Sample records for acquisition scada system

  1. An Encryption Scheme for Communication Internet SCADA Components

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  2. Evaluating Information Assurance Control Effectiveness on an Air Force Supervisory Control and Data Acquisition (SCADA) System

    DTIC Science & Technology

    2011-03-01

    Byres, E. J., Lowe, J. (2004). The Myths and facts behind cyber security risks for industrial control systems . Berlin, Germany: VDE 2004 Congress...ACQUISITION (SCADA) SYSTEM THESIS Jason R. Nielsen, Major, USAF AFIT/GCO/ENG/11-10 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE...DATA ACQUISITION (SCADA) SYSTEM THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of

  3. Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure

    ERIC Educational Resources Information Center

    Morsey, Christopher

    2017-01-01

    In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…

  4. Supervisory Control and Data Acquisition System | Energy Systems

    Science.gov Websites

    Integration Facility | NREL Supervisory Control and Data Acquisition System Supervisory Control supervisory control and data acquisition (SCADA) system monitors and controls safety systems and gathers real Energy Systems Integration Facility control room. The Energy Systems Integration Facility's SCADA system

  5. Review of Supervisory Control and Data Acquisition (SCADA) Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Reva Nickelson; Briam Johnson; Ken Barnes

    2004-01-01

    A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

  6. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  7. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-criticalmore » monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).« less

  8. Wind Power Plant SCADA and Controls

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badrzadeh, Babak; Castillo, Nestor; Bradt, M.

    2011-01-01

    Modern Wind Power Plants (WPPs) contain a variety of intelligent electronic devices (IEDs), Supervisory Control and Data Acquisition (SCADA) and communication systems. This paper discusses the issues related to a typical WPP's SCADA and Control. Presentation topics are: (1) Wind Turbine Controls; (2) Wind Plant SCADA, OEM SCADA Solutions, Third-Party SCADA Solutions; (3) Wind Plant Control; and (4) Security and Reliability Compliance.

  9. Supervisory Control and Data Acquisition (SCADA) Security Awareness In a Resource Constrained Learning Environment

    DTIC Science & Technology

    2014-06-16

    SCADA systems. These professionals should be aware of the vulnerabilities so they can take intelligent precautions to mitigate attacks. SCADA...vulnerabilities • Describe mitigation options for protecting a system from SCADA attacks For students that go on to pursue a degree in Computer...from SCADA attacks For students who do not remain in the IT realm, this introduction provides an awareness to help them mitigate threats for their

  10. Study on the Future Internet System through Analysis of SCADA Systems

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Jung, Sungmo; Kim, Seoksoo

    Research on the future Internet is focused on establishing standards by solving problems through various projects and accepting various requirements. In this study, the SCADA (Supervisory Control And Data Acquisition) environment, closely related with national infrastructure, is analyzed in order to explore requirements of the future Internet and then those of the SCADA network. Also, this study provides SCADA system environments for the future Internet.

  11. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  12. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  13. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  14. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  15. Mobile phone based SCADA for industrial automation.

    PubMed

    Ozdemir, Engin; Karacor, Mevlut

    2006-01-01

    SCADA is the acronym for "Supervisory Control And Data Acquisition." SCADA systems are widely used in industry for supervisory control and data acquisition of industrial processes. Conventional SCADA systems use PC, notebook, thin client, and PDA as a client. In this paper, a Java-enabled mobile phone has been used as a client in a sample SCADA application in order to display and supervise the position of a sample prototype crane. The paper presents an actual implementation of the on-line controlling of the prototype crane via mobile phone. The wireless communication between the mobile phone and the SCADA server is performed by means of a base station via general packet radio service (GPRS) and wireless application protocol (WAP). Test results have indicated that the mobile phone based SCADA integration using the GPRS or WAP transfer scheme could enhance the performance of the crane in a day without causing an increase in the response times of SCADA functions. The operator can visualize and modify the plant parameters using his mobile phone, without reaching the site. In this way maintenance costs are reduced and productivity is increased.

  16. An Architecture for SCADA Network Forensics

    NASA Astrophysics Data System (ADS)

    Kilpatrick, Tim; Gonzalez, Jesus; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet

    Supervisory control and data acquisition (SCADA) systems are widely used in industrial control and automation. Modern SCADA protocols often employ TCP/IP to transport sensor data and control signals. Meanwhile, corporate IT infrastructures are interconnecting with previously isolated SCADA networks. The use of TCP/IP as a carrier protocol and the interconnection of IT and SCADA networks raise serious security issues. This paper describes an architecture for SCADA network forensics. In addition to supporting forensic investigations of SCADA network incidents, the architecture incorporates mechanisms for monitoring process behavior, analyzing trends and optimizing plant performance.

  17. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  18. Cybersecurity of Critical Control Networks

    DTIC Science & Technology

    2015-07-14

    project are included below. The tasks include work in link encryption for existing legacy SCADA equipment, where we continue to develop lightweight...language for authoring and monitoring compliance of SCADA systems, including technologies for a “policy monitor” which reports out on any observance issues...Acquisition ( SCADA ). Details of each project are included below. The tasks include work in link encryption for existing legacy SCADA equipment

  19. Drainpipe network management information system design based on GIS and SCADA technique

    NASA Astrophysics Data System (ADS)

    Gu, Ze-Yu; Zhao, De-An

    2011-02-01

    Achieving urban drainpipe network integration of geographical information system (GIS) and supervisory control and data acquisition (SCADA) technology is described in this paper. The system design's plans are put forward, which have realized GIS and SCADA system supplementary in the technology and strengthened the model visible analysis ability. It is verified by practical cases that the system has more practical values and a good prospect.

  20. SCADA OPERATOR TRAINING TOOL APPLIED TO THE CENTRAL ARIZONA IRRIGATION AND DRAINAGE DISTRICT

    USDA-ARS?s Scientific Manuscript database

    Many irrigation districts use Supervisory Control and Data Acquisition (SCADA) software to manage their canal systems. Whether homegrown or commercial, these programs require a significant amount of training for new operators. While some SCADA operators are hired with extensive field experience, o...

  1. Codifying Information Assurance Controls for Department of Defense (DoD) Supervisory Control and Data Acquisition (SCADA) Systems

    DTIC Science & Technology

    2010-03-01

    CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF DEFENSE (DOD) SUPERVISORY CONTROL AND DATA...Force, Department of Defense, or the U.S. Government. AFIT/GCO/ENG/10-13 CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF...DEFENSE (DOD) SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) SYSTEMS THESIS Presented to the Faculty Department of Electrical and Computer

  2. Production Facility SCADA Design Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dale, Gregory E.; Holloway, Michael Andrew; Baily, Scott A.

    2015-03-23

    The following report covers FY 14 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production facility. The goal of this effort is to provide Northstar with a baseline system design.

  3. Communication Security for Control Systems in Smart Grid

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  4. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies tomore » SCADA systems; our metric is a specialization of the generic measure of mean failure cost.« less

  5. Using Physical Models for Anomaly Detection in Control Systems

    NASA Astrophysics Data System (ADS)

    Svendsen, Nils; Wolthusen, Stephen

    Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA environments that make subversion detection impractical; and by sensor noise and feedback characteristics that degrade conventional anomaly detection systems. Moreover, potential attack mechanisms are ill-defined and may include both physical and logical aspects.

  6. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  7. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting maliciousmore » activity.« less

  8. Applying New Network Security Technologies to SCADA Systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators.more » 4This page intentionally left blank.« less

  9. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    NASA Astrophysics Data System (ADS)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  10. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  11. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  12. Using State Estimation Residuals to Detect Abnormal SCADA Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Jian; Chen, Yousu; Huang, Zhenyu

    2010-04-30

    Detection of abnormal supervisory control and data acquisition (SCADA) data is critically important for safe and secure operation of modern power systems. In this paper, a methodology of abnormal SCADA data detection based on state estimation residuals is presented. Preceded with a brief overview of outlier detection methods and bad SCADA data detection for state estimation, the framework of the proposed methodology is described. Instead of using original SCADA measurements as the bad data sources, the residuals calculated based on the results of the state estimator are used as the input for the outlier detection algorithm. The BACON algorithm ismore » applied to the outlier detection task. The IEEE 118-bus system is used as a test base to evaluate the effectiveness of the proposed methodology. The accuracy of the BACON method is compared with that of the 3-σ method for the simulated SCADA measurements and residuals.« less

  13. Development of a novel SCADA system for laboratory testing.

    PubMed

    Patel, M; Cole, G R; Pryor, T L; Wilmot, N A

    2004-07-01

    This document summarizes the supervisory control and data acquisition (SCADA) system that allows communication with, and controlling the output of, various I/O devices in the renewable energy systems and components test facility RESLab. This SCADA system differs from traditional SCADA systems in that it supports a continuously changing operating environment depending on the test to be performed. The SCADA System is based on the concept of having one Master I/O Server and multiple client computer systems. This paper describes the main features and advantages of this dynamic SCADA system, the connections of various field devices to the master I/O server, the device servers, and numerous software features used in the system. The system is based on the graphical programming language "LabVIEW" and its "Datalogging and Supervisory Control" (DSC) module. The DSC module supports a real-time database called the "tag engine," which performs the I/O operations with all field devices attached to the master I/O server and communications with the other tag engines running on the client computers connected via a local area network. Generic and detailed communication block diagrams illustrating the hierarchical structure of this SCADA system are presented. The flow diagram outlining a complete test performed using this system in one of its standard configurations is described.

  14. Application of an automation system and a supervisory control and data acquisition (SCADA) system for the optimal operation of a membrane adsorption hybrid system.

    PubMed

    Smith, P J; Vigneswaran, S; Ngo, H H; Nguyen, H T; Ben-Aim, R

    2006-01-01

    The application of automation and supervisory control and data acquisition (SCADA) systems to municipal water and wastewater treatment plants is rapidly increasing. However, the application of these systems is less frequent in the research and development phases of emerging treatment technologies used in these industries. This study involved the implementation of automation and a SCADA system to the submerged membrane adsorption hybrid system for use in a semi-pilot scale research project. An incremental approach was used in the development of the automation and SCADA systems, leading to the development of two new control systems. The first system developed involved closed loop control of the backwash initiation, based upon a pressure increase, leading to productivity improvements as the backwash is only activated when required, not at a fixed time. This system resulted in a 40% reduction in the number of backwashes required and also enabled optimised operations under unsteady concentrations of wastewater. The second system developed involved closed loop control of the backwash duration, whereby the backwash was terminated when the pressure reached a steady state. This system resulted in a reduction of the duration of the backwash of up to 25% and enabled optimised operations as the foulant build-up within the reactor increased.

  15. Security and SCADA protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

  16. Real-Time Monitoring of Scada Based Control System for Filling Process

    NASA Astrophysics Data System (ADS)

    Soe, Aung Kyaw; Myint, Aung Naing; Latt, Maung Maung; Theingi

    2008-10-01

    This paper is a design of real-time monitoring for filling system using Supervisory Control and Data Acquisition (SCADA). The monitoring of production process is described in real-time using Visual Basic.Net programming under Visual Studio 2005 software without SCADA software. The software integrators are programmed to get the required information for the configuration screens. Simulation of components is expressed on the computer screen using parallel port between computers and filling devices. The programs of real-time simulation for the filling process from the pure drinking water industry are provided.

  17. Design and Implementation of a Secure Modbus Protocol

    NASA Astrophysics Data System (ADS)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  18. Using State Estimation Residuals to Detect Abnormal SCADA Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Jian; Chen, Yousu; Huang, Zhenyu

    2010-06-14

    Detection of manipulated supervisory control and data acquisition (SCADA) data is critically important for the safe and secure operation of modern power systems. In this paper, a methodology of detecting manipulated SCADA data based on state estimation residuals is presented. A framework of the proposed methodology is described. Instead of using original SCADA measurements as the bad data sources, the residuals calculated based on the results of the state estimator are used as the input for the outlier detection process. The BACON algorithm is applied to detect outliers in the state estimation residuals. The IEEE 118-bus system is used asmore » a test case to evaluate the effectiveness of the proposed methodology. The accuracy of the BACON method is compared with that of the 3-σ method for the simulated SCADA measurements and residuals.« less

  19. Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baily, Scott A.; Dalmas, Dale Allen; Wheat, Robert Mitchell

    2015-11-16

    The following report covers FY 15 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production prototype gas flow loop. The goal of this effort is to expand the existing system to include a second flow loop with a larger production-sized blower. Besides testing the larger blower, this system will demonstrate the scalability of our solution to multiple flow loops.

  20. SCADA Application for ACTS Technology

    NASA Technical Reports Server (NTRS)

    Fairbanks, Barry

    1992-01-01

    The results of a system level study done by Hughes Network Systems for NASA are presented. For the supervisory control and data acquisition (SCADA) application, use of Ka-band spot beam satellite technology associated with NASA's Advanced Communication Technology Satellite (ACTS) offers a reduction in Earth station antenna size and transmitter power that may translate into lower system costs. The approaches taken to determine commercial potential of the system are described.

  1. Expanding Combat Power Through Military Cyberpower Theory

    DTIC Science & Technology

    2015-04-02

    systems (ICS) and supervisory control and data acquisition systems ( SCADA ) are public-facing, providing more avenues of approach for an adversary. ICS...and SCADA are the two primary means for cyber adversaries to achieve direct physical effects through cyberspace. Strategic Attribution. From a...REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to

  2. The Commanding Officer’s Perspective on Protecting Shipboard IT Networks

    DTIC Science & Technology

    2014-09-01

    potential checklist for protecting Supervisory Control and Data Acquisition ( SCADA ) systems. “A SCADA system is the software that controls networks such as...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited THE COMMANDING... for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data

  3. Fundamentals of SCADA and automated meter reading

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kwok, A.

    1992-02-01

    This paper discusses SCADA systems allow users to control and acquire data from remote facilities such as compressors, pressure-regulating stations, control valves and measurement stations. In general, a SCADA system performs functions in sequential control, continuous control, supervisory setpoint control and data acquisitions. AMR systems allow users to obtain up-to-date information on their gas demand. When AMR was in its infancy, equipment was designed only to read and record gas consumption values. The basic function of an early AMR system was to read gas volume at a fixed interval and record the data in its memory until it communicated withmore » a central receiving facility.« less

  4. Sandia SCADA Program -- High Surety SCADA LDRD Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    CARLSON, ROLF E.

    2002-04-01

    Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteriamore » Protection Profile. This report provides the status of work completed and discusses several challenges ahead.« less

  5. Designing a SCADA system simulator for fast breeder reactor

    NASA Astrophysics Data System (ADS)

    Nugraha, E.; Abdullah, A. G.; Hakim, D. L.

    2016-04-01

    SCADA (Supervisory Control and Data Acquisition) system simulator is a Human Machine Interface-based software that is able to visualize the process of a plant. This study describes the results of the process of designing a SCADA system simulator that aims to facilitate the operator in monitoring, controlling, handling the alarm, accessing historical data and historical trend in Nuclear Power Plant (NPP) type Fast Breeder Reactor (FBR). This research used simulation to simulate NPP type FBR Kalpakkam in India. This simulator was developed using Wonderware Intouch software 10 and is equipped with main menu, plant overview, area graphics, control display, set point display, alarm system, real-time trending, historical trending and security system. This simulator can properly simulate the principle of energy flow and energy conversion process on NPP type FBR. This SCADA system simulator can be used as training media for NPP type FBR prospective operators.

  6. Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.

    Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less

  7. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on howmore » to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.« less

  8. Programmable Logic Controller Modification Attacks for use in Detection Analysis

    DTIC Science & Technology

    2014-03-27

    and J. Lowe, “The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems ,” in Proceedings of the VDE Kongress, vol. 116, 2004. [13...Feb 2014 Date 20 Feb 2014 Date 20 Feb 2014 Date AFIT-ENG-14-M-66 Abstract Unprotected Supervisory Control and Data Acquisition (SCADA) systems offer...control and monitor physical industrial processes. Although attacks targeting SCADA systems have increased, there has been little work exploring the

  9. A Survey of Research in Supervisory Control and Data Acquisition (SCADA)

    DTIC Science & Technology

    2014-09-01

    distance learning .2 The data acquired may be operationally oriented and used to better run the system, or it could be strategic in nature and used to...Technically the SCADA system is composed of the information technology (IT) that provides the human- machine interface (HMI) and stores and analyzes the data...systems work by learning what normal or benign traffic is and reporting on any abnormal traffic. These systems have the potential to detect zero-day

  10. Detecting Peer-to-Peer Botnets in SCADA Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan; Cheng, Liang; Chuah, Mooi Choo

    Supervisory Control and Data Acquisition (SCADA) systems monitor and control critical infrastructure such as the smart grid. As SCADA systems become increasingly interconnected and adopt more and more cyber-enabled components, the risks of cyber attacks become a major concern. Due to their decentralized organization, peer-to-peer (P2P) botnets are resilient to many existing takedown measures and can be exploited as an effective way to launch cyber attacks on SCADA systems. However, little work has been done to detect P2P botnets in SCADA systems, which carry traffic flows with characteristics significantly different from the Internet. In this paper, we design a P2P-botnetmore » detection method for SCADA systems, leveraging built-in traffic monitoring capabilities of SCADA networking devices. The proposed method consists of two stages. In the first stage, we design a simple feature test to filter out non-P2P hosts, which significantly reduces the data volume for P2P-botnet identification. In the second stage, we jointly consider flow-based and connectivity-based features that effectively set apart bots from benign hosts. We propose to use unsupervised learning for P2P-botnet identification, which not only identifies known P2P botnets but also captures newly emerged ones. Our simulation results show that the proposed system achieves high detection rates with very few false positives. Furthermore, our evaluation shows that the proposed method can detect hosts running P2P SCADA applications that are infected by P2P bots.« less

  11. Pipeline scada upgrade uses satellite terminal system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conrad, W.; Skovrinski, J.R.

    In the recent automation of its supervisory control and data acquisition (scada) system, Transwestern Pipeline Co. has become the first to use very small aperture satellite terminals (VSAT's) for scada. A subsidiary of Enron Interstate Pipeline, Houston, Transwestern moves natural gas through a 4,400-mile system from West Texas, New Mexico, and Oklahoma to southern California markets. Transwestern's modernization, begun in November 1985, addressed problems associated with its aging control equipment which had been installed when the compressor stations were built in 1960. Over the years a combination of three different systems had been added. All were cumbersome to maintain andmore » utilized outdated technology. Problems with reliability, high maintenance time, and difficulty in getting new parts were determining factors in Transwestern's decision to modernize its scada system. In addition, the pipeline was anticipating moving its control center from Roswell, N.M., to Houston and believed it would be impossible to marry the old system with the new computer equipment in Houston.« less

  12. Industrial Control Systems/SCADA systems risk assessment in the energy sector

    NASA Astrophysics Data System (ADS)

    Falodun, Babatunde

    The energy sector is one of the most critical components of our national infrastructure. It not only provides the electrical power and petroleum required to run day-to-day operations and mechanisms in society, it's also an important element that directly impacts the economy with regard to growth and stability. Industrial Control Systems (ICS) /Supervisory Control and Data Acquisition Systems (SCADA) are computerized mechanisms, they are both software and hardware that are used to control real time processes and operations in power plants and oil production facilities. A significant attack on these control systems that leads to widespread disruption of energy could result in catastrophic consequences for any major city and even the nation. This research paper explores cyber threats and vulnerabilities faced by ICS/SCADA systems in the energy sector and also highlights possible outcomes of a successful breach. Furthermore, the research underscores mitigation strategies that could be used to prevent and respond to an attack. Keywords: Cybersecurity, SCADA, Cyber Attacks, Threats, Vulnerabilities, Risk Assessment, Dr. Albert Orbinati.

  13. Operations and maintenance manual for the LDUA supervisory control and data acquisition system (LDUA System 4200) and control network (LDUA System 4400)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barnes, G.A.

    1998-03-11

    This document defines the requirements applicable to the operation, maintenance and storage of the Supervisory Control and Data Acquisition System (SCADAS) and Control Network in support of the Light Duty Utility Arm (LDUA) operations.

  14. Automated turn pike using PLC and SCADA

    NASA Astrophysics Data System (ADS)

    Silpa Sreedhar, P.; Aiswarya, P.; Kathirvelan, J.

    2017-11-01

    We propose a smart turnpike based on Programmable Logic Controller (PLC) and Supervisory Control and Data Acquisition Systems (SCADA) in this paper. In this work, the basic idea is to measure the weight of the vehicles and classify them according to its weight to the respective lanes. It is difficult for the turnpike people to monitor the whole process all the time. So, this PLC based diversion system can be implemented in turnpikes to reduce the difficulties. This method will work based on weight sensors (piezo-resistive) whose output will be fed to a PLC, which will control the vehicle diversion. Using SCADA software, the whole process can be monitored from a remote area. The algorithm developed in this successfully installed in real time system.

  15. Upgrade of U.S. EPA's Experimental Stream Facility Supervisory Control and Data Acquisition System

    EPA Science Inventory

    The Supervisory control and data acquisition (SCADA) system for the U.S. EPA’s Experimental Stream Facility (ESF) was upgraded using Camile hardware and software in 2015. The upgrade added additional hardwired connections, new wireless capabilities, and included a complete rewrit...

  16. Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.

    PubMed

    Moya, José M; Araujo, Alvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier

    2009-01-01

    The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.

  17. Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps

    PubMed Central

    Moya, José M.; Araujo, Álvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier

    2009-01-01

    The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals. PMID:22291569

  18. Real-Time SCADA Cyber Protection Using Compression Techniques

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welchmore » (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.« less

  19. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  20. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  1. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  2. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  3. Acceptance Testing of a Satellite SCADA Photovoltaic-Diesel Hybrid System

    NASA Technical Reports Server (NTRS)

    Kalu, Alex; Acosta, R.; Durand, S.; Emrich, Carol; Ventre, G.; Wilson, W.

    1999-01-01

    Savannah State University (SSU) and the Florida Solar Energy Center (FSEC) have been participating in the NASA Advanced Communications Technology Satellite (ACTS) program for the last five years. This program was designed by NASA to help maintain U.S. leadership in commercial space communications by funding high-risk research, and to flight-test next-generation digital satellite components. Launched in 1993, ACTS is an U.S. government funded technology test-bed that incorporates high power Ka-band transponders, small spot beams, and on-board digital storage and switching technology. Associated with the spacecraft, is a prototype satellite control center that supports various application experiments. The SSU/FSEC application experiment is to developing a Photovoltaic-Diesel Hybrid Power system complete with satellite Supervisory Control and Data Acquisition (SCADA). The hybrid system was design to demonstrate the feasibility of using SCADA to maintain and operate remote village power systems. This configuration would enable experts at a central location to provide technical assistance to local technicians while they acquire a measure of proficiency with the hybrid system operation and maintenance. Upon full mastery of the technology, similar SCADA arrangement are planned to remotely monitor and control constellation of hybrid systems scattered overlarge rural areas. Two Orion Energy APEX-1000 hybrid systems were delivered in 1998, one was installed at SSU in eastern Georgia and the other was installed at FSEC in Central Florida. The project was designed to: (1) evaluate the performance of ACTS in a SCADA arrangement, (2) monitor the health and performance of all major hybrid subsystems, (3) investigate load control and battery charging strategies to maximize battery capacity and lifetime, and (4) develop satellite communication protocol. Preliminary results indicate that the hybrid design is suitable for satellite Supervisory Control and Data Acquisition. A modification to the controller software has produced a robust communication link capable of real time control and long term data collection.

  4. Quantifying the Impact of Unavailability in Cyber-Physical Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Federick T.

    2014-01-01

    The Supervisory Control and Data Acquisition (SCADA) system discussed in this work manages a distributed control network for the Tunisian Electric & Gas Utility. The network is dispersed over a large geographic area that monitors and controls the flow of electricity/gas from both remote and centralized locations. The availability of the SCADA system in this context is critical to ensuring the uninterrupted delivery of energy, including safety, security, continuity of operations and revenue. Such SCADA systems are the backbone of national critical cyber-physical infrastructures. Herein, we propose adapting the Mean Failure Cost (MFC) metric for quantifying the cost of unavailability.more » This new metric combines the classic availability formulation with MFC. The resulting metric, so-called Econometric Availability (EA), offers a computational basis to evaluate a system in terms of the gain/loss ($/hour of operation) that affects each stakeholder due to unavailability.« less

  5. Automatic Generation of Supervisory Control System Software Using Graph Composition

    NASA Astrophysics Data System (ADS)

    Nakata, Hideo; Sano, Tatsuro; Kojima, Taizo; Seo, Kazuo; Uchida, Tomoyuki; Nakamura, Yasuaki

    This paper describes the automatic generation of system descriptions for SCADA (Supervisory Control And Data Acquisition) systems. The proposed method produces various types of data and programs for SCADA systems from equipment definitions using conversion rules. At first, this method makes directed graphs, which represent connections between the equipment, from equipment definitions. System descriptions are generated using the conversion rules, by analyzing these directed graphs, and finding the groups of equipment that involve similar operations. This method can make the conversion rules multi levels by using the composition of graphs, and can reduce the number of rules. The developer can define and manage these rules efficiently.

  6. Industrial Control System Process-Oriented Intrusion Detection (iPoid) Algorithm

    DTIC Science & Technology

    2016-08-01

    inspection rules using an intrusion-detection system (IDS) sensor, a simulated Programmable Logic Controller (PLC), and a Modbus client operating...operating system PLC Programmable Logic Controller SCADA supervisory control and data acquisition SIGHUP signal hangup SPAN Switched Port Analyzer

  7. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pollet, J.

    2006-07-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less

  8. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.

    PubMed

    Wang, Hao; Lau, Nathan; Gerdes, Ryan M

    2018-04-01

    The aim of this study was to apply work domain analysis for cybersecurity assessment and design of supervisory control and data acquisition (SCADA) systems. Adoption of information and communication technology in cyberphysical systems (CPSs) for critical infrastructures enables automated and distributed control but introduces cybersecurity risk. Many CPSs employ SCADA industrial control systems that have become the target of cyberattacks, which inflict physical damage without use of force. Given that absolute security is not feasible for complex systems, cyberintrusions that introduce unanticipated events will occur; a proper response will in turn require human adaptive ability. Therefore, analysis techniques that can support security assessment and human factors engineering are invaluable for defending CPSs. We conducted work domain analysis using the abstraction hierarchy (AH) to model a generic SCADA implementation to identify the functional structures and means-ends relations. We then adopted a case study approach examining the Stuxnet cyberattack by developing and integrating AHs for the uranium enrichment process, SCADA implementation, and malware to investigate the interactions between the three aspects of cybersecurity in CPSs. The AHs for modeling a generic SCADA implementation and studying the Stuxnet cyberattack are useful for mapping attack vectors, identifying deficiencies in security processes and features, and evaluating proposed security solutions with respect to system objectives. Work domain analysis is an effective analytical method for studying cybersecurity of CPSs for critical infrastructures in a psychologically relevant manner. Work domain analysis should be applied to assess cybersecurity risk and inform engineering and user interface design.

  9. Kerman Photovoltaic Power Plant R&D data collection computer system operations and maintenance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rosen, P.B.

    1994-06-01

    The Supervisory Control and Data Acquisition (SCADA) system at the Kerman PV Plant monitors 52 analog, 44 status, 13 control, and 4 accumulator data points in real-time. A Remote Terminal Unit (RTU) polls 7 peripheral data acquisition units that are distributed throughout the plant once every second, and stores all analog, status, and accumulator points that have changed since the last scan. The R&D Computer, which is connected to the SCADA RTU via a RS-232 serial link, polls the RTU once every 5-7 seconds and records any values that have changed since the last scan. A SCADA software package calledmore » RealFlex runs on the R&D computer and stores all updated data values taken from the RTU, along with a time-stamp for each, in a historical real-time database. From this database, averages of all analog data points and snapshots of all status points are generated every 10 minutes and appended to a daily file. These files are downloaded via modem by PVUSA/Davis staff every day, and the data is placed into the PVUSA database.« less

  10. Cyber security risk assessment for SCADA and DCS networks.

    PubMed

    Ralston, P A S; Graham, J H; Hieb, J L

    2007-10-01

    The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.

  11. SCADA alarms processing for wind turbine component failure detection

    NASA Astrophysics Data System (ADS)

    Gonzalez, E.; Reder, M.; Melero, J. J.

    2016-09-01

    Wind turbine failure and downtime can often compromise the profitability of a wind farm due to their high impact on the operation and maintenance (O&M) costs. Early detection of failures can facilitate the changeover from corrective maintenance towards a predictive approach. This paper presents a cost-effective methodology to combine various alarm analysis techniques, using data from the Supervisory Control and Data Acquisition (SCADA) system, in order to detect component failures. The approach categorises the alarms according to a reviewed taxonomy, turning overwhelming data into valuable information to assess component status. Then, different alarms analysis techniques are applied for two purposes: the evaluation of the SCADA alarm system capability to detect failures, and the investigation of the relation between components faults being followed by failure occurrences in others. Various case studies are presented and discussed. The study highlights the relationship between faulty behaviour in different components and between failures and adverse environmental conditions.

  12. Anomaly-based intrusion detection for SCADA systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less

  13. Parris Island Wastewater Treatment Plant SCADA Upgrades Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meador, Richard J.; Hatley, Darrel D.

    2004-03-18

    Marine Corp Recruit Depot (MCRD), Parris Island, SC, home of the Easter Recruiting Region Marine Corp Boot Camp, found itself in a situation common to Department of Defense (DOD) facilities. It had to deal with several different types of installed energy-related control systems that could not talk to each other. This situation was being exacerbated by the installation of a new and/or unique type of control system for every new building being constructed or older facility that was being upgraded. The Wastewater Treatment Facility (WWTF) and lift station controls were badly in need of a thorough inspection and a newmore » Supervisory Control and Data Acquisition (SCADA) system upgrade to meet environmental, safety, manpower, and maintenance concerns. A project was recently completed to implement such a wastewater treatment SCADA upgrade, which is compatible with other upgrades to the energy monitoring and control systems for Parris Island buildings and the Pacific Northwest National Laboratory (PNNL) Decision Support for Operations and Maintenance (DSOM) system installed at the Central Energy Plant (CEP). This project included design, specification, procurement, installation, and testing an upgraded SCADA alarm, process monitoring, and display system; and training WWTF operators in its operation. The ultimate goal of this and the other PNNL projects at Parris Island is to allow monitoring and control of energy and environmental components from a central location.« less

  14. Application of Canal Automation at the Central Arizona Irrigation and Drainage District

    USDA-ARS?s Scientific Manuscript database

    The Central Arizona Irrigation and Drainage District (CAIDD) began delivering water to users in 1987. Although designed for automatic control, the system was run manually until a homemade SCADA (Supervisory Control and Data Acquisition) system was developed by a district employee. In 2002, problem...

  15. 7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...

  16. 7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...

  17. 7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...

  18. A Web-Based Remote Access Laboratory Using SCADA

    ERIC Educational Resources Information Center

    Aydogmus, Z.; Aydogmus, O.

    2009-01-01

    The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…

  19. Renewable Energy SCADA/Training Using NASA's Advanced Technology Communication Satellite

    NASA Technical Reports Server (NTRS)

    Kalu, A.; Emrich, C.; Ventre, G.; Wilson, W.; Acosta, Roberto (Technical Monitor)

    2000-01-01

    The lack of electrical energy in the rural communities of developing countries is well known, as is the economic unfeasibility of providing much needed energy to these regions via electric grids. Renewable energy (RE) can provide an economic advantage over conventional forms in meeting some of these energy needs. The use of a Supervisory Control and Data Acquisition (SCADA) arrangement via satellite could enable experts at remote locations to provide technical assistance to local trainees while they acquire a measure of proficiency with a newly installed RE system through hands-on training programs using the same communications link. Upon full mastery of the technologies, indigenous personnel could also employ similar SCADA arrangements to remotely monitor and control their constellation of RE systems. Two separate ACTS technology verification experiments (TVEs) have demonstrated that the portability of the Ultra Small Aperture Terminal (USAT) and the versatility of NASA's Advanced Communications Technology Satellite (ACTS), as well as the advantages of Ka band satellites, can be invaluable in providing energy training via distance education (DE), and for implementing renewable energy system SCADA. What has not been tested is the capabilities of these technologies for a simultaneous implementation of renewable energy DE and SCADA. Such concurrent implementations will be useful for preparing trainees in developing countries for their eventual SCADA operations. The project described in this correspondence is the first effort, to our knowledge, in this specific TVE. The setup for this experiment consists of a one-Watt USAT located at Florida Solar Energy Center (FSEC) connected to two satellite modems tuned to different frequencies to establish two duplex ACTS Ka-band communication channels. A short training program on operation and maintenance of the system will be delivered while simultaneously monitoring and controlling the hybrid using the same satellite communications link. The trainees will include faculty and students from Savannah State University, and staff from FSEC. An interactive internet link will be used to allow faculty from the University of West Indies to participate in the training session.

  20. Design and development of an IoT-based web application for an intelligent remote SCADA system

    NASA Astrophysics Data System (ADS)

    Kao, Kuang-Chi; Chieng, Wei-Hua; Jeng, Shyr-Long

    2018-03-01

    This paper presents a design of an intelligent remote electrical power supervisory control and data acquisition (SCADA) system based on the Internet of Things (IoT), with Internet Information Services (IIS) for setting up web servers, an ASP.NET model-view- controller (MVC) for establishing a remote electrical power monitoring and control system by using responsive web design (RWD), and a Microsoft SQL Server as the database. With the web browser connected to the Internet, the sensing data is sent to the client by using the TCP/IP protocol, which supports mobile devices with different screen sizes. The users can provide instructions immediately without being present to check the conditions, which considerably reduces labor and time costs. The developed system incorporates a remote measuring function by using a wireless sensor network and utilizes a visual interface to make the human-machine interface (HMI) more instinctive. Moreover, it contains an analog input/output and a basic digital input/output that can be applied to a motor driver and an inverter for integration with a remote SCADA system based on IoT, and thus achieve efficient power management.

  1. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  2. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  3. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  4. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  5. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  6. Architecture and Methods for Substation SCADA Cybersecurity: Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Albunashee, Hamdi; Al Sarray, Muthanna; McCann, Roy

    There are over 3000 electricity providers in the United States, encompassing investor and publicly owned utilities as well as electric cooperatives. There has been ongoing trends to increasingly automate and provide remote control and monitoring of electric energy delivery systems. The deployment of computer network technologies has increased the efficiency and reliability of electric power infrastructure. However, the increased use of digital communications has also increased the vulnerability to malicious cyber attacks [1]. In 2004 the National Research Councils (National Academies) formed a committee of specialists to address these vulnerabilities and propose possible solutions with an objective to prioritize themore » R&D needs for developing countermeasures. The committee addressed many potential concerns in the electric power delivery system and classified them based upon different criteria and presented recommendations to minimize the gap between the academic research directions and the needs of the electric utility industry. The complexity and diversity of the electric power delivery system in the U.S. has opened many ports for attackers and intruders [1]. This complexity and diversity is attributed to the fact that power delivery system is a network of substations, transmission and distribution lines, sub-networks of controlling, sensing and monitoring units, and human operator involvement for running the system [1]. Accordingly, any incident such as the occurrence of a fault or disturbance in this complex network cannot be deferred and should be resolved within an order of milliseconds, otherwise there is risk of large-scale outages similar to the occurrences in India and the U.S. in 2003 [2]. There are three main vulnerabilities in supervisory control and data acquisition (SCADA) systems commonly identified—physical vulnerability, cyber vulnerability and personal vulnerability [1]. In terms of cyber threats, SCADA systems are the most critical elements in the electric power grid in the U.S. Unauthorized access to a SCADA system could enable/disable unexpected equipment (such as disable the protection system or a circuit breaker) which could cause large scale disruptions of electric power delivery. This paper provides an overview of power system SCADA technologies in transmission substations (Section 2) and summarizes the best practices for implementing a cyber security program. After introducing SCADA system operations in Section 2, a description of the security challenges for SCADA systems is presented in Section 3. In Section 4, NECRC Critical Infrastructure Protection standards CIP-002 through CIP-009 are summarized. An overview of industry best practices is presented in Section 5.« less

  7. Applying Water-Level Difference Control to Central Arizona Project

    USDA-ARS?s Scientific Manuscript database

    The Central Arizona Project (CAP) has been supplying Colorado River water to Central Arizona for roughly 25 years. The CAP canal is operated remotely with a Supervisory Control and Data Acquisition (SCADA) System. Gate position changes are made either manually or through the use of automatic control...

  8. SCADA-based Operator Support System for Power Plant Equipment Fault Forecasting

    NASA Astrophysics Data System (ADS)

    Mayadevi, N.; Ushakumari, S. S.; Vinodchandra, S. S.

    2014-12-01

    Power plant equipment must be monitored closely to prevent failures from disrupting plant availability. Online monitoring technology integrated with hybrid forecasting techniques can be used to prevent plant equipment faults. A self learning rule-based expert system is proposed in this paper for fault forecasting in power plants controlled by supervisory control and data acquisition (SCADA) system. Self-learning utilizes associative data mining algorithms on the SCADA history database to form new rules that can dynamically update the knowledge base of the rule-based expert system. In this study, a number of popular associative learning algorithms are considered for rule formation. Data mining results show that the Tertius algorithm is best suited for developing a learning engine for power plants. For real-time monitoring of the plant condition, graphical models are constructed by K-means clustering. To build a time-series forecasting model, a multi layer preceptron (MLP) is used. Once created, the models are updated in the model library to provide an adaptive environment for the proposed system. Graphical user interface (GUI) illustrates the variation of all sensor values affecting a particular alarm/fault, as well as the step-by-step procedure for avoiding critical situations and consequent plant shutdown. The forecasting performance is evaluated by computing the mean absolute error and root mean square error of the predictions.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in amore » critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.« less

  10. A Proposal for a Taxonomy for Vulnerabilities in Supervisory Control and Data Acquisition (SCADA) Systems

    DTIC Science & Technology

    2014-09-01

    executable that is setuid root.4 fingerd The Morris worm exploited a buffer overflow in the fingerd program to gain unauthorized access to computer...in other taxonomies. There are still holes ; in fact, none of the vulnerabilities that Bishop discussed have a clear place in this taxonomy until a

  11. LIDAR wind speed measurements at a Taiwan onshore wind park

    NASA Astrophysics Data System (ADS)

    Wu, Yu-Ting; Lin, Ta-Hui; Hsuan, Chung-Yao; Li, Yu-Cheng; Yang, Ya-Fei; Tai, Tzy-Hwan; Huang, Chien-Cheng

    2016-04-01

    Measurements of wind speed and wind direction were carried out using a Leosphere Windcube LIDAR system at a Taiwan onshore wind park. The Lidar shot a total of five laser beams to the atmosphere to collect the light-of-sight (LOS) velocity. Four beams were sent successively in four cardinal directions along a 28° scanning cone angle, followed by a fifth, vertical beam. An unchangeable sampling rate of approximately 1.2 Hz was set in the LIDAR system to collect the LOS velocity. The supervisory control and data acquisition (SCADA) data from two GE 1.5 MW wind turbines near the LIDAR deployment site were acquired for the whole measuring period from February 4 to February 16 of 2015. The SCADA data include the blade angular velocity, the wind velocity measured at hub height from an anemometer mounted on the nacelle, the wind turbine yaw angle, and power production; each parameter was recorded as averages over 1-min periods. The data analysis involving the LIDAR measurements and the SCADA data were performed to obtain the turbulent flow statistics. The results show that the turbine power production has significant dependence to the wind speed, wind direction, turbulence intensity and wind shear.

  12. Remote Supervision and Control of Air Conditioning Systems in Different Modes

    NASA Astrophysics Data System (ADS)

    Rafeeq, Mohammed; Afzal, Asif; Rajendra, Sree

    2018-01-01

    In the era of automation, most of the application of engineering and science are interrelated with system for optimal operation. To get the efficient result of an operation and desired response, interconnected systems should be controlled by directing, regulating and commanding. Here, air conditioning (AC) system is considered for experimentation, to supervise and control its functioning in both, automated and manual mode. This paper reports the work intended to design and develop an automated and manual AC system working in remote and local mode, to increase the level of comfort, easy operation, reducing human intervention and faults occurring in the system. The Programmable Logical Controller (PLC) and Supervisory Control and Data Acquisition (SCADA) system were used for remote supervision and monitoring of AC systems using series ninety protocol and remote terminal unit modbus protocol as communication module to operate in remote mode. PLC was used as remote terminal for continuous supervision and control of AC system. SCADA software was used as a tool for designing user friendly graphical user interface. The proposed SCADA AC system successfully monitors and controls in accordance within the parameter limits like temperature, pressure, humidity and voltage. With all the features, this designed system is capable of efficient handling of the resources like the compressor, humidifier etc., with all the levels of safety and durability. This system also maintains the temperature and controls the humidity of the remote location and also looks after the health of the compressor.

  13. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    PubMed Central

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  14. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    PubMed

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  15. Towards a Standard for Highly Secure SCADA Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carlson, R.

    1998-09-25

    The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied tomore » automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.« less

  16. Power System Information Delivering System Based on Distributed Object

    NASA Astrophysics Data System (ADS)

    Tanaka, Tatsuji; Tsuchiya, Takehiko; Tamura, Setsuo; Seki, Tomomichi; Kubota, Kenji

    In recent years, improvement in computer performance and development of computer network technology or the distributed information processing technology has a remarkable thing. Moreover, the deregulation is starting and will be spreading in the electric power industry in Japan. Consequently, power suppliers are required to supply low cost power with high quality services to customers. Corresponding to these movements the authors have been proposed SCOPE (System Configuration Of PowEr control system) architecture for distributed EMS/SCADA (Energy Management Systems / Supervisory Control and Data Acquisition) system based on distributed object technology, which offers the flexibility and expandability adapting those movements. In this paper, the authors introduce a prototype of the power system information delivering system, which was developed based on SCOPE architecture. This paper describes the architecture and the evaluation results of this prototype system. The power system information delivering system supplies useful power systems information such as electric power failures to the customers using Internet and distributed object technology. This system is new type of SCADA system which monitors failure of power transmission system and power distribution system with geographic information integrated way.

  17. Managing RFID sensors networks with a general purpose RFID middleware.

    PubMed

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster).

  18. Identifying Supervisory Control and Data Acquisition (SCADA) Systems on a Network via Remote Reconnaissance

    DTIC Science & Technology

    2006-09-01

    and other forms of Internet research were used to confirm the relevance of the OUI to control system reconnaissance. I assigned a subjective level...equipment 4 = Confirmed with Internet research 5 = Suspected with Internet research OUI Organization Confidence Notes 00:00:0A Omron Tateisi...IP Vendor List 2 = Cross Referenced with IANA port list 3 = Confirmed with lab equipment 4 = Confirmed with Internet research 5 = Suspected with

  19. Terra Defender Cyber-Physical Wargame

    DTIC Science & Technology

    2017-04-01

    Army position unless so designated by other authorized documents. Citation of manufacturer’s or trade names does not constitute an official...person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control ...helped to achieve a better understanding of how Army supervisory control and data acquisition (SCADA) system and device security can be modeled and

  20. An Architectural Framework for Describing Supervisory Control and Data Acquisition (SCADA) Systems

    DTIC Science & Technology

    2004-09-01

    having one of two possible values, described as 0 or 1. Boundary A logical segregation of related components in a system. The segregation may be based ...Depending on the sophistication of the microcontroller in the RTU, it can be configured to act as a relay station for other RTUs which cannot...communicate directly with a master station, or the microcontroller can communicate on a peer-to-peer basis with other RTUs. RTUs are generally remotely

  1. Acceptance Testing of a Satellite SCADA Photovoltaic-Diesel Hybrid System

    NASA Technical Reports Server (NTRS)

    Kalu, A.; Emrich, C.; Ventre, G.; Wilson, W.; Acosta, Roberto (Technical Monitor)

    2000-01-01

    Satellite Supervisory Control and Data Acquisition (SCADA) of a Photovoltaic (PV)/diesel hybrid system was tested using NASA's Advanced Communication Technology Satellite (ACTS) and Ultra Small Aperture Terminal (USAT) ground stations. The setup consisted of a custom-designed PV/diesel hybrid system, located at the Florida Solar Energy Center (FSEC), which was controlled and monitored at a "remote" hub via Ka-band satellite link connecting two 1/4 Watt USATs in a SCADA arrangement. The robustness of the communications link was tested for remote monitoring of the health and performance of a PV/diesel hybrid system, and for investigating load control and battery charging strategies to maximize battery capacity and lifetime, and minimize loss of critical load probability. Baseline hardware performance test results demonstrated that continuous two-second data transfers can be accomplished under clear sky conditions with an error rate of less than 1%. The delay introduced by the satellite (1/4 sec) was transparent to synchronization of satellite modem as well as to the PV/diesel-hybrid computer. End-to-end communications link recovery times were less than 36 seconds for loss of power and less than one second for loss of link. The system recovered by resuming operation without any manual intervention, which is important since the 4 dB margin is not sufficient to prevent loss of the satellite link during moderate to heavy rain. Hybrid operations during loss of communications link continued seamlessly but real-time monitoring was interrupted. For this sub-tropical region, the estimated amount of time that the signal fade will exceed the 4 dB margin is about 10%. These results suggest that data rates of 4800 bps and a link margin of 4 dB with a 1/4 Watt transmitter are sufficient for end-to-end operation in this SCADA application.

  2. Water Wells Monitoring Using SCADA System for Water Supply Network, Case Study: Water Treatment Plant Urseni, Timis County, Romania

    NASA Astrophysics Data System (ADS)

    Adrian-Lucian, Cococeanu; Ioana-Alina, Cretan; Ivona, Cojocinescu Mihaela; Teodor Eugen, Man; Narcis, Pelea George

    2017-10-01

    The water supply system in Timisoara Municipality is insured with about 25-30 % of the water demand from wells. The underground water headed to the water treatment plant in order to ensure equal distribution and pressure to consumers. The treatment plants used are Urseni and Ronaţ, near Timisoara, in Timis County. In Timisoara groundwater represents an alternative source for water supply and complementary to the surface water source. The present paper presents a case study with proposal and solutions for rehabilitation /equipment /modernization/ automation of water drilling in order to ensure that the entire system can be monitored and controlled remotely through SCADA (Supervisory control and data acquisition) system. The data collected from the field are designed for online efficiency monitoring regarding the energy consumption and water flow intake, performance indicators such as specific energy consumption KW/m3 and also in order to create a hydraulically system of the operating area to track the behavior of aquifers in time regarding the quality and quantity aspects.

  3. A storage scheme for the real-time database supporting the on-line commitment

    NASA Astrophysics Data System (ADS)

    Dai, Hong-bin; Jing, Yu-jian; Wang, Hui

    2013-07-01

    The modern SCADA (Supervisory Control and Data acquisition) systems have been applied to various aspects of everyday life. As the time goes on, the requirements of the applications of the systems vary. Thus the data structure of the real-time database, which is the core of a SCADA system, often needs modification. As a result, the commitment consisting of a sequence of configuration operations modifying the data structure of the real-time database is performed from time to time. Though it is simple to perform the off-line commitment by first stopping and then restarting the system, during which all the data in the real-time database are reconstructed. It is much more preferred or in some cases even necessary to perform the on-line commitment, during which the real-time database can still provide real-time service and the system continues working normally. In this paper, a storage scheme of the data in the real-time database is proposed. It helps the real-time database support its on-line commitment, during which real-time service is still available.

  4. Cyber: A Flexible Deterrent Option

    DTIC Science & Technology

    2013-02-14

    to come on when they throw a switch and other electrical appliances throughout the house to work without any commercial power interruption. For...power plants this means maintaining the electrical grid and the supervisory control and data acquisition (SCADA) systems at a reliable rate of “99.99999...on the grid.”36 The researchers “simply instructed it to make rapid changes in the electricity cycles that powered the equipment: fast, slow, fast

  5. Demonstration of Supervisory Control and Data Acquisition (SCADA) Virtualization Capability in the US Army Research Laboratory (ARL)/Sustaining Base Network Assurance Branch (SBNAB) US Army Cyber Analytics Laboratory (ACAL) SCADA Hardware Testbed

    DTIC Science & Technology

    2015-05-01

    application ,1 while the simulated PLC software is the open source ModbusPal Java application . When queried using the Modbus TCP protocol, ModbusPal reports...and programmable logic controller ( PLC ) components. The HMI and PLC components were instantiated with software and installed in multiple virtual...creating and capturing HMI– PLC network traffic over a 24-h period in the virtualized network and inspect the packets for errors.  Test the

  6. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  7. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    PubMed Central

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  8. Pre-commercial Demonstration of Direct Non-iterative State Estimator for Operational Use of Synchrophasor Management Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lelic, Muhidin; Avramovic, Bozidar; Jiang, Tony

    The objective of this project was to demonstrate functionality and performance of a Direct Non-iterative State Estimator (DNSE) integrated with NYPA’s Energy Management System (EMS) and with enhanced Real Time Dynamics Monitoring System (RTDMS) synchrophasor platform from Electric Power Group (EPG). DNSE is designed to overcome a major obstacle to operational use of Synchro-Phasor Management Systems (SPMS) by providing to synchrophasor management systems (SPMS) applications a consistent and a complete synchrophasor data foundation in the same way that a traditional EMS State Estimator (SE) provides to EMS applications. Specifically, DNSE is designed to use synchrophasor measurements collected by a centralmore » PDC, Supervisory Control and Data Acquisition (SCADA) measurements, and Energy Management System (EMS) network model, to obtain the complete state of the utility’s operating model at rates that are close to the synchrophasor data rates. In this way, the system is comprehensive in that it does not only cover the part of the network that is “visible” via synchrophasors, but also the part that is only “visible” through the SCADA measurements. Visualization needs associated with the use of DNSE results are fulfilled through suitably enhanced Real Time Dynamics Monitoring System (RTDMS), with the enhancements implemented by EPG. This project had the following goals in mind: To advance the deployment of commercial grade DNSE software application that relies on synchrophasor and SCADA data ; Apply DNSE at other utilities, to address a generic and fundamental need for “clean” operational data for synchrophasor applications; Provide means for “live” estimated data access by control system operators; Enhance potential for situational awareness through full system operational model coverage; Sub-second execution rate of the Direct Non-iterative State Estimator, eventually at a near-phasor data rate execution speed, i.e. < 0.1 sec. Anticipated benefits from this projects are: Enhanced reliability and improvements in the economic efficiency of bulk power system planning and operations; Providing “clean” data to other synchrophasor applications; Enhancement of situational awareness by providing the full operational model updated at near synchrophasor rate; A production-grade software tool that incorporate synchrophasor and SCADA data; Provides a basis for development of next generation monitoring and control applications, based on both SCADA and PMU data. Quanta Technology (QT) team worked in collaboration with Electric Power Group (EPG) whose team has enhanced its commercial Real Time Dynamics Monitoring System (RTDMS) to accommodate the requirements posed by DNSE application. EPG also provided its ePDC and Model-less Data Conditioning (PDVC) software for integration with DNSE+. QT developed the system requirements for DNSE; developed system architecture and defined interfaces between internal DNSE components. The core DNSE algorithm with all surrounding interfaces was named DNSE+. Since the DNSE development was done in a simulated system environment, QT used its PMU simulator that was enhanced during this project for development and factory acceptance testing (FAT). SCADA data in this stage was simulated by commercial PSS/e software. The output of DNSE are estimates of System states in C37.118-2 format, sent to RTDMS for further processing and display. As the number of these states is large, it was necessary to expand the C37.111-2 standard to accommodate large data sets. This enhancement was implemented in RTDMS. The demonstration of pre-production DNSE technology was done at NYPA using streaming field data from NYPA PMUs and from its RTUs through their SCADA system. NYPA provided ICCP interface as well as Common Information Model (CIM). The relevance of the DNSE+ application is that it provides state estimation of the power system based on hybrid set of data, consisting of both available PMU data and SCADA measurements. As this is a direct, non-iterative method of calculation of the system states, if does not suffer from convergence issues which is potential problem for conventional state estimators. Also, it can take any available PMU measurements, so it does not need to have a high percentage of PMU coverage needed in the case of Linear State Estimator. As the DNSE calculates synchrophasors of the system states (both phase and absolute value) as sub-second rate, this application can provide a basis for development of next generation of applications based both on SCADA and PMU data.« less

  9. America’s Achilles Heel: Defense Against High-altitude Electromagnetic Pulse-policy vs. Practice

    DTIC Science & Technology

    2014-12-12

    Directives SCADA Supervisory Control and Data Acquisition Systems SHIELD Act Secure High-voltage Infrastructure for Electricity from Lethal Damage Act...take place, it is important to understand the effects of the components of EMP from a high-altitude nuclear detonation. The requirements for shielding ...Mass Ejection (CME). A massive, bubble-shaped burst of plasma expanding outward from the Sun’s corona, in which large amounts of superheated

  10. Hacker tracking Security system for HMI

    NASA Astrophysics Data System (ADS)

    Chauhan, Rajeev Kumar

    2011-12-01

    Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.

  11. Susceptibility of SCADA systems and the energy sector

    NASA Astrophysics Data System (ADS)

    Goike, Lindsay

    The research in this paper focused on analyzing SCADA systems in the energy sector for susceptibility to cyber attacks, in furtherance of providing suggestions to mitigate current and future cyber attacks. The research will be addressing the questions: how are SCADA systems susceptible to cyber attacks, and what are the suggested ways to mitigate both current and future cyber attacks. The five main categories of security vulnerabilities facing current SCADA systems were found to be: connectivity to the Internet, failure to plan, interdependency of sectors, numerous different types of threats, and outdated software. Some of the recommendations mentioned to mitigate current and future risks were: virtual private networks, risk assessments, increased physical security, updating of software, and firewalls.

  12. Internet SCADA Utilizing API's as Data Source

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Haeng-Kon; Kim, Tai-Hoon

    An Application programming interface or API is an interface implemented by a software program that enables it to interact with other software. Many companies provide free API services which can be utilized in Control Systems. SCADA is an example of a control system and it is a system that collects data from various sensors at a factory, plant or in other remote locations and then sends this data to a central computer which then manages and controls the data. In this paper, we designed a scheme for Weather Condition in Internet SCADA Environment utilizing data from external API services. The scheme was designed to double check the weather information in SCADA.

  13. A Case Study of Modern PLC and LabVIEW Controls: Power Supply Controls for the ORNL ITER ECH Test Stand

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barker, Alan M; Killough, Stephen M; Bigelow, Tim S

    2011-01-01

    Power Supply Controls are being developed at Oak Ridge National Laboratory (ORNL) to test transmission line components of the Electron Cyclotron Heating (ECH) system, with a focus on gyrotrons and waveguides, in support of the International Thermonuclear Experimental Reactor (ITER). The control is performed by several Programmable Logic Controllers (PLC s) located near the different equipment. A technique of Supervisory Control and Data Acquisition (SCADA) is presented to monitor, control, and log actions of the PLC s on a PC through use of Allen Bradley s Remote I/O communication interface coupled with an Open Process Control/Object Linking and Embedding [OLE]more » for Process Control (OPC) Server/Client architecture. The OPC data is then linked to a National Instruments (NI) LabVIEW system for monitoring and control. Details of the architecture and insight into applicability to other systems are presented in the rest of this paper. Future integration with an EPICS (Experimental Physics Industrial Control System) based mini-CODAC (Control, Data Access and Communication) SCADA system is under consideration, and integration considerations will be briefly introduced.« less

  14. Evaluation of power control concepts using the PMAD systems test bed. [Power Management and Distribution

    NASA Technical Reports Server (NTRS)

    Beach, R. F.; Kimnach, G. L.; Jett, T. A.; Trash, L. M.

    1989-01-01

    The Lewis Research Center's Power Management and Distribution (PMAD) System testbed and its use in the evaluation of control concepts applicable to the NASA Space Station Freedom electric power system (EPS) are described. The facility was constructed to allow testing of control hardware and software in an environment functionally similar to the space station electric power system. Control hardware and software have been developed to allow operation of the testbed power system in a manner similar to a supervisory control and data acquisition (SCADA) system employed by utility power systems for control. The system hardware and software are described.

  15. Design of virtual SCADA simulation system for pressurized water reactor

    NASA Astrophysics Data System (ADS)

    Wijaksono, Umar; Abdullah, Ade Gafar; Hakim, Dadang Lukman

    2016-02-01

    The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles of energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor.

  16. An ethernet/IP security review with intrusion detection applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Laughter, S. A.; Williams, R. D.

    2006-07-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less

  17. Synchronization software for automation in anesthesia.

    PubMed

    Bressan, Nadja; Castro, Ana; Brás, Susana; Oliveira, Hélder P; Ribeiro, Lénio; Ferreira, David A; Antunes, Luís; Amorim, Pedro; Nunes, Catarina S

    2007-01-01

    This work presents the development of a software for data acquisition and control (ASYS) on a clinical setup. Similar to the industrial Supervisory Control And Data Acquisition (SCADA) the software assembles a Target Controlled Infusion (TCI) monitoring and supervisory control data in real time from devices in a surgical room. The software is not a full controller since the TCI systems comprehend permanent interaction from the anesthesiologist. Based on pharmacokinetic models, the effect-site and plasma concentrations can be related with the drug dose infused and vice versa. The software determines the infusion rates of the drug which are given as commands to the infusion pumps. This software provides the anesthesiologist with a trustworthy tool for managing a safe and balanced anesthesia. Since it also incorporates the acquisition and display of patients brain signals.

  18. Towards A Taxonomy Of Attacks Against Energy Control Systems

    NASA Astrophysics Data System (ADS)

    Fleury, Terry; Khurana, Himanshu; Welch, Von

    Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.

  19. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.

  20. Design of virtual SCADA simulation system for pressurized water reactor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wijaksono, Umar, E-mail: umar.wijaksono@student.upi.edu; Abdullah, Ade Gafar; Hakim, Dadang Lukman

    The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles ofmore » energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor.« less

  1. Refurbishment and Automation of the Thermal/Vacuum Facilities at the Goddard Space Flight Center

    NASA Technical Reports Server (NTRS)

    Donohue, John T.; Johnson, Chris; Ogden, Rick; Sushon, Janet

    1998-01-01

    The thermal/vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the 11 facilities, currently 10 of the systems are scheduled for refurbishment and/or replacement as part of a 5-year implementation. Expected return on investment includes the reduction in test schedules, improvements in the safety of facility operations, reduction in the complexity of a test and the reduction in personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering and for the automation of thermal/vacuum facilities and thermal/vacuum tests. Automation of the thermal/vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs) and the use of Supervisory Control and Data Acquisition (SCADA) systems. These components allow the computer control and automation of mechanical components such as valves and pumps. In some cases, the chamber and chamber shroud require complete replacement while others require only mechanical component retrofit or replacement. The project of refurbishment and automation began in 1996 and has resulted in the computer control of one Facility (Facility #225) and the integration of electronically controlled devices and PLCs within several other facilities. Facility 225 has been successfully controlled by PLC and SCADA for over one year. Insignificant anomalies have occurred and were resolved with minimal impact to testing and operations. The amount of work remaining to be performed will occur over the next four to five years. Fiscal year 1998 includes the complete refurbishment of one facility, computer control of the thermal systems in two facilities, implementation of SCADA and PLC systems to support multiple facilities and the implementation of a Database server to allow efficient test management and data analysis.

  2. Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    NASA Astrophysics Data System (ADS)

    McEvoy, Thomas Richard; Wolthusen, Stephen D.

    Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.

  3. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    DTIC Science & Technology

    2013-06-01

    standard for cryptographic protection of SCADA communications. The United Kingdom’s National Infrastructure Security Co-ordination Centre (NISCC...has released a good practice guide on firewall deployment for SCADA systems and process control networks [17]. Meanwhile, National Institute for ...report. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED 18 The SCADA gateway collects the data gathered by sensors, translates them from

  4. Earthquake Risk Reduction to Istanbul Natural Gas Distribution Network

    NASA Astrophysics Data System (ADS)

    Zulfikar, Can; Kariptas, Cagatay; Biyikoglu, Hikmet; Ozarpa, Cevat

    2017-04-01

    Earthquake Risk Reduction to Istanbul Natural Gas Distribution Network Istanbul Natural Gas Distribution Corporation (IGDAS) is one of the end users of the Istanbul Earthquake Early Warning (EEW) signal. IGDAS, the primary natural gas provider in Istanbul, operates an extensive system 9,867km of gas lines with 750 district regulators and 474,000 service boxes. The natural gas comes to Istanbul city borders with 70bar in 30inch diameter steel pipeline. The gas pressure is reduced to 20bar in RMS stations and distributed to district regulators inside the city. 110 of 750 district regulators are instrumented with strong motion accelerometers in order to cut gas flow during an earthquake event in the case of ground motion parameters exceeds the certain threshold levels. Also, state of-the-art protection systems automatically cut natural gas flow when breaks in the gas pipelines are detected. IGDAS uses a sophisticated SCADA (supervisory control and data acquisition) system to monitor the state-of-health of its pipeline network. This system provides real-time information about quantities related to pipeline monitoring, including input-output pressure, drawing information, positions of station and RTU (remote terminal unit) gates, slum shut mechanism status at 750 district regulator sites. IGDAS Real-time Earthquake Risk Reduction algorithm follows 4 stages as below: 1) Real-time ground motion data transmitted from 110 IGDAS and 110 KOERI (Kandilli Observatory and Earthquake Research Institute) acceleration stations to the IGDAS Scada Center and KOERI data center. 2) During an earthquake event EEW information is sent from IGDAS Scada Center to the IGDAS stations. 3) Automatic Shut-Off is applied at IGDAS district regulators, and calculated parameters are sent from stations to the IGDAS Scada Center and KOERI. 4) Integrated building and gas pipeline damage maps are prepared immediately after the earthquake event. The today's technology allows to rapidly estimate the expected level of shaking when an earthquake starts to occur. However, in Istanbul case for a potential Marmara Sea Earthquake, the time is very limited even to estimate the level of shaking. The robust threshold based EEW system is only algorithm for such a near source event to activate automatic shut-off mechanism in the critical infrastructures before the damaging waves arrive. This safety measure even with a few seconds of early warning time will help to mitigate potential damages and secondary hazards.

  5. Risk assessment for Industrial Control Systems quantifying availability using mean failure cost (MFC)

    DOE PAGES

    Chen, Qian; Abercrombie, Robert K; Sheldon, Frederick T.

    2015-09-23

    Industrial Control Systems (ICS) are commonly used in industries such as oil and natural gas, transportation, electric, water and wastewater, chemical, pharmaceutical, pulp and paper, food and beverage, as well as discrete manufacturing (e.g., automotive, aerospace, and durable goods.) SCADA systems are generally used to control dispersed assets using centralized data acquisition and supervisory control.Originally, ICS implementations were susceptible primarily to local threats because most of their components were located in physically secure areas (i.e., ICS components were not connected to IT networks or systems). The trend toward integrating ICS systems with IT networks (e.g., efficiency and the Internet ofmore » Things) provides significantly less isolation for ICS from the outside world thus creating greater risk due to external threats. Albeit, the availability of ICS/SCADA systems is critical to assuring safety, security and profitability. Such systems form the backbone of our national cyber-physical infrastructure.Herein, we extend the concept of mean failure cost (MFC) to address quantifying availability to harmonize well with ICS security risk assessment. This new measure is based on the classic formulation of Availability combined with Mean Failure Cost (MFC). Finally, the metric offers a computational basis to estimate the availability of a system in terms of the loss that each stakeholder stands to sustain as a result of security violations or breakdowns (e.g., deliberate malicious failures).« less

  6. Lost Hills Field Trial - incorporating new technology for resevoir management

    NASA Technical Reports Server (NTRS)

    Fielding, E. J.; Brink, J. L.; Patzek, T. W.; Silin, D. B.

    2002-01-01

    This paper will discuss how Chevron U.S.A. Production Company is implementing a field trial that will use Supervisory Control and Data Acquisition (SCADA)on injection wells, in conjunction with satellite images to measure ground elevation changes, to perform real-time resevoir management in the Lost Hills Field.

  7. Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System

    DTIC Science & Technology

    2016-03-31

    for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

  8. Secure Control Systems for the Energy Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less

  9. Modeling of a data exchange process in the Automatic Process Control System on the base of the universal SCADA-system

    NASA Astrophysics Data System (ADS)

    Topolskiy, D.; Topolskiy, N.; Solomin, E.; Topolskaya, I.

    2016-04-01

    In the present paper the authors discuss some ways of solving energy saving problems in mechanical engineering. In authors' opinion one of the ways of solving this problem is integrated modernization of power engineering objects of mechanical engineering companies, which should be intended for the energy supply control efficiency increase and electric energy commercial accounting improvement. The author have proposed the usage of digital current and voltage transformers for these purposes. To check the compliance of this equipment with the IEC 61850 International Standard, we have built a mathematic model of the data exchange process between measuring transformers and a universal SCADA-system. The results of modeling show that the discussed equipment corresponds to the mentioned Standard requirements and the usage of the universal SCADA-system for these purposes is preferable and economically reasonable. In modeling the authors have used the following software: MasterScada, Master OPC_DI_61850, OPNET.

  10. Analysis of a SCADA System Anomaly Detection Model Based on Information Entropy

    DTIC Science & Technology

    2014-03-27

    20 Intrusion Detection...alarms ( Rem ). ............................................................................................................. 86 Figure 25. TP% for...literature concerning the focus areas of this research. The focus areas include SCADA vulnerabilities, information theory, and intrusion detection

  11. Creating a Network Model for the Integration of a Dynamic and Static Supervisory Control and Data Acquisition (SCADA) Test Environment

    DTIC Science & Technology

    2011-03-01

    they can continue to leverage these capabilities (building Smart Grid infrastructure and providing Internet connectivity to every home ) while ensuring...21  Figure 9. Smart Grid Interoperability .............................................................................. 22  Figure 10. Smart ...Grid Integration .................................................................................... 24  Figure 11. National Smart Grid Initiatives

  12. Automatically Identifying and Predicting Unplanned Wind Turbine Stoppages Using SCADA and Alarms System Data: Case Study and Results

    NASA Astrophysics Data System (ADS)

    Leahy, Kevin; Gallagher, Colm; Bruton, Ken; O'Donovan, Peter; O'Sullivan, Dominic T. J.

    2017-11-01

    Using 10-minute wind turbine SCADA data for fault prediction offers an attractive way of gaining additional prognostic capabilities without needing to invest in extra hardware. To use these data-driven methods effectively, the historical SCADA data must be labelled with the periods when the turbine was in faulty operation as well the sub-system the fault was attributed to. Manually identifying faults using maintenance logs can be effective, but is also highly time consuming and tedious due to the disparate nature of these logs across manufacturers, operators and even individual maintenance events. Turbine alarm systems can help to identify these periods, but the sheer volume of alarms and false positives generated makes analysing them on an individual basis ineffective. In this work, we present a new method for automatically identifying historical stoppages on the turbine using SCADA and alarms data. Each stoppage is associated with either a fault in one of the turbine’s sub-systems, a routine maintenance activity, a grid-related event or a number of other categories. This is then checked against maintenance logs for accuracy and the labelled data fed into a classifier for predicting when these stoppages will occur. Results show that the automated labelling process correctly identifies each type of stoppage, and can be effectively used for SCADA-based prediction of turbine faults.

  13. Collegiate Cyber Defense Competition Effort

    DTIC Science & Technology

    2018-03-01

    Energy – an electrical utility company. • 2016 : ODIN Security – a small aerospace and defense contracting firm Approved for Public Release...to secure supervisory control and data acquisition (SCADA) networks. Approved for Public Release; Distribution Unlimited 7 During the 2016 NCCDC...COLLEGIATE CYBER DEFENSE COMPETITION EFFORT UNIVERSITY OF TEXAS AT SAN ANTONIO MARCH 2018 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  14. How Accurate Is A Hydraulic Model? | Science Inventory | US ...

    EPA Pesticide Factsheets

    Symposium paper Network hydraulic models are widely used, but their overall accuracy is often unknown. Models are developed to give utilities better insight into system hydraulic behavior, and increasingly the ability to predict the fate and transport of chemicals. Without an accessible and consistent means of validating a given model against the system it is meant to represent, the value of those supposed benefits should be questioned. Supervisory Control And Data Acquisition (SCADA) databases, though ubiquitous, are underused data sources for this type of task. Integrating a network model with a measurement database would offer professionals the ability to assess the model’s assumptions in an automated fashion by leveraging enormous amounts of data.

  15. Scada Malware, a Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such complex critical systems. Of particular interest are the set of vulnerabilities related to the class of communication protocols normally known as “SCADA” protocols, under which fall all the communication protocols used to remotely control the RTU devices of an industrial system. In this paper we present a proof of concept of the potential effects of a set of computer malware specifically designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.

  16. An automated LS(β)- NaI(Tl)(γ) coincidence system as absolute standard for radioactivity measurements.

    PubMed

    Joseph, Leena; Das, A P; Ravindra, Anuradha; Kulkarni, D B; Kulkarni, M S

    2018-07-01

    4πβ-γ coincidence method is a powerful and widely used method to determine the absolute activity concentration of radioactive solutions. A new automated liquid scintillator based coincidence system has been designed, developed, tested and established as absolute standard for radioactivity measurements. The automation is achieved using PLC (programmable logic controller) and SCADA (supervisory control and data acquisition). Radioactive solution of 60 Co was standardized to compare the performance of the automated system with proportional counter based absolute standard maintained in the laboratory. The activity concentrations determined using these two systems were in very good agreement; the new automated system can be used for absolute measurement of activity concentration of radioactive solutions. Copyright © 2018. Published by Elsevier Ltd.

  17. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yan, Guanhua; Nicol, David M; Jin, Dong

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relaymore » is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.« less

  18. Resilient Control and Intrusion Detection for SCADA Systems

    DTIC Science & Technology

    2014-05-01

    Control. McGraw-Hill, 1996. [89] L. Greenemeier. Robots arrive at fukushima nuclear site with unclear mission. Scientific American, 2011. [90] M. Grimes...security engineering task. SCADA systems are hard real-time systems [251] because the completion of an operation after its deadline is considered useless and...that the attacker, after gaining unauthenticated access, could change the operator display values so that when an alarm actually goes off, the human

  19. Application of the SCADA system in wastewater treatment plants.

    PubMed

    Dieu, B

    2001-01-01

    The implementation of the SCADA system has a positive impact on the operations, maintenance, process improvement and savings for the City of Houston's Wastewater Operations branch. This paper will discuss the system's evolvement, the external/internal architecture, and the human-machine-interface graphical design. Finally, it will demonstrate the system's successes in monitoring the City's sewage and sludge collection/distribution systems, wet-weather facilities and wastewater treatment plants, complying with the USEPA requirements on the discharge, and effectively reducing the operations and maintenance costs.

  20. Operational uses of ACTS technology

    NASA Astrophysics Data System (ADS)

    Gedney, Richard T.; Wright, David L.; Balombin, Joseph L.; Sohn, Philip Y.; Cashman, William F.; Stern, Alan L.; Golding, Len; Palmer, Larry

    1992-03-01

    The NASA Advanced Communications Technology Satellite (ACTS) provides the technologies for very high gain hopping spot beam antennas, on-board baseband routing and processing, and wideband (1 GHz) Ka-band transponders. A number of studies have recently been completed using the experience gained in developing the actual ACTS system hardware to quantify how well the ACTS technology can be used in future operational systems. This paper provides a summary of these study results including the spacecraft (S/C) weight per unit circuit for providing services by ACTS technologies as compared to present-day satellites. The uses of the ACTS technology discussed are for providing T1 VSAT mesh networks, aeronautical mobile communications, supervisory control and data acquisition (SCADA) services, and high data rate networks for supercomputer and other applications.

  1. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-01-01

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. PMID:26950129

  2. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-03-03

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

  3. ADMS State of the Industry and Gap Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agalgaonkar, Yashodhan P.; Marinovici, Maria C.; Vadari, Subramanian V.

    2016-03-31

    An Advanced distribution management system (ADMS) is a platform for optimized distribution system operational management. This platform comprises of distribution management system (DMS) applications, supervisory control and data acquisition (SCADA), outage management system (OMS), and distributed energy resource management system (DERMS). One of the primary objectives of this work is to study and analyze several ADMS component and auxiliary systems. All the important component and auxiliary systems, SCADA, GISs, DMSs, AMRs/AMIs, OMSs, and DERMS, are discussed in this report. Their current generation technologies are analyzed, and their integration (or evolution) with an ADMS technology is discussed. An ADMS technology statemore » of the art and gap analysis is also presented. There are two technical gaps observed. The integration challenge between the component operational systems is the single largest challenge for ADMS design and deployment. Another significant challenge noted is concerning essential ADMS applications, for instance, fault location, isolation, and service restoration (FLISR), volt-var optimization (VVO), etc. There are a relatively small number of ADMS application developers as ADMS software platform is not open source. There is another critical gap and while not being technical in nature (when compared the two above) is still important to consider. The data models currently residing in utility GIS systems are either incomplete or inaccurate or both. This data is essential for planning and operations because it is typically one of the primary sources from which power system model are created. To achieve the full potential of ADMS, the ability to execute acute Power Flow solution is an important pre-requisite. These critical gaps are hindering wider Utility adoption of an ADMS technology. The development of an open architecture platform can eliminate many of these barriers and also aid seamless integration of distribution Utility legacy systems with an ADMS.« less

  4. A Robust State Estimation Framework Considering Measurement Correlations and Imperfect Synchronization

    DOE PAGES

    Zhao, Junbo; Wang, Shaobu; Mili, Lamine; ...

    2018-01-08

    Here, this paper develops a robust power system state estimation framework with the consideration of measurement correlations and imperfect synchronization. In the framework, correlations of SCADA and Phasor Measurements (PMUs) are calculated separately through unscented transformation and a Vector Auto-Regression (VAR) model. In particular, PMU measurements during the waiting period of two SCADA measurement scans are buffered to develop the VAR model with robustly estimated parameters using projection statistics approach. The latter takes into account the temporal and spatial correlations of PMU measurements and provides redundant measurements to suppress bad data and mitigate imperfect synchronization. In case where the SCADAmore » and PMU measurements are not time synchronized, either the forecasted PMU measurements or the prior SCADA measurements from the last estimation run are leveraged to restore system observability. Then, a robust generalized maximum-likelihood (GM)-estimator is extended to integrate measurement error correlations and to handle the outliers in the SCADA and PMU measurements. Simulation results that stem from a comprehensive comparison with other alternatives under various conditions demonstrate the benefits of the proposed framework.« less

  5. A Robust State Estimation Framework Considering Measurement Correlations and Imperfect Synchronization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhao, Junbo; Wang, Shaobu; Mili, Lamine

    Here, this paper develops a robust power system state estimation framework with the consideration of measurement correlations and imperfect synchronization. In the framework, correlations of SCADA and Phasor Measurements (PMUs) are calculated separately through unscented transformation and a Vector Auto-Regression (VAR) model. In particular, PMU measurements during the waiting period of two SCADA measurement scans are buffered to develop the VAR model with robustly estimated parameters using projection statistics approach. The latter takes into account the temporal and spatial correlations of PMU measurements and provides redundant measurements to suppress bad data and mitigate imperfect synchronization. In case where the SCADAmore » and PMU measurements are not time synchronized, either the forecasted PMU measurements or the prior SCADA measurements from the last estimation run are leveraged to restore system observability. Then, a robust generalized maximum-likelihood (GM)-estimator is extended to integrate measurement error correlations and to handle the outliers in the SCADA and PMU measurements. Simulation results that stem from a comprehensive comparison with other alternatives under various conditions demonstrate the benefits of the proposed framework.« less

  6. Model-based approach for cyber-physical attack detection in water distribution systems.

    PubMed

    Housh, Mashor; Ohar, Ziv

    2018-08-01

    Modern Water Distribution Systems (WDSs) are often controlled by Supervisory Control and Data Acquisition (SCADA) systems and Programmable Logic Controllers (PLCs) which manage their operation and maintain a reliable water supply. As such, and with the cyber layer becoming a central component of WDS operations, these systems are at a greater risk of being subjected to cyberattacks. This paper offers a model-based methodology based on a detailed hydraulic understanding of WDSs combined with an anomaly detection algorithm for the identification of complex cyberattacks that cannot be fully identified by hydraulically based rules alone. The results show that the proposed algorithm is capable of achieving the best-known performance when tested on the data published in the BATtle of the Attack Detection ALgorithms (BATADAL) competition (http://www.batadal.net). Copyright © 2018. Published by Elsevier Ltd.

  7. Providing Situational Awareness for Pipeline Control Operations

    NASA Astrophysics Data System (ADS)

    Butts, Jonathan; Kleinhans, Hugo; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet

    A SCADA system for a single 3,000-mile-long strand of oil or gas pipeline may employ several thousand field devices to measure process parameters and operate equipment. Because of the vital tasks performed by these sensors and actuators, pipeline operators need accurate and timely information about their status and integrity. This paper describes a realtime scanner that provides situational awareness about SCADA devices and control operations. The scanner, with the assistance of lightweight, distributed sensors, analyzes SCADA network traffic, verifies the operational status and integrity of field devices, and identifies anomalous activity. Experimental results obtained using real pipeline control traffic demonstrate the utility of the scanner in industrial settings.

  8. Online location of a break in water distribution systems

    NASA Astrophysics Data System (ADS)

    Liang, Jianwen; Xiao, Di; Zhao, Xinhua; Zhang, Hongwei

    2003-08-01

    Breaks often occur to urban water distribution systems under severely cold weather, or due to corrosion of pipes, deformation of ground, etc., and the breaks cannot easily be located, especially immediately after the events. This paper develops a methodology to locate a break in a water distribution system by monitoring water pressure online at some nodes in the water distribution system. For the purpose of online monitoring, supervisory control and data acquisition (SCADA) technology can well be used. A neural network-based inverse analysis method is constructed for locating the break based on the variation of water pressure. The neural network is trained by using analytically simulated data from the water distribution system, and validated by using a set of data that have never been used in the training. It is found that the methodology provides a quick, effective, and practical way in which a break in a water distribution system can be located.

  9. Infrastructure Vulnerability Assessment Model (I-VAM).

    PubMed

    Ezell, Barry Charles

    2007-06-01

    Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. The model requires subject matter experts (SMEs) to establish value functions and weights, and to assess protection measures of the system. Simulation is used to account for uncertainty in measurement, aggregate expert assessment, and to yield a vulnerability (Omega) density function. Results demonstrate that I-VAM is useful to decisionmakers who prefer quantification to qualitative treatment of vulnerability. I-VAM can be used to quantify vulnerability to other infrastructures, supervisory control and data acquisition systems (SCADA), and distributed control systems (DCS).

  10. Mitigation of the consequence of seismically induced damage on a utility water network by means of next generation SCADA

    NASA Astrophysics Data System (ADS)

    Robertson, Jamie; Shinozuka, Masanobu; Wu, Felix

    2011-04-01

    When a lifeline system such as a water delivery network is damaged due to a severe earthquake, it is critical to identify its location and extent of the damage in real time in order to minimize the potentially disastrous consequence such damage could otherwise entail. This paper demonstrates how the degree of such minimization can be estimated qualitatively by using the water delivery system of Irvine Water Ranch District (IRWD) as testbed, when it is subjected to magnitude 6.6 San Joaquin Hills Earthquake. In this demonstration, we consider two cases when the IRWD system is equipped or not equipped with a next generation SCADA which consists of a network of MEMS acceleration sensors densely populated and optimally located. These sensors are capable of identifying the location and extent of the damage as well as transmitting the data to the SCADA center for monitoring and control.

  11. PV-Diesel Hybrid SCADA Experiment Network Design

    NASA Technical Reports Server (NTRS)

    Kalu, Alex; Durand, S.; Emrich, Carol; Ventre, G.; Wilson, W.; Acosta, R.

    1999-01-01

    The essential features of an experimental network for renewable power system satellite based supervisory, control and data acquisition (SCADA) are communication links, controllers, diagnostic equipment and a hybrid power system. Required components for implementing the network consist of two satellite ground stations, to satellite modems, two 486 PCs, two telephone receivers, two telephone modems, two analog telephone lines, one digital telephone line, a hybrid-power system equipped with controller and a satellite spacecraft. In the technology verification experiment (TVE) conducted by Savannah State University and Florida Solar Energy Center, the renewable energy hybrid system is the Apex-1000 Mini-Hybrid which is equipped with NGC3188 for user interface and remote control and the NGC2010 for monitoring and basic control tasks. This power system is connected to a satellite modem via a smart interface, RS232. Commands are sent to the power system control unit through a control PC designed as PC1. PC1 is thus connected to a satellite model through RS232. A second PC, designated PC2, the diagnostic PC is connected to both satellite modems via separate analog telephone lines for checking modems'health. PC2 is also connected to PC1 via a telephone line. Due to the unavailability of a second ground station for the ACTS, one ground station is used to serve both the sending and receiving functions in this experiment. Signal is sent from the control PC to the Hybrid system at a frequency f(sub 1), different from f(sub 2), the signal from the hybrid system to the control PC. f(sub l) and f(sub 2) are sufficiently separated to avoid interference.

  12. SCADA data and the quantification of hazardous events for QMRA.

    PubMed

    Nilsson, P; Roser, D; Thorwaldsdotter, R; Petterson, S; Davies, C; Signor, R; Bergstedt, O; Ashbolt, N

    2007-01-01

    The objective of this study was to assess the use of on-line monitoring to support the QMRA at water treatment plants studied in the EU MicroRisk project. SCADA data were obtained from three Catchment-to-Tap Systems (CTS) along with system descriptions, diary records, grab sample data and deviation reports. Particular attention was paid to estimating hazardous event frequency, duration and magnitude. Using Shewart and CUSUM we identified 'change-points' corresponding to events of between 10 min and >1 month duration in timeseries data. Our analysis confirmed it is possible to quantify hazardous event durations from turbidity, chlorine residual and pH records and distinguish them from non-hazardous variability in the timeseries dataset. The durations of most 'events' were short-term (0.5-2.3 h). These data were combined with QMRA to estimate pathogen infection risk arising from such events as chlorination failure. While analysis of SCADA data alone could identify events provisionally, its interpretation was severely constrained in the absence of diary records and other system information. SCADA data analysis should only complement traditional water sampling, rather than replace it. More work on on-line data management, quality control and interpretation is needed before it can be used routinely for event characterization.

  13. Integrity Verification for SCADA Devices Using Bloom Filters and Deep Packet Inspection

    DTIC Science & Technology

    2014-03-27

    prevent intrusions in smart grids [PK12]. Parthasarathy proposed an anomaly detection based IDS that takes into account system state. In his implementation...Security, 25(7):498–506, 10 2006. [LMV12] O. Linda, M. Manic, and T. Vollmer. Improving cyber-security of smart grid systems via anomaly detection and...6 2012. 114 [PK12] S. Parthasarathy and D. Kundur. Bloom filter based intrusion detection for smart grid SCADA. In Electrical & Computer Engineering

  14. Enhancing the cyber-security of smart grids with applications to synchrophasor data

    NASA Astrophysics Data System (ADS)

    Pal, Seemita

    In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of packet-drops and finally detect attacks, if any. In the case of PMU data manipulation attacks, the attacker may modify the data in the PMU packets in order to bias the system states and influence the control center into taking wrong decisions. The proposed detection technique is based on evaluating the equivalent impedances of the transmission lines and classifying the observed anomalies to determine the presence of attack and its location. The scheme for detecting data integrity attacks on SCADA systems is based on utilizing synchrophasor measurements from available PMUs in the grid. The proposed method uses a difference measure, developed in this thesis, to determine the relative divergence and mis-correlation between the datasets. Based on the estimated difference measure, tampered and genuine data can be distinguished. The proposed detection mechanisms have demonstrated high accuracy in real-time detection of attacks of various magnitudes, simulated on real PMU data obtained from the NY grid. By performing alarm clustering, the occurrence of false alarms has been reduced to almost zero. The solutions are computationally inexpensive, low on cost, do not add any overhead, and do not require any feedback from the network.

  15. An analysis of offshore wind farm SCADA measurements to identify key parameters influencing the magnitude of wake effects

    NASA Astrophysics Data System (ADS)

    Mittelmeier, N.; Blodau, T.; Steinfeld, G.; Rott, A.; Kühn, M.

    2016-09-01

    Atmospheric conditions have a clear influence on wake effects. Stability classification is usually based on wind speed, turbulence intensity, shear and temperature gradients measured partly at met masts, buoys or LiDARs. The objective of this paper is to find a classification for stability based on wind turbine Supervisory Control and Data Acquisition (SCADA) measurements in order to fit engineering wake models better to the current ambient conditions. Two offshore wind farms with met masts have been used to establish a correlation between met mast stability classification and new aggregated statistical signals based on multiple measurement devices. The significance of these new signals on power production is demonstrated for two wind farms with met masts and validated against data from one further wind farm without a met mast. We found a good correlation between the standard deviation of active power divided by the average power of wind turbines in free flow with the ambient turbulence intensity when the wind turbines were operating in partial load.

  16. Modeling And Detecting Anomalies In Scada Systems

    NASA Astrophysics Data System (ADS)

    Svendsen, Nils; Wolthusen, Stephen

    The detection of attacks and intrusions based on anomalies is hampered by the limits of specificity underlying the detection techniques. However, in the case of many critical infrastructure systems, domain-specific knowledge and models can impose constraints that potentially reduce error rates. At the same time, attackers can use their knowledge of system behavior to mask their manipulations, causing adverse effects to observed only after a significant period of time. This paper describes elementary statistical techniques that can be applied to detect anomalies in critical infrastructure networks. A SCADA system employed in liquefied natural gas (LNG) production is used as a case study.

  17. Critical Infrastructure: Control Systems and the Terrorist Threat

    DTIC Science & Technology

    2004-01-20

    Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...http://www.pnl.gov/main/sectors/homeland.html]. 68 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ,” Sandia Report SAND2002...and Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to

  18. Critical Infrastructure: Control Systems and the Terrorist Threat

    DTIC Science & Technology

    2003-07-14

    Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...available online at [http://www.pnl.gov/main/sectors/homeland.html]. 56 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ...Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to

  19. Development and Demonstration of a Security Core Component

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turke, Andy

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more datamore » about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.« less

  20. Online monitoring of seismic damage in water distribution systems

    NASA Astrophysics Data System (ADS)

    Liang, Jianwen; Xiao, Di; Zhao, Xinhua; Zhang, Hongwei

    2004-07-01

    It is shown that water distribution systems can be damaged by earthquakes, and the seismic damages cannot easily be located, especially immediately after the events. Earthquake experiences show that accurate and quick location of seismic damage is critical to emergency response of water distribution systems. This paper develops a methodology to locate seismic damage -- multiple breaks in a water distribution system by monitoring water pressure online at limited positions in the water distribution system. For the purpose of online monitoring, supervisory control and data acquisition (SCADA) technology can well be used. A neural network-based inverse analysis method is constructed for locating the seismic damage based on the variation of water pressure. The neural network is trained by using analytically simulated data from the water distribution system, and validated by using a set of data that have never been used in the training. It is found that the methodology provides an effective and practical way in which seismic damage in a water distribution system can be accurately and quickly located.

  1. Behavioral Profiling of Scada Network Traffic Using Machine Learning Algorithms

    DTIC Science & Technology

    2014-03-27

    BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ALGORITHMS THESIS Jessica R. Werling, Captain, USAF AFIT-ENG-14-M-81 DEPARTMENT...subject to copyright protection in the United States. AFIT-ENG-14-M-81 BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ...AFIT-ENG-14-M-81 BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ALGORITHMS Jessica R. Werling, B.S.C.S. Captain, USAF Approved

  2. Long-term monitoring of a cable stayed bridge using a SCADA system

    NASA Astrophysics Data System (ADS)

    Torbol, Marco; Kim, Sehwan; Shinozuka, Masanobu

    2012-04-01

    DuraMote is a MEMS-based remote sensing system, which is developed for the NIST TIP project, Next Generation SCADA for Prevention and Mitigation of Water System Infrastructure Disaster. It is designed for supervisory control and data acquisition (SCADA) of pipe ruptures in water distribution systems. In this project, a method is developed to detect the pipe ruptures by analyzing the acceleration data gathered by DuraMote which consists of two primary components; the first, "Gopher" contains the accelerometers and are attached to the water pipe surface noninvasively, and the second, "Roocas" is placed above ground supplying the power to, and retrieving the data from the multiple Gophers, and then transmit the data through Wi-Fi to a base station. The relays support the Wi-Fi network to facilitate the transmission. A large scale bridge provides an ideal test-bet to validate the performance of such a complex monitoring system as DuraMote for its accuracy, reliability, robustness, and user friendliness. This is because a large bridge is most of the time subjected to susceptible level of ambient vibration due to passing loads, wind, etc. DuraMote can record the acceleration time history arising from the vibration making it possible to estimate the frequency values of various bridge vibration modes. These estimated frequency values are then compared with the values computed from analytical model of the bridge for the verification of the accuracy of DuraMote. It is noted that such a verification method cannot be used practically by deploying DuraMote on a water distribution network since the dynamic behavior of a pipe network, either above or underground, is too complex to model analytically for this purpose, and in addition, the network generally lacks conveniently recordable ambient vibration. In this experiment, the performance of DuraMote system was tested being installed on the Hwamyung Bridge, a 500 m long RC cable stayed bridge in Korea for long term monitoring. In total, the system consisted of 24 accelerometers, 13 Gophers, 10 Roocas, 5 relays, and 1 base station. As it happened, the bridge was subjected to heavy rain, winds, and a typhoon during the experiment allowing the DuraMote to demonstrate extra ordinary robustness and durability. Indeed, in spite of the rough weather, acceleration data was continuously recorded from which natural frequencies, mode shapes, and other structural parameters were calculated. This opportunity would not have happened if the experiment was planned for a shorter duration.

  3. Control of Smart Building Using Advanced SCADA

    NASA Astrophysics Data System (ADS)

    Samuel, Vivin Thomas

    For complete control of the building, a proper SCADA implementation and the optimization strategy has to be build. For better communication and efficiency a proper channel between the Communication protocol and SCADA has to be designed. This paper concentrate mainly between the communication protocol, and the SCADA implementation, for a better optimization and energy savings is derived to large scale industrial buildings. The communication channel used in order to completely control the building remotely from a distant place. For an efficient result we consider the temperature values and the power ratings of the equipment so that while controlling the equipment, we are setting a threshold values for FDD technique implementation. Building management system became a vital source for any building to maintain it and for safety purpose. Smart buildings, refers to various distinct features, where the complete automation system, office building controls, data center controls. ELC's are used to communicate the load values of the building to the remote server from a far location with the help of an Ethernet communication channel. Based on the demand fluctuation and the peak voltage, the loads operate differently increasing the consumption rate thus results in the increase in the annual consumption bill. In modern days, saving energy and reducing the consumption bill is most essential for any building for a better and long operation. The equipment - monitored regularly and optimization strategy is implemented for cost reduction automation system. Thus results in the reduction of annual cost reduction and load lifetime increase.

  4. Real-Time Earthquake Risk Mitigation Of Infrastructures Using Istanbul Earthquake Early Warning and Rapid Response Network

    NASA Astrophysics Data System (ADS)

    Zulfikar, Can; Pinar, Ali; Tunc, Suleyman; Erdik, Mustafa

    2014-05-01

    The Istanbul EEW network consisting of 10 inland and 5 OBS strong motion stations located close to the Main Marmara Fault zone is operated by KOERI. Data transmission between the remote stations and the base station at KOERI is provided both with satellite and fiber optic cable systems. The continuous on-line data from these stations is used to provide real time warning for emerging potentially disastrous earthquakes. The data transmission time from the remote stations to the KOERI data center is a few milliseconds through fiber optic lines and less than a second via satellites. The early warning signal (consisting three alarm levels) is communicated to the appropriate servo shut-down systems of the receipent facilities, that automatically decide proper action based on the alarm level. Istanbul Gas Distribution Corporation (IGDAS) is one of the end users of the EEW signal. IGDAS, the primary natural gas provider in Istanbul, operates an extensive system 9,867 km of gas lines with 550 district regulators and 474,000 service boxes. State of-the-art protection systems automatically cut natural gas flow when breaks in the pipelines are detected. Since 2005, buildings in Istanbul using natural gas are required to install seismometers that automatically cut natural gas flow when certain thresholds are exceeded. IGDAS uses a sophisticated SCADA (supervisory control and data acquisition) system to monitor the state-of-health of its pipeline network. This system provides real-time information about quantities related to pipeline monitoring, including input-output pressure, drawing information, positions of station and RTU (remote terminal unit) gates, slum shut mechanism status at 581 district regulator sites. The SCADA system of IGDAŞ receives the EEW signal from KOERI and decide the proper actions according to the previously specified ground acceleration levels. Presently, KOERI sends EEW signal to the SCADA system of IGDAS Natural Gas Network of Istanbul. The EEW signal of KOERI is also transmitted to the serve shut down system of the Marmaray Rail Tube Tunnel and Commuter Rail Mass Transit System in Istanbul. The Marmaray system includes an undersea railway tunnel under the Bosphorus Strait. Several strong motion instruments are installed within the tunnel for taking measurements against strong ground shaking and early warning purposes. This system is integrated with the KOERI EEW System. KOERI sends the EEW signal to the command center of Marmaray. Having received the signal, the command center put into action the previously defined measurements. For example, the trains within the tunnel will be stopped at the nearest station, no access to the tunnel will be allowed to the trains approaching the tunnel, water protective caps will be closed to protect flood closing the connection between the onshore and offshore tunnels.

  5. The ALICE-HMPID Detector Control System: Its evolution towards an expert and adaptive system

    NASA Astrophysics Data System (ADS)

    De Cataldo, G.; Franco, A.; Pastore, C.; Sgura, I.; Volpe, G.

    2011-05-01

    The High Momentum Particle IDentification (HMPID) detector is a proximity focusing Ring Imaging Cherenkov (RICH) for charged hadron identification. The HMPID is based on liquid C 6F 14 as the radiator medium and on a 10 m 2 CsI coated, pad segmented photocathode of MWPCs for UV Cherenkov photon detection. To ensure full remote control, the HMPID is equipped with a detector control system (DCS) responding to industrial standards for robustness and reliability. It has been implemented using PVSS as Slow Control And Data Acquisition (SCADA) environment, Programmable Logic Controller as control devices and Finite State Machines for modular and automatic command execution. In the perspective of reducing human presence at the experiment site, this paper focuses on DCS evolution towards an expert and adaptive control system, providing, respectively, automatic error recovery and stable detector performance. HAL9000, the first prototype of the HMPID expert system, is then presented. Finally an analysis of the possible application of the adaptive features is provided.

  6. Controlling front-end electronics boards using commercial solutions

    NASA Astrophysics Data System (ADS)

    Beneyton, R.; Gaspar, C.; Jost, B.; Schmeling, S.

    2002-04-01

    LHCb is a dedicated B-physics experiment under construction at CERN's large hadron collider (LHC) accelerator. This paper will describe the novel approach LHCb is taking toward controlling and monitoring of electronics boards. Instead of using the bus in a crate to exercise control over the boards, we use credit-card sized personal computers (CCPCs) connected via Ethernet to cheap control PCs. The CCPCs will provide a simple parallel, I2C, and JTAG buses toward the electronics board. Each board will be equipped with a CCPC and, hence, will be completely independently controlled. The advantages of this scheme versus the traditional bus-based scheme will be described. Also, the integration of the controls of the electronics boards into a commercial supervisory control and data acquisition (SCADA) system will be shown.

  7. A Data Quality Filter for PMU Measurements: Description, Experience, and Examples

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Follum, James D.; Amidan, Brett G.

    Networks of phasor measurement units (PMUs) continue to grow, and along with them, the amount of data available for analysis. With so much data, it is impractical to identify and remove poor quality data manually. The data quality filter described in this paper was developed for use with the Data Integrity and Situation Awareness Tool (DISAT), which analyzes PMU data to identify anomalous system behavior. The filter operates based only on the information included in the data files, without supervisory control and data acquisition (SCADA) data, state estimator values, or system topology information. Measurements are compared to preselected thresholds tomore » determine if they are reliable. Along with the filter's description, examples of data quality issues from application of the filter to nine months of archived PMU data are provided. The paper is intended to aid the reader in recognizing and properly addressing data quality issues in PMU data.« less

  8. Computer assisted operations in Petroleum Development Oman (PDO)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Al-Hinai, S.H.; Mutimer, K.

    1995-10-01

    Petroleum Development Oman (PDO) currently produces some 750,000 bopd and 900,000 bwpd from some 74 fields in a large geographical area and diverse operating conditions. A key corporate objective is to reduce operating costs by exploiting productivity gains from proven technology. Automation is seen as a means of managing the rapid growth of well population and production facilities. the overall objective is to improve field management through continuous monitoring of wells and facilities and dissemination of data throughout the whole organization. A major upgrade of PDO`s field Supervisory Control and Data Acquisition (SCADA) system is complete providing a platform tomore » exploit new initiatives particularly for production optimization of artificial lift systems and automatic well testing using multi selector valves, coriolis flow meter measurements and multi component (oil, gas, water) flowmeter. The paper describes PDO`s experience including benefits and challenges which have to be managed when developing Computer Assisted Operations (CAO).« less

  9. Analysis of data throughput in communication between PLCs and HMI/SCADA systems

    NASA Astrophysics Data System (ADS)

    Mikolajek, Martin; Koziorek, Jiri

    2016-09-01

    This paper is focused on Analysis of data throughout in communication between PLCs and HMI/SCADA systems. The first part of paper discusses basic problematic communication between PLC and HMI systems. Next part is about specific types of communications PLC - HMI requests. For those cases paper is talking about response and data throughput1-3 . Subsequent section of this article contains practical parts with various data exchanges between PLC Siemens and HMI. The possibilities of communication that are described in this article are focused on using OPC server for visualization software, custom HMI system and own application created by using .NET with Technology. The last part of this article contains some communication solutions.

  10. FDI and Accommodation Using NN Based Techniques

    NASA Astrophysics Data System (ADS)

    Garcia, Ramon Ferreiro; de Miguel Catoira, Alberto; Sanz, Beatriz Ferreiro

    Massive application of dynamic backpropagation neural networks is used on closed loop control FDI (fault detection and isolation) tasks. The process dynamics is mapped by means of a trained backpropagation NN to be applied on residual generation. Process supervision is then applied to discriminate faults on process sensors, and process plant parameters. A rule based expert system is used to implement the decision making task and the corresponding solution in terms of faults accommodation and/or reconfiguration. Results show an efficient and robust FDI system which could be used as the core of an SCADA or alternatively as a complement supervision tool operating in parallel with the SCADA when applied on a heat exchanger.

  11. Implementation method of multi-terminal DC control system

    NASA Astrophysics Data System (ADS)

    Yi, Liu; Hao-Ran, Huang; Jun-Wen, Zhou; Hong-Guang, Guo; Yu-Yong, Zhou

    2018-04-01

    Currently the multi-terminal DC system (MTDC) has more stations. Each station needs operators to monitor and control the device. It needs much more operation and maintenance, low efficiency and small reliability; for the most important reason, multi-terminal DC system has complex control mode. If one of the stations has some problem, the control of the whole system should have problems. According to research of the characteristics of multi-terminal DC (VSC-MTDC) systems, this paper presents a strong implementation of the multi-terminal DC Supervisory Control and Data Acquisition (SCADA) system. This system is intelligent, can be networking, integration and intelligent. A master control system is added in each station to communication with the other stations to send current and DC voltage value to pole control system for each station. Based on the practical application and information feedback in the China South Power Grid research center VSC-MTDC project, this system is higher efficiency and save the cost on the maintenance of convertor station to improve the intelligent level and comprehensive effect. And because of the master control system, a multi-terminal system hierarchy coordination control strategy is formed, this make the control and protection system more efficiency and reliability.

  12. Detector Control System for the AFP detector in ATLAS experiment at CERN

    NASA Astrophysics Data System (ADS)

    Banaś, E.; Caforio, D.; Czekierda, S.; Hajduk, Z.; Olszowska, J.; Seabra, L.; Šícho, P.

    2017-10-01

    The ATLAS Forward Proton (AFP) detector consists of two forward detectors located at 205 m and 217 m on either side of the ATLAS experiment. The aim is to measure the momenta and angles of diffractively scattered protons. In 2016, two detector stations on one side of the ATLAS interaction point were installed and commissioned. The detector infrastructure and necessary services were installed and are supervised by the Detector Control System (DCS), which is responsible for the coherent and safe operation of the detector. A large variety of used equipment represents a considerable challenge for the AFP DCS design. Industrial Supervisory Control and Data Acquisition (SCADA) product Siemens WinCCOA, together with the CERN Joint Control Project (JCOP) framework and standard industrial and custom developed server applications and protocols are used for reading, processing, monitoring and archiving of the detector parameters. Graphical user interfaces allow for overall detector operation and visualization of the detector status. Parameters, important for the detector safety, are used for alert generation and interlock mechanisms.

  13. Metrics for the National SCADA Test Bed Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  14. A Fault Recognition System for Gearboxes of Wind Turbines

    NASA Astrophysics Data System (ADS)

    Yang, Zhiling; Huang, Haiyue; Yin, Zidong

    2017-12-01

    Costs of maintenance and loss of power generation caused by the faults of wind turbines gearboxes are the main components of operation costs for a wind farm. Therefore, the technology of condition monitoring and fault recognition for wind turbines gearboxes is becoming a hot topic. A condition monitoring and fault recognition system (CMFRS) is presented for CBM of wind turbines gearboxes in this paper. The vibration signals from acceleration sensors at different locations of gearbox and the data from supervisory control and data acquisition (SCADA) system are collected to CMFRS. Then the feature extraction and optimization algorithm is applied to these operational data. Furthermore, to recognize the fault of gearboxes, the GSO-LSSVR algorithm is proposed, combining the least squares support vector regression machine (LSSVR) with the Glowworm Swarm Optimization (GSO) algorithm. Finally, the results show that the fault recognition system used in this paper has a high rate for identifying three states of wind turbines’ gears; besides, the combination of date features can affect the identifying rate and the selection optimization algorithm presented in this paper can get a pretty good date feature subset for the fault recognition.

  15. Evaluation of Traditional Security Solutions in the SCADA Environment

    DTIC Science & Technology

    2012-03-01

    Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Robert D. Larkin, Captain, USAF AFIT/GCO/ENG/12-06 DEPARTMENT OF THE AIR...views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department...United States. AFIT/GCO/ENG/12-06 Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Presented to the Faculty Department of

  16. RivGen, Igiugig Deployment, Control System Specifications and Models

    DOE Data Explorer

    Forbush, Dominic; Cavagnaro, Robert J.; Guerra, Maricarmen; Donegan, James; McEntee, Jarlath; Thomson, Jim; Polagye, Brian; Fabien, Brian; Kilcher, Levi

    2016-03-21

    Control System simulation models, case studies, and processing codes for analyzing field data. Raw data files included from VFD and SCADA. MatLab and Simulink are required to open some data files and all model files.

  17. Object-Oriented Technology-Based Software Library for Operations of Water Reclamation Centers

    NASA Astrophysics Data System (ADS)

    Otani, Tetsuo; Shimada, Takehiro; Yoshida, Norio; Abe, Wataru

    SCADA systems in water reclamation centers have been constructed based on hardware and software that each manufacturer produced according to their design. Even though this approach used to be effective to realize real-time and reliable execution, it is an obstacle to cost reduction about system construction and maintenance. A promising solution to address the problem is to set specifications that can be used commonly. In terms of software, information model approach has been adopted in SCADA systems in other field, such as telecommunications and power systems. An information model is a piece of software specification that describes a physical or logical object to be monitored. In this paper, we propose information models for operations of water reclamation centers, which have not ever existed. In addition, we show the feasibility of the information model in terms of common use and processing performance.

  18. Programmable logic controller optical fibre sensor interface module

    NASA Astrophysics Data System (ADS)

    Allwood, Gary; Wild, Graham; Hinckley, Steven

    2011-12-01

    Most automated industrial processes use Distributed Control Systems (DCSs) or Programmable Logic Controllers (PLCs) for automated control. PLCs tend to be more common as they have much of the functionality of DCSs, although they are generally cheaper to install and maintain. PLCs in conjunction with a human machine interface form the basis of Supervisory Control And Data Acquisition (SCADA) systems, combined with communication infrastructure and Remote Terminal Units (RTUs). RTU's basically convert different sensor measurands in to digital data that is sent back to the PLC or supervisory system. Optical fibre sensors are becoming more common in industrial processes because of their many advantageous properties. Being small, lightweight, highly sensitive, and immune to electromagnetic interference, means they are an ideal solution for a variety of diverse sensing applications. Here, we have developed a PLC Optical Fibre Sensor Interface Module (OFSIM), in which an optical fibre is connected directly to the OFSIM located next to the PLC. The embedded fibre Bragg grating sensors, are highly sensitive and can detect a number of different measurands such as temperature, pressure and strain without the need for a power supply.

  19. Refurbishment and Automation of Thermal Vacuum Facilities at NASA/GSFC

    NASA Technical Reports Server (NTRS)

    Dunn, Jamie; Gomez, Carlos; Donohue, John; Johnson, Chris; Palmer, John; Sushon, Janet

    1999-01-01

    The thermal vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the eleven facilities, currently ten of the systems are scheduled for refurbishment or replacement as part of a five-year implementation. Expected return on investment includes the reduction in test schedules, improvements in safety of facility operations, and reduction in the personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering, and for the automation of thermal vacuum facilities and tests. Automation of the thermal vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs), the use of Supervisory Control and Data Acquisition (SCADA) systems, and the development of a centralized Test Data Management System. These components allow the computer control and automation of mechanical components such as valves and pumps. The project of refurbishment and automation began in 1996 and has resulted in complete computer control of one facility (Facility 281), and the integration of electronically controlled devices and PLCs in multiple others.

  20. Refurbishment and Automation of Thermal Vacuum Facilities at NASA/GSFC

    NASA Technical Reports Server (NTRS)

    Dunn, Jamie; Gomez, Carlos; Donohue, John; Johnson, Chris; Palmer, John; Sushon, Janet

    1998-01-01

    The thermal vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the eleven facilities, currently ten of the systems are scheduled for refurbishment or replacement as part of a five-year implementation. Expected return on investment includes the reduction in test schedules, improvements in safety of facility operations, and reduction in the personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering, and for the automation of thermal vacuum facilities and tests. Automation of the thermal vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs), the use of Supervisory Control and Data Acquisition (SCADA) systems, and the development of a centralized Test Data Management System. These components allow the computer control and automation of mechanical components such as valves and pumps. The project of refurbishment and automation began in 1996 and has resulted in complete computer control of one facility (Facility 281), and the integration of electronically controlled devices and PLCs in multiple others.

  1. Culture Representation in Human Reliability Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David Gertman; Julie Marble; Steven Novack

    Understanding human-system response is critical to being able to plan and predict mission success in the modern battlespace. Commonly, human reliability analysis has been used to predict failures of human performance in complex, critical systems. However, most human reliability methods fail to take culture into account. This paper takes an easily understood state of the art human reliability analysis method and extends that method to account for the influence of culture, including acceptance of new technology, upon performance. The cultural parameters used to modify the human reliability analysis were determined from two standard industry approaches to cultural assessment: Hofstede’s (1991)more » cultural factors and Davis’ (1989) technology acceptance model (TAM). The result is called the Culture Adjustment Method (CAM). An example is presented that (1) reviews human reliability assessment with and without cultural attributes for a Supervisory Control and Data Acquisition (SCADA) system attack, (2) demonstrates how country specific information can be used to increase the realism of HRA modeling, and (3) discusses the differences in human error probability estimates arising from cultural differences.« less

  2. Using SCADA Data, Field Studies, and Real-Time Modeling to ...

    EPA Pesticide Factsheets

    EPA has been providing technical assistance to the City of Flint and the State of Michigan in response to the drinking water lead contamination incident. Responders quickly recognized the need for a water distribution system hydraulic model to provide insight on flow patterns and water quality as well as to evaluate changes being made to the system operation to enhance corrosion control and improve chlorine residuals. EPA partnered with the City of Flint and the Michigan Department of Environmental Quality to update and calibrate an existing hydraulic model. The City provided SCADA data, GIS data, customer billing data, valve status data, design diagrams, and information on operations. Team members visited all facilities and updated pump and valve types, sizes, settings, elevations, and pump discharge curves. Several technologies were used to support this work including the EPANET-RTX based Polaris real-time modeling software, WaterGEMS, ArcGIS, EPANET, and RTX:LINK. Field studies were conducted to collect pressure and flow data from more than 25 locations throughout the distribution system. An assessment of the model performance compared model predictions for flow, pressure, and tank levels to SCADA and field data, resulting in error measurements for each data stream over the time period analyzed. Now, the calibrated model can be used with a known confidence in its performance to evaluate hydraulic and water quality problems, and the model can be easily

  3. Electric Motors Maintenance Planning From Its Operating Variables

    NASA Astrophysics Data System (ADS)

    Rodrigues, Francisco; Fonseca, Inácio; Farinha, José Torres; Ferreira, Luís; Galar, Diego

    2017-09-01

    The maintenance planning corresponds to an approach that seeks to maximize the availability of equipment and, consequently, increase the levels of competitiveness of companies by increasing production times. This paper presents a maintenance planning based on operating variables (number of hours worked, duty cycles, number of revolutions) to maximizing the availability of operation of electrical motors. The reading of the operating variables and its sampling is done based on predetermined sampling cycles and subsequently is made the data analysis through time series algorithms aiming to launch work orders before reaching the variables limit values. This approach is supported by tools and technologies such as logical applications that enable a graphical user interface for access to relevant information about their Physical Asset HMI (Human Machine Interface), including the control and supervision by acquisition through SCADA (Supervisory Control And data acquisition) data, also including the communication protocols among different logical applications.

  4. DSOM - Decision Support for Operations and Maintenance - Application to a USMC Base Centralized Energy System.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meador, Richard J.; Hatley, Darrel D.

    2004-06-01

    PNNL DSOM technology coordinates efficient steam plant operation with EMCS and SCADA systems, providing generation support and automated load shedding to meet peak demand limits saving over $1M in two years.

  5. On the use of high-frequency SCADA data for improved wind turbine performance monitoring

    NASA Astrophysics Data System (ADS)

    Gonzalez, E.; Stephen, B.; Infield, D.; Melero, J. J.

    2017-11-01

    SCADA-based condition monitoring of wind turbines facilitates the move from costly corrective repairs towards more proactive maintenance strategies. In this work, we advocate the use of high-frequency SCADA data and quantile regression to build a cost effective performance monitoring tool. The benefits of the approach are demonstrated through the comparison between state-of-the-art deterministic power curve modelling techniques and the suggested probabilistic model. Detection capabilities are compared for low and high-frequency SCADA data, providing evidence for monitoring at higher resolutions. Operational data from healthy and faulty turbines are used to provide a practical example of usage with the proposed tool, effectively achieving the detection of an incipient gearbox malfunction at a time horizon of more than one month prior to the actual occurrence of the failure.

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thaule, S.B.; Postvoll, W.

    Installation by den norske stats oljeselskap A.S. (Statoil) of a powerful pipeline-modeling system on Zeepipe has allowed this major North Sea gas pipeline to meet the growing demands and seasonal variations of the European gas market. The Troll gas-sales agreement (TGSA) in 1986 called for large volumes of Norwegian gas to begin arriving from the North Sea Sleipner East field in october 1993. It is important to Statoil to maintain regular gas delivers from its integrated transport network. In addition, high utilization of transport capacity maximizes profits. In advance of operations, Statoil realized that state-of-the-art supervisory control and data acquisitionmore » (scada) and pipeline-modeling systems (PMS) would be necessary to meet its goals and to remain the most efficient North Sea operator. The paper describes the linking of Troll and Zeebrugge, contractual issues, the supervisory system, the scada module, pipeline modeling, real-time model, look-ahead model, predictive model, and model performance.« less

  7. Anomaly Detection in Power Quality at Data Centers

    NASA Technical Reports Server (NTRS)

    Grichine, Art; Solano, Wanda M.

    2015-01-01

    The goal during my internship at the National Center for Critical Information Processing and Storage (NCCIPS) is to implement an anomaly detection method through the StruxureWare SCADA Power Monitoring system. The benefit of the anomaly detection mechanism is to provide the capability to detect and anticipate equipment degradation by monitoring power quality prior to equipment failure. First, a study is conducted that examines the existing techniques of power quality management. Based on these findings, and the capabilities of the existing SCADA resources, recommendations are presented for implementing effective anomaly detection. Since voltage, current, and total harmonic distortion demonstrate Gaussian distributions, effective set-points are computed using this model, while maintaining a low false positive count.

  8. Development of Solar Powered Irrigation System

    NASA Astrophysics Data System (ADS)

    Abdelkerim, A. I.; Sami Eusuf, M. M. R.; Salami, M. J. E.; Aibinu, A.; Eusuf, M. A.

    2013-12-01

    Development of a solar powered irrigation system has been discussed in this paper. This system would be SCADA-based and quite useful in areas where there is plenty of sunshine but insufficient water to carry out farming activities, such as rubber plantation, strawberry plantation, or any plantation, that requires frequent watering. The system is powered by solar system as a renewable energy which uses solar panel module to convert Sunlight into electricity. The development and implementation of an automated SCADA controlled system that uses PLC as a controller is significant to agricultural, oil and gas monitoring and control purpose purposes. In addition, the system is powered by an intelligent solar system in which solar panel targets the radiation from the Sun. Other than that, the solar system has reduced energy cost as well as pollution. The system is equipped with four input sensors; two soil moisture sensors, two level detection sensors. Soil moisture sensor measures the humidity of the soil, whereas the level detection sensors detect the level of water in the tank. The output sides consist of two solenoid valves, which are controlled respectively by two moistures sensors.

  9. Recent Experience with a Hybrid SCADA/PMU On-Line State Estimator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rizy, D Tom

    2009-01-01

    PMU devices are expected to grow in number from a few to several hundreds in the next five years. Some relays are already global positioning system-capable and could provide the same type of data as any PMU. This introduces a new paradigm of very fast accurate synchrophasor measurements from across the grid in real-time that augment and parallel existing slower SCADA measurements. Control center applications will benefit from this PMU data; for example, use of PMU data in state estimation is expected to improve accuracy and robustness, which in turn will result in more timely and accurate N-1 security analysis,more » resulting in an overall improvement of grid system reliability and security. This paper describes results from a recent implementation of this technology, the benefits and future work.« less

  10. Experimental and analytical study of water pipe's rupture for damage identification purposes

    NASA Astrophysics Data System (ADS)

    Papakonstantinou, Konstantinos G.; Shinozuka, Masanobu; Beikae, Mohsen

    2011-04-01

    A malfunction, local damage or sudden pipe break of a pipeline system can trigger significant flow variations. As shown in the paper, pressure variations and pipe vibrations are two strongly correlated parameters. A sudden change in the flow velocity and pressure of a pipeline system can induce pipe vibrations. Thus, based on acceleration data, a rapid detection and localization of a possible damage may be carried out by inexpensive, nonintrusive monitoring techniques. To illustrate this approach, an experiment on a single pipe was conducted in the laboratory. Pressure gauges and accelerometers were installed and their correlation was checked during an artificially created transient flow. The experimental findings validated the correlation between the parameters. The interaction between pressure variations and pipe vibrations was also theoretically justified. The developed analytical model explains the connection among flow pressure, velocity, pressure wave propagation and pipe vibration. The proposed method provides a rapid, efficient and practical way to identify and locate sudden failures of a pipeline system and sets firm foundations for the development and implementation of an advanced, new generation Supervisory Control and Data Acquisition (SCADA) system for continuous health monitoring of pipe networks.

  11. Energy Systems Integration Laboratory | Energy Systems Integration Facility

    Science.gov Websites

    systems test hub includes a Class 1, Division 2 space for performing tests of high-pressure hydrogen Laboratory offers the following capabilities. High-Pressure Hydrogen Systems The high-pressure hydrogen infrastructure. Key Infrastructure Robotic arm; high-pressure hydrogen; natural gas supply; standalone SCADA

  12. Conceptual Design, Implementation and Commissioning of Data Acquisition and Control System for Negative Ion Source at IPR

    NASA Astrophysics Data System (ADS)

    Soni, Jignesh; Yadav, Ratnakar; Gahlaut, A.; Bansal, G.; Singh, M. J.; Bandyopadhyay, M.; Parmar, K. G.; Pandya, K.; Chakraborty, A.

    2011-09-01

    Negative ion Experimental facility has been setup at IPR. The facility consists of a RF based negative ion source (ROBIN)—procured under a license agreement with IPP Garching, as a replica of BATMAN, presently operating in IPP, 100 kW 1 MHz RF generators and a set of low and high voltage power supplies, vacuum system and diagnostics. 35 keV 10A H- beam is expected from this setup. Automated successful operation of the system requires an advanced, rugged, time proven and flexible control system. Further the data generated in the experimental phase needs to be acquired, monitored and analyzed to verify and judge the system performance. In the present test bed, this is done using a combination of PLC based control system and a PXI based data acquisition system. The control system consists of three different Siemens PLC systems viz. (1) S-7 400 PLC as a Master Control, (2) S-7 300 PLC for Vacuum system control and (3) C-7 PLC for RF generator control. Master control PLC directly controls all the subsystems except the Vacuum system and RF generator. The Vacuum system and RF generator have their own dedicated PLCs (S-7 300 and C-7 respectively). Further, these two PLC systems work as a slave for the Master control PLC system. Communication between PLC S-7 400, S-7 300 and central control room computer is done through Industrial Ethernet (IE). Control program and GUI are developed in Siemens Step-7 PLC programming software and Wincc SCADA software, respectively. There are approximately 150 analog and 200 digital control and monitoring signals required to perform complete closed loop control of the system. Since the source floats at high potential (˜35 kV); a combination of galvanic and fiber optic isolation has been implemented. PXI based Data Acquisition system (DAS) is a combination of PXI RT (Real time) system, front end signal conditioning electronics, host system and DAQ program. All the acquisition signals coming from various sub-systems are connected and acquired by the PXI RT system, through only fiber optics link for signal conditioning, electrical isolation and better noise immunity. Real time and Host application programs are developed in LabVIEW and the data shall be stored with a facility of online display of selected parameters. Mathematical calculations and report generation will take place at the end of each beam shot. The paper describes in detail about the design approach, implementation strategy, program development, commissioning and operational test result of ROBIN through a data acquisition and control system.

  13. The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems

    NASA Astrophysics Data System (ADS)

    Bianco, Louis J.

    The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is the biggest threat to SCADA systems.

  14. Cellular computational generalized neuron network for frequency situational intelligence in a multi-machine power system.

    PubMed

    Wei, Yawei; Venayagamoorthy, Ganesh Kumar

    2017-09-01

    To prevent large interconnected power system from a cascading failure, brownout or even blackout, grid operators require access to faster than real-time information to make appropriate just-in-time control decisions. However, the communication and computational system limitations of currently used supervisory control and data acquisition (SCADA) system can only deliver delayed information. However, the deployment of synchrophasor measurement devices makes it possible to capture and visualize, in near-real-time, grid operational data with extra granularity. In this paper, a cellular computational network (CCN) approach for frequency situational intelligence (FSI) in a power system is presented. The distributed and scalable computing unit of the CCN framework makes it particularly flexible for customization for a particular set of prediction requirements. Two soft-computing algorithms have been implemented in the CCN framework: a cellular generalized neuron network (CCGNN) and a cellular multi-layer perceptron network (CCMLPN), for purposes of providing multi-timescale frequency predictions, ranging from 16.67 ms to 2 s. These two developed CCGNN and CCMLPN systems were then implemented on two different scales of power systems, one of which installed a large photovoltaic plant. A real-time power system simulator at weather station within the Real-Time Power and Intelligent Systems (RTPIS) laboratory at Clemson, SC, was then used to derive typical FSI results. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  16. Cell-phone based assistance for waterworks/sewage plant maintenance.

    PubMed

    Kawada, T; Nakamichi, K; Hisano, N; Kitamura, M; Miyahara, K

    2006-01-01

    Cell-phones are now incorporating the functions necessary for them to be used as mobile IT devices. In this paper, we present our results of the evaluation of cell-phones as the mobile IT device to assist workers in industrial plants. We use waterworks and sewage plants as examples. By employing techniques to squeeze the SCADA screen on CRT into a small cell-phone LCD, we have made it easier for a plant's field workers to access the information needed for effective maintenance, regardless of location. An idea to link SCADA information and the plant facility information on the cell-phone is also presented. Should an accident or emergency situation arise, these cell-phone-based IT systems can efficiently deliver the latest plant information, thus the worker out in the field can respond to and resolve the emergency.

  17. A Measurement and Power Line Communication System Design for Renewable Smart Grids

    NASA Astrophysics Data System (ADS)

    Kabalci, E.; Kabalci, Y.

    2013-10-01

    The data communication over the electric power lines can be managed easily and economically since the grid connections are already spread around all over the world. This paper investigates the applicability of Power Line Communication (PLC) in an energy generation system that is based on photovoltaic (PV) panels with the modeling study in Matlab/Simulink. The Simulink model covers the designed PV panels, boost converter with Perturb and Observe (P&O) control algorithm, full bridge inverter, and the binary phase shift keying (BPSK) modem that is utilized to transfer the measured data over the power lines. This study proposes a novel method to use the electrical power lines not only for carrying the line voltage but also to transmit the measurements of the renewable energy generation plants. Hence, it is aimed at minimizing the additional monitoring costs such as SCADA, Ethernet-based or GSM based systems by using the proposed technique. Although this study is performed with solar power plants, the proposed model can be applied to other renewable generation systems. Consequently, the usage of the proposed technique instead of SCADA or Ethernet-based systems eliminates additional monitoring costs.

  18. Algorithmic network monitoring for a modern water utility: a case study in Jerusalem.

    PubMed

    Armon, A; Gutner, S; Rosenberg, A; Scolnicov, H

    2011-01-01

    We report on the design, deployment, and use of TaKaDu, a real-time algorithmic Water Infrastructure Monitoring solution, with a strong focus on water loss reduction and control. TaKaDu is provided as a commercial service to several customers worldwide. It has been in use at HaGihon, the Jerusalem utility, since mid 2009. Water utilities collect considerable real-time data from their networks, e.g. by means of a SCADA system and sensors measuring flow, pressure, and other data. We discuss how an algorithmic statistical solution analyses this wealth of raw data, flexibly using many types of input and picking out and reporting significant events and failures in the network. Of particular interest to most water utilities is the early detection capability for invisible leaks, also a means for preventing large visible bursts. The system also detects sensor and SCADA failures, various water quality issues, DMA boundary breaches, unrecorded or unintended network changes (like a valve or pump state change), and other events, including types unforeseen during system design. We discuss results from use at HaGihon, showing clear operational value.

  19. Changing the Lines in the Coloring Book

    DTIC Science & Technology

    2004-05-18

    multitude of SCADA programmers creates a multitude of idiosyncratic programs, making it very difficult to know how to hack into large numbers of them...an observed pattern of hacking that would alert authorities seems not to have been discussed.) However, some SCADAs are not physically connected to the...normal hacking . Simultaneously, it would identify software vulnerabilities in other products and design viruses and worms for attacking them. (The

  20. A framework for analyzing the impact of data integrity/quality on electricity market operations

    NASA Astrophysics Data System (ADS)

    Choi, Dae Hyun

    This dissertation examines the impact of data integrity/quality in the supervisory control and data acquisition (SCADA) system on real-time locational marginal price (LMP) in electricity market operations. Measurement noise and/or manipulated sensor errors in a SCADA system may mislead system operators about real-time conditions in a power system, which, in turn, may impact the price signals in real-time power markets. This dissertation serves as a first attempt to analytically investigate the impact of bad/malicious data on electric power market operations. In future power system operations, which will probably involve many more sensors, the impact of sensor data integrity/quality on grid operations will become increasingly important. The first part of this dissertation studies from a market participant's perspective a new class of malicious data attacks on state estimation, which subsequently influences the result of the newly emerging look-ahead dispatch models in the real-time power market. In comparison with prior work of cyber-attack on static dispatch where no inter-temporal ramping constraint is considered, we propose a novel attack strategy, named ramp-induced data (RID) attack, with which the attacker can manipulate the limits of ramp constraints of generators in look-ahead dispatch. It is demonstrated that the proposed attack can lead to financial profits via malicious capacity withholding of selected generators, while being undetected by the existing bad data detection algorithm embedded in today's state estimation software. In the second part, we investigate from a system operator's perspective the sensitivity of locational marginal price (LMP) with respect to data corruption-induced state estimation error in real-time power market. Two data corruption scenarios are considered, in which corrupted continuous data (e.g., the power injection/flow and voltage magnitude) falsify power flow estimate whereas corrupted discrete data (e.g., the on/off status of a circuit breaker) do network topology estimate, thus leading to the distortion of LMP. We present an analytical framework to quantify real-time LMP sensitivity subject to continuous and discrete data corruption via state estimation. The proposed framework offers system operators an analytical tool to identify economically sensitive buses and transmission lines to data corruption as well as find sensors that impact LMP changes significantly. This dissertation serves as a first step towards rigorous understanding of the fundamental coupling among cyber, physical and economical layers of operations in future smart grid.

  1. Using SCADA Data, Field Studies, and Real-Time Modeling to Calibrate Flint's Hydraulic Model

    EPA Science Inventory

    EPA has been providing technical assistance to the City of Flint and the State of Michigan in response to the drinking water lead contamination incident. Responders quickly recognized the need for a water distribution system hydraulic model to provide insight on flow patterns an...

  2. Wind-farm simulation over moderately complex terrain

    NASA Astrophysics Data System (ADS)

    Segalini, Antonio; Castellani, Francesco

    2017-05-01

    A comparison between three independent software to estimate the power production and the flow field in a wind farm is conducted, validating them against SCADA (Supervisory, Control And Data Acquisition) data. The three software were ORFEUS, WindSim and WAsP: ORFEUS and WAsP are linearised solvers, while WindSim is fully nonlinear. A wake model (namely a prescribed velocity deficit associated to the turbines) is used by WAsP, while ORFEUS and WindSim use the actuator-disc method to account for the turbines presence. The comparison indicates that ORFEUS and WAsP perform slightly better than WindSim in the assessment of the polar efficiency. The wakes simulated with ORFEUS appear more persistent than the ones of WindSim, which uses a two-equation closure model for the turbulence effects.

  3. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  4. Design and implementation of an Internet based effective controlling and monitoring system with wireless fieldbus communications technologies for process automation--an experimental study.

    PubMed

    Cetinceviz, Yucel; Bayindir, Ramazan

    2012-05-01

    The network requirements of control systems in industrial applications increase day by day. The Internet based control system and various fieldbus systems have been designed in order to meet these requirements. This paper describes an Internet based control system with wireless fieldbus communication designed for distributed processes. The system was implemented as an experimental setup in a laboratory. In industrial facilities, the process control layer and the distance connection of the distributed control devices in the lowest levels of the industrial production environment are provided with fieldbus networks. In this paper, the Internet based control system that will be able to meet the system requirements with a new-generation communication structure, which is called wired/wireless hybrid system, has been designed on field level and carried out to cover all sectors of distributed automation, from process control, to distributed input/output (I/O). The system has been accomplished by hardware structure with a programmable logic controller (PLC), a communication processor (CP) module, two industrial wireless modules and a distributed I/O module, Motor Protection Package (MPP) and software structure with WinCC flexible program used for the screen of Scada (Supervisory Control And Data Acquisition), SIMATIC MANAGER package program ("STEP7") used for the hardware and network configuration and also for downloading control program to PLC. Copyright © 2012 ISA. Published by Elsevier Ltd. All rights reserved.

  5. Improvement of the linear polarization resistance method for testing steel corrosion inhibitors

    NASA Astrophysics Data System (ADS)

    Faritov, A. T.; Rozhdestvenskii, Yu. G.; Yamshchikova, S. A.; Minnikhanova, E. R.; Tyusenkov, A. S.

    2016-11-01

    The linear polarization resistance method is used to improve the technique of corrosion control in liquid conducting according to GOST 9.514-99 (General Corrosion and Aging Protection System. Corrosion Inhibitors for Metals in Water Systems. Electrochemical Method of Determining the Protective Ability). Corrosion monitoring is shown to be performed by electronic devices with real-time data transfer to industrial controllers and SCADA systems.

  6. LHCb Online event processing and filtering

    NASA Astrophysics Data System (ADS)

    Alessio, F.; Barandela, C.; Brarda, L.; Frank, M.; Franek, B.; Galli, D.; Gaspar, C.; Herwijnen, E. v.; Jacobsson, R.; Jost, B.; Köstner, S.; Moine, G.; Neufeld, N.; Somogyi, P.; Stoica, R.; Suman, S.

    2008-07-01

    The first level trigger of LHCb accepts one million events per second. After preprocessing in custom FPGA-based boards these events are distributed to a large farm of PC-servers using a high-speed Gigabit Ethernet network. Synchronisation and event management is achieved by the Timing and Trigger system of LHCb. Due to the complex nature of the selection of B-events, which are the main interest of LHCb, a full event-readout is required. Event processing on the servers is parallelised on an event basis. The reduction factor is typically 1/500. The remaining events are forwarded to a formatting layer, where the raw data files are formed and temporarily stored. A small part of the events is also forwarded to a dedicated farm for calibration and monitoring. The files are subsequently shipped to the CERN Tier0 facility for permanent storage and from there to the various Tier1 sites for reconstruction. In parallel files are used by various monitoring and calibration processes running within the LHCb Online system. The entire data-flow is controlled and configured by means of a SCADA system and several databases. After an overview of the LHCb data acquisition and its design principles this paper will emphasize the LHCb event filter system, which is now implemented using the final hardware and will be ready for data-taking for the LHC startup. Control, configuration and security aspects will also be discussed.

  7. Modeling DNP3 Traffic Characteristics of Field Devices in SCADA Systems of the Smart Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan; Cheng, Liang; Chuah, Mooi Choo

    In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impactsmore » of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.« less

  8. Application of Synchrophasor Measurements for Improving Situational Awareness of the Power System

    NASA Astrophysics Data System (ADS)

    Obushevs, A.; Mutule, A.

    2018-04-01

    The paper focuses on the application of synchrophasor measurements that present unprecedented benefits compared to SCADA systems in order to facilitate the successful transformation of the Nordic-Baltic-and-European electric power system to operate with large amounts of renewable energy sources and improve situational awareness of the power system. The article describes new functionalities of visualisation tools to estimate a grid inertia level in real time with monitoring results between Nordic and Baltic power systems.

  9. Weather Research and Forecasting model simulation of an onshore wind farm: assessment against LiDAR and SCADA data

    NASA Astrophysics Data System (ADS)

    Santoni, Christian; Garcia-Cartagena, Edgardo J.; Zhan, Lu; Iungo, Giacomo Valerio; Leonardi, Stefano

    2017-11-01

    The integration of wind farm parameterizations into numerical weather prediction models is essential to study power production under realistic conditions. Nevertheless, recent models are unable to capture turbine wake interactions and, consequently, the mean kinetic energy entrainment, which are essential for the development of power optimization models. To address the study of wind turbine wake interaction, one-way nested mesoscale to large-eddy simulation (LES) were performed using the Weather Research and Forecasting model (WRF). The simulation contains five nested domains modeling the mesoscale wind on the entire North Texas Panhandle region to the microscale wind fluctuations and turbine wakes of a wind farm located at Panhandle, Texas. The wind speed, direction and boundary layer profile obtained from WRF were compared against measurements obtained with a sonic anemometer and light detection and ranging system located within the wind farm. Additionally, the power production were assessed against measurements obtained from the supervisory control and data acquisition system located in each turbine. Furthermore, to incorporate the turbines into very coarse LES, a modification to the implementation of the wind farm parameterization by Fitch et al. (2012) is proposed. This work was supported by the NSF, Grants No. 1243482 (WINDINSPIRE) and IIP 1362033 (WindSTAR), and TACC.

  10. A Feasibility Study on the Application of the ScriptGenE Framework as an Anomaly Detection System in Industrial Control Systems

    DTIC Science & Technology

    2015-09-17

    network intrusion detection systems NIST National Institute of Standards and Technology p-tree protocol tree PI protocol informatics PLC programmable logic...electrical, water, oil , natural gas, manufacturing, and pharmaceutical industries, to name a few. The differences between SCADA and DCS systems are often... Oil Company, also known as Saudi Aramco, suffered huge data loss that resulted in the disruption of daily operations for nearly two weeks [BTR13]. As it

  11. Monitoring the variations of the oxygen transfer rate in a full scale membrane bioreactor using daily mass balances.

    PubMed

    Racault, Y; Stricker, A-E; Husson, A; Gillot, S

    2011-01-01

    Oxygen transfer in biological wastewater treatment processes with high sludge concentration, such as membrane bioreactor (MBR), is an important issue. The variation of alpha-factor versus mixed liquor suspended solids (MLSS) concentration was investigated in a full scale MBR plant under process conditions, using mass balances. Exhaustive data from the Supervisory Control And Data Acquisition (SCADA) and from additional online sensors (COD, DO, MLSS) were used to calculate the daily oxygen consumption (OC) using a non-steady state mass balance for COD and total N on a 24-h basis. To close the oxygen balance, OC has to match the total oxygen transfer rate (OTRtot) of the system, which is provided by fine bubble (FB) diffusers in the aeration tank and coarse bubbles (CB) in separate membrane tanks. First assessing OTR(CB) then closing the balance OC = OTRtot allowed to calculate OTR(FB) and to fit an exponential relationship between OTR(FB) and MLSS. A comparison of the alpha-factor obtained by this balance method and by direct measurements with the off-gas method on the same plant is presented and discussed.

  12. Simulation of wake effects between two wind farms

    NASA Astrophysics Data System (ADS)

    Hansen, K. S.; Réthoré, P.-E.; Palma, J.; Hevia, B. G.; Prospathopoulos, J.; Peña, A.; Ott, S.; Schepers, G.; Palomares, A.; van der Laan, M. P.; Volker, P.

    2015-06-01

    SCADA data, recorded on the downstream wind farm, has been used to identify flow cases with visible clustering effects. The inflow condition is derived from a partly undisturbed wind turbine, due to lack of mast measurements. The SCADA data analysis concludes that centre of the deficit for the downstream wind farm with disturbed inflow has a distinct visible maximum deficit zone located only 5-10D downstream from the entrance. This zone, representing 20-30% speed reduction, increases and moves downstream for increasing cluster effect and is not visible outside a flow sector of 20-30°. The eight flow models represented in this benchmark include both RANS models, mesoscale models and engineering models. The flow cases, identified according to the wind speed level and inflow sector, have been simulated and validated with the SCADA results. The model validation concludes that all models more or less are able to predict the location and size of the deficit zone inside the downwind wind farm.

  13. Rotary Kiln Gasification of Solid Waste for Base Camps

    DTIC Science & Technology

    2017-10-02

    cup after full day run 3.3 Feedstock Handling System Garbage bags containing waste feedstock are placed into feed bin FB-101. Ram feeder RF-102...Environmental Science and Technology using the Factory Talk SCADA software running on a laptop computer. A wireless Ethernet router that is located within the...pyrolysis oil produced required consistent draining from the system during operation and became a liquid waste disposal problem. A 5-hour test run could

  14. Simulation of a microgrid

    NASA Astrophysics Data System (ADS)

    Dulǎu, Lucian Ioan

    2015-12-01

    This paper describes the simulation of a microgrid system with storage technologies. The microgrid comprises 6 distributed generators (DGs), 3 loads and a 150 kW storage unit. The installed capacity of the generators is 1100 kW, while the total load demand is 900 kW. The simulation is performed by using a SCADA software, considering the power generation costs, the loads demand and the system's power losses. The generators access the system in order of their power generation cost. The simulation is performed for the entire day.

  15. Norwegian Cyber Defense

    DTIC Science & Technology

    2013-12-01

    21   a.   Siberian Pipeline Explosion (1982) ............................21   b.   Chevron Emergency Alert...the fifth domain: Are the mouse and keyboard the new weapons of conflict?,” The Economist, July 1, 2010, http://www.economist.com/node/16478792. 15...a. Siberian Pipeline Explosion (1982) In 1982, intruders planted a Trojan horse in the SCADA system that controls the Siberian Pipeline. This is the

  16. Compact earth stations, hubs for energy industry expanding

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shimabukuro, T.

    1992-02-01

    That paper reports that advances in gallium arsenide (GaAs) technology, monolithic microwave integrated circuits (MMIC) and large scale integrated (VLSF) circuits, have contributed to the mass production of very reliable small aperture terminals (VSATs). Less publicized, but equally important to multinational energy organizations, are recent developments in compact earth station design and solid-state hubs for VSAT networks made possible by the new technology. Many applications are suited for the energy industry that involve compact earth station terminals and hubs. The first group of applications describes the use of GTE's ACES earth station for the Zaire Gulf Oil Co. in Zairemore » and for AMOCO in Trinidad. The second group of applications describes the compact hub for VSAT networks, which could potentially have a number of data communication uses in the energy industry, such as, IBM/SNA, X.25, or supervisory control an data acquisition (SCADA) applications.« less

  17. Testbeds for Assessing Critical Scenarios in Power Control Systems

    NASA Astrophysics Data System (ADS)

    Dondossola, Giovanna; Deconinck, Geert; Garrone, Fabrizio; Beitollahi, Hakem

    The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility InfrastructurAL Resilience. The selected scenarios refer to power control systems encompassing information and communication security of SCADA systems for grid teleoperation, impact of attacks on inter-operator communications in power emergency conditions, impact of intentional faults on the secondary and tertiary control in power grids with distributed generators. Two testbeds have been developed for assessing the effect of the attacks and prototyping resilient architectures.

  18. Automated system for the on-line monitoring of powder blending processes using near-infrared spectroscopy. Part I. System development and control.

    PubMed

    Hailey, P A; Doherty, P; Tapsell, P; Oliver, T; Aldridge, P K

    1996-03-01

    An automated system for the on-line monitoring of powder blending processes is described. The system employs near-infrared (NIR) spectroscopy using fibre-optics and a graphical user interface (GUI) developed in the LabVIEW environment. The complete supervisory control and data analysis (SCADA) software controls blender and spectrophotometer operation and performs statistical spectral data analysis in real time. A data analysis routine using standard deviation is described to demonstrate an approach to the real-time determination of blend homogeneity.

  19. Cyber Security Testing and Training Programs for Industrial Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less

  20. Awaiting Cyber 9/11

    DTIC Science & Technology

    2013-01-01

    tremendously dangerous and sophisticated virus that successfully attacked a SCADA system is now available for free on the Internet, where one can find...security for the public and private sectors. To develop this capability, the Nation needs to undergo a paradigm shift on how it views the cyber... for communications and trade were extraordinarily important for the security and prosperity of Britain. Today, the security and prosperity of the

  1. Analysis of synchronous and induction generators used at hydroelectric power plant

    NASA Astrophysics Data System (ADS)

    Diniş, C. M.; Popa, G. N.; lagăr, A.

    2017-01-01

    In this paper is presented an analysis of the operating electric generators (synchronous and induction) within a small capacity hydroelectric power plant. Such is treated the problem of monitoring and control hydropower plant using SCADA systems. Have been carried an experimental measurements in small hydropower plant for different levels of water in the lake and various settings of the operating parameters.

  2. External Verification of SCADA System Embedded Controller Firmware

    DTIC Science & Technology

    2012-03-01

    microprocessor and read-only memory (ROM) or flash memory for storing firmware and control logic [5],[8]. A PLC typically has three software levels as shown in...implementing different firmware. Because PLCs are in effect a microprocessor device, an analysis of the current research on embedded devices is important...Electronics Engineers (IEEE) published a 15 best practices guide for firmware control on microprocessors [44]. IEEE suggests that microprocessors

  3. Risk Scan: A Review of Risk Assessment Capability and Maturity within the Canadian Safety and Security Program

    DTIC Science & Technology

    2014-06-01

    SCADA / ICS Cyber Test Lab initiated in 2013 Psychosocial – academic research exists,; opportunity for sharing and developing impact assessment...ecosystems and species at risk), accidents / system failure (rail; pipelines ; ferries CSSP strategy for the North Focus on regional l(and local) problem...Guidance; business planning; environmental scan; proposal evaluation; and performance measurement Program Risk Management – Guidelines for project

  4. Cable Overheating Risk Warning Method Based on Impedance Parameter Estimation in Distribution Network

    NASA Astrophysics Data System (ADS)

    Yu, Zhang; Xiaohui, Song; Jianfang, Li; Fei, Gao

    2017-05-01

    Cable overheating will lead to the cable insulation level reducing, speed up the cable insulation aging, even easy to cause short circuit faults. Cable overheating risk identification and warning is nessesary for distribution network operators. Cable overheating risk warning method based on impedance parameter estimation is proposed in the paper to improve the safty and reliability operation of distribution network. Firstly, cable impedance estimation model is established by using least square method based on the data from distribiton SCADA system to improve the impedance parameter estimation accuracy. Secondly, calculate the threshold value of cable impedance based on the historical data and the forecast value of cable impedance based on the forecasting data in future from distribiton SCADA system. Thirdly, establish risks warning rules library of cable overheating, calculate the cable impedance forecast value and analysis the change rate of impedance, and then warn the overheating risk of cable line based on the overheating risk warning rules library according to the variation relationship between impedance and line temperature rise. Overheating risk warning method is simulated in the paper. The simulation results shows that the method can identify the imedance and forecast the temperature rise of cable line in distribution network accurately. The result of overheating risk warning can provide decision basis for operation maintenance and repair.

  5. Protecting drinking water utilities from cyberthreats

    DOE PAGES

    Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.; ...

    2017-02-01

    Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less

  6. Protecting drinking water utilities from cyberthreats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.

    Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less

  7. Application of PMU-Based Information in the Indian Power System

    NASA Astrophysics Data System (ADS)

    Agarwal, P. K.; Agarwal, V. K.; Rathour, Harish

    2013-05-01

    SCADA/EMS system has been the most commonly used tool for real-time power system operation and control throughout the world. This system has been found to be very useful in steady-state analysis of the power system. The ever-increasing dependence of human society and every country's economy on electrical energy calls for reliable power delivery. In order to meet these expectations, engineers across the globe have been exploring such new technologies that can improve upon the limitations of SCADA and provide dynamic visibility of the power system. A breakthrough has now been achieved in the form of synchrophasor technology. Synchrophasor measurements using phasor measurement units (PMUs) deployed over a wide area, facilitate dynamic state measurement and visualization of a power system, which are useful in monitoring safety and security of the grid. The Power System Operation Corporation (POSOCO) has taken initiative and implemented a pilot project wherein nine phasor measurement units (PMUs) along with one phasor data concentrator (PDC) were commissioned in the Northern Region (NR) of India. The primary objective of this pilot project was to comprehend the synchrophasor technology and its applications in power system operation. The data received and information derived from the pilot project have been found to be very useful and helped in improving the performance of the grid operation in several ways. The pilot project is operational for the last two years; in the meanwhile, many other initiatives have also been taken in other regions by POSOCO. This article details the utilization of the data collected from the pilot projects and the application of the data in the improvement of Indian power grid.

  8. A computer network with scada and case tools for on-line process control in greenhouses

    NASA Astrophysics Data System (ADS)

    Gieling, Th. H.; van Meurs, W. Th. M.; Janssen, H. J. J.

    Climate control computers in greenhouses are used to control heating and ventilation, supply water and dilute and dispense nutrients. They integrate models into optimally controlled systems. This paper describes how information technology, as in use in other sectors of industry, is applied to greenhouse control. The introduction of modern software and hardware concepts in horticulture adds power and extra opportunities to climate control in greenhouses.

  9. A computer network with SCADA and case tools for on-line process control in greenhouses.

    PubMed

    Gieling ThH; van Meurs WTh; Janssen, H J

    1996-01-01

    Climate control computers in greenhouses are used to control heating and ventilation, supply water and dilute and dispense nutrients. They integrate models into optimally controlled systems. This paper describes how information technology, as in use in other sectors of industry, is applied to greenhouse control. The introduction of modern software and hardware concepts in horticulture adds power and extra oppurtunities to climate contol in greenhouses.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despitemore » much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.« less

  11. Methods and tools for profiling and control of distributed systems

    NASA Astrophysics Data System (ADS)

    Sukharev, R.; Lukyanchikov, O.; Nikulchev, E.; Biryukov, D.; Ryadchikov, I.

    2018-02-01

    This article is devoted to the topic of profiling and control of distributed systems. Distributed systems have a complex architecture, applications are distributed among various computing nodes, and many network operations are performed. Therefore, today it is important to develop methods and tools for profiling distributed systems. The article analyzes and standardizes methods for profiling distributed systems that focus on simulation to conduct experiments and build a graph model of the system. The theory of queueing networks is used for simulation modeling of distributed systems, receiving and processing user requests. To automate the above method of profiling distributed systems the software application was developed with a modular structure and similar to a SCADA-system.

  12. Analysis of the use of industrial control systems in simulators: state of the art and basic guidelines.

    PubMed

    Carrasco, Juan A; Dormido, Sebastián

    2006-04-01

    The use of industrial control systems in simulators facilitates the execution of engineering activities related with the installation and the optimization of the control systems in real plants. "Industrial control system" intends to be a valid term that would represent all the control systems which can be installed in an industrial plant, ranging from complex distributed control systems and SCADA packages to small single control devices. This paper summarizes the current alternatives for the development of simulators of industrial plants and presents an analysis of the process of integrating an industrial control system into a simulator, with the aim of helping in the installation of real control systems in simulators.

  13. Full load estimation of an offshore wind turbine based on SCADA and accelerometer data

    NASA Astrophysics Data System (ADS)

    Noppe, N.; Iliopoulos, A.; Weijtjens, W.; Devriendt, C.

    2016-09-01

    As offshore wind farms (OWFs) grow older, the optimal use of the actual fatigue lifetime of an offshore wind turbine (OWT) and predominantly its foundation will get more important. In case of OWTs, both quasi-static wind/thrust loads and dynamic loads, as induced by turbulence, waves and the turbine's dynamics, contribute to its fatigue life progression. To estimate the remaining useful life of an OWT, the stresses acting on the fatigue critical locations within the structure should be monitored continuously. Unfortunately, in case of the most common monopile foundations these locations are often situated below sea-level and near the mud line and thus difficult or even impossible to access for existing OWTs. Actual strain measurements taken at accessible locations above the sea level show a correlation between thrust load and several SCADA parameters. Therefore a model is created to estimate the thrust load using SCADA data and strain measurements. Afterwards the thrust load acting on the OWT is estimated using the created model and SCADA data only. From this model the quasi static loads on the foundation can be estimated over the lifetime of the OWT. To estimate the contribution of the dynamic loads a modal decomposition and expansion based virtual sensing technique is applied. This method only uses acceleration measurements recorded at accessible locations on the tower. Superimposing both contributions leads to a so-called multi-band virtual sensing. The result is a method that allows to estimate the strain history at any location on the foundation and thus the full load, being a combination of both quasi-static and dynamic loads, acting on the entire structure. This approach is validated using data from an operating Belgian OWF. An initial good match between measured and predicted strains for a short period of time proofs the concept.

  14. Prediction of contaminant fate and transport in potable water systems using H2OFate

    NASA Astrophysics Data System (ADS)

    Devarakonda, Venkat; Manickavasagam, Sivakumar; VanBlaricum, Vicki; Ginsberg, Mark

    2009-05-01

    BlazeTech has recently developed a software called H2OFate to predict the fate and transport of chemical and biological contaminants in water distribution systems. This software includes models for the reactions of these contaminants with residual disinfectant in bulk water and at the pipe wall, and their adhesion/reactions with the pipe walls. This software can be interfaced with sensors through SCADA systems to monitor water distribution networks for contamination events and activate countermeasures, as needed. This paper presents results from parametric calculations carried out using H2OFate for a simulated contaminant release into a sample water distribution network.

  15. Adopting Industry Standards for Control Systems Within Advanced Life Support

    NASA Technical Reports Server (NTRS)

    Young, James Scott; Boulanger, Richard

    2002-01-01

    This paper gives a description of OPC (Object Linking and Embedding for Process Control) standards for process control and outlines the experiences at JSC with using these standards to interface with I/O hardware from three independent vendors. The I/O hardware was integrated with a commercially available SCADA/HMI software package to make up the control and monitoring system for the Environmental Systems Test Stand (ESTS). OPC standards were utilized for communicating with I/O hardware and the software was used for implementing monitoring, PC-based distributed control, and redundant data storage over an Ethernet physical layer using an embedded din-rail mounted PC.

  16. Dynamic online sewer modelling in Helsingborg.

    PubMed

    Hernebring, C; Jönsson, L E; Thorén, U B; Møller, A

    2002-01-01

    Within the last decade, the sewer system in Helsingborg, Sweden has been rehabilitated in many ways along with the reconstruction of the WWTP Oresundsverket in order to obtain a high degree of nitrogen and phosphorus removal. In that context a holistic view has been applied in order to optimise the corrective measures as seen from the effects in the receiving waters. A sewer catchment model has been used to evaluate several operation strategies and the effect of introducing RTC. Recently, a MOUSE ONLINE system was installed. In this phase the objective is to establish a stable communication with the SCADA system and to generate short-term flow forecasts.

  17. Descriptive Model of Generic WAMS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hauer, John F.; DeSteese, John G.

    The Department of Energy’s (DOE) Transmission Reliability Program is supporting the research, deployment, and demonstration of various wide area measurement system (WAMS) technologies to enhance the reliability of the Nation’s electrical power grid. Pacific Northwest National Laboratory (PNNL) was tasked by the DOE National SCADA Test Bed Program to conduct a study of WAMS security. This report represents achievement of the milestone to develop a generic WAMS model description that will provide a basis for the security analysis planned in the next phase of this study.

  18. Proactive monitoring of an onshore wind farm through lidar measurements, SCADA data and a data-driven RANS solver

    NASA Astrophysics Data System (ADS)

    Iungo, Giacomo Valerio; Camarri, Simone; Ciri, Umberto; El-Asha, Said; Leonardi, Stefano; Rotea, Mario A.; Santhanagopalan, Vignesh; Viola, Francesco; Zhan, Lu

    2016-11-01

    Site conditions, such as topography and local climate, as well as wind farm layout strongly affect performance of a wind power plant. Therefore, predictions of wake interactions and their effects on power production still remain a great challenge in wind energy. For this study, an onshore wind turbine array was monitored through lidar measurements, SCADA and met-tower data. Power losses due to wake interactions were estimated to be approximately 4% and 2% of the total power production under stable and convective conditions, respectively. This dataset was then leveraged for the calibration of a data driven RANS (DDRANS) solver, which is a compelling tool for prediction of wind turbine wakes and power production. DDRANS is characterized by a computational cost as low as that for engineering wake models, and adequate accuracy achieved through data-driven tuning of the turbulence closure model. DDRANS is based on a parabolic formulation, axisymmetry and boundary layer approximations, which allow achieving low computational costs. The turbulence closure model consists in a mixing length model, which is optimally calibrated with the experimental dataset. Assessment of DDRANS is then performed through lidar and SCADA data for different atmospheric conditions. This material is based upon work supported by the National Science Foundation under the I/UCRC WindSTAR, NSF Award IIP 1362033.

  19. Influence of rotational energy barriers to the conformational search of protein loops in molecular dynamics and ranking the conformations.

    PubMed

    Tappura, K

    2001-08-15

    An adjustable-barrier dihedral angle potential was added as an extension to a novel, previously presented soft-core potential to study its contribution to the efficacy of the search of the conformational space in molecular dynamics. As opposed to the conventional soft-core potential functions, the leading principle in the design of the new soft-core potential, as well as of its extension, the soft-core and adjustable-barrier dihedral angle (SCADA) potential (referred as the SCADA potential), was to maintain the main equilibrium properties of the original force field. This qualifies the methods for a variety of a priori modeling problems without need for additional restraints typically required with the conventional soft-core potentials. In the present study, the different potential energy functions are applied to the problem of predicting loop conformations in proteins. Comparison of the performance of the soft-core and SCADA potential showed that the main hurdles for the efficient sampling of the conformational space of (loops in) proteins are related to the high-energy barriers caused by the Lennard-Jones and Coulombic energy terms, and not to the rotational barriers, although the conformational search can be further enhanced by lowering the rotational barriers of the dihedral angles. Finally, different evaluation methods were studied and a few promising criteria found to distinguish the near-native loop conformations from the wrong ones.

  20. Physical and Technical Energy Problems: Testing of the Prototype for State Estimation of Large-Scale Power Systems / Lielo Energosistēmu Stāvokļa Novērtēšanas Prototipa Testēšana

    NASA Astrophysics Data System (ADS)

    Kochukov, O.; Briņķis, K.; Mutule, A.

    2013-08-01

    The paper describes the algorithm for distributed state estimation (SE) and is focused on its testing and validation. For this purpose, different events in the modeled power system of the 330-750 kV electrical ring Latvia - Lithuania - Belarus - Smolensk - Moscow - St. Petersburg - Estonia - Latvia were considered. The methods for testing the Inter-TSO SE prototype and dynamic network monitoring & modeling are based on comparison of the available SCADA data about real events with those of SE calculation. In total, four operational states were studied, including initial, accident and two post-accident operational states Rakstā tiek aprakstīti, testēti un novērtēti izkliedēta stāvokļa novērtēšanas algoritmi. Testēšanas nolūkos tika izmantoti dažādi 330-750 kV elektriskā loka Latvija - Lietuva - Baltkrievija - Smoļenska - Maskava - Pēterburga - Igaunija - Latvija modelēti scenāriji. Prototipa testēšanas metodoloģija balstīta uz pieejamo SCADA datu salīdzināšanu ar stāvokļa novērtēšanas prototipa aprēķina rezultātiem. Kopumā apskatīti sākotnējais, avārijas un divi pēcavārijas režīmi

  1. Providing security for automated process control systems at hydropower engineering facilities

    NASA Astrophysics Data System (ADS)

    Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.

    2016-12-01

    This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.

  2. Sophia Daemon Version 12

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2012-08-09

    Sophia Daemon Version 12 contains the code that is exclusively used by the ‘sophiad’ application. It runs as a service on a Linux host and analyzes network traffic obtained from libpcap and produces a network fingerprint based on hosts and channels. Sophia Daemon Version 12 can, if desired by the user, produce alerts when its fingerprint changes. Sophia Daemon Version 12 can receive data from another Sophia Daemon or raw packet data. It can output data to another Sophia Daemon Version 12, OglNet Version 12 or MySQL. Sophia Daemon Version 12 runs in a passive real-time manner that allows itmore » to be used on a SCADA network. Its network fingerprint is designed to be applicable to SCADA networks rather than general IT networks.« less

  3. Towards a new Mercator Observatory Control System

    NASA Astrophysics Data System (ADS)

    Pessemier, W.; Raskin, G.; Prins, S.; Saey, P.; Merges, F.; Padilla, J. P.; Van Winckel, H.; Waelkens, C.

    2010-07-01

    A new control system is currently being developed for the 1.2-meter Mercator Telescope at the Roque de Los Muchachos Observatory (La Palma, Spain). Formerly based on transputers, the new Mercator Observatory Control System (MOCS) consists of a small network of Linux computers complemented by a central industrial controller and an industrial real-time data communication network. Python is chosen as the high-level language to develop flexible yet powerful supervisory control and data acquisition (SCADA) software for the Linux computers. Specialized applications such as detector control, auto-guiding and middleware management are also integrated in the same Python software package. The industrial controller, on the other hand, is connected to the majority of the field devices and is targeted to run various control loops, some of which are real-time critical. Independently of the Linux distributed control system (DCS), this controller makes sure that high priority tasks such as the telescope motion, mirror support and hydrostatic bearing control are carried out in a reliable and safe way. A comparison is made between different controller technologies including a LabVIEW embedded system, a PROFINET Programmable Logic Controller (PLC) and motion controller, and an EtherCAT embedded PC (soft-PLC). As the latter is chosen as the primary platform for the lower level control, a substantial part of the software is being ported to the IEC 61131-3 standard programming languages. Additionally, obsolete hardware is gradually being replaced by standard industrial alternatives with fast EtherCAT communication. The use of Python as a scripting language allows a smooth migration to the final MOCS: finished parts of the new control system can readily be commissioned to replace the corresponding transputer units of the old control system with minimal downtime. In this contribution, we give an overview of the systems design, implementation details and the current status of the project.

  4. How gamma radiation processing systems are benefiting from the latest advances in information technology

    NASA Astrophysics Data System (ADS)

    Gibson, Wayne H.; Levesque, Daniel

    2000-03-01

    This paper discusses how gamma irradiation plants are putting the latest advances in computer and information technology to use for better process control, cost savings, and strategic advantages. Some irradiator operations are gaining significant benefits by integrating computer technology and robotics with real-time information processing, multi-user databases, and communication networks. The paper reports on several irradiation facilities that are making good use of client/server LANs, user-friendly graphics interfaces, supervisory control and data acquisition (SCADA) systems, distributed I/O with real-time sensor devices, trending analysis, real-time product tracking, dynamic product scheduling, and automated dosimetry reading. These plants are lowering costs by fast and reliable reconciliation of dosimetry data, easier validation to GMP requirements, optimizing production flow, and faster release of sterilized products to market. There is a trend in the manufacturing sector towards total automation using "predictive process control". Real-time verification of process parameters "on-the-run" allows control parameters to be adjusted appropriately, before the process strays out of limits. Applying this technology to the gamma radiation process, control will be based on monitoring the key parameters such as time, and making adjustments during the process to optimize quality and throughput. Dosimetry results will be used as a quality control measurement rather than as a final monitor for the release of the product. Results are correlated with the irradiation process data to quickly and confidently reconcile variations. Ultimately, a parametric process control system utilizing responsive control, feedback and verification will not only increase productivity and process efficiency, but can also result in operating within tighter dose control set points.

  5. Study on Cyber Security and Threat Evaluation in SCADA Systems

    DTIC Science & Technology

    2012-03-01

    la sécurité de l’infrastructure essentielle du Canada. DRDC CSS CR 2012-06 vii • Les cadres de gestion des cybermenaces et des ...Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2012 DRDC CSS CR 2012-06 i Abstract …….. This...ii DRDC CSS CR 2012-06 Résumé …..... Le présent rapport fait la synthèse des résultats du projet PTSP 02-0347eSec

  6. Wind turbine wake measurement in complex terrain

    NASA Astrophysics Data System (ADS)

    Hansen, KS; Larsen, GC; Menke, R.; Vasiljevic, N.; Angelou, N.; Feng, J.; Zhu, WJ; Vignaroli, A.; W, W. Liu; Xu, C.; Shen, WZ

    2016-09-01

    SCADA data from a wind farm and high frequency time series measurements obtained with remote scanning systems have been analysed with focus on identification of wind turbine wake properties in complex terrain. The analysis indicates that within the flow regime characterized by medium to large downstream distances (more than 5 diameters) from the wake generating turbine, the wake changes according to local atmospheric conditions e.g. vertical wind speed. In very complex terrain the wake effects are often “overruled” by distortion effects due to the terrain complexity or topology.

  7. Energy measurement using flow computers and chromatography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beeson, J.

    1995-12-01

    Arkla Pipeline Group (APG), along with most transmission companies, went to electronic flow measurement (EFM) to: (1) Increase resolution and accuracy; (2) Real time correction of flow variables; (3) Increase speed in data retrieval; (4) Reduce capital expenditures; and (5) Reduce operation and maintenance expenditures Prior to EFM, mechanical seven day charts were used which yielded 800 pressure and differential pressure readings. EFM yields 1.2-million readings, a 1500 time improvement in resolution and additional flow representation. The total system accuracy of the EFM system is 0.25 % compared with 2 % for the chart system which gives APG improved accuracy.more » A typical APG electronic measurement system includes a microprocessor-based flow computer, a telemetry communications package, and a gas chromatograph. Live relative density (specific gravity), BTU, CO{sub 2}, and N{sub 2} are updated from the chromatograph to the flow computer every six minutes which provides accurate MMBTU computations. Because the gas contract length has changed from years to monthly and from a majority of direct sales to transports both Arkla and its customers wanted access to actual volumes on a much more timely basis than is allowed with charts. The new electronic system allows volumes and other system data to be retrieved continuously, if EFM is on Supervisory Control and Data Acquisition (SCADA) or daily if on dial up telephone. Previously because of chart integration, information was not available for four to six weeks. EFM costs much less than the combined costs of telemetry transmitters, pressure and differential pressure chart recorders, and temperature chart recorder which it replaces. APG will install this equipment on smaller volume stations at a customers expense. APG requires backup measurement on metering facilities this size. It could be another APG flow computer or chart recorder, or the other companies flow computer or chart recorder.« less

  8. An Integrated Simulation Module for Cyber-Physical Automation Systems †

    PubMed Central

    Ferracuti, Francesco; Freddi, Alessandro; Monteriù, Andrea; Prist, Mariorosario

    2016-01-01

    The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems. Due to the complexity of real CPSs, emulators and simulators are often used to replace the real control devices and physical connections during the development stage. The most widespread simulators are free, open source, expandable, flexible and fully integrated into mathematical modeling tools; however, the connection at a physical level and the direct interaction with the real process via the WSN are only marginally tackled; moreover, the simulated wireless sensor motes are not able to generate the analogue output typically required for control purposes. A new simulation module for the control of a wireless cyber-physical system is proposed in this paper. The module integrates the COntiki OS JAva Simulator (COOJA), a cross-level wireless sensor network simulator, and the LabVIEW system design software from National Instruments. The proposed software module has been called “GILOO” (Graphical Integration of Labview and cOOja). It allows one to develop and to debug control strategies over the WSN both using virtual or real hardware modules, such as the National Instruments Real-Time Module platform, the CompactRio, the Supervisory Control And Data Acquisition (SCADA), etc. To test the proposed solution, we decided to integrate it with one of the most popular simulators, i.e., the Contiki OS, and wireless motes, i.e., the Sky mote. As a further contribution, the Contiki Sky DAC driver and a new “Advanced Sky GUI” have been proposed and tested in the COOJA Simulator in order to provide the possibility to develop control over the WSN. To test the performances of the proposed GILOO software module, several experimental tests have been made, and interesting preliminary results are reported. The GILOO module has been applied to a smart home mock-up where a networked control has been developed for the LED lighting system. PMID:27164109

  9. An Integrated Simulation Module for Cyber-Physical Automation Systems.

    PubMed

    Ferracuti, Francesco; Freddi, Alessandro; Monteriù, Andrea; Prist, Mariorosario

    2016-05-05

    The integration of Wireless Sensors Networks (WSNs) into Cyber Physical Systems (CPSs) is an important research problem to solve in order to increase the performances, safety, reliability and usability of wireless automation systems. Due to the complexity of real CPSs, emulators and simulators are often used to replace the real control devices and physical connections during the development stage. The most widespread simulators are free, open source, expandable, flexible and fully integrated into mathematical modeling tools; however, the connection at a physical level and the direct interaction with the real process via the WSN are only marginally tackled; moreover, the simulated wireless sensor motes are not able to generate the analogue output typically required for control purposes. A new simulation module for the control of a wireless cyber-physical system is proposed in this paper. The module integrates the COntiki OS JAva Simulator (COOJA), a cross-level wireless sensor network simulator, and the LabVIEW system design software from National Instruments. The proposed software module has been called "GILOO" (Graphical Integration of Labview and cOOja). It allows one to develop and to debug control strategies over the WSN both using virtual or real hardware modules, such as the National Instruments Real-Time Module platform, the CompactRio, the Supervisory Control And Data Acquisition (SCADA), etc. To test the proposed solution, we decided to integrate it with one of the most popular simulators, i.e., the Contiki OS, and wireless motes, i.e., the Sky mote. As a further contribution, the Contiki Sky DAC driver and a new "Advanced Sky GUI" have been proposed and tested in the COOJA Simulator in order to provide the possibility to develop control over the WSN. To test the performances of the proposed GILOO software module, several experimental tests have been made, and interesting preliminary results are reported. The GILOO module has been applied to a smart home mock-up where a networked control has been developed for the LED lighting system.

  10. Hardware-software and algorithmic provision of multipoint systems for long-term monitoring of dynamic processes

    NASA Astrophysics Data System (ADS)

    Yakunin, A. G.; Hussein, H. M.

    2017-08-01

    An example of information-measuring systems for climate monitoring and operational control of energy resources consumption of the university campus that is functioning in the Altai State Technical University since 2009. The advantages of using such systems for studying various physical processes are discussed. General principles of construction of similar systems, their software, hardware and algorithmic support are considered. It is shown that their fundamental difference from traditional SCADA - systems is the use of databases for storing the results of the observation with a specialized data structure, and by preprocessing of the input signal for its compression. Another difference is the absence of clear criteria for detecting the anomalies in the time series of the observed process. The examples of algorithms that solve this problem are given.

  11. Visually enhanced CCTV digital surveillance utilizing Intranet and Internet.

    PubMed

    Ozaki, Nobuyuki

    2002-07-01

    This paper describes a solution for integrated plant supervision utilizing closed circuit television (CCTV) digital surveillance. Three basic requirements are first addressed as the platform of the system, with discussion on the suitable video compression. The system configuration is described in blocks. The system provides surveillance functionality: real-time monitoring, and process analysis functionality: a troubleshooting tool. This paper describes the formulation of practical performance design for determining various encoder parameters. It also introduces image processing techniques for enhancing the original CCTV digital image to lessen the burden on operators. Some screenshots are listed for the surveillance functionality. For the process analysis, an image searching filter supported by image processing techniques is explained with screenshots. Multimedia surveillance, which is the merger with process data surveillance, or the SCADA system, is also explained.

  12. Development of an automatic subsea blowout preventer stack control system using PLC based SCADA.

    PubMed

    Cai, Baoping; Liu, Yonghong; Liu, Zengkai; Wang, Fei; Tian, Xiaojie; Zhang, Yanzhen

    2012-01-01

    An extremely reliable remote control system for subsea blowout preventer stack is developed based on the off-the-shelf triple modular redundancy system. To meet a high reliability requirement, various redundancy techniques such as controller redundancy, bus redundancy and network redundancy are used to design the system hardware architecture. The control logic, human-machine interface graphical design and redundant databases are developed by using the off-the-shelf software. A series of experiments were performed in laboratory to test the subsea blowout preventer stack control system. The results showed that the tested subsea blowout preventer functions could be executed successfully. For the faults of programmable logic controllers, discrete input groups and analog input groups, the control system could give correct alarms in the human-machine interface. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.

  13. Designing an operator interface? Consider user`s `psychology`

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Toffer, D.E.

    The modern operator interface is a channel of communication between operators and the plant that, ideally, provides them with information necessary to keep the plant running at maximum efficiency. Advances in automation technology have increased information flow from the field to the screen. New and improved Supervisory Control and Data Acquisition (SCADA) packages provide designers with powerful and open design considerations. All too often, however, systems go to the field designed for the software rather than the operator. Plant operators` jobs have changed fundamentally, from controlling their plants from out in the field to doing so from within control rooms.more » Control room-based operation does not denote idleness. Trained operators should be engaged in examination of plant status and cognitive evaluation of plant efficiencies. Designers who are extremely computer literate, often do not consider demographics of field operators. Many field operators have little knowledge of modern computer systems. As a result, they do not take full advantage of the interface`s capabilities. Designers often fail to understand the true nature of how operators run their plants. To aid field operators, designers must provide familiar controls and intuitive choices. To achieve success in interface design, it is necessary to understand the ways in which humans think conceptually, and to understand how they process this information physically. The physical and the conceptual are closely related when working with any type of interface. Designers should ask themselves: {open_quotes}What type of information is useful to the field operator?{close_quotes} Let`s explore an integration model that contains the following key elements: (1) Easily navigated menus; (2) Reduced chances for misunderstanding; (3) Accurate representations of the plant or operation; (4) Consistent and predictable operation; (5) A pleasant and engaging interface that conforms to the operator`s expectations. 4 figs.« less

  14. Multiple tests for wind turbine fault detection and score fusion using two- level multidimensional scaling (MDS)

    NASA Astrophysics Data System (ADS)

    Ye, Xiang; Gao, Weihua; Yan, Yanjun; Osadciw, Lisa A.

    2010-04-01

    Wind is an important renewable energy source. The energy and economic return from building wind farms justify the expensive investments in doing so. However, without an effective monitoring system, underperforming or faulty turbines will cause a huge loss in revenue. Early detection of such failures help prevent these undesired working conditions. We develop three tests on power curve, rotor speed curve, pitch angle curve of individual turbine. In each test, multiple states are defined to distinguish different working conditions, including complete shut-downs, under-performing states, abnormally frequent default states, as well as normal working states. These three tests are combined to reach a final conclusion, which is more effective than any single test. Through extensive data mining of historical data and verification from farm operators, some state combinations are discovered to be strong indicators of spindle failures, lightning strikes, anemometer faults, etc, for fault detection. In each individual test, and in the score fusion of these tests, we apply multidimensional scaling (MDS) to reduce the high dimensional feature space into a 3-dimensional visualization, from which it is easier to discover turbine working information. This approach gains a qualitative understanding of turbine performance status to detect faults, and also provides explanations on what has happened for detailed diagnostics. The state-of-the-art SCADA (Supervisory Control And Data Acquisition) system in industry can only answer the question whether there are abnormal working states, and our evaluation of multiple states in multiple tests is also promising for diagnostics. In the future, these tests can be readily incorporated in a Bayesian network for intelligent analysis and decision support.

  15. Key management schemes using routing information frames in secure wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  16. Secure VM for Monitoring Industrial Process Controllers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K

    2011-01-01

    In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicatedmore » host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.« less

  17. Use of Fuzzy Logic Systems for Assessment of Primary Faults

    NASA Astrophysics Data System (ADS)

    Petrović, Ivica; Jozsa, Lajos; Baus, Zoran

    2015-09-01

    In electric power systems, grid elements are often subjected to very complex and demanding disturbances or dangerous operating conditions. Determining initial fault or cause of those states is a difficult task. When fault occurs, often it is an imperative to disconnect affected grid element from the grid. This paper contains an overview of possibilities for using fuzzy logic in an assessment of primary faults in the transmission grid. The tool for this task is SCADA system, which is based on information of currents, voltages, events of protection devices and status of circuit breakers in the grid. The function model described with the membership function and fuzzy logic systems will be presented in the paper. For input data, diagnostics system uses information of protection devices tripping, states of circuit breakers and measurements of currents and voltages before and after faults.

  18. Wind Turbine Failures - Tackling current Problems in Failure Data Analysis

    NASA Astrophysics Data System (ADS)

    Reder, M. D.; Gonzalez, E.; Melero, J. J.

    2016-09-01

    The wind industry has been growing significantly over the past decades, resulting in a remarkable increase in installed wind power capacity. Turbine technologies are rapidly evolving in terms of complexity and size, and there is an urgent need for cost effective operation and maintenance (O&M) strategies. Especially unplanned downtime represents one of the main cost drivers of a modern wind farm. Here, reliability and failure prediction models can enable operators to apply preventive O&M strategies rather than corrective actions. In order to develop these models, the failure rates and downtimes of wind turbine (WT) components have to be understood profoundly. This paper is focused on tackling three of the main issues related to WT failure analyses. These are, the non-uniform data treatment, the scarcity of available failure analyses, and the lack of investigation on alternative data sources. For this, a modernised form of an existing WT taxonomy is introduced. Additionally, an extensive analysis of historical failure and downtime data of more than 4300 turbines is presented. Finally, the possibilities to encounter the lack of available failure data by complementing historical databases with Supervisory Control and Data Acquisition (SCADA) alarms are evaluated.

  19. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan; Cheng, Liang; Chuah, Mooi Choo

    In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impactsmore » of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.« less

  1. Brazil upgrades microwave system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Newman, H.S.; Gomes, H.P.

    1979-02-01

    To provide communications facilities necessary during major construction projects, and for the operation and control of the expanding electric-power network, in 1967 Furnas-Centrais Eletricas SA, Brazil, started installing the first 22 links of its microwave system, from the Botafogo plant in Rio de Janeiro to the Furnas hydro station, and from the Furnas hydro station, southwest, to the Guarulhos plant in Sao Paulo and northwest to the Estreito hydro plant. To accommodate the construction of additional hydroelectric facilities, the second and third microwave-system expansions added nine links from Estreito hydro, northwest, to Marimbondo hydro and 7 links to Itumbiara. Themore » fourth expansion included two links to connect with the Angra dos Reis nuclear generating plant. A modern SCADA system replaced an earlier fault-reporting method, and a means of monitoring performance communications was established.« less

  2. An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems

    NASA Astrophysics Data System (ADS)

    Hieb, Jeffrey; Graham, James; Guan, Jian

    This paper presents an ontological framework that permits formal representations of process control systems, including elements of the process being controlled and the control system itself. A fault diagnosis algorithm based on the ontological model is also presented. The algorithm can identify traditional process elements as well as control system elements (e.g., IP network and SCADA protocol) as fault sources. When these elements are identified as a likely fault source, the possibility exists that the process fault is induced by a cyber intrusion. A laboratory-scale distillation column is used to illustrate the model and the algorithm. Coupled with a well-defined statistical process model, this fault diagnosis approach provides cyber security enhanced fault diagnosis information to plant operators and can help identify that a cyber attack is underway before a major process failure is experienced.

  3. Cryogenic Control System Migration and Developments towards the UNICOS CERN Standard at INFN

    NASA Astrophysics Data System (ADS)

    Modanese, Paolo; Calore, Andrea; Contran, Tiziano; Friso, Alessandro; Pengo, Marco; Canella, Stefania; Burioli, Sergio; Gallese, Benedetto; Inglese, Vitaliano; Pezzetti, Marco; Pengo, Ruggero

    The cryogenic control systems at Laboratori Nazionali di Legnaro (LNL) are undergoing an important and radical modernization, allowing all the plants controls and supervision systems to be renewed in a homogeneous way towards the CERN-UNICOS standard. Before the UNICOS migration project started there were as many as 7 different types of PLC and 7 different types of SCADA, each one requiring its own particular programming language. In these conditions, even a simple modification and/or integration on the program or on the supervision, required the intervention of a system integrator company, specialized in its specific control system. Furthermore it implied that the operators have to be trained to learn the different types of control systems. The CERN-UNICOS invented for LHC [1] has been chosen due to its reliability and planned to run and be maintained for decades on. The complete migration is part of an agreement between CERN and INFN.

  4. Coherent operation of detector systems and their readout electronics in a complex experiment control environment

    NASA Astrophysics Data System (ADS)

    Koestner, Stefan

    2009-09-01

    With the increasing size and degree of complexity of today's experiments in high energy physics the required amount of work and complexity to integrate a complete subdetector into an experiment control system is often underestimated. We report here on the layered software structure and protocols used by the LHCb experiment to control its detectors and readout boards. The experiment control system of LHCb is based on the commercial SCADA system PVSS II. Readout boards which are outside the radiation area are accessed via embedded credit card sized PCs which are connected to a large local area network. The SPECS protocol is used for control of the front end electronics. Finite state machines are introduced to facilitate the control of a large number of electronic devices and to model the whole experiment at the level of an expert system.

  5. A study on the impact of high penetration distributed generation inverters on grid operation and stability

    NASA Astrophysics Data System (ADS)

    Gu, Fei; Brouwer, Jack; Samuelsen, Scott

    2013-09-01

    Recent advances in inverter technology have enabled ancillary services such as volt/VAR regulation, SCADA communications, and active power filtering. Smart inverters can not only provide real power, but can be controlled to use excess capacity to provide reactive power compensation, power flow control, and active power filtering without supplementary inverter hardware. A transient level inverter model based on the Solectria 7700 inverter is developed and used to assess these control strategies using field data from an existing branch circuit containing two Amonix 68kW CPV-7700 systems installed at the University of California, Irvine.

  6. Designing and Implementation a Lab Testing Method for Power Cables Insulation Resistance According with STAS 10411-89, SR EN ISO/CEI/17025/2005

    NASA Astrophysics Data System (ADS)

    Dobra, R.; Pasculescu, D.; Marc, G.; Risteiu, M.; Antonov, A.

    2017-06-01

    Insulation resistance measurement is one of the most important tests required by standards and regulations in terms of electrical safety. Why these tests are is to prevent possible accidents caused by electric shock, damage to equipment or outbreak of fire in normal operating conditions of electrical cables. The insulation resistance experiment refers to the testing of electrical cable insulation, which has a measured resistance that must be below the imposed regulations. Using a microcontroller system data regarding the insulation resistance of the power cables is acquired and with SCADA software the test results are displayed.

  7. Application of a support vector machine algorithm to the safety precaution technique of medium-low pressure gas regulators

    NASA Astrophysics Data System (ADS)

    Hao, Xuejun; An, Xaioran; Wu, Bo; He, Shaoping

    2018-02-01

    In the gas pipeline system, safe operation of a gas regulator determines the stability of the fuel gas supply, and the medium-low pressure gas regulator of the safety precaution system is not perfect at the present stage in the Beijing Gas Group; therefore, safety precaution technique optimization has important social and economic significance. In this paper, according to the running status of the medium-low pressure gas regulator in the SCADA system, a new method for gas regulator safety precaution based on the support vector machine (SVM) is presented. This method takes the gas regulator outlet pressure data as input variables of the SVM model, the fault categories and degree as output variables, which will effectively enhance the precaution accuracy as well as save significant manpower and material resources.

  8. Radio Frequency Based Programmable Logic Controller Anomaly Detection

    DTIC Science & Technology

    2013-09-01

    include wireless radios, IEEE 802.15 Blue- tooth devices, cellular phones, and IEEE 802.11 WiFi networking devices. While wireless communication...MacKenzie, H. Shamoon Malware and SCADA Security What are the Im- pacts? . Technical Report, Tofino Security, Sep 2012. 61. Mateti,P. Hacking Techniques

  9. Microcontroller-Based Experimental Setup and Experiments for SCADA Education

    ERIC Educational Resources Information Center

    Sahin, S.; Olmez, M.; Isler, Y.

    2010-01-01

    In the field of automation technology, research and development for industrial applications has increased rapidly in recent years. Therefore, industrial automation and control education is a very important element of the industrialization process in developing countries, such as Turkey, which needs to keep abreast for the latest developments in…

  10. Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits

    DTIC Science & Technology

    2012-03-22

    may improve the SCADA system’s resilience against DoS and man-in-the-middle ( MITM ) attacks. DoS attacks may be mitigated by using the redundant...paths available on the network links. MITM attacks may be mitigated by the data integrity checks associated with the middleware. Figure 4 illustrates

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Jie; Jain, Rishabh; Hodge, Bri-Mathias

    A data-driven methodology is developed to analyze how ambient and wake turbulence affect the power generation of wind turbine(s). Using supervisory control and data acquisition (SCADA) data from a wind plant, we select two sets of wind velocity and power data for turbines on the edge of the plant that resemble (i) an out-of-wake scenario and (ii) an in-wake scenario. For each set of data, two surrogate models are developed to represent the turbine(s) power generation as a function of (i) the wind speed and (ii) the wind speed and turbulence intensity. Three types of uncertainties in turbine(s) power generationmore » are investigated: (i) the uncertainty in power generation with respect to the reported power curve; (ii) the uncertainty in power generation with respect to the estimated power response that accounts for only mean wind speed; and (iii) the uncertainty in power generation with respect to the estimated power response that accounts for both mean wind speed and turbulence intensity. Results show that (i) the turbine(s) generally produce more power under the in-wake scenario than under the out-of-wake scenario with the same wind speed; and (ii) there is relatively more uncertainty in the power generation under the in-wake scenario than under the out-of-wake scenario.« less

  12. CFD three dimensional wake analysis in complex terrain

    NASA Astrophysics Data System (ADS)

    Castellani, F.; Astolfi, D.; Terzi, L.

    2017-11-01

    Even if wind energy technology is nowadays fully developed, the use of wind energy in very complex terrain is still challenging. In particular, it is challenging to characterize the combination effects of wind ow over complex terrain and wake interactions between nearby turbines and this has a practical relevance too, for the perspective of mitigating anomalous vibrations and loads as well improving the farm efficiency. In this work, a very complex terrain site has been analyzed through a Reynolds-averaged CFD (Computational Fluid Dynamics) numerical wind field model; in the simulation the inuence of wakes has been included through the Actuator Disk (AD) approach. In particular, the upstream turbine of a cluster of 4 wind turbines having 2.3 MW of rated power is studied. The objective of this study is investigating the full three-dimensional wind field and the impact of three-dimensionality on the evolution of the waked area between nearby turbines. A post-processing method of the output of the CFD simulation is developed and this allows to estimate the wake lateral deviation and the wake width. The reliability of the numerical approach is inspired by and crosschecked through the analysis of the operational SCADA (Supervisory Control and Data Acquisition) data of the cluster of interest.

  13. Power Plant Model Validation Tool

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The PPMV is used to validate generator model using disturbance recordings. The PPMV tool contains a collection of power plant models and model validation studies, as well as disturbance recordings from a number of historic grid events. The user can import data from a new disturbance into the database, which converts PMU and SCADA data into GE PSLF format, and then run the tool to validate (or invalidate) the model for a specific power plant against its actual performance. The PNNL PPMV tool enables the automation of the process of power plant model validation using disturbance recordings. The tool usesmore » PMU and SCADA measurements as input information. The tool automatically adjusts all required EPCL scripts and interacts with GE PSLF in the batch mode. The main tool features includes: The tool interacts with GE PSLF; The tool uses GE PSLF Play-In Function for generator model validation; Database of projects (model validation studies); Database of the historic events; Database of the power plant; The tool has advanced visualization capabilities; and The tool automatically generates reports« less

  14. A Testbed Environment for Buildings-to-Grid Cyber Resilience Research and Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sridhar, Siddharth; Ashok, Aditya; Mylrea, Michael E.

    The Smart Grid is characterized by the proliferation of advanced digital controllers at all levels of its operational hierarchy from generation to end consumption. Such controllers within modern residential and commercial buildings enable grid operators to exercise fine-grained control over energy consumption through several emerging Buildings-to-Grid (B2G) applications. Though this capability promises significant benefits in terms of operational economics and improved reliability, cybersecurity weaknesses in the supporting infrastructure could be exploited to cause a detrimental effect and this necessitates focused research efforts on two fronts. First, the understanding of how cyber attacks in the B2G space could impact grid reliabilitymore » and to what extent. Second, the development and validation of cyber-physical application-specific countermeasures that are complementary to traditional infrastructure cybersecurity mechanisms for enhanced cyber attack detection and mitigation. The PNNL B2G testbed is currently being developed to address these core research needs. Specifically, the B2G testbed combines high-fidelity buildings+grid simulators, industry-grade building automation and Supervisory Control and Data Acquisition (SCADA) systems in an integrated, realistic, and reconfigurable environment capable of supporting attack-impact-detection-mitigation experimentation. In this paper, we articulate the need for research testbeds to model various B2G applications broadly by looking at the end-to-end operational hierarchy of the Smart Grid. Finally, the paper not only describes the architecture of the B2G testbed in detail, but also addresses the broad spectrum of B2G resilience research it is capable of supporting based on the smart grid operational hierarchy identified earlier.« less

  15. The use of pneumatically generated water pressure signals for aquifer characterization

    NASA Astrophysics Data System (ADS)

    Fort, M.; Roberts, R.; Chace, D.

    2013-12-01

    The use of pneumatically generated pressure signals for aquifer characterization Hydraulic tests are the most reliable method of obtaining estimates of hydrologic properties, such as conductivity, that are essential for flow and transport modeling. The use of a sinusoidal signal for hydraulic testing is well established, with Streltsova (1988), Rasmussen (2003) and others having developed analytic solutions. Sinusoidal tests provide a unique easily distinguished signal that reduces ambiguity during analysis and we show that a sinusoidal pressure signal propagates farther into the formation than a standard slug-test signal. If a sinusoidal test is combined with a slug and/or a constant rate test, it can further reduce uncertainty in the estimated parameter values. We demonstrate how pneumatic pressure can be used to generate all three of these signals. By positioning pressure transducers both below the water level and in the head space above the water, we can monitor the total pressure acting on the formation and the changes in water level. From the changes in water level, it is possible to calculate the flow rate in and out of the well, assuming that the well diameter and water density are known. Using gas flow controllers with a Supervisory Control And Data Acquisition (SCADA) system we are able to precisely control the pressures in the well. The use of pneumatic pressure has the advantage that it requires less equipment (no pumps) and produces no water. We also show how the numerical well test analysis program nSIGHTS can be used to analyze all three types of tests simultaneously and to assess the relative contribution of each type of test to the parameter estimation. nSIGHTS was recently released as open source by Sandia National Laboratories and is available for free.

  16. Proactive monitoring of a wind turbine array with lidar measurements, SCADA data and a data-driven RANS solver

    NASA Astrophysics Data System (ADS)

    Iungo, G.; Said, E. A.; Santhanagopalan, V.; Zhan, L.

    2016-12-01

    Power production of a wind farm and durability of wind turbines are strongly dependent on non-linear wake interactions occurring within a turbine array. Wake dynamics are highly affected by the specific site conditions, such as topography and local atmospheric conditions. Furthermore, contingencies through the life of a wind farm, such as turbine ageing and off-design operations, make prediction of wake interactions and power performance a great challenge in wind energy. In this work, operations of an onshore wind turbine array were monitored through lidar measurements, SCADA and met-tower data. The atmospheric wind field investing the wind farm was estimated by using synergistically the available data through five different methods, which are characterized by different confidence levels. By combining SCADA data and the lidar measurements, it was possible to estimate power losses connected with wake interactions. For this specific array, power losses were estimated to be 4% and 2% of the total power production for stable and convective atmospheric regimes, respectively. The entire dataset was then leveraged for the calibration of a data-driven RANS (DDRANS) solver for prediction of wind turbine wakes and power production. The DDRANS is based on a parabolic formulation of the Navier-Stokes equations with axisymmetry and boundary layer approximations, which allow achieving very low computational costs. Accuracy in prediction of wind turbine wakes and power production is achieved through an optimal tuning of the turbulence closure model. The latter is based on a mixing length model, which was developed based on previous wind turbine wake studies carried out through large eddy simulations and wind tunnel experiments. Several operative conditions of the wind farm under examination were reproduced through DDRANS for different stability regimes, wind directions and wind velocity. The results show that DDRANS is capable of achieving a good level of accuracy in prediction of power production and wake velocity field associated with the turbine array.

  17. A software-based sensor for combined sewer overflows.

    PubMed

    Leonhardt, G; Fach, S; Engelhard, C; Kinzel, H; Rauch, W

    2012-01-01

    A new methodology for online estimation of excess flow from combined sewer overflow (CSO) structures based on simulation models is presented. If sufficient flow and water level data from the sewer system is available, no rainfall data are needed to run the model. An inverse rainfall-runoff model was developed to simulate net rainfall based on flow and water level data. Excess flow at all CSO structures in a catchment can then be simulated with a rainfall-runoff model. The method is applied to a case study and results show that the inverse rainfall-runoff model can be used instead of missing rain gauges. Online operation is ensured by software providing an interface to the SCADA-system of the operator and controlling the model. A water quality model could be included to simulate also pollutant concentrations in the excess flow.

  18. Innovation on Energy Power Technology (22)Challenge to Development of Expert System stored Knowledge of Expert Power Network Operators

    NASA Astrophysics Data System (ADS)

    Sakaguchi, Hideharu

    Do you remember an expert system? I think there are various impressions about the system. For example, some might say “It reminds me of old days”. On the other hand, some might say “It was really troublesome”. About 25 years ago, from late 1980s to the middle of 1990s, when the Showa era was about to change into the Heisei Era, artificial intelligence boomed. Research and development for an expert system which was equipped with expertise and worked as smart as expert, was advanced in various fields. Our company also picked up the system as the new system which covered weak point of conventional computer technology. We started research and development in 1984, and installed an expert system in a SCADA system, which started operating in March 1990 in the Fukuoka Integrated Control Center. In this essay, as an electric power engineer who involved in development at that time, I introduce the situation and travail story about developing an expert system which support restorative actions from the outage and overload condition of power networks.

  19. Scalable Asset Discovery, Vulnerability Scanning, and Penetration Testing for Remote Sites and Wireless Spectrums Utilizing an Embedded Linux Plug - PwniPlug and the Raspberry Pi B+ as a Sample Pen Test

    NASA Technical Reports Server (NTRS)

    Ganzy, Ethan G.

    2014-01-01

    All devices attached to the NASA KSC network are subject to security vulnerability scanning and/or penetration testing. In today's changing environment, vulnerable and/or unprotected systems can easily be overlooked. Systems that are not properly managed can become a potential threat to the operational integrity of our systems and networks. This includes all NASA (internal and external) information systems within NASA KSC Internet Protocol (IP) address space, and NASA KSC facilities. The Office of the Chief Information Officer (OCIO) recommends that all NASA Centers and information systems be subject to penetration testing on a regular interval in accordance with the guidelines identified by the National Institute of Standards and Technology (NIST). (ITS-HBK-2810.04-02A) Protecting information and equipment at NASA is an area of increasing concern. In addition to the CPU's on the network; Supervisory, Control and Data Acquisition (SCADA) systems are especially vulnerable because these systems have lacked standards, use embedded controllers with little computational power and informal software, are connected to physical processes, have few operators, and are increasingly also being connected to corporate networks. The scope of work is comprised of several individual components which together build upon previous work by Drew Branch, NASA KSC Intern. The Pwn Plug is the selected COTS (Commercial-Off-The-Shelf) device chosen to test simplification of mandatory IT Security tasks. The device will be utilized to provide services to NASA KSC and enable an assessment of infrastructure soundness and regulatory compliance in an efficient, economical, and business responsive manner. The Pwn Plug is designed as a pen testing appliance which provides a hardware platform that can support commercial penetration testing efforts at significantly reduced costs. The expected outcomes are: 1) External Penetration Testing, 2) Social Engineering, 3) Procedural Documentation, 4) Recommended Remediation Action Plan, 5) System Retest & Remediation Attestation and 6) Final Reports, out briefing and Presentation. Due to physical and material constraints beyond intern and mentor control, the project was redefined as a working pen-test scenario. Limitations of lab availability and tools dictated an academic exercise. This report was developed within the scenario guidelines suggested by the project mentor. The guidelines were to be creative in developing a Pen Test program for a client.

  20. Final Technical Report. Project Boeing SGS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bell, Thomas E.

    Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less

  1. Managing operational documentation in the ALICE Detector Control System

    NASA Astrophysics Data System (ADS)

    Lechman, M.; Augustinus, A.; Bond, P.; Chochula, P.; Kurepin, A.; Pinazza, O.; Rosinsky, P.

    2012-12-01

    ALICE (A Large Ion Collider Experiment) is one of the big LHC (Large Hadron Collider) experiments at CERN in Geneve, Switzerland. The experiment is composed of 18 sub-detectors controlled by an integrated Detector Control System (DCS) that is implemented using the commercial SCADA package PVSSII. The DCS includes over 1200 network devices, over 1,000,000 monitored parameters and numerous custom made software components that are prepared by over 100 developers from all around the world. This complex system is controlled by a single operator via a central user interface. One of his/her main tasks is the recovery of anomalies and errors that may occur during operation. Therefore, clear, complete and easily accessible documentation is essential to guide the shifter through the expert interfaces of different subsystems. This paper describes the idea of the management of the operational documentation in ALICE using a generic repository that is built on a relational database and is integrated with the control system. The experience gained and the conclusions drawn from the project are also presented.

  2. A Novel Degradation Identification Method for Wind Turbine Pitch System

    NASA Astrophysics Data System (ADS)

    Guo, Hui-Dong

    2018-04-01

    It’s difficult for traditional threshold value method to identify degradation of operating equipment accurately. An novel degradation evaluation method suitable for wind turbine condition maintenance strategy implementation was proposed in this paper. Based on the analysis of typical variable-speed pitch-to-feather control principle and monitoring parameters for pitch system, a multi input multi output (MIMO) regression model was applied to pitch system, where wind speed, power generation regarding as input parameters, wheel rotation speed, pitch angle and motor driving currency for three blades as output parameters. Then, the difference between the on-line measurement and the calculated value from the MIMO regression model applying least square support vector machines (LSSVM) method was defined as the Observed Vector of the system. The Gaussian mixture model (GMM) was applied to fitting the distribution of the multi dimension Observed Vectors. Applying the model established, the Degradation Index was calculated using the SCADA data of a wind turbine damaged its pitch bearing retainer and rolling body, which illustrated the feasibility of the provided method.

  3. Technical Analysis of SSP-21 Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bromberger, S.

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will usemore » other advanced technologies to provide a subset of security services.« less

  4. Modeling of wastewater treatment system of car parks from petroleum products

    NASA Astrophysics Data System (ADS)

    Savdur, S. N.; Stepanova, Yu V.; Kodolova, I. A.; Fesina, E. L.

    2018-05-01

    The paper discusses the technological complex of wastewater treatment of car parks from petroleum products. Based on the review of the main modeling methods of discrete-continuous chemical and engineering processes, it substantiates expediency of using the theory of Petri nets (PN) for modeling the process of wastewater treatment of car parks from petroleum products. It is proposed to use a modification of Petri nets which is focused on modeling and analysis of discrete-continuous chemical and engineering processes by prioritizing transitions, timing marks in positions and transitions. A model in the form of modified Petri nets (MPN) is designed. A software package to control the process for wastewater treatment is designed by means of SCADA TRACE MODE.

  5. Development and implementation of an expert system to improve the control of nitrification and denitrification in the Vic wastewater treatment plant.

    PubMed

    Ribas, F; Rodríguez-Roda, I; Serrat, J; Clara, P; Comas, J

    2008-05-01

    Wastewater treatment plants employ various physical, chemical and biological processes to reduce pollutants from raw wastewater. One of the most important is the biological nitrogen removal process through nitrification and denitrification steps taking place in various sections of the biological reactor. One of the most extensively used configurations to achieve the biological nitrogen removal is an activated sludge system using oxidation ditch or extended aeration. To improve nitrogen removal in the wastewater treatment plant (WWTP) of Vic (Catalonia, NE Spain), the automatic aeration control system was complemented with an Expert System to always provide the most appropriate aeration or anoxia sequence based on the values of ammonium and nitrates given by an automatic analyzer. This article illustrates the development and implementation of this knowledge-based system within the framework of a Decision Support System, which performs SCADA functions. The paper also shows that the application of the decision support system in the Vic WWTP resulted in significant improvements to the biological nitrogen removal.

  6. Reducing SCADA System Nuisance Alarms in the Water Industry in Northern Ireland.

    PubMed

    O'Donoghue, Nigel; Phillips, Debra H; Nicell, Ciaran

    2015-08-01

    The advancement of telemetry control for the water industry has increased the difficulty of managing large volumes of nuisance alarms (i.e., alarms that do not require a response). The aim of this study was to identify and reduce the number of nuisance alarms that occur for Northern Ireland (NI) Water by carrying out alarm duration analysis to determine the appropriate length of persistence (an advanced alarm management tool) that could be applied. All data were extracted from TelemWeb (NI Water's telemetry monitoring system) and analyzed in Excel. Over a 6-week period, an average of 40 000 alarms occurred per week. The alarm duration analysis, which has never been implemented before by NI Water, found that an average of 57% of NI Water alarms had a duration of <5 minutes. Applying 5-minute persistence, therefore, could prevent an average 26 816 nuisance alarms per week. Most of these alarms were from wastewater assets.

  7. Wake losses from averaged and time-resolved power measurements at full scale wind turbines

    NASA Astrophysics Data System (ADS)

    Castellani, Francesco; Astolfi, Davide; Mana, Matteo; Becchetti, Matteo; Segalini, Antonio

    2017-05-01

    This work deals with the experimental analysis of wake losses fluctuations at full-scale wind turbines. The test case is a wind farm sited on a moderately complex terrain: 4 turbines are installed, having 2 MW of rated power each. The sources of information are the time-resolved data, as collected from the OPC server, and the 10-minutes averaged SCADA data. The objective is to compare the statistical distributions of wake losses for far and middle wakes, as can be observed through the “fast” lens of time-resolved data, for certain selected test-case time series, and through the “slow” lens of SCADA data, on a much longer time basis that allow to set the standards of the mean wake losses along the wind farm. Further, time-resolved data are used for an insight into the spectral properties of wake fluctuations, highlighting the role of the wind turbine as low-pass filter. Summarizing, the wind rose, the layout of the site and the structure of the data sets at disposal allow to study middle and far wake behavior, with a “slow” and “fast” perspective.

  8. A demonstrator for an integrated subway protection system

    NASA Astrophysics Data System (ADS)

    Detoma, E.; Capetti, P.; Casati, G.; Billington, S.

    2008-04-01

    In 2006 SEPA has carried on the installation and tests of a demonstrator for an integrated subway protection system at a new subway station in the Naples, Italy) metropolitan area. Protection of a subway system is a difficult task given the amount of passengers transported every day. The demonstrator has been limited to non-intrusive detection techniques not to impair the passenger flow into the station. The demonstrator integrates several technologies and products that have been developed by SEPA or are already available on the market (MKS Instruments,...). The main purpose is to provide detection capabilities for attempts to introduce radioactive substances in the subway station, in order to foil possible attempts to place a dirty bomb, and threat detection and identification following release of chemical agents. The system integrates additional sensors such as video surveillance cameras and air flow sensing to complement the basic sensors suite. The need to protect sensitive installations such as subway stations has been highlighted by the series of terroristics actions carried out in recent years in the subway in London. However, given the number of passengers of a metro system, it is impossible to propose security techniques operating in ways similar to the screening of passengers in airports. Passengers screening and threat detection and identification must be quick, non-intrusive and capable of screening a large number of passengers to be applicable to mass transit systems. In 2005 SEPA, a small company operating in the field of trains video-surveillance systems and radiation detectors, started developing an integrated system to provide a comprehensive protection to subway stations, based on ready available or off-the-shelf components in order to quickly develop a reliable system with available technology. We ruled out at the beginning any new development in order to speed up the fielding of the system in less than one year. The system was developed with commercial sensors and deployed in a new station of the Naples metropolitan transit system in Mugnano. The station was particularly suitable for the demonstration since it is a new station that includes air venting control, water barriers (for fire and smoke containment) and a complete SCADA system to integrate technical and video surveillance operations. In order to protect the subway, we tackled four basic technologies, all readily available in-house or on the market: - radiation detection, to detect the introduction in the station of radionuclides, that may be dispersed by conventional explosive (a "dirty" bomb); - chemical agents detection and identification (after release), complemented with air speed and velocity sensors to estimate, track and predict the contamination plume; - video surveillance, integrated with the SCADA system and already available in the station.

  9. Comparison of different modelling approaches of drive train temperature for the purposes of wind turbine failure detection

    NASA Astrophysics Data System (ADS)

    Tautz-Weinert, J.; Watson, S. J.

    2016-09-01

    Effective condition monitoring techniques for wind turbines are needed to improve maintenance processes and reduce operational costs. Normal behaviour modelling of temperatures with information from other sensors can help to detect wear processes in drive trains. In a case study, modelling of bearing and generator temperatures is investigated with operational data from the SCADA systems of more than 100 turbines. The focus is here on automated training and testing on a farm level to enable an on-line system, which will detect failures without human interpretation. Modelling based on linear combinations, artificial neural networks, adaptive neuro-fuzzy inference systems, support vector machines and Gaussian process regression is compared. The selection of suitable modelling inputs is discussed with cross-correlation analyses and a sensitivity study, which reveals that the investigated modelling techniques react in different ways to an increased number of inputs. The case study highlights advantages of modelling with linear combinations and artificial neural networks in a feedforward configuration.

  10. Deception Based Intrusion Detection & Prevention for SCADA Environments -

    Science.gov Websites

    the case of the Ukraine incident, the substations. So here's the idea. Number one, understand from idea is that one of the quotes that he made in that book, it's actually a famous quote, is that all security products. Case in point, I'll be at RSA in February. There's over 2,600 vendors at RSA all solving

  11. The CMS tracker control system

    NASA Astrophysics Data System (ADS)

    Dierlamm, A.; Dirkes, G. H.; Fahrer, M.; Frey, M.; Hartmann, F.; Masetti, L.; Militaru, O.; Shah, S. Y.; Stringer, R.; Tsirou, A.

    2008-07-01

    The Tracker Control System (TCS) is a distributed control software to operate about 2000 power supplies for the silicon modules of the CMS Tracker and monitor its environmental sensors. TCS must thus be able to handle about 104 power supply parameters, about 103 environmental probes from the Programmable Logic Controllers of the Tracker Safety System (TSS), about 105 parameters read via DAQ from the DCUs in all front end hybrids and from CCUs in all control groups. TCS is built on top of an industrial SCADA program (PVSS) extended with a framework developed at CERN (JCOP) and used by all LHC experiments. The logical partitioning of the detector is reflected in the hierarchical structure of the TCS, where commands move down to the individual hardware devices, while states are reported up to the root which is interfaced to the broader CMS control system. The system computes and continuously monitors the mean and maximum values of critical parameters and updates the percentage of currently operating hardware. Automatic procedures switch off selected parts of the detector using detailed granularity and avoiding widespread TSS intervention.

  12. Design and Analysis of a Model Reconfigurable Cyber-Exercise Laboratory (RCEL) for Information Assurance Education

    DTIC Science & Technology

    2004-03-01

    with MySQL . This choice was made because MySQL is open source. Any significant database engine such as Oracle or MS- SQL or even MS Access can be used...10 Figure 6. The DoD vs . Commercial Life Cycle...necessarily be interested in SCADA network security 13. MySQL (Database server) – This station represents a typical data server for a web page

  13. Experimental Verification of Application of Looped System and Centralized Voltage Control in a Distribution System with Renewable Energy Sources

    NASA Astrophysics Data System (ADS)

    Hanai, Yuji; Hayashi, Yasuhiro; Matsuki, Junya

    The line voltage control in a distribution network is one of the most important issues for a penetration of Renewable Energy Sources (RES). A loop distribution network configuration is an effective solution to resolve voltage and distribution loss issues concerned about a penetration of RES. In this paper, for a loop distribution network, the authors propose a voltage control method based on tap change control of LRT and active/reactive power control of RES. The tap change control of LRT takes a major role of the proposed voltage control. Additionally the active/reactive power control of RES supports the voltage control when voltage deviation from the upper or lower voltage limit is unavoidable. The proposed method adopts SCADA system based on measured data from IT switches, which are sectionalizing switch with sensor installed in distribution feeder. In order to check the validity of the proposed voltage control method, experimental simulations using a distribution system analog simulator “ANSWER” are carried out. In the simulations, the voltage maintenance capability in the normal and the emergency is evaluated.

  14. Experimental study of mini SCADA renewable energy management system on microgrid using Raspberry Pi

    NASA Astrophysics Data System (ADS)

    Tridianto, E.; Permatasari, P. D.; Ali, I. R.

    2018-03-01

    Renewable Energy Management System (REMS) is a device that can be able to monitor power through a microgrid. The purpose of this system is to optimize power usage that produced from renewable energy with the result that reduces power demand from the grid. To reach the goal this device manage the load power needs fully supplied by renewable energy when the power produced from renewable energy is higher than load demand, besides power surplus will be stored in battery in this way energy stored in battery can be used when it needed. When the power produced from renewable energy can not satisfy the power demand, power will supply by renewable energy and grid. This device uses power meters for record any power flow through microgrid. In order to manage power flow in microgrid this system use relay module. The user can find out energy consumption (consumed by the load) and production (produced by renewable energy) in a period of time so that the user can switch on the load in right time.

  15. Design and installation of a next generation pilot scale fermentation system.

    PubMed

    Junker, B; Brix, T; Lester, M; Kardos, P; Adamca, J; Lynch, J; Schmitt, J; Salmon, P

    2003-01-01

    Four new fermenters were designed and constructed for use in secondary metabolite cultivations, bioconversions, and enzyme production. A new PC/PLC-based control system also was implemented using GE Fanuc PLCs, Genius I/O blocks, and Fix Dynamics SCADA software. These systems were incorporated into an industrial research fermentation pilot plant, designed and constructed in the early 1980s. Details of the design of these new fermenters and the new control system are described and compared with the existing installation for expected effectiveness. In addition, the reasoning behind selection of some of these features has been included. Key to the design was the goal of preserving similarity between the new and previously existing and successfully utilized fermenter hardware and software installations where feasible but implementing improvements where warranted and beneficial. Examples of enhancements include strategic use of Inconel as a material of construction to reduce corrosion, piping layout design for simplified hazardous energy isolation, on-line calculation and control of nutrient feed rates, and the use of field I/O modules located near the vessel to permit low-cost addition of new instrumentation.

  16. RANS simulations of wind turbine wakes: optimal tuning of turbulence closure and aerodynamic loads from LiDAR and SCADA data

    NASA Astrophysics Data System (ADS)

    Letizia, Stefano; Puccioni, Matteo; Zhan, Lu; Viola, Francesco; Camarri, Simone; Iungo, Giacomo Valerio

    2017-11-01

    Numerical simulations of wakes produced by utility-scale wind turbines still present challenges related to the variability of the atmospheric conditions and, in the most of the cases, the lack of information about the geometry and aerodynamic performance of the wind turbine blades. In order to overcome the mentioned difficulties, we propose a RANS solver for which turbine aerodynamic forcing and turbulence closure are calibrated through LiDAR and SCADA data acquired for an onshore wind farm. The wind farm under examination is located in North Texas over a relatively flat terrain. The experimental data are leveraged to maximize accuracy of the RANS predictions in terms of wake velocity field and power capture for different atmospheric stability conditions and settings of the wind turbines. The optimization of the RANS parameters is performed through an adjoint-RANS formulation and a gradient-based procedure. The optimally-tuned aerodynamic forcing and turbulence closure are then analyzed in order to investigate effects of the atmospheric stability on the evolution of wind turbine wakes and power performance. The proposed RANS solver has low computational costs comparable to those of wake engineering models, which make it a compelling tool for wind farm control and optimization. Acknowledgments: NSF I/UCRC WindSTAR IIP 1362033 and TACC.

  17. Centralized Monitoring of the Microsoft Windows-based computers of the LHC Experiment Control Systems

    NASA Astrophysics Data System (ADS)

    Varela Rodriguez, F.

    2011-12-01

    The control system of each of the four major Experiments at the CERN Large Hadron Collider (LHC) is distributed over up to 160 computers running either Linux or Microsoft Windows. A quick response to abnormal situations of the computer infrastructure is crucial to maximize the physics usage. For this reason, a tool was developed to supervise, identify errors and troubleshoot such a large system. Although the monitoring of the performance of the Linux computers and their processes was available since the first versions of the tool, it is only recently that the software package has been extended to provide similar functionality for the nodes running Microsoft Windows as this platform is the most commonly used in the LHC detector control systems. In this paper, the architecture and the functionality of the Windows Management Instrumentation (WMI) client developed to provide centralized monitoring of the nodes running different flavour of the Microsoft platform, as well as the interface to the SCADA software of the control systems are presented. The tool is currently being commissioned by the Experiments and it has already proven to be very efficient optimize the running systems and to detect misbehaving processes or nodes.

  18. Sensor-enabled chem/bio contamination detection system dedicated to situational awareness of water distribution security status

    NASA Astrophysics Data System (ADS)

    Ginsberg, Mark D.; Smith, Eddy D.; VanBlaricum, Vicki; Hock, Vincent F.; Kroll, Dan; Russell, Kevin J.

    2010-04-01

    Both real events and models have proven that drinking water systems are vulnerable to deliberate and/or accidental contamination. Additionally, homeland security initiatives and modeling efforts have determined that it is relatively easy to orchestrate the contamination of potable water supplies. Such contamination can be accomplished with classic and non-traditional chemical agents, toxic industrial chemicals (TICs), and/or toxic industrial materials (TIMs). Subsequent research and testing has developed a proven network for detection and response to these threats. The method uses offthe- shelf, broad-spectrum analytical instruments coupled with advanced interpretive algorithms. The system detects and characterizes any backflow events involving toxic contaminants by employing unique chemical signature (fingerprint) response data. This instrumentation has been certified by the Office of Homeland Security for detecting deliberate and/or accidental contamination of critical water infrastructure. The system involves integration of several mature technologies (sensors, SCADA, dynamic models, and the HACH HST Guardian Blue instrumentation) into a complete, real-time, management system that also can be used to address other water distribution concerns, such as corrosion. This paper summarizes the reasons and results for installing such a distribution-based detection and protection system.

  19. Neural Network Based Intrusion Detection System for Critical Infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less

  20. US-CERT Control System Center Input/Output (I/O) Conceputal Design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2005-02-01

    This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less

  1. Commissioning and Operational Experience with 1 kW Class Helium Refrigerator/Liquefier for SST-1

    NASA Astrophysics Data System (ADS)

    Dhard, C. P.; Sarkar, B.; Misra, Ruchi; Sahu, A. K.; Tanna, V. L.; Tank, J.; Panchal, P.; Patel, J. C.; Phadke, G. D.; Saxena, Y. C.

    2004-06-01

    The helium refrigerator/liquefier (R/L) for the Steady State Super conducting Tokamak (SST-1) has been developed with very stringent specifications for the different operational modes. The total refrigeration capacity is 650 W at 4.5 K and liquefaction capacity of 200 l/h. A cold circulation pump is used for the forced flow cooling of 300 g/s supercritical helium (SHe) for the magnet system (SCMS). The R/L has been designed also to absorb a 200 W transient heat load of the SCMS. The plant consists of a compressor station, oil removal system, on-line purifier, Main Control Dewar (MCD) with associated heat exchangers, cold circulation pump and warm gas management system. An Integrated Flow Control and Distribution System (IFDCS) has been designed, fabricated and installed for distribution of SHe in the toroidal and poloidal field coils as well as liquid helium for cooling of 10 pairs of current leads. A SCADA based control system has been designed using PLC for R/L as well as IFDCS. The R/L has been commissioned and required parameters were achieved confirming to the process. All the test results and commissioning experiences are discussed in this paper.

  2. Preventing a Cyber Dresden: How the Evolution of Air Power can Guide the Evolution of Cyber

    DTIC Science & Technology

    2011-06-01

    24 Paul Cornish, On Cyber Warfare, (London: RUSI, 2010), 1. 25 CNN‟s footage of Project Aurora, the staged demonstration of SCADA vulnerabilities... Paul McHugh, “Striving for Coherence: Psychiatry‟s Efforts Over Classification”, The Journal of American Medical Association, no.293 (2005):2526-2528...Randall Wakelam, The Science of Bombing: Operational Research in RAF Bomber Command (Toronto: University of Toronto Press, 2009), 157-182 and Dana

  3. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  4. DSC: software tool for simulation-based design of control strategies applied to wastewater treatment plants.

    PubMed

    Ruano, M V; Ribes, J; Seco, A; Ferrer, J

    2011-01-01

    This paper presents a computer tool called DSC (Simulation based Controllers Design) that enables an easy design of control systems and strategies applied to wastewater treatment plants. Although the control systems are developed and evaluated by simulation, this tool aims to facilitate the direct implementation of the designed control system to the PC of the full-scale WWTP (wastewater treatment plants). The designed control system can be programmed in a dedicated control application and can be connected to either the simulation software or the SCADA of the plant. To this end, the developed DSC incorporates an OPC server (OLE for process control) which facilitates an open-standard communication protocol for different industrial process applications. The potential capabilities of the DSC tool are illustrated through the example of a full-scale application. An aeration control system applied to a nutrient removing WWTP was designed, tuned and evaluated with the DSC tool before its implementation in the full scale plant. The control parameters obtained by simulation were suitable for the full scale plant with only few modifications to improve the control performance. With the DSC tool, the control systems performance can be easily evaluated by simulation. Once developed and tuned by simulation, the control systems can be directly applied to the full-scale WWTP.

  5. 48 CFR 304.7001 - Numbering acquisitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Numbering acquisitions. 304.7001 Section 304.7001 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATIVE MATTERS Acquisition Instrument Identification Numbering System 304.7001 Numbering acquisitions. (a...

  6. 48 CFR 201.301 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Policy. 201.301 Section 201.301 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Agency Acquisition Regulations 201.301 Policy. (a...

  7. 48 CFR 246.404 - Government contract quality assurance for acquisitions at or below the simplified acquisition...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Government contract quality assurance for acquisitions at or below the simplified acquisition threshold. 246.404 Section 246.404 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT QUALITY ASSURANCE...

  8. 48 CFR 246.404 - Government contract quality assurance for acquisitions at or below the simplified acquisition...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Government contract quality assurance for acquisitions at or below the simplified acquisition threshold. 246.404 Section 246.404 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT QUALITY ASSURANCE...

  9. 48 CFR 246.404 - Government contract quality assurance for acquisitions at or below the simplified acquisition...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Government contract quality assurance for acquisitions at or below the simplified acquisition threshold. 246.404 Section 246.404 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT QUALITY ASSURANCE...

  10. 48 CFR 246.404 - Government contract quality assurance for acquisitions at or below the simplified acquisition...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Government contract quality assurance for acquisitions at or below the simplified acquisition threshold. 246.404 Section 246.404 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT QUALITY ASSURANCE...

  11. 48 CFR 246.404 - Government contract quality assurance for acquisitions at or below the simplified acquisition...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Government contract quality assurance for acquisitions at or below the simplified acquisition threshold. 246.404 Section 246.404 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT QUALITY ASSURANCE...

  12. 48 CFR 3401.000 - Scope of part.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Scope of part. 3401.000 Section 3401.000 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ED ACQUISITION REGULATION SYSTEM 3401.000 Scope of part. The Federal Acquisition Regulation System...

  13. Issues With Access to Acquisition Data and Information in the Department of Defense: Doing Data Right in Weapon System Acquisition

    DTIC Science & Technology

    2016-04-30

    Defense: Doing Data Right in Weapon System Acquisition Nancy Moore, Senior Management Scientist, RAND Megan McKernan, Defense Research Analyst...Access to Acquisition Data & Information in the Department of Defense: Doing Data Right in Weapon System Acquisition Nancy Moore, Senior Management...With Access to Acquisition Data and Information in the Department of Defense: Doing Data Right in Weapon System Acquisition Nancy Y. Moore—is a

  14. 48 CFR 1601.301 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Policy. 1601.301 Section 1601.301 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Agency Acquisition...

  15. 48 CFR 1601.301 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Policy. 1601.301 Section 1601.301 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Agency Acquisition...

  16. A project of upgrading the operations control system of the Hungarian electric power system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Oroszki, L.; Kovacs, G.

    About 20 years ago an on-line EMS/SCADA system replaced the previously used off-line control system in the Hungarian power system. The system that has met the technological requirements of that time now became obsolete. A project started in 1995 by the Hungarian Power Companies, Ltd. (MVM Rt.), the regional utility companies and the power plant companies, with funding through a World Bank loan to cover international procurement, aims to upgrade that system into a complex, intelligent and state-of-the-art process control system. The new hierarchical system will rely on a distributed computer network structure, universally accepted hardware/software interface standards and communicationmore » protocols and use hardware platform independent software. The automatic generation control, performed from the National Dispatch Centre, will have expanded functionality, the most important single item of this will be the inclusion of automatic voltage/var control. The upgrading project includes the replacement of the substation and power plant remote terminal units and the installation of a telecommunication network to provide this telecontrol system with the necessary communications links. The supply contracts for both the master station and the remote terminal unit parts were awarded to the winners of open international bidding processes. In the project implementation MVM has the overall responsibility and works with assistance from international and Hungarian engineering firms.« less

  17. 48 CFR 7.102 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Policy. 7.102 Section 7.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING ACQUISITION PLANNING Acquisition Plans 7.102 Policy. (a) Agencies shall perform acquisition planning and...

  18. 48 CFR 7.102 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 7.102 Section 7.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING ACQUISITION PLANNING Acquisition Plans 7.102 Policy. (a) Agencies shall perform acquisition planning and...

  19. Predictive optimal control of sewer networks using CORAL tool: application to Riera Blanca catchment in Barcelona.

    PubMed

    Puig, V; Cembrano, G; Romera, J; Quevedo, J; Aznar, B; Ramón, G; Cabot, J

    2009-01-01

    This paper deals with the global control of the Riera Blanca catchment in the Barcelona sewer network using a predictive optimal control approach. This catchment has been modelled using a conceptual modelling approach based on decomposing the catchments in subcatchments and representing them as virtual tanks. This conceptual modelling approach allows real-time model calibration and control of the sewer network. The global control problem of the Riera Blanca catchment is solved using a optimal/predictive control algorithm. To implement the predictive optimal control of the Riera Blanca catchment, a software tool named CORAL is used. The on-line control is simulated by interfacing CORAL with a high fidelity simulator of sewer networks (MOUSE). CORAL interchanges readings from the limnimeters and gate commands with MOUSE as if it was connected with the real SCADA system. Finally, the global control results obtained using the predictive optimal control are presented and compared against the results obtained using current local control system. The results obtained using the global control are very satisfactory compared to those obtained using the local control.

  20. 48 CFR 18.113 - Interagency acquisitions under the Economy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Interagency acquisitions under the Economy Act. 18.113 Section 18.113 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES EMERGENCY ACQUISITIONS Available Acquisition Flexibilities 18.113 Interagency acquisitions under...

  1. 48 CFR 1.303 - Publication and codification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Publication and codification. 1.303 Section 1.303 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Agency Acquisition Regulations 1.303 Publication and codification...

  2. 48 CFR Appendix - Federal Acquisition Regulation (FAR) Index

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Federal Acquisition Regulation (FAR) Index Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT USE OF GOVERNMENT SOURCES BY CONTRACTORS Contractor Use of Interagency Fleet Management System...

  3. 48 CFR 252.211-7000 - Acquisition streamlining.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Acquisition streamlining. 252.211-7000 Section 252.211-7000 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text...

  4. 48 CFR 1.303 - Publication and codification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Publication and codification. 1.303 Section 1.303 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Agency Acquisition Regulations 1.303 Publication and codification...

  5. 48 CFR 1.303 - Publication and codification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Publication and codification. 1.303 Section 1.303 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Agency Acquisition Regulations 1.303 Publication and codification...

  6. 48 CFR 207.471 - Funding requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Funding requirements. 207.471 Section 207.471 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING ACQUISITION PLANNING Equipment Lease or Purchase 207.471 Funding...

  7. 48 CFR 207.471 - Funding requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Funding requirements. 207.471 Section 207.471 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING ACQUISITION PLANNING Equipment Lease or Purchase 207.471 Funding...

  8. 48 CFR 207.471 - Funding requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Funding requirements. 207.471 Section 207.471 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING ACQUISITION PLANNING Equipment Lease or Purchase 207.471 Funding...

  9. 48 CFR 207.471 - Funding requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Funding requirements. 207.471 Section 207.471 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE ACQUISITION PLANNING ACQUISITION PLANNING Equipment Lease or Purchase 207.471 Funding...

  10. 48 CFR 3401.304 - Agency control and compliance procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Agency control and compliance procedures. 3401.304 Section 3401.304 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ED ACQUISITION REGULATION SYSTEM Agency Acquisition Regulations...

  11. 48 CFR 3046.790 - Use of warranties in major systems acquisitions by the USCG (USCG).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Use of warranties in major systems acquisitions by the USCG (USCG). 3046.790 Section 3046.790 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CONTRACT MANAGEMENT QUALITY...

  12. Development of automated system based on neural network algorithm for detecting defects on molds installed on casting machines

    NASA Astrophysics Data System (ADS)

    Bazhin, V. Yu; Danilov, I. V.; Petrov, P. A.

    2018-05-01

    During the casting of light alloys and ligatures based on aluminum and magnesium, problems of the qualitative distribution of the metal and its crystallization in the mold arise. To monitor the defects of molds on the casting conveyor, a camera with a resolution of 780 x 580 pixels and a shooting rate of 75 frames per second was selected. Images of molds from casting machines were used as input data for neural network algorithm. On the preparation of a digital database and its analytical evaluation stage, the architecture of the convolutional neural network was chosen for the algorithm. The information flow from the local controller is transferred to the OPC server and then to the SCADA system of foundry. After the training, accuracy of neural network defect recognition was about 95.1% on a validation split. After the training, weight coefficients of the neural network were used on testing split and algorithm had identical accuracy with validation images. The proposed technical solutions make it possible to increase the efficiency of the automated process control system in the foundry by expanding the digital database.

  13. International online support to process optimisation and operation decisions.

    PubMed

    Onnerth, T B; Eriksson, J

    2002-01-01

    The information level at all technical facilities has developed from almost nothing 30-40 years ago to advanced IT--Information Technology--systems based on both chemical and mechanical on-line sensors for process and equipment. Still the basic part of information is to get the right data at the right time for the decision to be made. Today a large amount of operational data is available at almost any European wastewater treatment plant, from laboratory and SCADA. The difficult part is to determine which data to keep, which to use in calculations and how and where to make data available. With the STARcontrol system it is possible to separate only process relevant data to use for on-line control and reporting at engineering level, to optimise operation. Furthermore, the use of IT makes it possible to communicate internationally, with full access to the whole amount of data on the single plant. In this way, expert supervision can be both very local in local language e.g. Polish and at the same time very professional with Danish experts advising on Danish processes in Poland or Sweden where some of the 12 STARcontrol systems are running.

  14. 48 CFR 225.7303-3 - Government-to-government agreements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Government-to-government agreements. 225.7303-3 Section 225.7303-3 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Acquisitions for Foreign...

  15. 48 CFR 205.301 - General.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false General. 205.301 Section 205.301 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF... acquisition threshold that are for the acquisition of any clothing, fiber, yarn, or fabric items described in...

  16. 48 CFR 205.301 - General.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false General. 205.301 Section 205.301 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF... acquisition threshold that are for the acquisition of any clothing, fiber, yarn, or fabric items described in...

  17. 48 CFR 237.7001 - Method of acquisition.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Method of acquisition. 237.7001 Section 237.7001 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM... contract exists, use DD Form 1155, Order for Supplies or Services, to obtain mortuary services. ...

  18. 48 CFR 1.304 - Agency control and compliance procedures.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Agency control and compliance procedures. 1.304 Section 1.304 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Agency Acquisition Regulations 1.304 Agency control...

  19. Introduction to Defense Acquisition Management

    DTIC Science & Technology

    1989-03-01

    the system after Most new systems follow the same formatted and its usefullness in the weapon inventory predictable life cycle, and fit the model...natives for system concept development Statement (MNS) setting forth requirements need- -An acquisition strategy is developed to guide ed to meet the...6 BUSINESS, FINANCIAL AND TECHNICAL ASPECTS OF SYSTEMS ACQUISITION Management of the systems acquisition process The acquisition planning phase of the

  20. 48 CFR 234.003 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Responsibilities. 234.003 Section 234.003 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION 234.003 Responsibilities. DoDD...

  1. 48 CFR 34.000 - Scope of part.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Scope of part. 34.000... CONTRACTING MAJOR SYSTEM ACQUISITION General 34.000 Scope of part. This part describes acquisition policies... of an Earned Value Management System in acquisitions designated as major acquisitions consistent with...

  2. 48 CFR 34.000 - Scope of part.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Scope of part. 34.000... CONTRACTING MAJOR SYSTEM ACQUISITION General 34.000 Scope of part. This part describes acquisition policies... of an Earned Value Management System in acquisitions designated as major acquisitions consistent with...

  3. 48 CFR 34.000 - Scope of part.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Scope of part. 34.000... CONTRACTING MAJOR SYSTEM ACQUISITION General 34.000 Scope of part. This part describes acquisition policies... of an Earned Value Management System in acquisitions designated as major acquisitions consistent with...

  4. 48 CFR Appendix - Federal Acquisition Regulation (FAR) Index

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Federal Acquisition Regulation (FAR) Index Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT USE OF GOVERNMENT SOURCES BY CONTRACTORS Contractor Use of Interagency Fleet Management System (IFMS) Contract clause. FAR Index Federal...

  5. 48 CFR Appendix - Federal Acquisition Regulation (FAR) Index

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Federal Acquisition Regulation (FAR) Index Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT USE OF GOVERNMENT SOURCES BY CONTRACTORS Contractor Use of Interagency Fleet Management System (IFMS) Contract clause. FAR Index Federal...

  6. 48 CFR 12.101 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 12.101 Section 12.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING ACQUISITION OF COMMERCIAL ITEMS Acquisition of Commercial Items-General 12.101 Policy. Agencies shall— (a...

  7. 48 CFR 225.7704-1 - Applicability of trade agreements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Applicability of trade agreements. 225.7704-1 Section 225.7704-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Acquisitions in Support of Operations in Afghanistan 225.7704-1...

  8. 48 CFR 225.7704-1 - Applicability of trade agreements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Applicability of trade agreements. 225.7704-1 Section 225.7704-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Acquisitions in Support of Operations in Iraq or Afghanistan...

  9. 48 CFR 225.7704-1 - Applicability of trade agreements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Applicability of trade agreements. 225.7704-1 Section 225.7704-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Acquisitions in Support of Operations in Afghanistan 225.7704-1...

  10. 48 CFR 213.302 - Purchase orders.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Purchase orders. 213.302 Section 213.302 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... Acquisition Methods 213.302 Purchase orders. ...

  11. 48 CFR 201.105-3 - Copies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Copies. 201.105-3 Section 201.105-3 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 201.105-3 Copies. The...

  12. 48 CFR 3034.004 - Acquisition strategy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Acquisition strategy. 3034.004 Section 3034.004 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND... Acquisition strategy. See (HSAR) 48 CFR 3009.570 for policy applicable to acquisition strategies that consider...

  13. 48 CFR 34.004 - Acquisition strategy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Acquisition strategy. 34... CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION General 34.004 Acquisition strategy. The program manager, as specified in agency procedures, shall develop an acquisition strategy tailored to the particular...

  14. 48 CFR 46.404 - Government contract quality assurance for acquisitions at or below the simplified acquisition...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Government contract quality assurance for acquisitions at or below the simplified acquisition threshold. 46.404 Section 46.404 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT QUALITY ASSURANCE Government Contract Quality Assurance...

  15. 48 CFR 46.404 - Government contract quality assurance for acquisitions at or below the simplified acquisition...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Government contract quality assurance for acquisitions at or below the simplified acquisition threshold. 46.404 Section 46.404 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT QUALITY ASSURANCE Government Contract Quality Assurance...

  16. 48 CFR 46.404 - Government contract quality assurance for acquisitions at or below the simplified acquisition...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Government contract quality assurance for acquisitions at or below the simplified acquisition threshold. 46.404 Section 46.404 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT QUALITY ASSURANCE Government Contract Quality Assurance...

  17. 48 CFR 46.404 - Government contract quality assurance for acquisitions at or below the simplified acquisition...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Government contract quality assurance for acquisitions at or below the simplified acquisition threshold. 46.404 Section 46.404 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT QUALITY ASSURANCE Government Contract Quality Assurance...

  18. 48 CFR 46.404 - Government contract quality assurance for acquisitions at or below the simplified acquisition...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Government contract quality assurance for acquisitions at or below the simplified acquisition threshold. 46.404 Section 46.404 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACT MANAGEMENT QUALITY ASSURANCE Government Contract Quality Assurance...

  19. 76 FR 71464 - Defense Federal Acquisition Regulation Supplement; Transition to the System for Award Management...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-18

    ... Regulation Supplement for the transition of the Integrated Acquisition Environment systems to the new System... Acquisition Environment (IAE) is an electronic Government initiative that aggregates Federal acquisition...

  20. 48 CFR 201.201-1 - The two councils.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false The two councils. 201.201-1 Section 201.201-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Administration 201.201-1 The two...

  1. 48 CFR 201.201-1 - The two councils.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false The two councils. 201.201-1 Section 201.201-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Administration 201.201-1 The two...

  2. 48 CFR 201.201-1 - The two councils.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false The two councils. 201.201-1 Section 201.201-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Administration 201.201-1 The two...

  3. 48 CFR 201.201-1 - The two councils.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false The two councils. 201.201-1 Section 201.201-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Administration 201.201-1 The two...

  4. 48 CFR 201.201-1 - The two councils.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false The two councils. 201.201-1 Section 201.201-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Administration 201.201-1 The two...

  5. 48 CFR 908.7101-3 - Direct acquisition.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Direct acquisition. 908.7101-3 Section 908.7101-3 Federal Acquisition Regulations System DEPARTMENT OF ENERGY COMPETITION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908.7101-3 Direct...

  6. 48 CFR 7.300 - [Reserved

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false [Reserved] 7.300 Section 7.300 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING ACQUISITION PLANNING Contractor Versus Government Performance 7.300 [Reserved] ...

  7. 48 CFR 1601.102 - Authority.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Authority. 1601.102 Section 1601.102 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority...

  8. 48 CFR 1601.103 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Applicability. 1601.103 Section 1601.103 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority...

  9. 48 CFR 1601.103 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Applicability. 1601.103 Section 1601.103 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority...

  10. 48 CFR 1601.103 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Applicability. 1601.103 Section 1601.103 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority...

  11. 48 CFR 1601.103 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Applicability. 1601.103 Section 1601.103 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority...

  12. 48 CFR 1601.102 - Authority.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Authority. 1601.102 Section 1601.102 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority...

  13. 48 CFR 1601.102 - Authority.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Authority. 1601.102 Section 1601.102 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority...

  14. 48 CFR 1601.102 - Authority.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Authority. 1601.102 Section 1601.102 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority...

  15. 48 CFR 1601.103 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Applicability. 1601.103 Section 1601.103 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority...

  16. 48 CFR 2001.301 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Policy. 2001.301 Section 2001.301 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION GENERAL NUCLEAR REGULATORY COMMISSION ACQUISITION REGULATION SYSTEM Agency Acquisition Regulations 2001.301 Policy. Policy...

  17. 48 CFR 2001.301 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Policy. 2001.301 Section 2001.301 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION GENERAL NUCLEAR REGULATORY COMMISSION ACQUISITION REGULATION SYSTEM Agency Acquisition Regulations 2001.301 Policy. Policy...

  18. 48 CFR 2001.301 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Policy. 2001.301 Section 2001.301 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION GENERAL NUCLEAR REGULATORY COMMISSION ACQUISITION REGULATION SYSTEM Agency Acquisition Regulations 2001.301 Policy. Policy...

  19. 48 CFR 208.7001 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Program. Integrated materiel management means assignment of acquisition management responsibility to one... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Definitions. 208.7001 Section 208.7001 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT...

  20. 48 CFR 208.7001 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Program. Integrated materiel management means assignment of acquisition management responsibility to one... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Definitions. 208.7001 Section 208.7001 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT...

  1. 48 CFR 208.7001 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Program. Integrated materiel management means assignment of acquisition management responsibility to one... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Definitions. 208.7001 Section 208.7001 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT...

  2. 48 CFR 208.7001 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Program. Integrated materiel management means assignment of acquisition management responsibility to one... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Definitions. 208.7001 Section 208.7001 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT...

  3. 48 CFR 208.7001 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Program. Integrated materiel management means assignment of acquisition management responsibility to one... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Definitions. 208.7001 Section 208.7001 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT...

  4. 48 CFR 3401.104 - Issuance.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Issuance. 3401.104 Section 3401.104 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ED ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 3401.104 Issuance. ...

  5. 48 CFR 3401.601 - General.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false General. 3401.601 Section 3401.601 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ED ACQUISITION REGULATION SYSTEM Contracting Authority and Responsibilities 3401.601 General...

  6. Blueprint for Acquisition Reform, Version 3.0

    DTIC Science & Technology

    2008-07-01

    represents a substantial and immediate step forward in establishing the Coast Guard as a model mid-sized federal agency for acquisition processes...Blueprint for Acquisition Reform in the U. S. Coast Guard “The Coast Guard must become the model for mid-sized Federal agency acquisition in process...acquisition (DoD 5000 model >CG Major Systems Acquisition Manual) • Deepwater Program Executive Officer (PEO): System of Systems performance-based

  7. AZ-101 Mixer Pump Demonstration Data Acquisition System and Gamma Cart Data Acquisition Control System Software Configuration Management Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    WHITE, D.A.

    1999-12-29

    This Software Configuration Management Plan (SCMP) provides the instructions for change control of the AZ1101 Mixer Pump Demonstration Data Acquisition System (DAS) and the Sludge Mobilization Cart (Gamma Cart) Data Acquisition and Control System (DACS).

  8. 48 CFR 215.407-5 - Estimating systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Estimating systems. 215.407-5 Section 215.407-5 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM....407-5 Estimating systems. ...

  9. 48 CFR 215.407-5 - Estimating systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Estimating systems. 215.407-5 Section 215.407-5 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM....407-5 Estimating systems. ...

  10. 48 CFR 215.407-5 - Estimating systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Estimating systems. 215.407-5 Section 215.407-5 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM....407-5 Estimating systems. ...

  11. 48 CFR 215.407-5 - Estimating systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Estimating systems. 215.407-5 Section 215.407-5 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM....407-5 Estimating systems. ...

  12. 48 CFR 215.407-5 - Estimating systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Estimating systems. 215.407-5 Section 215.407-5 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM....407-5 Estimating systems. ...

  13. 77 FR 2653 - Defense Federal Acquisition Regulation Supplement; Pilot Program for Acquisition of Military...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-19

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 212 and 252 RIN 0750-AH27 Defense Federal Acquisition Regulation Supplement; Pilot Program for Acquisition of Military-Purpose Nondevelopmental Items (DFARS Case 2011-D034) AGENCY: Defense Acquisition Regulations System...

  14. 48 CFR 225.7003 - Restrictions on acquisition of specialty metals.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Restrictions on acquisition of specialty metals. 225.7003 Section 225.7003 Federal Acquisition Regulations System DEFENSE... Restrictions on acquisition of specialty metals. ...

  15. 48 CFR 225.7003 - Restrictions on acquisition of specialty metals.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Restrictions on acquisition of specialty metals. 225.7003 Section 225.7003 Federal Acquisition Regulations System DEFENSE... Restrictions on acquisition of specialty metals. ...

  16. 48 CFR 1807.7201 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Definitions. 1807.7201 Section 1807.7201 Federal Acquisition Regulations System NATIONAL AERONAUTICS AND SPACE ADMINISTRATION COMPETITION AND ACQUISITION PLANNING ACQUISITION PLANNING Acquisition Forecasting 1807.7201 Definitions. Class...

  17. 48 CFR 13.304 - [Reserved

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false [Reserved] 13.304 Section 13.304 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION PROCEDURES Simplified Acquisition Methods 13.304 [Reserved] ...

  18. Two Demonstrations with a New Data-Acquisition System

    ERIC Educational Resources Information Center

    Kraftmakher, Yaakov

    2014-01-01

    Nowadays, the use of data-acquisition systems in undergraduate laboratories is routine. Many computer-assisted experiments became possible with the PASCO scientific data-acquisition system based on the 750 Interface and DataStudio software. A new data-acquisition system developed by PASCO includes the 850 Universal Interface and Capstone software.…

  19. 75 FR 65439 - Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 219 and 252 [DFARS Case... System AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Interim rule... Supplement (DFARS) to conform to the Federal Acquisition Regulation (FAR) by providing Department of Defense...

  20. 48 CFR 1601.104 - Issuance.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Issuance. 1601.104 Section 1601.104 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance...

  1. 48 CFR 1601.104 - Issuance.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Issuance. 1601.104 Section 1601.104 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance...

  2. 48 CFR 1601.104 - Issuance.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Issuance. 1601.104 Section 1601.104 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance...

  3. 48 CFR 1601.102 - Authority.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Authority. 1601.102 Section 1601.102 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance...

  4. 48 CFR 1601.104 - Issuance.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Issuance. 1601.104 Section 1601.104 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance...

  5. 48 CFR 1601.104 - Issuance.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Issuance. 1601.104 Section 1601.104 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH BENEFITS ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance...

  6. 48 CFR 241.201 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Policy. 241.201 Section 241.201 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF UTILITY SERVICES Acquiring Utility Services 241...

  7. 48 CFR 2401.301 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Policy. 2401.301 Section 2401.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Agency Acquisition Regulations 2401.301 Policy. (a)(1...

  8. 48 CFR 2401.301 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Policy. 2401.301 Section 2401.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Agency Acquisition Regulations 2401.301 Policy. (a)(1...

  9. 48 CFR 2401.301 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Policy. 2401.301 Section 2401.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Agency Acquisition Regulations 2401.301 Policy. (a)(1...

  10. 48 CFR 1.403 - Individual deviations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Individual deviations. 1.403 Section 1.403 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Deviations from the FAR 1.403 Individual deviations. Individual...

  11. 48 CFR 1.403 - Individual deviations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Individual deviations. 1.403 Section 1.403 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Deviations from the FAR 1.403 Individual deviations. Individual...

  12. 48 CFR 1.403 - Individual deviations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Individual deviations. 1.403 Section 1.403 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Deviations from the FAR 1.403 Individual deviations. Individual...

  13. 48 CFR 225.7603 - Exceptions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Exceptions. 225.7603 Section 225.7603 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7603...

  14. 48 CFR 225.7602 - Procedures.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Procedures. 225.7602 Section 225.7602 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7602...

  15. 48 CFR 225.7602 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Procedures. 225.7602 Section 225.7602 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7602...

  16. 48 CFR 225.7602 - Procedures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Procedures. 225.7602 Section 225.7602 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7602...

  17. 48 CFR 225.7603 - Exceptions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Exceptions. 225.7603 Section 225.7603 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7603...

  18. 48 CFR 225.7603 - Exceptions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Exceptions. 225.7603 Section 225.7603 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7603...

  19. 48 CFR 225.7603 - Exceptions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Exceptions. 225.7603 Section 225.7603 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7603...

  20. 48 CFR 225.7602 - Procedures.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Procedures. 225.7602 Section 225.7602 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7602...

  1. 48 CFR 3401.403 - Individual deviations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Individual deviations. 3401.403 Section 3401.403 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ED ACQUISITION REGULATION SYSTEM Deviations 3401.403 Individual deviations. An individual...

  2. 48 CFR 3401.103 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Applicability. 3401.103 Section 3401.103 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ED ACQUISITION REGULATION SYSTEM Purpose, Authority, Issuance 3401.103 Applicability. The FAR and...

  3. 48 CFR 225.7603 - Exceptions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Exceptions. 225.7603 Section 225.7603 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7603...

  4. 48 CFR 225.7602 - Procedures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Procedures. 225.7602 Section 225.7602 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7602...

  5. 48 CFR 13.005 - Federal Acquisition Streamlining Act of 1994 list of inapplicable laws.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Federal Acquisition Streamlining Act of 1994 list of inapplicable laws. 13.005 Section 13.005 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION...

  6. 76 FR 21849 - Defense Federal Acquisition Regulation Supplement; Ships Bunkers Easy Acquisition (SEA) Card® and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-19

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 213 RIN 0750-AH07 Defense Federal Acquisition Regulation Supplement; Ships Bunkers Easy Acquisition (SEA) Card[supreg] and Aircraft Ground Services (DFARS Case 2009-D019) AGENCY: Defense Acquisition Regulations System, Department of...

  7. 76 FR 58149 - Defense Federal Acquisition Regulation Supplement; Ships Bunkers Easy Acquisition (SEA) Card® and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-20

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 213 RIN 0750-AH07 Defense Federal Acquisition Regulation Supplement; Ships Bunkers Easy Acquisition (SEA) Card[supreg] and Aircraft Ground Services (DFARS Case 2009-D019) AGENCY: Defense Acquisition Regulations System, Department of...

  8. 48 CFR 13.005 - Federal Acquisition Streamlining Act of 1994 list of inapplicable laws.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Federal Acquisition Streamlining Act of 1994 list of inapplicable laws. 13.005 Section 13.005 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION...

  9. 48 CFR 13.005 - Federal Acquisition Streamlining Act of 1994 list of inapplicable laws.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Federal Acquisition Streamlining Act of 1994 list of inapplicable laws. 13.005 Section 13.005 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION...

  10. 48 CFR 13.005 - Federal Acquisition Streamlining Act of 1994 list of inapplicable laws.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Federal Acquisition Streamlining Act of 1994 list of inapplicable laws. 13.005 Section 13.005 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION...

  11. 48 CFR 1.102-3 - Acquisition team.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Acquisition team. 1.102-3... ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 1.102-3 Acquisition team. The purpose of defining the Federal Acquisition Team (Team) in the Guiding Principles is to ensure that participants in the...

  12. 48 CFR 1.102-3 - Acquisition team.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Acquisition team. 1.102-3... ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 1.102-3 Acquisition team. The purpose of defining the Federal Acquisition Team (Team) in the Guiding Principles is to ensure that participants in the...

  13. 48 CFR 1.102-3 - Acquisition team.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Acquisition team. 1.102-3... ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 1.102-3 Acquisition team. The purpose of defining the Federal Acquisition Team (Team) in the Guiding Principles is to ensure that participants in the...

  14. 48 CFR 1.102-3 - Acquisition team.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Acquisition team. 1.102-3... ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 1.102-3 Acquisition team. The purpose of defining the Federal Acquisition Team (Team) in the Guiding Principles is to ensure that participants in the...

  15. 48 CFR 1.102-3 - Acquisition team.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Acquisition team. 1.102-3... ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 1.102-3 Acquisition team. The purpose of defining the Federal Acquisition Team (Team) in the Guiding Principles is to ensure that participants in the...

  16. 48 CFR 3409.570 - Certification at or below the simplified acquisition threshold.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Certification at or below the simplified acquisition threshold. 3409.570 Section 3409.570 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION COMPETITION AND ACQUISITION PLANNING CONTRACTOR QUALIFICATIONS Organizational and Consultant...

  17. 48 CFR 3409.570 - Certification at or below the simplified acquisition threshold.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 7 2011-10-01 2011-10-01 false Certification at or below the simplified acquisition threshold. 3409.570 Section 3409.570 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION COMPETITION AND ACQUISITION PLANNING CONTRACTOR QUALIFICATIONS Organizational and Consultant...

  18. 48 CFR 3409.570 - Certification at or below the simplified acquisition threshold.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Certification at or below the simplified acquisition threshold. 3409.570 Section 3409.570 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION COMPETITION AND ACQUISITION PLANNING CONTRACTOR QUALIFICATIONS Organizational and Consultant...

  19. Evaluation of an operational real-time irrigation scheduling scheme for drip irrigated citrus fields in Picassent, Spain

    NASA Astrophysics Data System (ADS)

    Li, Dazhi; Hendricks-Franssen, Harrie-Jan; Han, Xujun; Jiménez Bello, Miguel Angel; Martínez Alzamora, Fernando; Vereecken, Harry

    2017-04-01

    Irrigated agriculture accounts worldwide for 40% of food production and 70% of fresh water withdrawals. Irrigation scheduling aims to minimize water use while maintaining the agricultural production. In this study we were concerned with the real-time automatic control of irrigation, which calculates daily water allocation by combining information from soil moisture sensors and a land surface model. The combination of soil moisture measurements and predictions by the Community Land Model (CLM) using sequential data assimilation (DA) is a promising alternative to improve the estimate of soil and plant water status. The LETKF (Local Ensemble Transform Kalman Filter) was chosen to assimilate soil water content measured by FDR (Frequency Domain Reflectometry) into CLM and improve the initial (soil moisture) conditions for the next model run. In addition, predictions by the GFS (Global Forecast System) atmospheric simulation model were used as atmospheric input data for CLM to predict an ensemble of possible soil moisture evolutions for the next days. The difference between predicted and target soil water content is defined as the water deficit, and the irrigation amount was calculated by the integrated water deficit over the root zone. The corresponding irrigation time to apply the required water was introduced in SCADA (supervisory control and data acquisition system) for each citrus field. In total 6 fields were irrigated according our optimization approach including data assimilation (CLM-DA) and there were also 2 fields following the FAO (Food and Agriculture Organization) water balance method and 4 fields controlled by farmers as reference. During the real-time irrigation campaign in Valencia from July to October in 2015 and June to October in 2016, the applied irrigation amount, stem water potential and soil moisture content were recorded. The data indicated that 5% 20% less irrigation water was needed for the CLM-DA scheduled fields than for the other fields following the FAO or farmers' method. Stem water potential data indicated that the CLM-DA fields were not suffering from water stress during most of the irrigation period. Even though the CLM-DA fields received the least irrigation water, the orange production was not suppressed either. Our results show the water saving potential of the CLM-DA method compared to other traditional irrigation methods.

  20. Data Acquisition for Modular Biometric Monitoring System

    NASA Technical Reports Server (NTRS)

    Grodsinsky, Carlos M. (Inventor); Chmiel, Alan J. (Inventor); Humphreys, Bradley T. (Inventor)

    2014-01-01

    A modular system for acquiring biometric data includes a plurality of data acquisition modules configured to sample biometric data from at least one respective input channel at a data acquisition rate. A representation of the sampled biometric data is stored in memory of each of the plurality of data acquisition modules. A central control system is in communication with each of the plurality of data acquisition modules through a bus. The central control system is configured to collect data asynchronously, via the bus, from the memory of the plurality of data acquisition modules according to a relative fullness of the memory of the plurality of data acquisition modules.

  1. 48 CFR 13.302 - Purchase orders.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Purchase orders. 13.302 Section 13.302 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION PROCEDURES Simplified Acquisition Methods 13.302 Purchase...

  2. 48 CFR 18.119 - Trade agreements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Trade agreements. 18.119 Section 18.119 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES EMERGENCY ACQUISITIONS Available Acquisition Flexibilities 18.119 Trade agreements...

  3. 76 FR 27274 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-11

    ... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 225 Defense Federal Acquisition Regulation Supplement; Technical Amendments AGENCY: Defense Acquisition Regulations System... Federal Acquisition Regulation Supplement (DFARS) to direct contracting officers to additional guidance on...

  4. 48 CFR 2407.102 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Policy. 2407.102 Section 2407.102 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT COMPETITION AND ACQUISITION PLANNING ACQUISITION PLANNING Acquisition Plans 2407.102 Policy. The Senior...

  5. 48 CFR 2407.102 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Policy. 2407.102 Section 2407.102 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT COMPETITION AND ACQUISITION PLANNING ACQUISITION PLANNING Acquisition Plans 2407.102 Policy. The Senior...

  6. 48 CFR 18.119 - Trade agreements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Trade agreements. 18.119 Section 18.119 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES EMERGENCY ACQUISITIONS Available Acquisition Flexibilities 18.119 Trade agreements...

  7. 48 CFR 18.118 - Trade agreements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Trade agreements. 18.118 Section 18.118 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES EMERGENCY ACQUISITIONS Available Acquisition Flexibilities 18.118 Trade agreements...

  8. 48 CFR 18.119 - Trade agreements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Trade agreements. 18.119 Section 18.119 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES EMERGENCY ACQUISITIONS Available Acquisition Flexibilities 18.119 Trade agreements...

  9. 48 CFR 8.709 - Payments.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Payments. 8.709 Section 8.709 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition From Nonprofit Agencies Employing People Who Are...

  10. 48 CFR 8.702 - General.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false General. 8.702 Section 8.702 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition From Nonprofit Agencies Employing People Who Are...

  11. 48 CFR 8.707 - Prices.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Prices. 8.707 Section 8.707 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition From Nonprofit Agencies Employing People Who Are...

  12. 48 CFR 8.705 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Procedures. 8.705 Section 8.705 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition From Nonprofit Agencies Employing People Who Are...

  13. 48 CFR 1601.101 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Purpose. 1601.101 Section 1601.101 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH... Employees Health Benefits Acquisition Regulation, within title 48, the Federal Acquisition Regulation System...

  14. 48 CFR 1601.101 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Purpose. 1601.101 Section 1601.101 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH... Employees Health Benefits Acquisition Regulation, within title 48, the Federal Acquisition Regulation System...

  15. 48 CFR 1601.101 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Purpose. 1601.101 Section 1601.101 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT FEDERAL EMPLOYEES HEALTH... Employees Health Benefits Acquisition Regulation, within title 48, the Federal Acquisition Regulation System...

  16. 48 CFR 3001.7001 - Content.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Content. 3001.7001 Section 3001.7001 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Other Determinations, Waivers, Exceptions, Approvals, Reviews, and...

  17. 48 CFR 3001.7001 - Content.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Content. 3001.7001 Section 3001.7001 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Other Determinations, Waivers, Exceptions, Approvals, Reviews, and...

  18. 48 CFR 3001.7001 - Content.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Content. 3001.7001 Section 3001.7001 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Other Determinations, Waivers, Exceptions, Approvals, Reviews, and...

  19. 48 CFR 3001.7001 - Content.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Content. 3001.7001 Section 3001.7001 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Other Determinations, Waivers, Exceptions, Approvals, Reviews, and...

  20. 48 CFR 225.1103 - Other provisions and clauses.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Other provisions and clauses. 225.1103 Section 225.1103 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Solicitation Provisions and...

  1. 48 CFR 1.401 - Definition.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Definition. 1.401 Section 1.401 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Deviations from the FAR 1.401 Definition. Deviation means any one or...

  2. 48 CFR 2801.101 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Purpose. 2801.101 Section 2801.101 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 2801.101 Purpose. (a) The Justice Acquisition...

  3. 48 CFR 3001.7001 - Content.

    Code of Federal Regulations, 2010 CFR

    2004-10-01

    ... 48 Federal Acquisition Regulations System 7 2004-10-01 2004-10-01 false Content. 3001.7001 Section 3001.7001 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Other Determinations, Waivers, Exceptions, Approvals, Reviews, and...

  4. 48 CFR 3001.7001 - Content.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 7 2011-10-01 2011-10-01 false Content. 3001.7001 Section 3001.7001 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Other Determinations, Waivers, Exceptions, Approvals, Reviews, and...

  5. 48 CFR 2801.101 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Purpose. 2801.101 Section 2801.101 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE GENERAL DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 2801.101 Purpose. (a) The Justice Acquisition...

  6. 48 CFR 2801.101 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Purpose. 2801.101 Section 2801.101 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE GENERAL DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 2801.101 Purpose. (a) The Justice Acquisition...

  7. 48 CFR 2801.101 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Purpose. 2801.101 Section 2801.101 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE GENERAL DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 2801.101 Purpose. (a) The Justice Acquisition...

  8. 48 CFR 2801.101 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Purpose. 2801.101 Section 2801.101 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE GENERAL DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 2801.101 Purpose. (a) The Justice Acquisition...

  9. 48 CFR 1.603-4 - Termination.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Termination. 1.603-4 Section 1.603-4 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Career Development, Contracting Authority, and Responsibilities 1.603-4...

  10. 48 CFR 1.502 - Unsolicited proposed revisions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Unsolicited proposed revisions. 1.502 Section 1.502 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Agency and Public Participation 1.502 Unsolicited proposed...

  11. 48 CFR 1301.303 - Publication and codification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Publication and codification. 1301.303 Section 1301.303 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE GENERAL DEPARTMENT OF COMMERCE ACQUISITION REGULATIONS SYSTEM Agency Acquisition Regulations 1301.303 Publication and...

  12. 48 CFR 225.7604 - Waivers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Waivers. 225.7604 Section 225.7604 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7604 Waivers. The...

  13. 48 CFR 225.7604 - Waivers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Waivers. 225.7604 Section 225.7604 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7604 Waivers. The...

  14. 48 CFR 225.7604 - Waivers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Waivers. 225.7604 Section 225.7604 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7604 Waivers. The...

  15. 48 CFR 225.7604 - Waivers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Waivers. 225.7604 Section 225.7604 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7604 Waivers. The...

  16. 48 CFR 213.402 - Conditions for use.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Conditions for use. 213.402 Section 213.402 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION PROCEDURES Fast Payment...

  17. 48 CFR 213.402 - Conditions for use.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Conditions for use. 213.402 Section 213.402 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION PROCEDURES Fast Payment...

  18. 48 CFR 213.402 - Conditions for use.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Conditions for use. 213.402 Section 213.402 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION PROCEDURES Fast Payment...

  19. 48 CFR 213.402 - Conditions for use.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Conditions for use. 213.402 Section 213.402 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION PROCEDURES Fast Payment...

  20. 48 CFR 213.402 - Conditions for use.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Conditions for use. 213.402 Section 213.402 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACTING METHODS AND CONTRACT TYPES SIMPLIFIED ACQUISITION PROCEDURES Fast Payment...

  1. 48 CFR 3401.401 - Definition.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Definition. 3401.401 Section 3401.401 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ED ACQUISITION REGULATION SYSTEM Deviations 3401.401 Definition. A deviation from the EDAR has the...

  2. 48 CFR 225.7604 - Waivers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Waivers. 225.7604 Section 225.7604 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Secondary Arab Boycott of Israel 225.7604 Waivers. The...

  3. Cryogenic Controls for Fermilab's Srf Cavities and Test Facility

    NASA Astrophysics Data System (ADS)

    Norris, B.; Bossert, R.; Klebaner, A.; Lackey, S.; Martinez, A.; Pei, L.; Soyars, W.; Sirotenko, V.

    2008-03-01

    A new superconducting radio frequency (SRF) cavities test facility is now operational at Fermilab's Meson Detector Building (MDB). The Cryogenic Test Facility (CTF), located in a separate building 500 m away, supplies the facility with cryogens. The design incorporates ambient temperature pumping for superfluid helium production, as well as three 0.6 kW at 4.5 K refrigerators, five screw compressors, a helium purifier, helium and nitrogen inventory, cryogenic distribution system, and a variety of test cryostats. To control and monitor the vastly distributed cryogenic system, a flexible scheme has been developed. Both commercial and experimental physics tools are used. APACS+™, a process automation control system from Siemens-Moore, is at the heart of the design. APACS+™ allows engineers to configure an ever evolving test facility while maintaining control over the plant and distribution system. APACS+™ nodes at CTF and MDB are coupled by a fiber optic network. DirectLogic205 PLCs by KOYO® are used as the field level interface to most I/O. The top layer of this system uses EPICS (Experimental Physics and Industrial Control System) as a SCADA/HMI. Utilities for graphical display, control loop setting, real time/historical plotting and alarming have been implemented by using the world-wide library of applications for EPICS. OPC client/server technology is used to bridge across each different platform. This paper presents this design and its successful implementation.

  4. FwWebViewPlus: integration of web technologies into WinCC OA based Human-Machine Interfaces at CERN

    NASA Astrophysics Data System (ADS)

    Golonka, Piotr; Fabian, Wojciech; Gonzalez-Berges, Manuel; Jasiun, Piotr; Varela-Rodriguez, Fernando

    2014-06-01

    The rapid growth in popularity of web applications gives rise to a plethora of reusable graphical components, such as Google Chart Tools and JQuery Sparklines, implemented in JavaScript and run inside a web browser. In the paper we describe the tool that allows for seamless integration of web-based widgets into WinCC Open Architecture, the SCADA system used commonly at CERN to build complex Human-Machine Interfaces. Reuse of widely available widget libraries and pushing the development efforts to a higher abstraction layer based on a scripting language allow for significant reduction in maintenance of the code in multi-platform environments compared to those currently used in C++ visualization plugins. Adequately designed interfaces allow for rapid integration of new web widgets into WinCC OA. At the same time, the mechanisms familiar to HMI developers are preserved, making the use of new widgets "native". Perspectives for further integration between the realms of WinCC OA and Web development are also discussed.

  5. 48 CFR 908.7102 - Aircraft.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Aircraft. 908.7102 Section 908.7102 Federal Acquisition Regulations System DEPARTMENT OF ENERGY COMPETITION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Special Items 908.7102 Aircraft. Acquisition of...

  6. 48 CFR 307.7104 - Review and certification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Review and certification. 307.7104 Section 307.7104 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES COMPETITION AND ACQUISITION PLANNING ACQUISITION PLANNING Acquisition Plan 307.7104 Review and certification...

  7. 48 CFR 307.7106 - Acquisition milestones.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Acquisition milestones. 307.7106 Section 307.7106 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES COMPETITION... to track progress of the acquisition. The milestone schedule signatories (see the Requirements and...

  8. 48 CFR 307.7106 - Acquisition milestones.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Acquisition milestones. 307.7106 Section 307.7106 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES COMPETITION... to track progress of the acquisition. The milestone schedule signatories (see the Requirements and...

  9. 48 CFR 6.201 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Policy. 6.201 Section 6.201 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING COMPETITION REQUIREMENTS Full and Open Competition After Exclusion of Sources 6.201 Policy. Acquisitions made...

  10. 48 CFR 8.802 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 8.802 Section 8.802 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Printing and Related Supplies 8.802 Policy. (a...

  11. 48 CFR 7.202 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 7.202 Section 7.202 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING ACQUISITION PLANNING Planning for the Purchase of Supplies in Economic Quantities 7.202 Policy. (a) Agencies...

  12. 48 CFR 8.502 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 8.502 Section 8.502 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition of Helium 8.502 Policy. Agencies and their...

  13. 48 CFR 6.201 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 6.201 Section 6.201 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING COMPETITION REQUIREMENTS Full and Open Competition After Exclusion of Sources 6.201 Policy. Acquisitions made...

  14. 48 CFR 8.602 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 8.602 Section 8.602 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING REQUIRED SOURCES OF SUPPLIES AND SERVICES Acquisition From Federal Prison Industries, Inc. 8.602 Policy. (a...

  15. 48 CFR 7.202 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Policy. 7.202 Section 7.202 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING ACQUISITION PLANNING Planning for the Purchase of Supplies in Economic Quantities 7.202 Policy. (a) Agencies...

  16. 48 CFR 12.403 - Termination.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Termination. 12.403 Section 12.403 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING ACQUISITION OF COMMERCIAL ITEMS Unique Requirements Regarding Terms and Conditions for Commercial Items 12.403...

  17. 48 CFR 307.7104 - Review and certification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Review and certification. 307.7104 Section 307.7104 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES COMPETITION AND ACQUISITION PLANNING ACQUISITION PLANNING Acquisition Plan 307.7104 Review and certification...

  18. 48 CFR 307.7104 - Review and certification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Review and certification. 307.7104 Section 307.7104 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES COMPETITION AND ACQUISITION PLANNING ACQUISITION PLANNING Acquisition Plan 307.7104 Review and certification...

  19. 48 CFR 307.7104 - Review and certification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Review and certification. 307.7104 Section 307.7104 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES COMPETITION AND ACQUISITION PLANNING ACQUISITION PLANNING Acquisition Plan 307.7104 Review and certification...

  20. 48 CFR 307.7104 - Review and certification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Review and certification. 307.7104 Section 307.7104 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES COMPETITION AND ACQUISITION PLANNING ACQUISITION PLANNING Acquisition Plan 307.7104 Review and certification...

Top