scholarly journals Prototype of a remotely controlled model of a tugboat with an azimuth rudder and a hazard identification function

2021 ◽  
Vol 2061 (1) ◽  
pp. 012090
Author(s):  
S N Stukonog

Abstract The author’s approach, based on the technology of control actions, is proposed for the interface display of the algorithm for the operation of an automatic tugboat with an azimuth rudder and a hazard assessment function. To define the object as presumably dangerous, the article used the formulas of the direct and inverse navigation problems. To compare the coordinates of the vessel and the perceived “hazard”, one first needs to enter data, process the information, and display information that is understandable for the decision-maker. To eliminate the misunderstanding of this situation, the operation of the danger prevention algorithm was demonstrated using the visual basic programming language as an example. When constructing an algorithm for the safe movement of the vessel and the existing danger, each object, even a stand-alone one, has many coordinate points. Knowing the number of points of coordinates of the vessel and “danger”, they were taken as n and m, respectively. The algorithm searches for the optimal point-object. The scheme of interaction of the components of the automatic tug azimuth model (ABA) is proposed. It is based on a Raspberry Pi single-board computer with an Arduino Mega board connected to it. A program has been written to control the ABA model using omnidirectional wheels to simulate maneuvering on water.

2020 ◽  
Vol 4 (2) ◽  
pp. 52
Author(s):  
Rosi Very Yanty

The design of the land certificate filing system was built to facilitate the work process in managing land certificate records, especially in the field of archives at the Aceh Besar National Land Agency, which is intended to streamline computerized data processing to support technical implementation in carrying out more accurate land certificate data processing, effective and efficient. A land certificate is a tool or means to convey statements or information in writing from one party to another party. Such information can be in the form of notifications, statements, requests, reports, objections, thoughts, questions, and so on. The design of the system used by the Rapid Application Development (RAD) method, a software development process model classified as incremental (multilevel) techniques. Applications used for making applications are Microsoft Visual Basic .NET as interface design and Microsoft Office Access as a DBMS. The test results of this application are the systems that are built already meet the needs, the input data process has met the needs and the resulting report has met the needs.Keywords:Land Certificate Filing System, Information System, Visual Basic .NET


Author(s):  
Hyungju Kim ◽  
Mary Ann Lundteigen ◽  
Andreas Hafver ◽  
Frank Børre Pedersen

System-theoretic process analysis is a hazard identification method whose main assumption is that accidents can be caused by unsafe interactions of system components, as well as component failures. System-theoretic process analysis can cover a wider range of hazards compared with traditional hazard analysis methods, such as software flaws, human errors, component failures, and complex interactions of system components. Identifying more hazards is of course an important advantage of system-theoretic process analysis, but generating too many hazards may pose a practical challenge to stakeholders to utilize the results of system-theoretic process analysis. Some hazards or scenarios may be more critical with higher consequence, while others can be less critical with lower consequence. We therefore need to evaluate the analysis results to focus on more critical and important problems first, when we do not have enough time and resources. The main objective of this study has been to suggest an additional procedure to system-theoretic process analysis to ensure a systematic evaluation, screening, and prioritization of analysis results. The risk priority number approach was adopted to evaluate the criticality of the results of analyses. After investigating the strengths and limitations of traditional risk priority number approaches, three new risk priority number criteria along with four additional procedure steps were added to the system-theoretic process analysis for evaluation, screening, and prioritization of system-theoretic process analysis results. The proposed criteria and procedure have been demonstrated with a case study of a subsea gas compression system, and for this particular analysis, it was suggested that 38 of 130 unsafe control actions and 258 of 976 loss scenarios were significantly less critical and screened out, so that the resources could be prioritized to solve the remaining findings. Meanwhile, prioritization is still a rather new topic with system-theoretic process analysis, and in the end of the article, we have identified some ideas for further research in this area.


2021 ◽  
Author(s):  
Boris Dzeboev ◽  
Alexei Gvishiani ◽  
Boris Dzeranov

<p>Proper seismic hazard assessment is the most important scientific problem of seismology, and geophysics in general. With the development of the world economy, the importance of the problem grows and acquires global significance.</p><p>Strong earthquakes (M ≥ M<sub>0</sub>, M<sub>0</sub> is the magnitude threshold starting from which earthquakes in the studied region are considered strong), as a rule, do not occur over the entire territory of the seismic region. Accordingly, the recognition of areas prone to future strong earthquakes is an urgent fundamental direction in research on the assessment of seismic hazard. Identification of potentially high seismicity zones in seismically active regions is important from both theoretical, and practical points of view. The currently available methods for recognition of high seismicity zones do not allow repeatedly correcting their results over time due to the invariability of the used set of recognition objects. In this work, a new system-analytical approach FCAZ (Formalized Clustering And Zoning) to the problem has been created. It uses the epicenters of rather weak earthquakes (M ≥ M<sub>R</sub>, M<sub>R</sub> is a certain magnitude threshold of weak earthquakes) as objects of recognition. This makes it possible to develop the recognition result of zones with increased seismic hazard after the appearance of new earthquake epicenters. The latter makes FCAZ a method of systems analysis.</p><p>The system-analytical method for analyzing geophysical data developed by the authors has led to the successful recognition of areas prone to the strongest, strong, and most significant earthquakes on the continents of North, and South America, Eurasia, and in the subduction zones of the Pacific Rim. At the same time, in particular, for the classical approach of strong earthquake-prone areas recognition EPA (Earthquake-Prone Areas), a new paradigm for recognition of high seismicity disjunctive nodes, and lineament intersections with training by one “reliable” class was created in the work.</p><p>In the regions studied in this work, FCAZ zones occupy a relatively small area compared to the field of general seismicity – 30% – 40% of the area of all seismicity, and 50% – 65% of the area where earthquakes with M ≥ M<sub>R</sub> occur. This illustrates the spatial nontriviality of the FCAZ results obtained in this work. The results of the work also show that weak seismicity can actually “manifest” the properties of geophysical fields, which in the classical EPA approach are used directly as characteristics of recognition objects (disjunctive nodes or intersections of the axes of morphostructural lineaments).</p><p>The reported study was funded by RFBR, project number 20-35-70054 «Systems approach to recognition algorithms for seismic hazard assessment».</p>


2020 ◽  
Vol 4 (1) ◽  
pp. 25
Author(s):  
Khairul Rahmadi

At the Syar'iyah Court of Banda Aceh City, the archiving information system within the agency could be said to be inefficient because there were still many conventional filing information systems applied, namely storing in filing cabinets, and recording to books so that accuracy could still be said to be unfavorable. When viewed in terms of space, it requires an inventory of places for equipment such as filing cabinets, maps, shelves, and others. While in terms of time, the search for the arrangement of documents that are not neat. In terms of cost, the need for care and maintenance of archive storage. The formulation of the problems in this study can be formulated; Designing the Document Filing Information System at the Banda Aceh Syar'iyah Court, Is the Banda Aceh City Syar'iyah Court Filing Information System the information used will be faster and more accurate, and How to present the Syar'iyah Court Document Filing Information System. The method used in designing the NET Document Filing Information System at the Banda Aceh Syar'iyah Court is to use the waterfall method or the waterfall method. Data collection techniques using research methods by observation, interview, and literature study. The tools used are Microsoft Visual Basic .NET as an application in interface design and Microsoft Office Access as a DBMS. The test results of this application are the systems that are built already meet the needs, the input data process has met the needs and the resulting report has met the needs.Keywords:Information Systems, Filing, Documents, Visual Basic.NET


2020 ◽  
Vol 17 (1) ◽  
pp. 206-215
Author(s):  
Geovanni Brito ◽  
Franklin W. Salazar ◽  
Edwin O. Lema ◽  
Andrea P. Sánchez ◽  
Hugo Vinicio Pérez ◽  
...  

This paper presents the implementation of a prototype to lock/unlock the vehicle ignition system. It involves the adaptation of an opto-isolated relay, which has been equipped with a wireless interface of the MQTT protocol. The relay activation is controlled by an embedded board Raspberry Pi 3; it acts as the main unit of the proposed system. The executed control actions are given depending on the information received by radiofrequency from an implemented electronic breathalyzer. This device evaluates the alcohol level and humidity in the driver’s breath using the MQ-3 and DHT11 sensors. In addition, a mobile communication platform compatible with Android smartphones is provided to inform the enabling/disabling of the vehicle’s ignition system, its geographical location by GPS coordinates and a front facial photograph of the driver. All these features are incorporated by a wireless local network (WiFi) for the elements that make up the prototype. This work also presents the transmission of information to mobile terminals compatible with the Telegram instant messaging system through the UMTS network. In order to validate this proposal, the corresponding tests are carried out and their comparison with a commercial device.


2021 ◽  
Vol 4 (2) ◽  
pp. 23
Author(s):  
Danny Zea ◽  

The research analyzes the behavior and performance of a control law that has been validated in a previous study in a 3D simulation program. Now, it will be evaluated in a Mazda 6 vehicle with the objective of driving along a previously designed trajectory. This is possible thanks to the use of a GPS sensor as well as additional sensors that allow to know the direct kinematics of the vehicle at each instant of time. Experimental tests were carried out with the use of a Raspberry pi 3 b+ which is responsible for receiving the information from the sensors and then processed this information so that the control law allows sending the control actions to the actuators. Finally, the results are presented in order to be used for future research that will allow the implementation of a fully autonomous driving system.


2020 ◽  
pp. 1-12
Author(s):  
Wu Xin ◽  
Qiu Daping

The inheritance and innovation of ancient architecture decoration art is an important way for the development of the construction industry. The data process of traditional ancient architecture decoration art is relatively backward, which leads to the obvious distortion of the digitalization of ancient architecture decoration art. In order to improve the digital effect of ancient architecture decoration art, based on neural network, this paper combines the image features to construct a neural network-based ancient architecture decoration art data system model, and graphically expresses the static construction mode and dynamic construction process of the architecture group. Based on this, three-dimensional model reconstruction and scene simulation experiments of architecture groups are realized. In order to verify the performance effect of the system proposed in this paper, it is verified through simulation and performance testing, and data visualization is performed through statistical methods. The result of the study shows that the digitalization effect of the ancient architecture decoration art proposed in this paper is good.


2016 ◽  
Vol 41 ◽  
pp. 112-115
Author(s):  
>Domenico >Aringoli ◽  
Mattia Ippolito ◽  
Nicola Sciarra ◽  
Bernardino Gentili ◽  
Marco Materazzi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document