Search results for "Control system"
showing 10 items of 971 documents
A fault-tolerant protocol for railway control systems
2006
Railway control systems are largely based on data communication and network technologies. With the adoption of Ethernet-IP as the main technology for building end-to-end real-time networks on railway control systems, the requirement to deliver high availability, quality and secure services over Ethernet has become strategic. Critical real-time traffic is generally penalized and the maximum restoration time of 50 msec sometimes is exceeded because of real-time applications hangings, so passengers' safety could be committed. It occurs on more than twenty percent of critical fail tests performed. Our main goal is to minimize restoration time from the application point of view. This article des…
The JYFLTRAP control and measurement system
2008
The JYFLTRAP setup has been used for precision mass spectrometry since 2003. An essential part of this setup is the computer-controlled system consisting of software and hardware that is required to operate the instruments. The software has been developed solely at JYFL using LabVIEW and C++ development tools. The hardware consists of devices controlled using Control Area Network (CAN) field bus and Ethernet for communication purposes. LAN/GPIB-gateways, modular multichannel ISEG DC power supplies and WAGO I/O systems are also used.
Present state of the MAMI control system
1990
Abstract MAMI (Mainz Microtron) is an electron accelerator consisting of a cascade of three race-track microtrons, with an output electron beam of 855 MeV and 100 μA cw [1]. The first two stages (output energy 180 MeV) were operative for nuclear-physics experiments from 1983 to 1987 and have since been transferred to a new building. They will serve as an injector for the third stage, now under construction. The control system for MAMI was based on a versatile process communication software system for a network of processors with multiprocess operating systems. This system has previously proved very successful, so we decided to rely on it as control system for the new, upgraded accelerator, …
Defect Detection in Additively Manufactured Components: Laser Ultrasound and Laser Thermography Comparison
2018
Despite continuous technological advances in additive manufacturing, the lack of non-destructive inspection techniques during the manufacturing process is a limit for the industrial breakthroughs. Additive manufacturing is mainly used in industrial sectors where the zero defect target is crucial. The inclusion of the integrity assessment into the additive manufacturing process would allow corrective actions to be performed before the component is completed. To this end, the development of in-process monitoring and processing techniques is of great interest.This work proposes and compares two remote non-destructive inspection techniques: laser ultrasound and laser thermography. The two techn…
A study of mobility and reachability in ad hoc networks using stochastic activity networks
2006
The integration of ad-hoc networks into real environments is now becoming more and more common and supervision and control systems are no exception. The efficiency of the communication in these networks as well as various other factors, are governed by the working area, the number of nodes, mobility, transmission power, etc. In this paper, the mobility and reachability of mobile nodes appearing spontaneously in a large installation such as can be found in a water purification system are studied. These nodes form an ad-hoc network and communicate between each other in order to finally reach a fixed node which can offer them information from the rest of the system in real time or act as a gat…
Two Levels SPF-Based System to Interconnect Partially Decentralized P2P File Sharing Networks
2005
Partially decentralized P2P (PDP2P) networks are a subset of P2P networks. Roles of nodes are different according to their functionality in the network. Nowadays, there are many PDP2P networks, with different characteristics. It is necessary to find a way to join those autonomous networks. We have not found any interconnection system, so in this article we present a new hierarchical system for interconnecting peers from different PDP2P networks. It will allow sharing data, content and resources between networks. It can be employed between sensor networks, P2P networks, and generally, overlay networks. Oldest superpeers or brokers with higher bandwidth in the PDP2P network will belong to hig…
Hydraulic power and control system
2020
Abstract In recent years, there has been worldwide interest in the improvement of the mobility of people with lower-limb amputation. Despite significant developments in new technologies during the last decade, commercial below-knee and above-knee prostheses are still energetically passive devices. However, many locomotive functions, like walking up stairs and slopes, need significant power in the knee and ankle joints. The additional power for doing previously mentioned activities needs to be achieved by means of external energy sources, which should be integral prosthetic components. In this chapter the design and development of the hydraulic power and control system are described.
Inspection of additive-manufactured layered components
2015
Laser powder deposition (LPD) is a rapid additive manufacturing process to produce, layer upon layer, 3D geometries or to repair high-value components. Currently there is no nondestructive technique that can guarantee absence of flaws in LPD products during manufacturing. In this paper a laser ultrasonic technique for in-line inspection of LPD components is proposed. Reference samples were manufactured from Inconel and machined flaws were created to establish the sensitivity of the technique. Numerical models of laser-generated ultrasonic waves have been created to gain a deeper understanding of physics, to optimize the set-up and to verify the experimental measurements. Results obtained on…
On Block Sensitivity and Fractional Block Sensitivity
2018
We investigate the relation between the block sensitivity bs(f) and fractional block sensitivity fbs(f) complexity measures of Boolean functions. While it is known that fbs(f) = O(bs(f)2), the best known separation achieves $${\rm{fbs}}\left( f \right) = \left( {{{\left( {3\sqrt 2 } \right)}^{ - 1}} + o\left( 1 \right)} \right){\rm{bs}}{\left( f \right)^{3/2}}$$ . We improve the constant factor and show a family of functions that give fbs(f) = (6−1/2 − o(1)) bs(f)3/2.
All Classical Adversary Methods Are Equivalent for Total Functions
2017
We show that all known classical adversary lower bounds on randomized query complexity are equivalent for total functions and are equal to the fractional block sensitivity fbs( f ). That includes the Kolmogorov complexity bound of Laplante and Magniez and the earlier relational adversary bound of Aaronson. This equivalence also implies that for total functions, the relational adversary is equivalent to a simpler lower bound, which we call rank-1 relational adversary. For partial functions, we show unbounded separations between fbs( f ) and other adversary bounds, as well as between the adversary bounds themselves. We also show that, for partial functions, fractional block sensitivity canno…