• Title/Summary/Keyword: Event control

Search Result 1,136, Processing Time 0.024 seconds

Fault-tolerant robust supervisor for timed discrete event systems

  • Park, Seong-Jin;Li, Jong-Tae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.411-413
    • /
    • 1997
  • This paper presents the problem of fault-tolerant robust supervisory control of timed discrete event systems (DESs). First the concept of faults is quantitatively defined in timed DESs and fault tolerable event sequences are presented as a desired legal language. Given a timed DES with model uncertainty, the conditions for the existence of a supervisor which always guarantees fault tolerable event sequences embedded in the system are derived.

  • PDF

Formal Model 작성을 위한 Event Graph 모델링 연구

  • 박정현;최병규
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1995.10a
    • /
    • pp.864-867
    • /
    • 1995
  • Presented in the paper is a structured approach to modeling automated manufacturing system (AMS) in the form of an event graph. The proposed two-phase procedure for formal modeling is 1) reference modeling by schematic supervisory control modeling and 2) event graph transformation from supervisory control model. Also described is a formal model for a small-sized FMS in the form of an event graph.

  • PDF

Event Logging Method for Control Rod Control System (원자로 제어봉구동장치 제어시스템용 이벤트 기록 방법)

  • Cheon, Jong-Min;Kim, Choon-Kyung;Jo, Chang-Hui;Jeong, Soon-Hyun;Nam, Jeong-Han
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.552-554
    • /
    • 2003
  • This paper is about the method by which Power Control Unit(PCU) of Control Rod Control System(CRCS) logs events in the system and the real-time monitoring display. This method enables the functions like the event logging of Control Rod Drive Mechanism(CRDM)/power Cabinet, the off-line show of the event data logged and the on-line show by communication between the PCU and the monitoring display. Operators in a nuclear power plant must be able to grasp any possible abnormal states correctly. Because our newly designed system has a good ability to log and display the kinds, tine, and the prior and posterior states of urgent or non-urgent events, the operators can judge, maintain and repair the abnormal event more easily.

  • PDF

LTS Semantics Model of Event-B Synchronization Control Flow Design Patterns

  • Peng, Han;Du, Chenglie;Rao, Lei;Liu, Zhouzhou
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.570-592
    • /
    • 2019
  • The Event-B design pattern is an excellent way to quickly develop a formal model of the system. Researchers have proposed a number of Event-B design patterns, but they all lack formal behavior semantics. This makes the analysis, verification, and simulation of the behavior of the Event-B model very difficult, especially for the control-intensive systems. In this paper, we propose a novel method to transform the Event-B synchronous control flow design pattern into the labeled transition system (LTS) behavior model. Then we map the design pattern instantiation process of Event-B to the instantiation process of LTS model and get the LTS behavior semantic model of Event-B model of a multi-level complex control system. Finally, we verify the linear temporal logic behavior properties of the LTS model. The experimental results show that the analysis and simulation of system behavior become easier and the verification of the behavior properties of the system become convenient after the Event-B model is converted to the LTS model.

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

Fault tolerant supervisory control system and automated failure diagnosis

  • Cho, K.H.;Lim, J.T.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1995.10a
    • /
    • pp.35-38
    • /
    • 1995
  • We proposed in this paper a systematic way for analyzing discrete event dynamic systems to classify faults and failures quantitatively and to find tolerable fault event sequences embedded in the system. An automated failure diagnosis scheme with respect to the nominal normal operating event sequences and the supervisory control problem for tolerable fault event sequences is presented. Moreover the supervisor failure diagnosis problem with respect to the tolerable fault event sequences is considered. Finally, a plasma etching system example is presented.

  • PDF

Development of Control Method for Event Recorder in High Speed Train (고속전철용 Event Recorder를 위한 제어 방식 개발)

  • Song, Gyu-Youn;Yim, Hyun-Jae;Chang, Tae-Wook
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1182-1188
    • /
    • 2011
  • By storing various train information in running high speed train, we can analyze the cause of train accident efficiently. we have developed the smart and high available control method to control and manage the hardware modules. The hardware modules for event recorder consist CPU, Digital Input and Output, Pulse Input, Communication, Control Panel and Crash Protected Memory. The real time operation system is used to totally control and manage the various hardware modules. The main function of control method is collection of train information, calculation of train speed, interface with other on-board control system, storing and retrieving train information, and communication with Control Panel. In Control Panel, it displays the current train speed and the status of event recorder effectively. Also user interface is provided in Control Panel.

  • PDF

Event Log Validity Analysis for Detecting Threats by Insiders in Control System

  • Kim, Jongmin;Kang, Jiwon;Lee, DongHwi
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.16-21
    • /
    • 2020
  • Owing to the convergence of the communication network with the control system and public network, security threats, such as information leakage and falsification, have become possible through various routes. If we examine closely at the security type of the current control system, the operation of the security system focuses on the threats made from outside to inside, so the study on the detection system of the security threats conducted by insiders is inadequate. Thus, this study, based on "Spotting the Adversary with Windows Event Log Monitoring," published by the National Security Agency, found that event logs can be utilized for the detection and maneuver of threats conducted by insiders, by analyzing the validity of detecting insider threats to the control system with the list of important event logs.

A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System (제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구)

  • Kim, Jongmin;Kim, DongMin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2018
  • With the convergence of communications network between control system and public network, such threats like information leakage/falsification could be fully shown in control system through diverse routes. Due to the recent diversification of security issues and violation cases of new attack techniques, the security system based on the information database that simply blocks and identifies, is not good enough to cope with the new types of threat. The current control system operates its security system focusing on the outside threats to the inside, and it is insufficient to detect the security threats by insiders with the authority of security access. Thus, this study conducted the importance analysis based on the main event log list of "Spotting the Adversary with Windows Event Log Monitoring" announced by NSA. In the results, the matter of importance of event log for the detection of insider threats to control system was understood, and the results of this study could be contributing to researches in this area.

  • PDF

Design and Implementation of Supervisors to Control of a CIM Testbed (CIM Testbed의 제어를 위한 Supervisor의 설계와 구현)

  • Song, Tae-Seung;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.6
    • /
    • pp.478-485
    • /
    • 2000
  • A discrete event systems (DES) is a physical system that is discrete in time and state space, asynchronous (event rather than clock-driven), and in some sense generative(or nondeterministic). This paper presents the design of fifteen modular supervisors to control an experimental CIM testbed. These supervisors are nonblocking, controllable and nonconflicting. After verification of the supervisors by simulation, the supervisors for AGV system have been implemented to demonstrate their efficacy.

  • PDF