• Title/Summary/Keyword: Control Requirements

Search Result 2,393, Processing Time 0.032 seconds

Development of a Prototype Control Rod Control System (제어봉 구동장치 제어기기 Prototype 개발)

  • Kim, C.K.;Cheon, J.M.;Kim, S.J.;Lee, J.M.;Ahn, J.B.;Kweon, S.M.
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2182-2184
    • /
    • 2002
  • In this paper we describe a prototype Control Rod Control System(CRCS). The CRCS controls the motion of the full length rod drive mechanisms in response to signals from the Reactor Operator and the Reactor Control System. Each mechanism belongs to either Shutdown Banks or Control Banks. The CRCS also provides information regarding the rod motion, rod position, and the status of the Rod Control System. The prototype CRCS will be used to obtain the requirements for detailed design of a full-scale CRCS.

  • PDF

Reasoning about Multiple Access Control Configurations

  • Dangprasert, Supakit;Permpoontanalarp,Yongyuth
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.2047-2050
    • /
    • 2002
  • At present, many applications independently provide access control for their own resources, for example Web, Databases and Operating Systems, etc. Such independent access control systems result in multiple access control configurations each of which deals with the access control in its own application context. Since those multiple configurations are operated in isolation, and maintained by possibly different administrators, they are likely to be incoherent. In this paper, we propose a logical specification to reason about multiple access control configurations. Our specification can be used to detect the incoherence in multiple configurations. Furthermore, it of offers many kinds of policies for multiple configurations that can capture several kinds of requirements for multiple access control systems.

  • PDF

Control Strategy of Improved Transient Response for a Doubly Fed Induction Generator in Medium Voltage Wind Power System under Grid Unbalance

  • Han, Daesu;Park, Yonggyun;Suh, Yongsug
    • Proceedings of the KIPE Conference
    • /
    • 2013.07a
    • /
    • pp.246-247
    • /
    • 2013
  • This paper investigates control algorithms for a doubly fed induction generator with a back-to-back three-level neutral-point clamped voltage source converter in medium voltage wind power system under unbalanced grid conditions. Control algorithms to compensate for unbalanced conditions have been investigated with respect to four performance factors; fault ride-through capability, instantaneous active power pulsation, harmonic distortions, and torque pulsation. The control algorithm having zero amplitude of torque ripple shows the most cost-effective performance concerning torque pulsation. The least active power pulsation is produced by control algorithm that nullifies the oscillating component of the instantaneous stator active and reactive power. Combination of these two control algorithms depending on the operating requirements and depth of grid unbalance presents most optimized performance factors under the generalized unbalanced operating conditions leading to high performance DFIG wind turbine system. The proposed control algorithms are verified through transient response in the simulation.

  • PDF

Evaluation of AGC Characteristics and a Novel AGC Control Strategy for Independent Power Systems (단독계통의 주파수 제어를 위한 자동발전제어(AGC) 특성 분석 및 새로운 제어전략)

  • Choi, Seung-Ho;Hwang, Kyo-Ik;Chun, Yeonghan
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.11
    • /
    • pp.540-547
    • /
    • 2005
  • One of the roles of AGC is to regulate the frequency of power systems. AGC is also used to control the frequency of Korean Power System. AGC control strategies depend on system characteristics and the requirements of the systems to which those are applied. Korean Power System consists of one control area and does not have tie-lines. In this research, an AGC control strategy is suggested to avoid conflict with governor dynamics and to enhance frequency recovery It shows good performance for regulation and frequency recovery. This control strategy is expected to be applied to New EMS in KPX to get reasonable AGC regulation and frequency recovery performance.

An Information Flow Security Based on Protected Area in eCommerce (전자 거래에서 보호 영역을 기반으로 하는 정보 흐름 보안 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.1
    • /
    • pp.1-16
    • /
    • 2010
  • Confidentiality is one of the most important requirements of information protection systems. The access control technique has been used to provide confidentiality, but it has fundamental problems in that it cannot prevent violations of confidentiality committed by authorized users. Information flow control is a technique introduced to resolve such problems, and many approaches based on programming languages have been proposed. However, it is not easy for a programmer to implement the technique at the source code level. Furthermore, the practicality of information flow control is difficult to demonstrate because it does not provide control over programs that have already been developed. This paper proposes a method that enables a practical information flow control through using a protected area, a separate part of computer system storage. Case studies are given to show its usefulness.

Analysis of the Formal Specification Application for Train Control Systems

  • Jo, Hyun-Jeong;Yoon, Yong-Ki;Hwang, Jong-Gyu
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.1
    • /
    • pp.87-92
    • /
    • 2009
  • Many critical control systems are developed using formal methods. When software applied to such systems is developed, the employment of formal methods in the software requirements specification and verification will provide increased assurance for such applications. Earlier errors of overlooked requirement specification can be detected using the formal specification method. Also, the testing and full verification to examine all reachable states using model checking to undertake formal verification are able to be completed. In this paper, we proposed an eclectic approach to incorporate Z(Zed) formal language and 'Statemate MAGNUM', formal method tools using Statechart. Also we applied the proposed method to train control systems for the formal requirement specification and analyzed the specification results.

Web-based Distribute Control Networks

  • Kiwon Song;Kim, Jonghwi;Park, Gi-Sang;Park, Gi-Heung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.82.4-82
    • /
    • 2001
  • Requirements for device control networks differ greatly from those of data (business) networks. Consequently, any control network which uses a filedbus protocol is, in general, different from If network protocol TCP/IP. One then needs to integrate both fieldbus protocol and TCP/IP to realize distributed control over IP network or internet. LonWorks technology provides networked intelligent I/O and controllers which make it a powerful, expandable solution. Connecting these remote Lon Works networks to the Internet can provide a powerful, integrated, distributed control system. This paper suggests a basic concept that be applied to distributed control over IP network or internet. Specially, Lonworks technology that used LonTalk protocol is reviewed as device network and ...

  • PDF

A Design of Access Control Mechanism for the Secure Use of Internet (안전한 인터넷 사용을 위한 접근제어 메커니즘 설계)

  • Lee, Ho;Jung, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.84-90
    • /
    • 2000
  • This paper presents a design of an access control mechanism that can resolves the complicated problems of access control requirements in internet environment. In this paper, we proposed an access control mechanism which can satisfy the combined goals of confidentiality integrity and availability of any resource. We defined an access control mechanism from the viewpoints of identity-based, rule-based and role-based policy and implemented 6 access control operations. The Proposed access control mechanism can protect resources from unauthorized accesses based on the multi-level security policies of security label, integrity level, role and ownership.

  • PDF

A study on the Effect of Process, IT, and Organization Characteristics on Business Process Virtualizability (업무 환경의 디지털 전환에서 업무 특성, IT 특성, 조직 특성이 업무 프로세스 가상성에 미치는 영향 연구)

  • Yituo Feng;Sundong Kwon
    • Information Systems Review
    • /
    • v.24 no.4
    • /
    • pp.119-142
    • /
    • 2022
  • Organizations are attempting a digital transformation that converts physical business processing into virtual business processing. Through this digital transformation, organizations are overcoming time and space constraints and creating competitiveness. The digital transformation of this work environment has been accelerated as many organizations have implemented remote work due to the recent COVID-19 pandemic. This study focused on business process virtualizability, which is the result of the rapid digital transformation of the work environment. Business process virtualizability is the resulting quality, such as the suitability or excellence of business processing in a virtual environment. This research model is the effect of process, IT and organizational characteristics on business process virtualizability. As a result of the verification of people who have experienced remote work in a virtual environment, first, it was confirmed that, in terms of process characteristics, sensory requirements affect business process virtualizability, but relationship requirements, synchronism requirements, and identification and control requirements do not. Second, in terms of IT characteristics, it was confirmed that representation and reach affect business process virtualizability. Third, it was confirmed that, in terms of organizational characteristics, job autonomy affects business process virtualizability, but evaluation unfairness does not. This study found that representation and reach of IT had the most significant influence on business process virtualizability, job autonomy was next, and sensory requirements had the lowest influence. This presents practical implications for organizations to increase the success potential of business process virtualizability.

Review of design parameters for FRP-RC members detailed according to ACI 440.1R-06

  • Jnaid, Fares;Aboutaha, Riyad
    • Computers and Concrete
    • /
    • v.11 no.2
    • /
    • pp.105-121
    • /
    • 2013
  • This paper investigates the parameters that control the design of Fiber Reinforced Polymer (FRP) reinforced concrete flexural members proportioned following the ACI 440.1R-06. It investigates the critical parameters that control the flexural design, such as the deflection limits, crack limits, flexural capacity, concrete compressive strength, beam span and cross section, and bar diameter, at various Mean-Ambient Temperatures (MAT). The results of this research suggest that the deflection and cracking requirements are the two most controlling limits for FRP reinforced concrete flexural members.