• Title/Summary/Keyword: Critical control systems

Search Result 713, Processing Time 0.029 seconds

Development of Kalman Hybrid Redundancy for Sensor Fault-Tolerant of Safety Critical System (Safety Critical 시스템의 센서 결함 허용을 위한 Kalman Hybrid Redundancy 개발)

  • Kim, Man-Ho;Lee, Suk;Lee, Kyung-Chang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.11
    • /
    • pp.1180-1188
    • /
    • 2008
  • As many systems depend on electronics, concern for fault tolerance is growing rapidly in the safety critical system such as intelligent vehicle. In order to make system fault tolerant, there has been a body of research mainly from aerospace field including predictive hybrid redundancy by Lee. Although the predictive hybrid redundancy has the fault tolerant mechanism to satisfy the fault tolerant requirement of safety crucial system such as x-by-wire system, it suffers form the variability of prediction performance according to the input feature of system. As an alternative to the prediction method of predictive hybrid redundancy for robust fault tolerant, Kalman prediction has attracted some attention because of its well-known and often-used with its structure called Kalman hybrid redundancy. In addition, several numerical simulation results are given where the Kalman hybrid redundancy outperforms with predictive smoothing voter.

Implementation of FlexRay Network System for Distributed Systems of Intelligent Vehicle (지능형 자동차의 분산형 시스템을 위한 FlexRay 네트워크 시스템의 구현)

  • Ha, Kyoung-Nam;Lee, Won-Seok;Lee, Kyung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.10
    • /
    • pp.933-939
    • /
    • 2007
  • Safety critical systems such as x-by-wire systems require in-vehicle network systems that can interconnect various sensors, actuators, and controllers. These networks need to have high data rate, deterministic operation, and fault tolerance. Recently, FlexRay protocol that is a time-triggered protocol has been introduced, and many automotive companies have been focusing on this protocol. This paper presents a design method of FlexRay network system and implementation of FlexRay-based motor control system.

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Park, Gee-Yong;Kwon, Kee-Choon;Lee, Dong-Young;Lee, Cheol-Kwon
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.637-652
    • /
    • 2013
  • Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security.. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

Simple Two-Degree of Freedom PID Controllers Tuning Table Based on CDM

  • Benjanarasuth, Taworn;Ngamwiwit, Jongkol;Komine, Noriyuki
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.256-261
    • /
    • 2004
  • This paper presents a simple two-degree of freedom PID tuning table based on the CDM design method. The structure of the control system will be composed of plant, P or PI or PID controller and a pre-filter. The finalized formula can be used based on the experimental test of the plant in the same manner as the Ziegler-Nichols' second method. That is; users just need to find the critical gain and critical period experimentally and the parameters of the P, PI or PID controller with the pre-filter can be obtained by substituting the values of critical gain and critical period in the tuning table. The simulation results of the control systems utilizing the proposed controllers compared with those using the Ziegler-Nichols' second method will also be demonstrated.

  • PDF

Safety Evaluation on Real Time Operating Systems for Safety-Critical Systems (안전필수(Safety-Critical) 시스템의 실시간 운영체제에 대한 안전성 평가)

  • Kang, Young-Doo;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3885-3892
    • /
    • 2010
  • Safety-Critical systems, such as Plant Protection Systems in nuclear power plant, plays a key role that the facilities can be operated without undue risk to the health and safety of public and environment, and those systems shall be designed, fabricated, installed, and tested to quality standards commensurate with the importance of the functions to be performed. Computer-based Instrumentation and Control Systems to perform the safety-critical function have Real Time Operating Systems to control and monitoring the sub-system and executing the application software. The safety-critical Real Time Operating Systems shall be designed, analyzed, tested and evaluated to have capability to maintain a high integrity and quality. However, local nuclear power plants have applied the real time operating systems on safety critical systems through Commercial Grade Item Dedication method, and this is the reason of lack of detailed methodology on assessing the safety of real time operating systems, expecially to the new developed one. This paper presents the methodology and experiences of safety evaluation on safety-critical Real Time Operating Systems based upon design requirements. This paper may useful to develop and evaluate the safety-critical Real Time Operating Systems in other industry to ensure the safety of public and environment.

Predictive Hybrid Redundancy using Exponential Smoothing Method for Safety Critical Systems

  • Kim, Man-Ho;Lee, Suk;Lee, Kyung-Chang
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.1
    • /
    • pp.126-134
    • /
    • 2008
  • As many systems depend on electronics, concern for fault tolerance is growing rapidly. For example, a car with its steering controlled by electronics and no mechanical linkage from steering wheel to front tires (steer-by-wire) should be fault tolerant because a failure can come without any warning and its effect is devastating. In order to make system fault tolerant, there has been a body of research mainly from aerospace field. This paper presents the structure of predictive hybrid redundancy that can remove most erroneous values. In addition, several numerical simulation results are given where the predictive hybrid redundancy outperforms wellknown average and median voters.

Fault Tree Analysis and Failure Mode Effects Analysis for Software Security Improvements in Mobile Banking Information Systems (모바일 뱅킹 정보시스템의 소프트웨어 보안성 개선을 위한 고장 트리 분석과 고장 유형 영향 분석)

  • Kim, So Young;Kim, Myong Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1342-1350
    • /
    • 2015
  • Due to rapid development of mobile device technologies, the mobile banking through Internet has become a major service of banking information systems as a security-critical information systems. Recently, lots of mobile banking information systems which handle personal and transaction information have been exposed to security threats in vulnerable security control and management processes, mainly software systems. Therefore, in this paper, we propose a process model for software security improvements in mobile banking information system by application of fault tree analysis(FTA) and failure modes and effects analysis(FMEA) on the most important activities such as 'user authentication' and 'access control' and 'virus detection and control' processes which security control and management of mobile banking information systems are very weak.

Fault Diagnosis and Tolerance for Asynchronous Counters with Critical Races Caused by Total Ionizing Dose in Space (우주 방사능 누적에 의한 크리티컬 레이스가 존재하는 비동기 카운터를 위한 고장 탐지 및 극복)

  • Kwak, Seong-Woo;Yang, Jung-Min
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.49-55
    • /
    • 2012
  • Asynchronous counters, where the counter value is changed not by a synchronizing clock but by outer inputs, are used in various modern digital systems such as spaceborne electronics. In this paper, we propose a scheme of fault tolerance for asynchronous counters with critical races caused by total ionizing dose (TID) in space. As a typical design flaw of asynchronous digital circuits, critical races cause an asynchronous circuit to show non-deterministic behavior, i.e., the next stable state of a state transition is not a fixed value but may be any value of a state set. Using the corrective control scheme for asynchronous sequential machines, this paper provides an existence condition and design procedure for a state feedback controller that can invalidate the effect of critical races. We implement the proposed control system in VHDL code and conduct experiments to demonstrate that the proposed control system can overcome critical races.

Toward the Application of a Critical-Chain-Project-Management-based Framework on Max-plus Linear Systems

  • Takahashi, Hirotaka;Goto, Hiroyuki;Kasahara, Munenori
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.3
    • /
    • pp.155-161
    • /
    • 2009
  • We focus on discrete event systems with a structure of parallel processing, synchronization, and no-concurrency. We use max-plus algebra, which is an effective approach for controller design for this type of system, for modeling and formulation. Since a typical feature of this type of system is that the initial schedule is frequently changed due to unpredictable disturbances, we use a simple model and numerical examples to examine the possibility of applying the concepts of the feeding buffer and the project buffer of critical chain project management (CCPM) on max-plus linear discrete event systems in order to control the occurrence of an undesirable state change. The application of a CCPM-based framework on a max-plus linear discrete event system was proven to be effective.

Microbial Modeling in Quantitative Risk Assessment for the Hazard Analysis and Critical Control Point (HACCP) System: A Review

  • Min, Sea-Cheol;Choi, Young-Jin
    • Food Science and Biotechnology
    • /
    • v.18 no.2
    • /
    • pp.279-293
    • /
    • 2009
  • Quantitative risk assessments are related to implementing hazard analysis and critical control points (HACCP) by its potential involvement in identifying critical control points (CCPs), validating critical limits at a CCP, enabling rational designs of new processes, and products to meet required level of safety, and evaluating processing operations for verification procedures. The quantitative risk assessment is becoming a standard research tool which provides useful predictions and analyses on microbial risks and, thus, a valuable aid in implementing a HACCP system. This paper provides a review of microbial modeling in quantitative risk assessments, which can be applied to HACCP systems.