• Title/Summary/Keyword: Instrumentation and control systems

Search Result 733, Processing Time 0.031 seconds

A Novel 6/5 Switched Reluctance Motor with Short Flux Path: Concept, Design and Analysis

  • Tanujaya, Marully;Lee, Dong-Hee;An, Young-Joo;Ahn, Jin-Woo
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.1 no.1
    • /
    • pp.47-53
    • /
    • 2012
  • A novel 6/5 switched reluctance motor (SRM) with short flux path is presented in this paper. The concept of this proposed motor is a novel SR motor with six stator and five rotor poles. The stator is constructed with three independent and physically separate C-core segments, and the rotor is composed of five poles. This motor, with a new selection for the number of stator/rotor poles, achieves a short flux path, which reduces the magnetomotive force required to drive the motor. To verify the performance of the proposed motor, a comparison with conventional SR motors with the same dimensions is executed. The comparison demonstrates that the proposed motor offers better performance in terms of maximum torque production. Furthermore, Finite Element Analysis (FEA) and Matlab/Simulink software are used to predict and simulate the performance of the proposed motor.

A System for Supporting The Cyber Security Control of I&C System (제어계측 시스템 환경에서의 사이버 보안 통제 지원 시스템)

  • Jung, Hyun-Mi;Kim, Seok-Hun;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.442-448
    • /
    • 2013
  • I&C (Instrumentation & Control) system is different from information system and the security design of the two systems are also different. The modeling activity is needed based on the security control guide in order to build I&C system security control. In this paper, the role and by the security control, we designed the relationship (that is, the relation schema) between the documents for 'The system for supporting the cyber security control of I&C system design' based on the security control guide. The designed schema plans 'The system for supporting the cyber security control of I&C system' for observing the security control guide, and is used as the database and content that supports its design and implementation. The process and system of the proposed schema is utilized and designed. The design of the schema and system is intensified in the design phase with the proposed mode and supporting the I&C system cyber security design.

A Bidirectional Three-phase Push-pull Zero-Voltage Switching DC-DC Converter (양방향 3상 푸쉬풀 ZVS DC-DC 컨버터)

  • Kwon, Min-Ho;Han, Kook-In;Park, Jung-Sung;Choi, Se-Wan
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.18 no.4
    • /
    • pp.403-411
    • /
    • 2013
  • This paper proposes an isolated bidirectional three-phase push-pull dc-dc converter for high power application such as eco-friendly vehicles, renewable energy systems, energy storage systems, and solid-state transformers. The proposed converter achieves ZVS turn-on of all switches and volume of passive components is small by an effect of three-phase interleaving. The proposed converter has identical switching pattern for both boost and buck mode, and therefore can provide seamless characteristic at the mode transition. A 3kW prototype of the proposed converter has been built and tested to verify the validity of the proposed operation.

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju;Chung, Yong-Wha;Moon, Dae-Sung;Pan, Sung-Bum;Seo, Chang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1783-1798
    • /
    • 2011
  • Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.

DSSS-Based Channel Access Technique DS-CDMA for Underwater Acoustic Transmission

  • Lee, Young-Pil;Moon, Yong Seon;Ko, Nak Yong;Choi, Hyun-Taek;Huang, Linyun;Bae, Youngchul
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.53-59
    • /
    • 2015
  • This paper proposes a novel method for acoustically and wirelessly transmitting data underwater with a high transmission rate. The method uses the most promising physical layer and multiple access technique (i.e., the code division multiple channel access technique) to divide the channel into subchannels. Data is transmitted through these subchannels. The codes are pseudo-random noise (PN) sequences. In the spread-spectrum technique, a signal such as electrical, electromagnetic, acoustic signal generated in a particular bandwidth is deliberately spread in the frequency domain, which results in a signal with a wider bandwidth. This paper reviews the possibility of application of the direct-sequence code division multiple access (DS-CDMA) technique in an underwater system using MATLAB. As the result of our review, we recognize that the DS-CDMA technique can be applied to underwater environments.

AN OVERVIEW OF RISK QUANTIFICATION ISSUES FOR DIGITALIZED NUCLEAR POWER PLANTS USING A STATIC FAULT TREE

  • Kang, Hyun-Gook;Kim, Man-Cheol;Lee, Seung-Jun;Lee, Ho-Jung;Eom, Heung-Seop;Choi, Jong-Gyun;Jang, Seung-Cheol
    • Nuclear Engineering and Technology
    • /
    • v.41 no.6
    • /
    • pp.849-858
    • /
    • 2009
  • Risk caused by safety-critical instrumentation and control (I&C) systems considerably affects overall plant risk. As digitalization of safety-critical systems in nuclear power plants progresses, a risk model of a digitalized safety system is required and must be included in a plant safety model in order to assess this risk effect on the plant. Unique features of a digital system cause some challenges in risk modeling. This article aims at providing an overview of the issues related to the development of a static fault-tree-based risk model. We categorize the complicated issues of digital system probabilistic risk assessment (PRA) into four groups based on their characteristics: hardware module issues, software issues, system issues, and safety function issues. Quantification of the effect of these issues dominates the quality of a developed risk model. Recent research activities for addressing various issues, such as the modeling framework of a software-based system, the software failure probability and the fault coverage of a self monitoring mechanism, are discussed. Although these issues are interrelated and affect each other, the categorized and systematic approach suggested here will provide a proper insight for analyzing risk from a digital system.

Implementation of Multiple Connectivity using CANopen in IEEE 1451.0-based Smart Sensor (IEEE 1451.0 기반 스마트 센서에서 CANopen을 이용한 다중 접속 기능의 구현)

  • Park, Jee-Hun;Lee, Suk;Song, Young-Hun;Lee, Kyung-Chang
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.28 no.4
    • /
    • pp.436-445
    • /
    • 2011
  • As automation systems become intelligent and autonomous for productibility, industrial networks (fieldbuses) and network-based devices are essential components of intelligent manufacturing systems. However, there are obstacles for the wide acceptance of the network-based devices such as smart sensor and network-based actuator. First, there exist numerous fieldbus protocols that a network-based device should be able to support. Second, the whole network-based device has to be replaced when only the sensor of the module fails. In order to overcome these obstacles, a smart sensor/actuator is implemented as two units; one responsible for network communication and the other for sensor/actuator operations using IEEE 1451.0 standard. This paper presents a structure of the 1451.0-based smart sensor with multiple connectivity function designed by CANopen.

A METHOD OF ALTERNATIONG NOISE-CENCELING FOR AN INSTRUMENTAION USING A PAIR OF IDENTICAL POTENTIAL TRANSFORMERS

  • Mine, Katsutoshi;Kitazaki, Masato;Wakabayashi, Katsuyoshi;Morimoto, Yuji
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10b
    • /
    • pp.1103-1107
    • /
    • 1990
  • This paper describes a new method of noise-canceling in an instrumentation using a pair of identical Potential Transformers (PT). This method allows us to get reliable signals without any noise, not only on the transmission line, but also on the sensors; even if we do not have a reference noise or a specific noise. In this case "any noise" means normal mode noise (NMN), under a quarter frequency of the switching. We proposed to call this method alternating noise-canceling (ANC). The accuracy of this new method has been verified by experimentations.entations.

  • PDF

Fuzzy Modeling Schemes Using Messy Genetic Algorithms (메시 유전알고리듬을 이용한 퍼지모델링 방법)

  • Kwon, Oh-Kook;Chang, Wook;Joo, Young-Hoon;Park, Jin-Bae
    • Proceedings of the KIEE Conference
    • /
    • 1998.07b
    • /
    • pp.519-521
    • /
    • 1998
  • Fuzzy inference systems have found many applications in recent years. The fuzzy inference system design procedure is related to an expert or a skilled human operator in many fields. Various attempts have been made in optimizing its structure using genetic algorithm automated designs. This paper presents a new approach to structurally optimized designs of FNN models. The messy genetic algorithm is used to obtain structurally optimized fuzzy neural network models. Structural optimization is regarded important before neural network based learning is switched into. We have applied the method to the problem of a time series estimation.

  • PDF

Precision Positioning of a Stationary Transporter Using a Fault Detection and Isolation Method (정적 상태의 이동체 위치 정밀도 향상을 위한 오류 검출 및 배제 기법)

  • An, Jong-Woo;Kim, Yun-Ki;Lee, Jae-Kyung;Lee, Jangmyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.10
    • /
    • pp.859-868
    • /
    • 2016
  • This paper proposes a new global positioning system (GPS) receiver algorithm to improve the positioning accuracy of a transporter using fault detection and isolation techniques from satellite signals. To improve the positioning accuracy, several factors including a feasible number of satellite signals, SNR, NAV Measurement Quality Indicator (mesQI), and Doppler, among others, have been utilized in the proposed algorithm. To increase the number of feasible satellite signals, an erroneous satellite signal has been replaced by the previous one. In conventional approaches, received GPS signals are analyzed and directly determined to be contaminated or not. The only clean signals are utilized for identifying the current location. This fault detection and isolation (FDI) feasibility test is popular for commercial GPS receivers. In the urban environment, especially near a building, the feasible number of satellite signals becomes insufficient to position the transporter. To overcome this problem, satellite signals are efficiently selected and recovered. Additionally, using the proposed GPS receiver algorithm, a feasible number of satellite signals can be increased, thereby improving the positional accuracy. Real world experiments using a transporter that carries blocks in a shipyard have demonstrated the superiority of the proposed algorithm compared to conventional approaches.