Design of a Tunnel Supervisory Controller using Synthesis-Based Engineering

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Downloads (Pure)

Abstract

Nowadays, each tunnel is equipped with a supervisory controller that ensures correct cooperation between the tunnel subsystems, such as lighting, ventilation, and emergency detection sensors. Practice has shown that traditional design methods require a lot of manual effort, which is error-prone, time consuming, and costly. Therefore, an alternative design method is explored. In this paper, three methods for designing a supervisory controller are discussed: traditional engineering, model-based engineering, and synthesis-based engineering. They are assessed based on three criteria, being the quality of the controller, the variability of the time-to-market, and the evolvability. The synthesis-based engineering method turns out to be the most appropriate design method. In a case study, a supervisory controller for a roadway tunnel in the Netherlands is designed using synthesis-based engineering and validated using simulation-based visualization. This case study shows that SBE is a suitable design method for designing a tunnel supervisory controller.
Original languageEnglish
Title of host publicationITA-AITES World Tunnel Congress, WTC2020 and 46th General Assembly, Proceedings
PublisherITA Library
Pages573-578
Number of pages7
Publication statusPublished - 11 Sept 2020
EventITA-AITES World Tunnel Congress (WTC 2020) - Online
Duration: 11 Sept 202017 Sept 2020

Conference

ConferenceITA-AITES World Tunnel Congress (WTC 2020)
Period11/09/2017/09/20
OtherITA-AITES World Tunnel Congress (WTC) 2020 and 46th General Assembly
The dates for congress and all associated events have been shifted from 15-21 May to 11-17 September 2020, due to the Corona Virus outbreak. (Orignal Congress Kuala Lumpur, Malasia)

Fingerprint

Dive into the research topics of 'Design of a Tunnel Supervisory Controller using Synthesis-Based Engineering'. Together they form a unique fingerprint.

Cite this