• Title/Summary/Keyword: Control Software

Search Result 4,250, Processing Time 0.03 seconds

Power Converter Gating Signal Generation with DSP Software (DSP 소프트웨어에 의한 전력변환기 게이팅 신호 발생)

  • Lee, Hae-Chun;Park, Tae-Yeol;Kim, Gi-Taek
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.111-116
    • /
    • 2001
  • Power converters are widely used in the applications of servo drives of ac and dc motors and power supplies. For the control of the converters carious control algorithms have been proposed and realized by gating signal generation. Software control shemes are being applied to implement the control algorithms, but analog circuits are still used for the gating signal generation because it requires very fast and precise timing. In this paper the gating signal generation with DSP software are proposed for the three phase to three phase PWM converter. Design procedures and software flowcharts are presented and some experimental waveforms are also presented to verify the proposed algorithms.

  • PDF

Current Control of DC Motor using Software Bang-Bang Algorithm (Software Bang-Bang Algorithm을 이용한 DC Motor 전류제어)

  • Bae, Jong-Il;Jung, Dong-Ho
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.2 no.4
    • /
    • pp.88-94
    • /
    • 2003
  • The DC motor has the strong characteristics in the speed response, the system parameter variations and the external influence and is used as the speed controller with its good starting torque in the distributing industry. However development of the Microprocessor which is for high speed switching program can make better control system. This paper introduce to design of the high-effective DC motor controller that is using Software Bang-Bang Program of Fuzzy algorithm and to verity a PI controller and a Fuzzy controller.

  • PDF

Software Designing Simulator for Controlling Multiple-Mechanism Carrier System

  • Nakamura, Kotaro;Kumagai, Koji;Sato, Seiji;Sato, Shoichi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.450-450
    • /
    • 2000
  • This paper presents a software design simulation method for controlling multiple mechanism carrier system (MMCS), which is mainly used in a wrapping machine or a case packing machine. This method uses a mechanical tool-work interactive model proposed in this paper, in order to represent the interactive behaviors between some tools and a work driven by their tools, in which low effect states of a work are defined. Based on this method, a 3-D simulation system has been built. It consists of shape modeling of each device, behavior definitions of tools, and control logic using if-then expression. By applying it to a ase packing machine having about 30 mechanical devices and 100 inputs/outputs for control, the effectiveness of this method has been shown in general verification of control logic specification in an early software design phase and the possibility of smooth communication tool between mechanical and software designers.

  • PDF

Development of Verification Environment for Flight Safety Critical Software using NEXUS (NEXUS를 이용한 비행안전 필수 소프트웨어 검증환경 개발)

  • Yoon, Hyung-Sik;Han, Jong-Pyo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.6
    • /
    • pp.548-554
    • /
    • 2012
  • Verification and validation of operational software of the flight control computer, which is flight safety critical, is very important to prove correctness and faultness of the software. To verify the real-time softare requirement on operational software of flight control computer, real-time software internal parameter and variable monitoring technics on hardware-in-the-loop environment, similar to on-flight environment, is required. This paper describes flight safety critical software validation and verificiation environment using standard debugging interface, NEXUS 5001.

Deep Neural Network-Based Critical Packet Inspection for Improving Traffic Steering in Software-Defined IoT

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid growth of intelligent devices and communication technologies, 5G network environment has become more heterogeneous and complex in terms of service management and orchestration. 5G architecture requires supportive technologies to handle the existing challenges for improving the Quality of Service (QoS) and the Quality of Experience (QoE) performances. Among many challenges, traffic steering is one of the key elements which requires critically developing an optimal solution for smart guidance, control, and reliable system. Mobile edge computing (MEC), software-defined networking (SDN), network functions virtualization (NFV), and deep learning (DL) play essential roles to complementary develop a flexible computation and extensible flow rules management in this potential aspect. In this proposed system, an accurate flow recommendation, a centralized control, and a reliable distributed connectivity based on the inspection of packet condition are provided. With the system deployment, the packet is classified separately and recommended to request from the optimal destination with matched preferences and conditions. To evaluate the proposed scheme outperformance, a network simulator software was used to conduct and capture the end-to-end QoS performance metrics. SDN flow rules installation was experimented to illustrate the post control function corresponding to DL-based output. The intelligent steering for network communication traffic is cooperatively configured in SDN controller and NFV-orchestrator to lead a variety of beneficial factors for improving massive real-time Internet of Things (IoT) performance.

The Effectiveness of MOOS-IvP based Design of Control System for Unmanned Underwater Vehicles (MOOS-IvP를 이용한 무인잠수정 제어기 개발의 효용성)

  • Kim, Jiyeon;Lee, Dongik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.3
    • /
    • pp.157-163
    • /
    • 2014
  • This paper demonstrates the benefit of using MOOS-IvP in the development of control system for Unmanned Underwater Vehicles(UUV). The demand for autonomy in UUVs has significantly increased due to the complexity in missions to be performed. Furthermore, the increased number of sensors and actuators that are interconnected through a network has introduced a need for a middleware platform for UUVs. In this context, MOOS-IvP, which is an open source software architecture, has been developed by several researchers from MIT, Oxford University, and NUWC. The MOOS software is a communication middleware based on the publish-subscribe architecture allowing each application to communicate through a MOOS database. The IvP Helm, which is one of the MOOS modules, publishes vehicle commands using multi-objective optimization in order to implement autonomous decision making. This paper explores the benefit of MOOS-IvP in the development of control software for UUVs by using a case study with an auto depth control system based on self-organizing fuzzy logic control. The simulation results show that the design and verification of UUV control software based on MOOS-IvP can be carried out quickly and efficiently thanks to the reuse of source codes, modular-based architecture, and the high level of scalability.

Common Cause Failure Problems in Ultra-High Reliability Systems-A View Point on Common Cause Internal Effects and Statistical Principles (초신뢰성 시스팀에서의 공통원인 실패문제-공통원인의 내부적 효과 및 통계학적 원리의 관점에서)

  • Park, P.;Ko, K.H.;Kim, C.S.;Kim, H.K.;Oh, H.S.
    • Electronics and Telecommunications Trends
    • /
    • v.8 no.3
    • /
    • pp.39-52
    • /
    • 1993
  • This study involves a Common Cause Failure (CCF) problem on the ultra-high reliability required system development such as war game operations, nuclear power control, air traffic control, space shuttle missions, and large scale network communication system. The system situation problems are defined according to CCF, reliability and system fault identifications for the development cast verifications in the multi-version redundant software system. Then, CCF analysis of redundant system, system principles and statistical dependence are also described. This validation oh the CCF in the human software interaction system will notify software engineers to conceive what really is CCF contribution factor, not only the internal but the external ones.

Test method for step-by-step construction of Autonomous station control system (자율분산 역 제어시스템 단계적 구축에 따른 테스트 방법)

  • Kim, Young-Hoon
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.1239-1243
    • /
    • 2007
  • Autonomous Station Control System is automatic route control system of large-scale station. The system has flexibility of system step-by-step construction and expandability. A method of step-by-step construction for Autonomous Station Control System has system expansion and subsystem software expansion. The system has autonomous controllability and autonomous coordinability for system step by step construction. With property for a basis, each of subsystem communicates data field. Also, Each subsystem has its own management system, Autonomous Data Manager to manage itself and coordinate with the others. This paper make clear test method for Autonomous Station Control System expansion and software expansion. The first test method of system increasing construction is single station construction test. The second of method is connecting test the neighbor's Autonomous Station Control System. The third of method is connecting test the Autonomous Line Management System. Also, the test method of software expansion take the case of route control subsystem.

  • PDF

A Study on the Internet Control and Monitoring System using an Embedded System (임베디드 시스템을 이용한 인터넷 제어감시 시스템에 관한 연구)

  • Haeng-Choon Chun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.28 no.5
    • /
    • pp.811-817
    • /
    • 2004
  • Recently embedded systems are widely used in various industrial fields as supervisory controller because they have many merits. One of merits seems to be that operating environment of embedded system is the same as development environment using PC. That makes developing and manufacturing period shorten and also proper time to market Most of all machinery have sequential control system for their maneuvering which is composed of relays. contacts. timers. etc. In this paper. software sequential control system is proposed to be able to replace hardware sequential control system by using embedded system A lot of merits by the software sequential control system can be expected in the respect of economic reproduction, intelligent technologies and utilities, And porting of LINUX operating system to embedded system is carried out and device drivers and interface boards for LINUX 05 are designed for controlling air compressor by software Internet remote control and monitoring system of air compressor is implemented with Java script and CGI for these purposes. The experiment for operating air compressor system is taken through internet networks. The results show that developed system can be used for real plant.

Software Attack Detection Method by Validation of Flow Control Instruction’s Target Address (실행 제어 명령어의 목적 주소 검증을 통한 소프트웨어 공격 탐지 기법)

  • Choi Myeong-Ryeol;Park Sang-Seo;Park Jong-Wook;Lee Kyoon-Ha
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.397-404
    • /
    • 2006
  • Successful software attacks require both injecting malicious code into a program's address space and altering the program's flow control to the injected code. Code section can not be changed at program's runtime, so malicious code must be injected into data section. Detoured flow control into data section is a signal of software attack. We propose a new software attack detection method which verify the target address of CALL, JMP, RET instructions, which alter program's flow control, and detect a software attack when the address is not in code section. Proposed method can detect all change of flow control related data, not only program's return address but also function pointer, buffer of longjmp() function and old base pointer, so it can detect the more attacks.