• Title/Summary/Keyword: ISA system

Search Result 114, Processing Time 0.025 seconds

A Design and Implementation of 32-bit Five-Stage RISC-V Processor Using FPGA (FPGA를 이용한 32-bit RISC-V 5단계 파이프라인 프로세서 설계 및 구현)

  • Jo, Sangun;Lee, Jonghwan;Kim, Yongwoo
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.4
    • /
    • pp.27-32
    • /
    • 2022
  • RISC-V is an open instruction set architecture (ISA) developed in 2010 at UC Berkeley, and active research is being conducted as a processor to compete with ARM. In this paper, we propose an SoC system including an RV32I ISA-based 32-bit 5-stage pipeline processor and AHB bus master. The proposed RISC-V processor supports 37 instructions, excluding FENCE, ECALL, and EBREAK instructions, out of a total of 40 instructions based on RV32I ISA. In addition, the RISC-V processor can be connected to peripheral devices such as BRAM, UART, and TIMER using the AHB-lite bus protocol through the proposed AHB bus master. The proposed SoC system was implemented in Arty A7-35T FPGA with 1,959 LUTs and 1,982 flip-flops. Furthermore, the proposed hardware has a maximum operating frequency of 50 MHz. In the Dhrystone benchmark, the proposed processor performance was confirmed to be 0.48 DMIPS.

A study on the uncertainty of setpoint for reactor trip system of NPPs considering rectangular distributions

  • Youngho Jin;Jae-Yong Lee;Oon-Pyo Zhu
    • Nuclear Engineering and Technology
    • /
    • v.56 no.5
    • /
    • pp.1845-1853
    • /
    • 2024
  • The setpoint of the reactor trip system shall be set to consider the measurement uncertainty of the instrument channel and provide a reasonable and sufficient margin between the analytical limit and the trip setpoint. A comparative analysis was conducted to find out an appropriate uncertainty combination method through an example problem. The four methods were evaluated; 1) ISA-67.04.01 method, 2) the GUM95 method, 3) the modified GUM method developed by Fotowicz, and 4) the modified IEC61888 method proposed by authors for the pressure instrument channel presented in ISA-RP67.04.02 example. The appropriateness of each method was validated by comparing it with the result of Monte Carlo simulation. As a result of the evaluation, all methods are appropriate when all measurement uncertainty elements are normally distributed as expected. But ISA-67.04 method and GUM95 method overestimated the channel uncertainty if there is a dominant input element with rectangular distribution among the uncertainty input elements. Modified GUM95 methods developed by Fotowicz and modified IEC61888 method by authors are able to produce almost the same level of channel uncertainty as the Monte Carlo method, even when there is a dominant rectangular distribution among the uncertainty components, without computer-assisted simulations.

An Automated Management System for MUF (초음파 다 회선 유량계(MUF)의 무인 관리 시스템 개발)

  • Kim, Hyung-Chul;Jang, Hyuk-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.971-974
    • /
    • 2003
  • 본 논문은 초음파 다 회선 유량계로부터 추출된 정밀 정보를 활용하여 무인 관리 시스템을 개발하였다. 성능을 최대한 발휘 할 수 있도록 LabVIEW라는 그래픽 기반의 프로그래밍 언어를 사용하였고 IsaTrol, IsaGrape와 같은 장비로부터 추출한 디지털 데이터를 컴퓨터로 전송하는 플랫폼을 완성하였다.

  • PDF

Performance and Heat Tolerance of Broilers as Affected by Genotype and High Ambient Temperature

  • Al-Batshan, H.A.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.15 no.10
    • /
    • pp.1502-1506
    • /
    • 2002
  • This experiment was conducted to evaluate the effects of the broiler's genotype ($G_t$) and ambient temperature ($T_a$) on performance and core body temperature ($T_core$) of broiler chicks. A factorial arrangement of two $G_t$ (Hubbard and ISA J57 chicks) and two $T_a$ (moderate, $23{\pm}0.5^{\circ}C$ and hot, $33{\pm}0.5^{\circ}C$) were used in this study. Performance data (body weight gain, feed intake and feed:gain ratio) were determined weekly for six weeks. Chicks' $T_core$ was measured using a biotelemetric system between Weeks five and six. Results showed that body weight gain and feed intake were significantly high, and feed:gain ratio was significantly low for Hubbard chicks compared to those of ISA J57 chicks. High $T_a$ significantly reduced weight gain and feed intake. Furthermore, the reduction in body weight gain and feed intake under the hot $T_a$ was more pronounced for Hubbard chicks than those of the ISA J57 chicks resulting in significant $G_t$ by $T_a$ interaction. Chicks grown under moderate $T_a$ had significantly lower $T_core$ than those grown under hot $T_a$. The $T_core$ of the Hubbard chicks was significantly lower than that of the ISA J57 at the moderate $T_a$ while under the hot $T_a$, the magnitude of the change in $T_core$ was more pronounced in Hubbard chicks than that of ISA J57; this resulted in a significant $G_t$ by $T_a$ interaction. The results of this study indicate that chicks with higher potential for growth under thermo-neutral temperature are more susceptible to heat stress than chicks with lower potential for growth. This maybe due, at least in part, to their lower body $T_core$ under moderate temperature and to the lesser ability of these fast growing chicks to regulate their $T_core$ when exposed to heat stress, as was clearly shown on these birds' performance.

Security Threats Analysis and Security Requirement for Industrial Wireless Protocols : ISA 100.11a and WirelessHART (ISA 100.11a 및 WirelessHART 기반 보안위협 식별 및 보안요구사항 도출 연구)

  • Jeong, Jae-Han;Kwon, Sung-Moon;Shon, Tae-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1063-1075
    • /
    • 2019
  • In recent years, industrial automation has been established and WISN (Wireless Industrial Sensor Network) has been introduced for efficient system management. By introducing WISN, many engineering costs have been reduced and process processors have been optimized. And communication flow using wireless is increasing. An empirical study on industrial wireless sensor networks is actively conducted, but there are few security studies on them and they are exposed to such threats. If there is a problem with the standard of the wireless communication protocol itself, the device that is certified according to the standard may also be subject to security threats including problems. We analyze security functions and threats of ISA 100.11a and WirelessHART protocol stack based on standards. Procedures for distributing the security key are not provided or it is vulnerable using the Global Data Link key when the device enters the network. This paper presents the problems of the standard itself and presents the security requirements accordingly.

A Study on the Evaluation and Improvement of the Korean National Assembly Digital Library by Applying ISA(Importance-Satisfaction Analysis) (ISA를 적용한 국회전자도서관 품질 평가와 개선방안 수립)

  • Kwak, Seung-Jin;Jung, Young-Mi;Kim, Jin-Mook;Bae, Kyung-Jae;Im, Mi-Kyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.3
    • /
    • pp.327-343
    • /
    • 2011
  • The goal of this study was to examine ways to improve the quality of databases of the Korean National Assembly Digital Library(KNADL). In order to achieve the goal, we first designed an assessment tool that could measure the quality of the 'contents,' the 'service,' and the 'system' of the KNADL's databases. Each of the three categories also had sub-categories-i.e., eight sub-categories for 'contents'(e.g., accuracy, recency, ${\cdots}$), seven sub-categories for 'service'(e.g., convenience for request, rapid response, ${\cdots}$), and seven sub-categories for 'system'(e.g., usability, response time, ${\cdots}$). We thenconducted a survey using the assessment tool we developed and gathered a total of 270 responses from users of KNADL's databases. We used Excel and PASW Statistics 18 for data analysis. Each sub-category was measured by its importance and by the level of satisfaction(implemented from the DigiQUAL project). Finally, we performed an importance-satisfaction analysis(ISA) to identify what action(i.e., maintain, concentrate, low priority, and exceed) needs to be made in each sub-category. We concluded the paper with some useful suggestions for improving the quality of KNADL's databases.

A Study on the Fault Detection of an Integrated Servo Actuator (통합 서보 액츄에이터의 고장 감지시스템 연구)

  • 신기현;임광호
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1996.11a
    • /
    • pp.306-312
    • /
    • 1996
  • The performance of the failure detection algorithm may be greatly influenced by the model uncertainty. It is very important to design a robust failure detection system to the model uncertainty. In this paper, a design procedure to generate failure detection algorithm is proposed. The design procedure suggested is based on the concept of the‘threshold selector[1]’. The H$\infty$ control algorithm is used to derive a threshold selector which is robust to the model uncertainty, The threshold selector derived can be used to develop a failure detection system together with the weighted cumulative sum algorithm[3]. Computer simulation study showed that the failure detection system designed for an ISA(Integrated Servo Actuator) system by using the proposed method is robust to the model uncertainty.

  • PDF

A Study on Cyber Security Threat and Security Requirements for Industrial Wireless Communication Devices (산업용 무선통신기기 사이버 보안위협 및 보안요구사항에 관한 연구)

  • Lee, Jiseop;Park, Kyungmi;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.757-770
    • /
    • 2020
  • Industrial Control System(ICS) is a system that measures, monitors, and controls various distributed assets, and is used in industrial facilities such as energy, chemical, transportation, water treatment, and manufacturing plants or critial infrastructure. Because ICS system errors and interruptions can cause serious problem and asset damage, research on prevention and minimization of security threats in industrial control systems has been carried out. Previously wireless communication was applied in limited fields to minimize security risks, but the demand for industrial wireless communication devices is increasing due to ease of maintenance and cost advantages. In this paper, we analyzed the security threats of industrial wireless communication devices supporting WirelessHART and ISA100.11a. Based on the analysis results, we proposed the security requirements for adopting and operating industrial wireless communication devices. We expect that the proposed requirements can mitigate security threats of industrial wireless devices in ICS.

A Systematic Method for Independent Safety Assessment of Railway System by Applying NOR-STA Tool (NOR-STA 도구를 활용한 체계적 철도시스템 독립안전성 평가 방안)

  • Jung Kyou Um;Peom Park;Young Min Kim
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.1
    • /
    • pp.29-38
    • /
    • 2023
  • Independent Safety Assessment (ISA) is a third-party assessment that is to confirm that the system satisfies the safety requirements in the defined operational context. The process of this assessment often brings about many complex arguments that should be supported by evidence and justification. The communication between arguments and evidence is of the most importance in the context of safety case. This study illustrates how NOR-STA can be used for ISA process, showing the effective structure of safety compliance. The study outlines the steps to breaks down the top goal into many elements such as arguments, sub-goals, justification, context and assumptions. It concludes that the evidence-based safety conformance process utilizing NOR-STA provides a more effective and systematic representation of the independent safety assessment process in conformance cases.

Changes and Influences of Stream Water Quantity due to Urbanization: Focusing on Urban Streams in Gyeonggi-do (도시화에 따른 하천수량 변화 및 영향_경기도 도심하천을 중심으로)

  • Noh, Huiseong;Jo, Dongho;Kim, Yonsoo;Ahn, Taejin
    • Journal of Wetlands Research
    • /
    • v.19 no.4
    • /
    • pp.491-500
    • /
    • 2017
  • Stream water quantity is the most basic, fundamental and important element for stream water quality and for conservation of ecological environment. This study aims to analyze causes of changes in stream water quantity based on the percentage of impervious surface area (%ISA) in urban streams of Gyeonggi-do, and also to present a method to secure water quantity of urban streams in Gyeonggi-do and data to be applied to River Management Policy. For this purpose, the Anyangcheon watershed, the Tancheon watershed, and the Osancheon watershed were selected as samples of the urban streams. In addition, the stream water quantity and the changes in stream water quality which were based on the amount of ISA, and methods to directly and indirectly secure stream water quantity were investigated. The results are as follows. The amounts of ISA of the Anyangcheon watershed, of the Tancheon watershed, and of the Osancheon watershed showed a 5.32%, 6.32%, and 7.22% increase, respectively, from 2014 which was approximately 10 years ago. The runoff coefficient generally increased as the amount of ISA was increased. Water reuse quantity of stream in the Tanchon watershed had a positive effect on securing stream water quantity, but both in the Anyangcheon watershed and in the Osancheon watershed, it did not have a positive effect on that. However, water reuse quantity of stream improved the water quality of each stream.