Explore chapters and articles related to this topic
Microprocessor Systems
Published in Dale R. Patrick, Stephen W. Fardo, Industrial Process Control Systems, 2021
Dale R. Patrick, Stephen W. Fardo
Practically all electronic digital systems in operation are of the binary type. This type of system has 2 as its base or radix. The largest digital value that can be expressed in a specific place by this system is the number 1. This means that only the numbers 0 and 1 are used in the binary system. Electronically, the value of 0 can be expressed as a very low voltage or no voltage. The number 1 can then be indicated by some voltage-value assignment larger than or more significant than 0. Binary systems that use this voltage-value assignment are described as having positive logic. Negative logic, by comparison, has voltage assigned to 0 and no voltage assigned to the number 1. In the discussion that follows, only positive logic will be used.
Natural Numbers
Published in Nita H. Shah, Vishnuprasad D. Thakkar, Journey from Natural Numbers to Complex Numbers, 2020
Nita H. Shah, Vishnuprasad D. Thakkar
For the representation of positive integers, the most popular system is position value–based system. In decimal system, the rightmost position has a multiplier of 1, next on left has a multiplier of 10, and so on. We have explained this representation with two concepts. One of the concepts is using counter like the odometer of vehicle/electricity consumption meter, and another concept is making bundles of 10 of the objects and repeating the process to make larger bundles. We can take any positive integer >1 as the base. Due to the ease of representation and addition operation, computers use a binary system. In the binary system, the number of digits are only 2, making it simple to represent electronically. Result of addition has result digit and carry. Result digit and carry can be represented using Boolean algebra, which can be relatively easily implemented in electronic circuits.
Digital Principles
Published in John Watkinson, The Art of Digital Video, 2013
There will be a fixed number of bits in a PCM (Pulse Code Modulation) video sample, and this number determines the size of the quantizing range. In the 8-bit samples used in much digital video equipment, there are 256 different numbers. Each number represents a different analog signal voltage, and care must be taken during conversion to ensure that the signal does not go outside the convertor range, or it will be clipped. In Figure 3.2a it can be seen that in an 8-bit pure binary system, the number range goes from 00hex, which represents the smallest voltage, through to FFhex, which represents the largest positive voltage. The video waveform must be accommodated within this voltage range, and Figure 3.2b shows how this can be done for a PAL composite signal. A luminance signal is shown in Figure 3.2c. As component digital systems handle only the active line, the quantizing range is optimized to suit the gamut of the unblanked luminance. There is a small offset to handle slightly misadjusted inputs.
A computer software developed for designing woven patterns and generating machine readable files for sampling looms
Published in The Journal of The Textile Institute, 2023
The process of generating machine readable file is presented in the flow diagram given in Figure 8. Firstly, the generated lifting plan in CAD phase of DNC.GARM.DOBBY WEAVING DESIGN is used to generate binary digits. In each row of the lifting plan there exists 24 squares representing each frame. The status of each square in a row defines the heald frame position (upper or lower) during each shed opening. A black square means that the heald frame is lifted and blank square means that the heald frame is lowered for shed opening. The base of the binary system is 2 so that only two digits (0 and 1) appear in a binary representation. In this way, binary numbers are generated row by row sequentially from lifting plan, by translating black squares to ones (1) and empty squares to zeros (0) in a row.
Analysis of cyber nuclear terrorism by DTrack consequences in the civilian nuclear power plant
Published in Journal of Nuclear Science and Technology, 2022
Kyung Bae Jang, Chang Hyun Baek, Tae Ho Woo
For the modeling of the analysis, the imaginations of the scenario are related to the data and attacking behaviors. Figure 1 shows the configurations for the cyber attacks on NPP where the encrypted data flow anywhere and could enter the NPPs for the purpose of the cyber terrorism. The data are processed in the binary system of number as 0 and 1, which are used in the current computer system. The cyber conflict is the unseen war among several bodies in the Internet world where the information is connected by the line connectivity. So, the physical damages are not shown easily. Hence, the detections and remedies are done slowly. Once the attack is done, the alarming to the public should be done fast and to take a proper procedure for secured situations. The major characteristics on cyber attack against NPPs are the potential radioactive hazards comparing to the conventional cyber terrorism. The horror part for radioactive material dispersion in the plant site or civilian area could be very overwhelming shocking to the public.