Computer support of machinery control system validation
نویسندگان
چکیده
منابع مشابه
Computer support for mechatronic control system design
This paper discusses the demands for proper computer aided control system design tools for mechatronic systems and identifies a number of tasks in this design process. It puts the contributions to the session in perspective and describes how the papers in this session (partly) contribute to a solution. Some issues not addressed in the session are discussed and the current state-of-the-art as pe...
متن کاملDevelopment of system decision support tools for behavioral trends monitoring of machinery maintenance in a competitive environment
The article is centred on software system development for manufacturing company that produces polyethylene bags using mostly conventional machines in a competitive world where each business enterprise desires to stand tall. This is meant to assist in gaining market shares, taking maintenance and production decisions by the dynamism and flexibilities embedded in the package as customers’ demand ...
متن کاملMachinery Control System using Autonomous Agents
Flexibility will be one of the key features in future manufacturing systems because the environments that surround manufacturing systems are rapidly changing from day to day. To satisfy this requirement, the hierarchical systems used in previous manufacturing systems are not enough because they cannot deal effectively with unexpected situations. Moreover, a lot of software modules have to be mo...
متن کاملProbabilistic Validation of Computer System Survivability
There is a growing need for systems whose survivability in a specified use and/or attack environment can be assured with confidence. Many techniques have been proposed to validate individual components (e.g., formal methods) or a system as a whole (e.g., red teaming). However, no single technique can provide the breadth of evidence needed to validate a system with respect to high-level survivab...
متن کاملComputer machinery and intelligence
The exploration of virtual machines has emulated erasure coding, and current trends suggest that the visualization of symmetric encryption will soon emerge. After years of robust research into RAID, we demonstrate the refinement of linked lists, which embodies the technical principles of noisy artificial intelligence. Our focus here is not on whether the famous low-energy algorithm for the emul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mechanik
سال: 2016
ISSN: 0025-6552
DOI: 10.17814/mechanik.2016.7.126