Case Study: Interrupt-less Servo Motor Controls for Pneumatic Pump in Safety Critical Devicess

Author(s):  
Sangsoo Park
2011 ◽  
Vol 121-126 ◽  
pp. 1636-1640
Author(s):  
Ying Qiu ◽  
Wei Min Li ◽  
Zhi Wei

Servo presses are widely used in high-precision, complicated forming process fields and promoted around the world in recent years. It is the trend of forging machinery for its servo motor-based digital heavy haul driven technology. At present, it becomes the hot research field. The structure characteristics of triangular elbow servo press were firstly introduced in the paper. And then the kinematics mathematical model of triangular elbow transmission mechanism was deduced and given. Based on it, this paper provides the slider kinematics analysis by Matlab. The slider motion law under various parameters can be analyzed and compared. The results would be useful reference for optimization design of transmission mechanism. The case study provides more visual and reliable decision basis for designer.


2022 ◽  
Vol 166 ◽  
pp. 108812
Author(s):  
Vinay Kumar ◽  
Kailash Chandra Mishra ◽  
Pooja Singh ◽  
Aditya Narayan Hati ◽  
Mohan Rao Mamdikar ◽  
...  

2021 ◽  
pp. 41-57
Author(s):  
Gregory Falco ◽  
Eric Rosenbach

The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case study about a cyberattack on Ukraine’s electric grid. It details risk assessment for three types of critical systems: mission-critical systems, business-critical systems, and safety-critical systems. It explains the three types of networks critical to many organizations: business and administrative networks, operational and service delivery networks, and communication networks. In outlining the “CIA triad,” it shows how cyber risk can be characterized as a confidentiality, integrity, or availability issue relating to digital assets. Further, it describes how to assess the importance of different digital assets and how to prioritize them using a business impact analysis (BIA). The chapter concludes with real-world Embedded Endurance strategy lessons Rosenbach gained in Saudi Arabia in the wake of one of the world’s most destructive cyberattacks.


2010 ◽  
Vol 38 (11) ◽  
pp. 1299-1316 ◽  
Author(s):  
D. Sinha Roy ◽  
Aditya Anil ◽  
D. K. Mohanta ◽  
A. K. Panda
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document