Logic Verification System for Power Plant Sequence Diagrams
|
|
- Thomas Parker
- 6 years ago
- Views:
Transcription
1 Journal of Nuclear Science and Technology ISSN: (Print) (Online) Journal homepage: Logic Verification System for Power Plant Sequence Diagrams Mitsuko FUKUDA, Naoyuki YAMADA, Toshiaki TESHIMA, Ken'ichi KAN & Mitsugu UTSUNOMIYA To cite this article: Mitsuko FUKUDA, Naoyuki YAMADA, Toshiaki TESHIMA, Ken'ichi KAN & Mitsugu UTSUNOMIYA (1994) Logic Verification System for Power Plant Sequence Diagrams, Journal of Nuclear Science and Technology, 31:2, , DOI: / To link to this article: Published online: 15 Mar Submit your article to this journal Article views: 323 View related articles Citing articles: 1 View citing articles Full Terms & Conditions of access and use can be found at
2 Journal of NUCLEAR SCIENCE and TECIINOLOGY, 31121, pp (February 1994). Logic Verification System for Power Plant Sequence Diagrams Mitsuko FUKUDA, Naoyuki YAMADA, Energy Research Laboratory, Hitachi, Ltd. * Toshiaki TESHIMA, Ken'ichi KAN and Mitsugu UTSUNOMIYA Oinika Works, Hitachi, Ltd.* Received November A logic verification system for sequence diagrams of power plants has been developed. The system's main function is to verify correctness of the logic realized by sequence diagrams for power plant control systems. The verification is based on a symbolic comparison of the logic of the sequence diagrams with tbe logic of the corresponding IBDs (Interlock Block Diagrams) in combination with reference to design knowledge. The developed system points out the sub-circuit which is responsible for any existing mismatches between the IBD logic and the logic realized by the sequence diagrams. Applications to the verification of actual sequence diagrams of power plants confirmed that the developed system is practical and effective. KEY WORDS: verification, verification system, sequence diagram, control systems, nuclear power plants, logic, relay circuit I. INTRODUCTION Design verification is one of the key techniques for improving reliability of engineering design; for large scale plants, assuring design correctness is absolutely necessary. Sequence diagrams of power plant control systems are produced in the detailed design process and amount to more than 15,000 sheets. In order to confirm their correctness, they are inspected and verified regarding many aspects including component connectivity, control logic, control characteristics etc. Currently, this verification is performed manually in almost all cases and therefore, time-consuming and prone to human error. Then, the final goal of the research is to develop a total design verification system for power plant control systems which is efficient and also free from human error. As a main part of the total design veriecation system, a logic verification system was developed. In design of power plant control systems, CAD (Computer Aided Design) systems are now widely used to draw sequence diagrams. These CAD systems, specialized for sequence diagrams, have advanced functions of checking design integrity and provide automatic detection of disconnections, short circuits and so on. However, they have no function for verifying design correctness against the design specifications. The developed system serves to the logic verification of sequence diagrams of power plant control systems. In the field of VLSI (Very Large Scale Integrated circuit), design, various automated verification methods have been developed. Generally, there are two approaches for verification of design correctness. One is to verify the function of the circuit. The function is first extracted from circuit diagrams and then compared with the functional specification") ('I. The other is to verify the equivalence of connectivities of two diagrams such as VLSI * Omika-cho. Hitachi-shi
3 Vol. 31, No. 2 (Feb. 1994) 103 mask-patterns and their transistor-level circuit c4). Because a sequence diagram is a kind of logical circuit diagram and its specifications are given by IBDs (Interlock Block Diagrams), the former approach is also applicable to the verification of sequence diagram. However, sequence diagrams are complicated circuit diagrams and they differ from the IBDs in their description. If there is no information about where and what the design flaw is, it is very difficult to correct large sequence diagrams. Therefore, two methods, one is to verify design correctness and the other to identify design flaws, are necessary for practical verification. After a brief discussion of the verification problem of sequence diagrams, a logic verification method, which includes a new method to identify design flaws, is described in detail along with the system configuration. Some examples of logic verification are also demonstrated. II. SEQUENCE DIAGRAMS DESIGN Practical design flow of sequence diagrams in power plant control systems may change according to the characteristics of the objective plant, the design organization, and so on. However, the skeletal design process which starts from specification documents and the master plan, and advances to sequence diagrams via some intermediate documents is commonly applied. Sequence diagrams, which are the objective diagrams to be verified in this paper, are designed on the basis of an intermediate document called IBD. An IBD and its corresponding sequence diagram are shown in Figs. 1 and 2, respectively. Both figures describe the same logic to control plant equipment, but in different styles. In IBDs, the logic is represented by a logical diagram that relates an control output to inputs which are signals of switches and detectors. On the other hand, sequence diagrams describe a circuit to generate electrical signals according to the given control logic. Real control circuits are constructed by referring to these sequence diagrams. <Input AND 0 Output D O R 09 NOT Fig. 1 Example of interlock block diagram Lower Bus Fig. 2 0 Lamp o Relay o I Contact Manual z t Switch 0 Relay Coil I A-contact g B-contact Example of sequence diagram Usually, sequence diagrams are designed by expert designers utilizing the following information : (1) The control logic and 1/0 signal names given in the IBDs. (2) The design knowledge which includes hardware knowledge of the plant components, control devices, and fundamental knowledge about electrical and other engineering areas. An IBD represents a logic by using 1/0 signal symbols and logical operator symbols. Figure 1 represents the logic, 1 (ClAC2)V C3=+X. In IBDs, signals are transmitted only in the direction specified by the arrows through logical operator symbols. Figure 2 realizes the logic given by Fig. 1. The inputs C1, C2 and C3 in Fig. 1 correspond to the contacts C1, C2 and C3 respectively, and the output X in Fig. 1 is realized by the coil of relay X. In Fig. 2, C1 and C2 are relay contacts and C3 is a manual switch. Relay contacts behave according to the excitation state of their corresponding relay coils. There are several contact types. An A-contact is a popular type; it closes if its corresponding coil is excited. Contacts C1 and C2 are A-contacts. For example, contact C1 closes if coil C1 is excited. Contact C3 is also an A-contact
4 104 J. Nucl. Sci. Technol., which closes when the switch button is pushed. Contact XX is a B-contact; its behavior is opposite to that of the A-contact. A B- contact closes if its corresponding coil is not excited. For example, contact XX is closed if coil XX is not excited. A relay coil is excited when a current path is realized between the upper and the lower buses. For example, coil XX is excited when both C1 and C2 are closed. In sequence diagrams, the control logic is realized by the condition to trigger excitation of one relay coil. For example, the logic required for the output X in Fig. 1 is realized by the condition to trigger excitation of coil X in Fig. 2. Operators AND and OR in IBDs are realized by connections between the contacts. For example, connectivity between contacts C1 and C2 realizes an AND operator, and connectivity between contact XX and C3 realizes an OR operator. The NOT operator is realized by using a B-contact. Also detectors and switches have some contacts. A detector is a device which has a sensor unit and one or more associated contacts. A switch has one or more contacts which move asynchronously. In sequence diagrams, the logic is often realized by using many auxiliary relays. In Fig. 2, XX is such an auxiliary relay. Contacts and coils of an auxiliary relay may appear in different sheets. In addition to auxiliary relays, lamps, diodes, resisters and test-terminals for testers are also added for maintenance and protection of the circuit. But they are not used to realize the logic. Due to these differences in description, extraction and comparison of the two logics specified by IBDs and sequence diagrams involve rather complicated processing. In order to verify the logic, designers have to find every possible current path in the sequence diagrams, and have to interpret each component s behavior and each connectivity. It is difficult and time-consuming to verify large sequence diagrams. Thus, the necessity and importance of automating the verification of the sequence diagrams against the IBDs become readily apparent. III. LOGIC VERIFICATION SYSTEM 1. System Configuration The configuration of the verification system is shown in Fig. 3. The logic verification system consists of two main programs, a verification program and a conversion program, and databases containing IBDs, sequence diagrams and design knowledge. Sequence diagrams are inputted through a sequence CAD program. The sequence CAD program used is a conventional one, which provides expert designers with functions for inputting sequence diagrams interactively. The sequence diagram data consists of component properties including names, types, connectivity with other components and other items specific to each component. The conversion program translates the CAD data format, and adds compositional information to switches and detectors of the sequence diagram by referring to the specification data. The specification data contains compositional information of each device Sequence + Diagram GAD Dat* CAD Data Conversion Program + Logic Extraction Unit
5 Vol. 31, No. 2 (Feb. 1994) 105 type. The verification program extracts and verifies the logic realized by sequence diagrams. As for the design knowledge, it is impractical to store all the knowledge that expert designers utilize during the design process. The developed system contains only the knowledge to interpret the sequence diagrams as control logic. The verification is performed for each output signal which the user specifies by the name in the IBD. 2. Logic Verification Method As mentioned earlier, there are two approaches to verify design correctness. One is to extract functions from each diagram and compare them. The other is to select or generate comparable connectivities from each diagram and compare them(4). The former approach is used for logic design verification of relay circuits''). The correctness of sequence diagrams can be proved by the former approach, but the design flaw cannot be identified. Because details of the sequence diagram design are left to the discretion of the designers, there are many different sequence diagrams that realize the same logic. Therefore, the latter approach is seldom applied to sequence diagrams. The present verification method is based on the former approach. The developed verification method extracts the control logic realized by the sequence diagrams and compares it with the logic given by the IBD. The two logical expressions are the same if the sequence diagrams are designed correctly. Though this approach can provide a way to judge the correctness of the sequence diagrams, it cannot identify the design flaws. Therefore, a new method to identify the design flaw is developed and introduced to the logic verification system. The overall flow of the logic verification is shown in Fig. 4. One of the key features of the developed system is the design flaw identification. The developed system finds the flaw-responsible sub-circuit, which contains the connectivities or components that cause the logical mismatch. Verification results contain information on how the flaw-responsible sub-circuit Fig. 4 V 4 Input IBD and sequence diagram CAD data Convert CAD data 4 Extract the logic realized bv the circuit 4 * Transform the extracted logic into the DNF exdression Compare the extracted logic with the IBD's logic atched? Identify the sub-circuit which is responsible for the mismatch of the logic types Display verification results IBD : Interlock Bhk D ram DNF : Disjunclive Nor~&%orm Flow chart of logic verification differs from the correct one, and suggests how to correct it. After inputting both IBDs and sequence diagrams data, verification starts by user input. In the following, each step is described in detail : ( 1 ) Data Conversion The conversion program translates the format of the CAD data files to the format of the verification system's data file, and adds compositional information to switches and detectors of the sequence diagram by referring to the specification database. A detector has a sensor unit and one or more contacts connected to the sensor unit, and a switch has some constructed contacts. But they are often simplified in CAD data. For example, a detector is often drawn as a simple box with some terminals, a switch is represented by some independent contact symbols. The conversion program adds compositional infor
6 106 J. Nucl. Sci. Technol., mation to the simplified components using the specification data and facilitates the subsequent logic extraction. The specification data contain information about the internal composition of each device type. For example, they include information about correspondence between the switch position and the contacts behavior. The conversion program refers to the type of switch and generates information about how to interpret each contact. If a switch has three positions, information telling at which position the contact closes is added. As for a detector, the program selects the corresponding internal composition form and adds contact type information to each pair of the detector s terminals. ( 2) Logic Extraction A logic extraction program extracts logic from sequence diagrams by searching for connectivities and interpreting connected components. The program starts from the specified relay coil and traces the connectivities toward the upper and lower buses respectively. According to each component type and connectivity, sequence diagrams are interpreted to a logical expression. The interpretation rules assigning a logical value to a device are prepared for each device type. A loigcal value is a logical constant : true/false, or a logical variable. A logical value is assigned to each component according to its type, e.g. true for a lamp, false for a large impedance resistor, a logical variable for a relay contact, and so on. Generally, there are two ways to design sequence diagrams. One is a commonly used in which the logic is realized as the conditions to excite the specified relay coil. That is to say, the coil is not excited usually, and excited when the condition is true. The other is its opposite. The coil is excited ordinarily, and not excited when the condition is true. The latter is mainly used for the most important circuits, such as the reactor protection circuits. In this paper, only procedures for the former way are described, though the verification system handles diagrams of the latter way similarly. Each relay coil is interpreted to a logical -16- variable, which takes the logical value true when the coil is excited, but is false otherwise. Relay contacts are interpreted according to the variable assigned to their coil. An A-contact, which is normally open, is interpreted as the logical variable assigned to its coil. A B-contact, which is normally closed, is interpreted as the inverse of the variable assigned to its coil. A time delay contact is interpreted as a variable with a timer operator. Each contact of the switches and detectors is interpreted similarly. Connectivities between components are interpreted to logical operators,,4 (AND) and V(0R). As shown in Fig. 5(a), if a relay coil and other components are connected in series, the program interprets them as an AND expression. If the components, except for the relay coil, are connected in parallel, they are interpreted as an OR expression as shown in Fig. 5(b). The logic extraction program searches every possible current path through the relay coil which corresponds to the output signal name specified by the user. If the path contains any auxiliary relay contact, the extraction program searches the current path from the auxiliary relay coil too. For example, in Fig. 2, relay XX is an auxiliary relay, whose contact is contained in the current path of relay X. The extraction program searches the current path through XX after searching the current paths through X. (a) Series connection (b) Series connection representing an representing an AND expression OR expression (ClACZ)=IX (ClVCZ)+X Fig. 5 Examples of series and parallel connections In many cases, sequence diagrams contain a large number of components including those components for only maintenance and protection of circuits. Then, to reduce the search
7 Vol. 31, No. 2 (Feb. 1994) 107 space, while searching the current path, the program checks the component behavior and eliminates any unnecessary search path which cannot trigger excitation. For example, when the connected component is a large impedance element or the B-contact of the specified relay, it intercepts the current through this path. Then, the program eliminates the path containing this component from the search space so that the unnecessary path is omitted in the logic extraction and the following processes. ( 3 ) Logic Comparison The extracted logic and the logic given by the IBD can be transformed into exactly the same expression if the sequence diagrams are designed correctly. To facilitate comparison, the logic is transformed into a DNF (Disjunctive Normal Form) expression. A DNF expression is a logical OR of AND clauses such as (xay)v(w,r\z) where x, y, w and z are logical variables. An AND clause is a logical AND of terms. One term can also be one AND clause. A term is one variable, a negation of a variable, a variable with a timer operator or a negation of that. For example, xay, xa(1 y), 1 x and y are AND clauses. The verification program compares the two logical expressions. If they are the same, the sequence diagrams are found to be correct. And the program gives a message telling of their correctness. Otherwise, the program compares each AND clauses of the two expressions to find the sub-circuit which is responsible for the logical mismatch. In sequence diagrams, a series circuit usually realizes an AND clause as shown in Fig. 5. One current path between buses corresponds to a series circuit. The verification program regards one current path as one subcircuit. Then each current path corresponds to an AND clause. So every AND clause which contains the mismatched part of the logical expression becomes a candidate for the sub-circuit responsible for the flaw. ( 4 ) Design Flaw Identification a. Flaw types The verification program defines five flaw types for the flaw identification process. The five types are classified into two categories. In the first category the sequence diagrams realize redundant conditions besides the whole IBD logic. In this case, an undesirable output can be produced by the redundant condition. This flaw type is called turn around. An example is the sequence diagram which realizes the logic (xay)v(xaz) when the IBD requires xay. Sometimes, using the same contacts and/or lines produces an unexpected current path, i.e. turn around. Figure 6 shows a circuit containing a turn around caused by using contacts a and b in common. The sequence diagrams can be corrected by interception of the redundant current path. Fig. 6 Turn around path ii glx.p QQ IBD : (shahe)v(sabhf)jw2 Example of turn around flaw The second category includes the other four flaw types. In this category sequence diagrams realize unnecessary conditions and the IBD logic is not completed. The flaw types are as follows: (1) Unsuitable contact type is a mismatch of terms of AND clauses. An example is realizing aab when the IBD requires aa(timer b 1s). It is caused by misuse of contact types. A delayed contact should be used. (2) Unsuitable device name is a mismatch of variable names in the clauses. It is caused by misuse or mis-writing of similar devices. (3) Excess is the case in which a clause of the extracted logic includes extra terms besides the IBD clause. To realize aabac when the IBD requires aab is an example. This is caused by mis-connec- -17-
8 108 J. Nucl. Sci. Technol.. tion or using the same contacts and lines. (4) Lack is the case in which a clause of the extracted logic lacks one or more terms of the IBD clause. The identification program generates design flaw hypotheses according to the five flaw types. b. Pre-processing for flaw identification To facilitate flaw identification, the verification program restructures the path data from the search history data that are stored during logic extraction. The search history data are given to each relay coil and they consist of relay contacts, switches, and the components interpreted as true. The program removes the components interpreted as true from searched paths because they do not change the logic realized by the paths. Then the restructured path data contain the components that may cause logical mismatches. For instance, a small impedance resistor is in a search history, but it does not appear in a restructured path data. The program links each relay contacts of the reduced paths to its coil so that the restructured path data represent the relations of contacts and their corresponding parts of the logic. Figure 7(a) shows an example of a sequence diagram and (b) illustrates its restructured path data. The contacts of each path are represented in Fig. 7(b) by the identifiers written in parentheses in Fig. 7(a). In the restructured path data, each coil is linked to its trigger paths. For example, coil X is linked to Path-1 and -2 which respectively correspond to the current path through C1 and the relay XX s contact and the current path through contacts C1 and C2. Every trigger path, Path-1, -2 and -3, is also linked to the clauses realized by the corresponding current paths. Path-1 contains an auxiliary relay contact XX-001, so the clause linked to Path-1 includes the terms of the clause linked to Path-3. Each auxiliary relay contact, XX-001 for example, is linked to its coil. Path-1 includes XX-001. Next, the program examines whether the paths realize a certain part of the IBD logic. When a path realizes an IBD clause, every The condition realized by Path- 7 \ Fig. 7 Small Impedance Resistor IBD = (ahbhci)v(cl hc2) (a) Sequence diagram YaAbAcl & Ac2 its coil XX - = link (b) Restructured path data Example of sequence diagram and its restructured path data contact of the path is marked correct. In Fig. 7(b), Path-2 realizes the second clause of the IBD logic. Then C1-002 and C2-003 are marked correct. Here, the trigger paths may use the same contact, so that the marked contact can be contained in incorrect paths. The contacts of the auxiliary coil s trigger paths are marked similarly. To identify the incorrect part of the diagrams, the verification program assumes that the marked contacts cannot be replaced or removed. c. Identification process When the extracted logic is not the same as the IBD logic, the verification program identifies the design flaw. The flow of the flaw identification is shown in Fig. 8. First, the program checks whether the extracted logic subsumes the IBD logic. A hypothesis turn around is set if every IBD clause is realized and extra clauses are found in the extracted logic. In this case, the redundant paths that realize the unnecessary clause are
9 Vol. 31, No. 2 (Feb. 1994) 109 Restructure the path data II and mark correct contacts.c Explain the flaw according to the hypothesis Couple each mismatched clause with the IBDs clause - Generates the flaw hypothesis according to the mismatch pattern of the clauses I I Modifythetriggerpath Reject the hypothesis that realize the identified and judged to be responsible for turn around. Otherwise, the program checks other characteristics. The program examines every path linked to the flaw candidate clauses nominated in the logic comparison. Each linked clause is compared with the unrealized clause of the IBD logic and is coupled with the most similar IBD clause that has highest rate of the matched terms. Based on the mismatch pattern of the clauses, the program generates flaw hypothesis according to the following rules : (1) When both clauses have the same variable set, but different operators, unsuitable contact type is hypothesized. The program finds the contact to be replaced among the unmarked contacts. (2) When both clauses have the same operators, but some variable names are different, unsuitable device name is hypothesized. The program infers which contact should be replaced or which device name should be corrected. (3) When the term set of the realized clause implies that of the IBD clause, excess is hypothesized. The program Fig. 8 Flow chart of identification process -19- finds the contact corresponding to the excessive term. (4) Lack is the opposite case of excess. One or more contacts should be added to realize the missing terms of the IBD clause. To confirm the hypotheses, the trigger path including the unmarked contacts is modified and checked. For unsuitable contact type or unsuitable device name, a proper contact type or a device name is inferred. Then the unmarked contacts are temporarily replaced by the inference results. For excess, the unnecessary contacts are removed. Here, only the unmarked contacts can be replaced or removed. If the path does not contain any unmarked contact, the program examines the path from the auxiliary relay coil whose contact is contained in the main path. If the auxiliary path contains some unmarked contacts, the program tries to modify them in the same way. The verification program extract the logic from the modified path. If a clause of the newly extracted logic is equal to the corresponding IBD clause, the hypothesis is adopted as the explanation of the flaw. The program
10 110 J. Nucl. Sci. Technol., outputs where and what the design flaw is. Otherwise, the hypothesis is rejected and the verification program generates another hypothesis. Using hypothetical reasoning, the program identifies a design flaw by any mismatch of logical expressions. As for complex flaws, the combined hypotheses can be generated from combination of characteristics of each flaw type. However, the program only makes flaw identifications within the predetermined categories and unexpected flaw types may not be identified correctly. But even in that case, the verification program properly detects that the diagram contains some flaws. IV. EXAMPLES The verification program is implemented by Common Lisp and is running on an engineering workstation. The CAD program is running on a main frame computer, since it handles large databases. These machines are connected by a network for data transfer. The logic verification system is applied to the sequence diagram shown in Fig. 6. The corresponding IBD requires that w2 is true when s, a and Q, or s, b and f are true. The circuit contains two turn around paths. The path data for flaw identification are shown in Fig. 9. The IBD logic is (saaae)v(sabaf) and the extracted logic is (saaae)v(sabaf) Fig. 9 (shahe) V(shahchdhf) V (shbhchdhe) V (shbhf) Path-2 ath-3 \.ath-4# J Path data for turn around flaw identification V(s A a A c Ad Af) V (s A b A c A d A el. Every clause of the IBD logic is contained in the extracted logic. So, the program tries to find the redundant path. In this case, both the necessary clause and the unnecessary clause are realized by Path-0. Hence, Path-0 is excluded from candidates of redundant paths. Next, the program tries to find unnecessary paths from the auxiliary paths ; Path-1.v-4. Every contact of Path-1 and -4 has been marked correct, so Path-1 and -4 :annot be the flaw-responsible sub-circuit. Then, Path-2 and -3 are found to be redundant paths responsible for turn around. Figure 10 shows the verification result of the circuit shown in Fig. 6. The last line in *Turn around by following paths # Path : upper-bus => ( 1 A 2 ) ( 1 C 2 ) ( 2 D 1 ) ( 1 F 2 ) [Yl (= lower-bus Path : upper-bus =) ( 1 B 2 ) < 1 D 2 ) ( 2 C 1 ) ( 1 E 2 ) [YI <= lower-bus ***** Intercept above paths. / I t Relay contact or switch ; ( terminal-id devicename terminal-id ) Relay coil : [ devicename I I $I It=rI@l@ l*lm Fig. 10 Verification result
11 Vol. 31, No. 2 (Feb. 1994) 111 Fig. 10 is an advisory message telling that the sequence diagram can be corrected by interception of the redundant paths. Figure 11 shows another example of a sequence diagram. It is a part of a circuit of an actual power plant with deliberately imposed design flaws. (The sequence diagrams without the imposed design flaws are verified correctly.) Coil 86G1 in the left corner is to be triggered. The leftmost path from coil High impe lamp 86G1 contains three components, a lamp, a test-terminal and a contact of 86G1. In this case, the lamp is eliminated from the search space during the logic extraction since it is specified to have a large impedance. Testterminals are always closed during normal operation. So the test-terminal is always interpreted as true. Also the B-contact of 86G1 is interpreted as true because it cannot be open before the coil is excited. Manual switch Time delayed wntacl Hand-reset relay wntacl Resistor Contacts of detectors Lamp Test terminal The coil specified to be triggered Fig. 11 Part of sequence diagram Deliberately imposed flaw An example display of verification results is shown in Fig. 12. Line 6 from the top show the messages for unsuitable device name. These include the flaw type, the mismatched clause of the sequence diagram, the corresponding clause of the IBD and the responsible sub-circuit of the sequence diagram. The sixth line is an advisory message telling that the contact of relay 40x1 specified by terminal-id 1 and 2 should be changed. * Unsuitable device name SEQUENCE : (AND 40X 52G (NOT 60G)) I B D : (AND 40G 52G (NOT 60G)) Path : upper-bus =) ( 11 52GX2 12 ) ( 10 6OGFiX 2 ) ( 1 40x1 2 ) ( C G1 C4 ) ( 5 86G1 6 ) I86Gll<<= lower-bus ***** Change contact (1-2) of 40x1. *Unsuitable contact type c fifypel 1-1 SEQUENCE 64G1 I B D : (TIMER 64G1 1s) Path : upper-bus =) ( 1 64G1 2 ) ( 1 64G1X 2 ) ( 1c lt01 11 ) ( 5 86G1 6 ) [86G11 <= lower-bus ***** Unsuitable contact (1-2) of 64-4GlX. Change type : Acontact -) timing relay Acontact *Following IBD s clauses are not realized. 87MT (R) \ Fig. 12 Verification result
12 112 J. Nucl. Sci. Technol., The 7th-13th lines are for unsuitable contact type. These show the sub-circuit responsible for the flaw, and an advisory message telling that the unsuitable contact name, and the contact type to be replaced. The last two lines show the missing clause by disconnection. The program detects this flaw, though it does not identify where it is disconnected. The user can find this out by using the disconnection checking function provided by the CAD program. V. DISCUSSION Though logic realized in sequence diagrams is basically a kind of sequential logic, the developed system verifies it as a combinational logic, because sequential logic can be regarded as a series of combinational logics. Cenerally, a relay circuit realizes the logic that depends on the existing inputs and the preceding output. Then the logic realized in sequence diagrams can be converted to a short series of combinational logics. So that the whole series of combinational logics can be verified. Most of the logic realized in sequence diagrams can be verified as the condition to trigger excitation of the specified coil. As for the sequence diagrams designed in the opposite way, the developed system provides another logical value assigning rule set for logic extraction. The extracted logic is transformed into another standard form called a CNF (Conjunctive Normal Form) expression instead of a DNF expression. A CNF expression is a logical AND of OR clauses. Each OR clause corresponds to a current path of sequence diagrams in the other way. The developed system has been applied to the verification of sequence diagrams of actual power plant electric systems etc. The sequence diagrams of the second verification example contained about 140 components and 250 connectivities. The verification was performed with deliberately imposed design flaws. The developed system found all the flaws correctly. The elapsed time for verification (data conversion to flaw identification) was about 3min per logical expression realized in the sequence diagrams. It is shorter than 1/3 of the manual verification time needed by a skilled designer. This is acceptable from the viewpoint of practical use. Though the logic verification system is developed for the verification of the sequence diagrams describing relay circuits, it is expected to be applicable to the verification of the sequence diagrams describing plant control software as well. Because the diagram for software is rather simple than that for relay circuits. VI. CONCLUSION A logic verification system for power plant control system design has been developed. It pertains to the verification of the logic of sequence diagrams against their corresponding IBDs. The verification is performed by extraction and comparison of two logical expressions. Logic is extracted from sequence diagrams based on the connectivities and behaviors of the components. This extracted logic and the logic given by the corresponding IBDs are transformed to DNF expressions and compared. If any mismatch is detected, the responsible path is pointed out, based on the mismatched pattern of the two clauses. Also the developed system identifies the design flaws and generates some advisory messages to help in their correction. The developed system has been applied to the verification of an actual power plant electric system and all deliberately imposed design flaws were found correctly. These application studies confirmed that the developed system is useful and effective. -REFERENCB- (1) BARROW, H.G.: Artif. Intelligence, 24, 437 (1984). (2) WOJCIIC, A.S., et al.: Proc. of 21st Design Automation Conf., p. 641 (1984). (3) WONG, Y. : Proc. of 22nd Design Automation Conf., p. 695 (1985). (4) SAKATA, T., et al. : ibid., p (5) YAMADA, N., et ~ l :. J. Inform. Process., 14 [23, 126 (1991)
COMPUTER ARCHITECTURE AND ORGANIZATION Register Transfer and Micro-operations 1. Introduction A digital system is an interconnection of digital
Register Transfer and Micro-operations 1. Introduction A digital system is an interconnection of digital hardware modules that accomplish a specific information-processing task. Digital systems vary in
More informationoutput devices. connected to the controller. data communications link. relay systems. user program. MECH1500Quiz1ReviewVersion2 Name: Class: Date:
Class: Date: MECH1500Quiz1ReviewVersion2 True/False Indicate whether the statement is true or false. 1. The number and type of I/Os cannot be changed in a fixed PLC. 2. In a PLC system, there is a physical
More informationRevision of Inconsistent Orthographic Views
Journal for Geometry and Graphics Volume 2 (1998), No. 1, 45 53 Revision of Inconsistent Orthographic Views Takashi Watanabe School of Informatics and Sciences, Nagoya University, Nagoya 464-8601, Japan
More informationModule 5. Function-Oriented Software Design. Version 2 CSE IIT, Kharagpur
Module 5 Function-Oriented Software Design Lesson 12 Structured Design Specific Instructional Objectives At the end of this lesson the student will be able to: Identify the aim of structured design. Explain
More informationInstrumentationTools.com
Author: Instrumentation Tools Categories: PLC Tutorials PLC Ladder Logic : Contacts and coils The most elementary objects in Ladder Diagram programming are contacts and coils, intended to mimic the contacts
More informationAn Approach for Quality Control Management in Object Oriented Projects Development
J. Basic. Appl. Sci. Res., 3(1s)539-544, 2013 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com An Approach for Quality Control Management in Object
More informationSoftware Engineering 2DA4. Slides 2: Introduction to Logic Circuits
Software Engineering 2DA4 Slides 2: Introduction to Logic Circuits Dr. Ryan Leduc Department of Computing and Software McMaster University Material based on S. Brown and Z. Vranesic, Fundamentals of Digital
More informationA Practical Applications of Virtual PLC using LabVIEW Software
Research Journal of Applied Sciences, Engineering and Technology 5(24): 5677-5682, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: December 28, 2012 Accepted: February
More informationPolynomial SAT-Solver Algorithm Explanation
1 Polynomial SAT-Solver Algorithm Explanation by Matthias Mueller (a.k.a. Louis Coder) louis@louis-coder.com Explanation Version 1.0 - December 1, 2013 Abstract This document describes an algorithm that
More informationOcean Controls KTA-224 Modbus IO Module
Ocean Controls Ocean Controls 8 Relay outputs (5A, 250VAC contacts) 4 Opto-Isolated Inputs with counters 3 Analog Inputs (10 bit) jumperselectable for 0-5V or 0-20mA 4 Input Counters RS485 or USB (virtual
More informationBoolean Algebra & Digital Logic
Boolean Algebra & Digital Logic Boolean algebra was developed by the Englishman George Boole, who published the basic principles in the 1854 treatise An Investigation of the Laws of Thought on Which to
More informationProject and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi
Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture - 8 Consistency and Redundancy in Project networks In today s lecture
More informationON PRACTICAL RESULTS OF THE DIFFERENTIAL POWER ANALYSIS
Journal of ELECTRICAL ENGINEERING, VOL. 63, NO. 2, 212, 125 129 COMMUNICATIONS ON PRACTICAL RESULTS OF THE DIFFERENTIAL POWER ANALYSIS Jakub Breier Marcel Kleja This paper describes practical differential
More informationProtection and Control System Using Open Network Architecture for Power Systems
Protection and Control System Using Open Network rchitecture for Power Systems 106 Protection and Control System Using Open Network rchitecture for Power Systems Takashi Kobayashi Takahiro Oomori Eiji
More informationCHAPTER 4: Register Transfer Language and Microoperations
CS 224: Computer Organization S.KHABET CHAPTER 4: Register Transfer Language and Microoperations Outline Register Transfer Language Register Transfer Bus and Memory Transfers Arithmetic Microoperations
More informationModule 4. Programmable Logic Control Systems. Version 2 EE IIT, Kharagpur 1
Module 4 Programmable Logic Control Systems Version 2 EE IIT, Kharagpur 1 Lesson 19 The Software Environment and Programming of PLCs Version 2 EE IIT, Kharagpur 2 Instructional Objectives After learning
More informationVerification and testing automation of UML projects
Verification and testing automation of UML projects Nikita Voinov, Vsevolod Kotlyarov Saint-Petersburg State Polytechnic University, Saint-Petersburg, Russia voinov@ics2.ecd.spbstu.ru, vpk@ics2.ecd.spbstu.ru
More informationDIN RAIL 12/8/4 OUTPUT MODULE. BOxxB01KNX. Product Handbook
DIN RAIL 12/8/4 OUTPUT MODULE BOxxB01KNX Product Handbook Product: BOxxB01KNX -BO12B01KNX -BO08B01KNX -BO04B01KNX Description: DIN RAIL 12/8/4 OUTPUT MODULE Document Version: 1.2 Date: 07/07/2015 1/16
More informationCombinational and sequential systems. Prof. Cesar de Prada Dpt. of Systems Engineering and Automatic Control UVA
Combinational and sequential systems Prof. Cesar de Prada Dpt. of Systems Engineering and Automatic Control UVA prada@autom.uva.es 1 Outline Discrete events systems Combinational logic Sequential systems
More informationTo prove something about all Boolean expressions, we will need the following induction principle: Axiom 7.1 (Induction over Boolean expressions):
CS 70 Discrete Mathematics for CS Spring 2005 Clancy/Wagner Notes 7 This lecture returns to the topic of propositional logic. Whereas in Lecture Notes 1 we studied this topic as a way of understanding
More information(12) (10) Patent No.: US 7,017,055 B1. H0 (45) Date of Patent: Mar. 21, 2006
United States Patent USOO701.7055B1 (12) (10) Patent No.: H0 (45) Date of Patent: Mar. 21, 2006 (54) HUB THAT CAN SUPPLY POWER FOREIGN PATENT DOCUMENTS ACTIVELY JP 20020945.45 A * 3/2002 : (75) Inventor:
More informationSystem Protection and Control Subcommittee
Power Plant and Transmission System Protection Coordination GSU Phase Overcurrent (51T), GSU Ground Overcurrent (51TG), and Breaker Failure (50BF) Protection System Protection and Control Subcommittee
More informationModule 3. Requirements Analysis and Specification. Version 2 CSE IIT, Kharagpur
Module 3 Requirements Analysis and Specification Lesson 6 Formal Requirements Specification Specific Instructional Objectives At the end of this lesson the student will be able to: Explain what a formal
More informationTopics. PLC Fundamentals Ladder Logic Fundamentals
PLC Fundamentals Ladder Logic Fundamentals MET 382 Controls & Instrumentation for Automation Spring 08 T.E. Kostek Topics PLC programming languages Anatomy of a ladder program Logic functions Logical continuity
More informationBasic Processing Unit: Some Fundamental Concepts, Execution of a. Complete Instruction, Multiple Bus Organization, Hard-wired Control,
UNIT - 7 Basic Processing Unit: Some Fundamental Concepts, Execution of a Complete Instruction, Multiple Bus Organization, Hard-wired Control, Microprogrammed Control Page 178 UNIT - 7 BASIC PROCESSING
More informationEliminating False Loops Caused by Sharing in Control Path
Eliminating False Loops Caused by Sharing in Control Path ALAN SU and YU-CHIN HSU University of California Riverside and TA-YUNG LIU and MIKE TIEN-CHIEN LEE Avant! Corporation In high-level synthesis,
More informationAutomated Analysis of Digital Relay Data Based on Expert System
Automated Analysis of Digital Relay Data Based on Expert System X. Luo, Student Member, IEEE, and M. Kezunovic, Fellow, IEEE Abstract Modern digital protective relays generate various files and reports
More informationDevelopment and Commercialization of New Digital Protection and Control Equipment
Development and Commercialization of New Digital Protection and Control Equipment 416 Development and Commercialization of New Digital Protection and Control Equipment Chikashi Komatsu Jun Noro Mitsuyasu
More information9/7/2010. Chapter , The McGraw-Hill Companies, Inc. MOTOR SYMBOLS. 2010, The McGraw-Hill Companies, Inc.
Chapter 2 MOTOR SYMBOLS 1 Symbols are used to represent the different components of a motor control system. Symbols sometimes look nothing like the real thing, so we have to learn what the symbols mean.
More informationDESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER
International Journal of Computer Engineering and Applications, Volume VI, Issue II, May 14 www.ijcea.com ISSN 2321 3469 DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER Kiran K C 1, Sunil T D
More informationK-BUS R. Dimming Actuators. User manual-ver. 4 KA/D KA/D KA/D KA/D 04.T1.1 ADTV-04/16.1 KA/D 04.L1.1 ADLD-04/
Guangzhou Video-star Electronics Industrial Co., Ltd K-BUS R Dimming Actuators User manual-ver. 4 KA/D 0103.1 KA/D 0203.1 KA/D 0403.1 KA/D 04.T1.1 ADTV-04/16.1 KA/D 04.L1.1 ADLD-04/03.1...... KNX/EIB Intelligent
More informationResearch on Modeling Method for Constraint Inference
A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 33, 2013 Guest Editors: Enrico Zio, Piero Baraldi Copyright 2013, AIDIC Servizi S.r.l., ISBN 978-88-95608-24-2; ISSN 1974-9791 The Italian Association
More informationControl and Data Flow Testing on Function Block Diagrams
Control and Data Flow Testing on Function Block Diagrams Eunkyoung Jee, Junbeom Yoo, and Sungdeok Cha Department of Electrical Engineering and Computer Science, Korea Advanced Institute of Science and
More informationDarshan Institute of Engineering & Technology for Diploma Studies
CODING Good software development organizations normally require their programmers to follow some welldefined and standard style of coding called coding standards. Most software development organizations
More informationHigh-Reliability, Next-Generation Supervisory and Control System for Power Stations
214 High-Reliability, Next-Generation Supervisory and Control System for Power Stations High-Reliability, Next-Generation Supervisory and Control System for Power Stations Akio Ito Kazuo Furudate Masayuki
More informationAlarm Circuits Explained. A Guide to Inputs and Outputs Used in Video Security
A Guide to Inputs and Outputs Used in Video Security ev 1.1 Updated 11-Mar-2013 Content Content... 2 Introduction... 3 Useful Terminology... 3 Digital Input Circuits... 4 Opto-isolator Input... 4 Switch
More informationExamination Guidelines for Design (Provisional translation)
Examination Guidelines for Design (Provisional translation) Japan Patent Office Examination Guidelines for Design The Examination Guidelines for Design aims to ensure consistent interpretation and implementation
More informationPerformance Bottleneck Analysis of Web Applications with eassist
: New Measures for Data Center Performance Bottleneck Analysis of Web Applications with eassist Tomohide Yamamoto, Yasuharu Yamada, and Tetsuya Ogata Abstract This article introduces eassist, which enables
More informationTo prove something about all Boolean expressions, we will need the following induction principle: Axiom 7.1 (Induction over Boolean expressions):
CS 70 Discrete Mathematics for CS Fall 2003 Wagner Lecture 7 This lecture returns to the topic of propositional logic. Whereas in Lecture 1 we studied this topic as a way of understanding proper reasoning
More informationDIGITAL ARITHMETIC: OPERATIONS AND CIRCUITS
C H A P T E R 6 DIGITAL ARITHMETIC: OPERATIONS AND CIRCUITS OUTLINE 6- Binary Addition 6-2 Representing Signed Numbers 6-3 Addition in the 2 s- Complement System 6-4 Subtraction in the 2 s- Complement
More informationMELSEC iq-r Safety Function Block Reference
MELSEC iq-r Safety Function Block Reference SAFETY PRECAUTIONS (Read these precautions before using this product.) Before using MELSEC iq-r series programmable controllers, please read the manuals for
More informationLab #2: Building the System
Lab #: Building the System Goal: In this second lab exercise, you will design and build a minimal microprocessor system, consisting of the processor, an EPROM chip for the program, necessary logic chips
More informationFPGA IMPLEMENTATION OF FLOATING POINT ADDER AND MULTIPLIER UNDER ROUND TO NEAREST
FPGA IMPLEMENTATION OF FLOATING POINT ADDER AND MULTIPLIER UNDER ROUND TO NEAREST SAKTHIVEL Assistant Professor, Department of ECE, Coimbatore Institute of Engineering and Technology Abstract- FPGA is
More informationTRANSISTORIZED INVERTER
TRANSISTORIZED INVERTER FR-C500 PROGRAMMING MANUAL OVERVIEW Chapter 1 SEQUENCE PROGRAM LANGUAGES AND OPERATIONS Chapter 2 DESCRIPTION OF DEVICES Chapter 3 PLC FUNCTION Chapter 4 STRUCTURES OF INSTRUCTIONS
More informationAppeal Decision. Appeal No Singapore KINGLITE HOLDINGS INC. Tokyo, Japan
Appeal Decision Appeal No. 2014-22371 Singapore Appellant Tokyo, Japan Patent Attorney KINGLITE HOLDINGS INC. SUGIMURA, Kenji The case of appeal against the examiner's decision of refusal of Japanese Patent
More informationHigh Speed Fault Injection Tool (FITO) Implemented With VHDL on FPGA For Testing Fault Tolerant Designs
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2894-2900 ISSN: 2249-6645 High Speed Fault Injection Tool (FITO) Implemented With VHDL on FPGA For Testing Fault Tolerant Designs M. Reddy Sekhar Reddy, R.Sudheer Babu
More informationA proof-producing CSP solver: A proof supplement
A proof-producing CSP solver: A proof supplement Report IE/IS-2010-02 Michael Veksler Ofer Strichman mveksler@tx.technion.ac.il ofers@ie.technion.ac.il Technion Institute of Technology April 12, 2010 Abstract
More informationIntroduction. Field of studies
727. Utilization of advanced self-diagnostic functions implemented in frequency inverters for the purpose of the computer-aided identification of operating conditions Jerzy Świder, Mariusz Hetmańczyk,
More informationCombinational Logic & Circuits
Week-I Combinational Logic & Circuits Spring' 232 - Logic Design Page Overview Binary logic operations and gates Switching algebra Algebraic Minimization Standard forms Karnaugh Map Minimization Other
More informationChapter 7 : Input-Output Organization
Chapter 7 Input-Output organization 7.1 Peripheral devices In addition to the processor and a set of memory modules, the third key element of a computer system is a set of input-output subsystem referred
More informationDTMF BASED HOME AUTOMATION
DTMF BASED HOME AUTOMATION Vimlesh Kumar Agrahari 1, Md Arzoo 2, Harish Kumar 3 1, 2 Students, Electrical Engineering Department Greater Noida Institutes of Technology, Gr.Noida, (India) 3 Assistant Professor,
More information(12) United States Patent
(12) United States Patent USOO7007134B2 (10) Patent No.: Suetake (45) Date of Patent: Feb. 28, 2006 (54) MICROCOMPUTER, METHOD OF (56) References Cited CONTROLLING CACHE MEMORY, AND U.S. PATENT DOCUMENTS
More information(12) (10) Patent No.: US 7,103,736 B2. Sachs (45) Date of Patent: Sep. 5, 2006
United States Patent US007103736B2 (12) (10) Patent No.: Sachs (45) Date of Patent: Sep. 5, 2006 (54) SYSTEM FOR REPAIR OF ROM 5.325,504 A * 6/1994 Tipley et al.... T11/128 PROGRAMMING ERRORS ORDEFECTS
More informationZ Z-280 MT8930, MT8992/3/4/5 MT8880 MT8888 MT8889 MT8980/1 MT8985, MT8986 (DIP-40) MT8986 (PLCC-44) MT8920B MT8952B
MSAN-145 How to Interface Mitel Components to Parallel Bus CPUs TABL OF CONTNTS Introduction ISSU 1 August 1993 1.0 Group 1 Components 1.1 Interfacing to the 6802 1.2 Interfacing to the 6809 1.3 Interfacing
More information1 Digital tools. 1.1 Introduction
1 Digital tools 1.1 Introduction In the past few years, enormous advances have been made in the cost, power, and ease of use of microcomputers and associated analog and digital circuits. It is now possible,
More informationPart 5. Verification and Validation
Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this
More informationARITHMETIC operations based on residue number systems
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 53, NO. 2, FEBRUARY 2006 133 Improved Memoryless RNS Forward Converter Based on the Periodicity of Residues A. B. Premkumar, Senior Member,
More information2. Control Pin Functions and Applications
IMARY CONTROL ( PIN) Module Enable / Disable. The module can be disabled by pulling the below 2.3 V with respect to the Input. This should be done with an open-collector transistor, relay, or optocoupler.
More informationUNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MSC SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 2 EXAMINATION 2016/2017
TW30 UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MSC SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 2 EXAMINATION 2016/2017 MICROPROCESSOR BASED SYSTEMS MODULE NO: EEM7016 Date: Wednesday 17 May
More informationCircuit simplification examples
Circuit simplification examples Let's begin with a semiconductor gate circuit in need of simplification. The "A," "B," and "C" input signals are assumed to be provided from switches, sensors, or perhaps
More informationSMART E-BILL GENERATION USING PLC
RESEARCH ARTICLE SMART E-BILL GENERATION USING PLC A.PRIYANKA 1, G.SAHITHI 2, SNEHA 3, K.RAMANJANEYA REDDY 4 1(Assistant Professor, Electronics and communication engineering, AITS, Rajampet Email : priyanka3aluru@gmail.com)
More informationREGISTER TRANSFER AND MICROOPERATIONS
REGISTER TRANSFER AND MICROOPERATIONS Register Transfer Language Register Transfer Bus and Memory Transfers Arithmetic Microoperations Logic Microoperations Shift Microoperations Arithmetic Logic Shift
More informationSCIENCE & TECHNOLOGY
Pertanika J. Sci. & Technol. 5 (S): 35-4 (017) SCIENCE & TECHNOLOGY Journal homepage: http://www.pertanika.upm.edu.my/ Transmission Lines Modelling based on RLC Passive and Active Filter Design Ahmed Qasim
More informationHigh-performance Digital Protection and Control Unit for Distribution Substations
High-performance Digital Control Unit for Distribution Substations 136 High-performance Digital Control Unit for Distribution Substations Takashi Kobayashi Eiji Ogawa Atsushi Yanaoka Mitsuo Sato OVERVIEW:
More informationATL20 ATL30 Automatic transfer switch controller
I 194 GB 07 07 ATL20 ATL30 Automatic transfer switch controller REMOTE CONTROL SOFTWARE MANUAL Summary Introduction... 2 Minimum resources of the PC... 2 Installation... 2 Activation of the PC-ATL connection...
More informationDEVELOPMENT OF PREVENTIVE MAINTENANCE SYSTEM ARISING IN ADVANCED EDDY CURRENT TESTING USING NETWORK TOMOGRAPHY
DEVELOPMENT OF PREVENTIVE MAINTENANCE SYSTEM ARISING IN ADVANCED EDDY CURRENT TESTING USING NETWORK TOMOGRAPHY F. Kojima 1, F.Kobayashi 1, A. Nishimizu 2, M. Koike 2, T. Matsui 2, H. Endo 3, T. Uchimoto
More informationDesign and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs
Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Girish K 1 and Mrs. Shruthi G 2 1 Department of CSE, PG Student Karnataka, India 2 Department of CSE,
More informationSubject : Computer Science. Paper : Software Quality Management. Module : CASE Tools
e-pg Pathshala Subject : Computer Science Paper : Software Quality Management Module : CASE Tools Module No: Quadrant 1: CS/SQM/26 e-text An increasing variety of specialized computerized tools (actually
More informationCS40-S13: Functional Completeness
CS40-S13: Functional Completeness Victor Amelkin victor@cs.ucsb.edu April 12, 2013 In class, we have briefly discussed what functional completeness means and how to prove that a certain system (a set)
More informationUNITROL F Excitation systems for synchronous machines with and without rotating exciter
UNITROL F Excitation systems for synchronous machines with and without rotating exciter Copyright 2000 Photodisc, Inc. UNITROL F System Overview Fig. 1: Main configurations of the UNITROL F system UNITROL
More informationPRC Coordination of Protection Systems for Performance During Faults
PRC-027-1 Coordination of Protection Systems for Performance During Faults A. Introduction 1. Title: Coordination of Protection Systems for Performance During Faults 2. Number: PRC-027-1 3. Purpose: To
More informationBOOLEAN ALGEBRA AND CIRCUITS
UNIT 3 Structure BOOLEAN ALGEBRA AND CIRCUITS Boolean Algebra and 3. Introduction 3. Objectives 3.2 Boolean Algebras 3.3 Logic 3.4 Boolean Functions 3.5 Summary 3.6 Solutions/ Answers 3. INTRODUCTION This
More informationTraining Kit for HP 1660/70 Series Logic Analyzers
Training Guide Publication Number E2433-97034 First Edition, November 1997 For Safety information, Warranties, and Regulatory information, see the pages behind the Index. Copyright Hewlett-Packard Company
More informationOperating Instructions Extended Cascade Controller MCO 101
Operating Instructions Extended Cascade Controller MCO 101 VLT AQUA Drive FC 200 Extended Cascade Controller Option Contents Contents 1. Safety and precautions 3 Safety Instructions 3 Avoid unintended
More information2. BOOLEAN ALGEBRA 2.1 INTRODUCTION
2. BOOLEAN ALGEBRA 2.1 INTRODUCTION In the previous chapter, we introduced binary numbers and binary arithmetic. As you saw in binary arithmetic and in the handling of floating-point numbers, there is
More informationThe below identified patent application is available for licensing. Requests for information should be addressed to:
WARFARE CENTERS NEWPORT DEPARTMENT OF THE NAVY NAVAL UNDERSEA WARFARE CENTER DIVISION NEWPORT OFFICE OF COUNSEL PHONE: 401 832-3653 FAX: 401 832-4432 DSN: 432-3653 Date: 3 November 2008 The below identified
More informationSimulation of the effectiveness evaluation process of security systems
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Simulation of the effectiveness evaluation process of security systems To cite this article: A V Godovykh et al 2016 IOP Conf.
More informationNepal Telecom Nepal Doorsanchar Company Ltd.
Nepal Telecom Nepal Doorsanchar Company Ltd. Syllabus lg=g+= 124 ;+u ;DalGwt cg';'lr - 3_ Part II: (Specialized subject for Computer Engineer Level 7 Tech. - Free and Internal competition) Time: 2 hours
More informationSNiPER: an offline software framework for non-collider physics experiments
SNiPER: an offline software framework for non-collider physics experiments J. H. Zou 1, X. T. Huang 2, W. D. Li 1, T. Lin 1, T. Li 2, K. Zhang 1, Z. Y. Deng 1, G. F. Cao 1 1 Institute of High Energy Physics,
More informationLesson 5: Verifying RAMs with the Fluke 9010A Version 1.03
Lesson 5: Verifying RAMs with the Fluke 9010A Version 1.03 Random Access Memory: One of the most common failures that occur on arcade PCBS are failures in Random Access Memory (RAM). These failures will
More informationQuestion & its answer Remark Total marks 01 Attempt any THREE 12. a) State any three different tools used for Automation. 04 Ans.
Important Instructions to examiners: 1) The answers should be examined by keywords and not as word-to-word as given in the model answer scheme. 2) The model answer and the answer written by candidate may
More informationBits, Words, and Integers
Computer Science 52 Bits, Words, and Integers Spring Semester, 2017 In this document, we look at how bits are organized into meaningful data. In particular, we will see the details of how integers are
More informationOperation Manual DHCP. Table of Contents
Table of Contents Table of Contents Chapter 1 DHCP Overview... 1-1 1.1 Introduction to DHCP... 1-1 1.2 DHCP IP Address Assignment... 1-2 1.2.1 IP Address Assignment Policy... 1-2 1.2.2 Obtaining IP Addresses
More informationDESIGN AND IMPLEMENTATION OF FAST DECIMAL MULTIPLIER USING SMSD ENCODING TECHNIQUE
RESEARCH ARTICLE OPEN ACCESS DESIGN AND IMPLEMENTATION OF FAST DECIMAL MULTIPLIER USING SMSD ENCODING TECHNIQUE S.Sirisha PG Scholar Department of Electronics and Communication Engineering AITS, Kadapa,
More information(12) Patent Application Publication (10) Pub. No.: US 2003/ A1
(19) United States US 2003.01.10403A1 (12) Patent Application Publication (10) Pub. No.: US 2003/0110403 A1 Crutchfield et al. (43) Pub. Date: Jun. 12, 2003 (54) SYSTEM FOR SHARED POWER SUPPLY IN COMPUTER
More informationDCN Simultaneous Interpretation. Software User Manual en LBB 3572
DCN en LBB 3572 GENERAL CONTENTS Chapter 1-1.1 About 1.2 Interpretation procedures Chapter 2 - Getting Started 2.1 Starting 2.2 Using Help Chapter 3 - Preparing for a Conference 3.1 The interpretation
More informationSo, You Want to Test Your Compiler?
So, You Want to Test Your Compiler? Theodore S. Norvell Electrical and Computer Engineering Memorial University October 19, 2005 Abstract We illustrate a simple method of system testing by applying it
More informationParallel connection / operations and current share application note
Parallel connection / operations and current share application note Overview This document will examine method for active load sharing, basic criteria and performances of such a function on Glary UH and
More informationELECTRONIC INSTRUMENTATION AND SYSTEMS LABORATORY
ELECTRONIC INSTRUMENTATION AND SYSTEMS LABORATORY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING MICHIGAN STATE UNIVERSITY I. TITLE: Lab IX - Light Activated Exhaust Fan II. PURPOSE: One use of bipolar
More informationAn Electrical Energy Consumer Load Monitoring and Control System Through SMS Based
Research Journal of Applied Sciences, Engineering and Technology 4(10): 1371-1375, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: January 11, 2012 Accepted: February 09, 2012 Published:
More informationMathematical Logic Prof. Arindama Singh Department of Mathematics Indian Institute of Technology, Madras. Lecture - 9 Normal Forms
Mathematical Logic Prof. Arindama Singh Department of Mathematics Indian Institute of Technology, Madras Lecture - 9 Normal Forms In the last class we have seen some consequences and some equivalences,
More informationCombinational and sequential circuits (learned in Chapters 1 and 2) can be used to create simple digital systems.
REGISTER TRANSFER AND MICROOPERATIONS Register Transfer Language Register Transfer Bus and Memory Transfers Arithmetic Microoperations Logic Microoperations Shift Microoperations Arithmetic Logic Shift
More informationRobotic Systems ECE 401RB Fall 2006
The following notes are from: Robotic Systems ECE 401RB Fall 2006 Lecture 13: Processors Part 1 Chapter 12, G. McComb, and M. Predko, Robot Builder's Bonanza, Third Edition, Mc- Graw Hill, 2006. I. Introduction
More informationSECTION 1 INTRODUCTION. Walt Kester
SECTION 1 INTRODUCTION Walt Kester This book deals with sensors and associated signal conditioning circuits. The topic is broad, but the focus of this book is to concentrate on circuit and signal processing
More informationPart 1-2. Translation of Netlist to CNF
2D Project Report Part 1-2. Translation of Netlist to CNF Team members: MA Ke, WEI Fanding, CHEN Jian, CHEN Ziyi Introduction In this part, we are required to translate the netlist of our optimized adder
More informationOn Resolution Proofs for Combinational Equivalence Checking
On Resolution Proofs for Combinational Equivalence Checking Satrajit Chatterjee Alan Mishchenko Robert Brayton Department of EECS U. C. Berkeley {satrajit, alanmi, brayton}@eecs.berkeley.edu Andreas Kuehlmann
More informationComputer Organization (Autonomous)
Computer Organization (Autonomous) UNIT I Sections - A & D Prepared by Anil Kumar Prathipati, Asst. Prof., Dept. of CSE. SYLLABUS Introduction: Types of Computers, Functional units of Basic Computer (Block
More informationRedundant States in Sequential Circuits
Redundant States in Sequential Circuits Removal of redundant states is important because Cost: the number of memory elements is directly related to the number of states Complexity: the more states the
More informationPluto AS-i. Safety PLC. Approvals: Control of: Features:
Safety PLC Pluto AS-i Approvals: TÜV Rheinland Control of: Safety products in dynamic and static circuits as well as in AS-i networks Electrically controlled actuators such as contactors, valves, motors
More informationMFS605/EE605 Systems for Factory Information and Control
MFS605/EE605 Systems for Factory Information and Control Lecture 9 PLCs (half lecture) Fall 2005 Larry Holloway Dept. of Electrical Engineering and Center for Robotics and Manufacturing Systems 1 So far
More information