Logic Verification System for Power Plant Sequence Diagrams

Size: px
Start display at page:

Download "Logic Verification System for Power Plant Sequence Diagrams"

Transcription

1 Journal of Nuclear Science and Technology ISSN: (Print) (Online) Journal homepage: Logic Verification System for Power Plant Sequence Diagrams Mitsuko FUKUDA, Naoyuki YAMADA, Toshiaki TESHIMA, Ken'ichi KAN & Mitsugu UTSUNOMIYA To cite this article: Mitsuko FUKUDA, Naoyuki YAMADA, Toshiaki TESHIMA, Ken'ichi KAN & Mitsugu UTSUNOMIYA (1994) Logic Verification System for Power Plant Sequence Diagrams, Journal of Nuclear Science and Technology, 31:2, , DOI: / To link to this article: Published online: 15 Mar Submit your article to this journal Article views: 323 View related articles Citing articles: 1 View citing articles Full Terms & Conditions of access and use can be found at

2 Journal of NUCLEAR SCIENCE and TECIINOLOGY, 31121, pp (February 1994). Logic Verification System for Power Plant Sequence Diagrams Mitsuko FUKUDA, Naoyuki YAMADA, Energy Research Laboratory, Hitachi, Ltd. * Toshiaki TESHIMA, Ken'ichi KAN and Mitsugu UTSUNOMIYA Oinika Works, Hitachi, Ltd.* Received November A logic verification system for sequence diagrams of power plants has been developed. The system's main function is to verify correctness of the logic realized by sequence diagrams for power plant control systems. The verification is based on a symbolic comparison of the logic of the sequence diagrams with tbe logic of the corresponding IBDs (Interlock Block Diagrams) in combination with reference to design knowledge. The developed system points out the sub-circuit which is responsible for any existing mismatches between the IBD logic and the logic realized by the sequence diagrams. Applications to the verification of actual sequence diagrams of power plants confirmed that the developed system is practical and effective. KEY WORDS: verification, verification system, sequence diagram, control systems, nuclear power plants, logic, relay circuit I. INTRODUCTION Design verification is one of the key techniques for improving reliability of engineering design; for large scale plants, assuring design correctness is absolutely necessary. Sequence diagrams of power plant control systems are produced in the detailed design process and amount to more than 15,000 sheets. In order to confirm their correctness, they are inspected and verified regarding many aspects including component connectivity, control logic, control characteristics etc. Currently, this verification is performed manually in almost all cases and therefore, time-consuming and prone to human error. Then, the final goal of the research is to develop a total design verification system for power plant control systems which is efficient and also free from human error. As a main part of the total design veriecation system, a logic verification system was developed. In design of power plant control systems, CAD (Computer Aided Design) systems are now widely used to draw sequence diagrams. These CAD systems, specialized for sequence diagrams, have advanced functions of checking design integrity and provide automatic detection of disconnections, short circuits and so on. However, they have no function for verifying design correctness against the design specifications. The developed system serves to the logic verification of sequence diagrams of power plant control systems. In the field of VLSI (Very Large Scale Integrated circuit), design, various automated verification methods have been developed. Generally, there are two approaches for verification of design correctness. One is to verify the function of the circuit. The function is first extracted from circuit diagrams and then compared with the functional specification") ('I. The other is to verify the equivalence of connectivities of two diagrams such as VLSI * Omika-cho. Hitachi-shi

3 Vol. 31, No. 2 (Feb. 1994) 103 mask-patterns and their transistor-level circuit c4). Because a sequence diagram is a kind of logical circuit diagram and its specifications are given by IBDs (Interlock Block Diagrams), the former approach is also applicable to the verification of sequence diagram. However, sequence diagrams are complicated circuit diagrams and they differ from the IBDs in their description. If there is no information about where and what the design flaw is, it is very difficult to correct large sequence diagrams. Therefore, two methods, one is to verify design correctness and the other to identify design flaws, are necessary for practical verification. After a brief discussion of the verification problem of sequence diagrams, a logic verification method, which includes a new method to identify design flaws, is described in detail along with the system configuration. Some examples of logic verification are also demonstrated. II. SEQUENCE DIAGRAMS DESIGN Practical design flow of sequence diagrams in power plant control systems may change according to the characteristics of the objective plant, the design organization, and so on. However, the skeletal design process which starts from specification documents and the master plan, and advances to sequence diagrams via some intermediate documents is commonly applied. Sequence diagrams, which are the objective diagrams to be verified in this paper, are designed on the basis of an intermediate document called IBD. An IBD and its corresponding sequence diagram are shown in Figs. 1 and 2, respectively. Both figures describe the same logic to control plant equipment, but in different styles. In IBDs, the logic is represented by a logical diagram that relates an control output to inputs which are signals of switches and detectors. On the other hand, sequence diagrams describe a circuit to generate electrical signals according to the given control logic. Real control circuits are constructed by referring to these sequence diagrams. <Input AND 0 Output D O R 09 NOT Fig. 1 Example of interlock block diagram Lower Bus Fig. 2 0 Lamp o Relay o I Contact Manual z t Switch 0 Relay Coil I A-contact g B-contact Example of sequence diagram Usually, sequence diagrams are designed by expert designers utilizing the following information : (1) The control logic and 1/0 signal names given in the IBDs. (2) The design knowledge which includes hardware knowledge of the plant components, control devices, and fundamental knowledge about electrical and other engineering areas. An IBD represents a logic by using 1/0 signal symbols and logical operator symbols. Figure 1 represents the logic, 1 (ClAC2)V C3=+X. In IBDs, signals are transmitted only in the direction specified by the arrows through logical operator symbols. Figure 2 realizes the logic given by Fig. 1. The inputs C1, C2 and C3 in Fig. 1 correspond to the contacts C1, C2 and C3 respectively, and the output X in Fig. 1 is realized by the coil of relay X. In Fig. 2, C1 and C2 are relay contacts and C3 is a manual switch. Relay contacts behave according to the excitation state of their corresponding relay coils. There are several contact types. An A-contact is a popular type; it closes if its corresponding coil is excited. Contacts C1 and C2 are A-contacts. For example, contact C1 closes if coil C1 is excited. Contact C3 is also an A-contact

4 104 J. Nucl. Sci. Technol., which closes when the switch button is pushed. Contact XX is a B-contact; its behavior is opposite to that of the A-contact. A B- contact closes if its corresponding coil is not excited. For example, contact XX is closed if coil XX is not excited. A relay coil is excited when a current path is realized between the upper and the lower buses. For example, coil XX is excited when both C1 and C2 are closed. In sequence diagrams, the control logic is realized by the condition to trigger excitation of one relay coil. For example, the logic required for the output X in Fig. 1 is realized by the condition to trigger excitation of coil X in Fig. 2. Operators AND and OR in IBDs are realized by connections between the contacts. For example, connectivity between contacts C1 and C2 realizes an AND operator, and connectivity between contact XX and C3 realizes an OR operator. The NOT operator is realized by using a B-contact. Also detectors and switches have some contacts. A detector is a device which has a sensor unit and one or more associated contacts. A switch has one or more contacts which move asynchronously. In sequence diagrams, the logic is often realized by using many auxiliary relays. In Fig. 2, XX is such an auxiliary relay. Contacts and coils of an auxiliary relay may appear in different sheets. In addition to auxiliary relays, lamps, diodes, resisters and test-terminals for testers are also added for maintenance and protection of the circuit. But they are not used to realize the logic. Due to these differences in description, extraction and comparison of the two logics specified by IBDs and sequence diagrams involve rather complicated processing. In order to verify the logic, designers have to find every possible current path in the sequence diagrams, and have to interpret each component s behavior and each connectivity. It is difficult and time-consuming to verify large sequence diagrams. Thus, the necessity and importance of automating the verification of the sequence diagrams against the IBDs become readily apparent. III. LOGIC VERIFICATION SYSTEM 1. System Configuration The configuration of the verification system is shown in Fig. 3. The logic verification system consists of two main programs, a verification program and a conversion program, and databases containing IBDs, sequence diagrams and design knowledge. Sequence diagrams are inputted through a sequence CAD program. The sequence CAD program used is a conventional one, which provides expert designers with functions for inputting sequence diagrams interactively. The sequence diagram data consists of component properties including names, types, connectivity with other components and other items specific to each component. The conversion program translates the CAD data format, and adds compositional information to switches and detectors of the sequence diagram by referring to the specification data. The specification data contains compositional information of each device Sequence + Diagram GAD Dat* CAD Data Conversion Program + Logic Extraction Unit

5 Vol. 31, No. 2 (Feb. 1994) 105 type. The verification program extracts and verifies the logic realized by sequence diagrams. As for the design knowledge, it is impractical to store all the knowledge that expert designers utilize during the design process. The developed system contains only the knowledge to interpret the sequence diagrams as control logic. The verification is performed for each output signal which the user specifies by the name in the IBD. 2. Logic Verification Method As mentioned earlier, there are two approaches to verify design correctness. One is to extract functions from each diagram and compare them. The other is to select or generate comparable connectivities from each diagram and compare them(4). The former approach is used for logic design verification of relay circuits''). The correctness of sequence diagrams can be proved by the former approach, but the design flaw cannot be identified. Because details of the sequence diagram design are left to the discretion of the designers, there are many different sequence diagrams that realize the same logic. Therefore, the latter approach is seldom applied to sequence diagrams. The present verification method is based on the former approach. The developed verification method extracts the control logic realized by the sequence diagrams and compares it with the logic given by the IBD. The two logical expressions are the same if the sequence diagrams are designed correctly. Though this approach can provide a way to judge the correctness of the sequence diagrams, it cannot identify the design flaws. Therefore, a new method to identify the design flaw is developed and introduced to the logic verification system. The overall flow of the logic verification is shown in Fig. 4. One of the key features of the developed system is the design flaw identification. The developed system finds the flaw-responsible sub-circuit, which contains the connectivities or components that cause the logical mismatch. Verification results contain information on how the flaw-responsible sub-circuit Fig. 4 V 4 Input IBD and sequence diagram CAD data Convert CAD data 4 Extract the logic realized bv the circuit 4 * Transform the extracted logic into the DNF exdression Compare the extracted logic with the IBD's logic atched? Identify the sub-circuit which is responsible for the mismatch of the logic types Display verification results IBD : Interlock Bhk D ram DNF : Disjunclive Nor~&%orm Flow chart of logic verification differs from the correct one, and suggests how to correct it. After inputting both IBDs and sequence diagrams data, verification starts by user input. In the following, each step is described in detail : ( 1 ) Data Conversion The conversion program translates the format of the CAD data files to the format of the verification system's data file, and adds compositional information to switches and detectors of the sequence diagram by referring to the specification database. A detector has a sensor unit and one or more contacts connected to the sensor unit, and a switch has some constructed contacts. But they are often simplified in CAD data. For example, a detector is often drawn as a simple box with some terminals, a switch is represented by some independent contact symbols. The conversion program adds compositional infor

6 106 J. Nucl. Sci. Technol., mation to the simplified components using the specification data and facilitates the subsequent logic extraction. The specification data contain information about the internal composition of each device type. For example, they include information about correspondence between the switch position and the contacts behavior. The conversion program refers to the type of switch and generates information about how to interpret each contact. If a switch has three positions, information telling at which position the contact closes is added. As for a detector, the program selects the corresponding internal composition form and adds contact type information to each pair of the detector s terminals. ( 2) Logic Extraction A logic extraction program extracts logic from sequence diagrams by searching for connectivities and interpreting connected components. The program starts from the specified relay coil and traces the connectivities toward the upper and lower buses respectively. According to each component type and connectivity, sequence diagrams are interpreted to a logical expression. The interpretation rules assigning a logical value to a device are prepared for each device type. A loigcal value is a logical constant : true/false, or a logical variable. A logical value is assigned to each component according to its type, e.g. true for a lamp, false for a large impedance resistor, a logical variable for a relay contact, and so on. Generally, there are two ways to design sequence diagrams. One is a commonly used in which the logic is realized as the conditions to excite the specified relay coil. That is to say, the coil is not excited usually, and excited when the condition is true. The other is its opposite. The coil is excited ordinarily, and not excited when the condition is true. The latter is mainly used for the most important circuits, such as the reactor protection circuits. In this paper, only procedures for the former way are described, though the verification system handles diagrams of the latter way similarly. Each relay coil is interpreted to a logical -16- variable, which takes the logical value true when the coil is excited, but is false otherwise. Relay contacts are interpreted according to the variable assigned to their coil. An A-contact, which is normally open, is interpreted as the logical variable assigned to its coil. A B-contact, which is normally closed, is interpreted as the inverse of the variable assigned to its coil. A time delay contact is interpreted as a variable with a timer operator. Each contact of the switches and detectors is interpreted similarly. Connectivities between components are interpreted to logical operators,,4 (AND) and V(0R). As shown in Fig. 5(a), if a relay coil and other components are connected in series, the program interprets them as an AND expression. If the components, except for the relay coil, are connected in parallel, they are interpreted as an OR expression as shown in Fig. 5(b). The logic extraction program searches every possible current path through the relay coil which corresponds to the output signal name specified by the user. If the path contains any auxiliary relay contact, the extraction program searches the current path from the auxiliary relay coil too. For example, in Fig. 2, relay XX is an auxiliary relay, whose contact is contained in the current path of relay X. The extraction program searches the current path through XX after searching the current paths through X. (a) Series connection (b) Series connection representing an representing an AND expression OR expression (ClACZ)=IX (ClVCZ)+X Fig. 5 Examples of series and parallel connections In many cases, sequence diagrams contain a large number of components including those components for only maintenance and protection of circuits. Then, to reduce the search

7 Vol. 31, No. 2 (Feb. 1994) 107 space, while searching the current path, the program checks the component behavior and eliminates any unnecessary search path which cannot trigger excitation. For example, when the connected component is a large impedance element or the B-contact of the specified relay, it intercepts the current through this path. Then, the program eliminates the path containing this component from the search space so that the unnecessary path is omitted in the logic extraction and the following processes. ( 3 ) Logic Comparison The extracted logic and the logic given by the IBD can be transformed into exactly the same expression if the sequence diagrams are designed correctly. To facilitate comparison, the logic is transformed into a DNF (Disjunctive Normal Form) expression. A DNF expression is a logical OR of AND clauses such as (xay)v(w,r\z) where x, y, w and z are logical variables. An AND clause is a logical AND of terms. One term can also be one AND clause. A term is one variable, a negation of a variable, a variable with a timer operator or a negation of that. For example, xay, xa(1 y), 1 x and y are AND clauses. The verification program compares the two logical expressions. If they are the same, the sequence diagrams are found to be correct. And the program gives a message telling of their correctness. Otherwise, the program compares each AND clauses of the two expressions to find the sub-circuit which is responsible for the logical mismatch. In sequence diagrams, a series circuit usually realizes an AND clause as shown in Fig. 5. One current path between buses corresponds to a series circuit. The verification program regards one current path as one subcircuit. Then each current path corresponds to an AND clause. So every AND clause which contains the mismatched part of the logical expression becomes a candidate for the sub-circuit responsible for the flaw. ( 4 ) Design Flaw Identification a. Flaw types The verification program defines five flaw types for the flaw identification process. The five types are classified into two categories. In the first category the sequence diagrams realize redundant conditions besides the whole IBD logic. In this case, an undesirable output can be produced by the redundant condition. This flaw type is called turn around. An example is the sequence diagram which realizes the logic (xay)v(xaz) when the IBD requires xay. Sometimes, using the same contacts and/or lines produces an unexpected current path, i.e. turn around. Figure 6 shows a circuit containing a turn around caused by using contacts a and b in common. The sequence diagrams can be corrected by interception of the redundant current path. Fig. 6 Turn around path ii glx.p QQ IBD : (shahe)v(sabhf)jw2 Example of turn around flaw The second category includes the other four flaw types. In this category sequence diagrams realize unnecessary conditions and the IBD logic is not completed. The flaw types are as follows: (1) Unsuitable contact type is a mismatch of terms of AND clauses. An example is realizing aab when the IBD requires aa(timer b 1s). It is caused by misuse of contact types. A delayed contact should be used. (2) Unsuitable device name is a mismatch of variable names in the clauses. It is caused by misuse or mis-writing of similar devices. (3) Excess is the case in which a clause of the extracted logic includes extra terms besides the IBD clause. To realize aabac when the IBD requires aab is an example. This is caused by mis-connec- -17-

8 108 J. Nucl. Sci. Technol.. tion or using the same contacts and lines. (4) Lack is the case in which a clause of the extracted logic lacks one or more terms of the IBD clause. The identification program generates design flaw hypotheses according to the five flaw types. b. Pre-processing for flaw identification To facilitate flaw identification, the verification program restructures the path data from the search history data that are stored during logic extraction. The search history data are given to each relay coil and they consist of relay contacts, switches, and the components interpreted as true. The program removes the components interpreted as true from searched paths because they do not change the logic realized by the paths. Then the restructured path data contain the components that may cause logical mismatches. For instance, a small impedance resistor is in a search history, but it does not appear in a restructured path data. The program links each relay contacts of the reduced paths to its coil so that the restructured path data represent the relations of contacts and their corresponding parts of the logic. Figure 7(a) shows an example of a sequence diagram and (b) illustrates its restructured path data. The contacts of each path are represented in Fig. 7(b) by the identifiers written in parentheses in Fig. 7(a). In the restructured path data, each coil is linked to its trigger paths. For example, coil X is linked to Path-1 and -2 which respectively correspond to the current path through C1 and the relay XX s contact and the current path through contacts C1 and C2. Every trigger path, Path-1, -2 and -3, is also linked to the clauses realized by the corresponding current paths. Path-1 contains an auxiliary relay contact XX-001, so the clause linked to Path-1 includes the terms of the clause linked to Path-3. Each auxiliary relay contact, XX-001 for example, is linked to its coil. Path-1 includes XX-001. Next, the program examines whether the paths realize a certain part of the IBD logic. When a path realizes an IBD clause, every The condition realized by Path- 7 \ Fig. 7 Small Impedance Resistor IBD = (ahbhci)v(cl hc2) (a) Sequence diagram YaAbAcl & Ac2 its coil XX - = link (b) Restructured path data Example of sequence diagram and its restructured path data contact of the path is marked correct. In Fig. 7(b), Path-2 realizes the second clause of the IBD logic. Then C1-002 and C2-003 are marked correct. Here, the trigger paths may use the same contact, so that the marked contact can be contained in incorrect paths. The contacts of the auxiliary coil s trigger paths are marked similarly. To identify the incorrect part of the diagrams, the verification program assumes that the marked contacts cannot be replaced or removed. c. Identification process When the extracted logic is not the same as the IBD logic, the verification program identifies the design flaw. The flow of the flaw identification is shown in Fig. 8. First, the program checks whether the extracted logic subsumes the IBD logic. A hypothesis turn around is set if every IBD clause is realized and extra clauses are found in the extracted logic. In this case, the redundant paths that realize the unnecessary clause are

9 Vol. 31, No. 2 (Feb. 1994) 109 Restructure the path data II and mark correct contacts.c Explain the flaw according to the hypothesis Couple each mismatched clause with the IBDs clause - Generates the flaw hypothesis according to the mismatch pattern of the clauses I I Modifythetriggerpath Reject the hypothesis that realize the identified and judged to be responsible for turn around. Otherwise, the program checks other characteristics. The program examines every path linked to the flaw candidate clauses nominated in the logic comparison. Each linked clause is compared with the unrealized clause of the IBD logic and is coupled with the most similar IBD clause that has highest rate of the matched terms. Based on the mismatch pattern of the clauses, the program generates flaw hypothesis according to the following rules : (1) When both clauses have the same variable set, but different operators, unsuitable contact type is hypothesized. The program finds the contact to be replaced among the unmarked contacts. (2) When both clauses have the same operators, but some variable names are different, unsuitable device name is hypothesized. The program infers which contact should be replaced or which device name should be corrected. (3) When the term set of the realized clause implies that of the IBD clause, excess is hypothesized. The program Fig. 8 Flow chart of identification process -19- finds the contact corresponding to the excessive term. (4) Lack is the opposite case of excess. One or more contacts should be added to realize the missing terms of the IBD clause. To confirm the hypotheses, the trigger path including the unmarked contacts is modified and checked. For unsuitable contact type or unsuitable device name, a proper contact type or a device name is inferred. Then the unmarked contacts are temporarily replaced by the inference results. For excess, the unnecessary contacts are removed. Here, only the unmarked contacts can be replaced or removed. If the path does not contain any unmarked contact, the program examines the path from the auxiliary relay coil whose contact is contained in the main path. If the auxiliary path contains some unmarked contacts, the program tries to modify them in the same way. The verification program extract the logic from the modified path. If a clause of the newly extracted logic is equal to the corresponding IBD clause, the hypothesis is adopted as the explanation of the flaw. The program

10 110 J. Nucl. Sci. Technol., outputs where and what the design flaw is. Otherwise, the hypothesis is rejected and the verification program generates another hypothesis. Using hypothetical reasoning, the program identifies a design flaw by any mismatch of logical expressions. As for complex flaws, the combined hypotheses can be generated from combination of characteristics of each flaw type. However, the program only makes flaw identifications within the predetermined categories and unexpected flaw types may not be identified correctly. But even in that case, the verification program properly detects that the diagram contains some flaws. IV. EXAMPLES The verification program is implemented by Common Lisp and is running on an engineering workstation. The CAD program is running on a main frame computer, since it handles large databases. These machines are connected by a network for data transfer. The logic verification system is applied to the sequence diagram shown in Fig. 6. The corresponding IBD requires that w2 is true when s, a and Q, or s, b and f are true. The circuit contains two turn around paths. The path data for flaw identification are shown in Fig. 9. The IBD logic is (saaae)v(sabaf) and the extracted logic is (saaae)v(sabaf) Fig. 9 (shahe) V(shahchdhf) V (shbhchdhe) V (shbhf) Path-2 ath-3 \.ath-4# J Path data for turn around flaw identification V(s A a A c Ad Af) V (s A b A c A d A el. Every clause of the IBD logic is contained in the extracted logic. So, the program tries to find the redundant path. In this case, both the necessary clause and the unnecessary clause are realized by Path-0. Hence, Path-0 is excluded from candidates of redundant paths. Next, the program tries to find unnecessary paths from the auxiliary paths ; Path-1.v-4. Every contact of Path-1 and -4 has been marked correct, so Path-1 and -4 :annot be the flaw-responsible sub-circuit. Then, Path-2 and -3 are found to be redundant paths responsible for turn around. Figure 10 shows the verification result of the circuit shown in Fig. 6. The last line in *Turn around by following paths # Path : upper-bus => ( 1 A 2 ) ( 1 C 2 ) ( 2 D 1 ) ( 1 F 2 ) [Yl (= lower-bus Path : upper-bus =) ( 1 B 2 ) < 1 D 2 ) ( 2 C 1 ) ( 1 E 2 ) [YI <= lower-bus ***** Intercept above paths. / I t Relay contact or switch ; ( terminal-id devicename terminal-id ) Relay coil : [ devicename I I $I It=rI@l@ l*lm Fig. 10 Verification result

11 Vol. 31, No. 2 (Feb. 1994) 111 Fig. 10 is an advisory message telling that the sequence diagram can be corrected by interception of the redundant paths. Figure 11 shows another example of a sequence diagram. It is a part of a circuit of an actual power plant with deliberately imposed design flaws. (The sequence diagrams without the imposed design flaws are verified correctly.) Coil 86G1 in the left corner is to be triggered. The leftmost path from coil High impe lamp 86G1 contains three components, a lamp, a test-terminal and a contact of 86G1. In this case, the lamp is eliminated from the search space during the logic extraction since it is specified to have a large impedance. Testterminals are always closed during normal operation. So the test-terminal is always interpreted as true. Also the B-contact of 86G1 is interpreted as true because it cannot be open before the coil is excited. Manual switch Time delayed wntacl Hand-reset relay wntacl Resistor Contacts of detectors Lamp Test terminal The coil specified to be triggered Fig. 11 Part of sequence diagram Deliberately imposed flaw An example display of verification results is shown in Fig. 12. Line 6 from the top show the messages for unsuitable device name. These include the flaw type, the mismatched clause of the sequence diagram, the corresponding clause of the IBD and the responsible sub-circuit of the sequence diagram. The sixth line is an advisory message telling that the contact of relay 40x1 specified by terminal-id 1 and 2 should be changed. * Unsuitable device name SEQUENCE : (AND 40X 52G (NOT 60G)) I B D : (AND 40G 52G (NOT 60G)) Path : upper-bus =) ( 11 52GX2 12 ) ( 10 6OGFiX 2 ) ( 1 40x1 2 ) ( C G1 C4 ) ( 5 86G1 6 ) I86Gll<<= lower-bus ***** Change contact (1-2) of 40x1. *Unsuitable contact type c fifypel 1-1 SEQUENCE 64G1 I B D : (TIMER 64G1 1s) Path : upper-bus =) ( 1 64G1 2 ) ( 1 64G1X 2 ) ( 1c lt01 11 ) ( 5 86G1 6 ) [86G11 <= lower-bus ***** Unsuitable contact (1-2) of 64-4GlX. Change type : Acontact -) timing relay Acontact *Following IBD s clauses are not realized. 87MT (R) \ Fig. 12 Verification result

12 112 J. Nucl. Sci. Technol., The 7th-13th lines are for unsuitable contact type. These show the sub-circuit responsible for the flaw, and an advisory message telling that the unsuitable contact name, and the contact type to be replaced. The last two lines show the missing clause by disconnection. The program detects this flaw, though it does not identify where it is disconnected. The user can find this out by using the disconnection checking function provided by the CAD program. V. DISCUSSION Though logic realized in sequence diagrams is basically a kind of sequential logic, the developed system verifies it as a combinational logic, because sequential logic can be regarded as a series of combinational logics. Cenerally, a relay circuit realizes the logic that depends on the existing inputs and the preceding output. Then the logic realized in sequence diagrams can be converted to a short series of combinational logics. So that the whole series of combinational logics can be verified. Most of the logic realized in sequence diagrams can be verified as the condition to trigger excitation of the specified coil. As for the sequence diagrams designed in the opposite way, the developed system provides another logical value assigning rule set for logic extraction. The extracted logic is transformed into another standard form called a CNF (Conjunctive Normal Form) expression instead of a DNF expression. A CNF expression is a logical AND of OR clauses. Each OR clause corresponds to a current path of sequence diagrams in the other way. The developed system has been applied to the verification of sequence diagrams of actual power plant electric systems etc. The sequence diagrams of the second verification example contained about 140 components and 250 connectivities. The verification was performed with deliberately imposed design flaws. The developed system found all the flaws correctly. The elapsed time for verification (data conversion to flaw identification) was about 3min per logical expression realized in the sequence diagrams. It is shorter than 1/3 of the manual verification time needed by a skilled designer. This is acceptable from the viewpoint of practical use. Though the logic verification system is developed for the verification of the sequence diagrams describing relay circuits, it is expected to be applicable to the verification of the sequence diagrams describing plant control software as well. Because the diagram for software is rather simple than that for relay circuits. VI. CONCLUSION A logic verification system for power plant control system design has been developed. It pertains to the verification of the logic of sequence diagrams against their corresponding IBDs. The verification is performed by extraction and comparison of two logical expressions. Logic is extracted from sequence diagrams based on the connectivities and behaviors of the components. This extracted logic and the logic given by the corresponding IBDs are transformed to DNF expressions and compared. If any mismatch is detected, the responsible path is pointed out, based on the mismatched pattern of the two clauses. Also the developed system identifies the design flaws and generates some advisory messages to help in their correction. The developed system has been applied to the verification of an actual power plant electric system and all deliberately imposed design flaws were found correctly. These application studies confirmed that the developed system is useful and effective. -REFERENCB- (1) BARROW, H.G.: Artif. Intelligence, 24, 437 (1984). (2) WOJCIIC, A.S., et al.: Proc. of 21st Design Automation Conf., p. 641 (1984). (3) WONG, Y. : Proc. of 22nd Design Automation Conf., p. 695 (1985). (4) SAKATA, T., et al. : ibid., p (5) YAMADA, N., et ~ l :. J. Inform. Process., 14 [23, 126 (1991)

COMPUTER ARCHITECTURE AND ORGANIZATION Register Transfer and Micro-operations 1. Introduction A digital system is an interconnection of digital

COMPUTER ARCHITECTURE AND ORGANIZATION Register Transfer and Micro-operations 1. Introduction A digital system is an interconnection of digital Register Transfer and Micro-operations 1. Introduction A digital system is an interconnection of digital hardware modules that accomplish a specific information-processing task. Digital systems vary in

More information

output devices. connected to the controller. data communications link. relay systems. user program. MECH1500Quiz1ReviewVersion2 Name: Class: Date:

output devices. connected to the controller. data communications link. relay systems. user program. MECH1500Quiz1ReviewVersion2 Name: Class: Date: Class: Date: MECH1500Quiz1ReviewVersion2 True/False Indicate whether the statement is true or false. 1. The number and type of I/Os cannot be changed in a fixed PLC. 2. In a PLC system, there is a physical

More information

Revision of Inconsistent Orthographic Views

Revision of Inconsistent Orthographic Views Journal for Geometry and Graphics Volume 2 (1998), No. 1, 45 53 Revision of Inconsistent Orthographic Views Takashi Watanabe School of Informatics and Sciences, Nagoya University, Nagoya 464-8601, Japan

More information

Module 5. Function-Oriented Software Design. Version 2 CSE IIT, Kharagpur

Module 5. Function-Oriented Software Design. Version 2 CSE IIT, Kharagpur Module 5 Function-Oriented Software Design Lesson 12 Structured Design Specific Instructional Objectives At the end of this lesson the student will be able to: Identify the aim of structured design. Explain

More information

InstrumentationTools.com

InstrumentationTools.com Author: Instrumentation Tools Categories: PLC Tutorials PLC Ladder Logic : Contacts and coils The most elementary objects in Ladder Diagram programming are contacts and coils, intended to mimic the contacts

More information

An Approach for Quality Control Management in Object Oriented Projects Development

An Approach for Quality Control Management in Object Oriented Projects Development J. Basic. Appl. Sci. Res., 3(1s)539-544, 2013 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com An Approach for Quality Control Management in Object

More information

Software Engineering 2DA4. Slides 2: Introduction to Logic Circuits

Software Engineering 2DA4. Slides 2: Introduction to Logic Circuits Software Engineering 2DA4 Slides 2: Introduction to Logic Circuits Dr. Ryan Leduc Department of Computing and Software McMaster University Material based on S. Brown and Z. Vranesic, Fundamentals of Digital

More information

A Practical Applications of Virtual PLC using LabVIEW Software

A Practical Applications of Virtual PLC using LabVIEW Software Research Journal of Applied Sciences, Engineering and Technology 5(24): 5677-5682, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: December 28, 2012 Accepted: February

More information

Polynomial SAT-Solver Algorithm Explanation

Polynomial SAT-Solver Algorithm Explanation 1 Polynomial SAT-Solver Algorithm Explanation by Matthias Mueller (a.k.a. Louis Coder) louis@louis-coder.com Explanation Version 1.0 - December 1, 2013 Abstract This document describes an algorithm that

More information

Ocean Controls KTA-224 Modbus IO Module

Ocean Controls KTA-224 Modbus IO Module Ocean Controls Ocean Controls 8 Relay outputs (5A, 250VAC contacts) 4 Opto-Isolated Inputs with counters 3 Analog Inputs (10 bit) jumperselectable for 0-5V or 0-20mA 4 Input Counters RS485 or USB (virtual

More information

Boolean Algebra & Digital Logic

Boolean Algebra & Digital Logic Boolean Algebra & Digital Logic Boolean algebra was developed by the Englishman George Boole, who published the basic principles in the 1854 treatise An Investigation of the Laws of Thought on Which to

More information

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi

Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture - 8 Consistency and Redundancy in Project networks In today s lecture

More information

ON PRACTICAL RESULTS OF THE DIFFERENTIAL POWER ANALYSIS

ON PRACTICAL RESULTS OF THE DIFFERENTIAL POWER ANALYSIS Journal of ELECTRICAL ENGINEERING, VOL. 63, NO. 2, 212, 125 129 COMMUNICATIONS ON PRACTICAL RESULTS OF THE DIFFERENTIAL POWER ANALYSIS Jakub Breier Marcel Kleja This paper describes practical differential

More information

Protection and Control System Using Open Network Architecture for Power Systems

Protection and Control System Using Open Network Architecture for Power Systems Protection and Control System Using Open Network rchitecture for Power Systems 106 Protection and Control System Using Open Network rchitecture for Power Systems Takashi Kobayashi Takahiro Oomori Eiji

More information

CHAPTER 4: Register Transfer Language and Microoperations

CHAPTER 4: Register Transfer Language and Microoperations CS 224: Computer Organization S.KHABET CHAPTER 4: Register Transfer Language and Microoperations Outline Register Transfer Language Register Transfer Bus and Memory Transfers Arithmetic Microoperations

More information

Module 4. Programmable Logic Control Systems. Version 2 EE IIT, Kharagpur 1

Module 4. Programmable Logic Control Systems. Version 2 EE IIT, Kharagpur 1 Module 4 Programmable Logic Control Systems Version 2 EE IIT, Kharagpur 1 Lesson 19 The Software Environment and Programming of PLCs Version 2 EE IIT, Kharagpur 2 Instructional Objectives After learning

More information

Verification and testing automation of UML projects

Verification and testing automation of UML projects Verification and testing automation of UML projects Nikita Voinov, Vsevolod Kotlyarov Saint-Petersburg State Polytechnic University, Saint-Petersburg, Russia voinov@ics2.ecd.spbstu.ru, vpk@ics2.ecd.spbstu.ru

More information

DIN RAIL 12/8/4 OUTPUT MODULE. BOxxB01KNX. Product Handbook

DIN RAIL 12/8/4 OUTPUT MODULE. BOxxB01KNX. Product Handbook DIN RAIL 12/8/4 OUTPUT MODULE BOxxB01KNX Product Handbook Product: BOxxB01KNX -BO12B01KNX -BO08B01KNX -BO04B01KNX Description: DIN RAIL 12/8/4 OUTPUT MODULE Document Version: 1.2 Date: 07/07/2015 1/16

More information

Combinational and sequential systems. Prof. Cesar de Prada Dpt. of Systems Engineering and Automatic Control UVA

Combinational and sequential systems. Prof. Cesar de Prada Dpt. of Systems Engineering and Automatic Control UVA Combinational and sequential systems Prof. Cesar de Prada Dpt. of Systems Engineering and Automatic Control UVA prada@autom.uva.es 1 Outline Discrete events systems Combinational logic Sequential systems

More information

To prove something about all Boolean expressions, we will need the following induction principle: Axiom 7.1 (Induction over Boolean expressions):

To prove something about all Boolean expressions, we will need the following induction principle: Axiom 7.1 (Induction over Boolean expressions): CS 70 Discrete Mathematics for CS Spring 2005 Clancy/Wagner Notes 7 This lecture returns to the topic of propositional logic. Whereas in Lecture Notes 1 we studied this topic as a way of understanding

More information

(12) (10) Patent No.: US 7,017,055 B1. H0 (45) Date of Patent: Mar. 21, 2006

(12) (10) Patent No.: US 7,017,055 B1. H0 (45) Date of Patent: Mar. 21, 2006 United States Patent USOO701.7055B1 (12) (10) Patent No.: H0 (45) Date of Patent: Mar. 21, 2006 (54) HUB THAT CAN SUPPLY POWER FOREIGN PATENT DOCUMENTS ACTIVELY JP 20020945.45 A * 3/2002 : (75) Inventor:

More information

System Protection and Control Subcommittee

System Protection and Control Subcommittee Power Plant and Transmission System Protection Coordination GSU Phase Overcurrent (51T), GSU Ground Overcurrent (51TG), and Breaker Failure (50BF) Protection System Protection and Control Subcommittee

More information

Module 3. Requirements Analysis and Specification. Version 2 CSE IIT, Kharagpur

Module 3. Requirements Analysis and Specification. Version 2 CSE IIT, Kharagpur Module 3 Requirements Analysis and Specification Lesson 6 Formal Requirements Specification Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a formal

More information

Topics. PLC Fundamentals Ladder Logic Fundamentals

Topics. PLC Fundamentals Ladder Logic Fundamentals PLC Fundamentals Ladder Logic Fundamentals MET 382 Controls & Instrumentation for Automation Spring 08 T.E. Kostek Topics PLC programming languages Anatomy of a ladder program Logic functions Logical continuity

More information

Basic Processing Unit: Some Fundamental Concepts, Execution of a. Complete Instruction, Multiple Bus Organization, Hard-wired Control,

Basic Processing Unit: Some Fundamental Concepts, Execution of a. Complete Instruction, Multiple Bus Organization, Hard-wired Control, UNIT - 7 Basic Processing Unit: Some Fundamental Concepts, Execution of a Complete Instruction, Multiple Bus Organization, Hard-wired Control, Microprogrammed Control Page 178 UNIT - 7 BASIC PROCESSING

More information

Eliminating False Loops Caused by Sharing in Control Path

Eliminating False Loops Caused by Sharing in Control Path Eliminating False Loops Caused by Sharing in Control Path ALAN SU and YU-CHIN HSU University of California Riverside and TA-YUNG LIU and MIKE TIEN-CHIEN LEE Avant! Corporation In high-level synthesis,

More information

Automated Analysis of Digital Relay Data Based on Expert System

Automated Analysis of Digital Relay Data Based on Expert System Automated Analysis of Digital Relay Data Based on Expert System X. Luo, Student Member, IEEE, and M. Kezunovic, Fellow, IEEE Abstract Modern digital protective relays generate various files and reports

More information

Development and Commercialization of New Digital Protection and Control Equipment

Development and Commercialization of New Digital Protection and Control Equipment Development and Commercialization of New Digital Protection and Control Equipment 416 Development and Commercialization of New Digital Protection and Control Equipment Chikashi Komatsu Jun Noro Mitsuyasu

More information

9/7/2010. Chapter , The McGraw-Hill Companies, Inc. MOTOR SYMBOLS. 2010, The McGraw-Hill Companies, Inc.

9/7/2010. Chapter , The McGraw-Hill Companies, Inc. MOTOR SYMBOLS. 2010, The McGraw-Hill Companies, Inc. Chapter 2 MOTOR SYMBOLS 1 Symbols are used to represent the different components of a motor control system. Symbols sometimes look nothing like the real thing, so we have to learn what the symbols mean.

More information

DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER

DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER International Journal of Computer Engineering and Applications, Volume VI, Issue II, May 14 www.ijcea.com ISSN 2321 3469 DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER Kiran K C 1, Sunil T D

More information

K-BUS R. Dimming Actuators. User manual-ver. 4 KA/D KA/D KA/D KA/D 04.T1.1 ADTV-04/16.1 KA/D 04.L1.1 ADLD-04/

K-BUS R. Dimming Actuators. User manual-ver. 4 KA/D KA/D KA/D KA/D 04.T1.1 ADTV-04/16.1 KA/D 04.L1.1 ADLD-04/ Guangzhou Video-star Electronics Industrial Co., Ltd K-BUS R Dimming Actuators User manual-ver. 4 KA/D 0103.1 KA/D 0203.1 KA/D 0403.1 KA/D 04.T1.1 ADTV-04/16.1 KA/D 04.L1.1 ADLD-04/03.1...... KNX/EIB Intelligent

More information

Research on Modeling Method for Constraint Inference

Research on Modeling Method for Constraint Inference A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 33, 2013 Guest Editors: Enrico Zio, Piero Baraldi Copyright 2013, AIDIC Servizi S.r.l., ISBN 978-88-95608-24-2; ISSN 1974-9791 The Italian Association

More information

Control and Data Flow Testing on Function Block Diagrams

Control and Data Flow Testing on Function Block Diagrams Control and Data Flow Testing on Function Block Diagrams Eunkyoung Jee, Junbeom Yoo, and Sungdeok Cha Department of Electrical Engineering and Computer Science, Korea Advanced Institute of Science and

More information

Darshan Institute of Engineering & Technology for Diploma Studies

Darshan Institute of Engineering & Technology for Diploma Studies CODING Good software development organizations normally require their programmers to follow some welldefined and standard style of coding called coding standards. Most software development organizations

More information

High-Reliability, Next-Generation Supervisory and Control System for Power Stations

High-Reliability, Next-Generation Supervisory and Control System for Power Stations 214 High-Reliability, Next-Generation Supervisory and Control System for Power Stations High-Reliability, Next-Generation Supervisory and Control System for Power Stations Akio Ito Kazuo Furudate Masayuki

More information

Alarm Circuits Explained. A Guide to Inputs and Outputs Used in Video Security

Alarm Circuits Explained. A Guide to Inputs and Outputs Used in Video Security A Guide to Inputs and Outputs Used in Video Security ev 1.1 Updated 11-Mar-2013 Content Content... 2 Introduction... 3 Useful Terminology... 3 Digital Input Circuits... 4 Opto-isolator Input... 4 Switch

More information

Examination Guidelines for Design (Provisional translation)

Examination Guidelines for Design (Provisional translation) Examination Guidelines for Design (Provisional translation) Japan Patent Office Examination Guidelines for Design The Examination Guidelines for Design aims to ensure consistent interpretation and implementation

More information

Performance Bottleneck Analysis of Web Applications with eassist

Performance Bottleneck Analysis of Web Applications with eassist : New Measures for Data Center Performance Bottleneck Analysis of Web Applications with eassist Tomohide Yamamoto, Yasuharu Yamada, and Tetsuya Ogata Abstract This article introduces eassist, which enables

More information

To prove something about all Boolean expressions, we will need the following induction principle: Axiom 7.1 (Induction over Boolean expressions):

To prove something about all Boolean expressions, we will need the following induction principle: Axiom 7.1 (Induction over Boolean expressions): CS 70 Discrete Mathematics for CS Fall 2003 Wagner Lecture 7 This lecture returns to the topic of propositional logic. Whereas in Lecture 1 we studied this topic as a way of understanding proper reasoning

More information

DIGITAL ARITHMETIC: OPERATIONS AND CIRCUITS

DIGITAL ARITHMETIC: OPERATIONS AND CIRCUITS C H A P T E R 6 DIGITAL ARITHMETIC: OPERATIONS AND CIRCUITS OUTLINE 6- Binary Addition 6-2 Representing Signed Numbers 6-3 Addition in the 2 s- Complement System 6-4 Subtraction in the 2 s- Complement

More information

MELSEC iq-r Safety Function Block Reference

MELSEC iq-r Safety Function Block Reference MELSEC iq-r Safety Function Block Reference SAFETY PRECAUTIONS (Read these precautions before using this product.) Before using MELSEC iq-r series programmable controllers, please read the manuals for

More information

Lab #2: Building the System

Lab #2: Building the System Lab #: Building the System Goal: In this second lab exercise, you will design and build a minimal microprocessor system, consisting of the processor, an EPROM chip for the program, necessary logic chips

More information

FPGA IMPLEMENTATION OF FLOATING POINT ADDER AND MULTIPLIER UNDER ROUND TO NEAREST

FPGA IMPLEMENTATION OF FLOATING POINT ADDER AND MULTIPLIER UNDER ROUND TO NEAREST FPGA IMPLEMENTATION OF FLOATING POINT ADDER AND MULTIPLIER UNDER ROUND TO NEAREST SAKTHIVEL Assistant Professor, Department of ECE, Coimbatore Institute of Engineering and Technology Abstract- FPGA is

More information

TRANSISTORIZED INVERTER

TRANSISTORIZED INVERTER TRANSISTORIZED INVERTER FR-C500 PROGRAMMING MANUAL OVERVIEW Chapter 1 SEQUENCE PROGRAM LANGUAGES AND OPERATIONS Chapter 2 DESCRIPTION OF DEVICES Chapter 3 PLC FUNCTION Chapter 4 STRUCTURES OF INSTRUCTIONS

More information

Appeal Decision. Appeal No Singapore KINGLITE HOLDINGS INC. Tokyo, Japan

Appeal Decision. Appeal No Singapore KINGLITE HOLDINGS INC. Tokyo, Japan Appeal Decision Appeal No. 2014-22371 Singapore Appellant Tokyo, Japan Patent Attorney KINGLITE HOLDINGS INC. SUGIMURA, Kenji The case of appeal against the examiner's decision of refusal of Japanese Patent

More information

High Speed Fault Injection Tool (FITO) Implemented With VHDL on FPGA For Testing Fault Tolerant Designs

High Speed Fault Injection Tool (FITO) Implemented With VHDL on FPGA For Testing Fault Tolerant Designs Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2894-2900 ISSN: 2249-6645 High Speed Fault Injection Tool (FITO) Implemented With VHDL on FPGA For Testing Fault Tolerant Designs M. Reddy Sekhar Reddy, R.Sudheer Babu

More information

A proof-producing CSP solver: A proof supplement

A proof-producing CSP solver: A proof supplement A proof-producing CSP solver: A proof supplement Report IE/IS-2010-02 Michael Veksler Ofer Strichman mveksler@tx.technion.ac.il ofers@ie.technion.ac.il Technion Institute of Technology April 12, 2010 Abstract

More information

Introduction. Field of studies

Introduction. Field of studies 727. Utilization of advanced self-diagnostic functions implemented in frequency inverters for the purpose of the computer-aided identification of operating conditions Jerzy Świder, Mariusz Hetmańczyk,

More information

Combinational Logic & Circuits

Combinational Logic & Circuits Week-I Combinational Logic & Circuits Spring' 232 - Logic Design Page Overview Binary logic operations and gates Switching algebra Algebraic Minimization Standard forms Karnaugh Map Minimization Other

More information

Chapter 7 : Input-Output Organization

Chapter 7 : Input-Output Organization Chapter 7 Input-Output organization 7.1 Peripheral devices In addition to the processor and a set of memory modules, the third key element of a computer system is a set of input-output subsystem referred

More information

DTMF BASED HOME AUTOMATION

DTMF BASED HOME AUTOMATION DTMF BASED HOME AUTOMATION Vimlesh Kumar Agrahari 1, Md Arzoo 2, Harish Kumar 3 1, 2 Students, Electrical Engineering Department Greater Noida Institutes of Technology, Gr.Noida, (India) 3 Assistant Professor,

More information

(12) United States Patent

(12) United States Patent (12) United States Patent USOO7007134B2 (10) Patent No.: Suetake (45) Date of Patent: Feb. 28, 2006 (54) MICROCOMPUTER, METHOD OF (56) References Cited CONTROLLING CACHE MEMORY, AND U.S. PATENT DOCUMENTS

More information

(12) (10) Patent No.: US 7,103,736 B2. Sachs (45) Date of Patent: Sep. 5, 2006

(12) (10) Patent No.: US 7,103,736 B2. Sachs (45) Date of Patent: Sep. 5, 2006 United States Patent US007103736B2 (12) (10) Patent No.: Sachs (45) Date of Patent: Sep. 5, 2006 (54) SYSTEM FOR REPAIR OF ROM 5.325,504 A * 6/1994 Tipley et al.... T11/128 PROGRAMMING ERRORS ORDEFECTS

More information

Z Z-280 MT8930, MT8992/3/4/5 MT8880 MT8888 MT8889 MT8980/1 MT8985, MT8986 (DIP-40) MT8986 (PLCC-44) MT8920B MT8952B

Z Z-280 MT8930, MT8992/3/4/5 MT8880 MT8888 MT8889 MT8980/1 MT8985, MT8986 (DIP-40) MT8986 (PLCC-44) MT8920B MT8952B MSAN-145 How to Interface Mitel Components to Parallel Bus CPUs TABL OF CONTNTS Introduction ISSU 1 August 1993 1.0 Group 1 Components 1.1 Interfacing to the 6802 1.2 Interfacing to the 6809 1.3 Interfacing

More information

1 Digital tools. 1.1 Introduction

1 Digital tools. 1.1 Introduction 1 Digital tools 1.1 Introduction In the past few years, enormous advances have been made in the cost, power, and ease of use of microcomputers and associated analog and digital circuits. It is now possible,

More information

Part 5. Verification and Validation

Part 5. Verification and Validation Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this

More information

ARITHMETIC operations based on residue number systems

ARITHMETIC operations based on residue number systems IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 53, NO. 2, FEBRUARY 2006 133 Improved Memoryless RNS Forward Converter Based on the Periodicity of Residues A. B. Premkumar, Senior Member,

More information

2. Control Pin Functions and Applications

2. Control Pin Functions and Applications IMARY CONTROL ( PIN) Module Enable / Disable. The module can be disabled by pulling the below 2.3 V with respect to the Input. This should be done with an open-collector transistor, relay, or optocoupler.

More information

UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MSC SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 2 EXAMINATION 2016/2017

UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MSC SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 2 EXAMINATION 2016/2017 TW30 UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MSC SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 2 EXAMINATION 2016/2017 MICROPROCESSOR BASED SYSTEMS MODULE NO: EEM7016 Date: Wednesday 17 May

More information

Circuit simplification examples

Circuit simplification examples Circuit simplification examples Let's begin with a semiconductor gate circuit in need of simplification. The "A," "B," and "C" input signals are assumed to be provided from switches, sensors, or perhaps

More information

SMART E-BILL GENERATION USING PLC

SMART E-BILL GENERATION USING PLC RESEARCH ARTICLE SMART E-BILL GENERATION USING PLC A.PRIYANKA 1, G.SAHITHI 2, SNEHA 3, K.RAMANJANEYA REDDY 4 1(Assistant Professor, Electronics and communication engineering, AITS, Rajampet Email : priyanka3aluru@gmail.com)

More information

REGISTER TRANSFER AND MICROOPERATIONS

REGISTER TRANSFER AND MICROOPERATIONS REGISTER TRANSFER AND MICROOPERATIONS Register Transfer Language Register Transfer Bus and Memory Transfers Arithmetic Microoperations Logic Microoperations Shift Microoperations Arithmetic Logic Shift

More information

SCIENCE & TECHNOLOGY

SCIENCE & TECHNOLOGY Pertanika J. Sci. & Technol. 5 (S): 35-4 (017) SCIENCE & TECHNOLOGY Journal homepage: http://www.pertanika.upm.edu.my/ Transmission Lines Modelling based on RLC Passive and Active Filter Design Ahmed Qasim

More information

High-performance Digital Protection and Control Unit for Distribution Substations

High-performance Digital Protection and Control Unit for Distribution Substations High-performance Digital Control Unit for Distribution Substations 136 High-performance Digital Control Unit for Distribution Substations Takashi Kobayashi Eiji Ogawa Atsushi Yanaoka Mitsuo Sato OVERVIEW:

More information

ATL20 ATL30 Automatic transfer switch controller

ATL20 ATL30 Automatic transfer switch controller I 194 GB 07 07 ATL20 ATL30 Automatic transfer switch controller REMOTE CONTROL SOFTWARE MANUAL Summary Introduction... 2 Minimum resources of the PC... 2 Installation... 2 Activation of the PC-ATL connection...

More information

DEVELOPMENT OF PREVENTIVE MAINTENANCE SYSTEM ARISING IN ADVANCED EDDY CURRENT TESTING USING NETWORK TOMOGRAPHY

DEVELOPMENT OF PREVENTIVE MAINTENANCE SYSTEM ARISING IN ADVANCED EDDY CURRENT TESTING USING NETWORK TOMOGRAPHY DEVELOPMENT OF PREVENTIVE MAINTENANCE SYSTEM ARISING IN ADVANCED EDDY CURRENT TESTING USING NETWORK TOMOGRAPHY F. Kojima 1, F.Kobayashi 1, A. Nishimizu 2, M. Koike 2, T. Matsui 2, H. Endo 3, T. Uchimoto

More information

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Girish K 1 and Mrs. Shruthi G 2 1 Department of CSE, PG Student Karnataka, India 2 Department of CSE,

More information

Subject : Computer Science. Paper : Software Quality Management. Module : CASE Tools

Subject : Computer Science. Paper : Software Quality Management. Module : CASE Tools e-pg Pathshala Subject : Computer Science Paper : Software Quality Management Module : CASE Tools Module No: Quadrant 1: CS/SQM/26 e-text An increasing variety of specialized computerized tools (actually

More information

CS40-S13: Functional Completeness

CS40-S13: Functional Completeness CS40-S13: Functional Completeness Victor Amelkin victor@cs.ucsb.edu April 12, 2013 In class, we have briefly discussed what functional completeness means and how to prove that a certain system (a set)

More information

UNITROL F Excitation systems for synchronous machines with and without rotating exciter

UNITROL F Excitation systems for synchronous machines with and without rotating exciter UNITROL F Excitation systems for synchronous machines with and without rotating exciter Copyright 2000 Photodisc, Inc. UNITROL F System Overview Fig. 1: Main configurations of the UNITROL F system UNITROL

More information

PRC Coordination of Protection Systems for Performance During Faults

PRC Coordination of Protection Systems for Performance During Faults PRC-027-1 Coordination of Protection Systems for Performance During Faults A. Introduction 1. Title: Coordination of Protection Systems for Performance During Faults 2. Number: PRC-027-1 3. Purpose: To

More information

BOOLEAN ALGEBRA AND CIRCUITS

BOOLEAN ALGEBRA AND CIRCUITS UNIT 3 Structure BOOLEAN ALGEBRA AND CIRCUITS Boolean Algebra and 3. Introduction 3. Objectives 3.2 Boolean Algebras 3.3 Logic 3.4 Boolean Functions 3.5 Summary 3.6 Solutions/ Answers 3. INTRODUCTION This

More information

Training Kit for HP 1660/70 Series Logic Analyzers

Training Kit for HP 1660/70 Series Logic Analyzers Training Guide Publication Number E2433-97034 First Edition, November 1997 For Safety information, Warranties, and Regulatory information, see the pages behind the Index. Copyright Hewlett-Packard Company

More information

Operating Instructions Extended Cascade Controller MCO 101

Operating Instructions Extended Cascade Controller MCO 101 Operating Instructions Extended Cascade Controller MCO 101 VLT AQUA Drive FC 200 Extended Cascade Controller Option Contents Contents 1. Safety and precautions 3 Safety Instructions 3 Avoid unintended

More information

2. BOOLEAN ALGEBRA 2.1 INTRODUCTION

2. BOOLEAN ALGEBRA 2.1 INTRODUCTION 2. BOOLEAN ALGEBRA 2.1 INTRODUCTION In the previous chapter, we introduced binary numbers and binary arithmetic. As you saw in binary arithmetic and in the handling of floating-point numbers, there is

More information

The below identified patent application is available for licensing. Requests for information should be addressed to:

The below identified patent application is available for licensing. Requests for information should be addressed to: WARFARE CENTERS NEWPORT DEPARTMENT OF THE NAVY NAVAL UNDERSEA WARFARE CENTER DIVISION NEWPORT OFFICE OF COUNSEL PHONE: 401 832-3653 FAX: 401 832-4432 DSN: 432-3653 Date: 3 November 2008 The below identified

More information

Simulation of the effectiveness evaluation process of security systems

Simulation of the effectiveness evaluation process of security systems IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Simulation of the effectiveness evaluation process of security systems To cite this article: A V Godovykh et al 2016 IOP Conf.

More information

Nepal Telecom Nepal Doorsanchar Company Ltd.

Nepal Telecom Nepal Doorsanchar Company Ltd. Nepal Telecom Nepal Doorsanchar Company Ltd. Syllabus lg=g+= 124 ;+u ;DalGwt cg';'lr - 3_ Part II: (Specialized subject for Computer Engineer Level 7 Tech. - Free and Internal competition) Time: 2 hours

More information

SNiPER: an offline software framework for non-collider physics experiments

SNiPER: an offline software framework for non-collider physics experiments SNiPER: an offline software framework for non-collider physics experiments J. H. Zou 1, X. T. Huang 2, W. D. Li 1, T. Lin 1, T. Li 2, K. Zhang 1, Z. Y. Deng 1, G. F. Cao 1 1 Institute of High Energy Physics,

More information

Lesson 5: Verifying RAMs with the Fluke 9010A Version 1.03

Lesson 5: Verifying RAMs with the Fluke 9010A Version 1.03 Lesson 5: Verifying RAMs with the Fluke 9010A Version 1.03 Random Access Memory: One of the most common failures that occur on arcade PCBS are failures in Random Access Memory (RAM). These failures will

More information

Question & its answer Remark Total marks 01 Attempt any THREE 12. a) State any three different tools used for Automation. 04 Ans.

Question & its answer Remark Total marks 01 Attempt any THREE 12. a) State any three different tools used for Automation. 04 Ans. Important Instructions to examiners: 1) The answers should be examined by keywords and not as word-to-word as given in the model answer scheme. 2) The model answer and the answer written by candidate may

More information

Bits, Words, and Integers

Bits, Words, and Integers Computer Science 52 Bits, Words, and Integers Spring Semester, 2017 In this document, we look at how bits are organized into meaningful data. In particular, we will see the details of how integers are

More information

Operation Manual DHCP. Table of Contents

Operation Manual DHCP. Table of Contents Table of Contents Table of Contents Chapter 1 DHCP Overview... 1-1 1.1 Introduction to DHCP... 1-1 1.2 DHCP IP Address Assignment... 1-2 1.2.1 IP Address Assignment Policy... 1-2 1.2.2 Obtaining IP Addresses

More information

DESIGN AND IMPLEMENTATION OF FAST DECIMAL MULTIPLIER USING SMSD ENCODING TECHNIQUE

DESIGN AND IMPLEMENTATION OF FAST DECIMAL MULTIPLIER USING SMSD ENCODING TECHNIQUE RESEARCH ARTICLE OPEN ACCESS DESIGN AND IMPLEMENTATION OF FAST DECIMAL MULTIPLIER USING SMSD ENCODING TECHNIQUE S.Sirisha PG Scholar Department of Electronics and Communication Engineering AITS, Kadapa,

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 (19) United States US 2003.01.10403A1 (12) Patent Application Publication (10) Pub. No.: US 2003/0110403 A1 Crutchfield et al. (43) Pub. Date: Jun. 12, 2003 (54) SYSTEM FOR SHARED POWER SUPPLY IN COMPUTER

More information

DCN Simultaneous Interpretation. Software User Manual en LBB 3572

DCN Simultaneous Interpretation. Software User Manual en LBB 3572 DCN en LBB 3572 GENERAL CONTENTS Chapter 1-1.1 About 1.2 Interpretation procedures Chapter 2 - Getting Started 2.1 Starting 2.2 Using Help Chapter 3 - Preparing for a Conference 3.1 The interpretation

More information

So, You Want to Test Your Compiler?

So, You Want to Test Your Compiler? So, You Want to Test Your Compiler? Theodore S. Norvell Electrical and Computer Engineering Memorial University October 19, 2005 Abstract We illustrate a simple method of system testing by applying it

More information

Parallel connection / operations and current share application note

Parallel connection / operations and current share application note Parallel connection / operations and current share application note Overview This document will examine method for active load sharing, basic criteria and performances of such a function on Glary UH and

More information

ELECTRONIC INSTRUMENTATION AND SYSTEMS LABORATORY

ELECTRONIC INSTRUMENTATION AND SYSTEMS LABORATORY ELECTRONIC INSTRUMENTATION AND SYSTEMS LABORATORY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING MICHIGAN STATE UNIVERSITY I. TITLE: Lab IX - Light Activated Exhaust Fan II. PURPOSE: One use of bipolar

More information

An Electrical Energy Consumer Load Monitoring and Control System Through SMS Based

An Electrical Energy Consumer Load Monitoring and Control System Through SMS Based Research Journal of Applied Sciences, Engineering and Technology 4(10): 1371-1375, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: January 11, 2012 Accepted: February 09, 2012 Published:

More information

Mathematical Logic Prof. Arindama Singh Department of Mathematics Indian Institute of Technology, Madras. Lecture - 9 Normal Forms

Mathematical Logic Prof. Arindama Singh Department of Mathematics Indian Institute of Technology, Madras. Lecture - 9 Normal Forms Mathematical Logic Prof. Arindama Singh Department of Mathematics Indian Institute of Technology, Madras Lecture - 9 Normal Forms In the last class we have seen some consequences and some equivalences,

More information

Combinational and sequential circuits (learned in Chapters 1 and 2) can be used to create simple digital systems.

Combinational and sequential circuits (learned in Chapters 1 and 2) can be used to create simple digital systems. REGISTER TRANSFER AND MICROOPERATIONS Register Transfer Language Register Transfer Bus and Memory Transfers Arithmetic Microoperations Logic Microoperations Shift Microoperations Arithmetic Logic Shift

More information

Robotic Systems ECE 401RB Fall 2006

Robotic Systems ECE 401RB Fall 2006 The following notes are from: Robotic Systems ECE 401RB Fall 2006 Lecture 13: Processors Part 1 Chapter 12, G. McComb, and M. Predko, Robot Builder's Bonanza, Third Edition, Mc- Graw Hill, 2006. I. Introduction

More information

SECTION 1 INTRODUCTION. Walt Kester

SECTION 1 INTRODUCTION. Walt Kester SECTION 1 INTRODUCTION Walt Kester This book deals with sensors and associated signal conditioning circuits. The topic is broad, but the focus of this book is to concentrate on circuit and signal processing

More information

Part 1-2. Translation of Netlist to CNF

Part 1-2. Translation of Netlist to CNF 2D Project Report Part 1-2. Translation of Netlist to CNF Team members: MA Ke, WEI Fanding, CHEN Jian, CHEN Ziyi Introduction In this part, we are required to translate the netlist of our optimized adder

More information

On Resolution Proofs for Combinational Equivalence Checking

On Resolution Proofs for Combinational Equivalence Checking On Resolution Proofs for Combinational Equivalence Checking Satrajit Chatterjee Alan Mishchenko Robert Brayton Department of EECS U. C. Berkeley {satrajit, alanmi, brayton}@eecs.berkeley.edu Andreas Kuehlmann

More information

Computer Organization (Autonomous)

Computer Organization (Autonomous) Computer Organization (Autonomous) UNIT I Sections - A & D Prepared by Anil Kumar Prathipati, Asst. Prof., Dept. of CSE. SYLLABUS Introduction: Types of Computers, Functional units of Basic Computer (Block

More information

Redundant States in Sequential Circuits

Redundant States in Sequential Circuits Redundant States in Sequential Circuits Removal of redundant states is important because Cost: the number of memory elements is directly related to the number of states Complexity: the more states the

More information

Pluto AS-i. Safety PLC. Approvals: Control of: Features:

Pluto AS-i. Safety PLC. Approvals: Control of: Features: Safety PLC Pluto AS-i Approvals: TÜV Rheinland Control of: Safety products in dynamic and static circuits as well as in AS-i networks Electrically controlled actuators such as contactors, valves, motors

More information

MFS605/EE605 Systems for Factory Information and Control

MFS605/EE605 Systems for Factory Information and Control MFS605/EE605 Systems for Factory Information and Control Lecture 9 PLCs (half lecture) Fall 2005 Larry Holloway Dept. of Electrical Engineering and Center for Robotics and Manufacturing Systems 1 So far

More information