Search results for "Control system"

showing 10 items of 971 documents

A fault-tolerant protocol for railway control systems

2006

Railway control systems are largely based on data communication and network technologies. With the adoption of Ethernet-IP as the main technology for building end-to-end real-time networks on railway control systems, the requirement to deliver high availability, quality and secure services over Ethernet has become strategic. Critical real-time traffic is generally penalized and the maximum restoration time of 50 msec sometimes is exceeded because of real-time applications hangings, so passengers' safety could be committed. It occurs on more than twenty percent of critical fail tests performed. Our main goal is to minimize restoration time from the application point of view. This article des…

EthernetMulticastComputer sciencebusiness.industryQuality of serviceHigh availabilityControl systemLocal area networkFault toleranceUnicastbusinessComputer network2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.
researchProduct

The JYFLTRAP control and measurement system

2008

The JYFLTRAP setup has been used for precision mass spectrometry since 2003. An essential part of this setup is the computer-controlled system consisting of software and hardware that is required to operate the instruments. The software has been developed solely at JYFL using LabVIEW and C++ development tools. The hardware consists of devices controlled using Control Area Network (CAN) field bus and Ethernet for communication purposes. LAN/GPIB-gateways, modular multichannel ISEG DC power supplies and WAGO I/O systems are also used.

EthernetNuclear and High Energy Physicsbusiness.industryComputer scienceSystem of measurementControl (management)Analytical chemistryModular designCAN busPower (physics)SoftwareControl systembusinessInstrumentationComputer hardwareNuclear Instruments and Methods in Physics Research Section B: Beam Interactions with Materials and Atoms
researchProduct

Present state of the MAMI control system

1990

Abstract MAMI (Mainz Microtron) is an electron accelerator consisting of a cascade of three race-track microtrons, with an output electron beam of 855 MeV and 100 μA cw [1]. The first two stages (output energy 180 MeV) were operative for nuclear-physics experiments from 1983 to 1987 and have since been transferred to a new building. They will serve as an injector for the third stage, now under construction. The control system for MAMI was based on a versatile process communication software system for a network of processors with multiprocess operating systems. This system has previously proved very successful, so we decided to rely on it as control system for the new, upgraded accelerator, …

EthernetPhysicsNuclear and High Energy Physicsbusiness.industrycomputer.software_genreAutomationSoftwareControl systemSoftware systemCompilerBeam emittancebusinessInstrumentationMicrotroncomputerComputer hardwareNuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment
researchProduct

Defect Detection in Additively Manufactured Components: Laser Ultrasound and Laser Thermography Comparison

2018

Despite continuous technological advances in additive manufacturing, the lack of non-destructive inspection techniques during the manufacturing process is a limit for the industrial breakthroughs. Additive manufacturing is mainly used in industrial sectors where the zero defect target is crucial. The inclusion of the integrity assessment into the additive manufacturing process would allow corrective actions to be performed before the component is completed. To this end, the development of in-process monitoring and processing techniques is of great interest.This work proposes and compares two remote non-destructive inspection techniques: laser ultrasound and laser thermography. The two techn…

Evaluation systemIR ThermographyComputer scienceAdditive Manufacturing02 engineering and technologyLaser Ultrasound01 natural scienceslaw.invention010309 opticsSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchinelawComponent (UML)0103 physical sciencesSensitivity (control systems)Process engineeringEarth-Surface Processesbusiness.industryUltrasoundContinuous monitoring021001 nanoscience & nanotechnologyLaserDefect SensitivityThermography0210 nano-technologybusinessLaser drilling
researchProduct

A study of mobility and reachability in ad hoc networks using stochastic activity networks

2006

The integration of ad-hoc networks into real environments is now becoming more and more common and supervision and control systems are no exception. The efficiency of the communication in these networks as well as various other factors, are governed by the working area, the number of nodes, mobility, transmission power, etc. In this paper, the mobility and reachability of mobile nodes appearing spontaneously in a large installation such as can be found in a water purification system are studied. These nodes form an ad-hoc network and communicate between each other in order to finally reach a fixed node which can offer them information from the rest of the system in real time or act as a gat…

Evolving networksCover (telecommunications)Transmission (telecommunications)Computer scienceWireless ad hoc networkReachabilitybusiness.industryControl systemNode (networking)Distributed computingDefault gatewaybusinessComputer network2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.
researchProduct

Two Levels SPF-Based System to Interconnect Partially Decentralized P2P File Sharing Networks

2005

Partially decentralized P2P (PDP2P) networks are a subset of P2P networks. Roles of nodes are different according to their functionality in the network. Nowadays, there are many PDP2P networks, with different characteristics. It is necessary to find a way to join those autonomous networks. We have not found any interconnection system, so in this article we present a new hierarchical system for interconnecting peers from different PDP2P networks. It will allow sharing data, content and resources between networks. It can be employed between sensor networks, P2P networks, and generally, overlay networks. Oldest superpeers or brokers with higher bandwidth in the PDP2P network will belong to hig…

Evolving networksFile sharingComputer sciencebusiness.industryInterdependent networksDistributed computingOverlay networkHierarchical control systemHierarchical network modelbusinessNetwork topologyWireless sensor networkComputer networkJoint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05)
researchProduct

Hydraulic power and control system

2020

Abstract In recent years, there has been worldwide interest in the improvement of the mobility of people with lower-limb amputation. Despite significant developments in new technologies during the last decade, commercial below-knee and above-knee prostheses are still energetically passive devices. However, many locomotive functions, like walking up stairs and slopes, need significant power in the knee and ankle joints. The additional power for doing previously mentioned activities needs to be achieved by means of external energy sources, which should be integral prosthetic components. In this chapter the design and development of the hydraulic power and control system are described.

External energyStairsComputer scienceEmerging technologiesControl systemHydraulic machineryhuman activitiesAutomotive engineeringPower (physics)
researchProduct

Inspection of additive-manufactured layered components

2015

Laser powder deposition (LPD) is a rapid additive manufacturing process to produce, layer upon layer, 3D geometries or to repair high-value components. Currently there is no nondestructive technique that can guarantee absence of flaws in LPD products during manufacturing. In this paper a laser ultrasonic technique for in-line inspection of LPD components is proposed. Reference samples were manufactured from Inconel and machined flaws were created to establish the sensitivity of the technique. Numerical models of laser-generated ultrasonic waves have been created to gain a deeper understanding of physics, to optimize the set-up and to verify the experimental measurements. Results obtained on…

FEMNDT inspectionAcoustics and UltrasonicsAdditive manufacturingMechanical engineeringNumerical modelsLaserFinite element methodlaw.inventionSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchinelawLaser ultrasoundDeposition (phase transition)Ultrasonic sensorSensitivity (control systems)InconelLayer (electronics)Laser powder depositionUltrasonics
researchProduct

On Block Sensitivity and Fractional Block Sensitivity

2018

We investigate the relation between the block sensitivity bs(f) and fractional block sensitivity fbs(f) complexity measures of Boolean functions. While it is known that fbs(f) = O(bs(f)2), the best known separation achieves $${\rm{fbs}}\left( f \right) = \left( {{{\left( {3\sqrt 2 } \right)}^{ - 1}} + o\left( 1 \right)} \right){\rm{bs}}{\left( f \right)^{3/2}}$$ . We improve the constant factor and show a family of functions that give fbs(f) = (6−1/2 − o(1)) bs(f)3/2.

FOS: Computer and information sciencesGeneral Mathematics010102 general mathematicsBlock (permutation group theory)0102 computer and information sciencesComputational Complexity (cs.CC)01 natural sciencesConstant factorCombinatoricsComputer Science - Computational Complexity010201 computation theory & mathematicsSensitivity (control systems)0101 mathematicsAlgebra over a fieldMathematics
researchProduct

All Classical Adversary Methods Are Equivalent for Total Functions

2017

We show that all known classical adversary lower bounds on randomized query complexity are equivalent for total functions and are equal to the fractional block sensitivity fbs( f ). That includes the Kolmogorov complexity bound of Laplante and Magniez and the earlier relational adversary bound of Aaronson. This equivalence also implies that for total functions, the relational adversary is equivalent to a simpler lower bound, which we call rank-1 relational adversary. For partial functions, we show unbounded separations between fbs( f ) and other adversary bounds, as well as between the adversary bounds themselves. We also show that, for partial functions, fractional block sensitivity canno…

FOS: Computer and information sciencesKolmogorov complexity010102 general mathematicsBlock (permutation group theory)0102 computer and information sciencesFunction (mathematics)Computational Complexity (cs.CC)Adversary01 natural sciencesUpper and lower boundsTheoretical Computer ScienceCombinatoricsComputer Science - Computational ComplexityComputational Theory and Mathematics010201 computation theory & mathematicsPartial functionSensitivity (control systems)0101 mathematicsEquivalence (measure theory)MathematicsACM Transactions on Computation Theory
researchProduct