• Title/Summary/Keyword: Control and monitoring software

Search Result 372, Processing Time 0.03 seconds

Different strengthening designs and material properties on bending behavior of externally reinforced concrete slab

  • Najafi, Saeed;Borzoo, Shahin
    • Structural Monitoring and Maintenance
    • /
    • v.9 no.3
    • /
    • pp.271-287
    • /
    • 2022
  • This study investigates the bending behavior of a composite concrete slab roof with different methods of externally strengthing using steel plates and carbon fiber reinforced polymer (CFRP) strips. First, the concrete slab model which was reinforced with CFRP strips on the bottom surface of it is validated using experimental data, and then, using numerical modeling, 7 different models of square-shaped composite slab roofs are developed in ABAQUS software using the finite element modeling. Developed models include steel rebar reinforced concrete slab with variable thickness of CFRP and steel plates. Considering the control sample which has no external reinforcement, a set of 8 different reinforcement states has been investigated. Each of these 8 states is examined with 6 different uncertainties in terms of the properties of the materials in the construction of concrete slabs, which make 48 numerical models. In all models loading process is continued until complete failure occurs. The results from numerical investigations showed using the steel plates as an executive method for strengthening, the bending capacity of reinforced concrete slabs is increased in the ultimate bearing capacity of the slab by about 1.69 to 2.48 times. Also using CFRP strips, the increases in ultimate bearing capacity of the slab were about 1.61 to 2.36 times in different models with different material uncertainties.

IoT(Internet of Things)-based Smart Trash Can (사물인터넷 기반의 스마트 휴지통)

  • Kim, Tae-Kook
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.17-22
    • /
    • 2020
  • This paper is about IoT(Internet of Things)-based smart trash can. In modern society, waste disposal creates several social problems. In particular, large floating populations cause a problem in the city center on weekends as the waste disposal capacity cannot keep up with the amount of waste discharged. There are problems such as stinks, unpleasant aesthetics, and insects caused by overflowing garbage. To solve this problem, a smart trash can was proposed. The proposed smart trash can provide a garbage compression function, an automatic opening and closing of the trash can lid, a display of the amount of garbage, and monitoring and control of the trash can. It is expected that the proposed 'smart trash can' can be usefully used for outdoor waste disposal with a large floating population.

Performance Evaluation of Advanced Frequency Estimation Technique using 765kV Modeling Data (765kV 모델링 데이터에 의한 개선된 주파수 추정기법의 성능 평가)

  • Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.59 no.3
    • /
    • pp.253-257
    • /
    • 2010
  • The frequency is an important operation parameter for the control, protection, and stability of a power system. The frequency as a key index of power quality can be indicative of system abnormal conditions and disturbances. Due to the sudden change in generation and loads or faults in power system, the frequency is supposed to deviate from its nominal value. It is essential that the frequency must be maintained very close to its nominal frequency. An accurate monitoring of the power frequency is essential to optimal operation and prevention for wide area blackout. As most conventional frequency estimation schemes are based on DFT filter, it has been pointed out that the gain error could cause defects when the frequency is deviated from nominal value. This paper presents an advanced frequency estimation technique using gain compensation to improve the performance of DFT filter based techniques. To evaluate performance of the proposed algorithm, the 765kV T/L system in Korea is simulated by EMTP-RV software. The proposed technique can reduce the gain error caused when the power system frequency deviates from nominal value.

A Design of Framework for Efficient Development of Instrument Control and Monitoring Software (제어 및 모니터링 소프트웨어의 효율적인 개발을 위한 프레임워크 설계)

  • Yoo, Dea-Sung;Sim, Min-Suck;Park, Sung-Ghue;Kim, Jong-Hwan;Yi, Myoung-Jae
    • Annual Conference of KIPS
    • /
    • 2003.05b
    • /
    • pp.1177-1180
    • /
    • 2003
  • 본 논문에서는 자동화 장비들의 제어 및 모니터링 소프트웨어에 대한 쉬운 개발과 유지보수성을 향상시킬 수 있는 프레임워크를 제안한다. 본 논문에서 제안하는 프레임워크는 XML기반의 세 가지 표준 문서 형식(IID, MAP. CMIML), VI Wizard, Generator로 구성된다. VI Wizard는 표준문서형식(IID, MAP, CMIML)을 내장하고. 입력받은 IID와 MAP파일을 이용해서 GUI기반으로 VI(Virtual Instrument)를 구성한다. 새롭게 구성된 VI를 이용하여 장비의 제어정보, 사용자 인터페이스 정보 모니터링 정보, 통신 방법 등에 대한 정보를 기술하는 CMIML을 생성한다. Generator는 VI Wizard에서 생성한 CMIML문서와 실제 장비 드라이버에 대한 API를 입력으로 장비에 대한 제어 및 모니터링 소프트웨어를 자동 생성하게 된다.

  • PDF

Development of a Real-time OS Based Control System for Laparoscopic Surgery Robot (복강경 수술로봇을 위한 실시간 운영체제 기반 제어 시스템의 개발)

  • Song, Seung-Joon;Park, Jun-Woo;Shin, Jung-Wook;Kim, Yun-Ho;Lee, Duk-Hee;Jo, Yung-Ho;Choi, Jae-Seoon;Sun, Kyung
    • Journal of Biomedical Engineering Research
    • /
    • v.29 no.1
    • /
    • pp.32-39
    • /
    • 2008
  • This paper reports on a realtime OS based master-slave configuration robot control system for laparoscopic surgery robot which enables telesurgery and overcomes shortcomings with conventional laparoscopic surgery. Surgery robot system requires control system that can process large volume information such as medical image data and video signal from endoscope in real-time manner, as well as precisely control the robot with high reliability. To meet the complex requirements, the use of high-level real-time OS (Operating System) in surgery robot controller is a must, which is as common as in many of modem robot controllers that adopt real-time OS as a base system software on which specific functional modules are implemened for more reliable and stable system. The control system consists of joint controllers, host controllers, and user interface units. The robot features a compact slave robot with 5 DOF (Degree-Of-Freedom) expanding the workspace of each tool and increasing the number of tools operating simultaneously. Each master, slave and Gill (Graphical User Interface) host runs a dedicated RTOS (Real-time OS), RTLinux-Pro (FSMLabs Inc., U.S.A.) on which functional modules such as motion control, communication, video signal integration and etc, are implemented, and all the hosts are in a gigabit Ethernet network for inter-host communication. Each master and slave controller set has a dedicated CAN (Controller Area Network) channel for control and monitoring signal communication with the joint controllers. Total 4 pairs of the master/slave manipulators as current are controlled by one host controller. The system showed satisfactory performance in both position control precision and master-slave motion synchronization in both bench test and animal experiment, and is now under further development for better safety and control fidelity for clinically applicable prototype.

DEEP-South: Automated Scheduler and Data Pipeline

  • Yim, Hong-Suh;Kim, Myung-Jin;Roh, Dong-Goo;Park, Jintae;Moon, Hong-Kyu;Choi, Young-Jun;Bae, Young-Ho;Lee, Hee-Jae;Oh, Young-Seok
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.1
    • /
    • pp.54.3-55
    • /
    • 2016
  • DEEP-South Scheduling and Data reduction System (DS SDS) consists of two separate software subsystems: Headquarters (HQ) at Korea Astronomy and Space Science Institute (KASI), and SDS Data Reduction (DR) at Korea Institute of Science and Technology Information (KISTI). HQ runs the DS Scheduling System (DSS), DS database (DB), and Control and Monitoring (C&M) designed to monitor and manage overall SDS actions. DR hosts the Moving Object Detection Program (MODP), Asteroid Spin Analysis Package (ASAP) and Data Reduction Control & Monitor (DRCM). MODP and ASAP conduct data analysis while DRCM checks if they are working properly. The functions of SDS is three-fold: (1) DSS plans schedules for three KMTNet stations, (2) DR performs data analysis, and (3) C&M checks whether DSS and DR function properly. DSS prepares a list of targets, aids users in deciding observation priority, calculates exposure time, schedules nightly runs, and archives data using Database Management System (DBMS). MODP is designed to discover moving objects on CCD images, while ASAP performs photometry and reconstructs their lightcurves. Based on ASAP lightcurve analysis and/or MODP astrometry, DSS schedules follow-up runs to be conducted with a part of, or three KMTNet telescopes.

  • PDF

Development of Automatic Measurement and Control Method based on Single Chip Microcomputer for Tackjoo Fermentation (Single Chip Microcomputer를 이용한 탁주발효(濁酒醱酵)의 자동계측(自動計測)과 제어방법(制御方法)의 개발(開發))

  • Kim, Kyung-Man;Chun, Jae-Kun
    • Korean Journal of Food Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.391-394
    • /
    • 1993
  • For the automation of Tackjoo fermentation, a sensor measurable gas production during brewing and a controller were built. The performance tests were carried out at 10 litter Tackjoo fermentor, The sensor was consisted of a transparent acryl cell for bubble formation and photo-interrupter for the detection of bubbles of 0.018ml size. The fermentation controller was fabricated with a single chip microcomputer (MC68705R3) and provided with both the monitoring module of temperature measurement and the valve controling device for the cooling water circulation in coil type heat exchanger. The operation programs were developed and systemized in ROM. With this computer system, the gas production amount and rate were acquired during the Tackjoo fermentation. The fermentation curve based on the gas production rate showed a good agreement with that of alcohol concentration. The maximum rate of gas production was found after 24 hr at $30^{\circ}C$. The correlation equation between the gas production and alcohol concentration was established and used as the control algorithm of the fermentation.

  • PDF

The Development of Automated Personalized Self-Care (APSC) Program for Patients with Type 2 Diabetes Mellitus (제2형 당뇨병 환자를 위한 자동 맞춤형 셀프케어 프로그램 개발)

  • Park, Gaeun;Lee, Haejung;Khang, Ah Reum
    • Journal of Korean Academy of Nursing
    • /
    • v.52 no.5
    • /
    • pp.535-549
    • /
    • 2022
  • Purpose: The study aimed to design and develop an automated personalized self-care (APSC) program for patients with type 2 diabetes mellitus. The secondary aim was to present a clinical protocol as a mixed-method research to test the program effects. Methods: The APSC program was developed in the order of analysis, design, implementation, and evaluation according to the software development life cycle, and was guided by the self-regulatory theory. The content validity, heuristics, and usability of the program were verified by experts and patients with type 2 diabetes mellitus. Results: The APSC program was developed based on goal setting, education, monitoring, and feedback components corresponding to the phases of forethought, performance/volitional control, and self-reflection of self-regulatory theory. Using the mobile application, the participants are able to learn from educational materials, monitor their health behaviors, receive weekly-automated personalized goals and feedback messages, and use an automated conversation system to solve the problems related to self-care. The ongoing two-year study utilizes a mixed method design, with 180 patients having type 2 diabetes mellitus randomized to receive either the intervention or usual care. The participants will be reviewed for self-care self-efficacy, health behaviors, and health outcomes at 6, 12, 18, and 24 months. Participants in the intervention group will be interviewed about their experiences. Conclusion: The APSC program can serve as an effective tool for facilitating diabetes health behaviors by improving patients' self-care self-efficacy and self-regulation for self-care. However, the clinical effectiveness of this program requires further investigation.

Design and Implementation of Efficient Mitigation against Return-oriented Programming (반환 지향 프로그래밍 공격에 대한 효율적인 방어 기법 설계 및 구현)

  • Kim, Jeehong;Kim, Inhyeok;Min, Changwoo;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1018-1025
    • /
    • 2014
  • An ROP attack creates gadget sequences which consist of existing code snippets in a program, and hijacks the control flow of a program by chaining and executing gadget sequences consecutively. Existing defense schemes have limitations in that they cause high execution overhead, an increase in the binary size overhead, and a low applicability. In this paper, we solve these problems by introducing zero-sum defender, which is a fast and space-efficient mitigation scheme against ROP attacks. We find a fundamental property of gadget execution in which control flow starts in the middle of a function without a call instruction and ends with a return instruction. So, we exploit this property by monitoring whether the execution is abused by ROP attacks. We achieve a very low runtime overhead with a very small increase in the binary size. In our experimental results, we verified that our defense scheme prevents real world ROP attacks, and we showed that there is only a 2% performance overhead and a 1% binary size increase overhead in several benchmarks.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.