  • Views
  • Internal Block Diagram
  • Allocations
  • Basic Structural elements

Workshops

  • Working with a SCADA System Modeling Example and Functional Analysis using SysML
  • Systems Engineering of a Sustainable Energy System Example Using SysML
  • Modeling MQ-8 Fire Scout Project using SysML
  • Structure and Concepts
    • The Requirement Diagram
    • Allocation
    • Block Diagrams
    • The Parametric Diagram
    • The Use Case Diagram
    • The Activity Diagram
    • The State Machine Diagram
    • Interaction Diagrams
    • General Modeling Elements
    • Actor Categories
    • Discipline-Specific Elements
    • Extended Requirement
    • Essential Activity
    • Domain Block
    • Weighted Requirement Relationships
    • Continuous and Secondary Use Cases
    • Stakeholders
    • Systems and Subsystems
    • System Context Elements
    • System Processes
    • SysML Language Architecture
    • Model with Packages
    • Structure with Blocks
    • Constraints with Parametrics
    • Flow-Based Behavior with Activities
    • Message-Based Behavior with Interactions
    • Event-Based Behavior with State Machines
    • Functionality with Use Cases
    • Cross-Cutting Relationships with Allocations

SysML Reference Guide

SysML Language Architecture

  • Design Principles
  • Architecture
  • Extension Mechanisms
  • SysML Diagrams

Structural Constructs

  • Model Elements
    • Overview
    • Diagram Elements
    • UML Extensions
    • Usage Examples
  • Blocks
    • Overview
    • Diagram Elements
    • UML Extensions
    • Diagram Extensions
    • Stereotypes
    • Model Libraries
    • Usage Examples
  • Ports and Flows
    • Standard Ports
    • Flow Ports
    • Item Flows
    • Diagram Elements
    • UML Extensions
  • Diagram Extensions
    • FlowPort
    • FlowProperty
    • FlowSpecification
    • ItemFlow
    • StandardPort
    • Stereotypes
    • Block
    • FlowDirection
    • FlowPort
    • FlowProperty
    • FlowSpecification
    • ItemFlow
  • Constraint Blocks
    • Overview
    • Diagram Elements
    • UML Extensions
    • Diagram Extensions
  • Stereotypes

 

Behavioral Constructs

  • Activities
  • Diagram Elements
  • UML Extensions
  • Interactions
  • Overview
  • Diagram Elements
  • State Machines
  • Use Cases

Crosscutting Constructs

  • Allocations
  • Requirements
  • Diagram Elements
  • Profiles & Model Libraries
Jun
24
Mon
MIL-STD-810G Training @ Tonex Atlanta
Jun 24 @ 9:00 am – Jun 26 @ 4:00 pm
Print Friendly, PDF & Email

MIL-STD-810G Training,  MIL-810G training, Military Standard 810G Testing Course, TEST METHOD STANDARD FOR ENVIRONMENTAL ENGINEERING CONSIDERATIONS AND LABORATORY TESTS

MIL-STD-810G Training course, MIL-810G training provides technical understanding and guidance about the objectives and application of MIL-STD-810G, environmental design and test considerations and standards.

MIL-STD-810G training covers materiel acquisition program planning and engineering direction for considering the influences that environmental stresses have on materiel throughout all phases of its service life.

TONEX’s MIL-STD-810G training does also recommends design or test specifications based on environmental processes resulting in realistic materiel designs and test methods (based on materiel system performance requirements)

MIL-STD-810G training covers all the tests, the required equipment to perform each test, along with  the methodology to apply.

MIL-810G Training Learning Objectives

Upon completion of MIL-810G training, the attendees will:

  • Describe the objectives of MIL-STD-810G
  • Explain the benefits of MIL-STD-810G standard
  • Describe the major MIL-STD-810G test cases
  • List types of vibration, shock and climatic tests
  • Tailor materiel item’s environmental design and test limits to the conditions
  • Establish laboratory test methods that replicate the effects of environments on materiel
  • Describe Sine and Random Vibration, classical waveform shock testing and drop testing
  • Explain procedures behind Shock Response Spectrum Testing
  • Describe and select equipment and instrumentation to perform each test
  • List climatic test requirements, origination, equipment required, test methodology and understanding of results

 Course Content

Introduction and Course Overview

  • Introduction, History and Scope of MIL-STD-810G –
  • Environmental Engineering Programs
  • Environmental Management
  • Engineering Tasks and Engineering Management
  • Guidance for Program Management and Environmental Tailoring
  • Environmental Test Procedures
  • Typical Format for Environmental Test Procedures
  • Testing methods’ Introduction and Limitations
  • History and Rationale
  • Effects of the Environment
  • Test Sequence and Procedures
  • Analysis of Results
  • Equipment Needed
  • Sinusoidal vs. random vibration testing systems
  • Testing specifications, standards and procedures.
  • Vibration and shock test fixture design, fabrication, experimental evaluation and usage
  • Shock measurement, shock response spectrum (SRS) and shock testing

General Program Guidelines

  • Roles and Guidelines
  • Tailoring Procedures
  • Program Managers
  • Operational Requirements Document (ORD)
  • System Engineering Management Plan (SEMP)
  • Test and Evaluation Master Plan (TEMP)
  • Environmental Engineering Specialists (EES)
  • Preparing an Environmental Engineering Management Plan (EEMP)
  • Developing an Environmental Test and Evaluation Master Plan (ETEMP)
  • Defining a Life Cycle Environmental Profile (LCEP)
  • Developing Operational Environment Documentation (OED)
  • Developing an Environmental Issues/Criteria List (EICL)
  • Preparing a Detailed Environmental Test Plan (DETP)
  • Preparing an Environmental Test Report (ETR)
  • Design and Test Engineers and Facility Operators
  • Roles of design engineers
  • Roles of test engineers/facility operators
  • Guidance for design and test engineers and test facility operators
  • Natural environment (field/fleet) testing
  • Laboratory testing
  • Classical sinusoidal vibration
  • Resonance effects
  • Acceleration & force measurement
  • Electrohydraulic shaker systems
  • Electrodynamic shaker systems
  • Sine vibration testing
  • Random vibration testing

MIL-STD-810G Testing Methods

  • Military Standard testing
  • Climatics
  • Climatic Conditions and Daily Cycles of Temperature, Solar Radiation, and Relative Humidity
  • Temperature testing
  • Temperature shock
  • Humidity
  • Altitude
  • Low Pressure (Altitude)
  • High Temperature
  • Low Temperature
  • Temperature Shock
  • Contamination by Fluids
  • Solar Radiation (Sunshine)
  • Rain
  • Humidity
  • Fungus
  • Salt Fog
  • Sand and Dust
  • Explosive Atmosphere
  • Immersion
  • Acceleration
  • Vibration
  • Acoustic Noise
  • Shock
  • Pyroshock
  • Acidic Atmosphere
  • Gunfire Shock
  • Temperature, Humidity, Vibration and Altitude
  • Icing/Freezing Rain
  • Ballistic Shock
  • Vibro-Acoustic/Temperature
  •  Freeze /Thaw
  • Time Waveform Replication
  • Rail Impact
  • Multi-Exciter Testing (MET)
  • Mechanical Vibrations of Shipboard Equipment

General Laboratory test Method Guidelines

  • Test Conditions
  • Tolerances for Test Conditions
  • Test Instrumentation
  • Suitability for environment
  • Calibration
  • Stabilizing Test Temperature
  • Test item operating
  • Test item non-operating
  • Test Sequence
  • Test Level Derivation
  • Test Setup
  • Test item operation
  • Interrupted Tests
  • In-tolerance interruptions
  • Out-of-tolerance interruptions
  • Interruption due to test item operation failure
  • Combined Tests
  • Post-test Data
  • Environmental Effects and Failure Criteria
  • Environmental Test Reports
  • Water Purity
  • Analysis of Results
  • Monitoring
  • Monitoring test chamber parameters
  • Monitoring the item under test
  • Total High Temperature Exposure Duration

Environmental Management and Engineering Tasks 

  • Task 401 – Environmental Engineering Management Plan (EEMP)
  • Task 402 – Life Cycle Environmental Profile (LCEP)
  • Task 403 – Operational Environment Documentation (OED)
  • Task 404 – Environmental Issues/Criteria List (EICL)
  • Task 405 – Detailed Environmental Test Plans (DETP)
  • Task 406 – Environmental Test Reports (ETR)
  • Detailed Program Management Guidance
  • Environmental Tailoring Guidelines for Environmental Engineering Specialists (EES)
  • C-1 Areas of occurrence of climatic categories A1, A2, & A3 C-5
  • C-2 Areas of occurrence of climatic categories B1, B2, & B3 C-6
  • C-3 Areas of occurrence of climatic categories C1, C2, & C3 C
  • C-1 Areas of occurrence of climatic categories A1, A2, & A3 C-5
  • C-2 Areas of occurrence of climatic categories B1, B2, & B3 C-6
  • C-3 Areas of occurrence of climatic categories C1, C2, & C3 C-7