• 제목/요약/키워드: Event control

검색결과 1,136건 처리시간 0.028초

Fault-tolerant robust supervisor for timed discrete event systems

  • Park, Seong-Jin;Li, Jong-Tae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1997년도 한국자동제어학술회의논문집; 한국전력공사 서울연수원; 17-18 Oct. 1997
    • /
    • pp.411-413
    • /
    • 1997
  • This paper presents the problem of fault-tolerant robust supervisory control of timed discrete event systems (DESs). First the concept of faults is quantitatively defined in timed DESs and fault tolerable event sequences are presented as a desired legal language. Given a timed DES with model uncertainty, the conditions for the existence of a supervisor which always guarantees fault tolerable event sequences embedded in the system are derived.

  • PDF

Formal Model 작성을 위한 Event Graph 모델링 연구

  • 박정현;최병규
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 1995년도 추계학술대회 논문집
    • /
    • pp.864-867
    • /
    • 1995
  • Presented in the paper is a structured approach to modeling automated manufacturing system (AMS) in the form of an event graph. The proposed two-phase procedure for formal modeling is 1) reference modeling by schematic supervisory control modeling and 2) event graph transformation from supervisory control model. Also described is a formal model for a small-sized FMS in the form of an event graph.

  • PDF

원자로 제어봉구동장치 제어시스템용 이벤트 기록 방법 (Event Logging Method for Control Rod Control System)

  • 천종민;김춘경;조창희;정순현;남정한
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 학술회의 논문집 정보 및 제어부문 B
    • /
    • pp.552-554
    • /
    • 2003
  • This paper is about the method by which Power Control Unit(PCU) of Control Rod Control System(CRCS) logs events in the system and the real-time monitoring display. This method enables the functions like the event logging of Control Rod Drive Mechanism(CRDM)/power Cabinet, the off-line show of the event data logged and the on-line show by communication between the PCU and the monitoring display. Operators in a nuclear power plant must be able to grasp any possible abnormal states correctly. Because our newly designed system has a good ability to log and display the kinds, tine, and the prior and posterior states of urgent or non-urgent events, the operators can judge, maintain and repair the abnormal event more easily.

  • PDF

LTS Semantics Model of Event-B Synchronization Control Flow Design Patterns

  • Peng, Han;Du, Chenglie;Rao, Lei;Liu, Zhouzhou
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.570-592
    • /
    • 2019
  • The Event-B design pattern is an excellent way to quickly develop a formal model of the system. Researchers have proposed a number of Event-B design patterns, but they all lack formal behavior semantics. This makes the analysis, verification, and simulation of the behavior of the Event-B model very difficult, especially for the control-intensive systems. In this paper, we propose a novel method to transform the Event-B synchronous control flow design pattern into the labeled transition system (LTS) behavior model. Then we map the design pattern instantiation process of Event-B to the instantiation process of LTS model and get the LTS behavior semantic model of Event-B model of a multi-level complex control system. Finally, we verify the linear temporal logic behavior properties of the LTS model. The experimental results show that the analysis and simulation of system behavior become easier and the verification of the behavior properties of the system become convenient after the Event-B model is converted to the LTS model.

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권8호
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

Fault tolerant supervisory control system and automated failure diagnosis

  • Cho, K.H.;Lim, J.T.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1995년도 Proceedings of the Korea Automation Control Conference, 10th (KACC); Seoul, Korea; 23-25 Oct. 1995
    • /
    • pp.35-38
    • /
    • 1995
  • We proposed in this paper a systematic way for analyzing discrete event dynamic systems to classify faults and failures quantitatively and to find tolerable fault event sequences embedded in the system. An automated failure diagnosis scheme with respect to the nominal normal operating event sequences and the supervisory control problem for tolerable fault event sequences is presented. Moreover the supervisor failure diagnosis problem with respect to the tolerable fault event sequences is considered. Finally, a plasma etching system example is presented.

  • PDF

고속전철용 Event Recorder를 위한 제어 방식 개발 (Development of Control Method for Event Recorder in High Speed Train)

  • 송규연;임현재;장태욱
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2011년도 춘계학술대회 논문집
    • /
    • pp.1182-1188
    • /
    • 2011
  • By storing various train information in running high speed train, we can analyze the cause of train accident efficiently. we have developed the smart and high available control method to control and manage the hardware modules. The hardware modules for event recorder consist CPU, Digital Input and Output, Pulse Input, Communication, Control Panel and Crash Protected Memory. The real time operation system is used to totally control and manage the various hardware modules. The main function of control method is collection of train information, calculation of train speed, interface with other on-board control system, storing and retrieving train information, and communication with Control Panel. In Control Panel, it displays the current train speed and the status of event recorder effectively. Also user interface is provided in Control Panel.

  • PDF

Event Log Validity Analysis for Detecting Threats by Insiders in Control System

  • Kim, Jongmin;Kang, Jiwon;Lee, DongHwi
    • Journal of information and communication convergence engineering
    • /
    • 제18권1호
    • /
    • pp.16-21
    • /
    • 2020
  • Owing to the convergence of the communication network with the control system and public network, security threats, such as information leakage and falsification, have become possible through various routes. If we examine closely at the security type of the current control system, the operation of the security system focuses on the threats made from outside to inside, so the study on the detection system of the security threats conducted by insiders is inadequate. Thus, this study, based on "Spotting the Adversary with Windows Event Log Monitoring," published by the National Security Agency, found that event logs can be utilized for the detection and maneuver of threats conducted by insiders, by analyzing the validity of detecting insider threats to the control system with the list of important event logs.

제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구 (A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System)

  • 김종민;김동민;이동휘
    • 융합보안논문지
    • /
    • 제18권3호
    • /
    • pp.77-85
    • /
    • 2018
  • 제어시스템은 공공 네트워크와의 통신망 융합에 따라 다양한 루트를 통해 정보유출 및 변조 등의 위협이 제어시스템에서도 그대로 나타날 수 있다. 최근 다양한 보안에 대한 이슈와 새로운 공격기법에 의한 침해 사례가 다변화됨에 따라서, 단순히 차단 및 확인 등의 학습을 통해 정보를 데이터베이스화하는 보안 시스템으로는 새로운 형태의 위협에는 대처하기 힘들어지고 있다. 현재 제어시스템에서는 이처럼 외부에서 내부로의 위협에 치중하여 보안 시스템을 운용하고 있으며, 보안 접근 권한을 가진 내부자에 의한 보안위협 탐지에 대해서는 미비한 실정이다. 이에 따라 본 연구에서는 NSA에서 발표한 "Spotting the Adversary with Windows Event Log Monitoring"의 주요 Event Log 목록을 토대로 중요도 분석을 실시하였다. 그 결과 제어시스템에 내부자 위협탐지를 위한 Event Log의 중요도 여부를 알 수 있었으며, 분석결과를 바탕으로 이 분야의 연구에 기여할 수 있을 것으로 판단된다.

  • PDF

CIM Testbed의 제어를 위한 Supervisor의 설계와 구현 (Design and Implementation of Supervisors to Control of a CIM Testbed)

  • 손형일;이석
    • 제어로봇시스템학회논문지
    • /
    • 제6권6호
    • /
    • pp.478-485
    • /
    • 2000
  • A discrete event systems (DES) is a physical system that is discrete in time and state space, asynchronous (event rather than clock-driven), and in some sense generative(or nondeterministic). This paper presents the design of fifteen modular supervisors to control an experimental CIM testbed. These supervisors are nonblocking, controllable and nonconflicting. After verification of the supervisors by simulation, the supervisors for AGV system have been implemented to demonstrate their efficacy.

  • PDF