Software and hardware configuration for steer by wire using rack-pinion system with ECU integration

Author(s):  
Noor Hafizah Amer ◽  
Abdurahman Dwijotomo ◽  
Khisbullah Hudha
2011 ◽  
Vol 130-134 ◽  
pp. 2589-2593
Author(s):  
Jia Zhi Li ◽  
Jia Wang ◽  
Zhi Tan ◽  
Lei Zhang

This paper analyzes the structure of Building Automatic System and introduces software and hardware configuration and network configuration of the system. Then the authors list two kinds of reliability analysis methods and describe their features. Based on the characteristics and the control level of station BAS, finally, we achieve reliability analysis, which has scientificity, rationality and practicability, and can be helpful for guiding the maintenance, design, and further perfect of BAS system.


2012 ◽  
Vol 220-223 ◽  
pp. 714-718
Author(s):  
Da Bin Hu ◽  
Jin Hui Hu ◽  
Xiong Wei Lin

Aiming at the characteristic of power system of modern ship, the components, software and hardware configuration, main function and feature of power system simulators are presented. Then the framework, simulation software and development of modeling technology are analyzed. At last, the improvement of instructor station and the application of VR technology for marine engine simulation are raised.


2021 ◽  
Vol 279 ◽  
pp. 01024
Author(s):  
Wisam Al-Tibbi

The features of configuring software and hardware of modern data acquisition systems as part of a digital substation to comply with the international standard IEC 61850 are considered. Given recommendations for energy efficient software and hardware configuration for 110 kV, 6-35 kV and 0.4 kV power consumption level which allow you to increase the reliability of the system by 1.5-2 times.


Author(s):  
Marek Vagas ◽  
Alena Galajdova

The article deals with process monitoring in an automated workplace from the company FESTO using RFID technology. It contains a detailed software and hardware configuration and the programming of the RFID read head (BALLUFF) in the Siemens software environment (TIA Portal). Furthermore, the article aims to point out the possibilities of processing data obtained in such a form. Another activity is the ongoing evaluation of these data and their projection into a graphical format (e.g., trend graphs).


2020 ◽  
Vol 8 (6) ◽  
pp. 1283-1290

In past few decades, manufacturing industry has been trying to achieve the high quality customized products in the flexible batches. Moreover due to the dynamic demand of market, the product lifecycle and flexibility is one of the major concern and Reconfiguration Manufacturing System is one of the discovery that matches these criteria such as flexibility, reliability and others, the main advantage of RMS is its adoptability to cope up with change in software and hardware configuration for adjusting the promptly. Hence in this paper we have proposed a optimized RMS , the main objective is to reduce the cost of the configuration through task scheduling, we propose Evolutionary algorithm based approach for configuration, moreover here we find the optimal solution through utilizing the machine over the operation set for each machine part, later we find the optimal from the probable assignment. In order to evaluate the algorithm we have performed the case study, a case study shows that Evolutionary algorithm based approach achieves the optimum solution when compared to the existing.


2021 ◽  
Vol 18 (15) ◽  
Author(s):  
Meher Gayatri Devi TIWARI ◽  
Anil Kumar KAKELLI

The development of a secure online voting system using visual cryptography is highly essential for present voting systems. Based on the current requirements and design aspects of an existing online voting system, emerging technologies are required in online voting schemes, and these are examined in this work. The emerging cryptographic techniques which are suitable for secure online voting systems are analyzed. Techniques like password hashed-based schemes, visual cryptography, and threshold decryption cryptosystem are highlighted for secure online voting systems. Visual cryptography (VC) is a technique where visual information can be encrypted on the user side, with the information decrypted on the admin side, which can be helpful in allowing participation in voting systems securely and ensuring fast vote counting and monitoring of the voting process to achieve high accuracy while being scam-free. The proposed secure online voting system using visual cryptography is efficiently developed using Python and achieves better performance on minimum software and hardware configuration systems.


Author(s):  
J. M. Paque ◽  
R. Browning ◽  
P. L. King ◽  
P. Pianetta

Geological samples typically contain many minerals (phases) with multiple element compositions. A complete analytical description should give the number of phases present, the volume occupied by each phase in the bulk sample, the average and range of composition of each phase, and the bulk composition of the sample. A practical approach to providing such a complete description is from quantitative analysis of multi-elemental x-ray images.With the advances in recent years in the speed and storage capabilities of laboratory computers, large quantities of data can be efficiently manipulated. Commercial software and hardware presently available allow simultaneous collection of multiple x-ray images from a sample (up to 16 for the Kevex Delta system). Thus, high resolution x-ray images of the majority of the detectable elements in a sample can be collected. The use of statistical techniques, including principal component analysis (PCA), can provide insight into mineral phase composition and the distribution of minerals within a sample.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2020 ◽  
pp. 43-50
Author(s):  
Yauheniya N. Saukova

It is shown that the issues of metrological traceability for extended self-luminous objects with a wide range of brightness have not yet been resolved, since the rank scales of embedded systems are used for processing digital images. For such scales, there is no “fixed” unit, which does not allow you to get reliable results and ensure the unity of measurements. An experiment is described to evaluate the accuracy of determining the intensity (coordinates) of the color of self-luminous objects. In terms of repeatability and intermediate precision compared to the reference measurement method, the color and chromaticity coordinates of self-luminous objects (reference samples) were determined by their multiple digital registration using technical vision systems. The possibilities of the developed methodology for colorimetric studies in hardware and software environments from the point of view of constructing a multidimensional conditional scale are determined.


Sign in / Sign up

Export Citation Format

Share Document