Sample records for acquisition scada technology

  1. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting maliciousmore » activity.« less

  2. Cybersecurity of Critical Control Networks

    DTIC Science & Technology

    2015-07-14

    project are included below. The tasks include work in link encryption for existing legacy SCADA equipment, where we continue to develop lightweight...language for authoring and monitoring compliance of SCADA systems, including technologies for a “policy monitor” which reports out on any observance issues...Acquisition ( SCADA ). Details of each project are included below. The tasks include work in link encryption for existing legacy SCADA equipment

  3. Drainpipe network management information system design based on GIS and SCADA technique

    NASA Astrophysics Data System (ADS)

    Gu, Ze-Yu; Zhao, De-An

    2011-02-01

    Achieving urban drainpipe network integration of geographical information system (GIS) and supervisory control and data acquisition (SCADA) technology is described in this paper. The system design's plans are put forward, which have realized GIS and SCADA system supplementary in the technology and strengthened the model visible analysis ability. It is verified by practical cases that the system has more practical values and a good prospect.

  4. Applying New Network Security Technologies to SCADA Systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators.more » 4This page intentionally left blank.« less

  5. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-criticalmore » monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).« less

  6. SCADA Application for ACTS Technology

    NASA Technical Reports Server (NTRS)

    Fairbanks, Barry

    1992-01-01

    The results of a system level study done by Hughes Network Systems for NASA are presented. For the supervisory control and data acquisition (SCADA) application, use of Ka-band spot beam satellite technology associated with NASA's Advanced Communication Technology Satellite (ACTS) offers a reduction in Earth station antenna size and transmitter power that may translate into lower system costs. The approaches taken to determine commercial potential of the system are described.

  7. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  8. Using Physical Models for Anomaly Detection in Control Systems

    NASA Astrophysics Data System (ADS)

    Svendsen, Nils; Wolthusen, Stephen

    Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA environments that make subversion detection impractical; and by sensor noise and feedback characteristics that degrade conventional anomaly detection systems. Moreover, potential attack mechanisms are ill-defined and may include both physical and logical aspects.

  9. An Encryption Scheme for Communication Internet SCADA Components

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  10. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  11. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    NASA Astrophysics Data System (ADS)

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  12. Acceptance Testing of a Satellite SCADA Photovoltaic-Diesel Hybrid System

    NASA Technical Reports Server (NTRS)

    Kalu, Alex; Acosta, R.; Durand, S.; Emrich, Carol; Ventre, G.; Wilson, W.

    1999-01-01

    Savannah State University (SSU) and the Florida Solar Energy Center (FSEC) have been participating in the NASA Advanced Communications Technology Satellite (ACTS) program for the last five years. This program was designed by NASA to help maintain U.S. leadership in commercial space communications by funding high-risk research, and to flight-test next-generation digital satellite components. Launched in 1993, ACTS is an U.S. government funded technology test-bed that incorporates high power Ka-band transponders, small spot beams, and on-board digital storage and switching technology. Associated with the spacecraft, is a prototype satellite control center that supports various application experiments. The SSU/FSEC application experiment is to developing a Photovoltaic-Diesel Hybrid Power system complete with satellite Supervisory Control and Data Acquisition (SCADA). The hybrid system was design to demonstrate the feasibility of using SCADA to maintain and operate remote village power systems. This configuration would enable experts at a central location to provide technical assistance to local technicians while they acquire a measure of proficiency with the hybrid system operation and maintenance. Upon full mastery of the technology, similar SCADA arrangement are planned to remotely monitor and control constellation of hybrid systems scattered overlarge rural areas. Two Orion Energy APEX-1000 hybrid systems were delivered in 1998, one was installed at SSU in eastern Georgia and the other was installed at FSEC in Central Florida. The project was designed to: (1) evaluate the performance of ACTS in a SCADA arrangement, (2) monitor the health and performance of all major hybrid subsystems, (3) investigate load control and battery charging strategies to maximize battery capacity and lifetime, and (4) develop satellite communication protocol. Preliminary results indicate that the hybrid design is suitable for satellite Supervisory Control and Data Acquisition. A modification to the controller software has produced a robust communication link capable of real time control and long term data collection.

  13. A Survey of Research in Supervisory Control and Data Acquisition (SCADA)

    DTIC Science & Technology

    2014-09-01

    distance learning .2 The data acquired may be operationally oriented and used to better run the system, or it could be strategic in nature and used to...Technically the SCADA system is composed of the information technology (IT) that provides the human- machine interface (HMI) and stores and analyzes the data...systems work by learning what normal or benign traffic is and reporting on any abnormal traffic. These systems have the potential to detect zero-day

  14. Evaluating Information Assurance Control Effectiveness on an Air Force Supervisory Control and Data Acquisition (SCADA) System

    DTIC Science & Technology

    2011-03-01

    Byres, E. J., Lowe, J. (2004). The Myths and facts behind cyber security risks for industrial control systems . Berlin, Germany: VDE 2004 Congress...ACQUISITION (SCADA) SYSTEM THESIS Jason R. Nielsen, Major, USAF AFIT/GCO/ENG/11-10 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE...DATA ACQUISITION (SCADA) SYSTEM THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of

  15. Wind Power Plant SCADA and Controls

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badrzadeh, Babak; Castillo, Nestor; Bradt, M.

    2011-01-01

    Modern Wind Power Plants (WPPs) contain a variety of intelligent electronic devices (IEDs), Supervisory Control and Data Acquisition (SCADA) and communication systems. This paper discusses the issues related to a typical WPP's SCADA and Control. Presentation topics are: (1) Wind Turbine Controls; (2) Wind Plant SCADA, OEM SCADA Solutions, Third-Party SCADA Solutions; (3) Wind Plant Control; and (4) Security and Reliability Compliance.

  16. Review of Supervisory Control and Data Acquisition (SCADA) Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Reva Nickelson; Briam Johnson; Ken Barnes

    2004-01-01

    A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

  17. Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure

    ERIC Educational Resources Information Center

    Morsey, Christopher

    2017-01-01

    In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…

  18. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  19. Supervisory Control and Data Acquisition System | Energy Systems

    Science.gov Websites

    Integration Facility | NREL Supervisory Control and Data Acquisition System Supervisory Control supervisory control and data acquisition (SCADA) system monitors and controls safety systems and gathers real Energy Systems Integration Facility control room. The Energy Systems Integration Facility's SCADA system

  20. An Architecture for SCADA Network Forensics

    NASA Astrophysics Data System (ADS)

    Kilpatrick, Tim; Gonzalez, Jesus; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet

    Supervisory control and data acquisition (SCADA) systems are widely used in industrial control and automation. Modern SCADA protocols often employ TCP/IP to transport sensor data and control signals. Meanwhile, corporate IT infrastructures are interconnecting with previously isolated SCADA networks. The use of TCP/IP as a carrier protocol and the interconnection of IT and SCADA networks raise serious security issues. This paper describes an architecture for SCADA network forensics. In addition to supporting forensic investigations of SCADA network incidents, the architecture incorporates mechanisms for monitoring process behavior, analyzing trends and optimizing plant performance.

  1. Renewable Energy SCADA/Training Using NASA's Advanced Technology Communication Satellite

    NASA Technical Reports Server (NTRS)

    Kalu, A.; Emrich, C.; Ventre, G.; Wilson, W.; Acosta, Roberto (Technical Monitor)

    2000-01-01

    The lack of electrical energy in the rural communities of developing countries is well known, as is the economic unfeasibility of providing much needed energy to these regions via electric grids. Renewable energy (RE) can provide an economic advantage over conventional forms in meeting some of these energy needs. The use of a Supervisory Control and Data Acquisition (SCADA) arrangement via satellite could enable experts at remote locations to provide technical assistance to local trainees while they acquire a measure of proficiency with a newly installed RE system through hands-on training programs using the same communications link. Upon full mastery of the technologies, indigenous personnel could also employ similar SCADA arrangements to remotely monitor and control their constellation of RE systems. Two separate ACTS technology verification experiments (TVEs) have demonstrated that the portability of the Ultra Small Aperture Terminal (USAT) and the versatility of NASA's Advanced Communications Technology Satellite (ACTS), as well as the advantages of Ka band satellites, can be invaluable in providing energy training via distance education (DE), and for implementing renewable energy system SCADA. What has not been tested is the capabilities of these technologies for a simultaneous implementation of renewable energy DE and SCADA. Such concurrent implementations will be useful for preparing trainees in developing countries for their eventual SCADA operations. The project described in this correspondence is the first effort, to our knowledge, in this specific TVE. The setup for this experiment consists of a one-Watt USAT located at Florida Solar Energy Center (FSEC) connected to two satellite modems tuned to different frequencies to establish two duplex ACTS Ka-band communication channels. A short training program on operation and maintenance of the system will be delivered while simultaneously monitoring and controlling the hybrid using the same satellite communications link. The trainees will include faculty and students from Savannah State University, and staff from FSEC. An interactive internet link will be used to allow faculty from the University of West Indies to participate in the training session.

  2. Mobile phone based SCADA for industrial automation.

    PubMed

    Ozdemir, Engin; Karacor, Mevlut

    2006-01-01

    SCADA is the acronym for "Supervisory Control And Data Acquisition." SCADA systems are widely used in industry for supervisory control and data acquisition of industrial processes. Conventional SCADA systems use PC, notebook, thin client, and PDA as a client. In this paper, a Java-enabled mobile phone has been used as a client in a sample SCADA application in order to display and supervise the position of a sample prototype crane. The paper presents an actual implementation of the on-line controlling of the prototype crane via mobile phone. The wireless communication between the mobile phone and the SCADA server is performed by means of a base station via general packet radio service (GPRS) and wireless application protocol (WAP). Test results have indicated that the mobile phone based SCADA integration using the GPRS or WAP transfer scheme could enhance the performance of the crane in a day without causing an increase in the response times of SCADA functions. The operator can visualize and modify the plant parameters using his mobile phone, without reaching the site. In this way maintenance costs are reduced and productivity is increased.

  3. Application of an automation system and a supervisory control and data acquisition (SCADA) system for the optimal operation of a membrane adsorption hybrid system.

    PubMed

    Smith, P J; Vigneswaran, S; Ngo, H H; Nguyen, H T; Ben-Aim, R

    2006-01-01

    The application of automation and supervisory control and data acquisition (SCADA) systems to municipal water and wastewater treatment plants is rapidly increasing. However, the application of these systems is less frequent in the research and development phases of emerging treatment technologies used in these industries. This study involved the implementation of automation and a SCADA system to the submerged membrane adsorption hybrid system for use in a semi-pilot scale research project. An incremental approach was used in the development of the automation and SCADA systems, leading to the development of two new control systems. The first system developed involved closed loop control of the backwash initiation, based upon a pressure increase, leading to productivity improvements as the backwash is only activated when required, not at a fixed time. This system resulted in a 40% reduction in the number of backwashes required and also enabled optimised operations under unsteady concentrations of wastewater. The second system developed involved closed loop control of the backwash duration, whereby the backwash was terminated when the pressure reached a steady state. This system resulted in a reduction of the duration of the backwash of up to 25% and enabled optimised operations as the foulant build-up within the reactor increased.

  4. Supervisory Control and Data Acquisition (SCADA) Security Awareness In a Resource Constrained Learning Environment

    DTIC Science & Technology

    2014-06-16

    SCADA systems. These professionals should be aware of the vulnerabilities so they can take intelligent precautions to mitigate attacks. SCADA...vulnerabilities • Describe mitigation options for protecting a system from SCADA attacks For students that go on to pursue a degree in Computer...from SCADA attacks For students who do not remain in the IT realm, this introduction provides an awareness to help them mitigate threats for their

  5. Pipeline scada upgrade uses satellite terminal system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Conrad, W.; Skovrinski, J.R.

    In the recent automation of its supervisory control and data acquisition (scada) system, Transwestern Pipeline Co. has become the first to use very small aperture satellite terminals (VSAT's) for scada. A subsidiary of Enron Interstate Pipeline, Houston, Transwestern moves natural gas through a 4,400-mile system from West Texas, New Mexico, and Oklahoma to southern California markets. Transwestern's modernization, begun in November 1985, addressed problems associated with its aging control equipment which had been installed when the compressor stations were built in 1960. Over the years a combination of three different systems had been added. All were cumbersome to maintain andmore » utilized outdated technology. Problems with reliability, high maintenance time, and difficulty in getting new parts were determining factors in Transwestern's decision to modernize its scada system. In addition, the pipeline was anticipating moving its control center from Roswell, N.M., to Houston and believed it would be impossible to marry the old system with the new computer equipment in Houston.« less

  6. SCADA OPERATOR TRAINING TOOL APPLIED TO THE CENTRAL ARIZONA IRRIGATION AND DRAINAGE DISTRICT

    USDA-ARS?s Scientific Manuscript database

    Many irrigation districts use Supervisory Control and Data Acquisition (SCADA) software to manage their canal systems. Whether homegrown or commercial, these programs require a significant amount of training for new operators. While some SCADA operators are hired with extensive field experience, o...

  7. Study on the Future Internet System through Analysis of SCADA Systems

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Jung, Sungmo; Kim, Seoksoo

    Research on the future Internet is focused on establishing standards by solving problems through various projects and accepting various requirements. In this study, the SCADA (Supervisory Control And Data Acquisition) environment, closely related with national infrastructure, is analyzed in order to explore requirements of the future Internet and then those of the SCADA network. Also, this study provides SCADA system environments for the future Internet.

  8. Lost Hills Field Trial - incorporating new technology for resevoir management

    NASA Technical Reports Server (NTRS)

    Fielding, E. J.; Brink, J. L.; Patzek, T. W.; Silin, D. B.

    2002-01-01

    This paper will discuss how Chevron U.S.A. Production Company is implementing a field trial that will use Supervisory Control and Data Acquisition (SCADA)on injection wells, in conjunction with satellite images to measure ground elevation changes, to perform real-time resevoir management in the Lost Hills Field.

  9. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  10. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  11. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  12. 7 CFR 1726.176 - Communications and control facilities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... line carrier communications systems, load control, and supervisory control and data acquisition (SCADA...) Load control systems, communications systems, and SCADA systems—(1) Contract forms. The borrower must...

  13. Codifying Information Assurance Controls for Department of Defense (DoD) Supervisory Control and Data Acquisition (SCADA) Systems

    DTIC Science & Technology

    2010-03-01

    CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF DEFENSE (DOD) SUPERVISORY CONTROL AND DATA...Force, Department of Defense, or the U.S. Government. AFIT/GCO/ENG/10-13 CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF...DEFENSE (DOD) SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) SYSTEMS THESIS Presented to the Faculty Department of Electrical and Computer

  14. Production Facility SCADA Design Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dale, Gregory E.; Holloway, Michael Andrew; Baily, Scott A.

    2015-03-23

    The following report covers FY 14 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production facility. The goal of this effort is to provide Northstar with a baseline system design.

  15. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies tomore » SCADA systems; our metric is a specialization of the generic measure of mean failure cost.« less

  16. Sandia SCADA Program -- High Surety SCADA LDRD Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    CARLSON, ROLF E.

    2002-04-01

    Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteriamore » Protection Profile. This report provides the status of work completed and discusses several challenges ahead.« less

  17. Security and SCADA protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

  18. Using State Estimation Residuals to Detect Abnormal SCADA Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Jian; Chen, Yousu; Huang, Zhenyu

    2010-04-30

    Detection of abnormal supervisory control and data acquisition (SCADA) data is critically important for safe and secure operation of modern power systems. In this paper, a methodology of abnormal SCADA data detection based on state estimation residuals is presented. Preceded with a brief overview of outlier detection methods and bad SCADA data detection for state estimation, the framework of the proposed methodology is described. Instead of using original SCADA measurements as the bad data sources, the residuals calculated based on the results of the state estimator are used as the input for the outlier detection algorithm. The BACON algorithm ismore » applied to the outlier detection task. The IEEE 118-bus system is used as a test base to evaluate the effectiveness of the proposed methodology. The accuracy of the BACON method is compared with that of the 3-σ method for the simulated SCADA measurements and residuals.« less

  19. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.

    PubMed

    Wang, Hao; Lau, Nathan; Gerdes, Ryan M

    2018-04-01

    The aim of this study was to apply work domain analysis for cybersecurity assessment and design of supervisory control and data acquisition (SCADA) systems. Adoption of information and communication technology in cyberphysical systems (CPSs) for critical infrastructures enables automated and distributed control but introduces cybersecurity risk. Many CPSs employ SCADA industrial control systems that have become the target of cyberattacks, which inflict physical damage without use of force. Given that absolute security is not feasible for complex systems, cyberintrusions that introduce unanticipated events will occur; a proper response will in turn require human adaptive ability. Therefore, analysis techniques that can support security assessment and human factors engineering are invaluable for defending CPSs. We conducted work domain analysis using the abstraction hierarchy (AH) to model a generic SCADA implementation to identify the functional structures and means-ends relations. We then adopted a case study approach examining the Stuxnet cyberattack by developing and integrating AHs for the uranium enrichment process, SCADA implementation, and malware to investigate the interactions between the three aspects of cybersecurity in CPSs. The AHs for modeling a generic SCADA implementation and studying the Stuxnet cyberattack are useful for mapping attack vectors, identifying deficiencies in security processes and features, and evaluating proposed security solutions with respect to system objectives. Work domain analysis is an effective analytical method for studying cybersecurity of CPSs for critical infrastructures in a psychologically relevant manner. Work domain analysis should be applied to assess cybersecurity risk and inform engineering and user interface design.

  20. Power System Information Delivering System Based on Distributed Object

    NASA Astrophysics Data System (ADS)

    Tanaka, Tatsuji; Tsuchiya, Takehiko; Tamura, Setsuo; Seki, Tomomichi; Kubota, Kenji

    In recent years, improvement in computer performance and development of computer network technology or the distributed information processing technology has a remarkable thing. Moreover, the deregulation is starting and will be spreading in the electric power industry in Japan. Consequently, power suppliers are required to supply low cost power with high quality services to customers. Corresponding to these movements the authors have been proposed SCOPE (System Configuration Of PowEr control system) architecture for distributed EMS/SCADA (Energy Management Systems / Supervisory Control and Data Acquisition) system based on distributed object technology, which offers the flexibility and expandability adapting those movements. In this paper, the authors introduce a prototype of the power system information delivering system, which was developed based on SCOPE architecture. This paper describes the architecture and the evaluation results of this prototype system. The power system information delivering system supplies useful power systems information such as electric power failures to the customers using Internet and distributed object technology. This system is new type of SCADA system which monitors failure of power transmission system and power distribution system with geographic information integrated way.

  1. Communication Security for Control Systems in Smart Grid

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  2. Using State Estimation Residuals to Detect Abnormal SCADA Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Jian; Chen, Yousu; Huang, Zhenyu

    2010-06-14

    Detection of manipulated supervisory control and data acquisition (SCADA) data is critically important for the safe and secure operation of modern power systems. In this paper, a methodology of detecting manipulated SCADA data based on state estimation residuals is presented. A framework of the proposed methodology is described. Instead of using original SCADA measurements as the bad data sources, the residuals calculated based on the results of the state estimator are used as the input for the outlier detection process. The BACON algorithm is applied to detect outliers in the state estimation residuals. The IEEE 118-bus system is used asmore » a test case to evaluate the effectiveness of the proposed methodology. The accuracy of the BACON method is compared with that of the 3-σ method for the simulated SCADA measurements and residuals.« less

  3. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  4. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  5. A Web-Based Remote Access Laboratory Using SCADA

    ERIC Educational Resources Information Center

    Aydogmus, Z.; Aydogmus, O.

    2009-01-01

    The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…

  6. Real-Time Monitoring of Scada Based Control System for Filling Process

    NASA Astrophysics Data System (ADS)

    Soe, Aung Kyaw; Myint, Aung Naing; Latt, Maung Maung; Theingi

    2008-10-01

    This paper is a design of real-time monitoring for filling system using Supervisory Control and Data Acquisition (SCADA). The monitoring of production process is described in real-time using Visual Basic.Net programming under Visual Studio 2005 software without SCADA software. The software integrators are programmed to get the required information for the configuration screens. Simulation of components is expressed on the computer screen using parallel port between computers and filling devices. The programs of real-time simulation for the filling process from the pure drinking water industry are provided.

  7. Design and Implementation of a Secure Modbus Protocol

    NASA Astrophysics Data System (ADS)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  8. Expanding Combat Power Through Military Cyberpower Theory

    DTIC Science & Technology

    2015-04-02

    systems (ICS) and supervisory control and data acquisition systems ( SCADA ) are public-facing, providing more avenues of approach for an adversary. ICS...and SCADA are the two primary means for cyber adversaries to achieve direct physical effects through cyberspace. Strategic Attribution. From a...REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to

  9. The Commanding Officer’s Perspective on Protecting Shipboard IT Networks

    DTIC Science & Technology

    2014-09-01

    potential checklist for protecting Supervisory Control and Data Acquisition ( SCADA ) systems. “A SCADA system is the software that controls networks such as...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited THE COMMANDING... for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data

  10. Architecture and Methods for Substation SCADA Cybersecurity: Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Albunashee, Hamdi; Al Sarray, Muthanna; McCann, Roy

    There are over 3000 electricity providers in the United States, encompassing investor and publicly owned utilities as well as electric cooperatives. There has been ongoing trends to increasingly automate and provide remote control and monitoring of electric energy delivery systems. The deployment of computer network technologies has increased the efficiency and reliability of electric power infrastructure. However, the increased use of digital communications has also increased the vulnerability to malicious cyber attacks [1]. In 2004 the National Research Councils (National Academies) formed a committee of specialists to address these vulnerabilities and propose possible solutions with an objective to prioritize themore » R&D needs for developing countermeasures. The committee addressed many potential concerns in the electric power delivery system and classified them based upon different criteria and presented recommendations to minimize the gap between the academic research directions and the needs of the electric utility industry. The complexity and diversity of the electric power delivery system in the U.S. has opened many ports for attackers and intruders [1]. This complexity and diversity is attributed to the fact that power delivery system is a network of substations, transmission and distribution lines, sub-networks of controlling, sensing and monitoring units, and human operator involvement for running the system [1]. Accordingly, any incident such as the occurrence of a fault or disturbance in this complex network cannot be deferred and should be resolved within an order of milliseconds, otherwise there is risk of large-scale outages similar to the occurrences in India and the U.S. in 2003 [2]. There are three main vulnerabilities in supervisory control and data acquisition (SCADA) systems commonly identified—physical vulnerability, cyber vulnerability and personal vulnerability [1]. In terms of cyber threats, SCADA systems are the most critical elements in the electric power grid in the U.S. Unauthorized access to a SCADA system could enable/disable unexpected equipment (such as disable the protection system or a circuit breaker) which could cause large scale disruptions of electric power delivery. This paper provides an overview of power system SCADA technologies in transmission substations (Section 2) and summarizes the best practices for implementing a cyber security program. After introducing SCADA system operations in Section 2, a description of the security challenges for SCADA systems is presented in Section 3. In Section 4, NECRC Critical Infrastructure Protection standards CIP-002 through CIP-009 are summarized. An overview of industry best practices is presented in Section 5.« less

  11. Development of a novel SCADA system for laboratory testing.

    PubMed

    Patel, M; Cole, G R; Pryor, T L; Wilmot, N A

    2004-07-01

    This document summarizes the supervisory control and data acquisition (SCADA) system that allows communication with, and controlling the output of, various I/O devices in the renewable energy systems and components test facility RESLab. This SCADA system differs from traditional SCADA systems in that it supports a continuously changing operating environment depending on the test to be performed. The SCADA System is based on the concept of having one Master I/O Server and multiple client computer systems. This paper describes the main features and advantages of this dynamic SCADA system, the connections of various field devices to the master I/O server, the device servers, and numerous software features used in the system. The system is based on the graphical programming language "LabVIEW" and its "Datalogging and Supervisory Control" (DSC) module. The DSC module supports a real-time database called the "tag engine," which performs the I/O operations with all field devices attached to the master I/O server and communications with the other tag engines running on the client computers connected via a local area network. Generic and detailed communication block diagrams illustrating the hierarchical structure of this SCADA system are presented. The flow diagram outlining a complete test performed using this system in one of its standard configurations is described.

  12. Fundamentals of SCADA and automated meter reading

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kwok, A.

    1992-02-01

    This paper discusses SCADA systems allow users to control and acquire data from remote facilities such as compressors, pressure-regulating stations, control valves and measurement stations. In general, a SCADA system performs functions in sequential control, continuous control, supervisory setpoint control and data acquisitions. AMR systems allow users to obtain up-to-date information on their gas demand. When AMR was in its infancy, equipment was designed only to read and record gas consumption values. The basic function of an early AMR system was to read gas volume at a fixed interval and record the data in its memory until it communicated withmore » a central receiving facility.« less

  13. Real-Time SCADA Cyber Protection Using Compression Techniques

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OE’s Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welchmore » (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.« less

  14. Operational uses of ACTS technology

    NASA Astrophysics Data System (ADS)

    Gedney, Richard T.; Wright, David L.; Balombin, Joseph L.; Sohn, Philip Y.; Cashman, William F.; Stern, Alan L.; Golding, Len; Palmer, Larry

    1992-03-01

    The NASA Advanced Communications Technology Satellite (ACTS) provides the technologies for very high gain hopping spot beam antennas, on-board baseband routing and processing, and wideband (1 GHz) Ka-band transponders. A number of studies have recently been completed using the experience gained in developing the actual ACTS system hardware to quantify how well the ACTS technology can be used in future operational systems. This paper provides a summary of these study results including the spacecraft (S/C) weight per unit circuit for providing services by ACTS technologies as compared to present-day satellites. The uses of the ACTS technology discussed are for providing T1 VSAT mesh networks, aeronautical mobile communications, supervisory control and data acquisition (SCADA) services, and high data rate networks for supercomputer and other applications.

  15. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on howmore » to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.« less

  16. Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baily, Scott A.; Dalmas, Dale Allen; Wheat, Robert Mitchell

    2015-11-16

    The following report covers FY 15 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production prototype gas flow loop. The goal of this effort is to expand the existing system to include a second flow loop with a larger production-sized blower. Besides testing the larger blower, this system will demonstrate the scalability of our solution to multiple flow loops.

  17. Designing a SCADA system simulator for fast breeder reactor

    NASA Astrophysics Data System (ADS)

    Nugraha, E.; Abdullah, A. G.; Hakim, D. L.

    2016-04-01

    SCADA (Supervisory Control and Data Acquisition) system simulator is a Human Machine Interface-based software that is able to visualize the process of a plant. This study describes the results of the process of designing a SCADA system simulator that aims to facilitate the operator in monitoring, controlling, handling the alarm, accessing historical data and historical trend in Nuclear Power Plant (NPP) type Fast Breeder Reactor (FBR). This research used simulation to simulate NPP type FBR Kalpakkam in India. This simulator was developed using Wonderware Intouch software 10 and is equipped with main menu, plant overview, area graphics, control display, set point display, alarm system, real-time trending, historical trending and security system. This simulator can properly simulate the principle of energy flow and energy conversion process on NPP type FBR. This SCADA system simulator can be used as training media for NPP type FBR prospective operators.

  18. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    PubMed Central

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  19. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    PubMed

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  20. SCADA-based Operator Support System for Power Plant Equipment Fault Forecasting

    NASA Astrophysics Data System (ADS)

    Mayadevi, N.; Ushakumari, S. S.; Vinodchandra, S. S.

    2014-12-01

    Power plant equipment must be monitored closely to prevent failures from disrupting plant availability. Online monitoring technology integrated with hybrid forecasting techniques can be used to prevent plant equipment faults. A self learning rule-based expert system is proposed in this paper for fault forecasting in power plants controlled by supervisory control and data acquisition (SCADA) system. Self-learning utilizes associative data mining algorithms on the SCADA history database to form new rules that can dynamically update the knowledge base of the rule-based expert system. In this study, a number of popular associative learning algorithms are considered for rule formation. Data mining results show that the Tertius algorithm is best suited for developing a learning engine for power plants. For real-time monitoring of the plant condition, graphical models are constructed by K-means clustering. To build a time-series forecasting model, a multi layer preceptron (MLP) is used. Once created, the models are updated in the model library to provide an adaptive environment for the proposed system. Graphical user interface (GUI) illustrates the variation of all sensor values affecting a particular alarm/fault, as well as the step-by-step procedure for avoiding critical situations and consequent plant shutdown. The forecasting performance is evaluated by computing the mean absolute error and root mean square error of the predictions.

  1. Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.

    Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less

  2. Programmable Logic Controller Modification Attacks for use in Detection Analysis

    DTIC Science & Technology

    2014-03-27

    and J. Lowe, “The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems ,” in Proceedings of the VDE Kongress, vol. 116, 2004. [13...Feb 2014 Date 20 Feb 2014 Date 20 Feb 2014 Date AFIT-ENG-14-M-66 Abstract Unprotected Supervisory Control and Data Acquisition (SCADA) systems offer...control and monitor physical industrial processes. Although attacks targeting SCADA systems have increased, there has been little work exploring the

  3. Detecting Peer-to-Peer Botnets in SCADA Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan; Cheng, Liang; Chuah, Mooi Choo

    Supervisory Control and Data Acquisition (SCADA) systems monitor and control critical infrastructure such as the smart grid. As SCADA systems become increasingly interconnected and adopt more and more cyber-enabled components, the risks of cyber attacks become a major concern. Due to their decentralized organization, peer-to-peer (P2P) botnets are resilient to many existing takedown measures and can be exploited as an effective way to launch cyber attacks on SCADA systems. However, little work has been done to detect P2P botnets in SCADA systems, which carry traffic flows with characteristics significantly different from the Internet. In this paper, we design a P2P-botnetmore » detection method for SCADA systems, leveraging built-in traffic monitoring capabilities of SCADA networking devices. The proposed method consists of two stages. In the first stage, we design a simple feature test to filter out non-P2P hosts, which significantly reduces the data volume for P2P-botnet identification. In the second stage, we jointly consider flow-based and connectivity-based features that effectively set apart bots from benign hosts. We propose to use unsupervised learning for P2P-botnet identification, which not only identifies known P2P botnets but also captures newly emerged ones. Our simulation results show that the proposed system achieves high detection rates with very few false positives. Furthermore, our evaluation shows that the proposed method can detect hosts running P2P SCADA applications that are infected by P2P bots.« less

  4. Automated turn pike using PLC and SCADA

    NASA Astrophysics Data System (ADS)

    Silpa Sreedhar, P.; Aiswarya, P.; Kathirvelan, J.

    2017-11-01

    We propose a smart turnpike based on Programmable Logic Controller (PLC) and Supervisory Control and Data Acquisition Systems (SCADA) in this paper. In this work, the basic idea is to measure the weight of the vehicles and classify them according to its weight to the respective lanes. It is difficult for the turnpike people to monitor the whole process all the time. So, this PLC based diversion system can be implemented in turnpikes to reduce the difficulties. This method will work based on weight sensors (piezo-resistive) whose output will be fed to a PLC, which will control the vehicle diversion. Using SCADA software, the whole process can be monitored from a remote area. The algorithm developed in this successfully installed in real time system.

  5. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  6. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  7. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  8. 7 CFR 1794.6 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... where a telecommunications provider houses a device that combines individual subscriber circuits onto a... Control and Data Acquisition System (SCADA). Electronic monitoring and control equipment installed at...

  9. Industrial Control Systems/SCADA systems risk assessment in the energy sector

    NASA Astrophysics Data System (ADS)

    Falodun, Babatunde

    The energy sector is one of the most critical components of our national infrastructure. It not only provides the electrical power and petroleum required to run day-to-day operations and mechanisms in society, it's also an important element that directly impacts the economy with regard to growth and stability. Industrial Control Systems (ICS) /Supervisory Control and Data Acquisition Systems (SCADA) are computerized mechanisms, they are both software and hardware that are used to control real time processes and operations in power plants and oil production facilities. A significant attack on these control systems that leads to widespread disruption of energy could result in catastrophic consequences for any major city and even the nation. This research paper explores cyber threats and vulnerabilities faced by ICS/SCADA systems in the energy sector and also highlights possible outcomes of a successful breach. Furthermore, the research underscores mitigation strategies that could be used to prevent and respond to an attack. Keywords: Cybersecurity, SCADA, Cyber Attacks, Threats, Vulnerabilities, Risk Assessment, Dr. Albert Orbinati.

  10. Upgrade of U.S. EPA's Experimental Stream Facility Supervisory Control and Data Acquisition System

    EPA Science Inventory

    The Supervisory control and data acquisition (SCADA) system for the U.S. EPA’s Experimental Stream Facility (ESF) was upgraded using Camile hardware and software in 2015. The upgrade added additional hardwired connections, new wireless capabilities, and included a complete rewrit...

  11. Operations and maintenance manual for the LDUA supervisory control and data acquisition system (LDUA System 4200) and control network (LDUA System 4400)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barnes, G.A.

    1998-03-11

    This document defines the requirements applicable to the operation, maintenance and storage of the Supervisory Control and Data Acquisition System (SCADAS) and Control Network in support of the Light Duty Utility Arm (LDUA) operations.

  12. Kerman Photovoltaic Power Plant R&D data collection computer system operations and maintenance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rosen, P.B.

    1994-06-01

    The Supervisory Control and Data Acquisition (SCADA) system at the Kerman PV Plant monitors 52 analog, 44 status, 13 control, and 4 accumulator data points in real-time. A Remote Terminal Unit (RTU) polls 7 peripheral data acquisition units that are distributed throughout the plant once every second, and stores all analog, status, and accumulator points that have changed since the last scan. The R&D Computer, which is connected to the SCADA RTU via a RS-232 serial link, polls the RTU once every 5-7 seconds and records any values that have changed since the last scan. A SCADA software package calledmore » RealFlex runs on the R&D computer and stores all updated data values taken from the RTU, along with a time-stamp for each, in a historical real-time database. From this database, averages of all analog data points and snapshots of all status points are generated every 10 minutes and appended to a daily file. These files are downloaded via modem by PVUSA/Davis staff every day, and the data is placed into the PVUSA database.« less

  13. Secure Control Systems for the Energy Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less

  14. Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps.

    PubMed

    Moya, José M; Araujo, Alvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier

    2009-01-01

    The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals.

  15. Demonstration of Supervisory Control and Data Acquisition (SCADA) Virtualization Capability in the US Army Research Laboratory (ARL)/Sustaining Base Network Assurance Branch (SBNAB) US Army Cyber Analytics Laboratory (ACAL) SCADA Hardware Testbed

    DTIC Science & Technology

    2015-05-01

    application ,1 while the simulated PLC software is the open source ModbusPal Java application . When queried using the Modbus TCP protocol, ModbusPal reports...and programmable logic controller ( PLC ) components. The HMI and PLC components were instantiated with software and installed in multiple virtual...creating and capturing HMI– PLC network traffic over a 24-h period in the virtualized network and inspect the packets for errors.  Test the

  16. Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps

    PubMed Central

    Moya, José M.; Araujo, Álvaro; Banković, Zorana; de Goyeneche, Juan-Mariano; Vallejo, Juan Carlos; Malagón, Pedro; Villanueva, Daniel; Fraga, David; Romero, Elena; Blesa, Javier

    2009-01-01

    The reliable operation of modern infrastructures depends on computerized systems and Supervisory Control and Data Acquisition (SCADA) systems, which are also based on the data obtained from sensor networks. The inherent limitations of the sensor devices make them extremely vulnerable to cyberwarfare/cyberterrorism attacks. In this paper, we propose a reputation system enhanced with distributed agents, based on unsupervised learning algorithms (self-organizing maps), in order to achieve fault tolerance and enhanced resistance to previously unknown attacks. This approach has been extensively simulated and compared with previous proposals. PMID:22291569

  17. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  18. SCADA alarms processing for wind turbine component failure detection

    NASA Astrophysics Data System (ADS)

    Gonzalez, E.; Reder, M.; Melero, J. J.

    2016-09-01

    Wind turbine failure and downtime can often compromise the profitability of a wind farm due to their high impact on the operation and maintenance (O&M) costs. Early detection of failures can facilitate the changeover from corrective maintenance towards a predictive approach. This paper presents a cost-effective methodology to combine various alarm analysis techniques, using data from the Supervisory Control and Data Acquisition (SCADA) system, in order to detect component failures. The approach categorises the alarms according to a reviewed taxonomy, turning overwhelming data into valuable information to assess component status. Then, different alarms analysis techniques are applied for two purposes: the evaluation of the SCADA alarm system capability to detect failures, and the investigation of the relation between components faults being followed by failure occurrences in others. Various case studies are presented and discussed. The study highlights the relationship between faulty behaviour in different components and between failures and adverse environmental conditions.

  19. Quantifying the Impact of Unavailability in Cyber-Physical Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Federick T.

    2014-01-01

    The Supervisory Control and Data Acquisition (SCADA) system discussed in this work manages a distributed control network for the Tunisian Electric & Gas Utility. The network is dispersed over a large geographic area that monitors and controls the flow of electricity/gas from both remote and centralized locations. The availability of the SCADA system in this context is critical to ensuring the uninterrupted delivery of energy, including safety, security, continuity of operations and revenue. Such SCADA systems are the backbone of national critical cyber-physical infrastructures. Herein, we propose adapting the Mean Failure Cost (MFC) metric for quantifying the cost of unavailability.more » This new metric combines the classic availability formulation with MFC. The resulting metric, so-called Econometric Availability (EA), offers a computational basis to evaluate a system in terms of the gain/loss ($/hour of operation) that affects each stakeholder due to unavailability.« less

  20. Acceptance Testing of a Satellite SCADA Photovoltaic-Diesel Hybrid System

    NASA Technical Reports Server (NTRS)

    Kalu, A.; Emrich, C.; Ventre, G.; Wilson, W.; Acosta, Roberto (Technical Monitor)

    2000-01-01

    Satellite Supervisory Control and Data Acquisition (SCADA) of a Photovoltaic (PV)/diesel hybrid system was tested using NASA's Advanced Communication Technology Satellite (ACTS) and Ultra Small Aperture Terminal (USAT) ground stations. The setup consisted of a custom-designed PV/diesel hybrid system, located at the Florida Solar Energy Center (FSEC), which was controlled and monitored at a "remote" hub via Ka-band satellite link connecting two 1/4 Watt USATs in a SCADA arrangement. The robustness of the communications link was tested for remote monitoring of the health and performance of a PV/diesel hybrid system, and for investigating load control and battery charging strategies to maximize battery capacity and lifetime, and minimize loss of critical load probability. Baseline hardware performance test results demonstrated that continuous two-second data transfers can be accomplished under clear sky conditions with an error rate of less than 1%. The delay introduced by the satellite (1/4 sec) was transparent to synchronization of satellite modem as well as to the PV/diesel-hybrid computer. End-to-end communications link recovery times were less than 36 seconds for loss of power and less than one second for loss of link. The system recovered by resuming operation without any manual intervention, which is important since the 4 dB margin is not sufficient to prevent loss of the satellite link during moderate to heavy rain. Hybrid operations during loss of communications link continued seamlessly but real-time monitoring was interrupted. For this sub-tropical region, the estimated amount of time that the signal fade will exceed the 4 dB margin is about 10%. These results suggest that data rates of 4800 bps and a link margin of 4 dB with a 1/4 Watt transmitter are sufficient for end-to-end operation in this SCADA application.

  1. Cyber security risk assessment for SCADA and DCS networks.

    PubMed

    Ralston, P A S; Graham, J H; Hieb, J L

    2007-10-01

    The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.

  2. Towards A Taxonomy Of Attacks Against Energy Control Systems

    NASA Astrophysics Data System (ADS)

    Fleury, Terry; Khurana, Himanshu; Welch, Von

    Control systems in the energy sector (e.g., supervisory control and data acquisition (SCADA) systems) involve a hierarchy of sensing, monitoring and control devices connected to centralized control stations or centers. The incorporation of commercial off-the-shelf technologies in energy control systems makes them vulnerable to cyber attacks. A taxonomy of cyber attacks against control systems can assist the energy sector in managing the cyber threat. This paper takes the first step towards a taxonomy by presenting a comprehensive model of attacks, vulnerabilities and damage related to control systems. The model is populated based on a survey of the technical literature from industry, academia and national laboratories.

  3. Automatic Generation of Supervisory Control System Software Using Graph Composition

    NASA Astrophysics Data System (ADS)

    Nakata, Hideo; Sano, Tatsuro; Kojima, Taizo; Seo, Kazuo; Uchida, Tomoyuki; Nakamura, Yasuaki

    This paper describes the automatic generation of system descriptions for SCADA (Supervisory Control And Data Acquisition) systems. The proposed method produces various types of data and programs for SCADA systems from equipment definitions using conversion rules. At first, this method makes directed graphs, which represent connections between the equipment, from equipment definitions. System descriptions are generated using the conversion rules, by analyzing these directed graphs, and finding the groups of equipment that involve similar operations. This method can make the conversion rules multi levels by using the composition of graphs, and can reduce the number of rules. The developer can define and manage these rules efficiently.

  4. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pollet, J.

    2006-07-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less

  5. Industrial Control System Process-Oriented Intrusion Detection (iPoid) Algorithm

    DTIC Science & Technology

    2016-08-01

    inspection rules using an intrusion-detection system (IDS) sensor, a simulated Programmable Logic Controller (PLC), and a Modbus client operating...operating system PLC Programmable Logic Controller SCADA supervisory control and data acquisition SIGHUP signal hangup SPAN Switched Port Analyzer

  6. Electric Motors Maintenance Planning From Its Operating Variables

    NASA Astrophysics Data System (ADS)

    Rodrigues, Francisco; Fonseca, Inácio; Farinha, José Torres; Ferreira, Luís; Galar, Diego

    2017-09-01

    The maintenance planning corresponds to an approach that seeks to maximize the availability of equipment and, consequently, increase the levels of competitiveness of companies by increasing production times. This paper presents a maintenance planning based on operating variables (number of hours worked, duty cycles, number of revolutions) to maximizing the availability of operation of electrical motors. The reading of the operating variables and its sampling is done based on predetermined sampling cycles and subsequently is made the data analysis through time series algorithms aiming to launch work orders before reaching the variables limit values. This approach is supported by tools and technologies such as logical applications that enable a graphical user interface for access to relevant information about their Physical Asset HMI (Human Machine Interface), including the control and supervision by acquisition through SCADA (Supervisory Control And data acquisition) data, also including the communication protocols among different logical applications.

  7. ADMS State of the Industry and Gap Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agalgaonkar, Yashodhan P.; Marinovici, Maria C.; Vadari, Subramanian V.

    2016-03-31

    An Advanced distribution management system (ADMS) is a platform for optimized distribution system operational management. This platform comprises of distribution management system (DMS) applications, supervisory control and data acquisition (SCADA), outage management system (OMS), and distributed energy resource management system (DERMS). One of the primary objectives of this work is to study and analyze several ADMS component and auxiliary systems. All the important component and auxiliary systems, SCADA, GISs, DMSs, AMRs/AMIs, OMSs, and DERMS, are discussed in this report. Their current generation technologies are analyzed, and their integration (or evolution) with an ADMS technology is discussed. An ADMS technology statemore » of the art and gap analysis is also presented. There are two technical gaps observed. The integration challenge between the component operational systems is the single largest challenge for ADMS design and deployment. Another significant challenge noted is concerning essential ADMS applications, for instance, fault location, isolation, and service restoration (FLISR), volt-var optimization (VVO), etc. There are a relatively small number of ADMS application developers as ADMS software platform is not open source. There is another critical gap and while not being technical in nature (when compared the two above) is still important to consider. The data models currently residing in utility GIS systems are either incomplete or inaccurate or both. This data is essential for planning and operations because it is typically one of the primary sources from which power system model are created. To achieve the full potential of ADMS, the ability to execute acute Power Flow solution is an important pre-requisite. These critical gaps are hindering wider Utility adoption of an ADMS technology. The development of an open architecture platform can eliminate many of these barriers and also aid seamless integration of distribution Utility legacy systems with an ADMS.« less

  8. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  9. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  10. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  11. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  12. 49 CFR 195.450 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... remote control valve as follows: (1) Check valve means a valve that permits fluid to flow freely in one direction and contains a mechanism to automatically prevent flow in the other direction. (2) Remote control.... The RCV is usually operated by the supervisory control and data acquisition (SCADA) system. The...

  13. Pre-commercial Demonstration of Direct Non-iterative State Estimator for Operational Use of Synchrophasor Management Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lelic, Muhidin; Avramovic, Bozidar; Jiang, Tony

    The objective of this project was to demonstrate functionality and performance of a Direct Non-iterative State Estimator (DNSE) integrated with NYPA’s Energy Management System (EMS) and with enhanced Real Time Dynamics Monitoring System (RTDMS) synchrophasor platform from Electric Power Group (EPG). DNSE is designed to overcome a major obstacle to operational use of Synchro-Phasor Management Systems (SPMS) by providing to synchrophasor management systems (SPMS) applications a consistent and a complete synchrophasor data foundation in the same way that a traditional EMS State Estimator (SE) provides to EMS applications. Specifically, DNSE is designed to use synchrophasor measurements collected by a centralmore » PDC, Supervisory Control and Data Acquisition (SCADA) measurements, and Energy Management System (EMS) network model, to obtain the complete state of the utility’s operating model at rates that are close to the synchrophasor data rates. In this way, the system is comprehensive in that it does not only cover the part of the network that is “visible” via synchrophasors, but also the part that is only “visible” through the SCADA measurements. Visualization needs associated with the use of DNSE results are fulfilled through suitably enhanced Real Time Dynamics Monitoring System (RTDMS), with the enhancements implemented by EPG. This project had the following goals in mind: To advance the deployment of commercial grade DNSE software application that relies on synchrophasor and SCADA data ; Apply DNSE at other utilities, to address a generic and fundamental need for “clean” operational data for synchrophasor applications; Provide means for “live” estimated data access by control system operators; Enhance potential for situational awareness through full system operational model coverage; Sub-second execution rate of the Direct Non-iterative State Estimator, eventually at a near-phasor data rate execution speed, i.e. < 0.1 sec. Anticipated benefits from this projects are: Enhanced reliability and improvements in the economic efficiency of bulk power system planning and operations; Providing “clean” data to other synchrophasor applications; Enhancement of situational awareness by providing the full operational model updated at near synchrophasor rate; A production-grade software tool that incorporate synchrophasor and SCADA data; Provides a basis for development of next generation monitoring and control applications, based on both SCADA and PMU data. Quanta Technology (QT) team worked in collaboration with Electric Power Group (EPG) whose team has enhanced its commercial Real Time Dynamics Monitoring System (RTDMS) to accommodate the requirements posed by DNSE application. EPG also provided its ePDC and Model-less Data Conditioning (PDVC) software for integration with DNSE+. QT developed the system requirements for DNSE; developed system architecture and defined interfaces between internal DNSE components. The core DNSE algorithm with all surrounding interfaces was named DNSE+. Since the DNSE development was done in a simulated system environment, QT used its PMU simulator that was enhanced during this project for development and factory acceptance testing (FAT). SCADA data in this stage was simulated by commercial PSS/e software. The output of DNSE are estimates of System states in C37.118-2 format, sent to RTDMS for further processing and display. As the number of these states is large, it was necessary to expand the C37.111-2 standard to accommodate large data sets. This enhancement was implemented in RTDMS. The demonstration of pre-production DNSE technology was done at NYPA using streaming field data from NYPA PMUs and from its RTUs through their SCADA system. NYPA provided ICCP interface as well as Common Information Model (CIM). The relevance of the DNSE+ application is that it provides state estimation of the power system based on hybrid set of data, consisting of both available PMU data and SCADA measurements. As this is a direct, non-iterative method of calculation of the system states, if does not suffer from convergence issues which is potential problem for conventional state estimators. Also, it can take any available PMU measurements, so it does not need to have a high percentage of PMU coverage needed in the case of Linear State Estimator. As the DNSE calculates synchrophasors of the system states (both phase and absolute value) as sub-second rate, this application can provide a basis for development of next generation of applications based both on SCADA and PMU data.« less

  14. Application of Canal Automation at the Central Arizona Irrigation and Drainage District

    USDA-ARS?s Scientific Manuscript database

    The Central Arizona Irrigation and Drainage District (CAIDD) began delivering water to users in 1987. Although designed for automatic control, the system was run manually until a homemade SCADA (Supervisory Control and Data Acquisition) system was developed by a district employee. In 2002, problem...

  15. 7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...

  16. 7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...

  17. 7 CFR 1724.54 - Requirements for RUS approval of plans and specifications.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... specifications for transmission construction projects which are not based on RUS approved line design data or do...) Communications and control facilities. (1) This paragraph (g) covers microwave and powerline carrier communications systems, load control, and supervisory control and data acquisition (SCADA) systems. (2) The...

  18. Applying Water-Level Difference Control to Central Arizona Project

    USDA-ARS?s Scientific Manuscript database

    The Central Arizona Project (CAP) has been supplying Colorado River water to Central Arizona for roughly 25 years. The CAP canal is operated remotely with a Supervisory Control and Data Acquisition (SCADA) System. Gate position changes are made either manually or through the use of automatic control...

  19. Parris Island Wastewater Treatment Plant SCADA Upgrades Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meador, Richard J.; Hatley, Darrel D.

    2004-03-18

    Marine Corp Recruit Depot (MCRD), Parris Island, SC, home of the Easter Recruiting Region Marine Corp Boot Camp, found itself in a situation common to Department of Defense (DOD) facilities. It had to deal with several different types of installed energy-related control systems that could not talk to each other. This situation was being exacerbated by the installation of a new and/or unique type of control system for every new building being constructed or older facility that was being upgraded. The Wastewater Treatment Facility (WWTF) and lift station controls were badly in need of a thorough inspection and a newmore » Supervisory Control and Data Acquisition (SCADA) system upgrade to meet environmental, safety, manpower, and maintenance concerns. A project was recently completed to implement such a wastewater treatment SCADA upgrade, which is compatible with other upgrades to the energy monitoring and control systems for Parris Island buildings and the Pacific Northwest National Laboratory (PNNL) Decision Support for Operations and Maintenance (DSOM) system installed at the Central Energy Plant (CEP). This project included design, specification, procurement, installation, and testing an upgraded SCADA alarm, process monitoring, and display system; and training WWTF operators in its operation. The ultimate goal of this and the other PNNL projects at Parris Island is to allow monitoring and control of energy and environmental components from a central location.« less

  20. Anomaly-based intrusion detection for SCADA systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less

  1. Scada Malware, a Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such complex critical systems. Of particular interest are the set of vulnerabilities related to the class of communication protocols normally known as “SCADA” protocols, under which fall all the communication protocols used to remotely control the RTU devices of an industrial system. In this paper we present a proof of concept of the potential effects of a set of computer malware specifically designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.

  2. Compact earth stations, hubs for energy industry expanding

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shimabukuro, T.

    1992-02-01

    That paper reports that advances in gallium arsenide (GaAs) technology, monolithic microwave integrated circuits (MMIC) and large scale integrated (VLSF) circuits, have contributed to the mass production of very reliable small aperture terminals (VSATs). Less publicized, but equally important to multinational energy organizations, are recent developments in compact earth station design and solid-state hubs for VSAT networks made possible by the new technology. Many applications are suited for the energy industry that involve compact earth station terminals and hubs. The first group of applications describes the use of GTE's ACES earth station for the Zaire Gulf Oil Co. in Zairemore » and for AMOCO in Trinidad. The second group of applications describes the compact hub for VSAT networks, which could potentially have a number of data communication uses in the energy industry, such as, IBM/SNA, X.25, or supervisory control an data acquisition (SCADA) applications.« less

  3. Creating a Network Model for the Integration of a Dynamic and Static Supervisory Control and Data Acquisition (SCADA) Test Environment

    DTIC Science & Technology

    2011-03-01

    they can continue to leverage these capabilities (building Smart Grid infrastructure and providing Internet connectivity to every home ) while ensuring...21  Figure 9. Smart Grid Interoperability .............................................................................. 22  Figure 10. Smart ...Grid Integration .................................................................................... 24  Figure 11. National Smart Grid Initiatives

  4. Collegiate Cyber Defense Competition Effort

    DTIC Science & Technology

    2018-03-01

    Energy – an electrical utility company. • 2016 : ODIN Security – a small aerospace and defense contracting firm Approved for Public Release...to secure supervisory control and data acquisition (SCADA) networks. Approved for Public Release; Distribution Unlimited 7 During the 2016 NCCDC...COLLEGIATE CYBER DEFENSE COMPETITION EFFORT UNIVERSITY OF TEXAS AT SAN ANTONIO MARCH 2018 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  5. A Proposal for a Taxonomy for Vulnerabilities in Supervisory Control and Data Acquisition (SCADA) Systems

    DTIC Science & Technology

    2014-09-01

    executable that is setuid root.4 fingerd The Morris worm exploited a buffer overflow in the fingerd program to gain unauthorized access to computer...in other taxonomies. There are still holes ; in fact, none of the vulnerabilities that Bishop discussed have a clear place in this taxonomy until a

  6. LIDAR wind speed measurements at a Taiwan onshore wind park

    NASA Astrophysics Data System (ADS)

    Wu, Yu-Ting; Lin, Ta-Hui; Hsuan, Chung-Yao; Li, Yu-Cheng; Yang, Ya-Fei; Tai, Tzy-Hwan; Huang, Chien-Cheng

    2016-04-01

    Measurements of wind speed and wind direction were carried out using a Leosphere Windcube LIDAR system at a Taiwan onshore wind park. The Lidar shot a total of five laser beams to the atmosphere to collect the light-of-sight (LOS) velocity. Four beams were sent successively in four cardinal directions along a 28° scanning cone angle, followed by a fifth, vertical beam. An unchangeable sampling rate of approximately 1.2 Hz was set in the LIDAR system to collect the LOS velocity. The supervisory control and data acquisition (SCADA) data from two GE 1.5 MW wind turbines near the LIDAR deployment site were acquired for the whole measuring period from February 4 to February 16 of 2015. The SCADA data include the blade angular velocity, the wind velocity measured at hub height from an anemometer mounted on the nacelle, the wind turbine yaw angle, and power production; each parameter was recorded as averages over 1-min periods. The data analysis involving the LIDAR measurements and the SCADA data were performed to obtain the turbulent flow statistics. The results show that the turbine power production has significant dependence to the wind speed, wind direction, turbulence intensity and wind shear.

  7. Design and development of an IoT-based web application for an intelligent remote SCADA system

    NASA Astrophysics Data System (ADS)

    Kao, Kuang-Chi; Chieng, Wei-Hua; Jeng, Shyr-Long

    2018-03-01

    This paper presents a design of an intelligent remote electrical power supervisory control and data acquisition (SCADA) system based on the Internet of Things (IoT), with Internet Information Services (IIS) for setting up web servers, an ASP.NET model-view- controller (MVC) for establishing a remote electrical power monitoring and control system by using responsive web design (RWD), and a Microsoft SQL Server as the database. With the web browser connected to the Internet, the sensing data is sent to the client by using the TCP/IP protocol, which supports mobile devices with different screen sizes. The users can provide instructions immediately without being present to check the conditions, which considerably reduces labor and time costs. The developed system incorporates a remote measuring function by using a wireless sensor network and utilizes a visual interface to make the human-machine interface (HMI) more instinctive. Moreover, it contains an analog input/output and a basic digital input/output that can be applied to a motor driver and an inverter for integration with a remote SCADA system based on IoT, and thus achieve efficient power management.

  8. Earthquake Risk Reduction to Istanbul Natural Gas Distribution Network

    NASA Astrophysics Data System (ADS)

    Zulfikar, Can; Kariptas, Cagatay; Biyikoglu, Hikmet; Ozarpa, Cevat

    2017-04-01

    Earthquake Risk Reduction to Istanbul Natural Gas Distribution Network Istanbul Natural Gas Distribution Corporation (IGDAS) is one of the end users of the Istanbul Earthquake Early Warning (EEW) signal. IGDAS, the primary natural gas provider in Istanbul, operates an extensive system 9,867km of gas lines with 750 district regulators and 474,000 service boxes. The natural gas comes to Istanbul city borders with 70bar in 30inch diameter steel pipeline. The gas pressure is reduced to 20bar in RMS stations and distributed to district regulators inside the city. 110 of 750 district regulators are instrumented with strong motion accelerometers in order to cut gas flow during an earthquake event in the case of ground motion parameters exceeds the certain threshold levels. Also, state of-the-art protection systems automatically cut natural gas flow when breaks in the gas pipelines are detected. IGDAS uses a sophisticated SCADA (supervisory control and data acquisition) system to monitor the state-of-health of its pipeline network. This system provides real-time information about quantities related to pipeline monitoring, including input-output pressure, drawing information, positions of station and RTU (remote terminal unit) gates, slum shut mechanism status at 750 district regulator sites. IGDAS Real-time Earthquake Risk Reduction algorithm follows 4 stages as below: 1) Real-time ground motion data transmitted from 110 IGDAS and 110 KOERI (Kandilli Observatory and Earthquake Research Institute) acceleration stations to the IGDAS Scada Center and KOERI data center. 2) During an earthquake event EEW information is sent from IGDAS Scada Center to the IGDAS stations. 3) Automatic Shut-Off is applied at IGDAS district regulators, and calculated parameters are sent from stations to the IGDAS Scada Center and KOERI. 4) Integrated building and gas pipeline damage maps are prepared immediately after the earthquake event. The today's technology allows to rapidly estimate the expected level of shaking when an earthquake starts to occur. However, in Istanbul case for a potential Marmara Sea Earthquake, the time is very limited even to estimate the level of shaking. The robust threshold based EEW system is only algorithm for such a near source event to activate automatic shut-off mechanism in the critical infrastructures before the damaging waves arrive. This safety measure even with a few seconds of early warning time will help to mitigate potential damages and secondary hazards.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in amore » critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.« less

  10. Terra Defender Cyber-Physical Wargame

    DTIC Science & Technology

    2017-04-01

    Army position unless so designated by other authorized documents. Citation of manufacturer’s or trade names does not constitute an official...person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control ...helped to achieve a better understanding of how Army supervisory control and data acquisition (SCADA) system and device security can be modeled and

  11. Cyber: A Flexible Deterrent Option

    DTIC Science & Technology

    2013-02-14

    to come on when they throw a switch and other electrical appliances throughout the house to work without any commercial power interruption. For...power plants this means maintaining the electrical grid and the supervisory control and data acquisition (SCADA) systems at a reliable rate of “99.99999...on the grid.”36 The researchers “simply instructed it to make rapid changes in the electricity cycles that powered the equipment: fast, slow, fast

  12. Online location of a break in water distribution systems

    NASA Astrophysics Data System (ADS)

    Liang, Jianwen; Xiao, Di; Zhao, Xinhua; Zhang, Hongwei

    2003-08-01

    Breaks often occur to urban water distribution systems under severely cold weather, or due to corrosion of pipes, deformation of ground, etc., and the breaks cannot easily be located, especially immediately after the events. This paper develops a methodology to locate a break in a water distribution system by monitoring water pressure online at some nodes in the water distribution system. For the purpose of online monitoring, supervisory control and data acquisition (SCADA) technology can well be used. A neural network-based inverse analysis method is constructed for locating the break based on the variation of water pressure. The neural network is trained by using analytically simulated data from the water distribution system, and validated by using a set of data that have never been used in the training. It is found that the methodology provides a quick, effective, and practical way in which a break in a water distribution system can be located.

  13. Computer assisted operations in Petroleum Development Oman (PDO)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Al-Hinai, S.H.; Mutimer, K.

    1995-10-01

    Petroleum Development Oman (PDO) currently produces some 750,000 bopd and 900,000 bwpd from some 74 fields in a large geographical area and diverse operating conditions. A key corporate objective is to reduce operating costs by exploiting productivity gains from proven technology. Automation is seen as a means of managing the rapid growth of well population and production facilities. the overall objective is to improve field management through continuous monitoring of wells and facilities and dissemination of data throughout the whole organization. A major upgrade of PDO`s field Supervisory Control and Data Acquisition (SCADA) system is complete providing a platform tomore » exploit new initiatives particularly for production optimization of artificial lift systems and automatic well testing using multi selector valves, coriolis flow meter measurements and multi component (oil, gas, water) flowmeter. The paper describes PDO`s experience including benefits and challenges which have to be managed when developing Computer Assisted Operations (CAO).« less

  14. Identifying Supervisory Control and Data Acquisition (SCADA) Systems on a Network via Remote Reconnaissance

    DTIC Science & Technology

    2006-09-01

    and other forms of Internet research were used to confirm the relevance of the OUI to control system reconnaissance. I assigned a subjective level...equipment 4 = Confirmed with Internet research 5 = Suspected with Internet research OUI Organization Confidence Notes 00:00:0A Omron Tateisi...IP Vendor List 2 = Cross Referenced with IANA port list 3 = Confirmed with lab equipment 4 = Confirmed with Internet research 5 = Suspected with

  15. America’s Achilles Heel: Defense Against High-altitude Electromagnetic Pulse-policy vs. Practice

    DTIC Science & Technology

    2014-12-12

    Directives SCADA Supervisory Control and Data Acquisition Systems SHIELD Act Secure High-voltage Infrastructure for Electricity from Lethal Damage Act...take place, it is important to understand the effects of the components of EMP from a high-altitude nuclear detonation. The requirements for shielding ...Mass Ejection (CME). A massive, bubble-shaped burst of plasma expanding outward from the Sun’s corona, in which large amounts of superheated

  16. Culture Representation in Human Reliability Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David Gertman; Julie Marble; Steven Novack

    Understanding human-system response is critical to being able to plan and predict mission success in the modern battlespace. Commonly, human reliability analysis has been used to predict failures of human performance in complex, critical systems. However, most human reliability methods fail to take culture into account. This paper takes an easily understood state of the art human reliability analysis method and extends that method to account for the influence of culture, including acceptance of new technology, upon performance. The cultural parameters used to modify the human reliability analysis were determined from two standard industry approaches to cultural assessment: Hofstede’s (1991)more » cultural factors and Davis’ (1989) technology acceptance model (TAM). The result is called the Culture Adjustment Method (CAM). An example is presented that (1) reviews human reliability assessment with and without cultural attributes for a Supervisory Control and Data Acquisition (SCADA) system attack, (2) demonstrates how country specific information can be used to increase the realism of HRA modeling, and (3) discusses the differences in human error probability estimates arising from cultural differences.« less

  17. Synchronization software for automation in anesthesia.

    PubMed

    Bressan, Nadja; Castro, Ana; Brás, Susana; Oliveira, Hélder P; Ribeiro, Lénio; Ferreira, David A; Antunes, Luís; Amorim, Pedro; Nunes, Catarina S

    2007-01-01

    This work presents the development of a software for data acquisition and control (ASYS) on a clinical setup. Similar to the industrial Supervisory Control And Data Acquisition (SCADA) the software assembles a Target Controlled Infusion (TCI) monitoring and supervisory control data in real time from devices in a surgical room. The software is not a full controller since the TCI systems comprehend permanent interaction from the anesthesiologist. Based on pharmacokinetic models, the effect-site and plasma concentrations can be related with the drug dose infused and vice versa. The software determines the infusion rates of the drug which are given as commands to the infusion pumps. This software provides the anesthesiologist with a trustworthy tool for managing a safe and balanced anesthesia. Since it also incorporates the acquisition and display of patients brain signals.

  18. An analysis of offshore wind farm SCADA measurements to identify key parameters influencing the magnitude of wake effects

    NASA Astrophysics Data System (ADS)

    Mittelmeier, N.; Blodau, T.; Steinfeld, G.; Rott, A.; Kühn, M.

    2016-09-01

    Atmospheric conditions have a clear influence on wake effects. Stability classification is usually based on wind speed, turbulence intensity, shear and temperature gradients measured partly at met masts, buoys or LiDARs. The objective of this paper is to find a classification for stability based on wind turbine Supervisory Control and Data Acquisition (SCADA) measurements in order to fit engineering wake models better to the current ambient conditions. Two offshore wind farms with met masts have been used to establish a correlation between met mast stability classification and new aggregated statistical signals based on multiple measurement devices. The significance of these new signals on power production is demonstrated for two wind farms with met masts and validated against data from one further wind farm without a met mast. We found a good correlation between the standard deviation of active power divided by the average power of wind turbines in free flow with the ambient turbulence intensity when the wind turbines were operating in partial load.

  19. Managing RFID sensors networks with a general purpose RFID middleware.

    PubMed

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster).

  20. An Architectural Framework for Describing Supervisory Control and Data Acquisition (SCADA) Systems

    DTIC Science & Technology

    2004-09-01

    having one of two possible values, described as 0 or 1. Boundary A logical segregation of related components in a system. The segregation may be based ...Depending on the sophistication of the microcontroller in the RTU, it can be configured to act as a relay station for other RTUs which cannot...communicate directly with a master station, or the microcontroller can communicate on a peer-to-peer basis with other RTUs. RTUs are generally remotely

  1. Towards a Standard for Highly Secure SCADA Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carlson, R.

    1998-09-25

    The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied tomore » automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.« less

  2. Analysis of data throughput in communication between PLCs and HMI/SCADA systems

    NASA Astrophysics Data System (ADS)

    Mikolajek, Martin; Koziorek, Jiri

    2016-09-01

    This paper is focused on Analysis of data throughout in communication between PLCs and HMI/SCADA systems. The first part of paper discusses basic problematic communication between PLC and HMI systems. Next part is about specific types of communications PLC - HMI requests. For those cases paper is talking about response and data throughput1-3 . Subsequent section of this article contains practical parts with various data exchanges between PLC Siemens and HMI. The possibilities of communication that are described in this article are focused on using OPC server for visualization software, custom HMI system and own application created by using .NET with Technology. The last part of this article contains some communication solutions.

  3. DSOM - Decision Support for Operations and Maintenance - Application to a USMC Base Centralized Energy System.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meador, Richard J.; Hatley, Darrel D.

    2004-06-01

    PNNL DSOM technology coordinates efficient steam plant operation with EMCS and SCADA systems, providing generation support and automated load shedding to meet peak demand limits saving over $1M in two years.

  4. Remote Supervision and Control of Air Conditioning Systems in Different Modes

    NASA Astrophysics Data System (ADS)

    Rafeeq, Mohammed; Afzal, Asif; Rajendra, Sree

    2018-01-01

    In the era of automation, most of the application of engineering and science are interrelated with system for optimal operation. To get the efficient result of an operation and desired response, interconnected systems should be controlled by directing, regulating and commanding. Here, air conditioning (AC) system is considered for experimentation, to supervise and control its functioning in both, automated and manual mode. This paper reports the work intended to design and develop an automated and manual AC system working in remote and local mode, to increase the level of comfort, easy operation, reducing human intervention and faults occurring in the system. The Programmable Logical Controller (PLC) and Supervisory Control and Data Acquisition (SCADA) system were used for remote supervision and monitoring of AC systems using series ninety protocol and remote terminal unit modbus protocol as communication module to operate in remote mode. PLC was used as remote terminal for continuous supervision and control of AC system. SCADA software was used as a tool for designing user friendly graphical user interface. The proposed SCADA AC system successfully monitors and controls in accordance within the parameter limits like temperature, pressure, humidity and voltage. With all the features, this designed system is capable of efficient handling of the resources like the compressor, humidifier etc., with all the levels of safety and durability. This system also maintains the temperature and controls the humidity of the remote location and also looks after the health of the compressor.

  5. Behavioral Profiling of Scada Network Traffic Using Machine Learning Algorithms

    DTIC Science & Technology

    2014-03-27

    BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ALGORITHMS THESIS Jessica R. Werling, Captain, USAF AFIT-ENG-14-M-81 DEPARTMENT...subject to copyright protection in the United States. AFIT-ENG-14-M-81 BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ...AFIT-ENG-14-M-81 BEHAVIORAL PROFILING OF SCADA NETWORK TRAFFIC USING MACHINE LEARNING ALGORITHMS Jessica R. Werling, B.S.C.S. Captain, USAF Approved

  6. PV-Diesel Hybrid SCADA Experiment Network Design

    NASA Technical Reports Server (NTRS)

    Kalu, Alex; Durand, S.; Emrich, Carol; Ventre, G.; Wilson, W.; Acosta, R.

    1999-01-01

    The essential features of an experimental network for renewable power system satellite based supervisory, control and data acquisition (SCADA) are communication links, controllers, diagnostic equipment and a hybrid power system. Required components for implementing the network consist of two satellite ground stations, to satellite modems, two 486 PCs, two telephone receivers, two telephone modems, two analog telephone lines, one digital telephone line, a hybrid-power system equipped with controller and a satellite spacecraft. In the technology verification experiment (TVE) conducted by Savannah State University and Florida Solar Energy Center, the renewable energy hybrid system is the Apex-1000 Mini-Hybrid which is equipped with NGC3188 for user interface and remote control and the NGC2010 for monitoring and basic control tasks. This power system is connected to a satellite modem via a smart interface, RS232. Commands are sent to the power system control unit through a control PC designed as PC1. PC1 is thus connected to a satellite model through RS232. A second PC, designated PC2, the diagnostic PC is connected to both satellite modems via separate analog telephone lines for checking modems'health. PC2 is also connected to PC1 via a telephone line. Due to the unavailability of a second ground station for the ACTS, one ground station is used to serve both the sending and receiving functions in this experiment. Signal is sent from the control PC to the Hybrid system at a frequency f(sub 1), different from f(sub 2), the signal from the hybrid system to the control PC. f(sub l) and f(sub 2) are sufficiently separated to avoid interference.

  7. Online monitoring of seismic damage in water distribution systems

    NASA Astrophysics Data System (ADS)

    Liang, Jianwen; Xiao, Di; Zhao, Xinhua; Zhang, Hongwei

    2004-07-01

    It is shown that water distribution systems can be damaged by earthquakes, and the seismic damages cannot easily be located, especially immediately after the events. Earthquake experiences show that accurate and quick location of seismic damage is critical to emergency response of water distribution systems. This paper develops a methodology to locate seismic damage -- multiple breaks in a water distribution system by monitoring water pressure online at limited positions in the water distribution system. For the purpose of online monitoring, supervisory control and data acquisition (SCADA) technology can well be used. A neural network-based inverse analysis method is constructed for locating the seismic damage based on the variation of water pressure. The neural network is trained by using analytically simulated data from the water distribution system, and validated by using a set of data that have never been used in the training. It is found that the methodology provides an effective and practical way in which seismic damage in a water distribution system can be accurately and quickly located.

  8. Water Wells Monitoring Using SCADA System for Water Supply Network, Case Study: Water Treatment Plant Urseni, Timis County, Romania

    NASA Astrophysics Data System (ADS)

    Adrian-Lucian, Cococeanu; Ioana-Alina, Cretan; Ivona, Cojocinescu Mihaela; Teodor Eugen, Man; Narcis, Pelea George

    2017-10-01

    The water supply system in Timisoara Municipality is insured with about 25-30 % of the water demand from wells. The underground water headed to the water treatment plant in order to ensure equal distribution and pressure to consumers. The treatment plants used are Urseni and Ronaţ, near Timisoara, in Timis County. In Timisoara groundwater represents an alternative source for water supply and complementary to the surface water source. The present paper presents a case study with proposal and solutions for rehabilitation /equipment /modernization/ automation of water drilling in order to ensure that the entire system can be monitored and controlled remotely through SCADA (Supervisory control and data acquisition) system. The data collected from the field are designed for online efficiency monitoring regarding the energy consumption and water flow intake, performance indicators such as specific energy consumption KW/m3 and also in order to create a hydraulically system of the operating area to track the behavior of aquifers in time regarding the quality and quantity aspects.

  9. A storage scheme for the real-time database supporting the on-line commitment

    NASA Astrophysics Data System (ADS)

    Dai, Hong-bin; Jing, Yu-jian; Wang, Hui

    2013-07-01

    The modern SCADA (Supervisory Control and Data acquisition) systems have been applied to various aspects of everyday life. As the time goes on, the requirements of the applications of the systems vary. Thus the data structure of the real-time database, which is the core of a SCADA system, often needs modification. As a result, the commitment consisting of a sequence of configuration operations modifying the data structure of the real-time database is performed from time to time. Though it is simple to perform the off-line commitment by first stopping and then restarting the system, during which all the data in the real-time database are reconstructed. It is much more preferred or in some cases even necessary to perform the on-line commitment, during which the real-time database can still provide real-time service and the system continues working normally. In this paper, a storage scheme of the data in the real-time database is proposed. It helps the real-time database support its on-line commitment, during which real-time service is still available.

  10. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    PubMed Central

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  11. Microcontroller-Based Experimental Setup and Experiments for SCADA Education

    ERIC Educational Resources Information Center

    Sahin, S.; Olmez, M.; Isler, Y.

    2010-01-01

    In the field of automation technology, research and development for industrial applications has increased rapidly in recent years. Therefore, industrial automation and control education is a very important element of the industrialization process in developing countries, such as Turkey, which needs to keep abreast for the latest developments in…

  12. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    DTIC Science & Technology

    2013-06-01

    standard for cryptographic protection of SCADA communications. The United Kingdom’s National Infrastructure Security Co-ordination Centre (NISCC...has released a good practice guide on firewall deployment for SCADA systems and process control networks [17]. Meanwhile, National Institute for ...report. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED 18 The SCADA gateway collects the data gathered by sensors, translates them from

  13. Internet SCADA Utilizing API's as Data Source

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Haeng-Kon; Kim, Tai-Hoon

    An Application programming interface or API is an interface implemented by a software program that enables it to interact with other software. Many companies provide free API services which can be utilized in Control Systems. SCADA is an example of a control system and it is a system that collects data from various sensors at a factory, plant or in other remote locations and then sends this data to a central computer which then manages and controls the data. In this paper, we designed a scheme for Weather Condition in Internet SCADA Environment utilizing data from external API services. The scheme was designed to double check the weather information in SCADA.

  14. Refurbishment and Automation of the Thermal/Vacuum Facilities at the Goddard Space Flight Center

    NASA Technical Reports Server (NTRS)

    Donohue, John T.; Johnson, Chris; Ogden, Rick; Sushon, Janet

    1998-01-01

    The thermal/vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the 11 facilities, currently 10 of the systems are scheduled for refurbishment and/or replacement as part of a 5-year implementation. Expected return on investment includes the reduction in test schedules, improvements in the safety of facility operations, reduction in the complexity of a test and the reduction in personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering and for the automation of thermal/vacuum facilities and thermal/vacuum tests. Automation of the thermal/vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs) and the use of Supervisory Control and Data Acquisition (SCADA) systems. These components allow the computer control and automation of mechanical components such as valves and pumps. In some cases, the chamber and chamber shroud require complete replacement while others require only mechanical component retrofit or replacement. The project of refurbishment and automation began in 1996 and has resulted in the computer control of one Facility (Facility #225) and the integration of electronically controlled devices and PLCs within several other facilities. Facility 225 has been successfully controlled by PLC and SCADA for over one year. Insignificant anomalies have occurred and were resolved with minimal impact to testing and operations. The amount of work remaining to be performed will occur over the next four to five years. Fiscal year 1998 includes the complete refurbishment of one facility, computer control of the thermal systems in two facilities, implementation of SCADA and PLC systems to support multiple facilities and the implementation of a Database server to allow efficient test management and data analysis.

  15. Recent Experience with a Hybrid SCADA/PMU On-Line State Estimator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rizy, D Tom

    2009-01-01

    PMU devices are expected to grow in number from a few to several hundreds in the next five years. Some relays are already global positioning system-capable and could provide the same type of data as any PMU. This introduces a new paradigm of very fast accurate synchrophasor measurements from across the grid in real-time that augment and parallel existing slower SCADA measurements. Control center applications will benefit from this PMU data; for example, use of PMU data in state estimation is expected to improve accuracy and robustness, which in turn will result in more timely and accurate N-1 security analysis,more » resulting in an overall improvement of grid system reliability and security. This paper describes results from a recent implementation of this technology, the benefits and future work.« less

  16. An ethernet/IP security review with intrusion detection applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Laughter, S. A.; Williams, R. D.

    2006-07-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less

  17. A Case Study of Modern PLC and LabVIEW Controls: Power Supply Controls for the ORNL ITER ECH Test Stand

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barker, Alan M; Killough, Stephen M; Bigelow, Tim S

    2011-01-01

    Power Supply Controls are being developed at Oak Ridge National Laboratory (ORNL) to test transmission line components of the Electron Cyclotron Heating (ECH) system, with a focus on gyrotrons and waveguides, in support of the International Thermonuclear Experimental Reactor (ITER). The control is performed by several Programmable Logic Controllers (PLC s) located near the different equipment. A technique of Supervisory Control and Data Acquisition (SCADA) is presented to monitor, control, and log actions of the PLC s on a PC through use of Allen Bradley s Remote I/O communication interface coupled with an Open Process Control/Object Linking and Embedding [OLE]more » for Process Control (OPC) Server/Client architecture. The OPC data is then linked to a National Instruments (NI) LabVIEW system for monitoring and control. Details of the architecture and insight into applicability to other systems are presented in the rest of this paper. Future integration with an EPICS (Experimental Physics Industrial Control System) based mini-CODAC (Control, Data Access and Communication) SCADA system is under consideration, and integration considerations will be briefly introduced.« less

  18. Susceptibility of SCADA systems and the energy sector

    NASA Astrophysics Data System (ADS)

    Goike, Lindsay

    The research in this paper focused on analyzing SCADA systems in the energy sector for susceptibility to cyber attacks, in furtherance of providing suggestions to mitigate current and future cyber attacks. The research will be addressing the questions: how are SCADA systems susceptible to cyber attacks, and what are the suggested ways to mitigate both current and future cyber attacks. The five main categories of security vulnerabilities facing current SCADA systems were found to be: connectivity to the Internet, failure to plan, interdependency of sectors, numerous different types of threats, and outdated software. Some of the recommendations mentioned to mitigate current and future risks were: virtual private networks, risk assessments, increased physical security, updating of software, and firewalls.

  19. Hacker tracking Security system for HMI

    NASA Astrophysics Data System (ADS)

    Chauhan, Rajeev Kumar

    2011-12-01

    Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.

  20. A Fault Recognition System for Gearboxes of Wind Turbines

    NASA Astrophysics Data System (ADS)

    Yang, Zhiling; Huang, Haiyue; Yin, Zidong

    2017-12-01

    Costs of maintenance and loss of power generation caused by the faults of wind turbines gearboxes are the main components of operation costs for a wind farm. Therefore, the technology of condition monitoring and fault recognition for wind turbines gearboxes is becoming a hot topic. A condition monitoring and fault recognition system (CMFRS) is presented for CBM of wind turbines gearboxes in this paper. The vibration signals from acceleration sensors at different locations of gearbox and the data from supervisory control and data acquisition (SCADA) system are collected to CMFRS. Then the feature extraction and optimization algorithm is applied to these operational data. Furthermore, to recognize the fault of gearboxes, the GSO-LSSVR algorithm is proposed, combining the least squares support vector regression machine (LSSVR) with the Glowworm Swarm Optimization (GSO) algorithm. Finally, the results show that the fault recognition system used in this paper has a high rate for identifying three states of wind turbines’ gears; besides, the combination of date features can affect the identifying rate and the selection optimization algorithm presented in this paper can get a pretty good date feature subset for the fault recognition.

  1. Evaluation of Traditional Security Solutions in the SCADA Environment

    DTIC Science & Technology

    2012-03-01

    Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Robert D. Larkin, Captain, USAF AFIT/GCO/ENG/12-06 DEPARTMENT OF THE AIR...views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department...United States. AFIT/GCO/ENG/12-06 Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Presented to the Faculty Department of

  2. Object-Oriented Technology-Based Software Library for Operations of Water Reclamation Centers

    NASA Astrophysics Data System (ADS)

    Otani, Tetsuo; Shimada, Takehiro; Yoshida, Norio; Abe, Wataru

    SCADA systems in water reclamation centers have been constructed based on hardware and software that each manufacturer produced according to their design. Even though this approach used to be effective to realize real-time and reliable execution, it is an obstacle to cost reduction about system construction and maintenance. A promising solution to address the problem is to set specifications that can be used commonly. In terms of software, information model approach has been adopted in SCADA systems in other field, such as telecommunications and power systems. An information model is a piece of software specification that describes a physical or logical object to be monitored. In this paper, we propose information models for operations of water reclamation centers, which have not ever existed. In addition, we show the feasibility of the information model in terms of common use and processing performance.

  3. Using SCADA Data, Field Studies, and Real-Time Modeling to ...

    EPA Pesticide Factsheets

    EPA has been providing technical assistance to the City of Flint and the State of Michigan in response to the drinking water lead contamination incident. Responders quickly recognized the need for a water distribution system hydraulic model to provide insight on flow patterns and water quality as well as to evaluate changes being made to the system operation to enhance corrosion control and improve chlorine residuals. EPA partnered with the City of Flint and the Michigan Department of Environmental Quality to update and calibrate an existing hydraulic model. The City provided SCADA data, GIS data, customer billing data, valve status data, design diagrams, and information on operations. Team members visited all facilities and updated pump and valve types, sizes, settings, elevations, and pump discharge curves. Several technologies were used to support this work including the EPANET-RTX based Polaris real-time modeling software, WaterGEMS, ArcGIS, EPANET, and RTX:LINK. Field studies were conducted to collect pressure and flow data from more than 25 locations throughout the distribution system. An assessment of the model performance compared model predictions for flow, pressure, and tank levels to SCADA and field data, resulting in error measurements for each data stream over the time period analyzed. Now, the calibrated model can be used with a known confidence in its performance to evaluate hydraulic and water quality problems, and the model can be easily

  4. Design of virtual SCADA simulation system for pressurized water reactor

    NASA Astrophysics Data System (ADS)

    Wijaksono, Umar; Abdullah, Ade Gafar; Hakim, Dadang Lukman

    2016-02-01

    The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles of energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor.

  5. Analysis of a SCADA System Anomaly Detection Model Based on Information Entropy

    DTIC Science & Technology

    2014-03-27

    20 Intrusion Detection...alarms ( Rem ). ............................................................................................................. 86 Figure 25. TP% for...literature concerning the focus areas of this research. The focus areas include SCADA vulnerabilities, information theory, and intrusion detection

  6. Design of virtual SCADA simulation system for pressurized water reactor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wijaksono, Umar, E-mail: umar.wijaksono@student.upi.edu; Abdullah, Ade Gafar; Hakim, Dadang Lukman

    The Virtual SCADA system is a software-based Human-Machine Interface that can visualize the process of a plant. This paper described the results of the virtual SCADA system design that aims to recognize the principle of the Nuclear Power Plant type Pressurized Water Reactor. This simulation uses technical data of the Nuclear Power Plant Unit Olkiluoto 3 in Finland. This device was developed using Wonderware Intouch, which is equipped with manual books for each component, animation links, alarm systems, real time and historical trending, and security system. The results showed that in general this device can demonstrate clearly the principles ofmore » energy flow and energy conversion processes in Pressurized Water Reactors. This virtual SCADA simulation system can be used as instructional media to recognize the principle of Pressurized Water Reactor.« less

  7. On the use of high-frequency SCADA data for improved wind turbine performance monitoring

    NASA Astrophysics Data System (ADS)

    Gonzalez, E.; Stephen, B.; Infield, D.; Melero, J. J.

    2017-11-01

    SCADA-based condition monitoring of wind turbines facilitates the move from costly corrective repairs towards more proactive maintenance strategies. In this work, we advocate the use of high-frequency SCADA data and quantile regression to build a cost effective performance monitoring tool. The benefits of the approach are demonstrated through the comparison between state-of-the-art deterministic power curve modelling techniques and the suggested probabilistic model. Detection capabilities are compared for low and high-frequency SCADA data, providing evidence for monitoring at higher resolutions. Operational data from healthy and faulty turbines are used to provide a practical example of usage with the proposed tool, effectively achieving the detection of an incipient gearbox malfunction at a time horizon of more than one month prior to the actual occurrence of the failure.

  8. Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    NASA Astrophysics Data System (ADS)

    McEvoy, Thomas Richard; Wolthusen, Stephen D.

    Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.

  9. Evaluation of power control concepts using the PMAD systems test bed. [Power Management and Distribution

    NASA Technical Reports Server (NTRS)

    Beach, R. F.; Kimnach, G. L.; Jett, T. A.; Trash, L. M.

    1989-01-01

    The Lewis Research Center's Power Management and Distribution (PMAD) System testbed and its use in the evaluation of control concepts applicable to the NASA Space Station Freedom electric power system (EPS) are described. The facility was constructed to allow testing of control hardware and software in an environment functionally similar to the space station electric power system. Control hardware and software have been developed to allow operation of the testbed power system in a manner similar to a supervisory control and data acquisition (SCADA) system employed by utility power systems for control. The system hardware and software are described.

  10. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.

  11. Wind Turbine Failures - Tackling current Problems in Failure Data Analysis

    NASA Astrophysics Data System (ADS)

    Reder, M. D.; Gonzalez, E.; Melero, J. J.

    2016-09-01

    The wind industry has been growing significantly over the past decades, resulting in a remarkable increase in installed wind power capacity. Turbine technologies are rapidly evolving in terms of complexity and size, and there is an urgent need for cost effective operation and maintenance (O&M) strategies. Especially unplanned downtime represents one of the main cost drivers of a modern wind farm. Here, reliability and failure prediction models can enable operators to apply preventive O&M strategies rather than corrective actions. In order to develop these models, the failure rates and downtimes of wind turbine (WT) components have to be understood profoundly. This paper is focused on tackling three of the main issues related to WT failure analyses. These are, the non-uniform data treatment, the scarcity of available failure analyses, and the lack of investigation on alternative data sources. For this, a modernised form of an existing WT taxonomy is introduced. Additionally, an extensive analysis of historical failure and downtime data of more than 4300 turbines is presented. Finally, the possibilities to encounter the lack of available failure data by complementing historical databases with Supervisory Control and Data Acquisition (SCADA) alarms are evaluated.

  12. How Accurate Is A Hydraulic Model? | Science Inventory | US ...

    EPA Pesticide Factsheets

    Symposium paper Network hydraulic models are widely used, but their overall accuracy is often unknown. Models are developed to give utilities better insight into system hydraulic behavior, and increasingly the ability to predict the fate and transport of chemicals. Without an accessible and consistent means of validating a given model against the system it is meant to represent, the value of those supposed benefits should be questioned. Supervisory Control And Data Acquisition (SCADA) databases, though ubiquitous, are underused data sources for this type of task. Integrating a network model with a measurement database would offer professionals the ability to assess the model’s assumptions in an automated fashion by leveraging enormous amounts of data.

  13. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yan, Guanhua; Nicol, David M; Jin, Dong

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relaymore » is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.« less

  14. Modeling of a data exchange process in the Automatic Process Control System on the base of the universal SCADA-system

    NASA Astrophysics Data System (ADS)

    Topolskiy, D.; Topolskiy, N.; Solomin, E.; Topolskaya, I.

    2016-04-01

    In the present paper the authors discuss some ways of solving energy saving problems in mechanical engineering. In authors' opinion one of the ways of solving this problem is integrated modernization of power engineering objects of mechanical engineering companies, which should be intended for the energy supply control efficiency increase and electric energy commercial accounting improvement. The author have proposed the usage of digital current and voltage transformers for these purposes. To check the compliance of this equipment with the IEC 61850 International Standard, we have built a mathematic model of the data exchange process between measuring transformers and a universal SCADA-system. The results of modeling show that the discussed equipment corresponds to the mentioned Standard requirements and the usage of the universal SCADA-system for these purposes is preferable and economically reasonable. In modeling the authors have used the following software: MasterScada, Master OPC_DI_61850, OPNET.

  15. Risk assessment for Industrial Control Systems quantifying availability using mean failure cost (MFC)

    DOE PAGES

    Chen, Qian; Abercrombie, Robert K; Sheldon, Frederick T.

    2015-09-23

    Industrial Control Systems (ICS) are commonly used in industries such as oil and natural gas, transportation, electric, water and wastewater, chemical, pharmaceutical, pulp and paper, food and beverage, as well as discrete manufacturing (e.g., automotive, aerospace, and durable goods.) SCADA systems are generally used to control dispersed assets using centralized data acquisition and supervisory control.Originally, ICS implementations were susceptible primarily to local threats because most of their components were located in physically secure areas (i.e., ICS components were not connected to IT networks or systems). The trend toward integrating ICS systems with IT networks (e.g., efficiency and the Internet ofmore » Things) provides significantly less isolation for ICS from the outside world thus creating greater risk due to external threats. Albeit, the availability of ICS/SCADA systems is critical to assuring safety, security and profitability. Such systems form the backbone of our national cyber-physical infrastructure.Herein, we extend the concept of mean failure cost (MFC) to address quantifying availability to harmonize well with ICS security risk assessment. This new measure is based on the classic formulation of Availability combined with Mean Failure Cost (MFC). Finally, the metric offers a computational basis to estimate the availability of a system in terms of the loss that each stakeholder stands to sustain as a result of security violations or breakdowns (e.g., deliberate malicious failures).« less

  16. Providing Situational Awareness for Pipeline Control Operations

    NASA Astrophysics Data System (ADS)

    Butts, Jonathan; Kleinhans, Hugo; Chandia, Rodrigo; Papa, Mauricio; Shenoi, Sujeet

    A SCADA system for a single 3,000-mile-long strand of oil or gas pipeline may employ several thousand field devices to measure process parameters and operate equipment. Because of the vital tasks performed by these sensors and actuators, pipeline operators need accurate and timely information about their status and integrity. This paper describes a realtime scanner that provides situational awareness about SCADA devices and control operations. The scanner, with the assistance of lightweight, distributed sensors, analyzes SCADA network traffic, verifies the operational status and integrity of field devices, and identifies anomalous activity. Experimental results obtained using real pipeline control traffic demonstrate the utility of the scanner in industrial settings.

  17. Automatically Identifying and Predicting Unplanned Wind Turbine Stoppages Using SCADA and Alarms System Data: Case Study and Results

    NASA Astrophysics Data System (ADS)

    Leahy, Kevin; Gallagher, Colm; Bruton, Ken; O'Donovan, Peter; O'Sullivan, Dominic T. J.

    2017-11-01

    Using 10-minute wind turbine SCADA data for fault prediction offers an attractive way of gaining additional prognostic capabilities without needing to invest in extra hardware. To use these data-driven methods effectively, the historical SCADA data must be labelled with the periods when the turbine was in faulty operation as well the sub-system the fault was attributed to. Manually identifying faults using maintenance logs can be effective, but is also highly time consuming and tedious due to the disparate nature of these logs across manufacturers, operators and even individual maintenance events. Turbine alarm systems can help to identify these periods, but the sheer volume of alarms and false positives generated makes analysing them on an individual basis ineffective. In this work, we present a new method for automatically identifying historical stoppages on the turbine using SCADA and alarms data. Each stoppage is associated with either a fault in one of the turbine’s sub-systems, a routine maintenance activity, a grid-related event or a number of other categories. This is then checked against maintenance logs for accuracy and the labelled data fed into a classifier for predicting when these stoppages will occur. Results show that the automated labelling process correctly identifies each type of stoppage, and can be effectively used for SCADA-based prediction of turbine faults.

  18. Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System

    DTIC Science & Technology

    2016-03-31

    for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

  19. A computer network with scada and case tools for on-line process control in greenhouses

    NASA Astrophysics Data System (ADS)

    Gieling, Th. H.; van Meurs, W. Th. M.; Janssen, H. J. J.

    Climate control computers in greenhouses are used to control heating and ventilation, supply water and dilute and dispense nutrients. They integrate models into optimally controlled systems. This paper describes how information technology, as in use in other sectors of industry, is applied to greenhouse control. The introduction of modern software and hardware concepts in horticulture adds power and extra opportunities to climate control in greenhouses.

  20. Rotary Kiln Gasification of Solid Waste for Base Camps

    DTIC Science & Technology

    2017-10-02

    cup after full day run 3.3 Feedstock Handling System Garbage bags containing waste feedstock are placed into feed bin FB-101. Ram feeder RF-102...Environmental Science and Technology using the Factory Talk SCADA software running on a laptop computer. A wireless Ethernet router that is located within the...pyrolysis oil produced required consistent draining from the system during operation and became a liquid waste disposal problem. A 5-hour test run could

  1. A computer network with SCADA and case tools for on-line process control in greenhouses.

    PubMed

    Gieling ThH; van Meurs WTh; Janssen, H J

    1996-01-01

    Climate control computers in greenhouses are used to control heating and ventilation, supply water and dilute and dispense nutrients. They integrate models into optimally controlled systems. This paper describes how information technology, as in use in other sectors of industry, is applied to greenhouse control. The introduction of modern software and hardware concepts in horticulture adds power and extra oppurtunities to climate contol in greenhouses.

  2. How gamma radiation processing systems are benefiting from the latest advances in information technology

    NASA Astrophysics Data System (ADS)

    Gibson, Wayne H.; Levesque, Daniel

    2000-03-01

    This paper discusses how gamma irradiation plants are putting the latest advances in computer and information technology to use for better process control, cost savings, and strategic advantages. Some irradiator operations are gaining significant benefits by integrating computer technology and robotics with real-time information processing, multi-user databases, and communication networks. The paper reports on several irradiation facilities that are making good use of client/server LANs, user-friendly graphics interfaces, supervisory control and data acquisition (SCADA) systems, distributed I/O with real-time sensor devices, trending analysis, real-time product tracking, dynamic product scheduling, and automated dosimetry reading. These plants are lowering costs by fast and reliable reconciliation of dosimetry data, easier validation to GMP requirements, optimizing production flow, and faster release of sterilized products to market. There is a trend in the manufacturing sector towards total automation using "predictive process control". Real-time verification of process parameters "on-the-run" allows control parameters to be adjusted appropriately, before the process strays out of limits. Applying this technology to the gamma radiation process, control will be based on monitoring the key parameters such as time, and making adjustments during the process to optimize quality and throughput. Dosimetry results will be used as a quality control measurement rather than as a final monitor for the release of the product. Results are correlated with the irradiation process data to quickly and confidently reconcile variations. Ultimately, a parametric process control system utilizing responsive control, feedback and verification will not only increase productivity and process efficiency, but can also result in operating within tighter dose control set points.

  3. A Robust State Estimation Framework Considering Measurement Correlations and Imperfect Synchronization

    DOE PAGES

    Zhao, Junbo; Wang, Shaobu; Mili, Lamine; ...

    2018-01-08

    Here, this paper develops a robust power system state estimation framework with the consideration of measurement correlations and imperfect synchronization. In the framework, correlations of SCADA and Phasor Measurements (PMUs) are calculated separately through unscented transformation and a Vector Auto-Regression (VAR) model. In particular, PMU measurements during the waiting period of two SCADA measurement scans are buffered to develop the VAR model with robustly estimated parameters using projection statistics approach. The latter takes into account the temporal and spatial correlations of PMU measurements and provides redundant measurements to suppress bad data and mitigate imperfect synchronization. In case where the SCADAmore » and PMU measurements are not time synchronized, either the forecasted PMU measurements or the prior SCADA measurements from the last estimation run are leveraged to restore system observability. Then, a robust generalized maximum-likelihood (GM)-estimator is extended to integrate measurement error correlations and to handle the outliers in the SCADA and PMU measurements. Simulation results that stem from a comprehensive comparison with other alternatives under various conditions demonstrate the benefits of the proposed framework.« less

  4. A Robust State Estimation Framework Considering Measurement Correlations and Imperfect Synchronization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhao, Junbo; Wang, Shaobu; Mili, Lamine

    Here, this paper develops a robust power system state estimation framework with the consideration of measurement correlations and imperfect synchronization. In the framework, correlations of SCADA and Phasor Measurements (PMUs) are calculated separately through unscented transformation and a Vector Auto-Regression (VAR) model. In particular, PMU measurements during the waiting period of two SCADA measurement scans are buffered to develop the VAR model with robustly estimated parameters using projection statistics approach. The latter takes into account the temporal and spatial correlations of PMU measurements and provides redundant measurements to suppress bad data and mitigate imperfect synchronization. In case where the SCADAmore » and PMU measurements are not time synchronized, either the forecasted PMU measurements or the prior SCADA measurements from the last estimation run are leveraged to restore system observability. Then, a robust generalized maximum-likelihood (GM)-estimator is extended to integrate measurement error correlations and to handle the outliers in the SCADA and PMU measurements. Simulation results that stem from a comprehensive comparison with other alternatives under various conditions demonstrate the benefits of the proposed framework.« less

  5. CFD three dimensional wake analysis in complex terrain

    NASA Astrophysics Data System (ADS)

    Castellani, F.; Astolfi, D.; Terzi, L.

    2017-11-01

    Even if wind energy technology is nowadays fully developed, the use of wind energy in very complex terrain is still challenging. In particular, it is challenging to characterize the combination effects of wind ow over complex terrain and wake interactions between nearby turbines and this has a practical relevance too, for the perspective of mitigating anomalous vibrations and loads as well improving the farm efficiency. In this work, a very complex terrain site has been analyzed through a Reynolds-averaged CFD (Computational Fluid Dynamics) numerical wind field model; in the simulation the inuence of wakes has been included through the Actuator Disk (AD) approach. In particular, the upstream turbine of a cluster of 4 wind turbines having 2.3 MW of rated power is studied. The objective of this study is investigating the full three-dimensional wind field and the impact of three-dimensionality on the evolution of the waked area between nearby turbines. A post-processing method of the output of the CFD simulation is developed and this allows to estimate the wake lateral deviation and the wake width. The reliability of the numerical approach is inspired by and crosschecked through the analysis of the operational SCADA (Supervisory Control and Data Acquisition) data of the cluster of interest.

  6. Descriptive Model of Generic WAMS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hauer, John F.; DeSteese, John G.

    The Department of Energy’s (DOE) Transmission Reliability Program is supporting the research, deployment, and demonstration of various wide area measurement system (WAMS) technologies to enhance the reliability of the Nation’s electrical power grid. Pacific Northwest National Laboratory (PNNL) was tasked by the DOE National SCADA Test Bed Program to conduct a study of WAMS security. This report represents achievement of the milestone to develop a generic WAMS model description that will provide a basis for the security analysis planned in the next phase of this study.

  7. Simulation of a microgrid

    NASA Astrophysics Data System (ADS)

    Dulǎu, Lucian Ioan

    2015-12-01

    This paper describes the simulation of a microgrid system with storage technologies. The microgrid comprises 6 distributed generators (DGs), 3 loads and a 150 kW storage unit. The installed capacity of the generators is 1100 kW, while the total load demand is 900 kW. The simulation is performed by using a SCADA software, considering the power generation costs, the loads demand and the system's power losses. The generators access the system in order of their power generation cost. The simulation is performed for the entire day.

  8. A Feasibility Study on the Application of the ScriptGenE Framework as an Anomaly Detection System in Industrial Control Systems

    DTIC Science & Technology

    2015-09-17

    network intrusion detection systems NIST National Institute of Standards and Technology p-tree protocol tree PI protocol informatics PLC programmable logic...electrical, water, oil , natural gas, manufacturing, and pharmaceutical industries, to name a few. The differences between SCADA and DCS systems are often... Oil Company, also known as Saudi Aramco, suffered huge data loss that resulted in the disruption of daily operations for nearly two weeks [BTR13]. As it

  9. Changing the Lines in the Coloring Book

    DTIC Science & Technology

    2004-05-18

    multitude of SCADA programmers creates a multitude of idiosyncratic programs, making it very difficult to know how to hack into large numbers of them...an observed pattern of hacking that would alert authorities seems not to have been discussed.) However, some SCADAs are not physically connected to the...normal hacking . Simultaneously, it would identify software vulnerabilities in other products and design viruses and worms for attacking them. (The

  10. Controlling front-end electronics boards using commercial solutions

    NASA Astrophysics Data System (ADS)

    Beneyton, R.; Gaspar, C.; Jost, B.; Schmeling, S.

    2002-04-01

    LHCb is a dedicated B-physics experiment under construction at CERN's large hadron collider (LHC) accelerator. This paper will describe the novel approach LHCb is taking toward controlling and monitoring of electronics boards. Instead of using the bus in a crate to exercise control over the boards, we use credit-card sized personal computers (CCPCs) connected via Ethernet to cheap control PCs. The CCPCs will provide a simple parallel, I2C, and JTAG buses toward the electronics board. Each board will be equipped with a CCPC and, hence, will be completely independently controlled. The advantages of this scheme versus the traditional bus-based scheme will be described. Also, the integration of the controls of the electronics boards into a commercial supervisory control and data acquisition (SCADA) system will be shown.

  11. Wind-farm simulation over moderately complex terrain

    NASA Astrophysics Data System (ADS)

    Segalini, Antonio; Castellani, Francesco

    2017-05-01

    A comparison between three independent software to estimate the power production and the flow field in a wind farm is conducted, validating them against SCADA (Supervisory, Control And Data Acquisition) data. The three software were ORFEUS, WindSim and WAsP: ORFEUS and WAsP are linearised solvers, while WindSim is fully nonlinear. A wake model (namely a prescribed velocity deficit associated to the turbines) is used by WAsP, while ORFEUS and WindSim use the actuator-disc method to account for the turbines presence. The comparison indicates that ORFEUS and WAsP perform slightly better than WindSim in the assessment of the polar efficiency. The wakes simulated with ORFEUS appear more persistent than the ones of WindSim, which uses a two-equation closure model for the turbulence effects.

  12. An automated LS(β)- NaI(Tl)(γ) coincidence system as absolute standard for radioactivity measurements.

    PubMed

    Joseph, Leena; Das, A P; Ravindra, Anuradha; Kulkarni, D B; Kulkarni, M S

    2018-07-01

    4πβ-γ coincidence method is a powerful and widely used method to determine the absolute activity concentration of radioactive solutions. A new automated liquid scintillator based coincidence system has been designed, developed, tested and established as absolute standard for radioactivity measurements. The automation is achieved using PLC (programmable logic controller) and SCADA (supervisory control and data acquisition). Radioactive solution of 60 Co was standardized to compare the performance of the automated system with proportional counter based absolute standard maintained in the laboratory. The activity concentrations determined using these two systems were in very good agreement; the new automated system can be used for absolute measurement of activity concentration of radioactive solutions. Copyright © 2018. Published by Elsevier Ltd.

  13. Resilient Control and Intrusion Detection for SCADA Systems

    DTIC Science & Technology

    2014-05-01

    Control. McGraw-Hill, 1996. [89] L. Greenemeier. Robots arrive at fukushima nuclear site with unclear mission. Scientific American, 2011. [90] M. Grimes...security engineering task. SCADA systems are hard real-time systems [251] because the completion of an operation after its deadline is considered useless and...that the attacker, after gaining unauthenticated access, could change the operator display values so that when an alarm actually goes off, the human

  14. Critical Infrastructure: Control Systems and the Terrorist Threat

    DTIC Science & Technology

    2004-01-20

    Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...http://www.pnl.gov/main/sectors/homeland.html]. 68 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ,” Sandia Report SAND2002...and Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to

  15. Critical Infrastructure: Control Systems and the Terrorist Threat

    DTIC Science & Technology

    2003-07-14

    Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL31534 Critical...available online at [http://www.pnl.gov/main/sectors/homeland.html]. 56 Rolf Carlson, “Sandia SCADA Program High-Security SCADA LDRD Final Report ...Industry Division Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to

  16. SCADA data and the quantification of hazardous events for QMRA.

    PubMed

    Nilsson, P; Roser, D; Thorwaldsdotter, R; Petterson, S; Davies, C; Signor, R; Bergstedt, O; Ashbolt, N

    2007-01-01

    The objective of this study was to assess the use of on-line monitoring to support the QMRA at water treatment plants studied in the EU MicroRisk project. SCADA data were obtained from three Catchment-to-Tap Systems (CTS) along with system descriptions, diary records, grab sample data and deviation reports. Particular attention was paid to estimating hazardous event frequency, duration and magnitude. Using Shewart and CUSUM we identified 'change-points' corresponding to events of between 10 min and >1 month duration in timeseries data. Our analysis confirmed it is possible to quantify hazardous event durations from turbidity, chlorine residual and pH records and distinguish them from non-hazardous variability in the timeseries dataset. The durations of most 'events' were short-term (0.5-2.3 h). These data were combined with QMRA to estimate pathogen infection risk arising from such events as chlorination failure. While analysis of SCADA data alone could identify events provisionally, its interpretation was severely constrained in the absence of diary records and other system information. SCADA data analysis should only complement traditional water sampling, rather than replace it. More work on on-line data management, quality control and interpretation is needed before it can be used routinely for event characterization.

  17. Application of PMU-Based Information in the Indian Power System

    NASA Astrophysics Data System (ADS)

    Agarwal, P. K.; Agarwal, V. K.; Rathour, Harish

    2013-05-01

    SCADA/EMS system has been the most commonly used tool for real-time power system operation and control throughout the world. This system has been found to be very useful in steady-state analysis of the power system. The ever-increasing dependence of human society and every country's economy on electrical energy calls for reliable power delivery. In order to meet these expectations, engineers across the globe have been exploring such new technologies that can improve upon the limitations of SCADA and provide dynamic visibility of the power system. A breakthrough has now been achieved in the form of synchrophasor technology. Synchrophasor measurements using phasor measurement units (PMUs) deployed over a wide area, facilitate dynamic state measurement and visualization of a power system, which are useful in monitoring safety and security of the grid. The Power System Operation Corporation (POSOCO) has taken initiative and implemented a pilot project wherein nine phasor measurement units (PMUs) along with one phasor data concentrator (PDC) were commissioned in the Northern Region (NR) of India. The primary objective of this pilot project was to comprehend the synchrophasor technology and its applications in power system operation. The data received and information derived from the pilot project have been found to be very useful and helped in improving the performance of the grid operation in several ways. The pilot project is operational for the last two years; in the meanwhile, many other initiatives have also been taken in other regions by POSOCO. This article details the utilization of the data collected from the pilot projects and the application of the data in the improvement of Indian power grid.

  18. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-01-01

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design. PMID:26950129

  19. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Xiong, Neal Naixue; Jeong, Gisung; Lee, Young-Keun; Choi, Jae-Young; Mahesar, Abdul Wheed; Ahmad, Iftikhar

    2016-03-03

    In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

  20. Mitigation of the consequence of seismically induced damage on a utility water network by means of next generation SCADA

    NASA Astrophysics Data System (ADS)

    Robertson, Jamie; Shinozuka, Masanobu; Wu, Felix

    2011-04-01

    When a lifeline system such as a water delivery network is damaged due to a severe earthquake, it is critical to identify its location and extent of the damage in real time in order to minimize the potentially disastrous consequence such damage could otherwise entail. This paper demonstrates how the degree of such minimization can be estimated qualitatively by using the water delivery system of Irvine Water Ranch District (IRWD) as testbed, when it is subjected to magnitude 6.6 San Joaquin Hills Earthquake. In this demonstration, we consider two cases when the IRWD system is equipped or not equipped with a next generation SCADA which consists of a network of MEMS acceleration sensors densely populated and optimally located. These sensors are capable of identifying the location and extent of the damage as well as transmitting the data to the SCADA center for monitoring and control.

  1. Integrity Verification for SCADA Devices Using Bloom Filters and Deep Packet Inspection

    DTIC Science & Technology

    2014-03-27

    prevent intrusions in smart grids [PK12]. Parthasarathy proposed an anomaly detection based IDS that takes into account system state. In his implementation...Security, 25(7):498–506, 10 2006. [LMV12] O. Linda, M. Manic, and T. Vollmer. Improving cyber-security of smart grid systems via anomaly detection and...6 2012. 114 [PK12] S. Parthasarathy and D. Kundur. Bloom filter based intrusion detection for smart grid SCADA. In Electrical & Computer Engineering

  2. Model-based approach for cyber-physical attack detection in water distribution systems.

    PubMed

    Housh, Mashor; Ohar, Ziv

    2018-08-01

    Modern Water Distribution Systems (WDSs) are often controlled by Supervisory Control and Data Acquisition (SCADA) systems and Programmable Logic Controllers (PLCs) which manage their operation and maintain a reliable water supply. As such, and with the cyber layer becoming a central component of WDS operations, these systems are at a greater risk of being subjected to cyberattacks. This paper offers a model-based methodology based on a detailed hydraulic understanding of WDSs combined with an anomaly detection algorithm for the identification of complex cyberattacks that cannot be fully identified by hydraulically based rules alone. The results show that the proposed algorithm is capable of achieving the best-known performance when tested on the data published in the BATtle of the Attack Detection ALgorithms (BATADAL) competition (http://www.batadal.net). Copyright © 2018. Published by Elsevier Ltd.

  3. Application of the SCADA system in wastewater treatment plants.

    PubMed

    Dieu, B

    2001-01-01

    The implementation of the SCADA system has a positive impact on the operations, maintenance, process improvement and savings for the City of Houston's Wastewater Operations branch. This paper will discuss the system's evolvement, the external/internal architecture, and the human-machine-interface graphical design. Finally, it will demonstrate the system's successes in monitoring the City's sewage and sludge collection/distribution systems, wet-weather facilities and wastewater treatment plants, complying with the USEPA requirements on the discharge, and effectively reducing the operations and maintenance costs.

  4. Simulation of wake effects between two wind farms

    NASA Astrophysics Data System (ADS)

    Hansen, K. S.; Réthoré, P.-E.; Palma, J.; Hevia, B. G.; Prospathopoulos, J.; Peña, A.; Ott, S.; Schepers, G.; Palomares, A.; van der Laan, M. P.; Volker, P.

    2015-06-01

    SCADA data, recorded on the downstream wind farm, has been used to identify flow cases with visible clustering effects. The inflow condition is derived from a partly undisturbed wind turbine, due to lack of mast measurements. The SCADA data analysis concludes that centre of the deficit for the downstream wind farm with disturbed inflow has a distinct visible maximum deficit zone located only 5-10D downstream from the entrance. This zone, representing 20-30% speed reduction, increases and moves downstream for increasing cluster effect and is not visible outside a flow sector of 20-30°. The eight flow models represented in this benchmark include both RANS models, mesoscale models and engineering models. The flow cases, identified according to the wind speed level and inflow sector, have been simulated and validated with the SCADA results. The model validation concludes that all models more or less are able to predict the location and size of the deficit zone inside the downwind wind farm.

  5. Control of Smart Building Using Advanced SCADA

    NASA Astrophysics Data System (ADS)

    Samuel, Vivin Thomas

    For complete control of the building, a proper SCADA implementation and the optimization strategy has to be build. For better communication and efficiency a proper channel between the Communication protocol and SCADA has to be designed. This paper concentrate mainly between the communication protocol, and the SCADA implementation, for a better optimization and energy savings is derived to large scale industrial buildings. The communication channel used in order to completely control the building remotely from a distant place. For an efficient result we consider the temperature values and the power ratings of the equipment so that while controlling the equipment, we are setting a threshold values for FDD technique implementation. Building management system became a vital source for any building to maintain it and for safety purpose. Smart buildings, refers to various distinct features, where the complete automation system, office building controls, data center controls. ELC's are used to communicate the load values of the building to the remote server from a far location with the help of an Ethernet communication channel. Based on the demand fluctuation and the peak voltage, the loads operate differently increasing the consumption rate thus results in the increase in the annual consumption bill. In modern days, saving energy and reducing the consumption bill is most essential for any building for a better and long operation. The equipment - monitored regularly and optimization strategy is implemented for cost reduction automation system. Thus results in the reduction of annual cost reduction and load lifetime increase.

  6. Protecting drinking water utilities from cyberthreats

    DOE PAGES

    Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.; ...

    2017-02-01

    Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less

  7. Protecting drinking water utilities from cyberthreats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clark, Robert M.; Panguluri, Srinivas; Nelson, Trent D.

    Cyber-security challenges have the potential for becoming one of the defining issues of our time. Cyber-attacks have become an ever-increasing threat and the United States (US) Federal Bureau of Investigation (FBI) now ranks cyber-crime as one of its most important law enforcement activities. In addition to the general problems associated with cyber-crime, critical infrastructure (CI) related to energy production, manufacturing, water supply and other systems have come under attack. For example, drinking water utilities are increasingly incorporating computer technology into their routine operations and are therefore increasingly vulnerable to cyber- threats. Systems control and data acquisition (SCADA) systems used tomore » manage automated physical processes essential to water treatment and distribution systems have become standard in medium to large drinking water utilities and in many small water systems. However, even with the application of standard information technology cybersecurity best practices these types of systems have proven to be vulnerable to cyber-attacks. In 2015, the US Department of Homeland Security (DHS) responded to 25 cybersecurity incidents in the Water Sector and to 46 incidents in the Energy Sector. Comparatively, between 2014 and 2015, the reported number of Water Sector incidents actually increased by 78.6% (from 14 to 25). The DHS is in a collaborative partnership with the US Environmental Protection Agency to ensure cybersecurity in the Water Sector. As a result of this partnership a number of guidance documents and techniques have been developed to counter cyber-attacks and minimize cyber vulnerability. These approaches are documented along with a summary of common vulnerabilities. However, a new approach which has great promise in protecting drinking water systems against hacking and cyber-attacks, based on the concept of unidirectional gateways, is presented and discussed.« less

  8. A Data Quality Filter for PMU Measurements: Description, Experience, and Examples

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Follum, James D.; Amidan, Brett G.

    Networks of phasor measurement units (PMUs) continue to grow, and along with them, the amount of data available for analysis. With so much data, it is impractical to identify and remove poor quality data manually. The data quality filter described in this paper was developed for use with the Data Integrity and Situation Awareness Tool (DISAT), which analyzes PMU data to identify anomalous system behavior. The filter operates based only on the information included in the data files, without supervisory control and data acquisition (SCADA) data, state estimator values, or system topology information. Measurements are compared to preselected thresholds tomore » determine if they are reliable. Along with the filter's description, examples of data quality issues from application of the filter to nine months of archived PMU data are provided. The paper is intended to aid the reader in recognizing and properly addressing data quality issues in PMU data.« less

  9. Infrastructure Vulnerability Assessment Model (I-VAM).

    PubMed

    Ezell, Barry Charles

    2007-06-01

    Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. The model requires subject matter experts (SMEs) to establish value functions and weights, and to assess protection measures of the system. Simulation is used to account for uncertainty in measurement, aggregate expert assessment, and to yield a vulnerability (Omega) density function. Results demonstrate that I-VAM is useful to decisionmakers who prefer quantification to qualitative treatment of vulnerability. I-VAM can be used to quantify vulnerability to other infrastructures, supervisory control and data acquisition systems (SCADA), and distributed control systems (DCS).

  10. Enhancing the cyber-security of smart grids with applications to synchrophasor data

    NASA Astrophysics Data System (ADS)

    Pal, Seemita

    In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of packet-drops and finally detect attacks, if any. In the case of PMU data manipulation attacks, the attacker may modify the data in the PMU packets in order to bias the system states and influence the control center into taking wrong decisions. The proposed detection technique is based on evaluating the equivalent impedances of the transmission lines and classifying the observed anomalies to determine the presence of attack and its location. The scheme for detecting data integrity attacks on SCADA systems is based on utilizing synchrophasor measurements from available PMUs in the grid. The proposed method uses a difference measure, developed in this thesis, to determine the relative divergence and mis-correlation between the datasets. Based on the estimated difference measure, tampered and genuine data can be distinguished. The proposed detection mechanisms have demonstrated high accuracy in real-time detection of attacks of various magnitudes, simulated on real PMU data obtained from the NY grid. By performing alarm clustering, the occurrence of false alarms has been reduced to almost zero. The solutions are computationally inexpensive, low on cost, do not add any overhead, and do not require any feedback from the network.

  11. Development and Demonstration of a Security Core Component

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turke, Andy

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more datamore » about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.« less

  12. Long-term monitoring of a cable stayed bridge using a SCADA system

    NASA Astrophysics Data System (ADS)

    Torbol, Marco; Kim, Sehwan; Shinozuka, Masanobu

    2012-04-01

    DuraMote is a MEMS-based remote sensing system, which is developed for the NIST TIP project, Next Generation SCADA for Prevention and Mitigation of Water System Infrastructure Disaster. It is designed for supervisory control and data acquisition (SCADA) of pipe ruptures in water distribution systems. In this project, a method is developed to detect the pipe ruptures by analyzing the acceleration data gathered by DuraMote which consists of two primary components; the first, "Gopher" contains the accelerometers and are attached to the water pipe surface noninvasively, and the second, "Roocas" is placed above ground supplying the power to, and retrieving the data from the multiple Gophers, and then transmit the data through Wi-Fi to a base station. The relays support the Wi-Fi network to facilitate the transmission. A large scale bridge provides an ideal test-bet to validate the performance of such a complex monitoring system as DuraMote for its accuracy, reliability, robustness, and user friendliness. This is because a large bridge is most of the time subjected to susceptible level of ambient vibration due to passing loads, wind, etc. DuraMote can record the acceleration time history arising from the vibration making it possible to estimate the frequency values of various bridge vibration modes. These estimated frequency values are then compared with the values computed from analytical model of the bridge for the verification of the accuracy of DuraMote. It is noted that such a verification method cannot be used practically by deploying DuraMote on a water distribution network since the dynamic behavior of a pipe network, either above or underground, is too complex to model analytically for this purpose, and in addition, the network generally lacks conveniently recordable ambient vibration. In this experiment, the performance of DuraMote system was tested being installed on the Hwamyung Bridge, a 500 m long RC cable stayed bridge in Korea for long term monitoring. In total, the system consisted of 24 accelerometers, 13 Gophers, 10 Roocas, 5 relays, and 1 base station. As it happened, the bridge was subjected to heavy rain, winds, and a typhoon during the experiment allowing the DuraMote to demonstrate extra ordinary robustness and durability. Indeed, in spite of the rough weather, acceleration data was continuously recorded from which natural frequencies, mode shapes, and other structural parameters were calculated. This opportunity would not have happened if the experiment was planned for a shorter duration.

  13. Design and implementation of an Internet based effective controlling and monitoring system with wireless fieldbus communications technologies for process automation--an experimental study.

    PubMed

    Cetinceviz, Yucel; Bayindir, Ramazan

    2012-05-01

    The network requirements of control systems in industrial applications increase day by day. The Internet based control system and various fieldbus systems have been designed in order to meet these requirements. This paper describes an Internet based control system with wireless fieldbus communication designed for distributed processes. The system was implemented as an experimental setup in a laboratory. In industrial facilities, the process control layer and the distance connection of the distributed control devices in the lowest levels of the industrial production environment are provided with fieldbus networks. In this paper, the Internet based control system that will be able to meet the system requirements with a new-generation communication structure, which is called wired/wireless hybrid system, has been designed on field level and carried out to cover all sectors of distributed automation, from process control, to distributed input/output (I/O). The system has been accomplished by hardware structure with a programmable logic controller (PLC), a communication processor (CP) module, two industrial wireless modules and a distributed I/O module, Motor Protection Package (MPP) and software structure with WinCC flexible program used for the screen of Scada (Supervisory Control And Data Acquisition), SIMATIC MANAGER package program ("STEP7") used for the hardware and network configuration and also for downloading control program to PLC. Copyright © 2012 ISA. Published by Elsevier Ltd. All rights reserved.

  14. Final Technical Report. Project Boeing SGS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bell, Thomas E.

    Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less

  15. Modeling And Detecting Anomalies In Scada Systems

    NASA Astrophysics Data System (ADS)

    Svendsen, Nils; Wolthusen, Stephen

    The detection of attacks and intrusions based on anomalies is hampered by the limits of specificity underlying the detection techniques. However, in the case of many critical infrastructure systems, domain-specific knowledge and models can impose constraints that potentially reduce error rates. At the same time, attackers can use their knowledge of system behavior to mask their manipulations, causing adverse effects to observed only after a significant period of time. This paper describes elementary statistical techniques that can be applied to detect anomalies in critical infrastructure networks. A SCADA system employed in liquefied natural gas (LNG) production is used as a case study.

  16. Metrics for the National SCADA Test Bed Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  17. A study on the impact of high penetration distributed generation inverters on grid operation and stability

    NASA Astrophysics Data System (ADS)

    Gu, Fei; Brouwer, Jack; Samuelsen, Scott

    2013-09-01

    Recent advances in inverter technology have enabled ancillary services such as volt/VAR regulation, SCADA communications, and active power filtering. Smart inverters can not only provide real power, but can be controlled to use excess capacity to provide reactive power compensation, power flow control, and active power filtering without supplementary inverter hardware. A transient level inverter model based on the Solectria 7700 inverter is developed and used to assess these control strategies using field data from an existing branch circuit containing two Amonix 68kW CPV-7700 systems installed at the University of California, Irvine.

  18. The ALICE-HMPID Detector Control System: Its evolution towards an expert and adaptive system

    NASA Astrophysics Data System (ADS)

    De Cataldo, G.; Franco, A.; Pastore, C.; Sgura, I.; Volpe, G.

    2011-05-01

    The High Momentum Particle IDentification (HMPID) detector is a proximity focusing Ring Imaging Cherenkov (RICH) for charged hadron identification. The HMPID is based on liquid C 6F 14 as the radiator medium and on a 10 m 2 CsI coated, pad segmented photocathode of MWPCs for UV Cherenkov photon detection. To ensure full remote control, the HMPID is equipped with a detector control system (DCS) responding to industrial standards for robustness and reliability. It has been implemented using PVSS as Slow Control And Data Acquisition (SCADA) environment, Programmable Logic Controller as control devices and Finite State Machines for modular and automatic command execution. In the perspective of reducing human presence at the experiment site, this paper focuses on DCS evolution towards an expert and adaptive control system, providing, respectively, automatic error recovery and stable detector performance. HAL9000, the first prototype of the HMPID expert system, is then presented. Finally an analysis of the possible application of the adaptive features is provided.

  19. Detector Control System for the AFP detector in ATLAS experiment at CERN

    NASA Astrophysics Data System (ADS)

    Banaś, E.; Caforio, D.; Czekierda, S.; Hajduk, Z.; Olszowska, J.; Seabra, L.; Šícho, P.

    2017-10-01

    The ATLAS Forward Proton (AFP) detector consists of two forward detectors located at 205 m and 217 m on either side of the ATLAS experiment. The aim is to measure the momenta and angles of diffractively scattered protons. In 2016, two detector stations on one side of the ATLAS interaction point were installed and commissioned. The detector infrastructure and necessary services were installed and are supervised by the Detector Control System (DCS), which is responsible for the coherent and safe operation of the detector. A large variety of used equipment represents a considerable challenge for the AFP DCS design. Industrial Supervisory Control and Data Acquisition (SCADA) product Siemens WinCCOA, together with the CERN Joint Control Project (JCOP) framework and standard industrial and custom developed server applications and protocols are used for reading, processing, monitoring and archiving of the detector parameters. Graphical user interfaces allow for overall detector operation and visualization of the detector status. Parameters, important for the detector safety, are used for alert generation and interlock mechanisms.

  20. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  1. Anomaly Detection in Power Quality at Data Centers

    NASA Technical Reports Server (NTRS)

    Grichine, Art; Solano, Wanda M.

    2015-01-01

    The goal during my internship at the National Center for Critical Information Processing and Storage (NCCIPS) is to implement an anomaly detection method through the StruxureWare SCADA Power Monitoring system. The benefit of the anomaly detection mechanism is to provide the capability to detect and anticipate equipment degradation by monitoring power quality prior to equipment failure. First, a study is conducted that examines the existing techniques of power quality management. Based on these findings, and the capabilities of the existing SCADA resources, recommendations are presented for implementing effective anomaly detection. Since voltage, current, and total harmonic distortion demonstrate Gaussian distributions, effective set-points are computed using this model, while maintaining a low false positive count.

  2. FDI and Accommodation Using NN Based Techniques

    NASA Astrophysics Data System (ADS)

    Garcia, Ramon Ferreiro; de Miguel Catoira, Alberto; Sanz, Beatriz Ferreiro

    Massive application of dynamic backpropagation neural networks is used on closed loop control FDI (fault detection and isolation) tasks. The process dynamics is mapped by means of a trained backpropagation NN to be applied on residual generation. Process supervision is then applied to discriminate faults on process sensors, and process plant parameters. A rule based expert system is used to implement the decision making task and the corresponding solution in terms of faults accommodation and/or reconfiguration. Results show an efficient and robust FDI system which could be used as the core of an SCADA or alternatively as a complement supervision tool operating in parallel with the SCADA when applied on a heat exchanger.

  3. Real-Time Earthquake Risk Mitigation Of Infrastructures Using Istanbul Earthquake Early Warning and Rapid Response Network

    NASA Astrophysics Data System (ADS)

    Zulfikar, Can; Pinar, Ali; Tunc, Suleyman; Erdik, Mustafa

    2014-05-01

    The Istanbul EEW network consisting of 10 inland and 5 OBS strong motion stations located close to the Main Marmara Fault zone is operated by KOERI. Data transmission between the remote stations and the base station at KOERI is provided both with satellite and fiber optic cable systems. The continuous on-line data from these stations is used to provide real time warning for emerging potentially disastrous earthquakes. The data transmission time from the remote stations to the KOERI data center is a few milliseconds through fiber optic lines and less than a second via satellites. The early warning signal (consisting three alarm levels) is communicated to the appropriate servo shut-down systems of the receipent facilities, that automatically decide proper action based on the alarm level. Istanbul Gas Distribution Corporation (IGDAS) is one of the end users of the EEW signal. IGDAS, the primary natural gas provider in Istanbul, operates an extensive system 9,867 km of gas lines with 550 district regulators and 474,000 service boxes. State of-the-art protection systems automatically cut natural gas flow when breaks in the pipelines are detected. Since 2005, buildings in Istanbul using natural gas are required to install seismometers that automatically cut natural gas flow when certain thresholds are exceeded. IGDAS uses a sophisticated SCADA (supervisory control and data acquisition) system to monitor the state-of-health of its pipeline network. This system provides real-time information about quantities related to pipeline monitoring, including input-output pressure, drawing information, positions of station and RTU (remote terminal unit) gates, slum shut mechanism status at 581 district regulator sites. The SCADA system of IGDAŞ receives the EEW signal from KOERI and decide the proper actions according to the previously specified ground acceleration levels. Presently, KOERI sends EEW signal to the SCADA system of IGDAS Natural Gas Network of Istanbul. The EEW signal of KOERI is also transmitted to the serve shut down system of the Marmaray Rail Tube Tunnel and Commuter Rail Mass Transit System in Istanbul. The Marmaray system includes an undersea railway tunnel under the Bosphorus Strait. Several strong motion instruments are installed within the tunnel for taking measurements against strong ground shaking and early warning purposes. This system is integrated with the KOERI EEW System. KOERI sends the EEW signal to the command center of Marmaray. Having received the signal, the command center put into action the previously defined measurements. For example, the trains within the tunnel will be stopped at the nearest station, no access to the tunnel will be allowed to the trains approaching the tunnel, water protective caps will be closed to protect flood closing the connection between the onshore and offshore tunnels.

  4. Full load estimation of an offshore wind turbine based on SCADA and accelerometer data

    NASA Astrophysics Data System (ADS)

    Noppe, N.; Iliopoulos, A.; Weijtjens, W.; Devriendt, C.

    2016-09-01

    As offshore wind farms (OWFs) grow older, the optimal use of the actual fatigue lifetime of an offshore wind turbine (OWT) and predominantly its foundation will get more important. In case of OWTs, both quasi-static wind/thrust loads and dynamic loads, as induced by turbulence, waves and the turbine's dynamics, contribute to its fatigue life progression. To estimate the remaining useful life of an OWT, the stresses acting on the fatigue critical locations within the structure should be monitored continuously. Unfortunately, in case of the most common monopile foundations these locations are often situated below sea-level and near the mud line and thus difficult or even impossible to access for existing OWTs. Actual strain measurements taken at accessible locations above the sea level show a correlation between thrust load and several SCADA parameters. Therefore a model is created to estimate the thrust load using SCADA data and strain measurements. Afterwards the thrust load acting on the OWT is estimated using the created model and SCADA data only. From this model the quasi static loads on the foundation can be estimated over the lifetime of the OWT. To estimate the contribution of the dynamic loads a modal decomposition and expansion based virtual sensing technique is applied. This method only uses acceleration measurements recorded at accessible locations on the tower. Superimposing both contributions leads to a so-called multi-band virtual sensing. The result is a method that allows to estimate the strain history at any location on the foundation and thus the full load, being a combination of both quasi-static and dynamic loads, acting on the entire structure. This approach is validated using data from an operating Belgian OWF. An initial good match between measured and predicted strains for a short period of time proofs the concept.

  5. Technical Analysis of SSP-21 Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bromberger, S.

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will usemore » other advanced technologies to provide a subset of security services.« less

  6. Modeling of wastewater treatment system of car parks from petroleum products

    NASA Astrophysics Data System (ADS)

    Savdur, S. N.; Stepanova, Yu V.; Kodolova, I. A.; Fesina, E. L.

    2018-05-01

    The paper discusses the technological complex of wastewater treatment of car parks from petroleum products. Based on the review of the main modeling methods of discrete-continuous chemical and engineering processes, it substantiates expediency of using the theory of Petri nets (PN) for modeling the process of wastewater treatment of car parks from petroleum products. It is proposed to use a modification of Petri nets which is focused on modeling and analysis of discrete-continuous chemical and engineering processes by prioritizing transitions, timing marks in positions and transitions. A model in the form of modified Petri nets (MPN) is designed. A software package to control the process for wastewater treatment is designed by means of SCADA TRACE MODE.

  7. 48 CFR 39.001 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY 39.001 Applicability. This part applies to the acquisition of information technology by or for the use of agencies except for acquisitions of information technology for national security systems. However, acquisitions of information technology for national...

  8. Proactive monitoring of an onshore wind farm through lidar measurements, SCADA data and a data-driven RANS solver

    NASA Astrophysics Data System (ADS)

    Iungo, Giacomo Valerio; Camarri, Simone; Ciri, Umberto; El-Asha, Said; Leonardi, Stefano; Rotea, Mario A.; Santhanagopalan, Vignesh; Viola, Francesco; Zhan, Lu

    2016-11-01

    Site conditions, such as topography and local climate, as well as wind farm layout strongly affect performance of a wind power plant. Therefore, predictions of wake interactions and their effects on power production still remain a great challenge in wind energy. For this study, an onshore wind turbine array was monitored through lidar measurements, SCADA and met-tower data. Power losses due to wake interactions were estimated to be approximately 4% and 2% of the total power production under stable and convective conditions, respectively. This dataset was then leveraged for the calibration of a data driven RANS (DDRANS) solver, which is a compelling tool for prediction of wind turbine wakes and power production. DDRANS is characterized by a computational cost as low as that for engineering wake models, and adequate accuracy achieved through data-driven tuning of the turbulence closure model. DDRANS is based on a parabolic formulation, axisymmetry and boundary layer approximations, which allow achieving low computational costs. The turbulence closure model consists in a mixing length model, which is optimally calibrated with the experimental dataset. Assessment of DDRANS is then performed through lidar and SCADA data for different atmospheric conditions. This material is based upon work supported by the National Science Foundation under the I/UCRC WindSTAR, NSF Award IIP 1362033.

  9. Influence of rotational energy barriers to the conformational search of protein loops in molecular dynamics and ranking the conformations.

    PubMed

    Tappura, K

    2001-08-15

    An adjustable-barrier dihedral angle potential was added as an extension to a novel, previously presented soft-core potential to study its contribution to the efficacy of the search of the conformational space in molecular dynamics. As opposed to the conventional soft-core potential functions, the leading principle in the design of the new soft-core potential, as well as of its extension, the soft-core and adjustable-barrier dihedral angle (SCADA) potential (referred as the SCADA potential), was to maintain the main equilibrium properties of the original force field. This qualifies the methods for a variety of a priori modeling problems without need for additional restraints typically required with the conventional soft-core potentials. In the present study, the different potential energy functions are applied to the problem of predicting loop conformations in proteins. Comparison of the performance of the soft-core and SCADA potential showed that the main hurdles for the efficient sampling of the conformational space of (loops in) proteins are related to the high-energy barriers caused by the Lennard-Jones and Coulombic energy terms, and not to the rotational barriers, although the conformational search can be further enhanced by lowering the rotational barriers of the dihedral angles. Finally, different evaluation methods were studied and a few promising criteria found to distinguish the near-native loop conformations from the wrong ones.

  10. 48 CFR 939.7002 - Contractor acquisition of information technology.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... information technology. 939.7002 Section 939.7002 Federal Acquisition Regulations System DEPARTMENT OF ENERGY SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Implementing DOE Policies and Procedures 939.7002 Contractor acquisition of information technology. (a) Management and operating (M&O...

  11. 48 CFR 939.7002 - Contractor acquisition of information technology.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... information technology. 939.7002 Section 939.7002 Federal Acquisition Regulations System DEPARTMENT OF ENERGY SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Implementing DOE Policies and Procedures 939.7002 Contractor acquisition of information technology. (a) Management and operating (M&O...

  12. 48 CFR 939.7002 - Contractor acquisition of information technology.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... information technology. 939.7002 Section 939.7002 Federal Acquisition Regulations System DEPARTMENT OF ENERGY SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Implementing DOE Policies and Procedures 939.7002 Contractor acquisition of information technology. (a) Management and operating (M&O...

  13. 48 CFR 939.7002 - Contractor acquisition of information technology.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... information technology. 939.7002 Section 939.7002 Federal Acquisition Regulations System DEPARTMENT OF ENERGY SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Implementing DOE Policies and Procedures 939.7002 Contractor acquisition of information technology. (a) Management and operating (M&O...

  14. 48 CFR 939.7002 - Contractor acquisition of information technology.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... information technology. 939.7002 Section 939.7002 Federal Acquisition Regulations System DEPARTMENT OF ENERGY SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Implementing DOE Policies and Procedures 939.7002 Contractor acquisition of information technology. (a) Management and operating (M&O...

  15. Sophia Daemon Version 12

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2012-08-09

    Sophia Daemon Version 12 contains the code that is exclusively used by the ‘sophiad’ application. It runs as a service on a Linux host and analyzes network traffic obtained from libpcap and produces a network fingerprint based on hosts and channels. Sophia Daemon Version 12 can, if desired by the user, produce alerts when its fingerprint changes. Sophia Daemon Version 12 can receive data from another Sophia Daemon or raw packet data. It can output data to another Sophia Daemon Version 12, OglNet Version 12 or MySQL. Sophia Daemon Version 12 runs in a passive real-time manner that allows itmore » to be used on a SCADA network. Its network fingerprint is designed to be applicable to SCADA networks rather than general IT networks.« less

  16. Designing an operator interface? Consider user`s `psychology`

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Toffer, D.E.

    The modern operator interface is a channel of communication between operators and the plant that, ideally, provides them with information necessary to keep the plant running at maximum efficiency. Advances in automation technology have increased information flow from the field to the screen. New and improved Supervisory Control and Data Acquisition (SCADA) packages provide designers with powerful and open design considerations. All too often, however, systems go to the field designed for the software rather than the operator. Plant operators` jobs have changed fundamentally, from controlling their plants from out in the field to doing so from within control rooms.more » Control room-based operation does not denote idleness. Trained operators should be engaged in examination of plant status and cognitive evaluation of plant efficiencies. Designers who are extremely computer literate, often do not consider demographics of field operators. Many field operators have little knowledge of modern computer systems. As a result, they do not take full advantage of the interface`s capabilities. Designers often fail to understand the true nature of how operators run their plants. To aid field operators, designers must provide familiar controls and intuitive choices. To achieve success in interface design, it is necessary to understand the ways in which humans think conceptually, and to understand how they process this information physically. The physical and the conceptual are closely related when working with any type of interface. Designers should ask themselves: {open_quotes}What type of information is useful to the field operator?{close_quotes} Let`s explore an integration model that contains the following key elements: (1) Easily navigated menus; (2) Reduced chances for misunderstanding; (3) Accurate representations of the plant or operation; (4) Consistent and predictable operation; (5) A pleasant and engaging interface that conforms to the operator`s expectations. 4 figs.« less

  17. Programmable logic controller optical fibre sensor interface module

    NASA Astrophysics Data System (ADS)

    Allwood, Gary; Wild, Graham; Hinckley, Steven

    2011-12-01

    Most automated industrial processes use Distributed Control Systems (DCSs) or Programmable Logic Controllers (PLCs) for automated control. PLCs tend to be more common as they have much of the functionality of DCSs, although they are generally cheaper to install and maintain. PLCs in conjunction with a human machine interface form the basis of Supervisory Control And Data Acquisition (SCADA) systems, combined with communication infrastructure and Remote Terminal Units (RTUs). RTU's basically convert different sensor measurands in to digital data that is sent back to the PLC or supervisory system. Optical fibre sensors are becoming more common in industrial processes because of their many advantageous properties. Being small, lightweight, highly sensitive, and immune to electromagnetic interference, means they are an ideal solution for a variety of diverse sensing applications. Here, we have developed a PLC Optical Fibre Sensor Interface Module (OFSIM), in which an optical fibre is connected directly to the OFSIM located next to the PLC. The embedded fibre Bragg grating sensors, are highly sensitive and can detect a number of different measurands such as temperature, pressure and strain without the need for a power supply.

  18. Refurbishment and Automation of Thermal Vacuum Facilities at NASA/GSFC

    NASA Technical Reports Server (NTRS)

    Dunn, Jamie; Gomez, Carlos; Donohue, John; Johnson, Chris; Palmer, John; Sushon, Janet

    1999-01-01

    The thermal vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the eleven facilities, currently ten of the systems are scheduled for refurbishment or replacement as part of a five-year implementation. Expected return on investment includes the reduction in test schedules, improvements in safety of facility operations, and reduction in the personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering, and for the automation of thermal vacuum facilities and tests. Automation of the thermal vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs), the use of Supervisory Control and Data Acquisition (SCADA) systems, and the development of a centralized Test Data Management System. These components allow the computer control and automation of mechanical components such as valves and pumps. The project of refurbishment and automation began in 1996 and has resulted in complete computer control of one facility (Facility 281), and the integration of electronically controlled devices and PLCs in multiple others.

  19. Refurbishment and Automation of Thermal Vacuum Facilities at NASA/GSFC

    NASA Technical Reports Server (NTRS)

    Dunn, Jamie; Gomez, Carlos; Donohue, John; Johnson, Chris; Palmer, John; Sushon, Janet

    1998-01-01

    The thermal vacuum facilities located at the Goddard Space Flight Center (GSFC) have supported both manned and unmanned space flight since the 1960s. Of the eleven facilities, currently ten of the systems are scheduled for refurbishment or replacement as part of a five-year implementation. Expected return on investment includes the reduction in test schedules, improvements in safety of facility operations, and reduction in the personnel support required for a test. Additionally, GSFC will become a global resource renowned for expertise in thermal engineering, mechanical engineering, and for the automation of thermal vacuum facilities and tests. Automation of the thermal vacuum facilities includes the utilization of Programmable Logic Controllers (PLCs), the use of Supervisory Control and Data Acquisition (SCADA) systems, and the development of a centralized Test Data Management System. These components allow the computer control and automation of mechanical components such as valves and pumps. The project of refurbishment and automation began in 1996 and has resulted in complete computer control of one facility (Facility 281), and the integration of electronically controlled devices and PLCs in multiple others.

  20. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  1. Cell-phone based assistance for waterworks/sewage plant maintenance.

    PubMed

    Kawada, T; Nakamichi, K; Hisano, N; Kitamura, M; Miyahara, K

    2006-01-01

    Cell-phones are now incorporating the functions necessary for them to be used as mobile IT devices. In this paper, we present our results of the evaluation of cell-phones as the mobile IT device to assist workers in industrial plants. We use waterworks and sewage plants as examples. By employing techniques to squeeze the SCADA screen on CRT into a small cell-phone LCD, we have made it easier for a plant's field workers to access the information needed for effective maintenance, regardless of location. An idea to link SCADA information and the plant facility information on the cell-phone is also presented. Should an accident or emergency situation arise, these cell-phone-based IT systems can efficiently deliver the latest plant information, thus the worker out in the field can respond to and resolve the emergency.

  2. 48 CFR 434.003 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) individually or as a group will participate in this decision making process. (b) The Chief Information Officer (CIO) is the Major Information Technology Systems Executive. For acquisitions of information technology... information technology system acquisition, designating an acquisition to be a major information technology...

  3. 48 CFR 434.003 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) individually or as a group will participate in this decision making process. (b) The Chief Information Officer (CIO) is the Major Information Technology Systems Executive. For acquisitions of information technology... information technology system acquisition, designating an acquisition to be a major information technology...

  4. 48 CFR 434.003 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) individually or as a group will participate in this decision making process. (b) The Chief Information Officer (CIO) is the Major Information Technology Systems Executive. For acquisitions of information technology... information technology system acquisition, designating an acquisition to be a major information technology...

  5. 48 CFR 434.003 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) individually or as a group will participate in this decision making process. (b) The Chief Information Officer (CIO) is the Major Information Technology Systems Executive. For acquisitions of information technology... information technology system acquisition, designating an acquisition to be a major information technology...

  6. RivGen, Igiugig Deployment, Control System Specifications and Models

    DOE Data Explorer

    Forbush, Dominic; Cavagnaro, Robert J.; Guerra, Maricarmen; Donegan, James; McEntee, Jarlath; Thomson, Jim; Polagye, Brian; Fabien, Brian; Kilcher, Levi

    2016-03-21

    Control System simulation models, case studies, and processing codes for analyzing field data. Raw data files included from VFD and SCADA. MatLab and Simulink are required to open some data files and all model files.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thaule, S.B.; Postvoll, W.

    Installation by den norske stats oljeselskap A.S. (Statoil) of a powerful pipeline-modeling system on Zeepipe has allowed this major North Sea gas pipeline to meet the growing demands and seasonal variations of the European gas market. The Troll gas-sales agreement (TGSA) in 1986 called for large volumes of Norwegian gas to begin arriving from the North Sea Sleipner East field in october 1993. It is important to Statoil to maintain regular gas delivers from its integrated transport network. In addition, high utilization of transport capacity maximizes profits. In advance of operations, Statoil realized that state-of-the-art supervisory control and data acquisitionmore » (scada) and pipeline-modeling systems (PMS) would be necessary to meet its goals and to remain the most efficient North Sea operator. The paper describes the linking of Troll and Zeebrugge, contractual issues, the supervisory system, the scada module, pipeline modeling, real-time model, look-ahead model, predictive model, and model performance.« less

  8. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  9. 48 CFR 27.204 - Patented technology under trade agreements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Patented technology under trade agreements. 27.204 Section 27.204 Federal Acquisition Regulations System FEDERAL ACQUISITION... Patented technology under trade agreements. ...

  10. 48 CFR 27.204 - Patented technology under trade agreements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Patented technology under trade agreements. 27.204 Section 27.204 Federal Acquisition Regulations System FEDERAL ACQUISITION... Patented technology under trade agreements. ...

  11. 48 CFR 27.204 - Patented technology under trade agreements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Patented technology under trade agreements. 27.204 Section 27.204 Federal Acquisition Regulations System FEDERAL ACQUISITION... Patented technology under trade agreements. ...

  12. 48 CFR 27.204 - Patented technology under trade agreements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Patented technology under trade agreements. 27.204 Section 27.204 Federal Acquisition Regulations System FEDERAL ACQUISITION... Patented technology under trade agreements. ...

  13. 48 CFR 27.204 - Patented technology under trade agreements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Patented technology under trade agreements. 27.204 Section 27.204 Federal Acquisition Regulations System FEDERAL ACQUISITION... Patented technology under trade agreements. ...

  14. 48 CFR 3439.702 - Department security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... requirements. 3439.702 Section 3439.702 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.702 Department security requirements. The...

  15. 48 CFR 434.004 - Acquisition strategy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ....004 Section 434.004 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE SPECIAL... manager will develop, in coordination with the Acquisition Executive or Major Information Technology... approval of the Acquisition Executive or Major Information Technology Systems Executive, a project control...

  16. 75 FR 60266 - Federal Acquisition Regulation; Buy American Exemption for Commercial Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-29

    ...). Section 615 authorizes exemption from the Buy American Act for acquisition of information technology that... acquisition of information technology that is a commercial item. This same exemption has appeared every year... applies. ``Information technology'' and ``Commercial item'' are already defined in FAR part 2. This is a...

  17. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 6. 3439.701 Section 3439.701 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  18. 48 CFR 39.202 - Definition.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Definition. 39.202 Section 39.202 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.202 Definition...

  19. 48 CFR 39.203 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Applicability. 39.203 Section 39.203 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.203 Applicability...

  20. 48 CFR 39.203 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Applicability. 39.203 Section 39.203 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.203 Applicability...

  1. 48 CFR 39.202 - Definition.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Definition. 39.202 Section 39.202 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.202 Definition...

  2. 48 CFR 39.203 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Applicability. 39.203 Section 39.203 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.203 Applicability...

  3. 48 CFR 39.204 - Exceptions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Exceptions. 39.204 Section 39.204 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.204 Exceptions. The...

  4. 48 CFR 39.202 - Definition.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Definition. 39.202 Section 39.202 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.202 Definition...

  5. 48 CFR 39.203 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Applicability. 39.203 Section 39.203 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.203 Applicability...

  6. 48 CFR 39.202 - Definition.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Definition. 39.202 Section 39.202 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.202 Definition...

  7. 48 CFR 39.203 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Applicability. 39.203 Section 39.203 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.203 Applicability...

  8. 48 CFR 39.202 - Definition.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Definition. 39.202 Section 39.202 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.202 Definition...

  9. 48 CFR 39.204 - Exceptions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Exceptions. 39.204 Section 39.204 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.204 Exceptions. The...

  10. 48 CFR 39.204 - Exceptions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Exceptions. 39.204 Section 39.204 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.204 Exceptions. The...

  11. 48 CFR 39.204 - Exceptions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Exceptions. 39.204 Section 39.204 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 39.204 Exceptions. The...

  12. Innovation on Energy Power Technology (22)Challenge to Development of Expert System stored Knowledge of Expert Power Network Operators

    NASA Astrophysics Data System (ADS)

    Sakaguchi, Hideharu

    Do you remember an expert system? I think there are various impressions about the system. For example, some might say “It reminds me of old days”. On the other hand, some might say “It was really troublesome”. About 25 years ago, from late 1980s to the middle of 1990s, when the Showa era was about to change into the Heisei Era, artificial intelligence boomed. Research and development for an expert system which was equipped with expertise and worked as smart as expert, was advanced in various fields. Our company also picked up the system as the new system which covered weak point of conventional computer technology. We started research and development in 1984, and installed an expert system in a SCADA system, which started operating in March 1990 in the Fukuoka Integrated Control Center. In this essay, as an electric power engineer who involved in development at that time, I introduce the situation and travail story about developing an expert system which support restorative actions from the outage and overload condition of power networks.

  13. Experimental and analytical study of water pipe's rupture for damage identification purposes

    NASA Astrophysics Data System (ADS)

    Papakonstantinou, Konstantinos G.; Shinozuka, Masanobu; Beikae, Mohsen

    2011-04-01

    A malfunction, local damage or sudden pipe break of a pipeline system can trigger significant flow variations. As shown in the paper, pressure variations and pipe vibrations are two strongly correlated parameters. A sudden change in the flow velocity and pressure of a pipeline system can induce pipe vibrations. Thus, based on acceleration data, a rapid detection and localization of a possible damage may be carried out by inexpensive, nonintrusive monitoring techniques. To illustrate this approach, an experiment on a single pipe was conducted in the laboratory. Pressure gauges and accelerometers were installed and their correlation was checked during an artificially created transient flow. The experimental findings validated the correlation between the parameters. The interaction between pressure variations and pipe vibrations was also theoretically justified. The developed analytical model explains the connection among flow pressure, velocity, pressure wave propagation and pipe vibration. The proposed method provides a rapid, efficient and practical way to identify and locate sudden failures of a pipeline system and sets firm foundations for the development and implementation of an advanced, new generation Supervisory Control and Data Acquisition (SCADA) system for continuous health monitoring of pipe networks.

  14. Implementation method of multi-terminal DC control system

    NASA Astrophysics Data System (ADS)

    Yi, Liu; Hao-Ran, Huang; Jun-Wen, Zhou; Hong-Guang, Guo; Yu-Yong, Zhou

    2018-04-01

    Currently the multi-terminal DC system (MTDC) has more stations. Each station needs operators to monitor and control the device. It needs much more operation and maintenance, low efficiency and small reliability; for the most important reason, multi-terminal DC system has complex control mode. If one of the stations has some problem, the control of the whole system should have problems. According to research of the characteristics of multi-terminal DC (VSC-MTDC) systems, this paper presents a strong implementation of the multi-terminal DC Supervisory Control and Data Acquisition (SCADA) system. This system is intelligent, can be networking, integration and intelligent. A master control system is added in each station to communication with the other stations to send current and DC voltage value to pole control system for each station. Based on the practical application and information feedback in the China South Power Grid research center VSC-MTDC project, this system is higher efficiency and save the cost on the maintenance of convertor station to improve the intelligent level and comprehensive effect. And because of the master control system, a multi-terminal system hierarchy coordination control strategy is formed, this make the control and protection system more efficiency and reliability.

  15. Monitoring the variations of the oxygen transfer rate in a full scale membrane bioreactor using daily mass balances.

    PubMed

    Racault, Y; Stricker, A-E; Husson, A; Gillot, S

    2011-01-01

    Oxygen transfer in biological wastewater treatment processes with high sludge concentration, such as membrane bioreactor (MBR), is an important issue. The variation of alpha-factor versus mixed liquor suspended solids (MLSS) concentration was investigated in a full scale MBR plant under process conditions, using mass balances. Exhaustive data from the Supervisory Control And Data Acquisition (SCADA) and from additional online sensors (COD, DO, MLSS) were used to calculate the daily oxygen consumption (OC) using a non-steady state mass balance for COD and total N on a 24-h basis. To close the oxygen balance, OC has to match the total oxygen transfer rate (OTRtot) of the system, which is provided by fine bubble (FB) diffusers in the aeration tank and coarse bubbles (CB) in separate membrane tanks. First assessing OTR(CB) then closing the balance OC = OTRtot allowed to calculate OTR(FB) and to fit an exponential relationship between OTR(FB) and MLSS. A comparison of the alpha-factor obtained by this balance method and by direct measurements with the off-gas method on the same plant is presented and discussed.

  16. 48 CFR 39.001 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... performance and results-based management; the role of the agency Chief Information Officer in acquisitions... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY 39.001 Applicability. This part applies to the acquisition of information technology by or for the use of agencies except for acquisitions of information...

  17. 48 CFR 39.001 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... performance and results-based management; the role of the agency Chief Information Officer in acquisitions... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY 39.001 Applicability. This part applies to the acquisition of information technology by or for the use of agencies except for acquisitions of information...

  18. 48 CFR 39.001 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... performance and results-based management; the role of the agency Chief Information Officer in acquisitions... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY 39.001 Applicability. This part applies to the acquisition of information technology by or for the use of agencies except for acquisitions of information...

  19. 48 CFR 39.001 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... performance and results-based management; the role of the agency Chief Information Officer in acquisitions... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY 39.001 Applicability. This part applies to the acquisition of information technology by or for the use of agencies except for acquisitions of information...

  20. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  1. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  2. 48 CFR 3439.703 - Federal desktop core configuration (FDCC) compatibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF EDUCATION ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.703 Federal desktop core...

  3. 48 CFR 3439.703 - Federal desktop core configuration (FDCC) compatibility.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF EDUCATION ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.703 Federal desktop core...

  4. 48 CFR 3439.703 - Federal desktop core configuration (FDCC) compatibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF EDUCATION ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.703 Federal desktop core...

  5. 48 CFR 3439.703 - Federal desktop core configuration (FDCC) compatibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF EDUCATION ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.703 Federal desktop core...

  6. 48 CFR 18.120 - Use of patented technology under the North American Free Trade Agreement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Use of patented technology under the North American Free Trade Agreement. 18.120 Section 18.120 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES EMERGENCY ACQUISITIONS Available Acquisition Flexibilities 18.120 Use...

  7. 48 CFR 18.119 - Use of patented technology under the North American Free Trade Agreement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Use of patented technology under the North American Free Trade Agreement. 18.119 Section 18.119 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES EMERGENCY ACQUISITIONS Available Acquisition Flexibilities 18.119 Use...

  8. 48 CFR 18.120 - Use of patented technology under the North American Free Trade Agreement.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Use of patented technology under the North American Free Trade Agreement. 18.120 Section 18.120 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES EMERGENCY ACQUISITIONS Available Acquisition Flexibilities 18.120 Use...

  9. 48 CFR 18.120 - Use of patented technology under the North American Free Trade Agreement.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Use of patented technology under the North American Free Trade Agreement. 18.120 Section 18.120 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES EMERGENCY ACQUISITIONS Available Acquisition Flexibilities 18.120 Use...

  10. 76 FR 35424 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-17

    ...; Defense Federal Acquisition Regulation Supplement; Acquisition of Information Technology AGENCY: Defense... techniques or other forms of information technology. The Office of Management and Budget (OMB) has approved... Information Technology, and the associated clauses at DFARS 252.239-7000 and 252.239-7006; OMB Control Number...

  11. 76 FR 31415 - Federal Acquisition Regulation; Buy American Exemption for Commercial Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-31

    ... 9000-AL62 Federal Acquisition Regulation; Buy American Exemption for Commercial Information Technology... from the Buy American Act for acquisition of information technology that is a commercial item. DATES: Effective Date: May 31, 2011. FOR FURTHER INFORMATION CONTACT: Ms. Cecelia L. Davis, Procurement Analyst, at...

  12. Acquisition Modernization: Transitioning Technology Into Warfighter Capability

    DTIC Science & Technology

    2011-08-01

    to test and evaluate the technology and integrate the new capability into operational weapon systems (Figure 4). This funding model creates stove...misalignment between missions, TRLs, and the RDT&E funding model is a major 11 contributor to the valley of death. Technologies become obsolete on... funding model of the acquisition system. Create an individual budget account to fund the development of promising technologies. The Acquisition

  13. 48 CFR 39.104 - Information technology services.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Information technology... SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.104 Information technology services. When acquiring information technology services, solicitations must not describe any...

  14. 48 CFR 39.104 - Information technology services.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Information technology... SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.104 Information technology services. When acquiring information technology services, solicitations must not describe any...

  15. 48 CFR 39.104 - Information technology services.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Information technology... SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.104 Information technology services. When acquiring information technology services, solicitations must not describe any...

  16. 48 CFR 39.104 - Information technology services.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Information technology... SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.104 Information technology services. When acquiring information technology services, solicitations must not describe any...

  17. 48 CFR 39.104 - Information technology services.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Information technology... SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.104 Information technology services. When acquiring information technology services, solicitations must not describe any...

  18. NASA Office of Aeronautics and Space Technology Summer Workshop. Volume 2: Sensing and data acquisitions panel

    NASA Technical Reports Server (NTRS)

    1975-01-01

    Advanced technology requirements associated with sensing and data acquisition systems were assessed for future space missions. Sensing and data acquisition system payloads which would benefit from the use of the space shuttle in demonstrating technology readiness are identified. Topics covered include: atmospheric sensing payloads, earth resources sensing payloads, microwave systems sensing payloads, technology development/evaluation payloads, and astronomy/planetary payloads.

  19. Radio Frequency Based Programmable Logic Controller Anomaly Detection

    DTIC Science & Technology

    2013-09-01

    include wireless radios, IEEE 802.15 Blue- tooth devices, cellular phones, and IEEE 802.11 WiFi networking devices. While wireless communication...MacKenzie, H. Shamoon Malware and SCADA Security What are the Im- pacts? . Technical Report, Tofino Security, Sep 2012. 61. Mateti,P. Hacking Techniques

  20. 48 CFR 3439.702 - Department security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.702 Department security requirements. The...) involves the design, operation, repair, or maintenance of information systems and access to sensitive but...

  1. 48 CFR 3439.702 - Department security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.702 Department security requirements. The...) involves the design, operation, repair, or maintenance of information systems and access to sensitive but...

  2. 48 CFR 3439.702 - Department security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.702 Department security requirements. The...) involves the design, operation, repair, or maintenance of information systems and access to sensitive but...

  3. 48 CFR 434.003 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Section 434.003 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE SPECIAL CATEGORIES OF CONTRACTING MAJOR SYSTEM ACQUISITION General 434.003 Responsibilities. (a) The Secretary of Agriculture or... (CIO) is the Major Information Technology Systems Executive. For acquisitions of information technology...

  4. 48 CFR 39.103 - Modular contracting.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.103 Modular contracting. (a) This section implements Section 5202, Incremental Acquisition of Information Technology, of the Clinger-Cohen... technology. Consistent with the agency's information technology architecture, agencies should, to the maximum...

  5. Towards a new Mercator Observatory Control System

    NASA Astrophysics Data System (ADS)

    Pessemier, W.; Raskin, G.; Prins, S.; Saey, P.; Merges, F.; Padilla, J. P.; Van Winckel, H.; Waelkens, C.

    2010-07-01

    A new control system is currently being developed for the 1.2-meter Mercator Telescope at the Roque de Los Muchachos Observatory (La Palma, Spain). Formerly based on transputers, the new Mercator Observatory Control System (MOCS) consists of a small network of Linux computers complemented by a central industrial controller and an industrial real-time data communication network. Python is chosen as the high-level language to develop flexible yet powerful supervisory control and data acquisition (SCADA) software for the Linux computers. Specialized applications such as detector control, auto-guiding and middleware management are also integrated in the same Python software package. The industrial controller, on the other hand, is connected to the majority of the field devices and is targeted to run various control loops, some of which are real-time critical. Independently of the Linux distributed control system (DCS), this controller makes sure that high priority tasks such as the telescope motion, mirror support and hydrostatic bearing control are carried out in a reliable and safe way. A comparison is made between different controller technologies including a LabVIEW embedded system, a PROFINET Programmable Logic Controller (PLC) and motion controller, and an EtherCAT embedded PC (soft-PLC). As the latter is chosen as the primary platform for the lower level control, a substantial part of the software is being ported to the IEC 61131-3 standard programming languages. Additionally, obsolete hardware is gradually being replaced by standard industrial alternatives with fast EtherCAT communication. The use of Python as a scripting language allows a smooth migration to the final MOCS: finished parts of the new control system can readily be commissioned to replace the corresponding transputer units of the old control system with minimal downtime. In this contribution, we give an overview of the systems design, implementation details and the current status of the project.

  6. Using SCADA Data, Field Studies, and Real-Time Modeling to Calibrate Flint's Hydraulic Model

    EPA Science Inventory

    EPA has been providing technical assistance to the City of Flint and the State of Michigan in response to the drinking water lead contamination incident. Responders quickly recognized the need for a water distribution system hydraulic model to provide insight on flow patterns an...

  7. Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits

    DTIC Science & Technology

    2012-03-22

    may improve the SCADA system’s resilience against DoS and man-in-the-middle ( MITM ) attacks. DoS attacks may be mitigated by using the redundant...paths available on the network links. MITM attacks may be mitigated by the data integrity checks associated with the middleware. Figure 4 illustrates

  8. Manager’s Guide to Technology Transition in an Evolutionary Acquisition Environment

    DTIC Science & Technology

    2005-06-01

    program managers, product managers, staffs, and organizations that manage the development , procurement, production, and fielding of systems...rapidly advancing technologies. Technology transitions can occur during the development of systems, or even after a system has been in the field ...Documentation Evolutionary acquisition is an acquisition strategy that defines, develops , produces or acquires, and fields an initial hardware or software

  9. 77 FR 749 - General Services Administration Acquisition Regulation; Implementation of Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-06

    ... Acquisition Regulation; Implementation of Information Technology Security Provision AGENCY: Office of... orders that include information technology (IT) supplies, services and systems. DATES: Effective Date... 6, 2012 that include information technology (IT) supplies, services and systems with security...

  10. 76 FR 34886 - General Services Administration Acquisition Regulation; Implementation of Information Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... Acquisition Regulation; Implementation of Information Technology Security Provision AGENCY: Office of... information technology (IT) supplies, services and systems with security requirements. DATES: Effective Date... effective date that include information technology (IT) supplies, services and systems with security...

  11. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    DTIC Science & Technology

    2013-10-01

    pmlkploba=obmloq=pbofbp= Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a...of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change 5a. CONTRACT NUMBER 5b. GRANT...findings of our study exploring what drives successful organizational adaptation in the context of technology transition and acquisition within the

  12. Cost modeling to justify technology acquisitions.

    PubMed

    Vanden Brink, J; Gray, S

    1997-06-01

    In an era of diminishing resources, healthcare providers must justify new technology acquisitions. Cost modeling is one method of evaluating the financial impact a technology acquisition will have on a healthcare facility or integrated delivery system. This methodology requires careful data collection and a thorough analysis of both current costs and future cost savings resulting from the new technology. By using a cost modeling methodology, providers will be able to achieve competitive and economic advantages by analyzing both cost and value.

  13. 48 CFR 235.006-70 - Manufacturing Technology Program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Manufacturing Technology... CONTRACTING 235.006-70 Manufacturing Technology Program. In accordance with 10 U.S.C. 2521(d), for acquisitions under the Manufacturing Technology Program— (a) Award all contracts using competitive procedures...

  14. 48 CFR 235.006-70 - Manufacturing Technology Program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Manufacturing Technology... CONTRACTING 235.006-70 Manufacturing Technology Program. In accordance with 10 U.S.C. 2521(d), for acquisitions under the Manufacturing Technology Program— (a) Award all contracts using competitive procedures...

  15. 48 CFR 235.006-70 - Manufacturing Technology Program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Manufacturing Technology... CONTRACTING 235.006-70 Manufacturing Technology Program. In accordance with 10 U.S.C. 2521(d), for acquisitions under the Manufacturing Technology Program— (a) Award all contracts using competitive procedures...

  16. 48 CFR 235.006-70 - Manufacturing Technology Program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Manufacturing Technology... CONTRACTING 235.006-70 Manufacturing Technology Program. In accordance with 10 U.S.C. 2521(d), for acquisitions under the Manufacturing Technology Program— (a) Award all contracts using competitive procedures...

  17. 48 CFR 235.006-70 - Manufacturing Technology Program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Manufacturing Technology... CONTRACTING 235.006-70 Manufacturing Technology Program. In accordance with 10 U.S.C. 2521(d), for acquisitions under the Manufacturing Technology Program— (a) Award all contracts using competitive procedures...

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Jie; Jain, Rishabh; Hodge, Bri-Mathias

    A data-driven methodology is developed to analyze how ambient and wake turbulence affect the power generation of wind turbine(s). Using supervisory control and data acquisition (SCADA) data from a wind plant, we select two sets of wind velocity and power data for turbines on the edge of the plant that resemble (i) an out-of-wake scenario and (ii) an in-wake scenario. For each set of data, two surrogate models are developed to represent the turbine(s) power generation as a function of (i) the wind speed and (ii) the wind speed and turbulence intensity. Three types of uncertainties in turbine(s) power generationmore » are investigated: (i) the uncertainty in power generation with respect to the reported power curve; (ii) the uncertainty in power generation with respect to the estimated power response that accounts for only mean wind speed; and (iii) the uncertainty in power generation with respect to the estimated power response that accounts for both mean wind speed and turbulence intensity. Results show that (i) the turbine(s) generally produce more power under the in-wake scenario than under the out-of-wake scenario with the same wind speed; and (ii) there is relatively more uncertainty in the power generation under the in-wake scenario than under the out-of-wake scenario.« less

  19. Weather Research and Forecasting model simulation of an onshore wind farm: assessment against LiDAR and SCADA data

    NASA Astrophysics Data System (ADS)

    Santoni, Christian; Garcia-Cartagena, Edgardo J.; Zhan, Lu; Iungo, Giacomo Valerio; Leonardi, Stefano

    2017-11-01

    The integration of wind farm parameterizations into numerical weather prediction models is essential to study power production under realistic conditions. Nevertheless, recent models are unable to capture turbine wake interactions and, consequently, the mean kinetic energy entrainment, which are essential for the development of power optimization models. To address the study of wind turbine wake interaction, one-way nested mesoscale to large-eddy simulation (LES) were performed using the Weather Research and Forecasting model (WRF). The simulation contains five nested domains modeling the mesoscale wind on the entire North Texas Panhandle region to the microscale wind fluctuations and turbine wakes of a wind farm located at Panhandle, Texas. The wind speed, direction and boundary layer profile obtained from WRF were compared against measurements obtained with a sonic anemometer and light detection and ranging system located within the wind farm. Additionally, the power production were assessed against measurements obtained from the supervisory control and data acquisition system located in each turbine. Furthermore, to incorporate the turbines into very coarse LES, a modification to the implementation of the wind farm parameterization by Fitch et al. (2012) is proposed. This work was supported by the NSF, Grants No. 1243482 (WINDINSPIRE) and IIP 1362033 (WindSTAR), and TACC.

  20. Technology Acquisition Reform

    DTIC Science & Technology

    2004-03-01

    technologies until they are ready to be handed over to an established program. This office would also provide a home for disruptive technologies emerging...the development and acquisition of disruptive technologies .3 Disruptive technologies threaten programs of record but are essential to future Naval...and rarely emerge in response to customer demand. Disruptive technologies have features that a few fringe (and generally new) customers value

  1. Energy Systems Integration Laboratory | Energy Systems Integration Facility

    Science.gov Websites

    systems test hub includes a Class 1, Division 2 space for performing tests of high-pressure hydrogen Laboratory offers the following capabilities. High-Pressure Hydrogen Systems The high-pressure hydrogen infrastructure. Key Infrastructure Robotic arm; high-pressure hydrogen; natural gas supply; standalone SCADA

  2. Algorithmic network monitoring for a modern water utility: a case study in Jerusalem.

    PubMed

    Armon, A; Gutner, S; Rosenberg, A; Scolnicov, H

    2011-01-01

    We report on the design, deployment, and use of TaKaDu, a real-time algorithmic Water Infrastructure Monitoring solution, with a strong focus on water loss reduction and control. TaKaDu is provided as a commercial service to several customers worldwide. It has been in use at HaGihon, the Jerusalem utility, since mid 2009. Water utilities collect considerable real-time data from their networks, e.g. by means of a SCADA system and sensors measuring flow, pressure, and other data. We discuss how an algorithmic statistical solution analyses this wealth of raw data, flexibly using many types of input and picking out and reporting significant events and failures in the network. Of particular interest to most water utilities is the early detection capability for invisible leaks, also a means for preventing large visible bursts. The system also detects sensor and SCADA failures, various water quality issues, DMA boundary breaches, unrecorded or unintended network changes (like a valve or pump state change), and other events, including types unforeseen during system design. We discuss results from use at HaGihon, showing clear operational value.

  3. Power Plant Model Validation Tool

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The PPMV is used to validate generator model using disturbance recordings. The PPMV tool contains a collection of power plant models and model validation studies, as well as disturbance recordings from a number of historic grid events. The user can import data from a new disturbance into the database, which converts PMU and SCADA data into GE PSLF format, and then run the tool to validate (or invalidate) the model for a specific power plant against its actual performance. The PNNL PPMV tool enables the automation of the process of power plant model validation using disturbance recordings. The tool usesmore » PMU and SCADA measurements as input information. The tool automatically adjusts all required EPCL scripts and interacts with GE PSLF in the batch mode. The main tool features includes: The tool interacts with GE PSLF; The tool uses GE PSLF Play-In Function for generator model validation; Database of projects (model validation studies); Database of the historic events; Database of the power plant; The tool has advanced visualization capabilities; and The tool automatically generates reports« less

  4. Development of Solar Powered Irrigation System

    NASA Astrophysics Data System (ADS)

    Abdelkerim, A. I.; Sami Eusuf, M. M. R.; Salami, M. J. E.; Aibinu, A.; Eusuf, M. A.

    2013-12-01

    Development of a solar powered irrigation system has been discussed in this paper. This system would be SCADA-based and quite useful in areas where there is plenty of sunshine but insufficient water to carry out farming activities, such as rubber plantation, strawberry plantation, or any plantation, that requires frequent watering. The system is powered by solar system as a renewable energy which uses solar panel module to convert Sunlight into electricity. The development and implementation of an automated SCADA controlled system that uses PLC as a controller is significant to agricultural, oil and gas monitoring and control purpose purposes. In addition, the system is powered by an intelligent solar system in which solar panel targets the radiation from the Sun. Other than that, the solar system has reduced energy cost as well as pollution. The system is equipped with four input sensors; two soil moisture sensors, two level detection sensors. Soil moisture sensor measures the humidity of the soil, whereas the level detection sensors detect the level of water in the tank. The output sides consist of two solenoid valves, which are controlled respectively by two moistures sensors.

  5. Instructional Technology for Rural Schools: Access and Acquisition

    ERIC Educational Resources Information Center

    Sundeen, Todd H.; Sundeen, Darrelanne M.

    2013-01-01

    Integrating instructional technology into all classrooms has the potential to transform modern education and student learning. However, access to technology is not equally available to all districts or schools. Decreased funding and budgetary restraints have had a direct impact on technology acquisition in many rural school districts. One of the…

  6. Acquisition of Scientific Literature in Developing Countries. 3: Pakistan.

    ERIC Educational Resources Information Center

    Haider, Syed Jalaluddin

    1989-01-01

    Summarizes the development of science and technology in Pakistan and the existing library resources in science and technology. The organization of acquisitions work is described, including acquisitions policy, book selection, financial support, procurement of books and periodicals, import restrictions, book order work, and gifts and exchanges.…

  7. A Low-Cost Data Acquisition System for Automobile Dynamics Applications

    PubMed Central

    González, Alejandro; Vinolas, Jordi

    2018-01-01

    This project addresses the need for the implementation of low-cost acquisition technology in the field of vehicle engineering: the design, development, manufacture, and verification of a low-cost Arduino-based data acquisition platform to be used in <80 Hz data acquisition in vehicle dynamics, using low-cost accelerometers. In addition to this, a comparative study is carried out of professional vibration acquisition technologies and low-cost systems, obtaining optimum results for low- and medium-frequency operations with an error of 2.19% on road tests. It is therefore concluded that these technologies are applicable to the automobile industry, thereby allowing the project costs to be reduced and thus facilitating access to this kind of research that requires limited resources. PMID:29382039

  8. A Low-Cost Data Acquisition System for Automobile Dynamics Applications.

    PubMed

    González, Alejandro; Olazagoitia, José Luis; Vinolas, Jordi

    2018-01-27

    This project addresses the need for the implementation of low-cost acquisition technology in the field of vehicle engineering: the design, development, manufacture, and verification of a low-cost Arduino-based data acquisition platform to be used in <80 Hz data acquisition in vehicle dynamics, using low-cost accelerometers. In addition to this, a comparative study is carried out of professional vibration acquisition technologies and low-cost systems, obtaining optimum results for low- and medium-frequency operations with an error of 2.19% on road tests. It is therefore concluded that these technologies are applicable to the automobile industry, thereby allowing the project costs to be reduced and thus facilitating access to this kind of research that requires limited resources.

  9. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  10. A Five-Year Plan for Meeting the Automatic Data Processing and Telecommunications Needs of the Federal Government. Volume 2: Major Information Technology Systems Acquisition Plans of Federal Executive Agencies, 1984-1989.

    ERIC Educational Resources Information Center

    Department of Commerce, Washington, DC.

    This volume, the second of two, presents and analyzes the information technology acquisition plans of the Federal Government by agency and component. A brief description covers the outlays planned for major information technology acquisitions of general purpose data processing and telecommunications systems, facilities, and related services for 6…

  11. Chemical & Material Risk Management Initiatives: Reach & Cr6+ Strategies (Briefing Charts)

    DTIC Science & Technology

    2011-02-01

    Definition Acquisition, Technology and Logistics 17 DoD Hexavalent Chromium Minimization Strategy Non‐ Chrome  Primer Acquisition, Technology and...Logistics 18 Hexavalent Chromium (Cr6+) - Some Facts • Cr6+ compounds are wonderful corrosion inhibitors • Cr6+ compounds are highly toxic – We’ve learned...and Logistics 21 DoD Hexavalent Chromium Minimization Policy Acquisition, Technology and Logistics 22 Myth-busters • The DoD policy does not ban the

  12. The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems

    NASA Astrophysics Data System (ADS)

    Bianco, Louis J.

    The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is the biggest threat to SCADA systems.

  13. Modeling DNP3 Traffic Characteristics of Field Devices in SCADA Systems of the Smart Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan; Cheng, Liang; Chuah, Mooi Choo

    In the generation, transmission, and distribution sectors of the smart grid, intelligence of field devices is realized by programmable logic controllers (PLCs). Many smart-grid subsystems are essentially cyber-physical energy systems (CPES): For instance, the power system process (i.e., the physical part) within a substation is monitored and controlled by a SCADA network with hosts running miscellaneous applications (i.e., the cyber part). To study the interactions between the cyber and physical components of a CPES, several co-simulation platforms have been proposed. However, the network simulators/emulators of these platforms do not include a detailed traffic model that takes into account the impactsmore » of the execution model of PLCs on traffic characteristics. As a result, network traces generated by co-simulation only reveal the impacts of the physical process on the contents of the traffic generated by SCADA hosts, whereas the distinction between PLCs and computing nodes (e.g., a hardened computer running a process visualization application) has been overlooked. To generate realistic network traces using co-simulation for the design and evaluation of applications relying on accurate traffic profiles, it is necessary to establish a traffic model for PLCs. In this work, we propose a parameterized model for PLCs that can be incorporated into existing co-simulation platforms. We focus on the DNP3 subsystem of slave PLCs, which automates the processing of packets from the DNP3 master. To validate our approach, we extract model parameters from both the configuration and network traces of real PLCs. Simulated network traces are generated and compared against those from PLCs. Our evaluation shows that our proposed model captures the essential traffic characteristics of DNP3 slave PLCs, which can be used to extend existing co-simulation platforms and gain further insights into the behaviors of CPES.« less

  14. Proactive monitoring of a wind turbine array with lidar measurements, SCADA data and a data-driven RANS solver

    NASA Astrophysics Data System (ADS)

    Iungo, G.; Said, E. A.; Santhanagopalan, V.; Zhan, L.

    2016-12-01

    Power production of a wind farm and durability of wind turbines are strongly dependent on non-linear wake interactions occurring within a turbine array. Wake dynamics are highly affected by the specific site conditions, such as topography and local atmospheric conditions. Furthermore, contingencies through the life of a wind farm, such as turbine ageing and off-design operations, make prediction of wake interactions and power performance a great challenge in wind energy. In this work, operations of an onshore wind turbine array were monitored through lidar measurements, SCADA and met-tower data. The atmospheric wind field investing the wind farm was estimated by using synergistically the available data through five different methods, which are characterized by different confidence levels. By combining SCADA data and the lidar measurements, it was possible to estimate power losses connected with wake interactions. For this specific array, power losses were estimated to be 4% and 2% of the total power production for stable and convective atmospheric regimes, respectively. The entire dataset was then leveraged for the calibration of a data-driven RANS (DDRANS) solver for prediction of wind turbine wakes and power production. The DDRANS is based on a parabolic formulation of the Navier-Stokes equations with axisymmetry and boundary layer approximations, which allow achieving very low computational costs. Accuracy in prediction of wind turbine wakes and power production is achieved through an optimal tuning of the turbulence closure model. The latter is based on a mixing length model, which was developed based on previous wind turbine wake studies carried out through large eddy simulations and wind tunnel experiments. Several operative conditions of the wind farm under examination were reproduced through DDRANS for different stability regimes, wind directions and wind velocity. The results show that DDRANS is capable of achieving a good level of accuracy in prediction of power production and wake velocity field associated with the turbine array.

  15. A demonstrator for an integrated subway protection system

    NASA Astrophysics Data System (ADS)

    Detoma, E.; Capetti, P.; Casati, G.; Billington, S.

    2008-04-01

    In 2006 SEPA has carried on the installation and tests of a demonstrator for an integrated subway protection system at a new subway station in the Naples, Italy) metropolitan area. Protection of a subway system is a difficult task given the amount of passengers transported every day. The demonstrator has been limited to non-intrusive detection techniques not to impair the passenger flow into the station. The demonstrator integrates several technologies and products that have been developed by SEPA or are already available on the market (MKS Instruments,...). The main purpose is to provide detection capabilities for attempts to introduce radioactive substances in the subway station, in order to foil possible attempts to place a dirty bomb, and threat detection and identification following release of chemical agents. The system integrates additional sensors such as video surveillance cameras and air flow sensing to complement the basic sensors suite. The need to protect sensitive installations such as subway stations has been highlighted by the series of terroristics actions carried out in recent years in the subway in London. However, given the number of passengers of a metro system, it is impossible to propose security techniques operating in ways similar to the screening of passengers in airports. Passengers screening and threat detection and identification must be quick, non-intrusive and capable of screening a large number of passengers to be applicable to mass transit systems. In 2005 SEPA, a small company operating in the field of trains video-surveillance systems and radiation detectors, started developing an integrated system to provide a comprehensive protection to subway stations, based on ready available or off-the-shelf components in order to quickly develop a reliable system with available technology. We ruled out at the beginning any new development in order to speed up the fielding of the system in less than one year. The system was developed with commercial sensors and deployed in a new station of the Naples metropolitan transit system in Mugnano. The station was particularly suitable for the demonstration since it is a new station that includes air venting control, water barriers (for fire and smoke containment) and a complete SCADA system to integrate technical and video surveillance operations. In order to protect the subway, we tackled four basic technologies, all readily available in-house or on the market: - radiation detection, to detect the introduction in the station of radionuclides, that may be dispersed by conventional explosive (a "dirty" bomb); - chemical agents detection and identification (after release), complemented with air speed and velocity sensors to estimate, track and predict the contamination plume; - video surveillance, integrated with the SCADA system and already available in the station.

  16. 48 CFR 970.2770 - Technology Transfer.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Technology Transfer. 970.2770 Section 970.2770 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Patents, Data, and Copyrights 970.2770 Technology Transfer. ...

  17. 48 CFR 970.2770 - Technology Transfer.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Technology Transfer. 970.2770 Section 970.2770 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Patents, Data, and Copyrights 970.2770 Technology Transfer. ...

  18. 48 CFR 970.2770 - Technology Transfer.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Technology Transfer. 970.2770 Section 970.2770 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Patents, Data, and Copyrights 970.2770 Technology Transfer. ...

  19. 48 CFR 970.2770 - Technology Transfer.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Technology Transfer. 970.2770 Section 970.2770 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Patents, Data, and Copyrights 970.2770 Technology Transfer. ...

  20. 48 CFR 970.2770 - Technology Transfer.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Technology Transfer. 970.2770 Section 970.2770 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Patents, Data, and Copyrights 970.2770 Technology Transfer. ...

  1. 48 CFR 311.7000 - Defining electronic information technology requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Defining electronic information technology requirements. 311.7000 Section 311.7000 Federal Acquisition Regulations System HEALTH... Accessibility Standards 311.7000 Defining electronic information technology requirements. HHS staff that define...

  2. 48 CFR 311.7000 - Defining electronic information technology requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Defining electronic information technology requirements. 311.7000 Section 311.7000 Federal Acquisition Regulations System HEALTH... Accessibility Standards 311.7000 Defining electronic information technology requirements. HHS staff that define...

  3. 48 CFR 311.7000 - Defining electronic information technology requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Defining electronic information technology requirements. 311.7000 Section 311.7000 Federal Acquisition Regulations System HEALTH... Accessibility Standards 311.7000 Defining electronic information technology requirements. HHS staff that define...

  4. 48 CFR 311.7000 - Defining electronic information technology requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Defining electronic information technology requirements. 311.7000 Section 311.7000 Federal Acquisition Regulations System HEALTH... Accessibility Standards 311.7000 Defining electronic information technology requirements. HHS staff that define...

  5. 48 CFR 39.103 - Modular contracting.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... increments to take advantage of any evolution in technology or needs that occur during implementation and use... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.103 Modular contracting. (a) This section implements Section 5202, Incremental Acquisition of Information Technology, of the Clinger-Cohen...

  6. 48 CFR 39.103 - Modular contracting.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... increments to take advantage of any evolution in technology or needs that occur during implementation and use... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.103 Modular contracting. (a) This section implements Section 5202, Incremental Acquisition of Information Technology, of the Clinger-Cohen...

  7. 48 CFR 39.103 - Modular contracting.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... increments to take advantage of any evolution in technology or needs that occur during implementation and use... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.103 Modular contracting. (a) This section implements Section 5202, Incremental Acquisition of Information Technology, of the Clinger-Cohen...

  8. 48 CFR 311.7000 - Defining electronic information technology requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Defining electronic information technology requirements. 311.7000 Section 311.7000 Federal Acquisition Regulations System HEALTH... Accessibility Standards 311.7000 Defining electronic information technology requirements. HHS staff that define...

  9. 76 FR 33166 - Defense Federal Acquisition Regulation Supplement (DFARS); Warranty Tracking of Serialized Items...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-08

    ... Acquisition, Technology and Logistics dated February 6, 2007, which required definition of the requirements to... Defense for Acquisition, Technology and Logistics issued a policy memorandum dated February 6, 2007, which... Changes Required During the final rule development, DoD restructured the layout of the rule to reduce...

  10. It System Integration: Global Medical Acquisition of Health Tech Case Study

    ERIC Educational Resources Information Center

    Russo, Mark; White, Bruce

    2013-01-01

    Mergers and Acquisitions are just part of life in business. For example, in the health care technology field in 2012, Veritas Capital Partners acquired Thomson Reuters' Healthcare. Other major active acquisition companies included: Medical Transcription Billing, T-System Technologies and Sharecare. In this case study, a larger health technology…

  11. 48 CFR 3027.208 - Use of patented technology under the North American Free Trade Agreements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Use of patented technology under the North American Free Trade Agreements. 3027.208 Section 3027.208 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS PATENTS, DATA, AND COPYRIGHTS...

  12. 48 CFR 3027.208 - Use of patented technology under the North American Free Trade Agreements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Use of patented technology under the North American Free Trade Agreements. 3027.208 Section 3027.208 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS PATENTS, DATA, AND COPYRIGHTS...

  13. 48 CFR 3027.208 - Use of patented technology under the North American Free Trade Agreements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Use of patented technology under the North American Free Trade Agreements. 3027.208 Section 3027.208 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS PATENTS, DATA, AND COPYRIGHTS...

  14. 48 CFR 3027.208 - Use of patented technology under the North American Free Trade Agreements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Use of patented technology under the North American Free Trade Agreements. 3027.208 Section 3027.208 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS PATENTS, DATA, AND COPYRIGHTS...

  15. FwWebViewPlus: integration of web technologies into WinCC OA based Human-Machine Interfaces at CERN

    NASA Astrophysics Data System (ADS)

    Golonka, Piotr; Fabian, Wojciech; Gonzalez-Berges, Manuel; Jasiun, Piotr; Varela-Rodriguez, Fernando

    2014-06-01

    The rapid growth in popularity of web applications gives rise to a plethora of reusable graphical components, such as Google Chart Tools and JQuery Sparklines, implemented in JavaScript and run inside a web browser. In the paper we describe the tool that allows for seamless integration of web-based widgets into WinCC Open Architecture, the SCADA system used commonly at CERN to build complex Human-Machine Interfaces. Reuse of widely available widget libraries and pushing the development efforts to a higher abstraction layer based on a scripting language allow for significant reduction in maintenance of the code in multi-platform environments compared to those currently used in C++ visualization plugins. Adequately designed interfaces allow for rapid integration of new web widgets into WinCC OA. At the same time, the mechanisms familiar to HMI developers are preserved, making the use of new widgets "native". Perspectives for further integration between the realms of WinCC OA and Web development are also discussed.

  16. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  17. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  18. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  19. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  20. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  1. 48 CFR 434.001 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Section 434.001 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE SPECIAL CATEGORIES OF... total acquisition costs (for information technology, life cycle costs) are estimated to be $50 million... Technology Systems Executive. ...

  2. Defense Acquisitions: Assessments of Selected Weapon Programs

    DTIC Science & Technology

    2015-03-01

    offices on technology, design , and manufacturing knowledge; the use of knowledge- based acquisition practices; and the implementation of acquisition...and production maturity using two data-collection instruments, including a questionnaire on issues such as systems engineering reviews, design ...Demonstrating technology maturity is a prerequisite for moving forward into system development, during which the focus should be on design and

  3. A guide to LIDAR data acquisition and processing for the forests of the Pacific Northwest.

    Treesearch

    Demetrios Gatziolis; Hans-Erik Andersen

    2008-01-01

    Light detection and ranging (LIDAR) is an emerging remote-sensing technology with promising potential to assist in mapping, monitoring, and assessment of forest resources. Continuous technological advancement and substantial reductions in data acquisition cost have enabled acquisition of laser data over entire states and regions. These developments have triggered an...

  4. Channeling the Innovation Stream: A Decision Framework for Selecting Emerging Technologies

    ERIC Educational Resources Information Center

    Sauer, Philip S.

    2010-01-01

    The proliferation of emerging technologies offers opportunity but also presents challenges to defense acquisition decision makers seeking to incorporate those technologies as part of the acquisition process. Assessment frameworks and methodologies found in the literature typically address the primary focus of a sponsoring organization's interest…

  5. 77 FR 21087 - Renewal of Department of Defense Federal Advisory Committees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-09

    ..., engineering, and manufacturing, and will ensure the identification of new technologies and new applications of... for Acquisition, Technology and Logistics, the Chairman of the Joint Chiefs of Staff, and as requested..., technology, manufacturing, acquisition process, and other matters of special interest to the DoD. Tasks...

  6. Differences in Adaptive Competency Acquisition between Traditionally Certified and Alternatively Certified Technology Education Teachers.

    ERIC Educational Resources Information Center

    Coyle-Rogers, Patricia G.; Rogers, George E.

    A study determined whether there are any differences in the adaptive competency acquisition between technology education teachers who have completed a school district add-on alternative certification process and technology education teachers who completed a traditional baccalaureate degree certification program. Non-probability sampling was used…

  7. A Study on Watt-hour Meter Data Acquisition Method Based on RFID Technology

    NASA Astrophysics Data System (ADS)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; Chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng

    2018-03-01

    Considering that traditional watt-hour meter data acquisition was subjected to the influence of distance and occlusion, a watt-hour meter data acquisition method based on RFID technology was proposed in this paper. In detail, RFID electronic tag was embedded in the watt-hour meter to identify the meter and record electric energy information, which made RFID based wireless data acquisition for watt-hour meter come true. Eventually, overall lifecycle management of watt-hour meter is realized.

  8. 48 CFR 27.204-1 - Use of patented technology under the North American Free Trade Agreement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Use of patented technology under the North American Free Trade Agreement. 27.204-1 Section 27.204-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Patents and Copyrights 27.204-1 Use of...

  9. 48 CFR 27.204-2 - Use of patented technology under the General Agreement on Tariffs and Trade (GATT).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Use of patented technology under the General Agreement on Tariffs and Trade (GATT). 27.204-2 Section 27.204-2 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Patents and Copyrights 27.204-2...

  10. 48 CFR 27.204-1 - Use of patented technology under the North American Free Trade Agreement.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Use of patented technology under the North American Free Trade Agreement. 27.204-1 Section 27.204-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Patents and Copyrights 27.204-1 Use of...

  11. 48 CFR 27.204-2 - Use of patented technology under the General Agreement on Tariffs and Trade (GATT).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Use of patented technology under the General Agreement on Tariffs and Trade (GATT). 27.204-2 Section 27.204-2 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Patents and Copyrights 27.204-2...

  12. 48 CFR 27.204-2 - Use of patented technology under the General Agreement on Tariffs and Trade (GATT).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Use of patented technology under the General Agreement on Tariffs and Trade (GATT). 27.204-2 Section 27.204-2 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Patents and Copyrights 27.204-2...

  13. 48 CFR 27.204-1 - Use of patented technology under the North American Free Trade Agreement.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Use of patented technology under the North American Free Trade Agreement. 27.204-1 Section 27.204-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Patents and Copyrights 27.204-1 Use of...

  14. 48 CFR 27.204-2 - Use of patented technology under the General Agreement on Tariffs and Trade (GATT).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Use of patented technology under the General Agreement on Tariffs and Trade (GATT). 27.204-2 Section 27.204-2 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Patents and Copyrights 27.204-2...

  15. 48 CFR 27.204-1 - Use of patented technology under the North American Free Trade Agreement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Use of patented technology under the North American Free Trade Agreement. 27.204-1 Section 27.204-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Patents and Copyrights 27.204-1 Use of...

  16. A framework for analyzing the impact of data integrity/quality on electricity market operations

    NASA Astrophysics Data System (ADS)

    Choi, Dae Hyun

    This dissertation examines the impact of data integrity/quality in the supervisory control and data acquisition (SCADA) system on real-time locational marginal price (LMP) in electricity market operations. Measurement noise and/or manipulated sensor errors in a SCADA system may mislead system operators about real-time conditions in a power system, which, in turn, may impact the price signals in real-time power markets. This dissertation serves as a first attempt to analytically investigate the impact of bad/malicious data on electric power market operations. In future power system operations, which will probably involve many more sensors, the impact of sensor data integrity/quality on grid operations will become increasingly important. The first part of this dissertation studies from a market participant's perspective a new class of malicious data attacks on state estimation, which subsequently influences the result of the newly emerging look-ahead dispatch models in the real-time power market. In comparison with prior work of cyber-attack on static dispatch where no inter-temporal ramping constraint is considered, we propose a novel attack strategy, named ramp-induced data (RID) attack, with which the attacker can manipulate the limits of ramp constraints of generators in look-ahead dispatch. It is demonstrated that the proposed attack can lead to financial profits via malicious capacity withholding of selected generators, while being undetected by the existing bad data detection algorithm embedded in today's state estimation software. In the second part, we investigate from a system operator's perspective the sensitivity of locational marginal price (LMP) with respect to data corruption-induced state estimation error in real-time power market. Two data corruption scenarios are considered, in which corrupted continuous data (e.g., the power injection/flow and voltage magnitude) falsify power flow estimate whereas corrupted discrete data (e.g., the on/off status of a circuit breaker) do network topology estimate, thus leading to the distortion of LMP. We present an analytical framework to quantify real-time LMP sensitivity subject to continuous and discrete data corruption via state estimation. The proposed framework offers system operators an analytical tool to identify economically sensitive buses and transmission lines to data corruption as well as find sensors that impact LMP changes significantly. This dissertation serves as a first step towards rigorous understanding of the fundamental coupling among cyber, physical and economical layers of operations in future smart grid.

  17. Norwegian Cyber Defense

    DTIC Science & Technology

    2013-12-01

    21   a.   Siberian Pipeline Explosion (1982) ............................21   b.   Chevron Emergency Alert...the fifth domain: Are the mouse and keyboard the new weapons of conflict?,” The Economist, July 1, 2010, http://www.economist.com/node/16478792. 15...a. Siberian Pipeline Explosion (1982) In 1982, intruders planted a Trojan horse in the SCADA system that controls the Siberian Pipeline. This is the

  18. Wake losses from averaged and time-resolved power measurements at full scale wind turbines

    NASA Astrophysics Data System (ADS)

    Castellani, Francesco; Astolfi, Davide; Mana, Matteo; Becchetti, Matteo; Segalini, Antonio

    2017-05-01

    This work deals with the experimental analysis of wake losses fluctuations at full-scale wind turbines. The test case is a wind farm sited on a moderately complex terrain: 4 turbines are installed, having 2 MW of rated power each. The sources of information are the time-resolved data, as collected from the OPC server, and the 10-minutes averaged SCADA data. The objective is to compare the statistical distributions of wake losses for far and middle wakes, as can be observed through the “fast” lens of time-resolved data, for certain selected test-case time series, and through the “slow” lens of SCADA data, on a much longer time basis that allow to set the standards of the mean wake losses along the wind farm. Further, time-resolved data are used for an insight into the spectral properties of wake fluctuations, highlighting the role of the wind turbine as low-pass filter. Summarizing, the wind rose, the layout of the site and the structure of the data sets at disposal allow to study middle and far wake behavior, with a “slow” and “fast” perspective.

  19. A Measurement and Power Line Communication System Design for Renewable Smart Grids

    NASA Astrophysics Data System (ADS)

    Kabalci, E.; Kabalci, Y.

    2013-10-01

    The data communication over the electric power lines can be managed easily and economically since the grid connections are already spread around all over the world. This paper investigates the applicability of Power Line Communication (PLC) in an energy generation system that is based on photovoltaic (PV) panels with the modeling study in Matlab/Simulink. The Simulink model covers the designed PV panels, boost converter with Perturb and Observe (P&O) control algorithm, full bridge inverter, and the binary phase shift keying (BPSK) modem that is utilized to transfer the measured data over the power lines. This study proposes a novel method to use the electrical power lines not only for carrying the line voltage but also to transmit the measurements of the renewable energy generation plants. Hence, it is aimed at minimizing the additional monitoring costs such as SCADA, Ethernet-based or GSM based systems by using the proposed technique. Although this study is performed with solar power plants, the proposed model can be applied to other renewable generation systems. Consequently, the usage of the proposed technique instead of SCADA or Ethernet-based systems eliminates additional monitoring costs.

  20. Sensor Acquisition for Water Utilities: A Survey and Technology List

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alai, M; Glascoe, L; Love, A

    2005-03-07

    The early detection of the deliberate biological and chemical contamination of water distribution systems is a necessary capability for securing the nation's water supply. Current and emerging early-detection technology capabilities and shortcomings need to be identified and assessed to provide government agencies and water utilities with an improved methodology for assessing the value of installing these technologies. The Department of Homeland Security (DHS) has tasked a multi-laboratory team to evaluate current and future needs to protect the nation's water distribution infrastructure by supporting an objective evaluation of current and new technologies. The primary deliverables from this Operational Technology Demonstration (OTD)more » are the following: (1) establishment of an advisory board for review and approval of testing protocols, technology acquisition processes and recommendations for technology test and evaluation in laboratory and field settings; (2) development of a technology acquisition process; (3) creation of laboratory and field testing and evaluation capability; and (4) testing of candidate technologies for insertion into a water early warning system. The initial phase of this study involves the development of two separate but complementary strategies to be reviewed by the advisory board: (1) a technology acquisition strategy, and (2) a technology evaluation strategy. Lawrence Livermore National Laboratory and Sandia National Laboratories are tasked with the first strategy, while Los Alamos, Pacific Northwest, and Oak Ridge National Laboratories are tasked with the second strategy. The first goal of the acquisition strategy is the development of a technology survey process that includes a review of previous sensor surveys and current test programs and then the development of a method to solicit and select existing and emerging sensor technologies for evaluation and testing. In this paper we discuss a survey of previous efforts by governmental agencies and private companies with the aim of facilitating a water sensor technology acquisition procedure. We provide a survey of previous sensor studies with regard to the use of Early Warning Systems (EWS) including earlier surveys, testing programs, and response studies. In the project we extend this earlier work by developing a list of important sensor specifications that are then used to help assemble a sensor selection criteria. A list of sensor technologies with their specifications is appended to this document. This list will assist the second goal of the project which is a recommendation of candidate technologies for laboratory and field testing.« less

  1. AERIS--applications for the environment : real-time information synthesis state-of-the-practice support : state-of-the-practice assessment of technology to enable environmental data acquisition.

    DOT National Transportation Integrated Search

    2011-06-21

    In this report, vehicle-based and infrastructure-based data acquisition technologies are assessed. Vehicle-based technologies include methods for accessing the Controller Area Network (CAN) Bus on heavy vehicles, the On-Board Diagnostic (OBD II) on s...

  2. Defense Acquisitions: Assessments of Selected Weapon Programs

    DTIC Science & Technology

    2012-03-01

    knowledge-based practices. As a result , most of these programs will carry technology, design, and production risks into subsequent phases of the...acquisition process that could result in cost growth or schedule delays. GAO also assessed the implementation of selected acquisition reforms and found...knowledge-based practices. As a result , most of these programs will carry technology, design, and production risks into subsequent phases of the

  3. Joint Strike Figher Acquisition: Mature Critical Technologies Needed to Reduce Risks

    DTIC Science & Technology

    2001-10-01

    Reduce Risks GAO-02-39 Report Documentation Page Report Date 00OCT2001 Report Type N/A Dates Covered (from... to) - Title and Subtitle JOINT STRIKE...FIGHTER ACQUISITION: Mature Critical Technologies Needed to Reduce Risks Contract Number Grant Number Program Element Number Author(s) Project...1Joint Strike Fighter Acquisition: Development Schedule Should Be Changed to Reduce Risks (GAO/T-NSIAD-00-132

  4. Three Big Ideas for Reforming Acquisition: Evidence-Based Propositions for Transformation

    DTIC Science & Technology

    2015-04-30

    specific ideas for improving key aspects of defense acquisition reforming the process for managing capabilities, addressing technology insertion, and...offers three specific ideas for improving key aspects of defense acquisition: reforming the process for managing capabilities, addressing technology...and process changes need to be made for any significant change to be seen. This paper offers reform ideas in three specific areas: achieving the

  5. Software Acquisition Patterns of Failure and How to Recognize Them

    DTIC Science & Technology

    2013-04-01

    Acquisition Processes Danielle Worger and Teresa Wu, Arizona State University Eugene Rex Jalao, Arizona State University and University of the Philippines...Robert Wirthlin Air Force Institute of Technology The RITE Approach to Agile Acquisition Timothy Boyce, Iva Sherman, and Nicholas Roussel Space...the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change Kathryn Aten and John T . Dillard

  6. Construct mine environment monitoring system based on wireless mesh network

    NASA Astrophysics Data System (ADS)

    Chen, Xin; Ge, Gengyu; Liu, Yinmei; Cheng, Aimin; Wu, Jun; Fu, Jun

    2018-04-01

    The system uses wireless Mesh network as a network transmission medium, and strive to establish an effective and reliable underground environment monitoring system. The system combines wireless network technology and embedded technology to monitor the internal data collected in the mine and send it to the processing center for analysis and environmental assessment. The system can be divided into two parts: the main control network module and the data acquisition terminal, and the SPI bus technology is used for mutual communication between them. Multi-channel acquisition and control interface design Data acquisition and control terminal in the analog signal acquisition module, digital signal acquisition module, and digital signal output module. The main control network module running Linux operating system, in which the transplant SPI driver, USB card driver and AODV routing protocol. As a result, the internal data collection and reporting of the mine are realized.

  7. 48 CFR 339.7102 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability. Contracting Officers are responsible for ensuring that all information technology acquisitions comply with the Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...

  8. Field data acquisition technologies for Iowa transportation agencies.

    DOT National Transportation Integrated Search

    1994-08-01

    This report describes the results of the research project investigating the use of : advanced field data acquisition technologies for lowa transponation agencies. The : objectives of the research project were to (1) research and evaluate current data...

  9. 48 CFR 339.7103 - Solicitation and contract clause.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... clause. 339.7103 Section 339.7103 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management...-72, Security Requirements for Federal Information Technology Resources, in solicitations and...

  10. 48 CFR 339.7103 - Solicitation and contract clause.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... clause. 339.7103 Section 339.7103 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management...-72, Security Requirements for Federal Information Technology Resources, in solicitations and...

  11. 48 CFR 339.7103 - Solicitation and contract clause.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... clause. 339.7103 Section 339.7103 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management...-72, Security Requirements for Federal Information Technology Resources, in solicitations and...

  12. 48 CFR 339.7103 - Solicitation and contract clause.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... clause. 339.7103 Section 339.7103 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management...-72, Security Requirements for Federal Information Technology Resources, in solicitations and...

  13. Complex multidisciplinary systems decomposition for aerospace vehicle conceptual design and technology acquisition

    NASA Astrophysics Data System (ADS)

    Omoragbon, Amen

    Although, the Aerospace and Defense (A&D) industry is a significant contributor to the United States' economy, national prestige and national security, it experiences significant cost and schedule overruns. This problem is related to the differences between technology acquisition assessments and aerospace vehicle conceptual design. Acquisition assessments evaluate broad sets of alternatives with mostly qualitative techniques, while conceptual design tools evaluate narrow set of alternatives with multidisciplinary tools. In order for these two fields to communicate effectively, a common platform for both concerns is desired. This research is an original contribution to a three-part solution to this problem. It discusses the decomposition step of an innovation technology and sizing tool generation framework. It identifies complex multidisciplinary system definitions as a bridge between acquisition and conceptual design. It establishes complex multidisciplinary building blocks that can be used to build synthesis systems as well as technology portfolios. It also describes a Graphical User Interface Designed to aid in decomposition process. Finally, it demonstrates an application of the methodology to a relevant acquisition and conceptual design problem posed by the US Air Force.

  14. Heterojunction bipolar transistor technology for data acquisition and communication

    NASA Technical Reports Server (NTRS)

    Wang, C.; Chang, M.; Beccue, S.; Nubling, R.; Zampardi, P.; Sheng, N.; Pierson, R.

    1992-01-01

    Heterojunction Bipolar Transistor (HBT) technology has emerged as one of the most promising technologies for ultrahigh-speed integrated circuits. HBT circuits for digital and analog applications, data conversion, and power amplification have been realized, with speed performance well above 20 GHz. At Rockwell, a baseline AlGaAs/GaAs HBT technology has been established in a manufacturing facility. This paper describes the HBT technology, transistor characteristics, and HBT circuits for data acquisition and communication.

  15. 48 CFR 202.101 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Agency, the Defense Logistics Agency, the Defense Security Cooperation Agency, the Defense Security... the Secretary of Defense, the Under Secretary of Defense (Acquisition, Technology, and Logistics), and... agencies)—Under Secretary of Defense (Acquisition, Technology, and Logistics); Department of the Army...

  16. LHCb Online event processing and filtering

    NASA Astrophysics Data System (ADS)

    Alessio, F.; Barandela, C.; Brarda, L.; Frank, M.; Franek, B.; Galli, D.; Gaspar, C.; Herwijnen, E. v.; Jacobsson, R.; Jost, B.; Köstner, S.; Moine, G.; Neufeld, N.; Somogyi, P.; Stoica, R.; Suman, S.

    2008-07-01

    The first level trigger of LHCb accepts one million events per second. After preprocessing in custom FPGA-based boards these events are distributed to a large farm of PC-servers using a high-speed Gigabit Ethernet network. Synchronisation and event management is achieved by the Timing and Trigger system of LHCb. Due to the complex nature of the selection of B-events, which are the main interest of LHCb, a full event-readout is required. Event processing on the servers is parallelised on an event basis. The reduction factor is typically 1/500. The remaining events are forwarded to a formatting layer, where the raw data files are formed and temporarily stored. A small part of the events is also forwarded to a dedicated farm for calibration and monitoring. The files are subsequently shipped to the CERN Tier0 facility for permanent storage and from there to the various Tier1 sites for reconstruction. In parallel files are used by various monitoring and calibration processes running within the LHCb Online system. The entire data-flow is controlled and configured by means of a SCADA system and several databases. After an overview of the LHCb data acquisition and its design principles this paper will emphasize the LHCb event filter system, which is now implemented using the final hardware and will be ready for data-taking for the LHC startup. Control, configuration and security aspects will also be discussed.

  17. Cellular computational generalized neuron network for frequency situational intelligence in a multi-machine power system.

    PubMed

    Wei, Yawei; Venayagamoorthy, Ganesh Kumar

    2017-09-01

    To prevent large interconnected power system from a cascading failure, brownout or even blackout, grid operators require access to faster than real-time information to make appropriate just-in-time control decisions. However, the communication and computational system limitations of currently used supervisory control and data acquisition (SCADA) system can only deliver delayed information. However, the deployment of synchrophasor measurement devices makes it possible to capture and visualize, in near-real-time, grid operational data with extra granularity. In this paper, a cellular computational network (CCN) approach for frequency situational intelligence (FSI) in a power system is presented. The distributed and scalable computing unit of the CCN framework makes it particularly flexible for customization for a particular set of prediction requirements. Two soft-computing algorithms have been implemented in the CCN framework: a cellular generalized neuron network (CCGNN) and a cellular multi-layer perceptron network (CCMLPN), for purposes of providing multi-timescale frequency predictions, ranging from 16.67 ms to 2 s. These two developed CCGNN and CCMLPN systems were then implemented on two different scales of power systems, one of which installed a large photovoltaic plant. A real-time power system simulator at weather station within the Real-Time Power and Intelligent Systems (RTPIS) laboratory at Clemson, SC, was then used to derive typical FSI results. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Impact of the Acquisition Corps Membership Requirement 24 Business-Credit Hours on the Navy Acquisition Workforce

    DTIC Science & Technology

    2016-12-01

    ROTC Reserve Officers’ Training Corps S&T Science and Technology S&TM Science and Technology Manager SDO Special Duty Officer SME Subject Matter...engineering, industrial property management, information technology , life cycle logistics, program management, production , quality and manufacturing...16  4.  Auditing ........................................................................................16  5.  Test and

  19. Conceptual Design, Implementation and Commissioning of Data Acquisition and Control System for Negative Ion Source at IPR

    NASA Astrophysics Data System (ADS)

    Soni, Jignesh; Yadav, Ratnakar; Gahlaut, A.; Bansal, G.; Singh, M. J.; Bandyopadhyay, M.; Parmar, K. G.; Pandya, K.; Chakraborty, A.

    2011-09-01

    Negative ion Experimental facility has been setup at IPR. The facility consists of a RF based negative ion source (ROBIN)—procured under a license agreement with IPP Garching, as a replica of BATMAN, presently operating in IPP, 100 kW 1 MHz RF generators and a set of low and high voltage power supplies, vacuum system and diagnostics. 35 keV 10A H- beam is expected from this setup. Automated successful operation of the system requires an advanced, rugged, time proven and flexible control system. Further the data generated in the experimental phase needs to be acquired, monitored and analyzed to verify and judge the system performance. In the present test bed, this is done using a combination of PLC based control system and a PXI based data acquisition system. The control system consists of three different Siemens PLC systems viz. (1) S-7 400 PLC as a Master Control, (2) S-7 300 PLC for Vacuum system control and (3) C-7 PLC for RF generator control. Master control PLC directly controls all the subsystems except the Vacuum system and RF generator. The Vacuum system and RF generator have their own dedicated PLCs (S-7 300 and C-7 respectively). Further, these two PLC systems work as a slave for the Master control PLC system. Communication between PLC S-7 400, S-7 300 and central control room computer is done through Industrial Ethernet (IE). Control program and GUI are developed in Siemens Step-7 PLC programming software and Wincc SCADA software, respectively. There are approximately 150 analog and 200 digital control and monitoring signals required to perform complete closed loop control of the system. Since the source floats at high potential (˜35 kV); a combination of galvanic and fiber optic isolation has been implemented. PXI based Data Acquisition system (DAS) is a combination of PXI RT (Real time) system, front end signal conditioning electronics, host system and DAQ program. All the acquisition signals coming from various sub-systems are connected and acquired by the PXI RT system, through only fiber optics link for signal conditioning, electrical isolation and better noise immunity. Real time and Host application programs are developed in LabVIEW and the data shall be stored with a facility of online display of selected parameters. Mathematical calculations and report generation will take place at the end of each beam shot. The paper describes in detail about the design approach, implementation strategy, program development, commissioning and operational test result of ROBIN through a data acquisition and control system.

  20. Fewer Mistakes on the First Day: Architectural Strategies and their Impacts on Acquisition Outcomes

    DTIC Science & Technology

    2013-04-01

    Acquisition Processes Danielle Worger and Teresa Wu, Arizona State University Eugene Rex Jalao, Arizona State University and University of the...and J. Robert Wirthlin Air Force Institute of Technology The RITE Approach to Agile Acquisition Timothy Boyce, Iva Sherman, and Nicholas Roussel...of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change Kathryn Aten and John T

  1. 32 CFR 174.5 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Under Secretary of Defense for Acquisition, Technology, and Logistics shall issue DoD Instructions as..., and Logistics. (b) The authorities and responsibilities of the Secretary of Defense delegated to the Under Secretary of Defense for Acquisition, Technology, and Logistics under paragraph (a) of this...

  2. 32 CFR 174.5 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Under Secretary of Defense for Acquisition, Technology, and Logistics shall issue DoD Instructions as..., and Logistics. (b) The authorities and responsibilities of the Secretary of Defense delegated to the Under Secretary of Defense for Acquisition, Technology, and Logistics under paragraph (a) of this...

  3. 32 CFR 174.5 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Under Secretary of Defense for Acquisition, Technology, and Logistics shall issue DoD Instructions as..., and Logistics. (b) The authorities and responsibilities of the Secretary of Defense delegated to the Under Secretary of Defense for Acquisition, Technology, and Logistics under paragraph (a) of this...

  4. 32 CFR 174.5 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Under Secretary of Defense for Acquisition, Technology, and Logistics shall issue DoD Instructions as..., and Logistics. (b) The authorities and responsibilities of the Secretary of Defense delegated to the Under Secretary of Defense for Acquisition, Technology, and Logistics under paragraph (a) of this...

  5. A Conceptual Methodology for Assessing Acquisition Requirements Robustness against Technology Uncertainties

    NASA Astrophysics Data System (ADS)

    Chou, Shuo-Ju

    2011-12-01

    In recent years the United States has shifted from a threat-based acquisition policy that developed systems for countering specific threats to a capabilities-based strategy that emphasizes the acquisition of systems that provide critical national defense capabilities. This shift in policy, in theory, allows for the creation of an "optimal force" that is robust against current and future threats regardless of the tactics and scenario involved. In broad terms, robustness can be defined as the insensitivity of an outcome to "noise" or non-controlled variables. Within this context, the outcome is the successful achievement of defense strategies and the noise variables are tactics and scenarios that will be associated with current and future enemies. Unfortunately, a lack of system capability, budget, and schedule robustness against technology performance and development uncertainties has led to major setbacks in recent acquisition programs. This lack of robustness stems from the fact that immature technologies have uncertainties in their expected performance, development cost, and schedule that cause to variations in system effectiveness and program development budget and schedule requirements. Unfortunately, the Technology Readiness Assessment process currently used by acquisition program managers and decision-makers to measure technology uncertainty during critical program decision junctions does not adequately capture the impact of technology performance and development uncertainty on program capability and development metrics. The Technology Readiness Level metric employed by the TRA to describe program technology elements uncertainties can only provide a qualitative and non-descript estimation of the technology uncertainties. In order to assess program robustness, specifically requirements robustness, against technology performance and development uncertainties, a new process is needed. This process should provide acquisition program managers and decision-makers with the ability to assess or measure the robustness of program requirements against such uncertainties. A literature review of techniques for forecasting technology performance and development uncertainties and subsequent impacts on capability, budget, and schedule requirements resulted in the conclusion that an analysis process that coupled a probabilistic analysis technique such as Monte Carlo Simulations with quantitative and parametric models of technology performance impact and technology development time and cost requirements would allow the probabilities of meeting specific constraints of these requirements to be established. These probabilities of requirements success metrics can then be used as a quantitative and probabilistic measure of program requirements robustness against technology uncertainties. Combined with a Multi-Objective Genetic Algorithm optimization process and computer-based Decision Support System, critical information regarding requirements robustness against technology uncertainties can be captured and quantified for acquisition decision-makers. This results in a more informed and justifiable selection of program technologies during initial program definition as well as formulation of program development and risk management strategies. To meet the stated research objective, the ENhanced TEchnology Robustness Prediction and RISk Evaluation (ENTERPRISE) methodology was formulated to provide a structured and transparent process for integrating these enabling techniques to provide a probabilistic and quantitative assessment of acquisition program requirements robustness against technology performance and development uncertainties. In order to demonstrate the capabilities of the ENTERPRISE method and test the research Hypotheses, an demonstration application of this method was performed on a notional program for acquiring the Carrier-based Suppression of Enemy Air Defenses (SEAD) using Unmanned Combat Aircraft Systems (UCAS) and their enabling technologies. The results of this implementation provided valuable insights regarding the benefits and inner workings of this methodology as well as its limitations that should be addressed in the future to narrow the gap between current state and the desired state.

  6. Deception Based Intrusion Detection & Prevention for SCADA Environments -

    Science.gov Websites

    the case of the Ukraine incident, the substations. So here's the idea. Number one, understand from idea is that one of the quotes that he made in that book, it's actually a famous quote, is that all security products. Case in point, I'll be at RSA in February. There's over 2,600 vendors at RSA all solving

  7. Awaiting Cyber 9/11

    DTIC Science & Technology

    2013-01-01

    tremendously dangerous and sophisticated virus that successfully attacked a SCADA system is now available for free on the Internet, where one can find...security for the public and private sectors. To develop this capability, the Nation needs to undergo a paradigm shift on how it views the cyber... for communications and trade were extraordinarily important for the security and prosperity of Britain. Today, the security and prosperity of the

  8. Analysis of synchronous and induction generators used at hydroelectric power plant

    NASA Astrophysics Data System (ADS)

    Diniş, C. M.; Popa, G. N.; lagăr, A.

    2017-01-01

    In this paper is presented an analysis of the operating electric generators (synchronous and induction) within a small capacity hydroelectric power plant. Such is treated the problem of monitoring and control hydropower plant using SCADA systems. Have been carried an experimental measurements in small hydropower plant for different levels of water in the lake and various settings of the operating parameters.

  9. Space science technology: In-situ science. Sample Acquisition, Analysis, and Preservation Project summary

    NASA Technical Reports Server (NTRS)

    Aaron, Kim

    1991-01-01

    The Sample Acquisition, Analysis, and Preservation Project is summarized in outline and graphic form. The objective of the project is to develop component and system level technology to enable the unmanned collection, analysis and preservation of physical, chemical and mineralogical data from the surface of planetary bodies. Technology needs and challenges are identified and specific objectives are described.

  10. Defense Research Enterprise Assessment

    DTIC Science & Technology

    2017-01-01

    ACQUISITION, TECHNOLOGY , AND LOGISTICS OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301-3000 JAN 2 5 2017...fulfill vital missions on behalf of the Warfighter. This DoD research enterprise is characterized by high-quality science, technology transition, and...smart acquisition. The rapidly changing technology landscape means that the Labs also must adapt their mission to continue to serve and ready

  11. 48 CFR 339.203 - Approval of exceptions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 339.203... policy. (b) In the development of an AP or other acquisition request document, the Contracting Officer.... For further information, see paragraphs 4.3, Section 508 Compliance Exceptions, and paragraph 11...

  12. 48 CFR 339.203 - Approval of exceptions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 339.203... policy. (b) In the development of an AP or other acquisition request document, the Contracting Officer.... For further information, see paragraphs 4.3, Section 508 Compliance Exceptions, and paragraph 11...

  13. 48 CFR 339.203 - Approval of exceptions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Electronic and Information Technology 339.203... policy. (b) In the development of an AP or other acquisition request document, the Contracting Officer.... For further information, see paragraphs 4.3, Section 508 Compliance Exceptions, and paragraph 11...

  14. 48 CFR 339.101 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... computers, mobile devices, or portable media to store or process HHS sensitive information that the Project... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 339.101 Policy. (d)(1) The Contracting Officer shall... orders that involve the operation or acquisition of an information technology system (for definition of...

  15. 48 CFR 1339.107-70 - Information security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... Clause 1352.239-73, Security Requirements for Information Technology Resources, is needed, contracting... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information security. 1339...

  16. 32 CFR 174.5 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... part. (e) The cost of recording deeds and other transfer documents is the responsibility of the... Under Secretary of Defense for Acquisition, Technology, and Logistics shall issue DoD Instructions as... and realignment, are hereby delegated to the Under Secretary of Defense for Acquisition, Technology...

  17. Telecommunications and data acquisition

    NASA Technical Reports Server (NTRS)

    Renzetti, N. A. (Editor)

    1981-01-01

    Deep Space Network progress in flight project support, tracking and data acquisition research and technology, network engineering, hardware and software implementation, and operations is reported. In addition, developments in Earth based radio technology as applied to geodynamics, astrophysics, and the radio search for extraterrestrial intelligence are reported.

  18. 48 CFR 339.101 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... computers, mobile devices, or portable media to store or process HHS sensitive information that the Project... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 339.101 Policy. (d)(1) The Contracting Officer shall... orders that involve the operation or acquisition of an information technology system (for definition of...

  19. 48 CFR 339.101 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... computers, mobile devices, or portable media to store or process HHS sensitive information that the Project... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 339.101 Policy. (d)(1) The Contracting Officer shall... orders that involve the operation or acquisition of an information technology system (for definition of...

  20. 48 CFR 339.101 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... computers, mobile devices, or portable media to store or process HHS sensitive information that the Project... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 339.101 Policy. (d)(1) The Contracting Officer shall... orders that involve the operation or acquisition of an information technology system (for definition of...

  1. DoD Information Technology Acquisition: Delivering Information Technology Capabilities Expeditiously

    DTIC Science & Technology

    2013-09-01

    but they possess limited IT acquisition experience (Fryer- Biggs , 2012). According to Frank Kendall (2012), USD(AT&L), acquisition personnel need...we have a very long recovery time to correct it. (Fryer- Biggs , 2012) The DoD has the means to develop its own trained professionals but even that... John P. Kotter (1996) postulated what he considered to be the primary reasons why change efforts fail. Kotter offered eight reasons why this failure

  2. The telecommunications and data acquisition report

    NASA Technical Reports Server (NTRS)

    Renzetti, N. A.

    1980-01-01

    Deep Space Network progress in flight project support, tracking and data acquisition research and technology, network engineering, hardware and software implemention, and operations is documented. In addition, developments in Earth based radio technology as applied to geodynamics, astrophysics, and the radio search for extraterrestrial intelligence are reported.

  3. The Telecommunications and Data Acquisition Report

    NASA Technical Reports Server (NTRS)

    Posner, E. C. (Editor)

    1986-01-01

    Deep Space Network progress in flight project support, tracking and data acquisition research and technology, network engineering, hardware and software implementation, and operations is documented. In addition, developments in Earth-based radio technology as applied to geodynamics, astrophysics and the radio search for extraterrestrial intelligence are reported.

  4. Geo-referenced digital data acquisition and processing system using LiDAR technology : executive summary report.

    DOT National Transportation Integrated Search

    2006-02-01

    Problem: State-of-the-art airborne mapping is in major : transition, which affects both the data acquisition and : data processing technologies. The IT age has brought : powerful sensors and revolutionary new techniques to : acquire spatial data in l...

  5. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    DTIC Science & Technology

    2013-04-01

    Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change Kathryn Aten and John T. Dillard Naval...Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change...describes the preliminary analysis and findings of our study exploring what drives successful organizational adaptation in the context of technology

  6. Integrating the Department of Defense Military Services’ Technology Development Programs to Improve Time, Cost, and Technical Quality Parameters

    DTIC Science & Technology

    2007-03-01

    the DoD in general and across the SR, DD(X), and FCS programs in particular. The findings of this study show that through careful planning and...FCS programs in particular. The findings of this study show that through careful planning and coordinated technology transition, DoD acquisition...careful planning and coordinated technology transition, DoD acquisition programs can indeed leverage the technology development efforts of the three

  7. Task five report: Laser communications for data acquisition networks. [characteristics of lasers and laser systems for optical communication applications

    NASA Technical Reports Server (NTRS)

    1973-01-01

    Laser communication technology and laser communication performance are reviewed. The subjects discussed are: (1) characteristics of laser communication systems, (2) laser technology problems, (3) means of overcoming laser technology problems, and (4) potential schedule for including laser communications into data acquisition networks. Various types of laser communication systems are described and their capabilities are defined.

  8. Teaching Technology: From Knowing to Feeling Enhancing Emotional and Content Acquisition Performance through Gardner's Multiple Intelligences Theory in Technology and Design Lessons

    ERIC Educational Resources Information Center

    Sanchez-Martin, Jesus; Alvarez-Gragera, Garcia J.; Davila-Acedo, Maria Antonia; Mellado, Vicente

    2017-01-01

    Gardner's Multiple Intelligences Theory (MIT) can be a cognitive and emotional improvement if is taken into account in the standard development of the Technology lessons. This work presents a preliminary evaluation of the performance enhancement in two concomitant aspects: contents acquisition and emotional yield. The study was made on up to 150…

  9. Plant phenomics: an overview of image acquisition technologies and image data analysis algorithms

    PubMed Central

    Perez-Sanz, Fernando; Navarro, Pedro J

    2017-01-01

    Abstract The study of phenomes or phenomics has been a central part of biology. The field of automatic phenotype acquisition technologies based on images has seen an important advance in the last years. As with other high-throughput technologies, it addresses a common set of problems, including data acquisition and analysis. In this review, we give an overview of the main systems developed to acquire images. We give an in-depth analysis of image processing with its major issues and the algorithms that are being used or emerging as useful to obtain data out of images in an automatic fashion. PMID:29048559

  10. CSTI Earth-to-orbit propulsion research and technology program overview

    NASA Technical Reports Server (NTRS)

    Gentz, Steven J.

    1993-01-01

    NASA supports a vigorous Earth-to-orbit (ETO) research and technology program as part of its Civil Space Technology Initiative. The purpose of this program is to provide an up-to-date technology base to support future space transportation needs for a new generation of lower cost, operationally efficient, long-lived and highly reliable ETO propulsion systems by enhancing the knowledge, understanding and design methodology applicable to advanced oxygen/hydrogen and oxygen/hydrocarbon ETO propulsion systems. Program areas of interest include analytical models, advanced component technology, instrumentation, and validation/verification testing. Organizationally, the program is divided between technology acquisition and technology verification as follows: (1) technology acquisition; and (2) technology verification.

  11. The Telecommunications and Data Acquisition Report

    NASA Technical Reports Server (NTRS)

    Posner, E. C. (Editor)

    1985-01-01

    Deep Space Network (DSN) progress in flight project support, tracking and data acquisition research and technology, network engineering, hardware and software implementation, and operation is discussed. In addition, developments in Earth-based radio technology as applied to geodynamics, astrophysics and the radio search for extraterrestrial intelligence are reported.

  12. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  13. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  14. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  15. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  16. 78 FR 22841 - Defense Federal Acquisition Regulation Supplement: Encouragement of Science, Technology...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-17

    ..., Engineering, and Mathematics (STEM) Programs (DFARS Case 2012-D027); Withdrawal AGENCY: Defense Acquisition... mathematics (STEM) programs. FOR FURTHER INFORMATION CONTACT: Mr. Dustin Pitsch: telephone 571-372- 6090... develop science, technology, engineering, and mathematics (STEM) programs. The purpose of this Notice is...

  17. Design and Analysis of a Model Reconfigurable Cyber-Exercise Laboratory (RCEL) for Information Assurance Education

    DTIC Science & Technology

    2004-03-01

    with MySQL . This choice was made because MySQL is open source. Any significant database engine such as Oracle or MS- SQL or even MS Access can be used...10 Figure 6. The DoD vs . Commercial Life Cycle...necessarily be interested in SCADA network security 13. MySQL (Database server) – This station represents a typical data server for a web page

  18. External Verification of SCADA System Embedded Controller Firmware

    DTIC Science & Technology

    2012-03-01

    microprocessor and read-only memory (ROM) or flash memory for storing firmware and control logic [5],[8]. A PLC typically has three software levels as shown in...implementing different firmware. Because PLCs are in effect a microprocessor device, an analysis of the current research on embedded devices is important...Electronics Engineers (IEEE) published a 15 best practices guide for firmware control on microprocessors [44]. IEEE suggests that microprocessors

  19. Risk Scan: A Review of Risk Assessment Capability and Maturity within the Canadian Safety and Security Program

    DTIC Science & Technology

    2014-06-01

    SCADA / ICS Cyber Test Lab initiated in 2013 Psychosocial – academic research exists,; opportunity for sharing and developing impact assessment...ecosystems and species at risk), accidents / system failure (rail; pipelines ; ferries CSSP strategy for the North Focus on regional l(and local) problem...Guidance; business planning; environmental scan; proposal evaluation; and performance measurement Program Risk Management – Guidelines for project

  20. Improvement of the linear polarization resistance method for testing steel corrosion inhibitors

    NASA Astrophysics Data System (ADS)

    Faritov, A. T.; Rozhdestvenskii, Yu. G.; Yamshchikova, S. A.; Minnikhanova, E. R.; Tyusenkov, A. S.

    2016-11-01

    The linear polarization resistance method is used to improve the technique of corrosion control in liquid conducting according to GOST 9.514-99 (General Corrosion and Aging Protection System. Corrosion Inhibitors for Metals in Water Systems. Electrochemical Method of Determining the Protective Ability). Corrosion monitoring is shown to be performed by electronic devices with real-time data transfer to industrial controllers and SCADA systems.

  1. Cable Overheating Risk Warning Method Based on Impedance Parameter Estimation in Distribution Network

    NASA Astrophysics Data System (ADS)

    Yu, Zhang; Xiaohui, Song; Jianfang, Li; Fei, Gao

    2017-05-01

    Cable overheating will lead to the cable insulation level reducing, speed up the cable insulation aging, even easy to cause short circuit faults. Cable overheating risk identification and warning is nessesary for distribution network operators. Cable overheating risk warning method based on impedance parameter estimation is proposed in the paper to improve the safty and reliability operation of distribution network. Firstly, cable impedance estimation model is established by using least square method based on the data from distribiton SCADA system to improve the impedance parameter estimation accuracy. Secondly, calculate the threshold value of cable impedance based on the historical data and the forecast value of cable impedance based on the forecasting data in future from distribiton SCADA system. Thirdly, establish risks warning rules library of cable overheating, calculate the cable impedance forecast value and analysis the change rate of impedance, and then warn the overheating risk of cable line based on the overheating risk warning rules library according to the variation relationship between impedance and line temperature rise. Overheating risk warning method is simulated in the paper. The simulation results shows that the method can identify the imedance and forecast the temperature rise of cable line in distribution network accurately. The result of overheating risk warning can provide decision basis for operation maintenance and repair.

  2. RANS simulations of wind turbine wakes: optimal tuning of turbulence closure and aerodynamic loads from LiDAR and SCADA data

    NASA Astrophysics Data System (ADS)

    Letizia, Stefano; Puccioni, Matteo; Zhan, Lu; Viola, Francesco; Camarri, Simone; Iungo, Giacomo Valerio

    2017-11-01

    Numerical simulations of wakes produced by utility-scale wind turbines still present challenges related to the variability of the atmospheric conditions and, in the most of the cases, the lack of information about the geometry and aerodynamic performance of the wind turbine blades. In order to overcome the mentioned difficulties, we propose a RANS solver for which turbine aerodynamic forcing and turbulence closure are calibrated through LiDAR and SCADA data acquired for an onshore wind farm. The wind farm under examination is located in North Texas over a relatively flat terrain. The experimental data are leveraged to maximize accuracy of the RANS predictions in terms of wake velocity field and power capture for different atmospheric stability conditions and settings of the wind turbines. The optimization of the RANS parameters is performed through an adjoint-RANS formulation and a gradient-based procedure. The optimally-tuned aerodynamic forcing and turbulence closure are then analyzed in order to investigate effects of the atmospheric stability on the evolution of wind turbine wakes and power performance. The proposed RANS solver has low computational costs comparable to those of wake engineering models, which make it a compelling tool for wind farm control and optimization. Acknowledgments: NSF I/UCRC WindSTAR IIP 1362033 and TACC.

  3. The Advantages and Disadvantages of Computer Technology in Second Language Acquisition

    ERIC Educational Resources Information Center

    Lai, Cheng-Chieh; Kritsonis, William Allan

    2006-01-01

    The purpose of this article is to discuss the advantages and disadvantages of computer technology and Computer Assisted Language Learning (CALL) programs for current second language learning. According to the National Clearinghouse for English Language Acquisition & Language Instruction Educational Programs' report (2002), more than nine million…

  4. A Critical Analysis of the Acquisition Review Journal: Are We in Step with the Field?

    DTIC Science & Technology

    2006-12-01

    ART # YEAR AUTHOR(S) TITLE THEMES 1 1994 Preston, Colleen Acquisition Reform: Making it a Reality Acquisition Reform 2 1994 LaBerge , Walter B...Going? Technology 33 1996 Hewitt, Clyde Getting to the On-Ramp of the Information Highway Technology 34 1996 LaBerge , Walter B. Cycle Time: A...Learned from Developing the ABCs 6.4 Solution System of Systems 204 2005 Zenishek, Steven G.; Usechak, David Net-Centric Warfare and its Impact on

  5. LATIST: A Performance Support Tool for Integrating Technologies into Defense Acquisition University Learning Assets

    DTIC Science & Technology

    2011-07-01

    TECHNOLOGIES INTO DEFENSE ACqUISITION UNIVERSITY LEARNING ASSETS Nada Dabbagh, Kevin Clark, Susan Dass , Salim Al Waaili, Sally Byrd, Susan...demographic data, four Likert- scale questions that targeted respondents’ familiarity with ALT, and one Likert- scale question addressing the...use of technology in learning with under- served populations. (E-mail address: kclark6@gmu.edu) Ms. Susan Dass has over 20 years’ experi- ence in

  6. Engineering Change Orders and their Impact on DoD Acquisition Contracts

    DTIC Science & Technology

    2017-03-23

    Air Force Institute of Technology AFIT Scholar Theses and Dissertations 3-23-2017 Engineering Change Orders and their Impact on DoD Acquisition...MS-17-M-180 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio DISTRIBUTION...School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command In Partial Fulfillment of

  7. 48 CFR 970.2301 - Sustainable acquisition.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    .... 970.2301 Section 970.2301 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Environment, Energy and Water Efficiency, Renewable Energy Technologies, Occupational Safety and Drug-Free Work Place 970.2301 Sustainable acquisition...

  8. 48 CFR 970.2301 - Sustainable acquisition.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    .... 970.2301 Section 970.2301 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Environment, Energy and Water Efficiency, Renewable Energy Technologies, Occupational Safety and Drug-Free Work Place 970.2301 Sustainable acquisition. ...

  9. 48 CFR 23.103 - Sustainable acquisitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Sustainable Acquisition Policy 23.103 Sustainable acquisitions. (a... the products are— (1) Energy-efficient (ENERGY STAR® or Federal Energy Management Program (FEMP...

  10. 48 CFR 23.103 - Sustainable acquisitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Sustainable Acquisition Policy 23.103 Sustainable acquisitions. (a... the products are— (1) Energy-efficient (ENERGY STAR ® or Federal Energy Management Program (FEMP...

  11. 48 CFR 970.2301 - Sustainable acquisition.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... 970.2301 Section 970.2301 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Environment, Energy and Water Efficiency, Renewable Energy Technologies, Occupational Safety and Drug-Free Work Place 970.2301 Sustainable acquisition. ...

  12. 48 CFR 970.2301 - Sustainable acquisition.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    .... 970.2301 Section 970.2301 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Environment, Energy and Water Efficiency, Renewable Energy Technologies, Occupational Safety and Drug-Free Work Place 970.2301 Sustainable acquisition. ...

  13. 48 CFR 970.2301 - Sustainable acquisition.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    .... 970.2301 Section 970.2301 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Environment, Energy and Water Efficiency, Renewable Energy Technologies, Occupational Safety and Drug-Free Work Place 970.2301 Sustainable acquisition. ...

  14. 48 CFR 23.401 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Definitions. 23.401 Section 23.401 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  15. Acquisition management of the Global Transportation Network

    DOT National Transportation Integrated Search

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  16. 48 CFR 23.1102 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Applicability. 23.1102 Section 23.1102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  17. 48 CFR 23.1004 - Requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Requirements. 23.1004 Section 23.1004 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  18. 48 CFR 23.401 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Definitions. 23.401 Section 23.401 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  19. 48 CFR 223.302 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Policy. 223.302 Section 223.302 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  20. 48 CFR 23.1003 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Definitions. 23.1003 Section 23.1003 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  1. 48 CFR 223.7100 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Policy. 223.7100 Section 223.7100 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  2. 48 CFR 23.1003 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Definitions. 23.1003 Section 23.1003 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  3. 48 CFR 223.803 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Policy. 223.803 Section 223.803 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  4. 48 CFR 223.7102 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Policy. 223.7102 Section 223.7102 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  5. 48 CFR 223.7201 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Policy. 223.7201 Section 223.7201 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  6. 48 CFR 23.1102 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Applicability. 23.1102 Section 23.1102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  7. 48 CFR 223.302 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Policy. 223.302 Section 223.302 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  8. 48 CFR 223.7201 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Policy. 223.7201 Section 223.7201 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  9. 48 CFR 23.1004 - Requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Requirements. 23.1004 Section 23.1004 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  10. 48 CFR 23.701 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Definitions. 23.701 Section 23.701 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  11. 48 CFR 223.7100 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Policy. 223.7100 Section 223.7100 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  12. 48 CFR 23.1002 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Applicability. 23.1002 Section 23.1002 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  13. 48 CFR 223.7201 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Policy. 223.7201 Section 223.7201 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  14. 48 CFR 223.803 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Policy. 223.803 Section 223.803 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  15. 48 CFR 23.401 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Definitions. 23.401 Section 23.401 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  16. 48 CFR 223.7301 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Policy. 223.7301 Section 223.7301 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  17. 48 CFR 223.803 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Policy. 223.803 Section 223.803 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  18. 48 CFR 223.302 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Policy. 223.302 Section 223.302 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  19. 48 CFR 23.1002 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Applicability. 23.1002 Section 23.1002 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  20. 48 CFR 23.601 - Requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Requirements. 23.601 Section 23.601 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  1. 48 CFR 223.302 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Policy. 223.302 Section 223.302 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  2. 48 CFR 223.7301 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Policy. 223.7301 Section 223.7301 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES...

  3. Plant phenomics: an overview of image acquisition technologies and image data analysis algorithms.

    PubMed

    Perez-Sanz, Fernando; Navarro, Pedro J; Egea-Cortines, Marcos

    2017-11-01

    The study of phenomes or phenomics has been a central part of biology. The field of automatic phenotype acquisition technologies based on images has seen an important advance in the last years. As with other high-throughput technologies, it addresses a common set of problems, including data acquisition and analysis. In this review, we give an overview of the main systems developed to acquire images. We give an in-depth analysis of image processing with its major issues and the algorithms that are being used or emerging as useful to obtain data out of images in an automatic fashion. © The Author 2017. Published by Oxford University Press.

  4. 48 CFR 23.803 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 23.803 Section 23.803 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  5. 48 CFR 23.403 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Policy. 23.403 Section 23.403 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  6. 48 CFR 23.1000 - Scope.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Scope. 23.1000 Section 23.1000 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  7. 48 CFR 23.803 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Policy. 23.803 Section 23.803 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  8. 48 CFR 23.902 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 23.902 Section 23.902 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  9. 48 CFR 23.104 - Exceptions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Exceptions. 23.104 Section 23.104 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  10. 48 CFR 23.104 - Exceptions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Exceptions. 23.104 Section 23.104 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  11. 48 CFR 23.802 - [Reserved

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false [Reserved] 23.802 Section 23.802 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  12. 48 CFR 23.301 - Definition.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Definition. 23.301 Section 23.301 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  13. 48 CFR 23.302 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Policy. 23.302 Section 23.302 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  14. 48 CFR 23.101 - Definition.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Definition. 23.101 Section 23.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  15. 48 CFR 23.700 - Scope.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Scope. 23.700 Section 23.700 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  16. 48 CFR 23.802 - [Reserved

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false [Reserved] 23.802 Section 23.802 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  17. 48 CFR 23.700 - Scope.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Scope. 23.700 Section 23.700 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  18. 48 CFR 23.101 - Definition.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Definition. 23.101 Section 23.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  19. 48 CFR 23.700 - Scope.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Scope. 23.700 Section 23.700 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  20. 48 CFR 23.902 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Policy. 23.902 Section 23.902 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  1. 48 CFR 23.403 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Policy. 23.403 Section 23.403 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  2. 48 CFR 23.301 - Definition.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Definition. 23.301 Section 23.301 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  3. 48 CFR 23.101 - Definition.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Definition. 23.101 Section 23.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  4. 48 CFR 23.001 - Definition.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Definition. 23.001 Section 23.001 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  5. 48 CFR 23.405 - Procedures

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Procedures 23.405 Section 23.405 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  6. 48 CFR 23.002 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 23.002 Section 23.002 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  7. 48 CFR 23.104 - Exceptions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Exceptions. 23.104 Section 23.104 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  8. 48 CFR 23.403 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 23.403 Section 23.403 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  9. 48 CFR 23.002 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Policy. 23.002 Section 23.002 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  10. 48 CFR 23.101 - Definition.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Definition. 23.101 Section 23.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  11. 48 CFR 23.105 - Exemption authority.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Exemption authority. 23.105 Section 23.105 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  12. 48 CFR 23.301 - Definition.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Definition. 23.301 Section 23.301 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  13. 48 CFR 23.302 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Policy. 23.302 Section 23.302 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  14. 48 CFR 23.002 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Policy. 23.002 Section 23.002 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  15. 48 CFR 23.002 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Policy. 23.002 Section 23.002 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  16. 48 CFR 23.303 - Contract clause.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Contract clause. 23.303 Section 23.303 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  17. 48 CFR 23.301 - Definition.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Definition. 23.301 Section 23.301 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

  18. 48 CFR 23.804 - Contract clauses.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Contract clauses. 23.804 Section 23.804 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  19. 48 CFR 23.1005 - Contract clause.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Contract clause. 23.1005 Section 23.1005 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND...

  20. 48 CFR 23.1101 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Purpose. 23.1101 Section 23.1101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE...

Top