This document discusses using dynamic adaptive systems in safety-critical domains. It begins by introducing safety-critical cyber-physical systems and how dynamic adaptivity could provide benefits like increased fault tolerance and deployability. However, adaptivity also introduces challenges for testing and certification. The document then discusses using the Architecture Analysis and Design Language (AADL) to model and analyze dynamic adaptive safety-critical systems. It considers issues like what constitutes sufficient pre-deployment testing of such systems and how failures from untested configurations can be mitigated. Overall, the document explores how to incorporate safety-critical concerns into the design of dynamic adaptive systems.
An efficient intrusion detection using relevance vector machineIAEME Publication
The document summarizes an efficient intrusion detection system using Relevance Vector Machine (RVM). It begins with an introduction to intrusion detection and types of attacks. Then it discusses related work using data mining techniques like SVM for intrusion detection. The proposed methodology preprocesses data from the KDD Cup 99 dataset, performs normalization, and classifies using RVM. RVM can provide sparse solutions and inferences with low computation. Experimental results on the KDD Cup 99 dataset show the technique achieves higher detection rates than regular SVM algorithms.
Implementation on Quality of Control for Image Based Control Systems using Al...YogeshIJTSRD
Picture Processing IP applications have gotten renowned with the presence of capable computations and negligible exertion CMOS cameras with significant standard. In any case, IP applications are register concentrated, eat up a huge load of energy and have long taking care of times. Picture assessment has been proposed by late works for an energy capable arrangement of these applications. It also diminishes the impact of long getting ready occasions. The test here is that the IP applications oftentimes work as a piece of more prominent shut circle control systems, for instance advanced driver help structure ADAS . We propose a construction for execution appraisal of picture surmise on a shut circle auto IBC structure. Our construction is written in C and uses V REP as the propagation environment. For the generation, V REP runs as a laborer and the C module as a client in concurrent mode. We show the electiveness of our framework using a fantasy based equal control model. Miss. Badde Suma | Mr. Parasurama N | Kirla Jyothsna "Implementation on Quality-of-Control for Image-Based Control Systems using Algorithmic Approximation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd40028.pdf Paper URL: https://www.ijtsrd.comengineering/electronics-and-communication-engineering/40028/implementation-on-qualityofcontrol-for-imagebased-control-systems-using-algorithmic-approximation/miss-badde-suma
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...IJECEIAES
The paper proposes a design strategy to retain the true nature of the output in the event of occurrence of stuck at faults at the interconnect levels of digital circuits. The procedure endeavours to design a combinational architecture which includes attributes to identify stuck at faults present in the intermediate lines and involves a healing mechanism to redress the same. The simulated fault injection procedure introduces both single as well as multiple stuck-at faults at the interconnect levels of a two level combinational circuit in accordance with the directives of a control signal. The inherent heal facility attached to the formulation enables to reach out the fault free output even in the presence of faults. The Modelsim based simulation results obtained for the Circuit Under Test [CUT] implemented using a Read Only Memory [ROM], proclaim the ability of the system to survive itself from the influence of faults. The comparison made with the traditional Triple Modular Redundancy [TMR] exhibits the superiority of the scheme in terms of fault coverage and area overhead.
A resonable approach for manufacturing system based on supervisory control 2IAEME Publication
This document summarizes a research paper that proposes a novel approach for manufacturing system control using supervisory control and discrete event systems. It describes a testbed that was developed using this approach with three main hardware components: a personal computer, interface, and programmable logic controller. The paper discusses developing a model for the large, complex testbed manufacturing system by breaking it down into smaller, fundamental and interaction sub-models. It explains how the testbed model was implemented using clocked Moore synchronous state machines in programmable logic controller ladder logic programs.
Modeling the enablers for implementing ict enabled wireless control in industryIAEME Publication
This document discusses modeling the enablers for implementing ICT-enabled wireless control in industry using interpretive structural modeling (ISM). It identifies 11 key enablers for ICT-enabled wireless process control systems based on expert interviews. These enablers are analyzed using ISM to determine their relationships and relative importance. Structural matrices are developed and levels are partitioned to create a diagraph and final ISM model that can be used to prioritize actions to enhance high-impact enablers.
This document summarizes an academic journal article that proposes a new approach called Action-Based Defect Prediction (ABDP) to predict software defects. The approach applies data mining techniques like classification and feature selection to historical project data to predict whether future actions will likely cause defects. It aims to identify problematic actions early to prevent defects. The document outlines the ABDP approach, discusses challenges like imbalanced data, and compares results of under-sampling versus over-sampling techniques. It also introduces how the approach could be integrated with Failure Mode and Effects Analysis (FMEA) to further improve early defect prediction.
This document provides an overview of key topics from Chapter 11 on security and dependability, including:
- The principal dependability properties of availability, reliability, safety, and security.
- Dependability covers attributes like maintainability, repairability, survivability, and error tolerance.
- Dependability is important because system failures can have widespread effects and undependable systems may be rejected.
- Dependability is achieved through techniques like fault avoidance, detection and removal, and building in fault tolerance.
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET Journal
This document discusses techniques for improving fault tolerance in VLSI circuits through micro inversion. It begins with an introduction to increasing reliability concerns with technology scaling. It then discusses micro inversion, where operations on erroneous data are "undone" through hardware rollback of a few cycles. It describes implementing micro inversion in a register file and handling the potential domino effect in multi-module systems through common bus transactions acting as a clock. The document concludes that micro inversion combined with parallel error checking can help achieve fault tolerance in complex multi-module VLSI systems.
IRJET- Vibration Analysis and Optimization of Housing for ECU in Automobile u...IRJET Journal
The document discusses the vibration analysis and optimization of an electronic control unit (ECU) housing for an automobile. The objectives are to design and optimize the ECU housing using CATIA and finite element analysis (FEA) in ANSYS to minimize vibration. Modal and harmonic analyses are conducted on the original housing and an optimized design with added cross ribs. The natural frequencies increase and acceleration amplitude decreases in the optimized design, improving stiffness and reducing vibration compared to the original housing.
Real time vehicle counting in complex scene for traffic flow estimation using...Conference Papers
This document proposes a multi-level convolutional neural network (mCNN) framework for real-time vehicle counting and classification in complex traffic scenes. The framework includes five modules: pre-processing, object detection using SSD and YOLO models, tracking using Kalman filters, vehicle classification using Inception network, and quantification to provide counting results. The framework is tested on over 585 minutes of highway video from four cameras, achieving 97.53% average counting accuracy and 90.2% weighted average accuracy for counting with classification.
The document discusses linguistic structures for incorporating fault tolerance into application software. It begins by explaining that as software complexity increases, software faults have become more prevalent and impactful, necessitating fault tolerance at the application level. It then establishes a set of desirable attributes for application-level fault tolerance structures and surveys current solutions, assessing each according to these attributes. The goal is to identify shortcomings and opportunities to develop improved fault tolerance structures.
Mc calley pserc_final_report_s35_special_protection_schemes_dec_2010_nm_nsrcNeil McNeill
This document provides a summary of a report on system protection schemes (SPS). It discusses SPS standards, practices, and advancements. It also examines relationships between SPS and other industries like process control and nuclear. The report proposes frameworks to identify risks to SPS from both a process and system view. It contributes methods to assess SPS operational complexity and incorporate this into transmission planning studies. The frameworks and models developed in this report can be applied to real utility systems to evaluate SPS reliability and impacts on the power grid.
Controller selection in software defined networks using best-worst multi-crit...journalBEEI
This document discusses selecting the best SDN controller using a multi-criteria decision making approach. It identifies 7 candidate SDN controllers (NOX, POX, Beacon, Floodlight, Ryu, ODL, ONOS) and defines both quantitative and qualitative criteria to evaluate them, such as throughput, latency, APIs, programming language, and legacy network support. It proposes using the best-worst multi-criteria decision making (BWM) method to determine the weights of each criterion and ultimately select the best controller based on user requirements and preferences. An optimization approach is applied to evaluate the controllers' performance on key criteria and determine which controllers, ONOS and ODL, are the most robust options overall.
1. The document presents a failure recovery scheme for mobile computing systems based on checkpointing and handoff count. It proposes taking checkpoints when the handoff count exceeds a threshold or the distance between mobile support stations exceeds a threshold.
2. The scheme aims to optimize both failure-free operation costs and failure recovery costs. Checkpoints are taken to minimize the amount of work lost after failures while limiting overhead during normal operation.
3. By delimiting the number of mobile support stations and distance from which recovery information needs to be collected, the proposed scheme aims to reduce recovery time and costs. Taking checkpoints based on handoff count and distance thresholds helps organize recovery information to facilitate efficient failure recovery.
WMNs: The Design and Analysis of Fair Schedulingiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document proposes an automatic reaction strategy for critical infrastructure SCADA systems. It defines a three-layer metamodel for modeling SCADA components and two types of policies (cognitive and permissive) that govern component behavior. It then presents a two-phase method for identifying these policies from the SCADA architecture and formalizing them to support an automatic reaction strategy. This strategy is modeled as an integral part of the SCADA architecture using the defined metamodel and policy identification method. It includes organizational and application layers with main actors, strategies, and components that realize the reaction policies based on expected automation levels.
Este documento discute a educação ambiental para o desenvolvimento sustentável versus educação ambiental para sociedades sustentáveis. Argumenta-se que educação para o desenvolvimento sustentável é uma falácia do paradigma neoliberal, enquanto educação para sociedades sustentáveis, com seus pressupostos opostos, é a proposta ideal. Também reflete sobre a história da educação ambiental e seu papel em promover valores sustentáveis.
This portfolio presentation by graphic designer Mahi Uddin Mozumder showcases his work in press ad design, car branding and stall design, billboard and cutout design, book and flyer cover design, backdrop design, and festoon and x-banner design. The designer provides examples of projects in each of these areas to demonstrate his graphic design skills and experience.
O documento apresenta indicadores econômicos internacionais e brasileiros. Nos EUA, o índice de confiança do consumidor caiu em fevereiro. Na Alemanha e Reino Unido, o PIB teve crescimento fraco no quarto trimestre de 2011. No Brasil, a confiança do consumidor subiu levemente em fevereiro, mas as expectativas caíram em relação ao ano anterior. A produção industrial brasileira segue em baixa.
Artisan Campo Belo - Lançamento, inicio das assinaturas Sergio Pripas
ARTISAN Campo Belo, 275m2, aptos com 4 suítes, 4 vagas, Inform: BERGEN, consultor Abyara, tel: 9143-4536, bergen@bergenimoveis.com.br SEMPRE ligar ANTES, para agendar dia e hora de sua visita ao plantão, pois NÃO fico nos plantões.
Lançamento, assinaturas em andamento
Este documento presenta una guía para el desarrollo de una WebQuest sobre un tema de química. Explica que una WebQuest consiste en un sitio web que presenta una interrogante, metodología de trabajo y recursos para resolver una tarea. Detalla los elementos clave de una WebQuest, incluyendo introducción, tareas, procesos, recursos, evaluación y conclusión. Los estudiantes deberán crear una WebQuest sobre un tema de química usando PowerPoint y publicarla en línea.
A criança e os vegetais por simone helen drumond de carvalho 2º periodoSimoneHelenDrumond
O documento apresenta uma proposta de atividades para a educação infantil com o tema "As crianças e os vegetais". É descrito um plano de aulas com conteúdos de movimento, música, artes plásticas, teatro, linguagem oral e escrita, ciências, matemática e formação social. As atividades incluem exploração do tema por meio de brincadeiras, danças, desenhos, contação de histórias e exercícios de alfabetização.
This document provides an overview of an energy performance contracting project undertaken by Dublin Port Company to upgrade the boiler house and ventilation controls at their Port Centre building. Key points:
- The project involved installing new high-efficiency gas boilers and micro-CHP unit with buffer vessel for the boiler house, and installing BMS controls for the variable air volume boxes in offices.
- The projects were delivered through an energy performance related payment model where contractors guaranteed 15% energy savings for the boiler upgrade and targets for the ventilation controls.
- Measurement and verification found the projects significantly exceeded guaranteed savings, with the boiler upgrade achieving 26.7% savings and ventilation controls achieving 52.9% savings after 6 months.
The document discusses TheBrand-Tailors, an architecture and retail consulting studio. It details their 14+ years of experience with over 500 retail projects worldwide. Their services include retail design, concept implementation, project management, and consulting. They aim to help global brands like Nike standardize processes and services across countries.
Alan Ryan (SEAI) gives an overview of the National Energy Services Framework at Codema's EPC Information Seminar in The Morgan Hotel in Dublin on 13 October 2015 as part of the EESI2020 project.
Juan Francisco Galván Montero has over 8 years of experience as a Local Authority Chief Executive Officer in Spain. He holds a Master's degree in European Interdisciplinary Studies from the College of Europe. His background includes legal advice, human resources management, and financial control for local governments in Spain.
Este documento proporciona información sobre los portafolios de evidencias. Explica que un portafolio es una colección sistemática de trabajos realizados por estudiantes o maestros que sirve para examinar el esfuerzo, progreso y logros. También describe los tipos de portafolios, el proceso de elaboración que incluye recolección, selección, reflexión y proyección, y cómo los portafolios pueden usarse para la evaluación, enseñanza, comunicación y desarrollo profesional.
El resumen describe el portafolio de evidencias de Isaias Toledano, un maestro con 10 años de experiencia enseñando a nivel primaria. Explica que ha implementado diversas estrategias de enseñanza, incluyendo el uso de juegos y tecnología, para adaptarse a los diferentes estilos de aprendizaje de sus estudiantes y mejorar sus resultados académicos. Las innovaciones han motivado a los estudiantes y han demostrado mejorar su desempeño y satisfacción.
El documento describe el proceso de lavandería que incluye clasificar la ropa por color, tipo de tejido y grado de suciedad, lavar la ropa de acuerdo a la clasificación, secar y planchar la ropa de huéspedes y blancos de habitaciones y áreas A y B, y almacenar la ropa limpia. Los estudiantes deben formar grupos en clase, seguir las instrucciones de la catedrática usando la hoja de contenido, y presentar su trabajo en grupos de 3 minutos.
Viaje cultural de la ópera wagneriana en Madrid (1876 - 1925).musimusikera1
El documento describe la presencia de la ópera wagneriana en el Teatro Real de Madrid entre 1875 y 1925, incluyendo las óperas representadas, la recepción del público y la influencia de la Asociación Wagneriana de Madrid. Se analizan las 75 temporadas del Teatro Real y cómo la ópera wagneriana ganó popularidad. También se describen lugares asociados con la cultura wagneriana en Madrid que frecuentaban los seguidores.
Este documento presenta un proyecto de investigación que evalúa el uso de recursos de aprendizaje y pedagógicos por parte de profesores y estudiantes de Nutrición y Dietética en la Universidad de Panamá. El proyecto incluye objetivos, hipótesis, diseño experimental, justificación, métodos de recolección y análisis de datos. El objetivo general es evaluar el uso de recursos tecnológicos para el desarrollo del conocimiento entre profesores y estudiantes. Se aplicarán encuestas a una muestra
This document provides tips for making an effective presentation of research work in 3 sentences or less:
The document outlines best practices for creating clear and readable presentation slides, including using point form, limiting text per slide, using large and contrasting fonts, simple backgrounds, and properly formatted graphs and tables. Common mistakes to avoid are discussed, such as small fonts, excessive use of colors and animation, and distracting backgrounds. The presentation should be proofread for spelling and grammar errors, and conclude with a summary of key points and an invitation for questions.
Using OPC technology to support the study of advanced process controlISA Interchange
This document discusses using OPC technology to support the study of advanced process control techniques. It presents a co-simulation environment integrating MATLAB, LabVIEW, and an OPC server to simulate a nonlinear boiler model in real-time over a TCP/IP network. An MPC controller is designed using the OPC client to control the boiler's drum water level, steam pressure, and NOx emissions. The setup provides a cost-effective tool for academic research on advanced process control and networked control systems.
Using OPC technology to support the study of advanced process controlISA Interchange
OPC, originally the object linking and embedding (OLE) for process control, brings a broad communication opportunity between different kinds of control systems. This paper investigates the use of OPC technology for the study of distributed control systems (DCS) as a cost effective and flexible research tool for the development and testing of advanced process control (APC) techniques in university research centers. Co-simulation environment based on Matlab, LabVIEW and TCP/IP network is presented here. Several implementation issues and OPC based client/server control application have been addressed for TCP/IP network. A nonlinear boiler model is simulated as OPC server and OPC client is used for closed loop model identification, and to design a model predictive controller (MPC). The MPC is able to control the NOx emissions in addition to drum water level and steam pressure.
This document provides an overview of power system automation and SCADA (Supervisory Control and Data Acquisition) systems. It defines SCADA and describes its typical components like HMIs, RTUs, PLCs and communication infrastructure. It also outlines applications of SCADA in power generation, distribution and transmission systems. Benefits of SCADA include increased efficiency, reliability and reduced manual labor through remote monitoring and control of power systems. The document concludes that SCADA provides a common framework for experiment control and ensures consistent operator experience across different parts of complex power systems.
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsIRJET Journal
This document discusses cyber threats and security approaches for cyber-physical systems (CPS). It first reviews studies on CPS security modeling and data management. It then discusses three main approaches for modeling and optimizing secure CPS: model-based design, platform-based design, and contract-based design. Next, it covers four methods for CPS risk assessment: expert elicitation models, attack graphs, game theory, and Petri nets. It concludes by discussing reachability analysis, controller synthesis, and vulnerability analysis techniques for verifying CPS models and properties.
This document provides details about a project to create an environment and power monitoring panel using an ARM microcontroller board. It includes an introduction describing the importance of automation and sensor monitoring in industrial systems. It then provides details on the hardware and software used, including a Texas Instruments LM3S9D92 microcontroller board, sensors, and a graphical user interface design. The project aims to remotely monitor and display parameters from an industrial cabinet to improve maintenance and optimization.
This document introduces Embedded Virtual Machines (EVMs) as a programming abstraction for wireless sensor-actuator-controller networks used in industrial control systems. EVMs decouple control tasks from physical network nodes, allowing tasks to migrate across nodes to maintain functionality even if the physical network changes. The goals of EVMs are to provide predictable outcomes during node/link faults, minimal quality of service degradation during unexpected topology changes, and ability to reconfigure resources and tasks at runtime in response to planned system changes or optimization needs. Challenges in using wireless networks for real-time control applications include the difficulty of programming for both event-triggered sensors and time-triggered control tasks.
Critical Information Infrastructure Systems WorldwideAngela Hays
The document discusses the training that the author underwent at Finetech Controls Pvt. Ltd., which covered the fundamentals of industrial automation including components like switches, sensors, controllers, drives, and programmable logic controllers. The training also included how to operate and program PLCs to remotely control industrial processes, as well as the basics of variable frequency drives for motor speed and rotation control. The author was educated on the principles, applications, and installation of automation equipment used in manufacturing and material handling processes.
Effects of Wireless Packet Loss in Industrial Process Control SystemsISA Interchange
Timely and reliable sensing and actuation control are essential in networked control. This depends on not only the precision/quality of the sensors and actuators used but also on how well the communications links between the field instruments and the controller have been designed. Wireless networking offers simple deployment, reconfigurability, scalability, and reduced operational expenditure, and is easier to upgrade than wired solutions. However, the adoption of wireless networking has been slow in industrial process control due to the stochastic and less than 100% reliable nature of wireless communications and lack of a model to evaluate the effects of such communications imperfections on the overall control performance. In this paper, we study how control performance is affected by wireless link quality, which in turn is adversely affected by severe propagation loss in harsh industrial environments, co-channel interference, and unintended interference from other devices. We select the Tennessee Eastman Challenge Model (TE) for our study. A decentralized process control system, first proposed by N. Ricker, is adopted that employs 41 sensors and 12 actuators to manage the production process in the TE plant. We consider the scenario where wireless links are used to periodically transmit essential sensor measurement data, such as pressure, temperature and chemical composition to the controller as well as control commands to manipulate the actuators according to predetermined setpoints. We consider two models for packet loss in the wireless links, namely, an independent and identically distributed (IID) packet loss model and the two-state Gilbert-Elliot (GE) channel model. While the former is a random loss model, the latter can model bursty losses. With each channel model, the performance of the simulated decentralized controller using wireless links is compared with the one using wired links providing instant and 100% reliable communications. The sensitivity of the controller to the burstiness of packet loss is also characterized in different process stages. The performance results indicate that wireless links with redundant bandwidth reservation can meet the requirements of the TE process model under normal operational conditions. When disturbances are introduced in the TE plant model, wireless packet loss during transitions between process stages need further protection in severely impaired links. Techniques such as re-transmission scheduling, multi-path routing and enhanced physical layer design are discussed and the latest industrial wireless protocols are compared.
This document discusses trends in threats to SCADA (Supervisory Control and Data Acquisition) systems. It notes that as SCADA systems increasingly use commercial off-the-shelf software and connect to the internet, they have become more vulnerable to cyber threats. The document outlines how SCADA systems work and components like RTUs, PLCs, and HMIs. It also discusses issues like the mistaken belief that SCADA systems are secure due to physical security or isolation from the internet. The conclusion suggests that as capabilities and opportunities for threats increase, the future operational environment will be more vulnerable if an actor emerges with the intent to cause harm.
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSijcsit
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
Practical Troubleshooting & Problem Solving of Industrial Data CommunicationsLiving Online
This document provides an overview of industrial data communications. It describes modern instrumentation and control systems, including distributed control systems, programmable logic controllers, SCADA systems, and smart instruments. It also discusses common industrial communication standards and protocols, such as RS-232, RS-485, fiber optics, Modbus, HART, DeviceNet, Profibus, Ethernet, and TCP/IP. The document introduces the OSI model and explains how protocols define the structure of information frames transmitted across communication systems.
Autonomous sensor nodes for Structural Health Monitoring of bridgesIRJET Journal
This document discusses using autonomous sensor nodes and wireless sensor networks for structural health monitoring of bridges. It aims to detect damage in structures early through continuous monitoring. Sensor nodes containing microcontrollers, temperature, vibration and pressure sensors would be attached to bridges and transmit data wirelessly. This would make inspections more efficient and improve safety by identifying issues early. The document reviews related work using similar wireless sensor network systems for structural monitoring. It discusses the need for such monitoring in India given the increasing construction of large buildings and infrastructure. The objectives are outlined as detecting, locating, identifying and quantifying any damage. Hardware and software components are listed including ESP32 microcontrollers and sensors to measure temperature, vibration and pressure.
SCADA systems are used to monitor and control equipment and processes in industries like oil/gas, water treatment, and manufacturing. They gather data in real-time from remote locations and send control commands back. SCADA has evolved through 3 generations from standalone monolithic systems to distributed systems on local networks to today's networked systems using open standards and wide area networks. Security issues need to be addressed like encrypting communications, securing devices, auditing networks, and implementing threat protection. The future of SCADA involves more sophisticated systems that can handle huge data volumes and territories with some having artificial intelligence capabilities.
Interpretive Structural Modeling of the Prospects of Ict Enabled Process Cont...IOSR Journals
This document discusses using interpretive structural modeling (ISM) to analyze the interrelationships between prospects of information and communication technology (ICT) enabled process control systems. Nine prospects were identified through expert interviews, including that ICT process control could be highly innovative, reduce costs by using fewer instruments, and allow remote control from one location using secret codes. ISM analysis included creating a structural self-interaction matrix, initial and final reachability matrices, and a diagraph. This identified that prospects like reduced costs and remote control have high driving power and dependence. An action plan was developed based on expert discussions to enhance important prospects like these. In conclusion, ISM provides an effective model for studying how to improve the potential of ICT process control
Embedded system for traffic light controlMadhu Prasad
This document describes an embedded systems project for traffic light control. It presents the background and motivation for optimizing traffic light control using wireless sensors. The proposed system uses an ARM7 microcontroller programmed in embedded C to process real-time data from wireless sensors and control LED traffic lights accordingly. The goal is to study different traffic density situations and optimize traffic flow.
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...Dr. Amarjeet Singh
Structural health monitoring is the fact of
estimating the state of structural healthor detecting the
changes in structure that affect its performance. The
traditional approach to monitor the structural health is by
using centralized data acquisition hub wired to tens or even
hundreds of sensors, and the installation and maintenance of
these cabled systems represent significant concerns,
prompting the move toward wireless sensor network. As cost
effectiveness and energy efficiency is a major concern, our
main interest is to reduce the amount of overhead while
keeping the structural health monitoring accurate. Since most
of the compression algorithm is heavy weight for wireless
sensor network with respect to payload compression, here we
have analyzed an algorithmic comparison of arithmetic
coding algorithm and Huffman coding algorithm. Evaluation
shows that arithmetic coding is more efficient than Huffman
coding for payload compression.
Fuel Station Monitoring and Automation based on WSN IJECEIAES
The document describes a proposed system to automate and monitor a fuel station using a wireless sensor network. The system aims to [1] save fuel quantities and qualities, [2] keep the fuel station and workers safe, and [3] make the fuel station operate under normal conditions. Sensors monitor factors like temperature, smoke, water levels, and power sources. The data is sent wirelessly to a main controller built using LabVIEW software. The controller analyzes the data and sends commands to actuators to automate systems for fire protection, temperature control, power switching, and liquid level regulation. The overall system is designed to automate key fuel station operations and provide monitoring through an interactive interface.
This document summarizes a study on existing wireless sensor networks that can be used for structural health monitoring. It discusses three main wireless sensor network platforms: Sensor Andrew Architecture, a structural health monitoring system using smart sensors, and Snowfort, a new wireless sensor network platform designed for infrastructure monitoring. The document outlines the key components, advantages, and limitations of each wireless sensor network platform for structural health monitoring applications.
Standards based security for energy utilitiesNirmal Thaliyil
The document discusses standards for cybersecurity in the energy sector. It notes that threats are increasing as energy infrastructure becomes more connected and data-driven. The document outlines some key cybersecurity standards for the energy industry including NERC CIP, IEEE1686, and IEC 62351. It maps these standards based on their level of technical detail and completeness. The document also discusses best practices for cybersecurity including technological and operational controls and how standards relate to controls for protection, detection and response.
Similar to Ieeepro techno solutions 2013 ieee embedded project an integrated design framework of fault-tolerant wireless networked control systems (20)
Ieeepro techno solutions ieee embedded project solar poweringsrinivasanece7
The document discusses the use of solar power for water resource automation projects. It describes how solar energy systems can provide a cost-effective power alternative to grid connections for remote monitoring and control sites. The basic components of a simple automated canal site are outlined, including sensors, communications equipment, and actuators. Several prototypes developed by the Bureau of Reclamation for retrofitting solar-powered gate actuators onto existing structures are also described. Over 25 such automated gate structures have been reliably operated using solar power over the last 7 years. Monitoring system parameters in real-time can help identify problems so maintenance can be done proactively to minimize downtime.
The document proposes a unified framework for iris recognition that addresses challenges in unconstrained acquisition, robust matching, and privacy. It uses random projections and sparse representations to select good quality iris images, recognize iris patterns in a single step, and introduce cancelable templates for enhanced privacy without compromising security or recognition performance. Experimental results on public datasets demonstrate benefits of the proposed approach for robust and accurate iris recognition.
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
An Internet Protocol address (IP address) is a logical numeric address that is assigned to every single computer, printer, switch, router, tablets, smartphones or any other device that is part of a TCP/IP-based network.
Types of IP address-
Dynamic means "constantly changing “ .dynamic IP addresses aren't more powerful, but they can change.
Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.
Most IP addresses assigned today by Internet Service Providers are dynamic IP addresses. It's more cost effective for the ISP and you.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...IJAEMSJORNAL
This study primarily aimed to determine the best practices of clothing businesses to use it as a foundation of strategic business advancements. Moreover, the frequency with which the business's best practices are tracked, which best practices are the most targeted of the apparel firms to be retained, and how does best practices can be used as strategic business advancement. The respondents of the study is the owners of clothing businesses in Talavera, Nueva Ecija. Data were collected and analyzed using a quantitative approach and utilizing a descriptive research design. Unveiling best practices of clothing businesses as a foundation for strategic business advancement through statistical analysis: frequency and percentage, and weighted means analyzing the data in terms of identifying the most to the least important performance indicators of the businesses among all of the variables. Based on the survey conducted on clothing businesses in Talavera, Nueva Ecija, several best practices emerge across different areas of business operations. These practices are categorized into three main sections, section one being the Business Profile and Legal Requirements, followed by the tracking of indicators in terms of Product, Place, Promotion, and Price, and Key Performance Indicators (KPIs) covering finance, marketing, production, technical, and distribution aspects. The research study delved into identifying the core best practices of clothing businesses, serving as a strategic guide for their advancement. Through meticulous analysis, several key findings emerged. Firstly, prioritizing product factors, such as maintaining optimal stock levels and maximizing customer satisfaction, was deemed essential for driving sales and fostering loyalty. Additionally, selecting the right store location was crucial for visibility and accessibility, directly impacting footfall and sales. Vigilance towards competitors and demographic shifts was highlighted as essential for maintaining relevance. Understanding the relationship between marketing spend and customer acquisition proved pivotal for optimizing budgets and achieving a higher ROI. Strategic analysis of profit margins across clothing items emerged as crucial for maximizing profitability and revenue. Creating a positive customer experience, investing in employee training, and implementing effective inventory management practices were also identified as critical success factors. In essence, these findings underscored the holistic approach needed for sustainable growth in the clothing business, emphasizing the importance of product management, marketing strategies, customer experience, and operational efficiency.
2. DING et al.: INTEGRATED DESIGN FRAMEWORK OF FAULT-TOLERANT WIRELESS NCSs FOR INDUSTRIAL AUTOMATIC CONTROL APPLICATIONS 463
Fig. 1. Fault-tolerant W-NCS configuration.
way, not only the required control and FDI performance but also
high real-time ability and reliability can be achieved. This is the
motivation of our work. The main objective of this paper is to
develop a framework, based on which a W-NCS can be designed
and constructed for the real-time application in industrial au-
tomation. The core of this framework is an integrated design of
the MAC protocols, the control and FDI schemes, which allows:
1) a deterministic data transmission via wireless networks; 2) a
reduced data transmission amount and at the same time; and 3)
meeting the requirements on the control and FDI performance.
To illustrate our study, WiNC, an experimentation platform for
fault-tolerant wireless networked control, will be presented.
II. OUTLINE OF THE FAULT-TOLERANT W-NCS DESIGN
FRAMEWORK AND PROBLEM FORMULATION
Here, the process and control system models are first de-
scribed. The basic ideas behind the integrated design framework
of FT W-NCSs are then highlighted. Finally, the major topics to
be addressed are formulated.
A. Process and Control Loop Models
Suppose that the process under consideration consists of
sub-processes modeled by
(1)
where , denotes the state vector of the th
subprocess, and , , and are known matrices of appro-
priate dimensions. feedback control loops are applied for the
regulation of the th subprocess with actuators
...
(2)
and associated with it (3)
and sensors, ,
... (4)
where , denote the actuators/controllers and sensors em-
bedded in the th control loop of the th subprocess. It is as-
sumed that the sensors are nominally modeled by
(5)
with known matrix . In the following, the th subprocess
and the associated actuators and sensors embedded in
the control loops are called the th subsystem. For the real-time
implementation, the maximum allowed sampling time depends
on the process dynamics. We denote the critical sampling time
for the th subprocess by .
B. Outline of the System Configuration
In order to achieve high reliability and to meet the demands
for the control performance, the W-NCS configuration sketched
in Fig. 1 is proposed, which consists of the following.
• Execution layer: At this layer, PNC nodes are integrated
into (local) feedback control loops.
• Coordination and supervision layer: This layer consists of
CSs. They coordinate and synchronize the the overall
3. 464 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 9, NO. 1, FEBRUARY 2013
W-NCS operation. Another task of the CSs is process
monitoring, in which observer-based FDI algorithms are
implemented.
• Management layer: In our study, FTC is implemented in
the context of resource management [26]. Any component,
either sensor or actuator or process component, is defined
as system resource associated with some functionality. A
fault in one component is considered as a loss of the corre-
sponding resource or redundancy and activates a resource
reallocation.
C. Communication Structure
As shown in Fig. 1, the data transmissions in the NCS can be
classified as: 1) communications within a subsystem, which will
operate in a master–slave mode with the CS as the master and 2)
communications between the CSs, which serve as synchroniza-
tion and execution of the control, monitoring, and communica-
tion actions, and, in case of a fault, the activation and execution
of the resource reallocation and FTC algorithms. The data ex-
changes at this layer are periodic and regulated by a protocol
e.g., in the token passing mechanism. In the industrial real-time
control systems, data transmissions are often regulated based
on the simplified ISO/OSI three-layer model [12], in which the
physical layer is standardized. At the data link layer, also called
MAC, and at the application layer, the user is able to imple-
ment a scheduler that guarantees the required real-time perfor-
mance and regulates the QoS parameters of the network. In our
study, scheduler design will be done for the both communica-
tion forms.
D. Problem Formulation
The basic idea of establishing a framework for the design of
a fault-tolerant W-NCS is to address the multilayer fault-tol-
erant control and communication systems in an integrated way.
In order to meet the real-time requirements and ensure a de-
terministic data transmission, TDMA mechanism is adopted in
the proposed framework. In this way, the MAC protocol can be
modeled in form of a scheduler, whose design and parameteri-
zation will be achieved in a codesign with the development of
the control and FDI algorithms at the different functional layers.
For our purpose, the control and FDI schemes to be developed
should: 1) enable the realization of standard control and FDI
schemes; 2) be easily parameterized; and 3) take into account
the distributed process structure. In addition, to reduce the data
transmission costs, the scheduler parameters for the data trans-
missions as well as the synchronization within and between the
CSs should be integrated into the development of the controllers
and FDI/FTC algorithms.
III. INTEGRATED DESIGN FRAMEWORK FOR AN FT W-NCS
Here, we describe the integrated design framework for an in-
dustrial fault-tolerant W-NCS shown in Fig. 1.
A. Integrated Design at the Execution Layer
We first present the local control and FDI structures, algo-
rithms and the corresponding scheduling mechanism for the
data transmissions within a subsystem.
1) On the Data Transmissions: Following the TDMA mech-
anism, the data transmissions within a subsystem are periodic.
Let be the maximum data transmission time (including phys-
ical transmission and software operation times) between any
two nodes within the th subsystem. Define a time slot .
An operating cycle includes: i) time slots for the transmis-
sion of sensor data; 2) time slots for control commands; and
3) time slots for implementation of the communication
strategy. Let be the cyclic time with
(6)
To ensure the required deterministic real-time behavior,
should be bounded by the critical sampling time , i.e.,
(7)
where defines the upper bound of the maximum data trans-
mission time between any two nodes within the th subsystem
and is a parameter for dimensioning the capacity of the th
subnet.
Different from the application of robust control and filtering
theory as, for instance, reported in [27]–[29], in the integrated
design framework data transmission delays and packet loss are
mainly dealt with: 1) by dimensioning the capacity of the com-
munication nets according to (7) and 2) by running special com-
munication actions during the time slots reserved for the com-
munication. Supported by the TDMA mechanism, the first mea-
sure ensures that the influence of the transmission delays can be
generally neglected. In case that the transmission delay is larger
than , it will be treated as a missing packet. The handling of
packet loss is realized by means of the communication actions
like ACK, RTS (for repeating sending).
2) On Local Control and FDI Algorithms: Assume that an
estimate of , denoted by , is available at the be-
ginning of the th cycle, and sampling of is done at the
time instant where is some
integer. The following (local) control law is proposed:
(8)
(9)
where is the reference signal and received, to-
gether with from the th CS, denotes a stable
discrete-time LTI system which serves as the parameter transfer
matrix, , . The first term in (8) is
an observer-based state feedback law, while the second term is
the feedback of , which builds the so-called residual
signal vector. For the sake of simplifying the notation and design
issues it is assumed that and
thus . It is well
known that residual generation is the first step for a successful
FDI. Based on , , , faults
in the sensors and actuators embedded in the control loop
can be detected and isolated. The reader is referred to [31] for
the existing algorithms.
3) Realization of the Data Transmissions and the Scheduler:
Note that in the proposed W-NCS configuration ,
4. DING et al.: INTEGRATED DESIGN FRAMEWORK OF FAULT-TOLERANT WIRELESS NCSs FOR INDUSTRIAL AUTOMATIC CONTROL APPLICATIONS 465
instead of the sensor data, will be transmitted to the th CS,
immediately after it is generated. Considering that the value
range of is generally smaller than the one of
and, moreover, the residual signals contain all
information needed for the controllers and observers, trans-
mitting results in reduced transmission costs
without losing needed information. It follows from (8) that
all controllers , share received
from the th CS. It motivates saving the data ,
, , in one packet. In the multicast
way, this packet is sent by the th CS to all control loops
in the th subsystem. Having received the data from the th
CS, each control loop will decode the packet for ,
. As a result, it holds for in (6) ,
, then .
B. Integrated Design at the Supervision and Coordination
Layer
Recall that the th CS will receive the residual signals and
send the state estimate and the reference signals to the associated
control loops in each cycle time. While the reference signals
are set by the user, will be delivered
by an observer. For the observer and controller design purpose,
the subprocess model (1) is discretized with the sampling time
to yield
(10)
In order to construct an observer for estimating , information
about the couplings with the other CSs expressed in terms of
, , is needed. Suppose that in the time interval
updates in the th CS are realized at the time
instants
, and assume for
for . It turns out
(11)
where denotes the last time instant, at which a up-
date in the -th CS is realized before the time instant :
no update
in the
update
in the
no update in the
...
update in
the
As a result, the following discrete-time model is obtained for
the th subsystem:
(12)
with , . Note
that is time-varying.
For the purpose of constructing the observers at the CSs,
the following scheduler for the wireless networking of the CSs
is proposed. Assume that , , can be expressed
by with an integer . Let , be
(13)
In the time interval , the th CS,
, will, in the broadcast mode, send the estimate for
to all other CSs at the time instants
. It is evident that this
scheduler is periodic with as period time.
Remember that the subsystems may have different cycle
times. The introduction of the scheduler for the communica-
tions among the CSs is helpful to synchronize the actions in the
subsystems. For this purpose, we introduce the definition: the
time instants, , are
denoted by , , and they are ordered as
.
5. 466 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 9, NO. 1, FEBRUARY 2013
Based on the above scheduler and the discrete subsystem
model (12), the observer embedded in the th CS is constructed
as follows:
... (14)
where is the observer gain matrix to be designed.
Since the scheduler results in a periodic data transmis-
sions, it holds .
For the implementation of (14), the th CS receives: 1)
, sent by the (local) control loops
and 2) , sent by the other CSs, during the time
interval . The residual signal is used
both for improving the estimation performance and, together
with the available , , ,
for the computation of the local controller
while is applied for constructing , as defined
in (11), which describes the couplings between the th CS and
the other CSs.
It is well known that a successful FDI for the components
embedded in the th subsystem can be achieved: 1) by a suitable
selection of the stable post-filter for building
(15)
and 2) by evaluating and threshold settings [31]. It is worth
noting that the th CS has access to all available residual signals
from the control loops within the subsystem. As a result, the FDI
based on is more reliable and efficient in comparison with
a local FDI algorithm.
C. Management Layer
Depending on application purposes, the management layer
can be designed individually. In the laboratory WiNC platform
that will be described in Section V, a resource monitoring is
built, which is driven by fault knowledge provided by the FDI
algorithms. It is realized in form of a database, in which the
available sensors (including observers as soft sensors), actu-
ators, communication systems, process components together
with their redundancy are clustered in terms of their role for
executing a defined functionality (e.g., control or FDI). Re-
source management and reallocation can be formulated as an
optimization problem and solved by means of an optimization
algorithm [26]. In this paper, the management layer design
issues will not be addressed.
TABLE I
MAIN DESIGN PARAMETERS
IV. DESIGN ISSUES
It follows from (7), (14), and (15) that the control, FDI al-
gorithms, and communications are well parameterized, as sum-
marized in Table I. This section deals with the design issues of
these controller, observer and FDI parameters.
A. Overall Model of the W-NCS
To begin with, the overall W-NCS is modeled based on the
discrete-time models of the subsystems and the scheduler for the
communications between the subsystems, which are periodic
with the period time . To this end, ,
, in the time interval
(16)
are first brought into a vector. To simplify the notation, ,
as defined in (16) will be applied in the sequel if no con-
fusion is caused. We denote this vector by and, without
loss of the generality, suppose that
...
...
...
...
(17)
where denotes the vector consisting of all of those state
variables that have a update at the time instant . Again, for
the sake of simple notation, is now introduced to denote
the set of all of those subsystems, which have a update at the
time instant . It is clear that the vector works like a
buffer with a variable length, in which all state variables in the
time interval are saved. At the next time instant
, the state variables at the time instant are removed
from the buffer and those at the time instant are added. As
a result, is formed, which includes all state variables
6. DING et al.: INTEGRATED DESIGN FRAMEWORK OF FAULT-TOLERANT WIRELESS NCSs FOR INDUSTRIAL AUTOMATIC CONTROL APPLICATIONS 467
in the time interval . This procedure can be
modeled by
(18)
...
...
(19)
After a straightforward computation, we have finally
...
...
...
...
...
...
...
...
(20)
In this way, , , and can be determined. It is
clear that (18) is a linear time-periodic (LTP) system.
B. Observer Design
Using (20), the observer algorithm (14) can be rewritten as
...
...
...
...
(21)
where , , respectively, denote the estimation
for , , the residual vector
generated in the th subsystem with , and in-
cludes all the residual vectors generated in the subsystems be-
longing to . Recall that
...
It turns out
...
...
(22)
Now, taking into account the special form of the overall NCS
model (18), we can rewrite the observers of the form (14)
into one (distributed) observer as follows:
(23)
(24)
(25)
whose error dynamics is governed by
(26)
(27)
In [32], observer design schemes for LTP systems are presented,
which can be applied for our purpose.
C. Controller Design
To begin with, the idea behind the control law (8) is briefly in-
troduced. Let be the plant model
of a feedback control loop. It has been proven in [30] that all sta-
bilizing controllers (the so-called Youla parameterization [33])
can be written as
(28)
7. 468 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 9, NO. 1, FEBRUARY 2013
where is a state feedback gain matrix, is a stable param-
eterization matrix, is an estimation delivered by
(29)
and . Comparing (8) and (28) makes it
clear that (8) is a local realization of (28) as far as is
delivered by a full order observer like (29). For the purpose of
designing the controllers given in (8), apply the control law (8)
to (18), which leads to
(30)
...
...
...
... (31)
with being the time instant equal to the one of the th row
block in the state vector , numbering like
...
...
...
...
Hence, the overall system dynamics is described by
(32)
(33)
The basic requirement on the selection of is formulated as
finding so that the system
is stable. To this end, the approaches, e.g., given in [32] for
LTP controller design can be applied. Recall that the second
term in the control law (8) is the feedback of the residual vector
. The selection of a stable post-filter
...
will have no influence on the system stability, and can be dedi-
cated to improving the system robustness.
D. FDI Algorithms
Both at the execution and supervision and coordination
layers, the core of the FDI algorithms consists of the computa-
tion of the post-filters. For our purpose, the design of ,
, , is based on the local model
(34)
(35)
where the terms , model the unknown inputs e.g.,
caused by the couplings with other subsystems, process, and
sensor noises, etc. Similarly, the design of the post-filter ,
, is based on
(36)
(37)
Note that both models, (34)–(35) and (36)–(37), are LTP sys-
tems. In [34] and [35], a decoupling approach and a unified so-
lution for the LTP systems are presented, which can be used for
the design of the local and higher level FDI subsystems.
E. Advanced Design Issues
Below, some advanced design issues for improving the
W-NCS performance, robustness, and reliability are addressed.
1) Increasing Data Transmissions Among the Subsystems:
Recall that the observer (14) at the th subsystem is driven only
by the (local) residual vector . As a result, the struc-
ture of the observer gain matrix is restricted. One way to im-
prove the observer performance is to increase the data transmis-
sions between the sub-systems. To this end, the -th sub-system
can transmit together with in one packet
to all of the other subsystems.
2) Enhancing System Robustness and Reliability: In the pre-
vious study, uncertainties caused by for instance a linearization,
sampling errors and packet drops have not been taken into ac-
count by modeling. In order to increase the robustness of LTP
systems against disturbances and unknown inputs, the design
schemes presented in [32] and [35] can be applied. Recently,
there are a great of number of publications addressing the packet
drop issue in NCSs for the control issues [9], [28], [36], for the
filtering and observer design issues [37], [38], as well as for the
FDI issues [29], [39]–[41].
8. DING et al.: INTEGRATED DESIGN FRAMEWORK OF FAULT-TOLERANT WIRELESS NCSs FOR INDUSTRIAL AUTOMATIC CONTROL APPLICATIONS 469
Fig. 2. Schematic description of the WiNC platform.
V. EXPERIMENTATION PLATFORM WINC
Parallel to the theoretical study, efforts have been made to
construct a W-NCS platform, called WiNC [26]. This work is
strongly motivated by the need to demonstrate the application
of the proposed design framework. To this end, standard wire-
less cards supporting IEEE 802.11a/b/g standards have been
selected. In almost every available 802.11 hardware the MAC
protocol employs the CSMA/CA approach. In order to achieve
a reliable deterministic data transmissions, a new MAC pro-
tocol optimized for industrial wireless communication using the
available 802.11 based hardware is developed in our lab using
SoftMAC [42]. In SoftMAC several measures are taken to pro-
vide real-time capability. The result is that the carrier sensing
and the backoff procedure can be controlled and no additional
packets, like ACK or RTS/CTS, occur. SoftMAC allows user-
defined protocol implementation.
A. Platform Configuration
Fig. 2 shows the configuration of the WiNC platform that is
composed of several functionalities, a driver, and a protocol
stack optimized for industrial wireless communication. In the
platform, the communication functionality of organizing the
network access by use of a scheduler is based on time slots
and tailored. The control, observer and FDI functionalities are
integrated into the WiNC application layer. The protocol stack
integrates a simplified addressing scheme with a custom packet
structure and robust channel coding techniques, thus ensuring
deterministic transmission times. The main technical data are:
1) hardware: desktop computers with x86 architecture micro-
processors, equipped with one D-Link DWL-AG530 Tri-Mode
Dual-band PCI card and one data acquisition card and 2)
software: Linux operating system (Fedora 6 with RT-Preempt
Patch 2.6.20-rt8), SoftMAC, and COMEDI (COntrol and
MEasurement Device Interface).
B. Interfaces for the Parameterization and NCS Monitoring
WiNC is supported by a graphic user interface (GUI) and an
NCS monitor. The GUI is essential for the realization of the
integrated design, and consists of: 1) a parameter setting for
the controllers, observers, and FDI algorithms and 2) a direct
access to the MAC and setting of the scheduler. By means of
this GUI, the control and FDI parameters given in Table I, and
the scheduler described in the last sections can be directly given
by the user. It is also possible to input these parameters in the
MATLAB/SIMULINK environment. The WiNC monitor includes:
1) the standard functions like plots of all control and output
variables; 2) the diagnostic module that displays all fault types
and plots of residual signals; and 3) system statistics including
the control performance, the QoS of the network.
C. Tests and Applications
The WiNC has been tested under different working condi-
tions. For this purpose, a test bed has been built with two well-
known laboratory setups: Three-Tank as sub-system 1 with a
critical sampling time larger than 1 s and Inverted Pendulum
as sub-system 2 with a critical sampling time 50 ms. The first
subsystem is composed of three level sensors and two pumps
as actuators. The second one has two sensors and one actuator.
One of the tests was to run the system over night so that the wire-
less transmission channels remain relatively time-invariant. In
this test, a fixed antenna setup has been used with all sensors
and actuators being attached to the plants in the laboratory and
the controller being placed one floor below. The 2.4 GHz band
9. 470 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 9, NO. 1, FEBRUARY 2013
and the binary phase shift keying (BPSK) modulation with the
direct sequence spread spectrum (DSSS) spreading technique
which is expected to provide the most reliable communication
of all available modulation methods of the 802.11a/b/g stan-
dards have been applied. Data have been collected for two sce-
narios: without flexible retransmission request (FRR) and with
FRR. For these scenarios, the transmission power of all cards
has been varied in the range from 1 to 16 dBm. In [26], some
of the test results have been reported in details. WiNC and the
benchmark setups have also been successfully used in research
and education projects. In [26] and [39] successful realizations
of the FDI schemes for the subsystems Inverted Pendulum and
Three-Tank are reported.
VI. CONCLUSION
In this paper, a design framework for a fault-tolerant W-NCS
has been presented for industrial automatic control with high
real-time requirements. The essential idea of this framework is
the integrated design and parametrization of the control, FDI
algorithms and communication nets in a multilayer system con-
figuration. The core of the W-NCS is the application of a dis-
tributed observer and the local residual generators that serve
both for the control, FDI, and communication purposes. The
design and construction of the observer and residual generators
are realized with respect to the TDMA-based scheduler for the
data transmissions. This guarantees a deterministic data trans-
mission and allows a system design in the LTP system-theoret-
ical framework. In order to demonstrate the proposed integrated
design framework, a platform, WiNC, has been developed and
briefly presented in this paper.
ACKNOWLEDGMENT
The platform WiNC has been developed by the control (AKS)
and communication (NTS) groups at the University of Duis-
burg-Essen, which is in part funded by the German Research
Foundation. The authors would like to thank the NTS group
headed by Prof. Czylwik for the successful collaboration, Dr.
Chihaia, and Mr. Goldschmidt for the technical contributions.
Also, the authors are grateful to the anonymous reviewers for
their valuable comments.
REFERENCES
[1] J. R. Moyne and D. M. Tilbury, “The emergence of industrial control
networks for matufacturing control, diagnostics, and safety data,” Proc.
IEEE, vol. 95, no. 1, pp. 29–47, Jan. 2007.
[2] J. Baillieul and P. Antsaklis, “Control and communication challenges
in networked rea-time systems,” Proc. IEEE, vol. 95, no. 1, pp. 9–28,
Jan. 2007.
[3] R. Gupta and M.-Y. Chow, “Networked control system: Overview
and research trends,” IEEE Trans. Ind. Electron., vol. 57, no. 7, pp.
2527–2535, Jul. 2010.
[4] H. Ishii and B. Francis, Limited Data Rate in Control Systems With
Networks. Berlin, Germany: Springer, 2002.
[5] J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, “A survey of recent results
in networked control systems,” Proc. IEEE, vol. 95, no. 1, pp. 138–162,
Jan. 2007.
[6] F.-Y. Wang and D. Liu, Networked Control Systems. Berlin, Ger-
many: Springer-Verlag, 2008.
[7] Y. Xia, M. Fu, and G.-P. Liu, Analysis and Synthesis of Networked
Control Systems. Berlin, Germany: Springer-Verlag, 2011.
[8] W. Zhang, M. Branicky, and S. Phillips, “Stability of networked control
systems,” IEEE Control Syst., vol. 21, no. 1, pp. 84–99, Feb. 2001.
[9] G.-P. Liu, Y. Xia, D. Rees, and W. Hu, “Networked predictive control
of systems with random network delays in both forward and feedback
channels,” IEEE Trans. Ind. Electron., vol. 54, pp. 1282–1297, 2007.
[10] C. Huang, Y. Bai, and Y. Liu, “H-infinity state feedback control for
a class of networked cascade control systems with uncertain delay,”
IEEE Trans. Ind. Inf., vol. 6, no. 1, pp. 62–72, Feb. 2010.
[11] X. Luan, P. Shi, and F. Liu, “Stabilization of networked control systems
with random delays,” IEEE Trans. Ind. Electron., vol. 57, no. 9, pp.
4323–4330, Sep. 2010.
[12] F. J. Furrer, Industrieautomation Mit Ethernet-TCP/IP und Web-Tech-
nologie. : Hüthig Verlag, 2003.
[13] F. D. Pellegrini, D. Miorandi, S. Vitturi, and A. Zanella, “On the use of
wireless networks at low level of factory automation systems,” IEEE
Trans. Ind. Informat., vol. 2, no. 2, pp. 129–143, May 2006.
[14] A. Willig, “Recent and emerging topics in wireless industrial communi-
cations: A selection,” IEEE Trans. Ind. Inf., vol. 4, no. 2, pp. 102–124,
May 2008.
[15] N. J. Ploplys, P. A. Kawka, and A. G. Alleyne, “Closed-loop control
over wireless networks,” IEEE Control Syst., vol. 24, no. 3, pp. 58–71,
Jun. 2004.
[16] A. Ulusoy, O. Gurbuz, and A. Onat, “Wireless model-based predictive
networked control systems over cooperative wireless network,” IEEE
Trans. Indus. Inf., vol. 7, no. 1, pp. 41–51, Feb. 2011.
[17] J. Chen, X. Cao, P. Cheng, Y. Xiao, and Y. Sun, “Distributed collabora-
tive control for industrial automation with wireless sensor and actuator
networks,” IEEE Trans. Ind. Electron., vol. 57, no. 12, pp. 4219–4230,
Dec. 2010.
[18] ISA-100.11a-2009 Wireless Systems for Industrial Automation:
Process Control and Related Applications ISA, 2009, ISA.
[19] A. Willig, “Redundancy concepts to increase transmission reliability
in wireless industrial LANs,” IEEE Trans. Ind. Inf., vol. 1, no. 3, pp.
173–182, Aug. 2005.
[20] M. Jonsson and K. Kunert, “Towards reliable wireless industrial com-
munication with real-time guarantees,” IEEE Trans. Ind. Inf., vol. 5,
no. 4, pp. 429–442, Nov. 2009.
[21] R. J. Patton, C. Kamphampati, A. Casavola, P. Zhang, S. Ding, and D.
Sauter, “A generic strategy for fault-tolerance in control systems dis-
tributed over a network,” Eur. J. Control, vol. 13, pp. 280–296, 2007.
[22] H. Fang, H. Ye, and M. Zhong, “Fault diagnosis of networked control
systems,” Annu. Rev. Control, vol. 31, pp. 55–68, 2007.
[23] C. Aubrun, D. Sauter, and J. Yame, “Fault diagnosis of networked con-
trol systems,” Int. J. Appl. Math. Comput. Sci., vol. 18, pp. 525–537,
2008.
[24] Z. Mao, B. Jiang, and P. Shi, “Observer-based fault-tolerant control for
a class of networked control systems with transfer delays,” J. Franklin
Inst., vol. 348, pp. 763–776, 2011.
[25] K. Lee, S. Lee, and M. Lee, “QoS-based remote control of networked
control systems via profibus token passing protocol,” IEEE Trans. Ind.
Inf., vol. 1, no. 3, pp. 183–191, Aug. 2005.
[26] C. I. Chihaia, “Active fault-tolerance in wireless networked control
systems,” Ph.D. dissertation, Dept. Electr. Eng., University of Duis-
burg-Essen, Duisburg, Germany, 2010.
[27] J. Xiong and J. Lam, “Stabilization of linear systems over networks
with bounded packet loss,” Automatica, vol. 43, pp. 80–87, 2007.
[28] H. Gao, T. Chen, and J. Lam, “A new delay system approach to net-
worked-based control,” Automatica, vol. 44, pp. 39–52, 2008.
[29] X. He, Z. Wang, and D. Zhou, “Robust fault detection for networked
systems with communication delay and data missing,” Automatica, vol.
45, pp. 2634–2639, 2009.
[30] S. X. Ding, G. Yang, P. Zhang, E. Ding, T. Jeinsch, N. Weinhold, and
M. Schulalbers, “Feedback control structures, embedded residual sig-
nals and feedcak control schemes with an integrated residual access,”
IEEE Trans. Control Syst. Technol., vol. 18, pp. 352–367, 2010.
[31] S. X. Ding, Model-Based Fault Diagnosis Techniques—Design
Schemes, Algorithms, and Tools. Berlin, Germany: Springer-Verlag,
2008.
[32] S. Bittanti and P. Colaneri, Periodic Systems, Filtering and Control.
Berlin, Germany: Springer, 2009.
[33] K. Zhou, Essential of Robust Control. Englewood Cliffs, NJ: Pren-
tice-Hall, 1998.
10. DING et al.: INTEGRATED DESIGN FRAMEWORK OF FAULT-TOLERANT WIRELESS NCSs FOR INDUSTRIAL AUTOMATIC CONTROL APPLICATIONS 471
[34] P. Zhang and S. Ding, “Disturbance decoupling in fault detection of
linear periodic systems,” Automatica, vol. 43, pp. 1410–1417, 2007.
[35] P. Zhang and S. X. Ding, “On fault detection in linear discrete-time,
periodic, and sampled-data systems (survey),” J. Control Sci. Eng., pp.
1–18, 2008.
[36] H. Gao, X. Meng, T. Chen, and J. Lam, “Stabilization of networked
control systems with dynamic output-feedback controllers,” SIAM J.
Contr. Optim., vol. 48, pp. 3643–3658, 2010.
[37] L. Shi, L. Xie, and R. Murray, “Kalman filtering over a packet-de-
laying network: A probabilistic approach,” Automatica, vol. 45, pp.
2134–2140, 2009.
[38] N. Xiao, L. Xie, and M. Fu, “Kalman filtering over unreliable commu-
nication networks with bounded Markovian packet dropouts,” Int. J.
Robust Nonlinear Contr., vol. 19, pp. 1770–1786, 2009.
[39] Y. Wang, H. Ye, S. X. Ding, G. Wang, and D. Zhou, “Residual gener-
ation and evaluation of networked control systems subject to random
packet dropout,” Automatica, vol. 45, pp. 2427–2434, 2009.
[40] Z. Mao, B. Jiang, and P. Shi, “Protocol and fault detection design for
nonlinear networked control systems,” IEEE Trans. Circuits Syst. II,
Exp. Briefs, vol. 56, no. 2, pp. 255–259, Feb. 2009.
[41] D. Sauter, S. Li, and C. Aubrun, “Robust fault diagnosis of networked
control systems,” Int. J. Adaptive Contr. Signal Process., vol. 23, pp.
722–736, 2009.
[42] M. Neufeld, J. Fifiled, C. Doerr, A. Sheth, and D. Grunwald, “SoftMAC
flexible wireless research platform,” HotNets, vol. IV, 2005.
Steven X. Ding received the Ph.D. degree in elec-
trical engineering from the Gerhard-Mercator Uni-
versity of Duisburg, Duisburg, Germany, in 1992.
From 1992 to 1994, he was an R&D Engineer with
Rheinmetall GmbH. From 1995 to 2001, he was a
Professor of control engineering with the University
of Applied Science Lausitz, Senftenberg, Germany,
and served as Vice President of this university during
1998 to 2000. Since 2001, he has been a Professor
of control engineering and the head of the Institute
for Automatic Control and Complex Systems (AKS)
at the University of Duisburg-Essen, Duisburg, Germany. His research interests
are model-based and data-driven fault diagnosis, fault-tolerant systems and their
application in different industrial sectors.
Ping Zhang received the Ph.D. degree in control en-
gineering from Tsinghua University, Beijing, China,
in 2002.
From 2002 to 2007, she was with the Institute for
Automatic Control and Complex Systems (AKS),
University of Duisburg-Essen, Duisburg, Germany.
From 2007 to 2012, she was with the Competence
Center of Automation Technology, BASF SE,
Germany. Since 2012, she has been a Professor
of automation engineering with the Rhine-Waal
University of Applied Sciences, Germany. Her
research interests are model and data based fault diagnosis, fault tolerant
control, periodic and time-varying systems, networked control systems, plant
asset management, and their applications in the process industry, automobile
industry and energy systems.
Shen Yin received the B.E. degree in automation
from Harbin Institute of Technology, Harbin, China,
in 2004, and the M.Sc. degree in control and in-
formation system and Ph.D. degree in electrical
engineering and information technology from Uni-
versity of Duisburg-Essen, Duisburg, Germany, in
2007 and 2012, respectively.
He is currently with the Institute of Intelli-
gent Control and Systems, Harbin Institute of
Technology, Harbin, China. His research interests
are model-based and data-driven fault diagnosis,
fault-tolerant control, and their application to large-scale industrial processes.
Eve L. Ding received the Ph.D. degree in mechanical
engineering from the Gerhard-Mercator University,
Duisburg, Germany, in 1991.
Between 1991–1994, she held academic positions
with the University of Bremen and the University
of Rostock. From 1995 to 1999, she was an R&D
Engineer with Continental Teves AG & Co. OHG,
Germany, where she was responsible for the develop-
ment of fault diagnosis systems in ESP. Since 1999,
she has been a Professor of control engineering with
the University of Applied Science, Gelsenkirchen,
Germany. Her research interests are model-based fault diagnosis, fault-tolerant
systems, and their application in industry with a focus on automotive systems.