SlideShare a Scribd company logo
1 of 14
Computer Assisted Control and 
Automation
What is Automation? 
Automation or automatic control, is the use of various control 
systems for operating equipment such as 
 machinery, 
 processes in factories, 
 boilers and heat treating ovens, 
 switching in telephone networks, 
 steering and stabilization of ships &aircraft and other 
applications with minimal or reduced human intervention. 
Some processes have been completely automated. 
The biggest benefit of automation is that it saves labor, 
however, it is also used to save energy and materials and 
to improve quality, accuracy and precision.
How is Automation Achieved? 
Automation is achieved by various 
means including mechanical, 
hydraulic, pneumatic, electrical, 
electronic and computers, usually in 
combination. 
Complicated systems, such as 
modern factories, airplanes and ships 
typically use all these combined 
techniques.
Delhi Metro Automation 
Signalling and communications 
The trains use 
 centralised automatic train control (CATC) 
comprising 
 automatic train operation (ATO), 
 automatic train protection (ATP) and 
 automatic train signalling (ATS) systems. 
Intercoms are provided for emergency 
communication between the passengers and the 
driver in each coach, and on-train 
announcements are in Hindi and English.
Delhi Metro Automation 
There are also route maps and LCD display 
systems in every coach. 
Fare collection is through contactless, 
stored-value smartcards. 
Security is supported by about 5,200 CCTV 
cameras at stations. 
The electronic interlocking, operation and 
automation control systems for the third line 
are supplied by Siemens Transportation 
Systems
Digitally Controlled Car Engines 
Controlling the engine is the most processor-intensive 
job on your car, and the engine control unit(ECU) is 
the most powerful computer. 
The ECU uses closed-loop control, a control scheme 
that monitors outputs of a system to control the inputs 
to a system, managing the emissions and fuel economy 
of the engine (as well as a host of other parameters). 
Gathering data from dozens of different sensors, the 
ECU knows everything from the coolant temperature to 
the amount of oxygen in the exhaust on most cars.
With this data, it performs millions of 
calculations each second, including looking up 
values in tables, calculating the results of long 
equations to decide on the best spark 
timing and determining how long the fuel 
injector is open. 
The ECU does all of this to ensure the lowest 
emissions and best mileage. 
A modern ECU might contain a 32-bit, 40-MHz 
processor. 
The code in an average ECU takes up less 
than 1 megabyte(MB) of memory.
Digitally Controlled Car Engines 
The computer from a Ford Ranger 
The pins on this connecter 
interface with sensors and 
control devices all over the 
car.
Biometric access control 
Biometric access control is the science and technology 
of the business as it relates to analyzing biological data 
as a means to control access. 
Biometric access control features can measure various 
human characteristics like a person’s fingerprint, their 
eye retinas and irises, their vocal patterns, facial 
shapes and hand measurements. 
Biometric access control is very effective at promoting 
security within professional companies, as it would be 
anywhere from extremely difficult to impossible to fake a 
biological imprint.
RFID Access Control 
Radio-Frequency Identification (RFID) is the use of 
radio waves to read and capture information stored 
on a tag attached to an object. A tag can be read from 
up to several feet away and does not need to be 
within direct line-of-sight of the reader to be tracked. 
Most organizations today require a performing and 
efficient access control system. There are many 
reasons for having such a system and these include: 
1) Enhanced security to limit access to restricted 
areas, 
2) Tracking employee activity, 
3) Improve loss prevention and 
4) Compliance to higher internal or government 
regulated security measures
A Few Definitions
Open-source software 
Open-source software (OSS) 
is computer software with its source 
code made available with a license in 
which thecopyright holder provides the 
rights to study, change and distribute 
the software to anyone and for any 
purpose.
Open source hardware 
Hardware design (i.e. mechanical 
drawings, schematics, bills of 
material, PCB layout 
data, HDL source code and integrated 
circuit layout data), in addition to the 
software thatdrives the hardware, are 
all released with the OSH approach.
Open Source Storage 
Open source storage is the phrase 
used to describe any storage system 
based on open source platforms or 
technologies. 
Examples of open source storage 
software include The FreeNAS 
Project, OpenStack, Lustre, OpenAFS 
, andOpenfiler.

More Related Content

What's hot

Models of consumer behaviour
Models of consumer behaviourModels of consumer behaviour
Models of consumer behaviourVikram g b
 
A study on the impact of digital marketing
A study on the impact of digital marketingA study on the impact of digital marketing
A study on the impact of digital marketingSAIVIKRANTHDESHPANDE
 
STP: segmentation, targeting and positioning
STP: segmentation, targeting and positioningSTP: segmentation, targeting and positioning
STP: segmentation, targeting and positioningsavi maha
 
Marketing research application
Marketing research applicationMarketing research application
Marketing research applicationNaveen Sharma
 
Role of family in consumer decision making
Role of family in consumer decision makingRole of family in consumer decision making
Role of family in consumer decision makingVijay Bhaskaran
 
PRODUCTION SYSTEMS
PRODUCTION SYSTEMSPRODUCTION SYSTEMS
PRODUCTION SYSTEMSNaeem Akram
 
Advertising effectiveness
Advertising effectivenessAdvertising effectiveness
Advertising effectivenessAshu Chopra
 
DIGITAL MARKETING MBA NOTES
DIGITAL MARKETING MBA NOTESDIGITAL MARKETING MBA NOTES
DIGITAL MARKETING MBA NOTESMAHIN KARIEM
 
DEFINING THE MARKETING RESEARCH PROBLEM AND DEVELOPING AN APPROACH
DEFINING THE MARKETING RESEARCH PROBLEM AND DEVELOPING AN APPROACHDEFINING THE MARKETING RESEARCH PROBLEM AND DEVELOPING AN APPROACH
DEFINING THE MARKETING RESEARCH PROBLEM AND DEVELOPING AN APPROACHShashank Kapoor
 
Role of computers in sales and marketing scm & crm
Role of computers in sales and marketing scm & crmRole of computers in sales and marketing scm & crm
Role of computers in sales and marketing scm & crmShobitash Jamwal
 
Advertising, sales promotion
Advertising, sales promotionAdvertising, sales promotion
Advertising, sales promotionmailforyuva
 
Sales management
Sales managementSales management
Sales managementGurjit
 
Consumer behaviour
Consumer behaviourConsumer behaviour
Consumer behaviourkawther Ali
 
Evolution of Marketing 2.pptx
Evolution of Marketing 2.pptxEvolution of Marketing 2.pptx
Evolution of Marketing 2.pptxreshmakrishnan34
 
Nature and Scope of Managerial Economics
Nature and Scope of Managerial EconomicsNature and Scope of Managerial Economics
Nature and Scope of Managerial Economicsdvy92010
 

What's hot (20)

Models of consumer behaviour
Models of consumer behaviourModels of consumer behaviour
Models of consumer behaviour
 
A study on the impact of digital marketing
A study on the impact of digital marketingA study on the impact of digital marketing
A study on the impact of digital marketing
 
STP: segmentation, targeting and positioning
STP: segmentation, targeting and positioningSTP: segmentation, targeting and positioning
STP: segmentation, targeting and positioning
 
Marketing research application
Marketing research applicationMarketing research application
Marketing research application
 
Role of family in consumer decision making
Role of family in consumer decision makingRole of family in consumer decision making
Role of family in consumer decision making
 
e-commerce
e-commercee-commerce
e-commerce
 
PRODUCTION SYSTEMS
PRODUCTION SYSTEMSPRODUCTION SYSTEMS
PRODUCTION SYSTEMS
 
Advertising effectiveness
Advertising effectivenessAdvertising effectiveness
Advertising effectiveness
 
Ethics in Marketing
Ethics in MarketingEthics in Marketing
Ethics in Marketing
 
DIGITAL MARKETING MBA NOTES
DIGITAL MARKETING MBA NOTESDIGITAL MARKETING MBA NOTES
DIGITAL MARKETING MBA NOTES
 
DEFINING THE MARKETING RESEARCH PROBLEM AND DEVELOPING AN APPROACH
DEFINING THE MARKETING RESEARCH PROBLEM AND DEVELOPING AN APPROACHDEFINING THE MARKETING RESEARCH PROBLEM AND DEVELOPING AN APPROACH
DEFINING THE MARKETING RESEARCH PROBLEM AND DEVELOPING AN APPROACH
 
Role of computers in sales and marketing scm & crm
Role of computers in sales and marketing scm & crmRole of computers in sales and marketing scm & crm
Role of computers in sales and marketing scm & crm
 
Marketing ppt
Marketing pptMarketing ppt
Marketing ppt
 
Advertising, sales promotion
Advertising, sales promotionAdvertising, sales promotion
Advertising, sales promotion
 
Technology management
Technology managementTechnology management
Technology management
 
Sales management
Sales managementSales management
Sales management
 
Consumer behaviour
Consumer behaviourConsumer behaviour
Consumer behaviour
 
Evolution of Marketing 2.pptx
Evolution of Marketing 2.pptxEvolution of Marketing 2.pptx
Evolution of Marketing 2.pptx
 
PHONEPE.pptx
PHONEPE.pptxPHONEPE.pptx
PHONEPE.pptx
 
Nature and Scope of Managerial Economics
Nature and Scope of Managerial EconomicsNature and Scope of Managerial Economics
Nature and Scope of Managerial Economics
 

Viewers also liked

Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
 
Automation
AutomationAutomation
AutomationMphasis
 
Automation and Computer Engineering
Automation and Computer EngineeringAutomation and Computer Engineering
Automation and Computer EngineeringVisionary_
 
Application of Automation in different sectors
Application of Automation in different sectorsApplication of Automation in different sectors
Application of Automation in different sectorsGouthamarajan NT
 
amit chauhan apt presentation
amit chauhan   apt presentationamit chauhan   apt presentation
amit chauhan apt presentationAkash Maurya
 
Robotics an Automation 1
Robotics an Automation 1Robotics an Automation 1
Robotics an Automation 1Afraz Rajiwate
 
Application of it in engineering
Application of it in engineeringApplication of it in engineering
Application of it in engineeringSanjayktm
 
Application of IT in engineering
Application of IT in engineeringApplication of IT in engineering
Application of IT in engineeringSuman Shrestha
 
Introduction to Reverse Engineering
Introduction to Reverse EngineeringIntroduction to Reverse Engineering
Introduction to Reverse EngineeringGopinath Chintala
 
Reverse engineering
Reverse  engineeringReverse  engineering
Reverse engineeringYuffie Valen
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineeringSaswat Padhi
 
APPLICATION OF MATHEMATICS IN ENGINEERING FIELDS
APPLICATION OF MATHEMATICS IN ENGINEERING FIELDSAPPLICATION OF MATHEMATICS IN ENGINEERING FIELDS
APPLICATION OF MATHEMATICS IN ENGINEERING FIELDSDMANIMALA
 
Reverse Engineering
Reverse EngineeringReverse Engineering
Reverse Engineeringdswanson
 
automation slides,plc,scada,HMI
automation slides,plc,scada,HMIautomation slides,plc,scada,HMI
automation slides,plc,scada,HMIBOSCH
 
Reverse engineering & its application
Reverse engineering & its applicationReverse engineering & its application
Reverse engineering & its applicationmapqrs
 
Software project-scheduling
Software project-schedulingSoftware project-scheduling
Software project-schedulingsaurabhshertukde
 
INDUSTRIAL AUTOMATION USING PLC
INDUSTRIAL AUTOMATION USING PLCINDUSTRIAL AUTOMATION USING PLC
INDUSTRIAL AUTOMATION USING PLCMehvish Mushtaq
 

Viewers also liked (20)

Apt programming
Apt programmingApt programming
Apt programming
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Automation
AutomationAutomation
Automation
 
Automation and Computer Engineering
Automation and Computer EngineeringAutomation and Computer Engineering
Automation and Computer Engineering
 
Application of Automation in different sectors
Application of Automation in different sectorsApplication of Automation in different sectors
Application of Automation in different sectors
 
amit chauhan apt presentation
amit chauhan   apt presentationamit chauhan   apt presentation
amit chauhan apt presentation
 
Robotics an Automation 1
Robotics an Automation 1Robotics an Automation 1
Robotics an Automation 1
 
Application of it in engineering
Application of it in engineeringApplication of it in engineering
Application of it in engineering
 
Logistics automation
Logistics automationLogistics automation
Logistics automation
 
Application of IT in engineering
Application of IT in engineeringApplication of IT in engineering
Application of IT in engineering
 
Introduction to Reverse Engineering
Introduction to Reverse EngineeringIntroduction to Reverse Engineering
Introduction to Reverse Engineering
 
Reverse engineering
Reverse  engineeringReverse  engineering
Reverse engineering
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
 
APPLICATION OF MATHEMATICS IN ENGINEERING FIELDS
APPLICATION OF MATHEMATICS IN ENGINEERING FIELDSAPPLICATION OF MATHEMATICS IN ENGINEERING FIELDS
APPLICATION OF MATHEMATICS IN ENGINEERING FIELDS
 
Reverse Engineering
Reverse EngineeringReverse Engineering
Reverse Engineering
 
automation slides,plc,scada,HMI
automation slides,plc,scada,HMIautomation slides,plc,scada,HMI
automation slides,plc,scada,HMI
 
Reverse engineering & its application
Reverse engineering & its applicationReverse engineering & its application
Reverse engineering & its application
 
Software project-scheduling
Software project-schedulingSoftware project-scheduling
Software project-scheduling
 
INDUSTRIAL AUTOMATION USING PLC
INDUSTRIAL AUTOMATION USING PLCINDUSTRIAL AUTOMATION USING PLC
INDUSTRIAL AUTOMATION USING PLC
 
ppt on PLC
ppt on PLCppt on PLC
ppt on PLC
 

Similar to 4 computer assisted control and automation

Case Study of Embedded Systems
Case Study of Embedded SystemsCase Study of Embedded Systems
Case Study of Embedded Systemsanand hd
 
Intelligent Traffic Light control using Embedded Systems
Intelligent Traffic Light control using Embedded SystemsIntelligent Traffic Light control using Embedded Systems
Intelligent Traffic Light control using Embedded SystemsSrijan Singh
 
Automation
AutomationAutomation
AutomationMphasis
 
Automatic Free Parking Slot Status Intimating System
Automatic Free Parking Slot Status Intimating SystemAutomatic Free Parking Slot Status Intimating System
Automatic Free Parking Slot Status Intimating SystemIRJET Journal
 
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...cscpconf
 
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDSAutomotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDSIOSR Journals
 
Chapter 6 computer and controls systems within manufacturing
Chapter 6   computer and controls systems within manufacturingChapter 6   computer and controls systems within manufacturing
Chapter 6 computer and controls systems within manufacturingN. A. Sutisna
 
Embedded system in_automobiles_seminar_report_1234
Embedded system in_automobiles_seminar_report_1234Embedded system in_automobiles_seminar_report_1234
Embedded system in_automobiles_seminar_report_1234Ganesh Bv
 
WIZTECH –BEST EMBEDDED.pptx
WIZTECH –BEST EMBEDDED.pptxWIZTECH –BEST EMBEDDED.pptx
WIZTECH –BEST EMBEDDED.pptxdeepakkumar954581
 
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...IJTET Journal
 
Simulation and Implementation of PLC Based for Detecting Burned Potato Chips ...
Simulation and Implementation of PLC Based for Detecting Burned Potato Chips ...Simulation and Implementation of PLC Based for Detecting Burned Potato Chips ...
Simulation and Implementation of PLC Based for Detecting Burned Potato Chips ...ijtsrd
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonIOSR Journals
 
Fingerprintattendancesystem 131016052949-phpapp01
Fingerprintattendancesystem 131016052949-phpapp01Fingerprintattendancesystem 131016052949-phpapp01
Fingerprintattendancesystem 131016052949-phpapp01Muhammad Tahir Mehmood
 

Similar to 4 computer assisted control and automation (20)

Case Study of Embedded Systems
Case Study of Embedded SystemsCase Study of Embedded Systems
Case Study of Embedded Systems
 
What is Telematics & How Does It Work?
What is Telematics & How Does It Work?What is Telematics & How Does It Work?
What is Telematics & How Does It Work?
 
Intelligent Traffic Light control using Embedded Systems
Intelligent Traffic Light control using Embedded SystemsIntelligent Traffic Light control using Embedded Systems
Intelligent Traffic Light control using Embedded Systems
 
EMBEDDED SYSTEMS
EMBEDDED SYSTEMSEMBEDDED SYSTEMS
EMBEDDED SYSTEMS
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Automation
AutomationAutomation
Automation
 
Instrumentation (1)
Instrumentation (1)Instrumentation (1)
Instrumentation (1)
 
Automatic Free Parking Slot Status Intimating System
Automatic Free Parking Slot Status Intimating SystemAutomatic Free Parking Slot Status Intimating System
Automatic Free Parking Slot Status Intimating System
 
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
DEPLOYING HEALTH MONITORING ECU TOWARDS ENHANCING THE PERFORMANCE OF IN-VEHIC...
 
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDSAutomotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
Automotive Diagnostics Communication Protocols AnalysisKWP2000, CAN, and UDS
 
D010112031
D010112031D010112031
D010112031
 
Chapter 6 computer and controls systems within manufacturing
Chapter 6   computer and controls systems within manufacturingChapter 6   computer and controls systems within manufacturing
Chapter 6 computer and controls systems within manufacturing
 
Embedded system in_automobiles_seminar_report_1234
Embedded system in_automobiles_seminar_report_1234Embedded system in_automobiles_seminar_report_1234
Embedded system in_automobiles_seminar_report_1234
 
WIZTECH –BEST EMBEDDED.pptx
WIZTECH –BEST EMBEDDED.pptxWIZTECH –BEST EMBEDDED.pptx
WIZTECH –BEST EMBEDDED.pptx
 
INTRODUCTION TO INDUSTRIAL AUTOMATION RR
INTRODUCTION TO INDUSTRIAL AUTOMATION RRINTRODUCTION TO INDUSTRIAL AUTOMATION RR
INTRODUCTION TO INDUSTRIAL AUTOMATION RR
 
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
 
Simulation and Implementation of PLC Based for Detecting Burned Potato Chips ...
Simulation and Implementation of PLC Based for Detecting Burned Potato Chips ...Simulation and Implementation of PLC Based for Detecting Burned Potato Chips ...
Simulation and Implementation of PLC Based for Detecting Burned Potato Chips ...
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
Bluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using PythonBluetooth Based Automatic Hotel Service System Using Python
Bluetooth Based Automatic Hotel Service System Using Python
 
Fingerprintattendancesystem 131016052949-phpapp01
Fingerprintattendancesystem 131016052949-phpapp01Fingerprintattendancesystem 131016052949-phpapp01
Fingerprintattendancesystem 131016052949-phpapp01
 

More from Nymphea Saraf

12 internet in businesses
12 internet in businesses12 internet in businesses
12 internet in businessesNymphea Saraf
 
7 data warehouse & marts
7 data warehouse & marts7 data warehouse & marts
7 data warehouse & martsNymphea Saraf
 
6 sql query handling
6 sql query handling6 sql query handling
6 sql query handlingNymphea Saraf
 
5 data resource management
5 data resource management5 data resource management
5 data resource managementNymphea Saraf
 
3 input, output and storage technologies
3  input, output and storage technologies3  input, output and storage technologies
3 input, output and storage technologiesNymphea Saraf
 
2 evolution of computer systems
2 evolution of computer systems2 evolution of computer systems
2 evolution of computer systemsNymphea Saraf
 

More from Nymphea Saraf (8)

12 internet in businesses
12 internet in businesses12 internet in businesses
12 internet in businesses
 
11 web 2.0 and 3.0
11 web 2.0 and 3.011 web 2.0 and 3.0
11 web 2.0 and 3.0
 
7 data warehouse & marts
7 data warehouse & marts7 data warehouse & marts
7 data warehouse & marts
 
6 sql query handling
6 sql query handling6 sql query handling
6 sql query handling
 
5 data resource management
5 data resource management5 data resource management
5 data resource management
 
3 input, output and storage technologies
3  input, output and storage technologies3  input, output and storage technologies
3 input, output and storage technologies
 
2 evolution of computer systems
2 evolution of computer systems2 evolution of computer systems
2 evolution of computer systems
 
1 introduction
1  introduction1  introduction
1 introduction
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

4 computer assisted control and automation

  • 1. Computer Assisted Control and Automation
  • 2. What is Automation? Automation or automatic control, is the use of various control systems for operating equipment such as  machinery,  processes in factories,  boilers and heat treating ovens,  switching in telephone networks,  steering and stabilization of ships &aircraft and other applications with minimal or reduced human intervention. Some processes have been completely automated. The biggest benefit of automation is that it saves labor, however, it is also used to save energy and materials and to improve quality, accuracy and precision.
  • 3. How is Automation Achieved? Automation is achieved by various means including mechanical, hydraulic, pneumatic, electrical, electronic and computers, usually in combination. Complicated systems, such as modern factories, airplanes and ships typically use all these combined techniques.
  • 4. Delhi Metro Automation Signalling and communications The trains use  centralised automatic train control (CATC) comprising  automatic train operation (ATO),  automatic train protection (ATP) and  automatic train signalling (ATS) systems. Intercoms are provided for emergency communication between the passengers and the driver in each coach, and on-train announcements are in Hindi and English.
  • 5. Delhi Metro Automation There are also route maps and LCD display systems in every coach. Fare collection is through contactless, stored-value smartcards. Security is supported by about 5,200 CCTV cameras at stations. The electronic interlocking, operation and automation control systems for the third line are supplied by Siemens Transportation Systems
  • 6. Digitally Controlled Car Engines Controlling the engine is the most processor-intensive job on your car, and the engine control unit(ECU) is the most powerful computer. The ECU uses closed-loop control, a control scheme that monitors outputs of a system to control the inputs to a system, managing the emissions and fuel economy of the engine (as well as a host of other parameters). Gathering data from dozens of different sensors, the ECU knows everything from the coolant temperature to the amount of oxygen in the exhaust on most cars.
  • 7. With this data, it performs millions of calculations each second, including looking up values in tables, calculating the results of long equations to decide on the best spark timing and determining how long the fuel injector is open. The ECU does all of this to ensure the lowest emissions and best mileage. A modern ECU might contain a 32-bit, 40-MHz processor. The code in an average ECU takes up less than 1 megabyte(MB) of memory.
  • 8. Digitally Controlled Car Engines The computer from a Ford Ranger The pins on this connecter interface with sensors and control devices all over the car.
  • 9. Biometric access control Biometric access control is the science and technology of the business as it relates to analyzing biological data as a means to control access. Biometric access control features can measure various human characteristics like a person’s fingerprint, their eye retinas and irises, their vocal patterns, facial shapes and hand measurements. Biometric access control is very effective at promoting security within professional companies, as it would be anywhere from extremely difficult to impossible to fake a biological imprint.
  • 10. RFID Access Control Radio-Frequency Identification (RFID) is the use of radio waves to read and capture information stored on a tag attached to an object. A tag can be read from up to several feet away and does not need to be within direct line-of-sight of the reader to be tracked. Most organizations today require a performing and efficient access control system. There are many reasons for having such a system and these include: 1) Enhanced security to limit access to restricted areas, 2) Tracking employee activity, 3) Improve loss prevention and 4) Compliance to higher internal or government regulated security measures
  • 12. Open-source software Open-source software (OSS) is computer software with its source code made available with a license in which thecopyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.
  • 13. Open source hardware Hardware design (i.e. mechanical drawings, schematics, bills of material, PCB layout data, HDL source code and integrated circuit layout data), in addition to the software thatdrives the hardware, are all released with the OSH approach.
  • 14. Open Source Storage Open source storage is the phrase used to describe any storage system based on open source platforms or technologies. Examples of open source storage software include The FreeNAS Project, OpenStack, Lustre, OpenAFS , andOpenfiler.