• Title/Summary/Keyword: Design of Information Systems

Search Result 7,646, Processing Time 0.046 seconds

A Behavioral Analysis of an Interpolation I]R Inter and Sigma Delta DAC for ADSL Applications

  • Kim, Sun-Hong;Son, Ju-Ho;Park, Seok-Woo;Kim, Dong-Yong;Yun, Chang-Hun
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.231-234
    • /
    • 2002
  • A transceiver for ADSL systems contains an interpolated combfilter, halfband filters, oversampling sigma delta modulator, a current steering DAC and an analog filler. The circuit complexity of the architecture makes it necessary to use behavioral models to determine the system features. For this reason, we need a specific behavioral simulation environment using the Matlab program. The Matlab is crucial for these circuits to be rapidly incorporated in larger systems, in particular in the context of mixed-signal-test schemes. Design trade-off among the blocks has also been discussed. The design methodology is based on behavioral design and CMOS process.

  • PDF

Design of a Low-Order Sensorless Controller by Robust H∞ Control for Boost Converters

  • Li, Xutao;Chen, Minjie;Shinohara, Hirofumi;Yoshihara, Tsutomu
    • Journal of Power Electronics
    • /
    • v.16 no.3
    • /
    • pp.1025-1035
    • /
    • 2016
  • Luenberger observer (LO)-based sensorless multi-loop control of a converter requires an iterative trial-and-error design process, considering that many parameters should be determined, and loop gains are indirectly related to the closed-loop characteristics. Robust H∞ control adopts a compact sensorless controller. The algebraic Riccati equation (ARE)-based and linear matrix inequality (LMI)-based H∞ approaches need an exhaustive procedure, particularly for a low-order controller. Therefore, in this study, a novel robust H∞ synthesis approach is proposed to design a low-order sensorless controller for boost converters, which need not solve any ARE or LMI, and to parameterize the controller by an adjustable parameter behaving like a "knob" on the closed-loop characteristics. Simulation results show the straightforward closed-loop characteristics evaluation and better dynamic performance by the proposed H∞ approach, compared with the LO-based sensorless multi-loop control. Practical experiments on a digital processor confirmed the simulation results.

Verification for the design limit margin of the power device using the HALT reliability test

  • Chang, YuShin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.67-74
    • /
    • 2018
  • The verification for the design limit margin of the power device for the information communication and surveillance systems using HALT(Highly Accelerated Life Test) reliability test is described. The HALT reliability test performs with a step stress method which change condition until the marginal step in a design and development phase. The HALT test methods are the low temperature(cold) step stress test, the high temperature(hot) step stress test, the thermal shock cyclic stess test, and the high temperature destruct limit(hot DL) step stress test. The power device is checked the operating performance during the test. In this paper, the HALT was performed to find out the design limit margin of the power device.

FEED Framework Development for Designing Supercritical Carbon Dioxide Power Generation System (초임계 이산화탄소 발전시스템 설계를 위한 FEED(Front End Engineering Design) 프레임워크 개발)

  • Kim, Joon-Young;Cha, Jae-Min;Park, Sungho;Yeom, Choongsub
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.13 no.2
    • /
    • pp.65-74
    • /
    • 2017
  • Supercritical carbon dioxide power system is the next generation electricity technology expected to be highly developed. The power system can improve net efficiency, simplify cycle configuration, and downsize equipment compared to conventional steam power system. In order to dominate the new market in advance, it is required to found Front End Engineering Design (FEED) Framework of the system. Therefore, this study developed the FEED framework including design processes for the supercritical carbon dioxide power system, information elements for each process, and relationships for each element. The developed FEED framework is expected to be able to secure systematic technological capabilities by establishing a common understanding and perspective among multi-field engineers participating in the design.

The Priority of Internal Control Factors for Information Systems based on Individual Characteristics (개인 특성에 따른 정보시스템 내부통제요소 중요도에 관한 연구)

  • 박종은;이우형;이명호
    • Korean Management Science Review
    • /
    • v.21 no.1
    • /
    • pp.57-76
    • /
    • 2004
  • The development of informational technology has lead to a sharp change in not only the existing way of operations and management, but the way of human life or thinking as well. Those shifts of the paradigm in information technology have also affected Individuals to the organizational structure. A series of unexpected problems was, however, accompanied by the advance in informational technology, which had broaden its own area of application. Those problems include the losses of property or data the malfunction of systems and their wastefulness would result in, continuous increases in computer crimes, reliability and efficiency of the functional process with the development of information systems, such as the processing problems of inaccurate data, economical issues, and subjects related to safety, as interruptions of privacy, which would result from lots of one's exposure to the drains of personal information. Accordingly, Auditors' roles of information systems, for now, is more important than anything else in that they are responsible for the objective assessment of relevance and effectiveness of internal control systems under the environment of information systems. The objective of the study is, so as to obtain safety of information systems: First, to provide data to line-design internal control systems after finding internal control factors to prevent and eliminate the risks of information systems. Second, to evaluate the priorities of internal control factors with their effective management being considered as the key to settle the problems of risks of information systems. Third, to discriminate what factors affect In evaluating the relative degrees of Importance of internal control factors.

On a Design Verification of the Pipelined Digital System Using SMV (SMV를 이용한 Pipeline 시스템의 설계 검증)

  • 이승호;이현룡;장종건
    • Proceedings of the IEEK Conference
    • /
    • 2003.07b
    • /
    • pp.939-942
    • /
    • 2003
  • Design verification problem is emerging as an important issue to detect any design errors at the early stage of the design. Conventionally, design verifications have been done using a simulation technique. However, this technique has been proved not to cover all potential design errors. Therefore, formal technique is often used to verify digital circuits as an alternative. In this paper we adopted formal verification technique and verified some important properties derived from our pipelined digital systems, using SMV (Symbolic Model Verifier). Our example shows that model checking method (one of formal verification techniques) can be effectively performed in verifying the large digital systems.

  • PDF

Concepts and Design Aspects of Granular Models of Type-1 and Type-2

  • Pedrycz, Witold
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.2
    • /
    • pp.87-95
    • /
    • 2015
  • In this study, we pursue a new direction for system modeling by introducing the concept of granular models, which produce results in the form of information granules (such as intervals, fuzzy sets, and rough sets). We present a rationale and several key motivating arguments behind the use of granular models and discuss their underlying design processes. The development of the granular model includes optimal allocation of information granularity through optimizing the criteria of coverage and specificity. The emergence and construction of granular models of type-2 and type-n (in general) is discussed. It is shown that achieving a suitable coverage-specificity tradeoff (compromise) is essential for developing granular models.

Design of the Scalable Naval Combat System Software using Abstraction and Design Pattern

  • Kwon, Ki-Tae;Kim, Ki-Pyo;Choi, HwanJun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.101-108
    • /
    • 2019
  • In this paper, we propose a new scalable and reliable combat system software in battleship which was developed procedurally in the past. Recently, combat system software is required to change frequently due to addition of new equipment and change of function. To solve those problems, this paper propose how to change combat system software into scalable software using class structure change and design pattern. Simulation results show that our scheme provides better performances and reliability than conventional scheme. Therefore proposed scheme can be efficiently used in Naval combat system.

Unidirectional AGVS Flowpath Design using Tabu Search (타부탐색을 이용한 AGVS 일방향 흐름경로 설계)

  • Moon, Young-Hoon;Seo, Yoon-Ho
    • IE interfaces
    • /
    • v.17 no.spc
    • /
    • pp.97-102
    • /
    • 2004
  • AGV flowpath layout design is one of the most important steps for efficient AGV systems design. Since it was formulated by Gaskins & Tanchoco (1987), a unidirectional AGV flowpath layout design problem has been tackled by many researchers. However, the solution methods were traded off between the solution quality and the computational time. In this paper, a tabu search technique is applied to obtain a good solution for a relatively large problem in reasonable computational time. Specifically, fast construction algorithm for feasible initial solutions, long-term memory structure and neighbor solutions generation are adapted to the problem characteristics and embedded in the tabu search algorithm. Also, sets of computational experiments show that the proposed tabu search algorithm outperforms to the Ko and Egbelu's algorithm (2003).