• Title/Summary/Keyword: control data

Search Result 25,172, Processing Time 0.048 seconds

New Database Table Design Program of Real Time Network for High Speed Train

  • Cho, Chang-Hee;Park, Min-Kook;Kwon, Soon-Man;Kim, Yong-Ju;Kim, Sung-Shin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2164-2168
    • /
    • 2003
  • Real time control system such as in factory automation fields, defense field, aerospace, railway industries, financial trading and so forth, includes multiple computers on multiple nodes, and share data to process various actions and functions. This is similar to multitasking in a multiprocessor computer system. The task processing efficiency of such system is proportionally increased by process speed of each process computer. And also it is greatly influenced by communication latencies of each node. To provide proper operation of such real time system, a network that can guarantee deterministic exchange of certain amount of data within a limited time is required. Such network is called as a real time network. As for modern distributed control system, the timeliness of data exchange gives important factor for the dynamics of entire control system. In a real time network system, exchanged data are determined by off-line design process to provide the timeliness of data. In other word, designer of network makes up a network data table that describes the specification of data exchanged between control equipments. And by this off-line design result, the network data are exchanged by predetermined schedule. First, this paper explains international standard real time network TCN (Train Communication Network) applied to the KHST (Korean High Speed Train) project. And then it explains the computer program developed for design tool of network data table of TCN.

  • PDF

Universal Description of Access Control Systems

  • Karel Burda
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.43-53
    • /
    • 2024
  • Access control systems are used to control the access of people to assets. In practice, assets are either tangible (e.g. goods, cash, etc.) or data. In order to handle tangible assets, a person must physically access the space in which the assets are located (e.g. a room or a building). Access control systems for this case have been known since antiquity and are based either on mechanical locks or on certificates. In the middle of the 20th century, systems based on electromagnetic phenomena appeared. In the second half of the same century, the need to control access to data also arose. And since data can also be accessed via a computer network, it was necessary to control not only the access of persons to areas with data storage, but also to control the electronic communication of persons with these storage facilities. The different types of the above systems have developed separately and more or less independently. This paper provides an overview of the current status of different types of systems, showing that these systems are converging technologically based on the use of electronics, computing and computer communication. Furthermore, the terminology and architecture of these systems is expanded in the article to allow a unified description of these systems. The article also describes the most common types of access control system configurations.

A Microcomputer-Based Data Acquisition/Control System for Engine Performance Test(I) -Automation of Engine Performance Test and Data Acquisition- (마이크로컴퓨터를 이용한 엔진성능시험(性能試驗)의 자동화(自動化)에 관한 연구(硏究)(I) -엔진성능시험(性能試驗)과 데이터수집(蒐集)의 자동화(自動化)-)

  • Ryu, K.H.;Chung, C.J.;Park, B.S.
    • Journal of Biosystems Engineering
    • /
    • v.12 no.3
    • /
    • pp.7-16
    • /
    • 1987
  • This study was carried out to develop a microcomputer-based data acquisition and control system which was able to collect the data of engine performance test automatically and control the speed and load of the engine. The results of the study are summarized as follows: 1. The signal processing devices, which were able to measure cylinder pressure, coolant temperature, compositions of exhaust gas, fuel consumption, engine rpm and torque etc., were developed. The results of calibration showed that all of devices had high accuracy ranging from 0.3% to 0.69% respectively. 2. The PIA (peripheral interface adapter) for interfacing digital signal and PTM (programmable timer module) for displaying real time every 0.0408 sec were designed and developed. 3. An engine-speed control system using a stepping motor and driver was developed. The control system had the stability, and faster settling time than the manual control system. 4. The automatic control system of electrical dynamometer, which was able to control the speed and load of dynamometer, was developed with a SSD (shackleton system driver) and D/A converter. 5. The computer programs, which were able to collect and process the data of engine tests, were developed using both the machine language and BASIC.

  • PDF

A cross-domain access control mechanism based on model migration and semantic reasoning

  • Ming Tan;Aodi Liu;Xiaohan Wang;Siyuan Shang;Na Wang;Xuehui Du
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1599-1618
    • /
    • 2024
  • Access control has always been one of the effective methods to protect data security. However, in new computing environments such as big data, data resources have the characteristics of distributed cross-domain sharing, massive and dynamic. Traditional access control mechanisms are difficult to meet the security needs. This paper proposes CACM-MMSR to solve distributed cross-domain access control problem for massive resources. The method uses blockchain and smart contracts as a link between different security domains. A permission decision model migration method based on access control logs is designed. It can realize the migration of historical policy to solve the problems of access control heterogeneity among different security domains and the updating of the old and new policies in the same security domain. Meanwhile, a semantic reasoning-based permission decision method for unstructured text data is designed. It can achieve a flexible permission decision by similarity thresholding. Experimental results show that the proposed method can reduce the decision time cost of distributed access control to less than 28.7% of a single node. The permission decision model migration method has a high decision accuracy of 97.4%. The semantic reasoning-based permission decision method is optimal to other reference methods in vectorization and index time cost.

Big Data Key Challenges

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.340-350
    • /
    • 2022
  • The big data term refers to the great volume of data and complicated data structure with difficulties in collecting, storing, processing, and analyzing these data. Big data analytics refers to the operation of disclosing hidden patterns through big data. This information and data set cloud to be useful and provide advanced services. However, analyzing and processing this information could cause revealing and disclosing some sensitive and personal information when the information is contained in applications that are correlated to users such as location-based services, but concerns are diminished if the applications are correlated to general information such as scientific results. In this work, a survey has been done over security and privacy challenges and approaches in big data. The challenges included here are in each of the following areas: privacy, access control, encryption, and authentication in big data. Likewise, the approaches presented here are privacy-preserving approaches in big data, access control approaches in big data, encryption approaches in big data, and authentication approaches in big data.

Development of Real-time Control System for White bBamline and Microprobe Beamline (백색광 및 X선 미세탐침 빔라인용 실시간 제어시스템 개발)

  • 윤종철;이진원;고인수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.748-751
    • /
    • 1997
  • The White Beamline of the Pohang Accelerator Laboratory(PAL) consists of main and second slits, a microprobe system, two ion chambers, a video-microscope, and a Si(Li) detector. These machine components must be controlled remotely through computer system to make user experiments precise and speedy. A real-time computer control system was developed to control and monitor these machine components. A VNIEbus computer with OS-9 real-time operating system was used for low-level data acquisition and control. VME I/O modules were used for step motor control and scaler control. The software has modular structure for maximum performance and easy maintenance. We developed database, I/O driver, and control software. We used PC/Window95 for data logging and operator interface. Visual C++ was used graphical user interface programming. RS232C was used for communication between VME and PC.

  • PDF

Attitude Control of Planar Space Robot based on Self-Organizing Data Mining Algorithm

  • Kim, Young-Woo;Matsuda, Ryousuke;Narikiyo, Tatsuo;Kim, Jong-Hae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.377-382
    • /
    • 2005
  • This paper presents a new method for the attitude control of planar space robots. In order to control highly constrained non-linear system such as a 3D space robot, the analytical formulation for the system with complex dynamics and effective control methodology based on the formulation, are not always obtainable. In the proposed method, correspondingly, a non-analytical but effective self-organizing modeling method for controlling a highly constrained system is proposed based on a polynomial data mining algorithm. In order to control the attitude of a planar space robot, it is well known to require inputs characterized by a special pattern in time series with a non-deterministic length. In order to correspond to this type of control paradigm, we adopt the Model Predictive Control (MPC) scheme where the length of the non-deterministic horizon is determined based on implementation cost and control performance. The optimal solution to finding the size of the input pattern is found by a solving two-stage programming problem.

  • PDF

a Study on the Real-time Data Linkage of Field Control System for Distributed Control (분산제어를 위한 필드제어시스템의 실시간 데이터 연계)

  • Kim, S.G.;Song, S.I.;Oh, E.S.;Lee, S.W.;Gwak, K.Y.;Lee, E.W.;Park, T.R.
    • Proceedings of the KIEE Conference
    • /
    • 2003.07b
    • /
    • pp.777-779
    • /
    • 2003
  • This paper describes the real-time data linkage of the field control system for distributed control in nuclear power plant environment. The most important keys of digital control system in nuclear power plant are the reliability and stability of system, and real-time control ability. This Paper brought up the hardware construction using a new method about the design of each station located upon control transmission network to improve real-time ability of field control system, and measured the station binding time between devices connected to field control module. And it was confirmed performance improvement of overall system for real-time data linkage between control devices.

  • PDF

An Effective Design of Process Mean Control Chart in Subgroups Based on Cluster Sampling Type

  • Nam, Ho-Soo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.4
    • /
    • pp.939-950
    • /
    • 2003
  • Control charts are very useful tool for monitoring of process characteristics. This paper discusses the problem of design of control limits when the subgroups are composed by cluster sampling type. As an alternative method of design of control limits XbBar chart is proposed, which uses the control limits based on the variation between subgroups instead of using classical variation within subgroups. Two examples are presented for reasonable design of control limits and conditions of subgroups based on the cluster sampling. Through examples the guidelines for making proper control limits are proposed.

  • PDF

Secure Data Transmission Scheme between Network for Building Facilities Control System (빌딩시설 제어시스템용 안전한 망간 자료전송 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.102-108
    • /
    • 2018
  • The existing data transmission technology applied between the non-secure external internet and the secure internal business network has various problems when applied to the building facility management SCADA system control network. Traditional inter-network data transfer technologies involve high complexity and high costs because blacklist-based security techniques are applied to all data. However, whitelist-based security techniques can be applied to data distributed in Building Facility Management SCADA control systems because a small number of structured control data are repeatable and periodic. This simplifies the security technology applied to inter-network data transmission, enabling building facility management SCADA system control network deployment at low cost. In this paper, we proposed building control networks specialized in building facility management SCADA control systems by providing solutions to address and address these problems.