TOSHIBA SYSTEM TECHNOLOGY CORPORATION

Menu

HOME > Technology > Technical Elements

Technical Elements

We possess various technologies spanning
the three technical fields of ICT, control and electricity
which support the social infrastructure.

Monitoring

We monitor the condition of the equipment, display appropriate information in real time, and carry out plant surveillance to realize safety and peace of mind.
In addition, we can perform simple remote surveillance using a tablet according to the particular kind of operation.


Monitoring

Monitoring


Visualization of Operations

We carry out visualization of the various kinds of operation information, including operation of the equipment, the situation concerning energy use, and the progress of production, aiming at increasing the operating efficiency. We obtain a grasp of the production situation, carry out operation analyses utilizing performance data, and control the parts replacement time and the fault history, in order to support production.

Visualization of Operations

Visualization of Operations


Sequence Control

We construct the functions of various kinds of equipment by using logical circuits such as sequential circuits and interlocks, in order to realize automatic control.
We support installation according to the facilities, from electric power control equipment to single function controllers.

Sequence Control

Sequence Control


Demand Control

We monitor generated quantities such as the quantity of electric power, in real time, and carry out control in order to prevent the specified target values from being exceeded.
We can also predict generated quantities, and provide advance notification by means of an alarm or a display.

Demand Control

Demand Control


Access Control

For each user, we determine the restrictions to place on the resources, carry out authorization, grant permission, and carry out monitoring, in order to limit unauthorized access.
Access is restricted using a combination of biometric authentication based on data obtained from the face, voice, fingerprints and veins, encryption of data, and so on.

Access Control

Access Control


Utilization of Sensor Information

We collect data concerning various sensors which match the target application, in order to realize integrated monitoring and control.
This covers various systems ranging from small scale systems employing board computers to large scale systems employing wireless networks.


Utilization of Sensor Information

Utilization of Sensor Information


Power System Analysis

We provide support for stable system operation by means of power flow calculations and analyses of fault phenomena.
We can also do this by calculation using a symmetrical coordinate method or by transient phenomenon analysis using a power system analysis program.

Power System Analysis

Power System Analysis


Quakeproof Structure Design

We carry out quakeproof design of panels and racks in conformity with the quakeproof class criteria.
We use 3-dimensional CAD to carry out analysis and design for suppressing natural vibration.


Quakeproof Structure Design

Quakeproof Structure Design


Programming

We use the optimum programming language that matches the application concerned, in order to install the necessary functions for constructing a system.
We possess a vast amount of experience ranging from built-in type C language to WEB app development language.



Programming

Programming

Database

We utilize a database management system that matches the scale of the system and also the system environment, in order to construct the optimum DB.
We can meet the required specifications of the system, from Oracle and MySQL which are intended for large-scale use, to lightweight RDBMS which are intended for medium to small scale applications and also high-speed DB which use a memory.

Database

Database

To Top