• 제목/요약/키워드: Design of Information Systems

검색결과 7,646건 처리시간 0.035초

CAN(Controller Area Network) 프로토콜을 이용한 네트워크 제어시스템 설계 (Design Methodology of Networked Control System using CAN(Controller Area Network) Protocol)

  • 정준홍;최수영;조용석;박기헌
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 하계학술대회 논문집 D
    • /
    • pp.2328-2330
    • /
    • 2003
  • This paper presents a new design methodology of networked control system using CAN(Controller Area Network). Feedback control systems having control loops closed through a network are called networked control systems. We design CAN nodes which can transmit control and monitoring data through network bus and apply these to networked control system design. We analyze the variation of stability property according to network-induced delay and determine a proper sampling period of networked control system that preserves stability performance. The results of the experimental example validate effectiveness of our networked control system.

  • PDF

Optimal Bandwidth Allocation and QoS-adaptive Control Co-design for Networked Control Systems

  • Ji, Kun;Kim, Won-Jong
    • International Journal of Control, Automation, and Systems
    • /
    • 제6권4호
    • /
    • pp.596-606
    • /
    • 2008
  • In this paper, we present a co-design methodology of dynamic optimal network-bandwidth allocation (ONBA) and adaptive control for networked control systems (NCSs) to optimize overall control performance and reduce total network-bandwidth usage. The proposed dynamic co-design strategy integrates adaptive feedback control with real-time scheduling. As part of this co-design methodology, a "closed-loop" ONBA algorithm for NCSs with communication constraints is presented. Network-bandwidth is dynamically assigned to each control loop according to the quality of performance (QoP) information of each control loop. As another part of the co-design methodology, a network quality of service (QoS)-adaptive control design approach is also presented. The idea is based on calculating new control values with reference to the network QoS parameters such as time delays and packet losses measured online. Simulation results show that this co-design approach significantly improves overall control performance and utilizes less bandwidth compared to static strategies.

역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크 (Application Design and Execution Framework in Role-Based Access Control Systems)

  • 이형효;최은복;노봉남
    • 한국정보처리학회논문지
    • /
    • 제6권11호
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

Challenges and opportunities in the engineering of intelligent systems

  • Liu, Shi-Chi;Tomizuka, Masayoshi;Ulsoy, A. Galip
    • Smart Structures and Systems
    • /
    • 제1권1호
    • /
    • pp.1-12
    • /
    • 2005
  • This paper describes the area of intelligent systems research as funded by the Civil and Mechanical Systems (CMS) Division of the National Science Foundation (NSF). With developments in computer science, information technology, sensing and control the design of typical machines and structures by civil and mechanical engineers is evolving toward intelligent systems that can sense, decide and act. This trend toward electro-mechanical design is well-established in modern machines (e.g. vehicles, robots, disk drives) and often referred to as mechatronics. More recently intelligent systems design is becoming an important aspect of structures, such as buildings and bridges. We briefly review recent developments in structural control, including the role that NSF has played in their development, and discuss on-going CMS activities in this area. In particular, we highlight the interdisciplinary initiative on Sensors and Sensor Networks and the Network for Earthquake Engineering Simulation (NEES). NEES is a distributed cyberinfrastructure to support earthquake engineering research, and provides the pioneering NEES grid computing environment for simulation, teleoperation, data collection and archiving, etc.

Design and Implementation of Data Processing Middleware and Management System for IoT based Services

  • Lee, Yon-Sik;Mun, Young-Chae
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권2호
    • /
    • pp.95-101
    • /
    • 2019
  • Sensor application systems for remote monitoring and control are required, such as the establishment of databases and IoT service servers, to process data being transmitted and received through radio communication modules, controllers and gateways. This paper designs and implements database server, IoT service server, data processing middleware and IoT management system for IoT based services based on the controllers, communication modules and gateway middleware platform developed. For this, we firstly define the specification of the data packet and control code for the information classification of the sensor application system, and also design and implement the database as a separate server for data protection and efficient management. In addition, we design and implement the IoT management system so that functions such as status information verification, control and modification of operating environment information of remote sensor application systems are carried out. The implemented system can lead to efficient operation and reduced management costs of sensor application systems through site status analysis, setting operational information, and remote control and management.

2축 소형 구동기 판 스프링의 동특성 개선 (Dynamic Characteristic Improvement of the Plate Spring in a 2-axis Small Sized Actuator)

  • 박순옥;유정훈;박노철
    • 정보저장시스템학회논문집
    • /
    • 제5권1호
    • /
    • pp.14-18
    • /
    • 2009
  • This paper proposed an optimal plate spring design for the optical image stabilizer in mobile phones. The voice-coil motor (VCM) with plate spring is the smallest, lowest-cost solution for auto focus on the market today and it is also the simplest to implement. The VCM is selected in this paper for auto focusing. However, the design process is complex due to the many design variables coupled to each other and some constraints of each directional motion caused by the characteristics of plate spring. Because of the complex formulation of the design objective, a plate spring design is proposed through the design of experiments to find the optimal design satisfying design constraints.

  • PDF

효율적 코드변환 알고리즘에 기반한 PLC 의 체계적 설계 (Systematic Design of Programmable Logic Controller Based on Efficient Code Conversion Algorithm)

  • 차종호;조광현
    • 제어로봇시스템학회논문지
    • /
    • 제7권12호
    • /
    • pp.1009-1014
    • /
    • 2001
  • The ladder diagram (LD) for programmable logic controllers (PLCs) ar responsible for much important roles in advance industrial automation. As automated systems become more complex the design procedures of the system become more difficult as well. Hence. the design automation issues based on discrete event models(DEMs) are receiving more attention. One of the popular ways of tackling these problems is employing Petri nets. In this paper, we use the modified automation Petri net(MAPN) to model the manufacturing system and the modified token passing logic (MTPL) method conversion (ECC) algorithm based on the MAPN and the MTPL Finally, an example of the manufacturing system is provided to illustrate the proposed ECC algorithm.

  • PDF

고속통신시스템의 신호충실성을 고려한 신호경로 설계 방법 (Design Methodologies of High-speed Communication System with Signal Integrity)

  • 박종대;박영호;남상식
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(1)
    • /
    • pp.279-282
    • /
    • 2000
  • As digital systems continue to use components with faster edge rates and clock speeds, transmission of the digital information in these systems approaches the microwave realm. At these speeds digital signal fidelity becomes both a critical success factor and design challenge. The noise sources in digital systems include the noise in power supply, ground and packaging media due to simultaneous switching of drivers, signal reflections and distortions on single and multiple transmission lines. This paper presents theory, case studies and design considerations of gigabit interconnection for network and communication systems. The case studies show HSPICE and Ampredictor simulations of alternate approaches. Various subjects including skin effect and dielectric losses, interconnect simulations and crosstalks of connector, affected signal discontinuity, are addressed.

  • PDF

Empirical Risk Assessment in Major Graphical Design Software Systems

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • 제8권4호
    • /
    • pp.259-266
    • /
    • 2021
  • Security vulnerabilities have been reported in major design software systems such as Adobe Photoshop and Illustrator, which are recognized as de facto standard design tools in most of the design industries. Companies need to evaluate and manage their risk levels posed by those vulnerabilities, so that they could mitigate the potential security bridges in advance. In general, security vulnerabilities are discovered throughout their life cycles repeatedly if software systems are continually used. Hence, in this study, we empirically analyze risk levels for the three major graphical design software systems, namely Photoshop, Illustrator and GIMP with respect to a software vulnerability discovery model. The analysis reveals that the Alhazmi-Malaiya Logistic model tends to describe the vulnerability discovery patterns significantly. This indicates that the vulnerability discovery model makes it possible to predict vulnerability discovery in advance for the software systems. Also, we found that none of the examined vulnerabilities requires even a single authentication step for successful attacks, which suggests that adding an authentication process in software systems dramatically reduce the probability of exploitations. The analysis also discloses that, for all the three software systems, the predictions with evenly distributed and daily based datasets perform better than the estimations with the datasets of vulnerability reporting dates only. The observed outcome from the analysis allows software development managers to prepare proactively for a hostile environment by deploying necessary resources before the expected time of vulnerability discovery. In addition, it can periodically remind designers who use the software systems to be aware of security risk, related to their digital work environments.